Skip Content
You are currently on the new version of our website. Access the old version .

Journal of Sensor and Actuator Networks, Volume 11, Issue 2

2022 June - 10 articles

Cover Story: The use of electric vehicles (EVs) is almost inevitable for the sake of the environment and our planet’s long-term sustainability. We suggest benefiting from individual EVs that have excess energy and are able to share it with other EVs to maximize the availability of EVCSs without the need to rely on the existing charging infrastructure. In this paper, we propose an efficient privacy-preserving and secure authentication based on elliptic curve Qu–Vanstone (ECQV) for a V2V-charging system that fulfils the essential requirements and re-authentication protocol to reduce the overhead of future authentication processes. The proposed protocols provide efficient security and privacy to EVs, as well as an 88% reduction in computational time through re-authentication compared to earlier efforts. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (10)

  • Article
  • Open Access
2 Citations
3,415 Views
12 Pages

Currently, there are billions of connected devices, and the Internet of Things (IoT) has boosted these numbers. In the case of private networks, a few hundred devices connected can cause instability and even data loss in communication. In this articl...

  • Article
  • Open Access
26 Citations
5,554 Views
26 Pages

The use of Electric Vehicles (EVs) is almost inevitable in the near future for the sake of the environment and our plant’s long-term sustainability. The availability of an Electric-Vehicle-Charging Station (EVCS) is the key challenge that owner...

  • Article
  • Open Access
3,471 Views
15 Pages

The use of heterogeneous networks (HetNets) that combine macrocells and picocells in the same coverage is effective in increasing system capacity and improving user throughput. The use of high carrier frequency bands is also expected to help achievin...

  • Article
  • Open Access
3 Citations
3,115 Views
14 Pages

NOMA Clustering for Improved Multicast IoT Schemes

  • Rajaa Elouafadi,
  • Mohammed Raiss El Fenni and
  • Mustapha Benjillali

In the context of future ultra-dense mobile networks, spectrum and energy efficiencies (SE and EE) are critical measures in designing efficient systems for the sixth-generation (6G) of wireless networks. Recognized for their benefits in increasing SE...

  • Article
  • Open Access
2 Citations
3,361 Views
29 Pages

FOCUSeR: A Fog Online Context-Aware Up-to-Date Sensor Ranking Method

  • Felipe S. Costa,
  • Silvia M. Nassar and
  • Mario A. R. Dantas

Data obtained from sensors connected to wireless sensor networks must be stored and processed to enable environments such as smart cities. However, with the exponential growth in the number of devices at the edge of the network, it is necessary to im...

  • Article
  • Open Access
26 Citations
4,400 Views
17 Pages

MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection

  • Ashraf Ahmad,
  • Yousef AbuHour,
  • Remah Younisse,
  • Yasmeen Alslman,
  • Eman Alnagi and
  • Qasem Abu Al-Haija

Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties. This right is typically protected by law through firm regulations set by healthcare...

  • Article
  • Open Access
10 Citations
3,651 Views
18 Pages

Mobile Ad Hoc Networks (MANETs) are kind of wireless networks where the nodes move in decentralized environments with a highly dynamic infrastructure. Many well-known routing protocols have been proposed, with each having its own design mechanism and...

  • Article
  • Open Access
3 Citations
5,825 Views
13 Pages

Portable IoT Body Temperature Screening System to Combat the Adverse Effects of COVID-19

  • Kisheen Rao Gsangaya,
  • Sami Salama Hussen Hajjaj,
  • Mohamed Thariq Hameed Sultan,
  • Farah Syazwani Shahar and
  • Ain Umaira Md Shah

In managing the COVID-19 pandemic, the Malaysian government enforced mandatory body temperature screening as a rudimentary form of infection detection at the entry points of establishments and public transportation. However, previous iterations of Io...

  • Feature Paper
  • Article
  • Open Access
11 Citations
3,728 Views
14 Pages

Machine Learning models are susceptible to attacks, such as noise, privacy invasion, replay, false data injection, and evasion attacks, which affect their reliability and trustworthiness. Evasion attacks, performed to probe and identify potential ML-...

  • Feature Paper
  • Review
  • Open Access
29 Citations
6,468 Views
36 Pages

Blockchain as IoT Economy Enabler: A Review of Architectural Aspects

  • Diego Pennino,
  • Maurizio Pizzonia,
  • Andrea Vitaletti and
  • Marco Zecchini

In the IoT-based economy, a large number of subjects (companies, public bodies, or private citizens) are willing to buy data or services offered by subjects that provide, operate, or host IoT devices. To support economic transactions in this setting,...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Sens. Actuator Netw. - ISSN 2224-2708