Skip to Content

Journal of Sensor and Actuator Networks, Volume 12, Issue 2

2023 April - 18 articles

Cover Story: We live and work in a world where billions of connected devices enrich our lives and drive technological advancements. As IoT devices have proliferated rapidly, their vulnerabilities and security risks have also increased. We need to address the growing concerns about IoT attacks and security in the wake of IoT becoming an integral part of our everyday lives. A proposed Intrusion Detection System (IDS) using the hybridization of supervised and semi-supervised deep learning techniques to classify network traffic for known and unknown abnormal behaviors in the Internet of Things environment showed promising results. The results of the evaluation show an accuracy detection rate of 98% and 92% when using pre-trained attacks (known traffic) and an accuracy rate of 95% and 87% when predicting untrained attacks for two attack behaviors (unknown traffic). View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (18)

  • Article
  • Open Access
26 Citations
7,934 Views
45 Pages

Privacy in Electronic Health Records (EHR) has become a significant concern in today’s rapidly changing world, particularly for personal and sensitive user data. The sheer volume and sensitive nature of patient records require healthcare provid...

  • Article
  • Open Access
4 Citations
2,595 Views
19 Pages

Camera sensor networks (CSN) have been widely used in different applications such as large building monitoring, social security, and target tracking. With advances in visual and actuator sensor technology in the last few years, deploying mobile camer...

  • Article
  • Open Access
4 Citations
3,851 Views
20 Pages

There are many different fields in which wireless sensor networks (WSNs) can be used such as environmental monitoring, healthcare, military, and security. Due to the vulnerability of WSNs, reliability is a critical concern. Evaluation of a WSN’...

  • Article
  • Open Access
17 Citations
6,483 Views
19 Pages

Enhanced Traffic Sign Recognition with Ensemble Learning

  • Xin Roy Lim,
  • Chin Poo Lee,
  • Kian Ming Lim and
  • Thian Song Ong

With the growing trend in autonomous vehicles, accurate recognition of traffic signs has become crucial. This research focuses on the use of convolutional neural networks for traffic sign classification, specifically utilizing pre-trained models of R...

  • Article
  • Open Access
8 Citations
5,751 Views
25 Pages

Smart Automotive Diagnostic and Performance Analysis Using Blockchain Technology

  • Ahmed Mohsen Yassin,
  • Heba Kamal Aslan and
  • Islam Tharwat Abdel Halim

The automotive industry currently is seeking to increase remote connectivity to a vehicle, which creates a high demand to implement a secure way of connecting vehicles, as well as verifying and storing their data in a trusted way. Furthermore, much i...

  • Article
  • Open Access
11 Citations
5,215 Views
19 Pages

Blockchain, the underlying technology powering the Bitcoin cryptocurrency, is a distributed ledger that creates a distributed consensus on a history of transactions. Cryptocurrency transaction verification takes substantially longer than it does for...

  • Review
  • Open Access
71 Citations
17,279 Views
31 Pages

A Comprehensive Review of IoT Networking Technologies for Smart Home Automation Applications

  • Vasilios A. Orfanos,
  • Stavros D. Kaminaris,
  • Panagiotis Papageorgas,
  • Dimitrios Piromalis and
  • Dionisis Kandris

The expediential increase in Internet communication technologies leads to its expansion to interests beyond computer networks. MEMS (Micro Electro Mechanical Systems) can now be smaller with higher performance, leading to tiny sensors and actuators w...

  • Article
  • Open Access
145 Citations
11,551 Views
19 Pages

Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT

  • Dhiaa Musleh,
  • Meera Alotaibi,
  • Fahd Alhaidari,
  • Atta Rahman and
  • Rami M. Mohammad

With the continuous increase in Internet of Things (IoT) device usage, more interest has been shown in internet security, specifically focusing on protecting these vulnerable devices from malicious traffic. Such threats are difficult to distinguish,...

  • Article
  • Open Access
13 Citations
7,014 Views
18 Pages

Technology plays a crucial role in the management of natural resources in agricultural production. Free and open-source software and sensor technology solutions have the potential to promote more sustainable agricultural production. The goal of this...

  • Article
  • Open Access
17 Citations
6,616 Views
14 Pages

Machine Learning-Based Detection for Unauthorized Access to IoT Devices

  • Malak Aljabri,
  • Amal A. Alahmadi,
  • Rami Mustafa A. Mohammad,
  • Fahd Alhaidari,
  • Menna Aboulnour,
  • Dorieh M. Alomari and
  • Samiha Mirza

The Internet of Things (IoT) has become widely adopted in businesses, organizations, and daily lives. They are usually characterized by transferring and processing sensitive data. Attackers have exploited this prospect of IoT devices to compromise us...

  • Article
  • Open Access
9 Citations
3,352 Views
29 Pages

Recent advancements in Single-Image Super-Resolution (SISR) have explored the network architecture of deep-learning models to achieve a better perceptual quality of super-resolved images. However, the effect of the objective function, which contribut...

  • Editorial
  • Open Access
12 Citations
5,204 Views
4 Pages

Smart Cities and Homes: Current Status and Future Possibilities

  • Subhas Mukhopadhyay and
  • Nagender Kumar Suryadevara

The advancement of sensing technologies, embedded systems, wireless communication technologies, nanomaterials, miniaturization, vision sensing and processing speed have made it possible to develop smart technologies that can generate data seamlessly...

  • Article
  • Open Access
13 Citations
2,733 Views
30 Pages

A Quadruple Notch UWB Antenna with Decagonal Radiator and Sierpinski Square Fractal Slots

  • Om Prakash Kumar,
  • Pramod Kumar,
  • Tanweer Ali,
  • Pradeep Kumar and
  • Subhash B. K

A novel quadruple-notch UWB (ultrawideband) antenna for wireless applications is presented. The antenna consists of a decagonal-shaped radiating part with Sierpinski square fractal slots up to iteration 3. The ground part is truncated and loaded with...

  • Article
  • Open Access
9 Citations
3,581 Views
15 Pages

Automated and Optimized Regression Model for UWB Antenna Design

  • Sameena Pathan,
  • Praveen Kumar,
  • Tanweer Ali and
  • Pradeep Kumar

Antenna design involves continuously optimizing antenna parameters to meet the desired requirements. Since the process is manual, laborious, and time-consuming, a surrogate model based on machine learning provides an effective solution. The conventio...

  • Article
  • Open Access
7 Citations
2,749 Views
16 Pages

Determining Commercial Parking Vacancies Employing Multiple WiFiRSSI Fingerprinting Method

  • Elmer Magsino,
  • Juan Miguel Carlo Barrameda,
  • Andrei Puno,
  • Spencer Ong,
  • Cyrill Siapco and
  • Jolo Vibal

In this study, we implemented a parking occupancy/vacancy detection system (POVD) in a scaled-down model of a parking system for commercial centers by employing multiple WiFi access points. By exploiting the presence of WiFi routers installed in a co...

  • Article
  • Open Access
47 Citations
4,996 Views
25 Pages

Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks

  • Yahya Al Sawafi,
  • Abderezak Touzene and
  • Rachid Hedjam

Internet of things (IoT) has become an emerging technology transforming everyday physical objects to be smarter by using underlying technologies such as sensor networks. The routing protocol for low-power and lossy networks (RPL) is considered one of...

  • Article
  • Open Access
79 Citations
33,757 Views
39 Pages

Telemedicine: A Survey of Telecommunication Technologies, Developments, and Challenges

  • Caroline Omoanatse Alenoghena,
  • Henry Ohiani Ohize,
  • Achonu Oluwole Adejo,
  • Adeiza James Onumanyi,
  • Emmanuel Esebanme Ohihoin,
  • Aliyu Idris Balarabe,
  • Supreme Ayewoh Okoh,
  • Ezra Kolo and
  • Benjamin Alenoghena

The emergence of the COVID-19 pandemic has increased research outputs in telemedicine over the last couple of years. One solution to the COVID-19 pandemic as revealed in literature is to leverage telemedicine for accessing health care remotely. In th...

  • Article
  • Open Access
27 Citations
4,499 Views
27 Pages

Botnet attacks, such as DDoS, are one of the most common types of attacks in IoT networks. A botnet is a collection of cooperated computing machines or Internet of Things gadgets that criminal users manage remotely. Several strategies have been devel...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Sens. Actuator Netw. - ISSN 2224-2708