J. Sens. Actuator Networks最新文献

筛选
英文 中文
Telemedicine: A Survey of Telecommunication Technologies, Developments, and Challenges 远程医疗:电信技术,发展和挑战的调查
J. Sens. Actuator Networks Pub Date : 2023-03-02 DOI: 10.3390/jsan12020020
C. Alenoghena, H. Ohize, A. Adejo, A. Onumanyi, Emmanuel Esebanme Ohihoin, Aliyu Idris Balarabe, S. Okoh, Ezra Kolo, Benjamin Alenoghena
{"title":"Telemedicine: A Survey of Telecommunication Technologies, Developments, and Challenges","authors":"C. Alenoghena, H. Ohize, A. Adejo, A. Onumanyi, Emmanuel Esebanme Ohihoin, Aliyu Idris Balarabe, S. Okoh, Ezra Kolo, Benjamin Alenoghena","doi":"10.3390/jsan12020020","DOIUrl":"https://doi.org/10.3390/jsan12020020","url":null,"abstract":"The emergence of the COVID-19 pandemic has increased research outputs in telemedicine over the last couple of years. One solution to the COVID-19 pandemic as revealed in literature is to leverage telemedicine for accessing health care remotely. In this survey paper, we review several articles on eHealth and Telemedicine with emphasis on the articles’ focus area, including wireless technologies and architectures in eHealth, communications protocols, Quality of Service, and Experience Standards, among other considerations. In addition, we provide an overview of telemedicine for new readers. This survey reviews several telecommunications technologies currently being proposed along with their standards and challenges. In general, an encompassing survey on the developments in telemedicine technology, standards, and protocols is presented while acquainting researchers with several open issues. Special mention of the state-of-the-art specialist application areas are presented. We conclude the survey paper by presenting important research challenges and potential future directions as they pertain to telemedicine technology.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130217507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Editorial: Edge Computing for the Internet of Things 社论:物联网的边缘计算
J. Sens. Actuator Networks Pub Date : 2023-02-15 DOI: 10.3390/jsan12010017
Haoran Chi
{"title":"Editorial: Edge Computing for the Internet of Things","authors":"Haoran Chi","doi":"10.3390/jsan12010017","DOIUrl":"https://doi.org/10.3390/jsan12010017","url":null,"abstract":"Fifth-generation mobile networks (5G) promise higher flexibility compared with 4G, while also fulfilling the service-level agreement (SLA) [...]","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121981401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Distribution of D2D Communications in Case of Energy Harvesting Capability over κ-μ Shadowed Fading Conditions κ-μ阴影衰落条件下能量收集能力的D2D通信功率分布
J. Sens. Actuator Networks Pub Date : 2023-02-10 DOI: 10.3390/jsan12010016
Adil Boumaalif, O. Zytoune, H. El Fadil, Rachid Saadane
{"title":"Power Distribution of D2D Communications in Case of Energy Harvesting Capability over κ-μ Shadowed Fading Conditions","authors":"Adil Boumaalif, O. Zytoune, H. El Fadil, Rachid Saadane","doi":"10.3390/jsan12010016","DOIUrl":"https://doi.org/10.3390/jsan12010016","url":null,"abstract":"Device-to-device (D2D) communication will play a meaningful role in future wireless networks and standards, since it ensures ultra-low latency for communication among near devices. D2D transmissions can take place together with the actual cellular communications, so handling the interference is very important. In this paper, we consider a D2D couple operating in the uplink band in an underlaid mode, and, using the stochastic geometry, we propose a cumulative distribution function (CDF) of the D2D transmit power under κ-μ shadowed fading. Then, we derive some special cases for some fading channels, such as Nakagami and Rayleigh environments, and for the interference-limited scenario. Moreover, we propose a radio frequency energy harvesting, where the D2D users can harvests ambient RF energy from cellular users. Finally, the analytical results are validated via simulation.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116522305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Decentralized Reputation System from Blockchain and Secure Multiparty Computation 基于区块链和安全多方计算的动态去中心化信誉系统
J. Sens. Actuator Networks Pub Date : 2023-02-07 DOI: 10.3390/jsan12010014
Khalid Mrabet, Faissal El Bouanani, H. Ben-Azza
{"title":"Dynamic Decentralized Reputation System from Blockchain and Secure Multiparty Computation","authors":"Khalid Mrabet, Faissal El Bouanani, H. Ben-Azza","doi":"10.3390/jsan12010014","DOIUrl":"https://doi.org/10.3390/jsan12010014","url":null,"abstract":"In decentralized environments, such as mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs), traditional reputation management systems are not viable due to their dependence on a central authority that is both accessible and trustworthy for all participants. This is particularly challenging in light of the dynamic nature of these networks. To overcome these limitations, our proposed solution utilizes blockchain technology to maintain global reputation information while remaining fully decentralized, and to secure multiparty computation to ensure privacy. Our system is not limited to specific settings, such as buyer/seller or provider/client scenarios, where only a subset of the network are raters while the others are ratees. Instead, it allows all nodes to participate in both rating and being rated. In terms of security, the system maintains feedback privacy in the semi-honest model, even in the presence of up to n−2 dishonest parties, while requiring only O(n) messages and having an O(n) computation overhead. Furthermore, the adopted techniques enable the system to achieve unique characteristics such as accessibility, consistency, and verifiability, as supported by the security analysis provided.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127551978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Trusted Federated Learning: Key Technologies and Challenges 构建可信的联邦学习:关键技术和挑战
J. Sens. Actuator Networks Pub Date : 2023-02-06 DOI: 10.3390/jsan12010013
D. Chen, Xiaohong Jiang, Hong Zhong, Jie Cui
{"title":"Building Trusted Federated Learning: Key Technologies and Challenges","authors":"D. Chen, Xiaohong Jiang, Hong Zhong, Jie Cui","doi":"10.3390/jsan12010013","DOIUrl":"https://doi.org/10.3390/jsan12010013","url":null,"abstract":"Federated learning (FL) provides convenience for cross-domain machine learning applications and has been widely studied. However, the original FL is still vulnerable to poisoning and inference attacks, which will hinder the landing application of FL. Therefore, it is essential to design a trustworthy federation learning (TFL) to eliminate users’ anxiety. In this paper, we aim to provide a well-researched picture of the security and privacy issues in FL that can bridge the gap to TFL. Firstly, we define the desired goals and critical requirements of TFL, observe the FL model from the perspective of the adversaries and extrapolate the roles and capabilities of potential adversaries backward. Subsequently, we summarize the current mainstream attack and defense means and analyze the characteristics of the different methods. Based on a priori knowledge, we propose directions for realizing the future of TFL that deserve attention.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Event-Driven Architectural Model for Integrating Heterogeneous Data and Developing Smart City Applications 集成异构数据和开发智慧城市应用的事件驱动体系结构模型
J. Sens. Actuator Networks Pub Date : 2023-02-01 DOI: 10.3390/jsan12010012
Jurairat Phuttharak, S. Loke
{"title":"An Event-Driven Architectural Model for Integrating Heterogeneous Data and Developing Smart City Applications","authors":"Jurairat Phuttharak, S. Loke","doi":"10.3390/jsan12010012","DOIUrl":"https://doi.org/10.3390/jsan12010012","url":null,"abstract":"Currently, many governments are gearing up to promote the development of smart cities in their countries. A smart city is an urban area using different types of sensors to collect data, which will then be used to manage assets and resources efficiently. Through smart technology, the quality of living and performance of urban services are enhanced. Recent works addressed a set of platforms aimed to support the development of smart city applications. It seems that most of them involved dealing with collecting, managing, analyzing, and correlating data to extract new information useful to a city, but they do not integrate a diversified set of services and react to events on the fly. Moreover, the application development facilities provided by them seem to be limited and might even increase the complexity of this task. We propose an event-based architecture with components that meet important requirements for smart city platforms, supporting increased demand for scalability, flexibility, and heterogeneity in event processing. We implement such architecture and data representation models, handling different data formats, and supporting a semantics-based data model. Finally, we discuss the effectiveness of a S mart Event-based Middleware (SEMi) and present empirical results regarding a performance evaluation of SEMi.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125072834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things 面向物联网安全部署的高效无证书前向安全签名方案
J. Sens. Actuator Networks Pub Date : 2023-01-23 DOI: 10.3390/jsan12010010
Tahir Ali Shah, Insaf Ullah, Muhammad Asghar Khan, P. Lorenz, Nisreen Innab
{"title":"An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things","authors":"Tahir Ali Shah, Insaf Ullah, Muhammad Asghar Khan, P. Lorenz, Nisreen Innab","doi":"10.3390/jsan12010010","DOIUrl":"https://doi.org/10.3390/jsan12010010","url":null,"abstract":"As an extension of the wired network, the use of the wireless communication network has considerably boosted users’ productivity at work and in their daily lives. The most notable aspect of the wireless communication network is that it overcomes the constraints of the wired network, reduces the amount of cost spent on wire maintenance, and distributes itself in a manner that is both more extensive and flexible. Combining wireless communication with the Internet of Things (IoT) can be used in several applications, including smart cities, smart traffic, smart farming, smart drones, etc. However, when exchanging data, wireless communication networks use an open network, allowing unauthorized users to engage in communication that is seriously destructive. Therefore, authentication through a digital signature will be the best solution to tackle such problems. Several digital signatures are contributing to the authentication process in a wireless communication network; however, they are suffering from several problems, including forward security, key escrow, certificate management, revocations, and high computational and communication costs, respectively. Keeping in view the above problems, in this paper we proposed an efficient certificateless forward-secure signature scheme for secure deployments in wireless communication networks. The security analysis of the proposed scheme is carried out using the random oracle model (ROM), which shows that it is unforgeable against type 1 and type 2 adversaries. Moreover, the computational and communication cost analyses are carried out by using major operations, major operations cost in milliseconds, and extra communication bits. The comparative analysis with the existing scheme shows that the proposed scheme reduces the computational cost from 19.23% to 97.54% and the communication overhead from 11.90% to 83.48%, which means that the proposed scheme is efficient, faster, and more secure for communication in the wireless communication network.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127225847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Loitering Detection Using Spatial-Temporal Information for Intelligent Surveillance Systems on a Vision Sensor 基于时空信息的视觉传感器智能监控系统游荡检测
J. Sens. Actuator Networks Pub Date : 2023-01-22 DOI: 10.3390/jsan12010009
Wahyono, A. Harjoko, Andi Dharmawan, Faisal Dharma Adhinata, Gamma Kosala, K. Jo
{"title":"Loitering Detection Using Spatial-Temporal Information for Intelligent Surveillance Systems on a Vision Sensor","authors":"Wahyono, A. Harjoko, Andi Dharmawan, Faisal Dharma Adhinata, Gamma Kosala, K. Jo","doi":"10.3390/jsan12010009","DOIUrl":"https://doi.org/10.3390/jsan12010009","url":null,"abstract":"As one of the essential modules in intelligent surveillance systems, loitering detection plays an important role in reducing theft incidents by analyzing human behavior. This paper introduces a novel strategy for detecting the loitering activities of humans in the monitoring area for an intelligent surveillance system based on a vision sensor. The proposed approach combines spatial and temporal information in the feature extraction stage to decide whether the human movement can be regarded as loitering. This movement has been previously tracked using human detectors and particle filter tracking. The proposed method has been evaluated using our dataset consisting of 20 videos. The experimental results show that the proposed method could achieve a relatively good accuracy of 85% when utilizing the random forest classifier in the decision stage. Thus, it could be integrated as one of the modules in an intelligent surveillance system.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133561990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Practical Challenges of Attack Detection in Microgrids Using Machine Learning 基于机器学习的微电网攻击检测的实际挑战
J. Sens. Actuator Networks Pub Date : 2023-01-18 DOI: 10.3390/jsan12010007
Daniel T. Ramotsoela, G. Hancke, A. Abu-Mahfouz
{"title":"Practical Challenges of Attack Detection in Microgrids Using Machine Learning","authors":"Daniel T. Ramotsoela, G. Hancke, A. Abu-Mahfouz","doi":"10.3390/jsan12010007","DOIUrl":"https://doi.org/10.3390/jsan12010007","url":null,"abstract":"The move towards renewable energy and technological advancements in the generation, distribution and transmission of electricity have increased the popularity of microgrids. The popularity of these decentralised applications has coincided with advancements in the field of telecommunications allowing for the efficient implementation of these applications. This convenience has, however, also coincided with an increase in the attack surface of these systems, resulting in an increase in the number of cyber-attacks against them. Preventative network security mechanisms alone are not enough to protect these systems as a critical design feature is system resilience, so intrusion detection and prevention system are required. The practical consideration for the implementation of the proposed schemes in practice is, however, neglected in the literature. This paper attempts to address this by generalising these considerations and using the lessons learned from water distribution systems as a case study. It was found that the considerations are similar irrespective of the application environment even though context-specific information is a requirement for effective deployment.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Editorial of the MDPI JSAN Special Issue on Wireless Technologies Applied to Connected and Automated Vehicles MDPI JSAN专刊“应用于联网和自动驾驶车辆的无线技术”社论
J. Sens. Actuator Networks Pub Date : 2023-01-18 DOI: 10.3390/jsan12010006
A. Bazzi
{"title":"Editorial of the MDPI JSAN Special Issue on Wireless Technologies Applied to Connected and Automated Vehicles","authors":"A. Bazzi","doi":"10.3390/jsan12010006","DOIUrl":"https://doi.org/10.3390/jsan12010006","url":null,"abstract":"Connectivity and automation are two aspects that, together, will revolutionize the transport system [...]","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116274395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信