{"title":"ETXRE: Energy and delay efficient routing metric for RPL protocol and wireless sensor networks","authors":"Aiman Nait Abbou, Jukka Manner","doi":"10.1049/wss2.12070","DOIUrl":"10.1049/wss2.12070","url":null,"abstract":"<p>Internet of Things is an emerging paradigm based on interconnecting physical and virtual objects with each other and to the Internet. Most connected things fall into the category of constrained devices, with restricted resources (processing power, memory, and energy). These low-power and lossy networks (LLNs) are known for their instability, high loss rates and low data rates, which makes routing one of the most challenging problems in low-cost communications. A routing protocol for low-power and lossy networks (RPL) is a proactive dynamic routing protocol based on IPv6. This protocol defines an objective function (OF) that utilises a set of metrics to select the best possible path to the destination. Minimum rank hysteresis objective function (MRHOF) and objective function zero (OF0) are the most basic OFs, where the first one selects the path to the sink based on the expected transmission count (ETX) metric, and OF0 is based on the hop count (HC). These two metrics prioritise either brute performance (i.e. ETX) or simplicity (i.e. HC). Therefore, using a single metric with an OF can either limit the performance or have an inefficient impact on load management and energy consumption. To overcome these challenges, a routing metric based on MRHOF OF which takes into consideration the link-based routing metric (i.e. ETX) and node-based metric (i.e. remaining energy) for route selection is provided. Expected transmission count remaining energy (ETXRE) is evaluated through 36 scenarios with different parameters. Preliminary results show that ETXRE outperforms ETX and RE in terms of end-to-end delay by an average of at least 17%, packet delay by 13% and consumes 10% less energy.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 6","pages":"235-246"},"PeriodicalIF":1.9,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12070","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138596665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing smart home against sinkhole attack using weight-based IDS placement strategy","authors":"Md. Shafiqul Islam, Muntaha Tasnim, Upama Kabir, Mosarrat Jahan","doi":"10.1049/wss2.12069","DOIUrl":"https://doi.org/10.1049/wss2.12069","url":null,"abstract":"<p>Extensive use of the Internet of Things (IoT) in smart homes makes users' lives easy and comfortable. Yet, these resource-constrained devices are prone to manifold security attacks. The sinkhole attack is one of the most destructive attacks that disrupt smart home operations, causing user dissatisfaction. Existing intrusion detection systems (IDS) cannot handle sinkhole attacks competently as they (i) do not consider the node capacity for being an IDS agent, leading to a low attack detection ratio, (ii) do not examine the sinkhole node's role when mitigating attacks, causing remaining network disconnection with the root node and (iii) do not consider replacing energy-exhausted IDS nodes, causing connectivity loss of partial network with the root. This paper addresses these shortcomings and adequately presents a mechanism to handle sinkhole attacks. A formulation for assigning weights to network nodes based on their resources is proposed here. An IDS placement strategy is introduced to place IDS agents on particular resourceful nodes that extend network lifetime and enhance attack detection capability. We present a novel attack detection and mitigation strategy by ensuring network connectivity. The proposed mechanism achieves 95% attack detection accuracy and reduces false negative rates by 25% and energy consumption reasonably compared to the state-of-the-art.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 6","pages":"216-234"},"PeriodicalIF":1.9,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12069","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138634358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence-based secure ad-hoc on-demand distance vector algorithm","authors":"Anita R. Patil, Gautam M. Borkar","doi":"10.1049/wss2.12068","DOIUrl":"10.1049/wss2.12068","url":null,"abstract":"<p>In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The existing secure routing protocol and their security concerns are analysed in this work. The suggested Swarm Intelligence-based Secure Ad-hoc On-demand Distance Vector (SIS-AODV) algorithm offers security by applying a secret key and hash mechanism to prevent the involvement of malicious nodes in routing operations. A secure routing system of MANET guards against internal and external network attacks. The proposed SIS-AODV algorithm consists of two sections: the secret key value generated by applying Elliptical Curve Cryptography (ECC)-based algorithm and the PRESENT algorithm to encrypt the data packets. Besides, authentication and non-repudiation are applied using the H-PRESENT 128 algorithm. The PRESENT algorithm and H-PRESENT 128 hash function require less computational power. Centralised management is optional in this scheme, so overhead decreases. The second section of SIS-AODV consists of Ant Colony Grey Wolf Optimization over the AODV algorithm to improve network performance while implementing a security algorithm over MANET. Analysis results show maximum performance with a packet delivery ratio of 98% and throughput of 85%. In addition, end-to-end delay is reduced by up to 25%, and routing overhead decreases by up to 20%. Keywords: AODV, Elliptical Curve, PRESENT, H-PRESENT, Euclidean Algorithm, ACO, GWO, Blackhole attack.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 6","pages":"201-215"},"PeriodicalIF":1.9,"publicationDate":"2023-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12068","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135766159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Closed-form solution for scaling a wireless acoustic sensor network","authors":"Kashyap Patel, Anton Kovalyov, Issa Panahi","doi":"10.1049/wss2.12067","DOIUrl":"https://doi.org/10.1049/wss2.12067","url":null,"abstract":"<p>A closed-form solution for localising and synchronising an acoustic sensor node with respect to a Wireless Acoustic Sensor Network (WASN) is presented. The aim is to allow efficient scaling of a WASN by individually calibrating newly joined sensor nodes instead of recalibrating the entire array. A key contribution is that the sensor to be calibrated does not need to include a built-in emitter. The proposed method uses signals emitted from spatially distributed sources to compute time difference of arrival (TDOA) measurements between the existing WASN and a new sensor. The problem is then modelled as a set of multivariate non-linear TDOA equations. Through a simple transformation, the non-linear TDOA equations are converted into a system of linear equations. Then, weighted least squares is applied to find an accurate estimate of the calibration parameters. Signal sources can either be known emitters within the existing WASN or arbitrary sources in the environment, thus allowing for flexible applicability in both active and passive calibration scenarios. Simulation results under various conditions show high joint localisation and synchronisation performance, often compared to the Cramér-Rao lower bound.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 5","pages":"190-200"},"PeriodicalIF":1.9,"publicationDate":"2023-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12067","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50152170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jose-Manuel Martinez-Caro, Igor Tasic, Maria-Dolores Cano
{"title":"A novel system to control and forecast QoX performance in IoT-based monitoring platforms","authors":"Jose-Manuel Martinez-Caro, Igor Tasic, Maria-Dolores Cano","doi":"10.1049/wss2.12066","DOIUrl":"https://doi.org/10.1049/wss2.12066","url":null,"abstract":"<p>Communication architectures based on the Internet of Things (IoT) are increasingly frequent. Commonly, these solutions are used to carry out control and monitoring activities. It is easy to find cases for manufacturing, prediction maintenance, Smart Cities, etc., where sensors are deployed to capture data that is sent to the cloud through edge devices or gateways. Then that data is processed to provide useful information and perform additional actions if required. As crucial as deploying these monitoring solutions is to verify their operation. In this article, we propose a novel warning method to monitor the performance of IoT-based systems. The proposal is based on a holistic quality model called Quality of X (QoX). QoX refers to the use of a variety of metrics to measure system performance at different quality dimensions. These quality dimensions are data (Quality of Data, QoD), information (Quality of Information, QoI), users' experience (Quality of user Experience, QoE), and cost (Quality Cost, QC). In addition to showing the IoT system performance in terms of QoX in real-time, our proposal includes (i) a forecasting model for independent estimation of QoX applying Deep Learning (DL), specifically using a Long Short-Term Memory (LSTM) and time series, and (ii) the warning system. In light of our results, our proposal shows a better capacity to forecast quality drops in the IoT-based monitoring system than other solutions from the related literature.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 5","pages":"178-189"},"PeriodicalIF":1.9,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12066","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50132936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fahd Abuhoureyah, Wong Yan Chiew, Ahmad Sadhiqin Bin Mohd Isira, Mohammed Al-Andoli
{"title":"Free device location independent WiFi-based localisation using received signal strength indicator and channel state information","authors":"Fahd Abuhoureyah, Wong Yan Chiew, Ahmad Sadhiqin Bin Mohd Isira, Mohammed Al-Andoli","doi":"10.1049/wss2.12065","DOIUrl":"10.1049/wss2.12065","url":null,"abstract":"<p>The trajectory localisation of human activities using signal analytics has become a reality due to the widespread use of advanced signal processing systems. Device-free localisation using WiFi devices is prevalent, and the received signal strength indicator (RSSI) and channel state information (CSI) signals offer additional benefits. However, radio frequency (RF) localisation is highly dependent on the environment, so updating fingerprint data is necessary by changing the environment. This work presents Fine-grained Indoor Detection and Angular Radar for recognising and locating humans using a multipath trajectory reflections system that does not require training. It estimates location using a probabilistic approach that considers changes in CSI and RSSI across multiple nodes, generating an informative dataset that reflects the current trajectory and status of the location. The presented method extracts data from clustered Raspberry Pi 4B and Nexmon. The method exhibits a versatile real-time location-tracking solution by utilising the distinctive properties of RF signals. This technology has significant implications for various applications, including human medical monitoring, gaming, smart cities, and optimising building layouts to improve efficiency. The model demonstrates location-independent localisation with up to 80% accuracy in mapping trajectories at any location. The findings indicate that the proposed model is effective and reliable for indoor localisation and activity tracking, making it a promising solution for implementation in real-world environments.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 5","pages":"163-177"},"PeriodicalIF":1.9,"publicationDate":"2023-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12065","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46987491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Majid Hussain, Ahmad Bilal, Muhammad Faheem, Muhammad Anwar, Muhammad Sultan Zia
{"title":"A conditioned reflex action embedded associative context learning-based energy efficient paradigm in smart city milieu","authors":"Majid Hussain, Ahmad Bilal, Muhammad Faheem, Muhammad Anwar, Muhammad Sultan Zia","doi":"10.1049/wss2.12064","DOIUrl":"https://doi.org/10.1049/wss2.12064","url":null,"abstract":"<p>An intelligent video surveillance system is crucial to enhance public safety, crime prevention, traffic, and crowd management in a smart city milieu. Situational awareness is an essential aspect of these surveillance systems and it is inferred through underlying context aware frameworks. However, these systems may not possess the ability to proactively disseminate the real-time context among its sensor nodes. Moreover, in the specific conditions of occurrence of related or repeated events, these systems may also perform inefficiently through afresh context processing and disseminate cycles, without learning from the relevant context that has already been occurred and processed by the system. It leads to deteriorated performance, especially delay in reaction, overwhelmed processing, and energy expenditures. Therefore, to counter such issues, this research work proposes an energy efficient situational aware framework deployed in visual sensors network that is incorporated with context associative learning. System observes currently occurring context at each instance of an event. Overtime, context is refined and stored in context database. Such mechanism empowers the system to learn from previous experiences and develop relationship among the subsequent events that is embedded through this associative (adaptive) learning. Eventually, each event is processed through intelligent resource allocation, supported through mechanism of context learning that further illustrates the independent functions of reduced processing and improved (rapid) decision making resulting in evolution of energy efficient computing paradigm. Ultimately, the capability of learned reflex-action is induced through introspectively evolved context of the system in entirety and against specific condition of recurred situation depicting minimum energy expenditure.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 4","pages":"151-162"},"PeriodicalIF":1.9,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12064","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khondoker Ziaul Islam, David Murray, Dean Diepeveen, Michael G. K. Jones, Ferdous Sohel
{"title":"Machine learning-based LoRa localisation using multiple received signal features","authors":"Khondoker Ziaul Islam, David Murray, Dean Diepeveen, Michael G. K. Jones, Ferdous Sohel","doi":"10.1049/wss2.12063","DOIUrl":"https://doi.org/10.1049/wss2.12063","url":null,"abstract":"<p>Low-power localisation systems are crucial for machine-to-machine communication technologies. This article investigates LoRa technology for localisation using multiple features of the received signal, such as Received Signal Strength Indicator (RSSI), Spreading Factors (SF), and Signal to Noise Ratio (SNR). A novel range-based technique to estimate the distance of a target node from a LoRa gateway using machine-learning models that incorporates SF, SNR, and RSSI to train the models is proposed. A modified trilateration approach is then used to localise the target node from three gateways. Our experiment used three LoRaWAN gateways and two sensor nodes, on a sports oval with an approximate area coverage of 30,000 square metres. The authors also used a public LoRaWAN dataset to build a model test the proposed method and compare both range-based distance mapping with trilateration and fingerprint-based direct location estimation techniques. Our method achieved an average distance error of 43.97 m on our experimental dataset. The results show that the combination of RSSI, SNR, and SF-based distance mapping provides ∼10% improvement on ranging accuracy and 26.58% higher accuracy for trilateration-based localisation when compared with just using RSSI. Our method also achieved 50% superior localisation accuracy with fingerprint-based direct location estimation approaches.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 4","pages":"133-150"},"PeriodicalIF":1.9,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12063","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50151047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient multipath clustering with load balancing routing protocol for wireless multimedia sensor networks","authors":"Madyen Mohammad Saleem, Salah Abdulghani Alabady","doi":"10.1049/wss2.12061","DOIUrl":"https://doi.org/10.1049/wss2.12061","url":null,"abstract":"<p>Wireless multimedia sensor networks (WMSNs) has the capability of collecting scalar information, as well as multi-media events like moving object tracking and traffic fatalities. Because energy in WMSNs is a constrained resource, several researchers offered cluster routing approaches, and most protocols generally do not offer an average resource usage of the network that is balanced and minimised. To address this issue, this paper proposes an Energy-Efficient Multipath Clustering with Load Balancing Routing Protocol for WMSNs (EEMCL) to prolong the network lifetime. The suggested protocol, which segments the network into layers of clusters, would be implemented using multi-hop. Sensing data from the sensor is transmitted to the sink by the main cluster heads in each layer, cooperating with the cluster heads in the upper layers. The proposed protocol improves energy dissipation, network life-times, and network stability according to simulation results when compared with SEP, SEP-E, and SEPFL protocols. The last node dead for the proposed protocol is at round 5833, 4027 for SEPFL, 2828 for SEP-E, and 2325 for SEP.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 3","pages":"104-114"},"PeriodicalIF":1.9,"publicationDate":"2023-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12061","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50145225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retraction","authors":"","doi":"10.1049/wss2.12058","DOIUrl":"https://doi.org/10.1049/wss2.12058","url":null,"abstract":"<p><b>Retraction: “Wideband circularly polarised antenna ‘multi-input-multi-output’ for wireless UWB applications,”</b> by Pillalamarri Laxman, Anuj Jain, Volume 11, Issue 6, IET Wireless Sensor Systems, pages: 259–274, First Published online: December 01, 2021: The above article published online on December 01, 2021 in Wiley Online Library (https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/wss2.12032), has been retracted by agreement between the journal Editor-in-Chief, Professor Sherali Zeadally, The Institution of Engineering and Technology and John Wiley & Sons, Ltd.</p><p>The retraction has been agreed due to unattributed overlap between this article and the following article published in <i>IEEE Access</i>, ‘Wideband Circularly Polarized Textile MIMO Antenna for Wearable Applications’ by Sanjeev Kumar, Durgesh Nandan, Kunal Srivastava, Sachin Kumar, Hari Singh, Mohamed Marey, Hala Mostafa, Binod Kumar Kanaujia, Volume 9, 2021, doi:10.1109/ACCESS.2021.3101441.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"13 3","pages":"115"},"PeriodicalIF":1.9,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12058","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50132263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}