Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 16 de 16
Filter
Add more filters










Publication year range
1.
IEEE Trans Netw Sci Eng ; 9(1): 332-344, 2022 Jan.
Article in English | MEDLINE | ID: mdl-35582324

ABSTRACT

The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it has been the most important objective. With effective prevention and control methods, the epidemic has been gradually under control in some countries and it is essential to ensure safe work resumption in the future. Although some approaches are proposed to measure people's healthy conditions, such as filling health information forms or evaluating people's travel records, they cannot provide a fine-grained assessment of the epidemic risk. In this paper, we propose a novel epidemic risk assessment method based on the granular data collected by the communication stations. We first compute the epidemic risk of these stations in different intervals by combining the number of infected persons and the way they pass through the station. Then, we calculate the personnel risk in different intervals according to the station trajectory of the queried person. This method could assess people's epidemic risk accurately and efficiently. We also conduct extensive simulations and the results verify the effectiveness of the proposed method.

2.
Sensors (Basel) ; 20(21)2020 Nov 08.
Article in English | MEDLINE | ID: mdl-33171680

ABSTRACT

Recently, underwater wireless sensor networks (UWSNs) have been considered as a powerful technique for many applications. However, acoustic communications in UWSNs bring in huge QoS issues for time-critical applications. Additionally, excessive control packets and multiple copies during the data transmission process exacerbate this challenge. Faced with these problems, we propose a reliable low-latency and energy-efficient transmission protocol for dense 3D underwater wireless sensor networks to improve the QoS of UWSNs. The proposed protocol exploits fewer control packets and reduces data-packet copies effectively through the co-design of routing and media access control (MAC) protocols. The co-design method is divided into two steps. First, the number of handshakes in the MAC process will be greatly reduced via our forwarding-set routing strategy under the guarantee of reliability. Second, with the help of information from the MAC process, network-update messages can be used to replace control packages through mobility prediction when choosing a route. Simulation results show that the proposed protocol has a considerably higher reliability, and lower latency and energy consumption in comparison with existing transmission protocols for a dense underwater wireless sensor network.

3.
Sensors (Basel) ; 20(21)2020 Nov 04.
Article in English | MEDLINE | ID: mdl-33158266

ABSTRACT

Wi-Fi uploading is considered an effective method for offloading the traffic of cellular networks generated by the data uploading process of mobile crowd sensing applications. However, previously proposed Wi-Fi uploading schemes mainly focus on optimizing one performance objective: the offloaded cellular traffic or the reduced uploading cost. In this paper, we propose an Intelligent Data Uploading Selection Mechanism (IDUSM) to realize a trade-off between the offloaded traffic of cellular networks and participants' uploading cost considering the differences among participants' data plans and direct and indirect opportunistic transmissions. The mechanism first helps the source participant choose an appropriate data uploading manner based on the proposed probability prediction model, and then optimizes its performance objective for the chosen data uploading manner. In IDUSM, our proposed probability prediction model precisely predicts a participant's mobility from spatial and temporal aspects, and we decrease data redundancy produced in the Wi-Fi offloading process to reduce waste of participants' limited resources (e.g., storage, battery). Simulation results show that the offloading efficiency of our proposed IDUSM is (56.54×10-7), and the value is the highest among the other three Wi-Fi offloading mechanisms. Meanwhile, the offloading ratio and uploading cost of IDUSM are respectively 52.1% and (6.79×103). Compared with other three Wi-Fi offloading mechanisms, it realized a trade-off between the offloading ratio and the uploading cost.

4.
Sensors (Basel) ; 20(20)2020 Oct 19.
Article in English | MEDLINE | ID: mdl-33086691

ABSTRACT

With the emergence of vehicular Internet-of-Things (IoT) applications, it is a significant challenge for vehicular IoT systems to obtain higher throughput in vehicle-to-cloud multipath transmission. Network Coding (NC) has been recognized as a promising paradigm for improving vehicular wireless network throughput by reducing packet loss in transmission. However, existing researches on NC do not consider the influence of the rapid quality change of wireless links on NC schemes, which poses a great challenge to dynamically adjust the coding rate according to the variation of link quality in vehicle-to-cloud multipath transmission in order to avoid consuming unnecessary bandwidth resources and to increase network throughput. Therefore, we propose an Adaptive Network Coding (ANC) scheme brought by the novel integration of the Hidden Markov Model (HMM) into the NC scheme to efficiently adjust the coding rate according to the estimated packet loss rate (PLR). The ANC scheme conquers the rapid change of wireless link quality to obtain the utmost throughput and reduce the packet loss in transmission. In terms of the throughput performance, the simulations and real experiment results show that the ANC scheme outperforms state-of-the-art NC schemes for vehicular wireless multipath transmission in vehicular IoT systems.

5.
Sensors (Basel) ; 20(18)2020 Sep 13.
Article in English | MEDLINE | ID: mdl-32933114

ABSTRACT

Cognitive radio (CR) is a critical technique to solve the conflict between the explosive growth of traffic and severe spectrum scarcity. Reasonable radio resource allocation with CR can effectively achieve spectrum sharing and co-channel interference (CCI) mitigation. In this paper, we propose a joint channel selection and power adaptation scheme for the underlay cognitive radio network (CRN), maximizing the data rate of all secondary users (SUs) while guaranteeing the quality of service (QoS) of primary users (PUs). To exploit the underlying topology of CRNs, we model the communication network as dynamic graphs, and the random walk is used to imitate the users' movements. Considering the lack of accurate channel state information (CSI), we use the user distance distribution contained in the graph to estimate CSI. Moreover, the graph convolutional network (GCN) is employed to extract the crucial interference features. Further, an end-to-end learning model is designed to implement the following resource allocation task to avoid the split with mismatched features and tasks. Finally, the deep reinforcement learning (DRL) framework is adopted for model learning, to explore the optimal resource allocation strategy. The simulation results verify the feasibility and convergence of the proposed scheme, and prove that its performance is significantly improved.

6.
Sensors (Basel) ; 20(3)2020 Jan 24.
Article in English | MEDLINE | ID: mdl-31991639

ABSTRACT

Wireless sensor networks have been widely adopted, and neighbor discovery is an essential step to construct the networks. Most existing studies on neighbor discovery are designed on the assumption that either all nodes are fully connected or only two nodes compose the network. However, networks are partially connected in reality: some nodes are within radio range of each other, while others are not. Low latency and energy efficiency are two common goals, which become even more challenging to achieve at the same time in partially connected networks. We find that the collision caused by simultaneous transmissions is the main obstruction of achieving the two goals. In this paper, we present an efficient algorithm called Panacea to address these challenges by alleviating collisions. To begin with, we design Panacea-NCD (Panacea no collision detection) for nodes that do not have a collision detection mechanism.

7.
Sensors (Basel) ; 19(21)2019 Oct 31.
Article in English | MEDLINE | ID: mdl-31683703

ABSTRACT

As one of the main applications of the Internet of things (IoT), the vehicular ad-hoc network (VANET) is the core of the intelligent transportation system (ITS). Air-ground integrated vehicular networks (AGIVNs) assisted by unmanned aerial vehicles (UAVs) have the advantages of wide coverage and flexible configuration, which outperform the ground-based VANET in terms of communication quality. However, the complex electromagnetic interference (EMI) severely degrades the communication performance of UAV sensors. Therefore, it is meaningful and challenging to design an efficient anti-interference scheme for UAV data links in AGIVNs. In this paper, we propose an anti-interference scheme, named as Mary-MCM, for UAV data links in AGIVNs based on multi-ary (M-ary) spread spectrum and multi-carrier modulation (MCM). Specifically, the Mary-MCM disperses the interference power by expanding the signal spectrum, such that the anti-interference ability of AGIVNs is enhanced. Besides, by using MCM and multiple-input multiple-output (MIMO) technologies, the Mary-MCM improves the spectrum utilization effectively while ensuring system performance. The simulation results verify that the Mary-MCM achieves excellent anti-interference performance under different EMI combinations.

8.
Sensors (Basel) ; 19(5)2019 Mar 11.
Article in English | MEDLINE | ID: mdl-30862110

ABSTRACT

Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero 0 . We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control.

9.
Sensors (Basel) ; 19(5)2019 Mar 08.
Article in English | MEDLINE | ID: mdl-30857140

ABSTRACT

Intelligent medical service system integrates wireless internet of things (WIoT), including medical sensors, wireless communications, and middleware techniques, so as to collect and analyze patients' data to examine their physical conditions by many personal health devices (PHDs) in real time. However, large amount of malicious codes on the Android system can compromise consumers' privacy, and further threat the hospital management or even the patients' health. Furthermore, this sensor-rich system keeps generating large amounts of data and saturates the middleware system. To address these challenges, we propose a fog computing security and privacy protection solution. Specifically, first, we design the security and privacy protection framework based on the fog computing to improve tele-health and tele-medicine infrastructure. Then, we propose a context-based privacy leakage detection method based on the combination of dynamic and static information. Experimental results show that the proposed method can achieve higher detection accuracy and lower energy consumption compared with other state-of-art methods.


Subject(s)
Internet , Remote Sensing Technology/methods , Wireless Technology , Computer Security
10.
Sensors (Basel) ; 19(4)2019 Feb 25.
Article in English | MEDLINE | ID: mdl-30823597

ABSTRACT

Many IoT (Internet of Things) systems run Android systems or Android-like systems. With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has gradually increased. However, these learning-based detection models are often vulnerable to adversarial samples. An automated testing framework is needed to help these learning-based malware detection systems for IoT devices perform security analysis. The current methods of generating adversarial samples mostly require training parameters of models and most of the methods are aimed at image data. To solve this problem, we propose a testing framework for learning-based Android malware detection systems (TLAMD) for IoT Devices. The key challenge is how to construct a suitable fitness function to generate an effective adversarial sample without affecting the features of the application. By introducing genetic algorithms and some technical improvements, our test framework can generate adversarial samples for the IoT Android application with a success rate of nearly 100% and can perform black-box testing on the system.

11.
Sensors (Basel) ; 19(6)2019 Mar 13.
Article in English | MEDLINE | ID: mdl-30871229

ABSTRACT

The explosive number of vehicles has given rise to a series of traffic problems, such as traffic congestion, road safety, and fuel waste. Collecting vehicles' speed information is an effective way to monitor the traffic conditions and avoid vehicles' congestion, however it may threaten vehicles' location and trajectory privacy. Motivated by the fact that traffic monitoring does not need to know each individual vehicle's speed and the average speed would be sufficient, we propose a privacy-preserving traffic monitoring (PPTM) scheme to aggregate vehicles' speeds at different locations. In PPTM, the roadside unit (RSU) collects vehicles' speed information at multiple road segments, and further cooperates with a service provider to calculate the average speed information for every road segment. To preserve vehicles' privacy, both homomorphic Paillier cryptosystem and super-increasing sequence are adopted. A comprehensive security analysis indicates that the proposed PPTM can preserve vehicles' identities, speeds, locations, and trajectories privacy from being disclosed. In addition, extensive simulations are conducted to validate the effectiveness and efficiency of the proposed PPTM scheme.

12.
Sensors (Basel) ; 19(4)2019 Feb 17.
Article in English | MEDLINE | ID: mdl-30781563

ABSTRACT

In recent years, with the development of the marine industry, the ship navigation environment has become more complicated. Some artificial intelligence technologies, such as computer vision, can recognize, track and count sailing ships to ensure maritime security and facilitate management for Smart Ocean systems. Aiming at the scaling problem and boundary effect problem of traditional correlation filtering methods, we propose a self-selective correlation filtering method based on box regression (BRCF). The proposed method mainly includes: (1) A self-selective model with a negative samples mining method which effectively reduces the boundary effect in strengthening the classification ability of the classifier at the same time; (2) a bounding box regression method combined with a key points matching method for the scale prediction, leading to a fast and efficient calculation. The experimental results show that the proposed method can effectively deal with the problem of ship size changes and background interference. The success rates and precisions were over 8 % higher than Discriminative Scale Space Tracking (DSST) on the marine traffic dataset of our laboratory. In terms of processing speed, the proposed method is higher than DSST by nearly 22 frames per second (FPS).

13.
Sensors (Basel) ; 18(12)2018 Dec 19.
Article in English | MEDLINE | ID: mdl-30572635

ABSTRACT

Throughout the past decade, vehicular networks have attracted a great deal of interest in various fields. The increasing number of vehicles has led to challenges in traffic regulation. Vehicle-type detection is an important research topic that has found various applications in numerous fields. Its main purpose is to extract the different features of vehicles from videos or pictures captured by traffic surveillance so as to identify the types of vehicles, and then provide reference information for traffic monitoring and control. In this paper, we propose a step-forward vehicle-detection and -classification method using a saliency map and the convolutional neural-network (CNN) technique. Specifically, compressed-sensing (CS) theory is applied to generate the saliency map to label the vehicles in an image, and the CNN scheme is then used to classify them. We applied the concept of the saliency map to search the image for target vehicles: this step is based on the use of the saliency map to minimize redundant areas. CS was used to measure the image of interest and obtain its saliency in the measurement domain. Because the data in the measurement domain are much smaller than those in the pixel domain, saliency maps can be generated at a low computation cost and faster speed. Then, based on the saliency map, we identified the target vehicles and classified them into different types using the CNN. The experimental results show that our method is able to speed up the window-calibrating stages of CNN-based image classification. Moreover, our proposed method has better overall performance in vehicle-type detection compared with other methods. It has very broad prospects for practical applications in vehicular networks.

14.
Sensors (Basel) ; 18(8)2018 Aug 19.
Article in English | MEDLINE | ID: mdl-30126251

ABSTRACT

High-precision and fast relative positioning of a large number of mobile sensor nodes (MSNs) is crucial for smart industrial wireless sensor networks (SIWSNs). However, positioning multiple targets simultaneously in three-dimensional (3D) space has been less explored. In this paper, we propose a new approach, called Angle-of-Arrival (AOA) based Three-dimensional Multi-target Localization (ATML). The approach utilizes two anchor nodes (ANs) with antenna arrays to receive the spread spectrum signals broadcast by MSNs. We design a multi-target single-input-multiple-output (MT-SIMO) signal transmission scheme and a simple iterative maximum likelihood estimator (MLE) to estimate the 2D AOAs of multiple MSNs simultaneously. We further adopt the skew line theorem of 3D geometry to mitigate the AOA estimation errors in determining locations. We have conducted extensive simulations and also developed a testbed of the proposed ATML. The numerical and field experiment results have verified that the proposed ATML can locate multiple MSNs simultaneously with high accuracy and efficiency by exploiting the spread spectrum gain and antenna array gain. The ATML scheme does not require extra hardware or synchronization among nodes, and has good capability in mitigating interference and multipath effect in complicated industrial environments.

15.
Sensors (Basel) ; 18(8)2018 Aug 10.
Article in English | MEDLINE | ID: mdl-30103460

ABSTRACT

With the popularization of IoT (Internet of Things) devices and the continuous development of machine learning algorithms, learning-based IoT malicious traffic detection technologies have gradually matured. However, learning-based IoT traffic detection models are usually very vulnerable to adversarial samples. There is a great need for an automated testing framework to help security analysts to detect errors in learning-based IoT traffic detection systems. At present, most methods for generating adversarial samples require training parameters of known models and are only applicable to image data. To address the challenge, we propose a testing framework for learning-based IoT traffic detection systems, TLTD. By introducing genetic algorithms and some technical improvements, TLTD can generate adversarial samples for IoT traffic detection systems and can perform a black-box test on the systems.

16.
Sensors (Basel) ; 16(12)2016 Nov 29.
Article in English | MEDLINE | ID: mdl-27916841

ABSTRACT

Emerging sensor networks (ESNs) are an inevitable trend with the development of the Internet of Things (IoT), and intend to connect almost every intelligent device. Therefore, it is critical to study resource allocation in such an environment, due to the concern of efficiency, especially when resources are limited. By viewing ESNs as multi-agent environments, we model them with an agent-based modelling (ABM) method and deal with resource allocation problems with market models, after describing users' patterns. Reinforcement learning methods are introduced to estimate users' patterns and verify the outcomes in our market models. Experimental results show the efficiency of our methods, which are also capable of guiding topology management.

SELECTION OF CITATIONS
SEARCH DETAIL
...