Journal Description
Journal of Sensor and Actuator Networks
Journal of Sensor and Actuator Networks
is an international, peer-reviewed, open access journal on the science and technology of sensor and actuator networks, published bimonthly online by MDPI.
- Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions.
- High Visibility: indexed within Scopus, ESCI (Web of Science), dblp, Inspec, and other databases.
- Journal Rank: CiteScore - Q1 (Control and Optimization)
- Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 13.8 days after submission; acceptance to publication is undertaken in 4.3 days (median values for papers published in this journal in the first half of 2023).
- Recognition of Reviewers: reviewers who provide timely, thorough peer-review reports receive vouchers entitling them to a discount on the APC of their next publication in any MDPI journal, in appreciation of the work done.
Impact Factor:
3.5 (2022);
5-Year Impact Factor:
3.6 (2022)
Latest Articles
Remote Binaural System (RBS) for Noise Acoustic Monitoring
J. Sens. Actuator Netw. 2023, 12(4), 63; https://doi.org/10.3390/jsan12040063 - 14 Aug 2023
Abstract
►
Show Figures
The recent emergence of advanced information technologies such as cloud computing, artificial intelligence, and data science has improved and optimized various processes in acoustics with potential real-world applications. Noise monitoring tasks on large terrains can be captured using an array of sound level
[...] Read more.
The recent emergence of advanced information technologies such as cloud computing, artificial intelligence, and data science has improved and optimized various processes in acoustics with potential real-world applications. Noise monitoring tasks on large terrains can be captured using an array of sound level meters. However, current monitoring systems only rely on the knowledge of a singular measured value related to the acoustic energy of the captured signal, leaving aside spatial aspects that complement the perception of noise by the human being. This project presents a system that performs binaural measurements according to subjective human perception. The acoustic characterization in an anechoic chamber is presented, as well as acoustic indicators obtained in the field initially for a short period of time. The main contribution of this work is the construction of a binaural prototype that resembles the human head and which transmits and processes acoustical data on the cloud. The above allows noise level monitoring via binaural hearing rather than a singular capturing device. Likewise, it can be highlighted that the system allows for obtaining spatial acoustic indicators based on the interaural cross-correlation function (IACF), as well as detecting the location of the source on the azimuthal plane.
Full article
Open AccessArticle
Extraction of Hidden Authentication Factors from Possessive Information
J. Sens. Actuator Netw. 2023, 12(4), 62; https://doi.org/10.3390/jsan12040062 - 11 Aug 2023
Abstract
Smartphones have emerged as a ubiquitous personal gadget that serve as a repository for individuals’ significant personal data. Consequently, both physiological and behavioral traits, which are classified as biometric technologies, are used in authentication systems in order to safeguard data saved on smartphones
[...] Read more.
Smartphones have emerged as a ubiquitous personal gadget that serve as a repository for individuals’ significant personal data. Consequently, both physiological and behavioral traits, which are classified as biometric technologies, are used in authentication systems in order to safeguard data saved on smartphones from unauthorized access. Numerous authentication techniques have been developed; however, several authentication variables exhibit instability in the face of external influences or physical impairments. The potential failure of the authentication system might be attributed to several unpredictable circumstances. This research suggests that the use of distinctive and consistent elements over an individual’s lifespan may be employed to develop an authentication classification model. This model would be based on prevalent personal behavioral biometrics and could be readily implemented in security authentication systems. The biological biometrics acquired from an individual’s typing abilities during data entry include their name, surname, email, and phone number. Therefore, it is possible to establish and use a biometrics-based security system that can be sustained and employed during an individual’s lifetime without the explicit dependance on the functionality of the smartphone devices. The experimental findings demonstrate that the use of a mobile touchscreen as the foundation for the proposed verification mechanism has promise as a high-precision authentication solution.
Full article
(This article belongs to the Special Issue Advances in Security of Cyber-Physical Systems)
►▼
Show Figures
Figure 1
Open AccessArticle
An Investigation of the Effectiveness of Deepfake Models and Tools
by
, , , , , and
J. Sens. Actuator Netw. 2023, 12(4), 61; https://doi.org/10.3390/jsan12040061 - 04 Aug 2023
Abstract
►▼
Show Figures
With the development of computer vision and deep learning technologies, rapidly expanding approaches have been introduced that allow anyone to create videos and pictures that are both phony and incredibly lifelike. The term deepfake methodology is used to describe such technologies. Face alteration
[...] Read more.
With the development of computer vision and deep learning technologies, rapidly expanding approaches have been introduced that allow anyone to create videos and pictures that are both phony and incredibly lifelike. The term deepfake methodology is used to describe such technologies. Face alteration can be performed both in videos and pictures with extreme realism using deepfake innovation. Deepfake recordings, the majority of them targeting politicians or celebrity personalities, have been widely disseminated online. On the other hand, different strategies have been outlined in the research to combat the issues brought up by deepfake. In this paper, we carry out a review by analyzing and comparing (1) the notable research contributions in the field of deepfake models and (2) widely used deepfake tools. We have also built two separate taxonomies for deepfake models and tools. These models and tools are also compared in terms of underlying algorithms, datasets they have used and their accuracy. A number of challenges and open issues have also been identified.
Full article
Figure 1
Open AccessArticle
Performance Assessment and Mitigation of Timing Covert Channels over the IEEE 802.15.4
J. Sens. Actuator Netw. 2023, 12(4), 60; https://doi.org/10.3390/jsan12040060 - 01 Aug 2023
Abstract
►▼
Show Figures
The fast development and adoption of IoT technologies has been enabling their application into increasingly sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount. While the number of deployed IoT devices increases annually, they still present severe
[...] Read more.
The fast development and adoption of IoT technologies has been enabling their application into increasingly sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount. While the number of deployed IoT devices increases annually, they still present severe cyber-security vulnerabilities, becoming potential targets and entry points for further attacks. As these nodes become compromised, attackers aim to set up stealthy communication behaviours, to exfiltrate data or to orchestrate nodes in a cloaked fashion, and network timing covert channels are increasingly being used with such malicious intents. The IEEE 802.15.4 is one of the most pervasive protocols in IoT and a fundamental part of many communication infrastructures. Despite this fact, the possibility of setting up such covert communication techniques on this medium has received very little attention. We aim to analyse the performance and feasibility of such covert-channel implementations upon the IEEE 802.15.4 protocol, particularly upon the DSME behaviour, one of the most promising for large-scale time critical communications. This enables us to better understand the involved risk of such threats and help support the development of active cyber-security mechanisms to mitigate these threats, which, for now, we provide in the form of practical network setup recommendations.
Full article
Figure 1
Open AccessArticle
Safe Data-Driven Lane Change Decision Using Machine Learning in Vehicular Networks
by
J. Sens. Actuator Netw. 2023, 12(4), 59; https://doi.org/10.3390/jsan12040059 - 01 Aug 2023
Abstract
This research proposes a unique platform for lane change assistance for generating data-driven lane change (LC) decisions in vehicular networks. The goal is to reduce the frequency of emergency braking, the rate of vehicle collisions, and the amount of time spent in risky
[...] Read more.
This research proposes a unique platform for lane change assistance for generating data-driven lane change (LC) decisions in vehicular networks. The goal is to reduce the frequency of emergency braking, the rate of vehicle collisions, and the amount of time spent in risky lanes. In order to analyze and mine the massive amounts of data, our platform uses effective Machine Learning (ML) techniques to forecast collisions and advise the driver to safely change lanes. From the unprocessed large data generated by the car sensors, kinematic information is retrieved, cleaned, and evaluated. Machine learning algorithms analyze this kinematic data and provide an action: either stay in lane or change lanes to the left or right. The model is trained using the ML techniques K-Nearest Neighbor, Artificial Neural Network, and Deep Reinforcement Learning based on a set of training data and focus on predicting driver actions. The proposed solution is validated via extensive simulations using a microscopic car-following mobility model, coupled with an accurate mathematical modelling. Performance analysis show that KNN yields up to best performance parameters. Finally, we draw conclusions for road safety stakeholders to adopt the safer technique to lane change maneuver.
Full article
(This article belongs to the Special Issue Machine-Environment Interaction, Volume II)
►▼
Show Figures
Figure 1
Open AccessArticle
Echo State Learning for User Trajectory Prediction to Minimize Online Game Breaks in 6G Terahertz Networks
J. Sens. Actuator Netw. 2023, 12(4), 58; https://doi.org/10.3390/jsan12040058 - 25 Jul 2023
Abstract
Mobile online gaming is constantly growing in popularity and is expected to be one of the most important applications of upcoming sixth generation networks. Nevertheless, it remains challenging for game providers to support it, mainly due to its intrinsic and ever-stricter need for
[...] Read more.
Mobile online gaming is constantly growing in popularity and is expected to be one of the most important applications of upcoming sixth generation networks. Nevertheless, it remains challenging for game providers to support it, mainly due to its intrinsic and ever-stricter need for service continuity in the presence of user mobility. In this regard, this paper proposes a machine learning strategy to forecast user channel conditions, aiming at guaranteeing a seamless service whenever a user is involved in a handover, i.e., moving from the coverage area of one base station towards another. In particular, the proposed channel condition prediction approach involves the exploitation of an echo state network, an efficient class of recurrent neural network, that is empowered with a genetic algorithm to perform parameter optimization. The echo state network is applied to improve user decisions regarding the selection of the serving base station, avoiding game breaks as much as possible to lower game lag time. The validity of the proposed framework is confirmed by simulations in comparison to the long short-term memory approach and another alternative method, aimed at thoroughly testing the accuracy of the learning module in forecasting user trajectories and in reducing game breaks or lag time, with a focus on a sixth generation network application scenario.
Full article
(This article belongs to the Special Issue Advancing towards 6G Networks)
►▼
Show Figures
Figure 1
Open AccessArticle
Distributed Ledger as a Service: A Web 3.0-Oriented Architecture
by
and
J. Sens. Actuator Netw. 2023, 12(4), 57; https://doi.org/10.3390/jsan12040057 - 20 Jul 2023
Abstract
This paper proposes a general and interoperable Web of Things (WoT)-oriented architecture to support a distributed storage application. In particular, the focus is on a distributed ledger service dedicated to machine-to-machine (M2M) transactions occurring in an intelligent ecosystem. For this purpose, the basic
[...] Read more.
This paper proposes a general and interoperable Web of Things (WoT)-oriented architecture to support a distributed storage application. In particular, the focus is on a distributed ledger service dedicated to machine-to-machine (M2M) transactions occurring in an intelligent ecosystem. For this purpose, the basic functional modules have been characterized and integrated into a comprehensive framework relying on an IOTA approach. Furthermore, a general protocol that is built upon an underlying publish-and-subscribe framework is proposed to support all the application phases. The proposed approach has been validated by a simulation campaign targeting the achievable latency and throughput and, further, by a qualitative analysis of high-level metrics, both pointing out several advantages in terms of interoperability, scalability, and mobility support, together with addressing some constraints affecting service availability and security.
Full article
(This article belongs to the Special Issue Blockchain and Artificial Intelligence for Cyber Security in the Era of IoT and IIoT Applications)
►▼
Show Figures
Figure 1
Open AccessArticle
STARC: Decentralized Coordination Primitive on Low-Power IoT Devices for Autonomous Intersection Management
J. Sens. Actuator Netw. 2023, 12(4), 56; https://doi.org/10.3390/jsan12040056 - 11 Jul 2023
Abstract
Wireless communication is an essential element within Intelligent Transportation Systems and motivates new approaches to intersection management, allowing safer and more efficient road usage. With lives at stake, wireless protocols should be readily available and guarantee safe coordination for all involved traffic participants,
[...] Read more.
Wireless communication is an essential element within Intelligent Transportation Systems and motivates new approaches to intersection management, allowing safer and more efficient road usage. With lives at stake, wireless protocols should be readily available and guarantee safe coordination for all involved traffic participants, even in the presence of radio failures. This work introduces STARC, a coordination primitive for safe, decentralized resource coordination. Using STARC, traffic participants can safely coordinate at intersections despite unreliable radio environments and without a central entity or infrastructure. Unlike other methods that require costly and energy-consuming platforms, STARC utilizes affordable and efficient Internet of Things devices that connect cars, bicycles, electric scooters, pedestrians, and cyclists. For communication, STARC utilizes low-power IEEE 802.15.4 radios and Synchronous Transmissions for multi-hop communication. In addition, the protocol provides distributed transaction, election, and handover mechanisms for decentralized, thus cost-efficient, deployments. While STARC’s coordination remains resource-agnostic, this work presents and evaluates STARC in a roadside scenario. Our simulations have shown that using STARC at intersections leads to safer and more efficient vehicle coordination. We found that average waiting times can be reduced by up to 50% compared to using a fixed traffic light schedule in situations with fewer than 1000 vehicles per hour. Additionally, we design platooning on top of STARC, improving scalability and outperforming static traffic lights even at traffic loads exceeding 1000 vehicles per hour.
Full article
(This article belongs to the Special Issue Recent Advances in Vehicular Networking and Communications)
►▼
Show Figures
Figure 1
Open AccessArticle
Loss Process at an AQM Buffer
J. Sens. Actuator Netw. 2023, 12(4), 55; https://doi.org/10.3390/jsan12040055 - 10 Jul 2023
Abstract
We perform a comprehensive analysis of packet losses occurring at an AQM buffer in which the packet deletion probability is relative to the size of the queue. Several characteristics of the loss process are derived: the number of deletions in an interval of
[...] Read more.
We perform a comprehensive analysis of packet losses occurring at an AQM buffer in which the packet deletion probability is relative to the size of the queue. Several characteristics of the loss process are derived: the number of deletions in an interval of length t, the temporary intensity of deletions at arbitrary time, the steady-state loss ratio, and the number of losses if there is no service. All of them are obtained for a general deletion probability function and an advanced model of the arrival process, which incorporates, among other things, the autocorrelation of traffic. Analytical results are accompanied by examples in which numerical values are obtained for several configurations of the system. Using these examples, the dependence of the loss process on the initial system state, deletion probability function, and traffic autocorrelation are discussed.
Full article
(This article belongs to the Section Communications and Networking)
►▼
Show Figures
Figure 1
Open AccessArticle
Low-Cost Real-Time Locating System Solution Development and Implementation in Manufacturing Industry
J. Sens. Actuator Netw. 2023, 12(4), 54; https://doi.org/10.3390/jsan12040054 - 10 Jul 2023
Abstract
The present work originates from a previous study in which a low-cost Real-Time Locating System (RTLS) based on Ultra-Wideband signals was developed and tested both in a laboratory and in a real industrial environment for assessing its performance and determining the best configuration,
[...] Read more.
The present work originates from a previous study in which a low-cost Real-Time Locating System (RTLS) based on Ultra-Wideband signals was developed and tested both in a laboratory and in a real industrial environment for assessing its performance and determining the best configuration, according to some selected KPIs. Starting from the future research directions depicted, the evolution herein presented is twofold. First, tests performed in the laboratory are refined and deepened in terms of (i) different anchors’ arrangements and orientation; (ii) the increased number of tested tags; and (iii) the tags’ battery capacity test. Second, the development and deployment of the industrial solution as well is improved by means of a case for hosting tags to be positioned on the asset to be tracked, realized through 3D printing, in line with the industrial context requirements. Finally, an economic analysis is performed so as to demonstrate the convenience of the investment and the feasibility of the solution. Results are positive and promising in terms of both economic sustainability and implementation of the system in a real industrial environment and may constitute guidelines for practitioners and managers.
Full article
(This article belongs to the Special Issue Optimization within Sensor Networks and Telecommunications)
►▼
Show Figures
Figure 1
Open AccessArticle
Sensorless Estimation of Human Joint Torque for Robust Tracking Control of Lower-Limb Exoskeleton Assistive Gait Rehabilitation
J. Sens. Actuator Netw. 2023, 12(4), 53; https://doi.org/10.3390/jsan12040053 - 07 Jul 2023
Abstract
Patients suffering from motor disorders or weakness resulting from either serious spinal cord injury or stroke often require rehabilitation therapy to regain their mobility. In the lower limbs, exoskeletons have two motors aligned with the patients’ hip and knee to assist in rehabilitation
[...] Read more.
Patients suffering from motor disorders or weakness resulting from either serious spinal cord injury or stroke often require rehabilitation therapy to regain their mobility. In the lower limbs, exoskeletons have two motors aligned with the patients’ hip and knee to assist in rehabilitation exercises by supporting the patient’s body structure to increase the torques at the hip and knee joints. Assistive rehabilitation is, however, challenging, as the human torque is unknown and varies from patient to patient. This poses difficulties in determining the level of assistance required for a particular patient. In this paper, therefore, a modified extended state observer (ESO)-based integral sliding mode (ISM) controller (MESOISMC) for lower-limb exoskeleton assistive gait rehabilitation is proposed. The ESO is used to estimate the unknown human torque without application of a torque sensor while the ISMC is used to achieve robust tracking of preset hip and knee joint angles by considering the estimated human torque as a disturbance. The performance of the proposed MESOISMC was assessed using the mean absolute error (MAE). The obtained results show an 85.02% and 87.38% reduction in the MAE for the hip and joint angles, respectively, when the proposed MESOISMC is compared with ISMC with both controllers tuned via LMI optimization. The results also indicate that the proposed MESOISMC method is effective and efficient for user comfort and safety during gait rehabilitation training.
Full article
(This article belongs to the Special Issue Reliability Improvement for Acquired Human Signals)
►▼
Show Figures
Figure 1
Open AccessReview
Recent Advances in Time-Sensitive Network Configuration Management: A Literature Review
J. Sens. Actuator Netw. 2023, 12(4), 52; https://doi.org/10.3390/jsan12040052 - 06 Jul 2023
Abstract
At present, many network applications are seeking to implement Time-Sensitive Network (TSN) technology, which not only furnishes communication transmission services that are deterministic, low-latency, highly dependable, and have ample bandwidth, but also enables unified configuration management, permitting different network types to function under
[...] Read more.
At present, many network applications are seeking to implement Time-Sensitive Network (TSN) technology, which not only furnishes communication transmission services that are deterministic, low-latency, highly dependable, and have ample bandwidth, but also enables unified configuration management, permitting different network types to function under a single management system. These characteristics enable it to be widely used in many fields such as industrial sensor and actuator networks, in-vehicle networks, data center networks, and edge computing. Nonetheless, TSN’s configuration management faces numerous difficulties and challenges related to network deployment, automated operation, and maintenance, as well as real-time and safety assurance, rendering it exceedingly intricate. In recent years, some studies have been conducted on TSN configuration management, encompassing various aspects such as system design, key technologies for configuration management, protocol enhancement, and application development. Nevertheless, there is a dearth of systematic summaries of these studies. Hence, this article aims to provide a comprehensive overview of TSN configuration management. Drawing upon more than 70 relevant publications and the pertinent standards established by the IEEE 802.1 TSN working group, we first introduce the system architecture of TSN configuration management from a macro perspective and then explore specific technical details. Additionally, we demonstrate its application scenarios through practical cases and finally highlight the challenges and future research directions. We aspire to provide a comprehensive reference for peers and new researchers interested in TSN configuration management.
Full article
(This article belongs to the Special Issue Protocols, Algorithms and Applications for Time Sensitive Networks)
►▼
Show Figures
Figure 1
Open AccessReview
DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges
J. Sens. Actuator Netw. 2023, 12(4), 51; https://doi.org/10.3390/jsan12040051 - 06 Jul 2023
Abstract
In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent security flaws, the attacks seek
[...] Read more.
In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent security flaws, the attacks seek to deplete the resources of the target network by flooding it with numerous spoofed requests from a distributed system. Research studies have demonstrated that a DDoS attack has a considerable impact on the target network resources and can result in an extended operational outage if not detected. The detection of DDoS attacks has been approached using a variety of methods. In this paper, a comprehensive survey of the methods used for DDoS attack detection on selected internet-enabled networks is presented. This survey aimed to provide a concise introductory reference for early researchers in the development and application of attack detection methodologies in IoT-based applications. Unlike other studies, a wide variety of methods, ranging from the traditional methods to machine and deep learning methods, were covered. These methods were classified based on their nature of operation, investigated as to their strengths and weaknesses, and then examined via several research studies which made use of each approach. In addition, attack scenarios and detection studies in emerging networks such as the internet of drones, routing protocol based IoT, and named data networking were also covered. Furthermore, technical challenges in each research study were identified. Finally, some remarks for enhancing the research studies were provided, and potential directions for future research were highlighted.
Full article
(This article belongs to the Section Communications and Networking)
►▼
Show Figures
Figure 1
Open AccessReview
On Wireless Sensor Network Models: A Cross-Layer Systematic Review
J. Sens. Actuator Netw. 2023, 12(4), 50; https://doi.org/10.3390/jsan12040050 - 30 Jun 2023
Abstract
Wireless sensor networks (WSNs) have been adopted in many fields of application, such as industrial, civil, smart cities, health, and the surveillance domain, to name a few. Fateway and sensor nodes conform to WSN, and each node integrates processor, communication, sensor, and power
[...] Read more.
Wireless sensor networks (WSNs) have been adopted in many fields of application, such as industrial, civil, smart cities, health, and the surveillance domain, to name a few. Fateway and sensor nodes conform to WSN, and each node integrates processor, communication, sensor, and power supply modules, sending and receiving information of a covered area across a propagation medium. Given the increasing complexity of a WSN system, and in an effort to understand, comprehend and analyze an entire WSN, different metrics are used to characterize the performance of the network. To reduce the complexity of the WSN architecture, different approaches and techniques are implemented to capture (model) the properties and behavior of particular aspects of the system. Based on these WSN models, many research works propose solutions to the problem of abstracting and exporting network functionalities and capabilities to the final user. Modeling an entire WSN is a difficult task for researchers since they must consider all of the constraints that affect network metrics, devices and system administration, holistically, and the models developed in different research works are currently focused only on a specific network layer (physical, link, or transport layer), making the estimation of the WSN behavior a very difficult task. In this context, we present a systematic and comprehensive review focused on identifying the existing WSN models, classified into three main areas (node, network, and system-level) and their corresponding challenges. This review summarizes and analyzes the available literature, which allows for the general understanding of WSN modeling in a holistic view, using a proposed taxonomy and consolidating the research trends and open challenges in the area.
Full article
(This article belongs to the Topic Wireless Sensor Networks)
►▼
Show Figures
Figure 1
Open AccessArticle
The Power of Data: How Traffic Demand and Data Analytics Are Driving Network Evolution toward 6G Systems
J. Sens. Actuator Netw. 2023, 12(4), 49; https://doi.org/10.3390/jsan12040049 - 27 Jun 2023
Abstract
The evolution of communication systems always follows data traffic evolution and further influences innovations that are unlocking new markets and services. While 5G deployment is still ongoing in various countries, data-driven considerations (extracted from forecasts at the macroscopic level, detailed analysis of live
[...] Read more.
The evolution of communication systems always follows data traffic evolution and further influences innovations that are unlocking new markets and services. While 5G deployment is still ongoing in various countries, data-driven considerations (extracted from forecasts at the macroscopic level, detailed analysis of live network traffic patterns, and specific measures from terminals) can conveniently feed insights suitable for many purposes (B2B e.g., operator planning and network management; plus also B2C e.g., smarter applications and AI-aided services) in the view of future 6G systems. Moreover, technology trends from standards and research projects (such as Hexa-X) are moving with industry efforts on this evolution. This paper shows the importance of data-driven insights, by first exploring network evolution across the years from a data point of view, and then by using global traffic forecasts complemented by data traffic extractions from a live 5G operator network (statistical network counters and measures from terminals) to draw some considerations on the possible evolution toward 6G. It finally presents a concrete case study showing how data collected from the live network can be exploited to help the design of AI operations and feed QoS predictions.
Full article
(This article belongs to the Special Issue Advancing towards 6G Networks)
►▼
Show Figures
Figure 1
Open AccessSystematic Review
Testbed Facilities for IoT and Wireless Sensor Networks: A Systematic Review
J. Sens. Actuator Netw. 2023, 12(3), 48; https://doi.org/10.3390/jsan12030048 - 15 Jun 2023
Abstract
►▼
Show Figures
As the popularity and complexity of WSN devices and IoT systems are increasing, the testing facilities should keep up. Yet, there is no comprehensive overview of the landscape of the testbed facilities conducted in a systematic manner. In this article, we provide a
[...] Read more.
As the popularity and complexity of WSN devices and IoT systems are increasing, the testing facilities should keep up. Yet, there is no comprehensive overview of the landscape of the testbed facilities conducted in a systematic manner. In this article, we provide a systematic review of the availability and usage of testbed facilities published in scientific literature between 2011 and 2021, including 359 articles about testbeds and identifying 32 testbed facilities. The results of the review revealed what testbed facilities are available and identified several challenges and limitations in the use of the testbed facilities, including a lack of supportive materials and limited focus on debugging capabilities. The main contribution of this article is the description of how different metrics impact the uasge of testbed facilities, the review also highlights the importance of continued research and development in this field to ensure that testbed facilities continue to meet the changing needs of the ever-evolving IoT and WSN domains.
Full article
Figure 1
Open AccessArticle
Characteristic-Mode-Analysis-Based Compact Vase-Shaped Two-Element UWB MIMO Antenna Using a Unique DGS for Wireless Communication
by
, , , , and
J. Sens. Actuator Netw. 2023, 12(3), 47; https://doi.org/10.3390/jsan12030047 - 15 Jun 2023
Cited by 1
Abstract
The modern electronic device antenna poses challenges regarding broader bandwidth and isolation due to its multiple features and seamless user experience. A compact vase-shaped two-port ultrawideband (UWB) antenna is presented in this work. A circular monopole antenna is modified by embedding the multiple
[...] Read more.
The modern electronic device antenna poses challenges regarding broader bandwidth and isolation due to its multiple features and seamless user experience. A compact vase-shaped two-port ultrawideband (UWB) antenna is presented in this work. A circular monopole antenna is modified by embedding the multiple curved segments onto the radiator and rectangular slotted ground plane to develop impedance matching in the broader bandwidth from 4 to 12.1 GHz. The UWB monopole antenna is recreated horizontally with a separation of less than a quarter wavelength of 0.13 λ (λ computed at 4 GHz) to create a UWB multiple input and multiple output (MIMO) antenna with a geometry of 20 × 29 × 1.6 mm3. The isolation in the UWB MIMO antenna is enhanced by inserting an inverted pendulum-shaped parasitic element on the ground plane. This modified ground plane acts as a decoupling structure and provides isolation below 21 dB across the 5–13.5 GHz operating frequency. The proposed UWB MIMO antenna’s significant modes and their contribution to antenna radiation are analyzed by characteristic mode analysis. Further, the proposed antenna is investigated for MIMO diversity features, and its values are found to be ECC < 0.002, DG ≈ 10 dB, TARC < −10 dB, CCL < 0.3 bps/Hz, and MEG < −3 dB. The proposed antenna’s time domain characteristics in different antenna orientations show a group delay of less than 1 ns and a fidelity factor larger than 0.9.
Full article
(This article belongs to the Topic Electronic Communications, IOT and Big Data)
►▼
Show Figures
Figure 1
Open AccessArticle
Exploiting Smart Meter Water Consumption Measurements for Human Activity Event Recognition
J. Sens. Actuator Netw. 2023, 12(3), 46; https://doi.org/10.3390/jsan12030046 - 06 Jun 2023
Abstract
Human activity event recognition (HAER) within a residence is a topic of significant interest in the field of ambient assisted living (AAL). Commonly, various sensors are installed within a residence to enable the monitoring of people. This work presents a new approach for
[...] Read more.
Human activity event recognition (HAER) within a residence is a topic of significant interest in the field of ambient assisted living (AAL). Commonly, various sensors are installed within a residence to enable the monitoring of people. This work presents a new approach for HAER within a residence by (re-)using measurements from commercial smart water meters. Our approach is based on the assumption that changes in water flow within a residence, specifically the transition from no flow to flow above a certain threshold, indicate human activity. Using a separate, labeled evaluation data set from three households that was collected under controlled/laboratory-like conditions, we assess the performance of our HAER method. Our results showed that the approach has a high precision (0.86) and recall (1.00). Within this work, we further recorded a new open data set of water consumption data in 17 German households with a median sample rate of Hz to demonstrate that water flow data are sufficient to detect activity events within a regular daily routine. Overall, this article demonstrates that smart water meter data can be effectively used for HAER within a residence.
Full article
(This article belongs to the Special Issue Smart Cities and Homes: Current Status and Future Possibilities)
►▼
Show Figures
Figure 1
Open AccessArticle
Coordinated PSO-ANFIS-Based 2 MPPT Control of Microgrid with Solar Photovoltaic and Battery Energy Storage System
J. Sens. Actuator Netw. 2023, 12(3), 45; https://doi.org/10.3390/jsan12030045 - 27 May 2023
Abstract
The microgrid is a group of smaller renewable energy sources (REs), which act in a coordinated manner to provide the required amount of active power and additional services when required. This article proposes coordinated power management for a microgrid with the integration of
[...] Read more.
The microgrid is a group of smaller renewable energy sources (REs), which act in a coordinated manner to provide the required amount of active power and additional services when required. This article proposes coordinated power management for a microgrid with the integration of solar PV plants with maximum power point tracking (MPPT) to enhance power generation and conversion using a hybrid MPPT method based on particle swarm optimization-adaptive neuro-fuzzy inference system (PSO-ANFIS) to acquire rapid and maximum PV power along with battery energy storage control to maintain the stable voltage and frequency (V-f) of an isolated microgrid. In addition, it is proposed to provide active and reactive power (P-Q) regulation for the grid connected. The approach used provides more regulation due to the least root mean square error (RMSE), which improves photovoltaic (PV) potential extraction. The comparison results of the PSO-ANFIS and P&O controllers of the MPPT and the controller of the energy storage devices combined with the V-f (or P-Q) controller of the inverter all show effective coordination between the control systems. This is the most important need for contemporary microgrids, considering the potential of changing irradiance in the grid following mode, the grid forming mode under an island scenario, and back-to-grid synchronization. With the test model, the islanded and grid-islanded-grid connected modes are investigated separately. The results demonstrate conclusively that the proposed strategies are effective. To run the simulations, MATLAB and SimPowerSystems are utilized.
Full article
(This article belongs to the Special Issue Smart Cities and Homes: Current Status and Future Possibilities)
►▼
Show Figures
Figure 1
Open AccessArticle
Machine-Learning-Based Ground-Level Mobile Network Coverage Prediction Using UAV Measurements
by
, , , , and
J. Sens. Actuator Netw. 2023, 12(3), 44; https://doi.org/10.3390/jsan12030044 - 26 May 2023
Abstract
Future mobile network operators and telecommunications authorities aim to provide reliable network coverage. Signal strength, normally assessed using standard drive tests over targeted areas, is an important factor strongly linked to user satisfaction. Drive tests are, however, time-consuming, expensive, and can be dangerous
[...] Read more.
Future mobile network operators and telecommunications authorities aim to provide reliable network coverage. Signal strength, normally assessed using standard drive tests over targeted areas, is an important factor strongly linked to user satisfaction. Drive tests are, however, time-consuming, expensive, and can be dangerous in hard-to-reach areas. An alternative safe method involves using drones or unmanned aerial vehicles (UAVs). The objective of this study was to use a drone to measure signal strength at discrete points a few meters above the ground and an artificial neural network (ANN) for processing the measured data and predicting signal strength at ground level. The drone was equipped with low-cost data logging equipment. The ANN was also used to classify specific ground locations in terms of signal coverage into poor, fair, good, and excellent. The data used in training and testing the ANN were collected by a measurement unit attached to a drone in different areas of Sultan Qaboos University campus in Muscat, Oman. A total of 12 locations with different topologies were scanned. The proposed method achieved an accuracy of 97% in predicting the ground level coverage based on measurements taken at higher altitudes. In addition, the performance of the ANN in predicting signal strength at ground level was evaluated using several test scenarios, achieving less than 3% mean square error (MSE). Additionally, data taken at different angles with respect to the vertical were also tested, and the prediction MSE was found to be less than approximately 3% for an angle of 68 degrees. Additionally, outdoor measurements were used to predict indoor coverage with an MSE of less than approximately 6%. Furthermore, in an attempt to find a globally accurate ANN module for the targeted area, all zones’ measurements were cross-tested on ANN modules trained for different zones. It was evaluated that, within the tested scenarios, an MSE of less than approximately 10% can be achieved with an ANN module trained on data from only one zone.
Full article
(This article belongs to the Special Issue Artificial Intelligence of Things and Next Generation Networking)
►▼
Show Figures
Figure 1
Highly Accessed Articles
Latest Books
E-Mail Alert
News
Topics
Topic in
Applied Sciences, BDCC, Computers, Electronics, JSAN, Inventions, Technologies, Telecom
Electronic Communications, IOT and Big Data
Topic Editors: Teen-Hang Meen, Charles Tijus, Cheng-Chien Kuo, Kuei-Shu Hsu, Kuo-Kuang Fan, Jih-Fu TuDeadline: 30 November 2023
Topic in
AI, Electronics, IoT, JSAN, Remote Sensing, Sensors
Machine Learning in Internet of Things
Topic Editors: Dawid Połap, Robertas Damasevicius, Hafiz Tayyab RaufDeadline: 31 December 2023
Topic in
Applied Sciences, Cryptography, JCP, JSAN, Sci, Symmetry
Trends and Prospects in Security, Encryption and Encoding
Topic Editors: Ki-Hyun Jung, Luis Javier García VillalbaDeadline: 29 February 2024
Topic in
Coatings, Electronics, JSAN, Nanomaterials, Sensors
Modeling, Fabrication, and Characterization of Semiconductor Materials and Devices
Topic Editors: Andrei Avram, Ana-Maria Lepadatu, Florin Nastase, Martino AldrigoDeadline: 15 May 2024
Conferences
Special Issues
Special Issue in
JSAN
Internet of Things for Smart Agriculture
Guest Editors: Hossein Anisi, Pelin AnginDeadline: 15 September 2023
Special Issue in
JSAN
Resilience of Sensor Networks: Fundamental and Contextual Perspectives
Guest Editors: Abdallah Makhoul, Jacques Bou AbdoDeadline: 20 October 2023
Special Issue in
JSAN
Advancing towards 6G Networks
Guest Editors: Ayman Radwan, Maria de Fátima Domingues, Abd-Elhamid TahaDeadline: 25 December 2023
Special Issue in
JSAN
Machine-Environment Interaction, Volume II
Guest Editors: Manolo Dulva Hina, Amar Ramdane-CherifDeadline: 30 January 2024