J. Sens. Actuator Networks最新文献

筛选
英文 中文
Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier ban内层安全高效的WBAN认证协议
J. Sens. Actuator Networks Pub Date : 2022-08-08 DOI: 10.3390/jsan11030044
A. Almuhaideb, Huda A. Alghamdi
{"title":"Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier","authors":"A. Almuhaideb, Huda A. Alghamdi","doi":"10.3390/jsan11030044","DOIUrl":"https://doi.org/10.3390/jsan11030044","url":null,"abstract":"Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services. TMIS uses wearable devices with sensors to collect patients’ data and transmit the data to the controller node via a public channel. Then, the medical server obtains the data from the controller node and stores it in the database to be analyzed. Unfortunately, an attacker can try to perform attacks via a public channel. Thus, establishing a secure mutual authentication protocol is essential for secure data transfer. Several authentication schemes have been presented to achieve mutual authentication, but there are performance limitations and security problems. Therefore, this study aimed to propose two secure and efficient WBAN authentication protocols between sensors and a mobile device/controller: authentication protocol-I for emergency medical reports and authentication protocol-II for periodic medical reports. To analyze the proposed authentication protocols, we conducted an informal security analysis, implemented BAN logic analysis, validated our proposed authentication protocol using the AVISPA simulation tool, and conducted a performance analysis. Consequently, we showed that our proposed protocols satisfy all security requirements in this study, attain mutual authentication, resist active and passive attacks, and have suitable computation and communication costs for a WBAN.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115982585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Machine-Learning-Based Indoor Mobile Positioning Using Wireless Access Points with Dual SSIDs - An Experimental Study 使用双ssid无线接入点的基于机器学习的室内移动定位-一项实验研究
J. Sens. Actuator Networks Pub Date : 2022-08-05 DOI: 10.3390/jsan11030042
Krishna Paudel, Rajan Kadel, D. Guruge
{"title":"Machine-Learning-Based Indoor Mobile Positioning Using Wireless Access Points with Dual SSIDs - An Experimental Study","authors":"Krishna Paudel, Rajan Kadel, D. Guruge","doi":"10.3390/jsan11030042","DOIUrl":"https://doi.org/10.3390/jsan11030042","url":null,"abstract":"Location prediction in an indoor environment is a challenge, and this has been a research trend for recent years, with many potential applications. In this paper, machine-learning-based regression algorithms and Received Signal Strength Indicator (RSSI) fingerprint data from Wireless Access Points (WAPs) with dual Service set IDentifiers (SSIDs) are used, and positioning prediction and location accuracy are compared with single SSIDs. It is found that using Wi-Fi RSSI data from dual-frequency SSIDs improves the location prediction accuracy by up to 19%. It is also found that Support Vector Regression (SVR) gives the best prediction among classical machine-learning algorithms, followed by K-Nearest Neighbour (KNN) and Linear Regression (LR). Moreover, we analyse the effect of fingerprint grid size, coverage of the Reference Points (RPs) and location of the Test Points (TPs) on the positioning prediction and location accuracy using these three best algorithms. It is found that the prediction accuracy depends upon the fingerprint grid size and the boundary of the RPs. Experimental results demonstrates that reducing fingerprint grid size improves the positioning prediction and location accuracy. Further, the result also shows that when all the TPs are inside the boundary of RPs, the prediction accuracy increases.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Global IoT Mobility: A Path Based Forwarding Approach 全球物联网移动性:基于路径的转发方法
J. Sens. Actuator Networks Pub Date : 2022-08-01 DOI: 10.3390/jsan11030041
Mohammed Q. S. Al-Khalidi, Rabab Al-Zaidi, A. Abubahia, Hari Mohan Pandey, M. Biswas, Mohammad Hammoudeh
{"title":"Global IoT Mobility: A Path Based Forwarding Approach","authors":"Mohammed Q. S. Al-Khalidi, Rabab Al-Zaidi, A. Abubahia, Hari Mohan Pandey, M. Biswas, Mohammad Hammoudeh","doi":"10.3390/jsan11030041","DOIUrl":"https://doi.org/10.3390/jsan11030041","url":null,"abstract":"With the huge proliferation of mobile Internet of Things (IoT) devices such as connected vehicles, drones, and healthcare wearables, IoT networks are promising mobile connectivity capacity far beyond the conventional computing platforms. The success of this service provisioning is highly dependent on the flexibility offered by such enabling technologies to support IoT mobility using different devices and protocol stacks. Many of the connected mobile IoT devices are autonomous, and resource constrained, which poses additional challenges for mobile IoT communication. Therefore, given the unique mobility requirements of IoT devices and applications, many challenges are still to be addressed. This paper presents a global mobility management solution for IoT networks that can handle both micro and macro mobility scenarios. The solution exploits a path-based forwarding fabric together with mechanisms from Information-Centric Networking. The solution is equally suitable for legacy session-based mobile devices and emerging information-based IoT devices such as mobile sensors. Simulation evaluations have shown minimum overhead in terms of packet delivery and signalling costs to support macro mobility handover across different IoT domains.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129893839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Camera Extrinsic Calibration for Real-Time Tracking in Large Outdoor Environments 大型室外环境下多摄像机外部标定的实时跟踪
J. Sens. Actuator Networks Pub Date : 2022-07-29 DOI: 10.3390/jsan11030040
P. Tripicchio, Salvatore D’Avella, Gerardo Jesus Camacho-Gonzalez, Lorenzo Landolfi, Gabriele Baris, C. Avizzano, Alessandro Filippeschi
{"title":"Multi-Camera Extrinsic Calibration for Real-Time Tracking in Large Outdoor Environments","authors":"P. Tripicchio, Salvatore D’Avella, Gerardo Jesus Camacho-Gonzalez, Lorenzo Landolfi, Gabriele Baris, C. Avizzano, Alessandro Filippeschi","doi":"10.3390/jsan11030040","DOIUrl":"https://doi.org/10.3390/jsan11030040","url":null,"abstract":"Calibrating intrinsic and extrinsic camera parameters is a fundamental problem that is a preliminary task for a wide variety of applications, from robotics to computer vision to surveillance and industrial tasks. With the advent of Internet of Things (IoT) technology and edge computing capabilities, the ability to track motion activities in large outdoor areas has become feasible. The proposed work presents a network of IoT camera nodes and a dissertation on two possible approaches for automatically estimating their poses. One approach follows the Structure from Motion (SfM) pipeline, while the other is marker-based. Both methods exploit the correspondence of features detected by cameras on synchronized frames. A preliminary indoor experiment was conducted to assess the performance of the two methods compared to ground truth measurements, employing a commercial tracking system of millimetric precision. Outdoor experiments directly compared the two approaches on a larger setup. The results show that the proposed SfM pipeline more accurately estimates the pose of the cameras. In addition, in the indoor setup, the same methods were used for a tracking application to show a practical use case.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133763841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning in IoT Networking and Communications 物联网网络和通信中的机器学习
J. Sens. Actuator Networks Pub Date : 2022-07-29 DOI: 10.3390/jsan11030037
Mona Jaber
{"title":"Machine Learning in IoT Networking and Communications","authors":"Mona Jaber","doi":"10.3390/jsan11030037","DOIUrl":"https://doi.org/10.3390/jsan11030037","url":null,"abstract":"The fast and wide spread of Internet of Things (IoT) applications offers new opportunities in multiple domains but also presents new challenges [...]","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125226130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety, Security and Privacy in Machine Learning Based Internet of Things 基于机器学习的物联网中的安全、保障和隐私
J. Sens. Actuator Networks Pub Date : 2022-07-29 DOI: 10.3390/jsan11030038
Ghulam Abbas, Amjad Mehmood, C. Maple, G. Epiphaniou, Jaime Lloret
{"title":"Safety, Security and Privacy in Machine Learning Based Internet of Things","authors":"Ghulam Abbas, Amjad Mehmood, C. Maple, G. Epiphaniou, Jaime Lloret","doi":"10.3390/jsan11030038","DOIUrl":"https://doi.org/10.3390/jsan11030038","url":null,"abstract":"Recent developments in communication and information technologies, especially in the internet of things (IoT), have greatly changed and improved the human lifestyle. Due to the easy access to, and increasing demand for, smart devices, the IoT system faces new cyber-physical security and privacy attacks, such as denial of service, spoofing, phishing, obfuscations, jamming, eavesdropping, intrusions, and other unforeseen cyber threats to IoT systems. The traditional tools and techniques are not very efficient to prevent and protect against the new cyber-physical security challenges. Robust, dynamic, and up-to-date security measures are required to secure IoT systems. The machine learning (ML) technique is considered the most advanced and promising method, and opened up many research directions to address new security challenges in the cyber-physical systems (CPS). This research survey presents the architecture of IoT systems, investigates different attacks on IoT systems, and reviews the latest research directions to solve the safety and security of IoT systems based on machine learning techniques. Moreover, it discusses the potential future research challenges when employing security methods in IoT systems.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132198205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Decentralized Blockchain-Based IoT Data Marketplaces 分散的基于区块链的物联网数据市场
J. Sens. Actuator Networks Pub Date : 2022-07-29 DOI: 10.3390/jsan11030039
J. Christidis, P. Karkazis, Pericles Papadopoulos, Helen C. Leligou
{"title":"Decentralized Blockchain-Based IoT Data Marketplaces","authors":"J. Christidis, P. Karkazis, Pericles Papadopoulos, Helen C. Leligou","doi":"10.3390/jsan11030039","DOIUrl":"https://doi.org/10.3390/jsan11030039","url":null,"abstract":"In present times, the largest amount of data is being controlled in a centralized manner. However, as the data are in essence the fuel of any application and service, there is a need to make the data more findable and accessible. Another problem with the data being centralized is the limited storage as well as the uncertainty of their authenticity. In the Internet of Things (IoT) sector specifically, data are the key to develop the most powerful and reliable applications. For these reasons, there is a rise on works that present decentralized marketplaces for IoT data with many of them exploiting blockchain technology to offer security advantages. The main contribution of this work is to review the existing works on decentralized IoT data marketplaces and discuss important design aspects and options so as to guide (a) the prospective user to select the IoT data marketplace that matches their needs and (b) the potential designer of a new marketplace to make insightful decisions.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125505809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hybrid Spectrum Sensing Using MD and ED for Cognitive Radio Networks 基于MD和ED的认知无线网络混合频谱感知
J. Sens. Actuator Networks Pub Date : 2022-07-21 DOI: 10.3390/jsan11030036
K. Bani, Vaishali R. Kulkarni
{"title":"Hybrid Spectrum Sensing Using MD and ED for Cognitive Radio Networks","authors":"K. Bani, Vaishali R. Kulkarni","doi":"10.3390/jsan11030036","DOIUrl":"https://doi.org/10.3390/jsan11030036","url":null,"abstract":"Day by day, the demand for wireless systems is increasing while the available spectrum resources are not sufficient. To fulfil the demand for wireless systems, the spectrum hole (spectrum vacant) should be found and utilised very effectively. Cognitive radio (CR) is a device which intelligently senses the spectrum through various spectrum-sensing detectors. Based on the complexity and licensed user’s information present with CR, the appropriate detector should be utilised for spectrum sensing. In this paper, a hybrid detector (HD) is proposed to determine the spectrum hole from the available spectrum resources. HD is designed based on an energy detector (ED) and matched detector (MD). Unlike a single detector such as ED or MD, HD can sense the signal more precisely. Here, HD can work on both conditions whether the primary user (PU) information is available or not. HD is analysed under heterogeneous environments with and without cooperative spectrum sensing (CSS). For CSS, four users were used to implement OR, AND, and majority schemes under low SNR walls. To design the HD, specifications were chosen based on the IEEE Wireless Regional Area Network (WRAN) 802.22 standard for accessing TV spectrum holes. For the HD model, we achieved the best results through OR rule. Under the low SNR circumstances at −20 dB SNR, the probability of detection (PD) is maximised to 1 and the probability of a false alarm (PFA) is reduced to 0 through the CSS environment.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133066519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles 一种新型自动驾驶汽车网络对网络安全攻击的抵抗
J. Sens. Actuator Networks Pub Date : 2022-07-13 DOI: 10.3390/jsan11030035
Callum Brocklehurst, Milena Radenkovic
{"title":"Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles","authors":"Callum Brocklehurst, Milena Radenkovic","doi":"10.3390/jsan11030035","DOIUrl":"https://doi.org/10.3390/jsan11030035","url":null,"abstract":"The increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous vehicle edge networks as opportunistic networks that bridge the gap between fully distributed vehicular networks based on short-range vehicle-to-vehicle communication and cellular-based infrastructure for centralized solutions. Experiments are conducted using opportunistic networking protocols to provide data to autonomous trams and buses in a smart city. Attacking vehicles enter the city aiming to disrupt the network to cause harm to the general public. In the experiments the number of vehicles and the attack length is altered to investigate the impact on the network and vehicles. Considering different measures of success as well as computation expense, measurements are taken from all nodes in the network across different lengths of attack. The data gathered from each node allow exploration into how different attacks impact metrics including the delivery probability of a message, the time taken to deliver and the computation expense to each node. The novel multidimensional analysis including geospatial elements provides evidence that the state-of-the-art MaxProp algorithm outperforms the benchmark as well as other, more complex routing protocols in most of the categories. Upon the introduction of attacking nodes however, PRoPHET provides the most reliable delivery probability when under attack. Two different attack methods (black and grey holes) are used to disrupt the flow of messages throughout the network and the more basic protocols show that they are less consistent. In some metrics, the PRoPHET algorithm performs better when under attack due to the benefit of reduced network traffic.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132033443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Trust-Influenced Smart Grid: A Survey and a Proposal 受信任影响的智能电网:调查与建议
J. Sens. Actuator Networks Pub Date : 2022-07-11 DOI: 10.3390/jsan11030034
K. Boakye-Boateng, A. Ghorbani, Arash Habibi Lashkari
{"title":"A Trust-Influenced Smart Grid: A Survey and a Proposal","authors":"K. Boakye-Boateng, A. Ghorbani, Arash Habibi Lashkari","doi":"10.3390/jsan11030034","DOIUrl":"https://doi.org/10.3390/jsan11030034","url":null,"abstract":"A compromised Smart Grid, or its components, can have cascading effects that can affect lives. This has led to numerous cybersecurity-centric studies focusing on the Smart Grid in research areas such as encryption, intrusion detection and prevention, privacy and trust. Even though trust is an essential component of cybersecurity research; it has not received considerable attention compared to the other areas within the context of Smart Grid. As of the time of this study, we observed that there has neither been a study assessing trust within the Smart Grid nor were there trust models that could detect malicious attacks within the substation. With these two gaps as our objectives, we began by presenting a mathematical formalization of trust within the context of Smart Grid devices. We then categorized the existing trust-based literature within the Smart Grid under the NIST conceptual domains and priority areas, multi-agent systems and the derived trust formalization. We then proposed a novel substation-based trust model and implemented a Modbus variation to detect final-phase attacks. The variation was tested against two publicly available Modbus datasets (EPM and ATENA H2020) under three kinds of tests, namely external, internal, and internal with IP-MAC blocking. The first test assumes that external substation adversaries remain so and the second test assumes all adversaries within the substation. The third test assumes the second test but blacklists any device that sends malicious requests. The tests were performed from a Modbus server’s point of view and a Modbus client’s point of view. Aside from detecting the attacks within the dataset, our model also revealed the behaviour of the attack datasets and their influence on the trust model components. Being able to detect all labelled attacks in one of the datasets also increased our confidence in the model in the detection of attacks in the other dataset. We also believe that variations of the model can be created for other OT-based protocols as well as extended to other critical infrastructures.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132913338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信