{"title":"Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier","authors":"A. Almuhaideb, Huda A. Alghamdi","doi":"10.3390/jsan11030044","DOIUrl":"https://doi.org/10.3390/jsan11030044","url":null,"abstract":"Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services. TMIS uses wearable devices with sensors to collect patients’ data and transmit the data to the controller node via a public channel. Then, the medical server obtains the data from the controller node and stores it in the database to be analyzed. Unfortunately, an attacker can try to perform attacks via a public channel. Thus, establishing a secure mutual authentication protocol is essential for secure data transfer. Several authentication schemes have been presented to achieve mutual authentication, but there are performance limitations and security problems. Therefore, this study aimed to propose two secure and efficient WBAN authentication protocols between sensors and a mobile device/controller: authentication protocol-I for emergency medical reports and authentication protocol-II for periodic medical reports. To analyze the proposed authentication protocols, we conducted an informal security analysis, implemented BAN logic analysis, validated our proposed authentication protocol using the AVISPA simulation tool, and conducted a performance analysis. Consequently, we showed that our proposed protocols satisfy all security requirements in this study, attain mutual authentication, resist active and passive attacks, and have suitable computation and communication costs for a WBAN.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115982585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine-Learning-Based Indoor Mobile Positioning Using Wireless Access Points with Dual SSIDs - An Experimental Study","authors":"Krishna Paudel, Rajan Kadel, D. Guruge","doi":"10.3390/jsan11030042","DOIUrl":"https://doi.org/10.3390/jsan11030042","url":null,"abstract":"Location prediction in an indoor environment is a challenge, and this has been a research trend for recent years, with many potential applications. In this paper, machine-learning-based regression algorithms and Received Signal Strength Indicator (RSSI) fingerprint data from Wireless Access Points (WAPs) with dual Service set IDentifiers (SSIDs) are used, and positioning prediction and location accuracy are compared with single SSIDs. It is found that using Wi-Fi RSSI data from dual-frequency SSIDs improves the location prediction accuracy by up to 19%. It is also found that Support Vector Regression (SVR) gives the best prediction among classical machine-learning algorithms, followed by K-Nearest Neighbour (KNN) and Linear Regression (LR). Moreover, we analyse the effect of fingerprint grid size, coverage of the Reference Points (RPs) and location of the Test Points (TPs) on the positioning prediction and location accuracy using these three best algorithms. It is found that the prediction accuracy depends upon the fingerprint grid size and the boundary of the RPs. Experimental results demonstrates that reducing fingerprint grid size improves the positioning prediction and location accuracy. Further, the result also shows that when all the TPs are inside the boundary of RPs, the prediction accuracy increases.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Q. S. Al-Khalidi, Rabab Al-Zaidi, A. Abubahia, Hari Mohan Pandey, M. Biswas, Mohammad Hammoudeh
{"title":"Global IoT Mobility: A Path Based Forwarding Approach","authors":"Mohammed Q. S. Al-Khalidi, Rabab Al-Zaidi, A. Abubahia, Hari Mohan Pandey, M. Biswas, Mohammad Hammoudeh","doi":"10.3390/jsan11030041","DOIUrl":"https://doi.org/10.3390/jsan11030041","url":null,"abstract":"With the huge proliferation of mobile Internet of Things (IoT) devices such as connected vehicles, drones, and healthcare wearables, IoT networks are promising mobile connectivity capacity far beyond the conventional computing platforms. The success of this service provisioning is highly dependent on the flexibility offered by such enabling technologies to support IoT mobility using different devices and protocol stacks. Many of the connected mobile IoT devices are autonomous, and resource constrained, which poses additional challenges for mobile IoT communication. Therefore, given the unique mobility requirements of IoT devices and applications, many challenges are still to be addressed. This paper presents a global mobility management solution for IoT networks that can handle both micro and macro mobility scenarios. The solution exploits a path-based forwarding fabric together with mechanisms from Information-Centric Networking. The solution is equally suitable for legacy session-based mobile devices and emerging information-based IoT devices such as mobile sensors. Simulation evaluations have shown minimum overhead in terms of packet delivery and signalling costs to support macro mobility handover across different IoT domains.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129893839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Tripicchio, Salvatore D’Avella, Gerardo Jesus Camacho-Gonzalez, Lorenzo Landolfi, Gabriele Baris, C. Avizzano, Alessandro Filippeschi
{"title":"Multi-Camera Extrinsic Calibration for Real-Time Tracking in Large Outdoor Environments","authors":"P. Tripicchio, Salvatore D’Avella, Gerardo Jesus Camacho-Gonzalez, Lorenzo Landolfi, Gabriele Baris, C. Avizzano, Alessandro Filippeschi","doi":"10.3390/jsan11030040","DOIUrl":"https://doi.org/10.3390/jsan11030040","url":null,"abstract":"Calibrating intrinsic and extrinsic camera parameters is a fundamental problem that is a preliminary task for a wide variety of applications, from robotics to computer vision to surveillance and industrial tasks. With the advent of Internet of Things (IoT) technology and edge computing capabilities, the ability to track motion activities in large outdoor areas has become feasible. The proposed work presents a network of IoT camera nodes and a dissertation on two possible approaches for automatically estimating their poses. One approach follows the Structure from Motion (SfM) pipeline, while the other is marker-based. Both methods exploit the correspondence of features detected by cameras on synchronized frames. A preliminary indoor experiment was conducted to assess the performance of the two methods compared to ground truth measurements, employing a commercial tracking system of millimetric precision. Outdoor experiments directly compared the two approaches on a larger setup. The results show that the proposed SfM pipeline more accurately estimates the pose of the cameras. In addition, in the indoor setup, the same methods were used for a tracking application to show a practical use case.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133763841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning in IoT Networking and Communications","authors":"Mona Jaber","doi":"10.3390/jsan11030037","DOIUrl":"https://doi.org/10.3390/jsan11030037","url":null,"abstract":"The fast and wide spread of Internet of Things (IoT) applications offers new opportunities in multiple domains but also presents new challenges [...]","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125226130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ghulam Abbas, Amjad Mehmood, C. Maple, G. Epiphaniou, Jaime Lloret
{"title":"Safety, Security and Privacy in Machine Learning Based Internet of Things","authors":"Ghulam Abbas, Amjad Mehmood, C. Maple, G. Epiphaniou, Jaime Lloret","doi":"10.3390/jsan11030038","DOIUrl":"https://doi.org/10.3390/jsan11030038","url":null,"abstract":"Recent developments in communication and information technologies, especially in the internet of things (IoT), have greatly changed and improved the human lifestyle. Due to the easy access to, and increasing demand for, smart devices, the IoT system faces new cyber-physical security and privacy attacks, such as denial of service, spoofing, phishing, obfuscations, jamming, eavesdropping, intrusions, and other unforeseen cyber threats to IoT systems. The traditional tools and techniques are not very efficient to prevent and protect against the new cyber-physical security challenges. Robust, dynamic, and up-to-date security measures are required to secure IoT systems. The machine learning (ML) technique is considered the most advanced and promising method, and opened up many research directions to address new security challenges in the cyber-physical systems (CPS). This research survey presents the architecture of IoT systems, investigates different attacks on IoT systems, and reviews the latest research directions to solve the safety and security of IoT systems based on machine learning techniques. Moreover, it discusses the potential future research challenges when employing security methods in IoT systems.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132198205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Christidis, P. Karkazis, Pericles Papadopoulos, Helen C. Leligou
{"title":"Decentralized Blockchain-Based IoT Data Marketplaces","authors":"J. Christidis, P. Karkazis, Pericles Papadopoulos, Helen C. Leligou","doi":"10.3390/jsan11030039","DOIUrl":"https://doi.org/10.3390/jsan11030039","url":null,"abstract":"In present times, the largest amount of data is being controlled in a centralized manner. However, as the data are in essence the fuel of any application and service, there is a need to make the data more findable and accessible. Another problem with the data being centralized is the limited storage as well as the uncertainty of their authenticity. In the Internet of Things (IoT) sector specifically, data are the key to develop the most powerful and reliable applications. For these reasons, there is a rise on works that present decentralized marketplaces for IoT data with many of them exploiting blockchain technology to offer security advantages. The main contribution of this work is to review the existing works on decentralized IoT data marketplaces and discuss important design aspects and options so as to guide (a) the prospective user to select the IoT data marketplace that matches their needs and (b) the potential designer of a new marketplace to make insightful decisions.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125505809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Spectrum Sensing Using MD and ED for Cognitive Radio Networks","authors":"K. Bani, Vaishali R. Kulkarni","doi":"10.3390/jsan11030036","DOIUrl":"https://doi.org/10.3390/jsan11030036","url":null,"abstract":"Day by day, the demand for wireless systems is increasing while the available spectrum resources are not sufficient. To fulfil the demand for wireless systems, the spectrum hole (spectrum vacant) should be found and utilised very effectively. Cognitive radio (CR) is a device which intelligently senses the spectrum through various spectrum-sensing detectors. Based on the complexity and licensed user’s information present with CR, the appropriate detector should be utilised for spectrum sensing. In this paper, a hybrid detector (HD) is proposed to determine the spectrum hole from the available spectrum resources. HD is designed based on an energy detector (ED) and matched detector (MD). Unlike a single detector such as ED or MD, HD can sense the signal more precisely. Here, HD can work on both conditions whether the primary user (PU) information is available or not. HD is analysed under heterogeneous environments with and without cooperative spectrum sensing (CSS). For CSS, four users were used to implement OR, AND, and majority schemes under low SNR walls. To design the HD, specifications were chosen based on the IEEE Wireless Regional Area Network (WRAN) 802.22 standard for accessing TV spectrum holes. For the HD model, we achieved the best results through OR rule. Under the low SNR circumstances at −20 dB SNR, the probability of detection (PD) is maximised to 1 and the probability of a false alarm (PFA) is reduced to 0 through the CSS environment.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133066519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles","authors":"Callum Brocklehurst, Milena Radenkovic","doi":"10.3390/jsan11030035","DOIUrl":"https://doi.org/10.3390/jsan11030035","url":null,"abstract":"The increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous vehicle edge networks as opportunistic networks that bridge the gap between fully distributed vehicular networks based on short-range vehicle-to-vehicle communication and cellular-based infrastructure for centralized solutions. Experiments are conducted using opportunistic networking protocols to provide data to autonomous trams and buses in a smart city. Attacking vehicles enter the city aiming to disrupt the network to cause harm to the general public. In the experiments the number of vehicles and the attack length is altered to investigate the impact on the network and vehicles. Considering different measures of success as well as computation expense, measurements are taken from all nodes in the network across different lengths of attack. The data gathered from each node allow exploration into how different attacks impact metrics including the delivery probability of a message, the time taken to deliver and the computation expense to each node. The novel multidimensional analysis including geospatial elements provides evidence that the state-of-the-art MaxProp algorithm outperforms the benchmark as well as other, more complex routing protocols in most of the categories. Upon the introduction of attacking nodes however, PRoPHET provides the most reliable delivery probability when under attack. Two different attack methods (black and grey holes) are used to disrupt the flow of messages throughout the network and the more basic protocols show that they are less consistent. In some metrics, the PRoPHET algorithm performs better when under attack due to the benefit of reduced network traffic.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132033443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Boakye-Boateng, A. Ghorbani, Arash Habibi Lashkari
{"title":"A Trust-Influenced Smart Grid: A Survey and a Proposal","authors":"K. Boakye-Boateng, A. Ghorbani, Arash Habibi Lashkari","doi":"10.3390/jsan11030034","DOIUrl":"https://doi.org/10.3390/jsan11030034","url":null,"abstract":"A compromised Smart Grid, or its components, can have cascading effects that can affect lives. This has led to numerous cybersecurity-centric studies focusing on the Smart Grid in research areas such as encryption, intrusion detection and prevention, privacy and trust. Even though trust is an essential component of cybersecurity research; it has not received considerable attention compared to the other areas within the context of Smart Grid. As of the time of this study, we observed that there has neither been a study assessing trust within the Smart Grid nor were there trust models that could detect malicious attacks within the substation. With these two gaps as our objectives, we began by presenting a mathematical formalization of trust within the context of Smart Grid devices. We then categorized the existing trust-based literature within the Smart Grid under the NIST conceptual domains and priority areas, multi-agent systems and the derived trust formalization. We then proposed a novel substation-based trust model and implemented a Modbus variation to detect final-phase attacks. The variation was tested against two publicly available Modbus datasets (EPM and ATENA H2020) under three kinds of tests, namely external, internal, and internal with IP-MAC blocking. The first test assumes that external substation adversaries remain so and the second test assumes all adversaries within the substation. The third test assumes the second test but blacklists any device that sends malicious requests. The tests were performed from a Modbus server’s point of view and a Modbus client’s point of view. Aside from detecting the attacks within the dataset, our model also revealed the behaviour of the attack datasets and their influence on the trust model components. Being able to detect all labelled attacks in one of the datasets also increased our confidence in the model in the detection of attacks in the other dataset. We also believe that variations of the model can be created for other OT-based protocols as well as extended to other critical infrastructures.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132913338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}