Skip to Content

Journal of Sensor and Actuator Networks, Volume 11, Issue 3

2022 September - 26 articles

Cover Story: The multi-agent deep reinforcement learning (MADRL) system consists of various clusters of agents. The deep Q-network (DQN) algorithm presents the first cluster's agent structure. The other clusters are considered as an environment of the first cluster's DQN agent. We introduce two novel observations in data transmission, termed on-time and time-delay observations. By considering the distance between the neighboring agents, we present a novel immediate reward function by appending a distance-based reward to the previously utilized reward to improve the MADRL system performance. We consider three types of gradient-based attacks to investigate the robustness of the proposed system data transmission. Two defense methods are proposed to reduce the effects of the malicious attacks. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (26)

  • Article
  • Open Access
17 Citations
3,095 Views
16 Pages

Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks

  • Zaid Ameen Abduljabbar,
  • Vincent Omollo Nyangaresi,
  • Mustafa A. Al Sibahee,
  • Mudhafar Jalil Jassim Ghrabat,
  • Junchao Ma,
  • Iman Qays Abduljaleel and
  • Abdulla J. Y. Aldarwish

Wireless networks have continued to evolve to offer connectivity between users and smart devices such as drones and wireless sensor nodes. In this environment, insecure public channels are deployed to link the users to their remote smart devices. Som...

  • Article
  • Open Access
17 Citations
10,665 Views
18 Pages

Homoglyph Attack Detection Model Using Machine Learning and Hash Function

  • Abdullah M. Almuhaideb,
  • Nida Aslam,
  • Almaha Alabdullatif,
  • Sarah Altamimi,
  • Shooq Alothman,
  • Amnah Alhussain,
  • Waad Aldosari,
  • Shikah J. Alsunaidi and
  • Khalid A. Alissa

Phishing is still a major security threat in cyberspace. In phishing, attackers steal critical information from victims by presenting a spoofing/fake site that appears to be a visual clone of a legitimate site. Several Unicode characters are visually...

  • Article
  • Open Access
1 Citations
2,843 Views
14 Pages

The opportunistic fog radio access network (OF-RAN) expands its offloading computation capacity on-demand by establishing virtual fog access points (v-FAPs), comprising user devices with idle resources recruited opportunistically to execute the offlo...

  • Article
  • Open Access
9 Citations
3,877 Views
23 Pages

A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis

  • Koketso Ntshabele,
  • Bassey Isong,
  • Naison Gasela and
  • Adnan M. Abu-Mahfouz

The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a glob...

  • Article
  • Open Access
2 Citations
4,364 Views
22 Pages

Vehicle to everything (V2X) technology allows the broader development of driving safety, efficiency, and comfort. Because the vehicles can quickly send and receive frequent messages from other vehicles and nearby devices, e.g., cooperative awareness...

  • Review
  • Open Access
38 Citations
13,691 Views
24 Pages

Artificial intelligence is a branch of computer science that attempts to understand the essence of intelligence and produce a new intelligent machine capable of responding in a manner similar to human intelligence. Research in this area includes robo...

  • Article
  • Open Access
12 Citations
4,287 Views
11 Pages

High Resolution-Based Coherent Photonic Radar Sensor for Multiple Target Detections

  • Sushank Chaudhary,
  • Abhishek Sharma,
  • Sunita Khichar,
  • Xuan Tang,
  • Xian Wei and
  • Lunchakorn Wuttisittikulkij

The last decade witnessed remarkable growth in the number of global road accidents. To minimize road accidents, transportation systems need to become more intelligent. Multiple detection of target vehicles under adverse weather conditions is one of t...

  • Article
  • Open Access
14 Citations
5,653 Views
15 Pages

Use of Machine Learning for Early Detection of Knee Osteoarthritis and Quantifying Effectiveness of Treatment Using Force Platform

  • Ashish John Prabhakar,
  • Srikanth Prabhu,
  • Aayush Agrawal,
  • Siddhisa Banerjee,
  • Abraham M. Joshua,
  • Yogeesh Dattakumar Kamat,
  • Gopal Nath and
  • Saptarshi Sengupta

Knee osteoarthritis is one of the most prevalent chronic diseases. It leads to pain, stiffness, decreased participation in activities of daily living and problems with balance recognition. Force platforms have been one of the tools used to analyse ba...

  • Article
  • Open Access
48 Citations
10,845 Views
50 Pages

The rapid development of new information and communication technologies (ICTs) and the deployment of advanced Internet of Things (IoT)-based devices has led to the study and implementation of edge computing technologies in smart grid (SG) systems. In...

  • Communication
  • Open Access
20 Citations
4,342 Views
11 Pages

Molecularly Imprinted Polymer-Based Optical Sensor for Isopropanol Vapor

  • A. K. Pathak,
  • P. Limprapassorn,
  • N. Kongruttanachok and
  • C. Viphavakit

Recent advances have allowed the monitoring of several volatile organic compounds (VOCs) in human exhaled breath, and many of them are being utilized as a biomarker to diagnose several diseases, including diabetes. Among several VOCs, isopropanol (IP...

  • Article
  • Open Access
6 Citations
3,836 Views
25 Pages

This paper studies the gradient-based adversarial attacks on cluster-based, heterogeneous, multi-agent, deep reinforcement learning (MADRL) systems with time-delayed data transmission. The structure of the MADRL system consists of various clusters of...

  • Article
  • Open Access
14 Citations
4,503 Views
27 Pages

Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services. TMIS uses wearable devices with sensors to collect patients’ data and transmit the data to...

  • Feature Paper
  • Review
  • Open Access
7 Citations
4,012 Views
23 Pages

Over the past decade, new technologies have driven the rise of what is being termed as the fourth industrial revolution. The introduction of this new revolution is amalgamating the cyber and physical worlds, bringing with it many benefits, such as th...

  • Article
  • Open Access
5 Citations
3,611 Views
19 Pages

Location prediction in an indoor environment is a challenge, and this has been a research trend for recent years, with many potential applications. In this paper, machine-learning-based regression algorithms and Received Signal Strength Indicator (RS...

  • Article
  • Open Access
3 Citations
3,977 Views
17 Pages

Global IoT Mobility: A Path Based Forwarding Approach

  • Mohammed Al-Khalidi,
  • Rabab Al-Zaidi,
  • Ahmed M. Abubahia,
  • Hari Mohan Pandey,
  • Md Israfil Biswas and
  • Mohammad Hammoudeh

With the huge proliferation of mobile Internet of Things (IoT) devices such as connected vehicles, drones, and healthcare wearables, IoT networks are promising mobile connectivity capacity far beyond the conventional computing platforms. The success...

  • Article
  • Open Access
7 Citations
8,213 Views
19 Pages

Multi-Camera Extrinsic Calibration for Real-Time Tracking in Large Outdoor Environments

  • Paolo Tripicchio,
  • Salvatore D’Avella,
  • Gerardo Camacho-Gonzalez,
  • Lorenzo Landolfi,
  • Gabriele Baris,
  • Carlo Alberto Avizzano and
  • Alessandro Filippeschi

Calibrating intrinsic and extrinsic camera parameters is a fundamental problem that is a preliminary task for a wide variety of applications, from robotics to computer vision to surveillance and industrial tasks. With the advent of Internet of Things...

  • Review
  • Open Access
17 Citations
6,435 Views
18 Pages

Decentralized Blockchain-Based IoT Data Marketplaces

  • John Christidis,
  • Panagiotis A. Karkazis,
  • Pericles Papadopoulos and
  • Helen C. (Nelly) Leligou

In present times, the largest amount of data is being controlled in a centralized manner. However, as the data are in essence the fuel of any application and service, there is a need to make the data more findable and accessible. Another problem with...

  • Article
  • Open Access
71 Citations
7,887 Views
15 Pages

Safety, Security and Privacy in Machine Learning Based Internet of Things

  • Ghulam Abbas,
  • Amjad Mehmood,
  • Maple Carsten,
  • Gregory Epiphaniou and
  • Jaime Lloret

Recent developments in communication and information technologies, especially in the internet of things (IoT), have greatly changed and improved the human lifestyle. Due to the easy access to, and increasing demand for, smart devices, the IoT system...

  • Article
  • Open Access
16 Citations
3,602 Views
15 Pages

Day by day, the demand for wireless systems is increasing while the available spectrum resources are not sufficient. To fulfil the demand for wireless systems, the spectrum hole (spectrum vacant) should be found and utilised very effectively. Cogniti...

  • Article
  • Open Access
5 Citations
3,629 Views
23 Pages

The increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous veh...

  • Article
  • Open Access
12 Citations
4,545 Views
48 Pages

A Trust-Influenced Smart Grid: A Survey and a Proposal

  • Kwasi Boakye-Boateng,
  • Ali A. Ghorbani and
  • Arash Habibi Lashkari

A compromised Smart Grid, or its components, can have cascading effects that can affect lives. This has led to numerous cybersecurity-centric studies focusing on the Smart Grid in research areas such as encryption, intrusion detection and prevention,...

  • Article
  • Open Access
20 Citations
4,807 Views
15 Pages

Smart Hospitals and IoT Sensors: Why Is QoS Essential Here?

  • Vinicius Facco Rodrigues,
  • Rodrigo da Rosa Righi,
  • Cristiano André da Costa and
  • Rodolfo Stoffel Antunes

Background: the increasing adoption of smart and wearable sensors in the healthcare domain empowers the development of cutting-edge medical applications. Smart hospitals can employ sensors and applications for critical decision-making based on real-t...

  • Article
  • Open Access
65 Citations
6,457 Views
14 Pages

Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things

  • Kuburat Oyeranti Adefemi Alimi,
  • Khmaies Ouahada,
  • Adnan M. Abu-Mahfouz,
  • Suvendi Rimer and
  • Oyeniyi Akeem Alimi

The Internet of Things (IoT) is a promising technology that allows numerous devices to be connected for ease of communication. The heterogeneity and ubiquity of the various connected devices, openness to devices in the network, and, importantly, the...

  • Article
  • Open Access
14 Citations
5,381 Views
22 Pages

An Efficient Gait Abnormality Detection Method Based on Classification

  • Darshan Jani,
  • Vijayakumar Varadarajan,
  • Rushirajsinh Parmar,
  • Mohammed Husain Bohara,
  • Dweepna Garg,
  • Amit Ganatra and
  • Ketan Kotecha

In the study of human mobility, gait analysis is a well-recognized assessment methodology. Despite its widespread use, doubts exist about its clinical utility, i.e., its potential to influence the diagnostic-therapeutic practice. Gait analysis evalua...

  • Review
  • Open Access
39 Citations
15,148 Views
20 Pages

Industry 4.0 and Marketing: Towards an Integrated Future Research Agenda

  • Albérico Travassos Rosário and
  • Joana Carmo Dias

Industry 4.0, or the Fourth Industrial Revolution, is driven by innovative technologies that have profound effects on both production systems and business models. This revolution is characterized by the addition of disruptive technologies and methods...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Sens. Actuator Netw. - ISSN 2224-2708