Sign in to use this feature.

Years

Between: -

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (547)

Search Parameters:
Journal = JSAN

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 6920 KiB  
Article
Game Theory-Based Incentive Design for Mitigating Malicious Behavior in Blockchain Networks
J. Sens. Actuator Netw. 2024, 13(1), 7; https://doi.org/10.3390/jsan13010007 - 15 Jan 2024
Viewed by 109
Abstract
This paper presents an innovative incentive model that utilizes graph and game theories to address the issue of node incentives in decentralized blockchain networks such as EVM blockchains. The lack of incentives for nodes within EVM networks gives rise to potential weaknesses that [...] Read more.
This paper presents an innovative incentive model that utilizes graph and game theories to address the issue of node incentives in decentralized blockchain networks such as EVM blockchains. The lack of incentives for nodes within EVM networks gives rise to potential weaknesses that might be used for various purposes, such as broadcasting fake transactions or withholding blocks. This affects the overall trust and integrity of the network. To address this issue, the current study offers a network model that incorporates the concepts of graph theory and utilizes a matrix representation for reward and trust optimization. Furthermore, this study presents a game-theoretic framework that encourages cooperative conduct and discourages malicious actions, ultimately producing a state of equilibrium according to the Nash equilibrium. The simulations validated the model’s efficacy in addressing fraudulent transactions and emphasized its scalability, security, and fairness benefits. This study makes a valuable contribution to the field of blockchain technology by presenting an incentive model that effectively encourages the development of secure and trusted decentralized systems. Full article
(This article belongs to the Topic Trends and Prospects in Security, Encryption and Encoding)
Show Figures

Figure 1

18 pages, 2901 KiB  
Article
Experiences Using Ethereum and Quorum Blockchain Smart Contracts in Dairy Production
J. Sens. Actuator Netw. 2024, 13(1), 6; https://doi.org/10.3390/jsan13010006 - 12 Jan 2024
Viewed by 280
Abstract
feta cheese is a Greek protected designation of origin (PDO) product that is produced in three main phases: milk collection, cheese preparation and maturation, and product packaging. Each phase must be aligned with quantitative rules, stemming from the legislation framework and best practices. [...] Read more.
feta cheese is a Greek protected designation of origin (PDO) product that is produced in three main phases: milk collection, cheese preparation and maturation, and product packaging. Each phase must be aligned with quantitative rules, stemming from the legislation framework and best practices. The production complexity, the increased production cost, centralised and monolithic traceability systems, and the lack of a systematic monitoring framework have made dairy products a commodity with increased frequency of food fraud. Given the context of the dairy section in Greece, this study aims to examine (a) whether it is possible to model the end-to-end process of PDO feta cheese considering production rules to develop a trustworthy blockchain-based traceability system (b) how to associate the (‘easy-to-retrieve’, operational) traceability data with the (difficult-to-assess) product characteristics meaningful to the consumer, (c) how to design a technical solution ensuring that information is accessible by the stakeholders and the consumer, while minimising blockchain-related delay, and (d) how to design a graphical user interface and offer tools to consumers so that traceability information is communicated effectively and they can verify it through access to the blockchain. In terms of methods, we analyse and model the process steps, identify measurable, operational parameters and translate the legislative framework into rules. These rules are designed and codified as blockchain smart contracts that ensure the food authenticity and compliance with legislation. The blockchain infrastructure consists of the private Quorum blockchain that is anchored to the public infrastructure of Ethereum. Mechanisms to address scalability in terms of dynamic data volumes, effective data coding, and data verification at the edge as well as relevant limitations are discussed. Consumers are informed about traceability information by using QR codes on food packaging and can verify the data using the blockchain tools and services. Full article
Show Figures

Figure 1

16 pages, 1034 KiB  
Article
Dynamic and Distributed Intelligence over Smart Devices, Internet of Things Edges, and Cloud Computing for Human Activity Recognition Using Wearable Sensors
J. Sens. Actuator Netw. 2024, 13(1), 5; https://doi.org/10.3390/jsan13010005 - 02 Jan 2024
Viewed by 534
Abstract
A wide range of applications, including sports and healthcare, use human activity recognition (HAR). The Internet of Things (IoT), using cloud systems, offers enormous resources but produces high delays and huge amounts of traffic. This study proposes a distributed intelligence and dynamic HAR [...] Read more.
A wide range of applications, including sports and healthcare, use human activity recognition (HAR). The Internet of Things (IoT), using cloud systems, offers enormous resources but produces high delays and huge amounts of traffic. This study proposes a distributed intelligence and dynamic HAR architecture using smart IoT devices, edge devices, and cloud computing. These systems were used to train models, store results, and process real-time predictions. Wearable sensors and smartphones were deployed on the human body to detect activities from three positions; accelerometer and gyroscope parameters were utilized to recognize activities. A dynamic selection of models was used, depending on the availability of the data and the mobility of the users. The results showed that this system could handle different scenarios dynamically according to the available features; its prediction accuracy was 99.23% using the LightGBM algorithm during the training stage, when 18 features were used. The prediction time was around 6.4 milliseconds per prediction on the smart end device and 1.6 milliseconds on the Raspberry Pi edge, which can serve more than 30 end devices simultaneously and reduce the need for the cloud. The cloud was used for storing users’ profiles and can be used for real-time prediction in 391 milliseconds per request. Full article
Show Figures

Figure 1

18 pages, 4512 KiB  
Article
Output Stream from the AQM Queue with BMAP Arrivals
J. Sens. Actuator Netw. 2024, 13(1), 4; https://doi.org/10.3390/jsan13010004 - 02 Jan 2024
Viewed by 353
Abstract
We analyse the output stream from a packet buffer governed by the policy that incoming packets are dropped with a probability related to the buffer occupancy. The results include formulas for the number of packets departing the buffer in a specific time, for [...] Read more.
We analyse the output stream from a packet buffer governed by the policy that incoming packets are dropped with a probability related to the buffer occupancy. The results include formulas for the number of packets departing the buffer in a specific time, for the time-dependent output rate and for the steady-state output rate. The latter is the key performance measure of the buffering mechanism, as it reflects its ability to process a specific number of packets in a time unit. To ensure broad applicability of the results in various networks and traffic types, a powerful and versatile model of the input stream is used, i.e., a BMAP. Numeric examples are provided, with several parameterisations of the BMAP, dropping probabilities and loads of the system. Full article
(This article belongs to the Section Communications and Networking)
Show Figures

Figure 1

24 pages, 3947 KiB  
Article
Multi-Objective Optimization of Gateway Location Selection in Long-Range Wide Area Networks: A Tradeoff Analysis between System Costs and Bitrate Maximization
J. Sens. Actuator Netw. 2024, 13(1), 3; https://doi.org/10.3390/jsan13010003 - 02 Jan 2024
Viewed by 1004
Abstract
LoRaWANs play a critical role in various applications such as smart farming, industrial IoT, and smart cities. The strategic placement of gateways significantly influences network performance optimization. This study presents a comprehensive analysis of the tradeoffs between system costs and bitrate maximization for [...] Read more.
LoRaWANs play a critical role in various applications such as smart farming, industrial IoT, and smart cities. The strategic placement of gateways significantly influences network performance optimization. This study presents a comprehensive analysis of the tradeoffs between system costs and bitrate maximization for selecting optimal gateway locations in LoRaWANs. To address this challenge, a rigorous mathematical model is formulated to incorporate essential factors and constraints related to gateway selection. Furthermore, we propose an innovative metaheuristic algorithm known as the M-VaNSAS algorithm, which effectively explores the solution space and identifies favorable gateway locations. The Pareto front and TOPSIS methods are employed to evaluate and rank the generated solutions, providing a robust assessment framework. Our research findings highlight the suitability of a network model comprising 144 gateways tailored for the Ubon Ratchathani province. Among the evaluated algorithms, the M-VaNSAS method demonstrates exceptional efficiency in gateway location selection, outperforming the PSO, DE, and GA methods. Full article
Show Figures

Figure 1

20 pages, 3368 KiB  
Article
Robust ISAC Localization in Smart Cities: A Hybrid Network Approach for NLOS Challenges with Uncertain Parameters
J. Sens. Actuator Netw. 2024, 13(1), 2; https://doi.org/10.3390/jsan13010002 - 29 Dec 2023
Viewed by 431
Abstract
Accurate localization holds paramount importance across many applications within the context of smart cities, particularly in vehicular communication systems, the Internet of Things, and Integrated Sensing and Communication (ISAC) technologies. Nonetheless, achieving precise localization remains a persistent challenge, primarily attributed to the prevalence [...] Read more.
Accurate localization holds paramount importance across many applications within the context of smart cities, particularly in vehicular communication systems, the Internet of Things, and Integrated Sensing and Communication (ISAC) technologies. Nonetheless, achieving precise localization remains a persistent challenge, primarily attributed to the prevalence of non-line-of-sight (NLOS) conditions and the presence of uncertainties surrounding key wireless transmission parameters. This paper presents a comprehensive framework tailored to address the intricate task of localizing multiple nodes within ISAC systems significantly impacted by pervasive NLOS conditions and the ambiguity of transmission parameters. The proposed methodology integrates received signal strength (RSS) and time-of-arrival (TOA) measurements as a strategic response to effectively overcome these substantial challenges, even in situations where the precise values of transmitting power and temporal information remain elusive. An approximation approach is judiciously employed to facilitate the inherent non-convex and NP-hard nature of the original estimation problem, resulting in a notable transformation, rendering the problem amenable to a convex optimization paradigm. The comprehensive array of simulations conducted within this study corroborates the efficacy of the proposed hybrid cooperative localization method by underscoring its superior performance relative to conventional approaches relying solely on RSS or TOA measurements. This enhancement in localization accuracy in ISAC systems holds promise in the intricate urban landscape of smart cities, offering substantial contributions to infrastructure optimization and service efficiency. Full article
Show Figures

Figure 1

19 pages, 3237 KiB  
Article
Reduction in Data Imbalance for Client-Side Training in Federated Learning for the Prediction of Stock Market Prices
J. Sens. Actuator Netw. 2024, 13(1), 1; https://doi.org/10.3390/jsan13010001 - 21 Dec 2023
Viewed by 570
Abstract
The approach of federated learning (FL) addresses significant challenges, including access rights, privacy, security, and the availability of diverse data. However, edge devices produce and collect data in a non-independent and identically distributed (non-IID) manner. Therefore, it is possible that the number of [...] Read more.
The approach of federated learning (FL) addresses significant challenges, including access rights, privacy, security, and the availability of diverse data. However, edge devices produce and collect data in a non-independent and identically distributed (non-IID) manner. Therefore, it is possible that the number of data samples may vary among the edge devices. This study elucidates an approach for implementing FL to achieve a balance between training accuracy and imbalanced data. This approach entails the implementation of data augmentation in data distribution by utilizing class estimation and by balancing on the client side during local training. Secondly, simple linear regression is utilized for model training at the client side to manage the optimal computation cost to achieve a reduction in computation cost. To validate the proposed approach, the technique was applied to a stock market dataset comprising stocks (AAL, ADBE, ASDK, and BSX) to predict the day-to-day values of stocks. The proposed approach has demonstrated favorable results, exhibiting a strong fit of 0.95 and above with a low error rate. The R-squared values, predominantly ranging from 0.97 to 0.98, indicate the model’s effectiveness in capturing variations in stock prices. Strong fits are observed within 75 to 80 iterations for stocks displaying consistently high R-squared values, signifying accuracy. On the 100th iteration, the declining MSE, MAE, and RMSE (AAL at 122.03, 4.89, 11.04, respectively; ADBE at 457.35, 17.79, and 21.38, respectively; ASDK at 182.78, 5.81, 13.51, respectively; and BSX at 34.50, 4.87, 5.87, respectively) values corroborated the positive results of the proposed approach with minimal data loss. Full article
(This article belongs to the Special Issue Federated Learning: Applications and Future Directions)
Show Figures

Figure 1

27 pages, 7028 KiB  
Article
Performance Evaluation of LoRa Communications in Harsh Industrial Environments
J. Sens. Actuator Netw. 2023, 12(6), 80; https://doi.org/10.3390/jsan12060080 - 28 Nov 2023
Viewed by 945
Abstract
LoRa technology is being integrated into industrial applications as part of Industry 4.0 owing to its longer range and low power consumption. However, noise, interference, and the fading effect all have a negative impact on LoRa performance in an industrial environment, necessitating solutions [...] Read more.
LoRa technology is being integrated into industrial applications as part of Industry 4.0 owing to its longer range and low power consumption. However, noise, interference, and the fading effect all have a negative impact on LoRa performance in an industrial environment, necessitating solutions to ensure reliable communication. This paper evaluates and compares LoRa’s performance in terms of packet error rate (PER) with and without forward error correction (FEC) in an industrial environment. The impact of integrating an infinite impulse response (IIR) or finite impulse response (FIR) filter into the LoRa architecture is also evaluated. Simulations are carried out in MATLAB at 868 MHz with a bandwidth of 125 kHz and two spreading factors of 7 and 12. Many-to-one and one-to-many communication modes are considered, as are line of sight (LOS) and non-line of Sight (NLOS) conditions. Simulation results show that, compared to an environment with additive white Gaussian noise (AWGN), LoRa technology suffers a significant degradation of its PER performance in industrial environments. Nevertheless, the use of forward error correction (FEC) contributes positively to offsetting this decline. Depending on the configuration and architecture examined, the gain in signal-to-noise ratio (SNR) using a 4/8 coding ratio ranges from 7 dB to 11 dB. Integrating IIR or FIR filters also boosts performance, with additional SNR gains ranging from 2 dB to 6 dB, depending on the simulation parameters. Full article
(This article belongs to the Section Communications and Networking)
Show Figures

Figure 1

18 pages, 618 KiB  
Article
Electric Vehicles Energy Management for Vehicle-to-Grid 6G-Based Smart Grid Networks
J. Sens. Actuator Netw. 2023, 12(6), 79; https://doi.org/10.3390/jsan12060079 - 27 Nov 2023
Viewed by 910
Abstract
This research proposes a unique platform for energy management optimization in smart grids, based on 6G technologies. The proposed platform, applied on a virtual power plant, includes algorithms that take into account different profiles of loads and fairly schedules energy according to loads [...] Read more.
This research proposes a unique platform for energy management optimization in smart grids, based on 6G technologies. The proposed platform, applied on a virtual power plant, includes algorithms that take into account different profiles of loads and fairly schedules energy according to loads priorities and compensates for the intermittent nature of renewable energy sources. Moreover, we develop a bidirectional energy transition mechanism towards a fleet of intelligent vehicles by adopting vehicle-to-grid technology and peak clipping. Performance analysis shows that the proposed energy provides fairness to electrical vehicles, satisfies urgent loads, and optimizes smart grids energy. Full article
(This article belongs to the Special Issue Machine-Environment Interaction, Volume II)
Show Figures

Figure 1

20 pages, 5774 KiB  
Article
A Federated Learning Approach to Support the Decision-Making Process for ICU Patients in a European Telemedicine Network
J. Sens. Actuator Netw. 2023, 12(6), 78; https://doi.org/10.3390/jsan12060078 - 20 Nov 2023
Viewed by 752
Abstract
A result of the pandemic is an urgent need for data collaborations that empower the clinical and scientific communities in responding to rapidly evolving global challenges. The ICU4Covid project joined research institutions, medical centers, and hospitals all around Europe in a telemedicine network [...] Read more.
A result of the pandemic is an urgent need for data collaborations that empower the clinical and scientific communities in responding to rapidly evolving global challenges. The ICU4Covid project joined research institutions, medical centers, and hospitals all around Europe in a telemedicine network for sharing capabilities, knowledge, and expertise distributed within the network. However, healthcare data sharing has ethical, regulatory, and legal complexities that pose several restrictions on their access and use. To mitigate this issue, the ICU4Covid project integrates a federated learning architecture, allowing distributed machine learning within a cross-institutional healthcare system without the data being transported or exposed outside their original location. This paper presents the federated learning approach to support the decision-making process for ICU patients in a European telemedicine network. The proposed approach was applied to the early identification of high-risk hypertensive patients. Experimental results show how the knowledge of every single node is spread within the federation, improving the ability of each node to make an early prediction of high-risk hypertensive patients. Moreover, a performance evaluation shows an accuracy and precision of over 90%, confirming a good performance of the FL approach as a prediction test. The FL approach can significantly support the decision-making process for ICU patients in distributed networks of federated healthcare organizations. Full article
(This article belongs to the Special Issue Federated Learning: Applications and Future Directions)
Show Figures

Figure 1

19 pages, 4711 KiB  
Article
Enhancing Mental Fatigue Detection through Physiological Signals and Machine Learning Using Contextual Insights and Efficient Modelling
J. Sens. Actuator Netw. 2023, 12(6), 77; https://doi.org/10.3390/jsan12060077 - 03 Nov 2023
Viewed by 881
Abstract
This research presents a machine learning modeling process for detecting mental fatigue using three physiological signals: electrodermal activity, electrocardiogram, and respiration. It follows the conventional machine learning modeling pipeline, while emphasizing the significant contribution of the feature selection process, resulting in, not only [...] Read more.
This research presents a machine learning modeling process for detecting mental fatigue using three physiological signals: electrodermal activity, electrocardiogram, and respiration. It follows the conventional machine learning modeling pipeline, while emphasizing the significant contribution of the feature selection process, resulting in, not only a high-performance model, but also a relevant one. The employed feature selection process considers both statistical and contextual aspects of feature relevance. Statistical relevance was assessed through variance and correlation analyses between independent features and the dependent variable (fatigue state). A contextual analysis was based on insights derived from the experimental design and feature characteristics. Additionally, feature sequencing and set conversion techniques were employed to incorporate the temporal aspects of physiological signals into the training of machine learning models based on random forest, decision tree, support vector machine, k-nearest neighbors, and gradient boosting. An evaluation was conducted using a dataset acquired from a wearable electronic system (in third-party research) with physiological data from three subjects undergoing a series of tests and fatigue stages. A total of 18 tests were performed by the 3 subjects in 3 mental fatigue states. Fatigue assessment was based on subjective measures and reaction time tests, and fatigue induction was performed through mental arithmetic operations. The results showed the highest performance when using random forest, achieving an average accuracy and F1-score of 96% in classifying three levels of mental fatigue. Full article
(This article belongs to the Special Issue Machine-Environment Interaction, Volume II)
Show Figures

Figure 1

25 pages, 1144 KiB  
Article
Enhancing the Fault Tolerance of a Multi-Layered IoT Network through Rectangular and Interstitial Mesh in the Gateway Layer
J. Sens. Actuator Netw. 2023, 12(5), 76; https://doi.org/10.3390/jsan12050076 - 16 Oct 2023
Viewed by 996
Abstract
Most IoT systems designed for the implementation of mission-critical systems are multi-layered. Much of the computing is done in the service and gateway layers. The gateway layer connects the internal section of the IoT to the cloud through the Internet. The failure of [...] Read more.
Most IoT systems designed for the implementation of mission-critical systems are multi-layered. Much of the computing is done in the service and gateway layers. The gateway layer connects the internal section of the IoT to the cloud through the Internet. The failure of any node between the servers and the gateways will isolate the entire network, leading to zero tolerance. The service and gateway layers must be connected using networking topologies to yield 100% fault tolerance. The empirical formulation of the model chosen to connect the service’s servers to the gateways through routers is required to compute the fault tolerance of the network. A rectangular and interstitial mesh have been proposed in this paper to connect the service servers to the gateways through the servers, which yields 0.999 fault tolerance of the IoT network. Also provided is an empirical approach to computing the IoT network’s fault tolerance. A rectangular and interstitial mesh have been implemented in the network’s gateway layer, increasing the IoT network’s ability to tolerate faults by 11%. Full article
(This article belongs to the Topic Electronic Communications, IOT and Big Data)
Show Figures

Figure 1

27 pages, 2451 KiB  
Article
Short-Range Localization via Bluetooth Using Machine Learning Techniques for Industrial Production Monitoring
J. Sens. Actuator Netw. 2023, 12(5), 75; https://doi.org/10.3390/jsan12050075 - 15 Oct 2023
Viewed by 1078
Abstract
Indoor short-range localization is crucial in many Industry 4.0 applications. Production monitoring for assembly lines, for instance, requires fine-grained positioning for parts or goods in order to keep track of the production process and the stations traversed by each product. Due to the [...] Read more.
Indoor short-range localization is crucial in many Industry 4.0 applications. Production monitoring for assembly lines, for instance, requires fine-grained positioning for parts or goods in order to keep track of the production process and the stations traversed by each product. Due to the unavailability of the Global Positioning System (GPS) for indoor positioning, a different approach is required. In this paper, we propose a specific design for short-range indoor positioning based on the analysis of the Received Signal Strength Indicator (RSSI) of Bluetooth beacons. To this aim, different machine learning techniques are considered and assessed: regressors, Convolution Neural Network (CNN) and Recurrent Neural Network (RNN). A realistic testbed is created to collect data for the training of the models and to assess the performance of each technique. Our analysis highlights the best models and the most convenient and suitable configuration for indoor localization. Finally, the localization accuracy is calculated in the considered use case, i.e., production monitoring. Our results show that the best performance is obtained using the K-Nearest Neighbors technique, which results in a good performance for general localization and in a high level of accuracy, 99%, for industrial production monitoring. Full article
Show Figures

Figure 1

20 pages, 2251 KiB  
Article
Self-Configuration Management towards Fix-Distributed Byzantine Sensors for Clustering Schemes in Wireless Sensor Networks
J. Sens. Actuator Netw. 2023, 12(5), 74; https://doi.org/10.3390/jsan12050074 - 13 Oct 2023
Viewed by 971
Abstract
To avoid overloading a network, it is critical to continuously monitor the natural environment and disseminate data streams in synchronization. Based on self-maintaining technology, this study presents a technique called self-configuration management (SCM). The purpose is to ensure consistency in the performance, functionality, [...] Read more.
To avoid overloading a network, it is critical to continuously monitor the natural environment and disseminate data streams in synchronization. Based on self-maintaining technology, this study presents a technique called self-configuration management (SCM). The purpose is to ensure consistency in the performance, functionality, and physical attributes of a wireless sensor network (WSN) over its lifetime. During device communication, the SCM approach delivers an operational software package for the radio board of system problematic nodes. We offered two techniques to help cluster heads manage autonomous configuration. First, we created a separate capability to determine which defective devices require the operating system (OS) replica. The software package was then delivered from the head node to the network’s malfunctioning device via communication roles. Second, we built an autonomous capability to automatically install software packages and arrange the time. The simulations revealed that the suggested technique was quick in transfers and used less energy. It also provided better coverage of system fault peaks than competitors. We used the proposed SCM approach to distribute homogenous sensor networks, and it increased system fault tolerance to 93.2%. Full article
Show Figures

Figure 1

26 pages, 2603 KiB  
Article
Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map
J. Sens. Actuator Netw. 2023, 12(5), 73; https://doi.org/10.3390/jsan12050073 - 10 Oct 2023
Viewed by 1456
Abstract
In recent years, there has been an increasing interest in employing chaotic-based random number generators for cryptographic purposes. However, many of these generators produce sequences that lack the necessary strength for cryptographic systems, such as Tent-Map. However, these generators still suffer from common [...] Read more.
In recent years, there has been an increasing interest in employing chaotic-based random number generators for cryptographic purposes. However, many of these generators produce sequences that lack the necessary strength for cryptographic systems, such as Tent-Map. However, these generators still suffer from common issues when generating random numbers, including issues related to speed, randomness, lack of statistical properties, and lack of uniformity. Therefore, this paper introduces an efficient pseudo-random number generator, called State-Based Tent-Map (SBTM), based on a modified Tent-Map, which addresses this and other limitations by providing highly robust sequences suitable for cryptographic applications. The proposed generator is specifically designed to generate sequences with exceptional statistical properties and a high degree of security. It utilizes a modified 1D chaotic Tent-Map with enhanced attributes to produce the chaotic sequences. Rigorous randomness testing using the Dieharder test suite confirmed the promising results of the generated keystream bits. The comprehensive evaluation demonstrated that approximately 97.4% of the tests passed successfully, providing further evidence of the SBTM’s capability to produce sequences with sufficient randomness and statistical properties. Full article
(This article belongs to the Section Network Security and Privacy)
Show Figures

Figure 1

Back to TopTop