Next Issue
Previous Issue

Table of Contents

J. Sens. Actuator Netw., Volume 5, Issue 2 (June 2016)

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Readerexternal link to open them.
View options order results:
result details:
Displaying articles 1-5
Export citation of selected articles as:
Open AccessArticle
A Privacy-by-Design Contextual Suggestion System for Tourism
J. Sens. Actuator Netw. 2016, 5(2), 10; https://doi.org/10.3390/jsan5020010
Received: 21 December 2015 / Revised: 21 April 2016 / Accepted: 22 April 2016 / Published: 5 May 2016
Cited by 2 | Viewed by 5028 | PDF Full-text (6032 KB) | HTML Full-text | XML Full-text
Abstract
We focus on personal data generated by the sensors and through the everyday usage of smart devices and take advantage of these data to build a non-invasive contextual suggestion system for tourism. The system, which we call Pythia, exploits the computational capabilities of [...] Read more.
We focus on personal data generated by the sensors and through the everyday usage of smart devices and take advantage of these data to build a non-invasive contextual suggestion system for tourism. The system, which we call Pythia, exploits the computational capabilities of modern smart devices to offer high quality personalized POI (point of interest) recommendations. To protect user privacy, we apply a privacy by design approach within all of the steps of creating Pythia. The outcome is a system that comprises important architectural and operational innovations. The system is designed to process sensitive personal data, such as location traces, browsing history and web searches (query logs), to automatically infer user preferences and build corresponding POI-based user profiles. These profiles are then used by a contextual suggestion engine to anticipate user choices and make POI recommendations for tourists. Privacy leaks are minimized by implementing an important part of the system functionality at the user side, either as a mobile app or as a client-side web application, and by taking additional precautions, like data generalization, wherever necessary. As a proof of concept, we present a prototype that implements the aforementioned mechanisms on the Android platform accompanied with certain web applications. Even though the current prototype focuses only on location data, the results from the evaluation of the contextual suggestion algorithms and the user experience feedback from volunteers who used the prototype are very positive. Full article
(This article belongs to the Special Issue Techno-Human Collective Systems for Smart Cities Innovation)
Figures

Figure 1

Open AccessArticle
Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids
J. Sens. Actuator Netw. 2016, 5(2), 9; https://doi.org/10.3390/jsan5020009
Received: 1 January 2016 / Revised: 20 April 2016 / Accepted: 22 April 2016 / Published: 4 May 2016
Viewed by 4331 | PDF Full-text (4757 KB) | HTML Full-text | XML Full-text
Abstract
A Neighbourhood Area Network is a functional component of the Smart Grid that interconnects the end user domain with the Energy Services Provider (ESP) domain. It forms the “edge” of the provider network, interconnecting homes instrumented with Smart Meters (SM) with the ESP. [...] Read more.
A Neighbourhood Area Network is a functional component of the Smart Grid that interconnects the end user domain with the Energy Services Provider (ESP) domain. It forms the “edge” of the provider network, interconnecting homes instrumented with Smart Meters (SM) with the ESP. The SM is a dual interface, wireless communication device through which information is transacted across the user (a home) and ESP domains. The security risk to the ESP increases since the components within the home, interconnected to the ESP via the SM, are not managed by the ESP. Secure operation of the SM is a necessary requirement. The SM should be resilient to attacks, which might be targeted either directly or via the network in the home. This paper presents and discusses a security scheme for groups of SMs in a Neighbourhood Area Network that enable entire groups to authenticate themselves, rather than one at a time. The results show that a significant improvement in terms of resilience against node capture attacks, replay attacks, confidentiality, authentication for groups of SMs in a NAN that enable entire groups to authenticate themselves, rather than one at a time. Full article
(This article belongs to the Special Issue Wireless Sensor Networks for Smart Grid and Smart City Applications)
Figures

Figure 1

Open AccessArticle
Data Dissemination in Mobile Social Networks with the Acknowledgment Feedback
J. Sens. Actuator Netw. 2016, 5(2), 8; https://doi.org/10.3390/jsan5020008
Received: 15 March 2016 / Revised: 8 April 2016 / Accepted: 11 April 2016 / Published: 22 April 2016
Viewed by 3706 | PDF Full-text (749 KB) | HTML Full-text | XML Full-text
Abstract
Most existing dissemination schemes in Mobile Social Networks (MSNs) only consider the data dissemination. However, there are two types of messages: data and the control message (i.e., acknowledgment) in MSNs, and receiving acknowledgment is very important in many applications (e.g., the [...] Read more.
Most existing dissemination schemes in Mobile Social Networks (MSNs) only consider the data dissemination. However, there are two types of messages: data and the control message (i.e., acknowledgment) in MSNs, and receiving acknowledgment is very important in many applications (e.g., the mobile trade and the incentive mechanism). In order to maximize the desired message delivery ratio, we have to identify the priority of each message in the network during the limited contact opportunity. Therefore, we propose a generic priority-based compare-split routing scheme, which proves to be the optimal buffer exchange strategy. During each contact opportunity, relays compare their forwarding abilities to different destinations based on two types of criteria: the contact probability and the social status. Ideally, each relay keeps the messages whose destinations meet the current relay frequently. Then, an adaptive priority-based exchange scheme, which considers the priority within each type of messages and the relative priority between two types of messages, is proposed to exchange the most benefit messages. The effectiveness of our scheme is verified through extensive simulations in synthetic and real traces. Full article
Figures

Figure 1

Open AccessArticle
Business Model Design and Architecture for the Internet of Everything
J. Sens. Actuator Netw. 2016, 5(2), 7; https://doi.org/10.3390/jsan5020007
Received: 8 January 2016 / Revised: 23 March 2016 / Accepted: 25 March 2016 / Published: 2 April 2016
Cited by 7 | Viewed by 5803 | PDF Full-text (946 KB) | HTML Full-text | XML Full-text
Abstract
Smart devices and cyber-physical systems, which are interconnected to IT systems and services, form the basis for the arising Internet of Everything, opening up new economic opportunities for its participants and users beyond its technological aspects and challenges. While today’s e-business scenarios are [...] Read more.
Smart devices and cyber-physical systems, which are interconnected to IT systems and services, form the basis for the arising Internet of Everything, opening up new economic opportunities for its participants and users beyond its technological aspects and challenges. While today’s e-business scenarios are mostly dominated by a few centralized online platforms, future business models, which will be feasible for the Internet of Everything, need to address special requirements. Such business models, e.g., leveraging the possibilities of smart cities, need to cope with arbitrary combinations of products and services orchestrated into complex products in a highly distributed and dynamic environment. Furthermore, these arbitrary combinations are influenced by real-time context information derived from sensor networks or IT systems, as well as the users’ requirements and preferences. The complexity of finding the optimal product/service combination overstrains users and leads to decisions according to the principle of adverse selection (i.e., choosing good enough instead of optimal). Such e-business models require an appropriate underlying value generation architecture that supports users in this process. In this paper, we develop a business model that addresses these problems. In addition, we present the Distributed Market Spaces (DMS) software-system architecture as a possible implementation, which enables the aforementioned decentralized and context-centric e-business scenario and leverages the commercial possibilities of smart cities. Full article
(This article belongs to the Special Issue Techno-Human Collective Systems for Smart Cities Innovation)
Figures

Figure 1

Open AccessArticle
Routing Protocols for Delay Tolerant Networks: A Reference Architecture and a Thorough Quantitative Evaluation
J. Sens. Actuator Netw. 2016, 5(2), 6; https://doi.org/10.3390/jsan5020006
Received: 12 January 2016 / Revised: 19 March 2016 / Accepted: 21 March 2016 / Published: 29 March 2016
Cited by 3 | Viewed by 4244 | PDF Full-text (659 KB) | HTML Full-text | XML Full-text
Abstract
In this paper, we propose a reference architecture for Delay-Tolerant Networking (DTN) routing protocols and a thorough quantitative evaluation of many protocols proposed in the literature. We categorize DTN protocols according to their use of the three techniques that are the key elements [...] Read more.
In this paper, we propose a reference architecture for Delay-Tolerant Networking (DTN) routing protocols and a thorough quantitative evaluation of many protocols proposed in the literature. We categorize DTN protocols according to their use of the three techniques that are the key elements of our reference architecture: queue management, forwarding and replication. Queue management orders and manages the messages in the node’s buffer; forwarding selects the messages to be delivered when there is a contact; and finally, replication bounds the number of replicas in the network. Contrary to most previous papers, where either only qualitative comparisons have been presented or only a single category of protocols has been analyzed, in our work, we discuss the results of our experimental activity on many of the DTN protocols in the literature. Our results, which have been obtained both using synthetic and real mobility traces, show that an effective combination of the proposed techniques can significantly improve the performance of the protocols in terms of delivery ratio, overhead and delay. Full article
(This article belongs to the Special Issue Techno-Human Collective Systems for Smart Cities Innovation)
Figures

Figure 1

J. Sens. Actuator Netw. EISSN 2224-2708 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top