J. Sens. Actuator Networks最新文献

筛选
英文 中文
Blossom: Cluster-Based Routing for Preserving Privacy in Opportunistic Networks 开花:在机会主义网络中保护隐私的基于集群的路由
J. Sens. Actuator Networks Pub Date : 2022-11-16 DOI: 10.3390/jsan11040075
Benedikt Kluss, Samaneh Rashidibajgan, Thomas Hupperich
{"title":"Blossom: Cluster-Based Routing for Preserving Privacy in Opportunistic Networks","authors":"Benedikt Kluss, Samaneh Rashidibajgan, Thomas Hupperich","doi":"10.3390/jsan11040075","DOIUrl":"https://doi.org/10.3390/jsan11040075","url":null,"abstract":"Opportunistic networks are an enabler technology for typologies without centralized infrastructure. Portable devices, such as wearable and embedded mobile systems, send relay messages to the communication range devices. One of the most critical challenges is to find the optimal route in these networks while at the same time preserving privacy for the participants of the network. Addressing this challenge, we presented a novel routing algorithm based on device clusters, reducing the overall message load and increasing network performance. At the same time, possibly identifying information of network nodes is eliminated by cloaking to meet privacy requirements. We evaluated our routing algorithm in terms of efficiency and privacy in opportunistic networks of traditional and structured cities, i.e., Venice and San Francisco by comparing our approach against the PRoPHET, First Contact, and Epidemic routing algorithms. In the San Francisco and Venice scenarios, Blossom improves messages delivery probability and outperforms PRoPHET, First Contact, and Epidemic by 46%, 100%, and 160% and by 67%, 78%, and 204%, respectively. In addition, the dropped messages probability in Blossom decreased 83% compared to PRoPHET and Epidemic in San Francisco and 91% compared to PRoPHET and Epidemic in Venice. Due to the small number of messages generated, the network overhead in this algorithm is close to zero. The network overhead can be significantly reduced by clustering while maintaining a reliable message delivery.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124618909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open-Source Internet of Things Gateways for Building Automation Applications 面向楼宇自动化应用的开源物联网网关
J. Sens. Actuator Networks Pub Date : 2022-11-08 DOI: 10.3390/jsan11040074
M. Schraven, Kai Droste, C. G. C. Carducci, D. Müller, A. Monti
{"title":"Open-Source Internet of Things Gateways for Building Automation Applications","authors":"M. Schraven, Kai Droste, C. G. C. Carducci, D. Müller, A. Monti","doi":"10.3390/jsan11040074","DOIUrl":"https://doi.org/10.3390/jsan11040074","url":null,"abstract":"Due to its potential benefits in data transparency, maintenance, and optimization of operation, the Internet of Things (IoT) has recently emerged in the building automation system (BAS) domain. However, while various IoT devices have been developed, the integration into BAS remains a challenging task due to the variety of conventional interfaces used in existing BAS. From an objective point of view, integrating IoT connectivity on existing devices’ printed circuit boards (PCBs) would be the most efficient option in terms of cost and resources, but requires adaptation of product lines, and vendors would often couple this with their own services and without an option for customization. By contrast, the majority of research activities focus on developing alternative or additional measurement systems, rather than connecting with legacy system components. Furthermore, most research applications cover very simple and individual use-cases with a do-it-yourself character and limited applicability in industrial applications. In this study, we present a scalable, industrial-like embedded solution to connect to common interfaces in BAS applications and share all the hardware and software design as an open-source platform for public use, customization, and further enhancement. Moreover, a thorough measurement performance analysis was conducted, suggesting an acceptable trade-off among accuracy, flexibility, and costs, e.g., achieving a performance increase by over 75 and a cost reduction by roughly 34 compared to a previous design.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Performance on Wireless Sensors Network Using Multi-Channel Clustering Hierarchy 利用多通道聚类结构改进无线传感器网络性能
J. Sens. Actuator Networks Pub Date : 2022-11-02 DOI: 10.3390/jsan11040073
Robby Rizky, Mustafid, T. Mantoro
{"title":"Improved Performance on Wireless Sensors Network Using Multi-Channel Clustering Hierarchy","authors":"Robby Rizky, Mustafid, T. Mantoro","doi":"10.3390/jsan11040073","DOIUrl":"https://doi.org/10.3390/jsan11040073","url":null,"abstract":"Wireless sensor network is a network consisting of many sensor nodes that function to scan certain phenomena around it. WSN has quite a large problem in the form of delay and data loss which results in low WSN performance. This study aims to improve WSN performance by developing a cluster-based routing protocol. The cluster formation is carried out in several stages. The first is the formation of the cluster head which is the channel reference to be used by node members by means of probability calculations. The second determines the closest node using the Euclidean approach when looking for the closest member of the node to the cluster head. The third is determination of the node members by means of single linkage grouping by looking for proximity to CH. The performance of the proposed MCCH method is then tested and evaluated using QoS parameters. The results of this research evaluation use QoS parameters for testing the MCCH method, channel 1 throughput 508.165, channel 2 throughput 255.5661, channel 3 throughput 479.8289, channel 4 throughput 646.5618.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive Risk-Assessment and Decision-Making Framework for Increasing in-Vehicle Intelligence 提高车载智能的认知风险评估与决策框架
J. Sens. Actuator Networks Pub Date : 2022-10-31 DOI: 10.3390/jsan11040072
G. Dimitrakopoulos, E. Politi, Konstantina Karathanasopoulou, E. Panagiotopoulos, Theodore Zographos
{"title":"Cognitive Risk-Assessment and Decision-Making Framework for Increasing in-Vehicle Intelligence","authors":"G. Dimitrakopoulos, E. Politi, Konstantina Karathanasopoulou, E. Panagiotopoulos, Theodore Zographos","doi":"10.3390/jsan11040072","DOIUrl":"https://doi.org/10.3390/jsan11040072","url":null,"abstract":"The key challenge for future automated driving systems is the need to imitate the intelligence and ability of human drivers, both in terms of driving agility, as well as in their intuitive understanding of the surroundings and dynamics of the vehicle. In this paper a model that utilizes data from different sources coming from vehicular sensor networks is presented. The data is processed in an intelligent manner while integrating knowledge and experience associated with potential and any decision. Moreover, the appropriate directives for the safety of the vehicle as well as alerts in case of upcoming emergencies are provided to the driver. The innovation lies in attributing human-like cognitive capabilities—non-causal reasoning, predictive decision-making, and learning—integrated into the processes for perception and decision-making in safety-critical autonomous use cases. The overall approach is described and formulated, while a heuristic function is proposed for assisting the driver in reaching the appropriate decisions. Comprehensive results from our experiments showcase its efficiency, simplicity, and scalability.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124260813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm and Indirect Trust for IIoT Systems 基于Viterbi算法和间接信任的区块链入侵检测系统
J. Sens. Actuator Networks Pub Date : 2022-10-27 DOI: 10.3390/jsan11040071
Geetanjali Rathee, Kerrache Chaker Abdelaziz, M. Ferrag
{"title":"A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm and Indirect Trust for IIoT Systems","authors":"Geetanjali Rathee, Kerrache Chaker Abdelaziz, M. Ferrag","doi":"10.3390/jsan11040071","DOIUrl":"https://doi.org/10.3390/jsan11040071","url":null,"abstract":"The industrial internet of things (IIoT) is considered a new paradigm in the era of wireless communication for performing automatic communication in the network. However, automatic computation and data recognition may invite several security and privacy threats into the system during the sharing of information. There exist several intrusion detection systems (IDS) that have been proposed by several researchers. However, none of them is able to maintain accuracy while identifying the threats and give a high false-positive rate in the network. Further, the existing IDS are not able to recognize the new patterns or anomalies in the network. Therefore, it is necessary to propose a new IDS. The aim of this paper is to propose an IDS using the Viterbi algorithm, indirect trust, and blockchain mechanism for IIoT to ensure the required security levels. The Viterbi algorithm and indirect trust mechanism are used to measure the probability of malicious activities occurring in the network while generating, recording, and shipping products in an IIoT environment. Further, the transparency of the system is maintained by integrating blockchain mechanisms with Viterbi and indirect methods. The proposed framework is validated and analyzed against various security measures by comparing it with the existing approaches.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131711227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Survey on Integrated Sensing, Communication, and Computing Networks for Smart Oceans 面向智能海洋的集成传感、通信和计算网络研究综述
J. Sens. Actuator Networks Pub Date : 2022-10-26 DOI: 10.3390/jsan11040070
Minghui Dai, Yang Li, Peichun Li, Yuan Wu, L. Qian, Bin Lin, Zhou Su
{"title":"A Survey on Integrated Sensing, Communication, and Computing Networks for Smart Oceans","authors":"Minghui Dai, Yang Li, Peichun Li, Yuan Wu, L. Qian, Bin Lin, Zhou Su","doi":"10.3390/jsan11040070","DOIUrl":"https://doi.org/10.3390/jsan11040070","url":null,"abstract":"The smart ocean has been regarded as an integrated sensing, communication, and computing ecosystem developed for connecting marine objects in surface and underwater environments. The development of the smart ocean is expected to support a variety of marine applications and services such as resource exploration, marine disaster rescuing, and environment monitoring. However, the complex and dynamic marine environments and the limited network resources raise new challenges in marine communication and computing, especially for these computing-intensive and delay-sensitive tasks. Recently, the space–air–ground–sea integrated networks have been envisioned as a promising network framework to enhance the communication and computing performance. In this paper, we conduct a comprehensive survey on the integrated sensing, communication, and computing networks (ISCCNs) for smart oceans based on the collaboration of space–air–ground–sea networks from four domains (i.e., space layer, aerial layer, sea surface layer, and underwater layer), and five aspects (i.e., sensing-related, communication-related, computation-related, security-related, and application-related). Specifically, we provide the key technologies for the ISCCNs in smart oceans, and introduce the state-of-the-art marine sensing, communication, and computing paradigms. The emerging challenges with the potential solutions of the ISCCNs for smart oceans are illustrated to enable the intelligent services. Moreover, the new applications for the ISCCNs in smart oceans are discussed, and potential research directions in smart oceans are provided for future works.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of a Multisensor-Based Non-Contact Anthropometric System for Early Stunting Detection 多传感器非接触式发育不良早期检测人体测量系统的研制
J. Sens. Actuator Networks Pub Date : 2022-10-24 DOI: 10.3390/jsan11040069
U. Umiatin, W. Indrasari, T. Taryudi, A. F. Dendi
{"title":"Development of a Multisensor-Based Non-Contact Anthropometric System for Early Stunting Detection","authors":"U. Umiatin, W. Indrasari, T. Taryudi, A. F. Dendi","doi":"10.3390/jsan11040069","DOIUrl":"https://doi.org/10.3390/jsan11040069","url":null,"abstract":"The stunting prevalence in Indonesia is still above the WHO minimum standard of 20%. An important aspect of early detection of stunting is to monitor the nutritional status of children under five periodically. In daily practice, nutritional status is obtained through anthropometry. The main anthropometric parameters are body mass, height, and head circumference. This research entails the development of an integrated and non-contact anthropometric system for measuring body mass, height, and head circumference for children aged 12–60 months. This non-contact method can prevent the transmission of infectious diseases, especially during the COVID-19 pandemic. For the development of a prototype, three types of sensors are used: load, proximity, and temperature sensor. In addition, a load cell sensor is used to measure body mass, an infrared sensor to measure height and head circumference, ultrasonic sensor to measure height. In addition, the anthropometric system developed is equipped with an MLX90614-DCI sensor to measure temperature, a thermal printer to print measurement results, and sound output. The results of the tests showed that this anthropometric system had an average error less than 5%. Therefore, it is suitable to measure the body mass, height, and head circumference of children under five.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131320964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Definitive Guide to Actual Sensor Network Deployments in Research Studies from 2013-2017: A Systematic Review 2013-2017年研究中实际传感器网络部署的权威指南:系统综述
J. Sens. Actuator Networks Pub Date : 2022-10-21 DOI: 10.3390/jsan11040068
J. Judvaitis, V. Abolins, A. Mednis, Rihards Balass, K. Nesenbergs
{"title":"The Definitive Guide to Actual Sensor Network Deployments in Research Studies from 2013-2017: A Systematic Review","authors":"J. Judvaitis, V. Abolins, A. Mednis, Rihards Balass, K. Nesenbergs","doi":"10.3390/jsan11040068","DOIUrl":"https://doi.org/10.3390/jsan11040068","url":null,"abstract":"The research community has been working on sensor networks for more that seven decades and altogether more than a million research articles on sensor networks have been published, with this number growing every day. In this article, we try to provide a thorough and complete systematic review on the sensor network field resulting from representative subset of more than 3000 articles which include actual sensor network deployments. After a thorough analysis of these data, we provide a definitive overview of the trends in sensor network deployment described in published research articles.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121116828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless Body Area Network (WBAN): A Survey on Architecture, Technologies, Energy Consumption, and Security Challenges 无线体域网络(WBAN):架构、技术、能源消耗和安全挑战的调查
J. Sens. Actuator Networks Pub Date : 2022-10-18 DOI: 10.3390/jsan11040067
Mohammad Yaghoubi, K. Ahmed, Yuan Miao
{"title":"Wireless Body Area Network (WBAN): A Survey on Architecture, Technologies, Energy Consumption, and Security Challenges","authors":"Mohammad Yaghoubi, K. Ahmed, Yuan Miao","doi":"10.3390/jsan11040067","DOIUrl":"https://doi.org/10.3390/jsan11040067","url":null,"abstract":"Wireless body area networks (WBANs) are a new advance utilized in recent years to increase the quality of human life by monitoring the conditions of patients inside and outside hospitals, the activities of athletes, military applications, and multimedia. WBANs consist of intelligent micro- or nano-sensors capable of processing and sending information to the base station (BS). Sensors embedded in the bodies of individuals can enable vital information exchange over wireless communication. Network forming of these sensors envisages long-term medical care without restricting patients’ normal daily activities as part of diagnosing or caring for a patient with a chronic illness or monitoring the patient after surgery to manage emergencies. This paper reviews WBAN, its security challenges, body sensor network architecture and functions, and communication technologies. The work reported in this paper investigates a significant security-level challenge existing in WBAN. Lastly, it highlights various mechanisms for increasing security and decreasing energy consumption.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131696980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques 一种基于LSB、Lah变换和混沌技术的彩色图像文本隐藏轻量级混合方案
J. Sens. Actuator Networks Pub Date : 2022-10-17 DOI: 10.3390/jsan11040066
I. Q. Abduljaleel, Z. Abduljabbar, M. A. A. Sibahee, M. J. J. Ghrabat, Junchao Ma, V. O. Nyangaresi
{"title":"A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques","authors":"I. Q. Abduljaleel, Z. Abduljabbar, M. A. A. Sibahee, M. J. J. Ghrabat, Junchao Ma, V. O. Nyangaresi","doi":"10.3390/jsan11040066","DOIUrl":"https://doi.org/10.3390/jsan11040066","url":null,"abstract":"Data security can involve embedding hidden images, text, audio, or video files within other media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a high risk of security breaches or large computational costs, however. The method proposed in this work incorporates low-complexity encryption and steganography mechanisms to enhance security during transmission while lowering computational complexity. In message encryption, it is recommended that text file data slicing in binary representation, to achieve different lengths of string, be conducted before text file data masking based on the lightweight Lucas series and mod function to ensure the retrieval of text messages is impossible. The steganography algorithm starts by generating a random key stream using a hybrid of two low-complexity chaotic maps, the Tent map and the Ikeda map. By finding a position vector parallel to the input image vector, these keys are used based on the previously generated position vector to randomly select input image data and create four vectors that can be later used as input for the Lah transform. In this paper, we present an approach for hiding encrypted text files using LSB colour image steganography by applying a low-complexity XOR operation to the most significant bits in 24-bit colour cover images. It is necessary to perform inverse Lah transformation to recover the image pixels and ensure that invisible data cannot be retrieved in a particular sequence. Evaluation of the quality of the resulting stego-images and comparison with other ways of performing encryption and message concealment shows that the stego-image has a higher PSNR, a lower MSE, and an SSIM value close to one, illustrating the suitability of the proposed method. It is also considered lightweight in terms of having lower computational overhead.","PeriodicalId":288992,"journal":{"name":"J. Sens. Actuator Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134165888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信