Journal Description
Journal of Sensor and Actuator Networks
Journal of Sensor and Actuator Networks
is an international, peer-reviewed, open access journal on the science and technology of sensor and actuator networks, published quarterly online by MDPI.
- Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions.
- High Visibility: indexed within Scopus, ESCI (Web of Science), dblp, Inspec, and many other databases.
- Journal Rank: CiteScore - Q1 (Instrumentation)
- Rapid Publication: manuscripts are peer-reviewed and a first decision provided to authors approximately 19.7 days after submission; acceptance to publication is undertaken in 7 days (median values for papers published in this journal in the second half of 2021).
- Recognition of Reviewers: reviewers who provide timely, thorough peer-review reports receive vouchers entitling them to a discount on the APC of their next publication in any MDPI journal, in appreciation of the work done.
Latest Articles
NOMA Clustering for Improved Multicast IoT Schemes
J. Sens. Actuator Netw. 2022, 11(2), 26; https://doi.org/10.3390/jsan11020026 - 23 May 2022
Abstract
►
Show Figures
In the context of future ultra-dense mobile networks, spectrum and energy efficiencies (SE and EE) are critical measures in designing efficient systems for the sixth-generation (6G) of wireless networks. Recognized for their benefits in increasing SE and EE, non-orthogonal multiple access (NOMA) and
[...] Read more.
In the context of future ultra-dense mobile networks, spectrum and energy efficiencies (SE and EE) are critical measures in designing efficient systems for the sixth-generation (6G) of wireless networks. Recognized for their benefits in increasing SE and EE, non-orthogonal multiple access (NOMA) and device-to-device (D2D) communications are combined in this work to present a new NOMA-based D2D scheme increasing the performance in terms of SE and EE. The users in the proposed scheme are split into coalitions. Coalition heads are served in NOMA directly from the base stations, while the other users within the coalitions get the service through D2D links. We investigate the system’s SE and EE for different mobility patterns, and we discuss optimal system configurations with the help of Monte Carlo simulations. The obtained results show that the proposed system exhibits a better performance compared to conventional OMA and NOMA models, especially in low mobility contexts.
Full article
Open AccessArticle
FOCUSeR: A Fog Online Context-Aware Up-to-Date Sensor Ranking Method
J. Sens. Actuator Netw. 2022, 11(2), 25; https://doi.org/10.3390/jsan11020025 - 17 May 2022
Abstract
Data obtained from sensors connected to wireless sensor networks must be stored and processed to enable environments such as smart cities. However, with the exponential growth in the number of devices at the edge of the network, it is necessary to implement robust
[...] Read more.
Data obtained from sensors connected to wireless sensor networks must be stored and processed to enable environments such as smart cities. However, with the exponential growth in the number of devices at the edge of the network, it is necessary to implement robust techniques, capable of selecting reliable data sources and meeting low latency requirements, in order to serve critical applications. Thus, to overcome these challenges, this research work presents FOCUSeR, a method for ranking sensors. The method uses the evaluation of data as a criterion for the ranking, allowing us to identify occurrences of failures in sensors and anomalies in environments. In order to meet the requirements inherent to WSNs, the proposed method was developed to run in a fog computing environment, using online learning and constant updating over time to avoid effects such as time drift. The generated ranking lists are managed through distributed hash tables. To provide reliability to the experimental results, a real experimental environment was developed. Moreover, using this developed testbed, a dataset with labels was created, to support the evaluation of the method. In addition, four other real datasets were used, three of which were labeled through artificial fault injection. These datasets were labeled in a related work that focused on injecting artificial faults. The experimental results obtained demonstrate that the proposed approach can provide reliability in the use of sensor data, using low computational resources and reducing latency in the sensor selection process. Precision rates are approximately 98% and Accuracy rates are greater than 94% across all datasets. In addition, the analyses carried out show that the Accuracy has an increasing rate as the number of samples also increases. Results obtained in the failure data recovery also demonstrate the feasibility of the proposal in this resource.
Full article
(This article belongs to the Section Big Data, Computing and Artificial Intelligence)
►▼
Show Figures

Figure 1
Open AccessArticle
MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection
by
, , , , and
J. Sens. Actuator Netw. 2022, 11(2), 24; https://doi.org/10.3390/jsan11020024 - 13 May 2022
Abstract
Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties. This right is typically protected by law through firm regulations set by healthcare authorities. However, sensitive-private data usually requires the
[...] Read more.
Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties. This right is typically protected by law through firm regulations set by healthcare authorities. However, sensitive-private data usually requires the application of further security and privacy mechanisms such as encipherment (encryption) techniques. ’Medical images’ is one such example of highly demanding security and privacy standards. This is due to the quality and nature of the information carried among these images, which are usually sensitive-private information with few features and tonal variety. Hence, several state-of-the-art encryption mechanisms for medical images have been proposed and developed; however, only a few were efficient and promising. This paper presents a hybrid crypto-algorithm, MID-Crypt, to secure the medical image communicated between medical laboratories and doctors’ accounts. MID-Crypt is designed to efficiently hide medical image features and provide high-security standards. Specifically, MID-Crypt uses a mix of Elliptic-curve Diffie–Hellman (ECDH) for image masking and Advanced Encryption Standard (AES) with updatable keys for image encryption. Besides, a key management module is used to organize the public and private keys, the patient’s digital signature provides authenticity, and integrity is guaranteed by using the Merkle tree. Also, we evaluated our proposed algorithm in terms of several performance indicators including, peak signal-to-noise ratio (PSNR) analysis, correlation analysis, entropy analysis, histogram analysis, and timing analysis. Consequently, our empirical results revealed the superiority of MID-Crypt scoring the best performance values for PSNR, correlation, entropy, and encryption overhead. Finally, we compared the security measures for the MID-Crypt algorithm with other studies, the comparison revealed the distinguishable security against several common attacks such as side-channel attacks (SCA), differential attacks, man-in-the-middle attacks (MITM), and algebraic attacks.
Full article
(This article belongs to the Section Network Security and Privacy)
►▼
Show Figures

Figure 1
Open AccessArticle
A Mathematical-Based Model for Estimating the Path Duration of the DSDV Routing Protocol in MANETs
J. Sens. Actuator Netw. 2022, 11(2), 23; https://doi.org/10.3390/jsan11020023 - 12 May 2022
Abstract
Mobile Ad Hoc Networks (MANETs) are kind of wireless networks where the nodes move in decentralized environments with a highly dynamic infrastructure. Many well-known routing protocols have been proposed, with each having its own design mechanism and its own strengths and weaknesses and
[...] Read more.
Mobile Ad Hoc Networks (MANETs) are kind of wireless networks where the nodes move in decentralized environments with a highly dynamic infrastructure. Many well-known routing protocols have been proposed, with each having its own design mechanism and its own strengths and weaknesses and most importantly, each protocol being mainly designed for specific applications and scenarios. Most of the research studies in this field used simulation testbeds to analyze routing protocols. Very few contributions suggested the use of analytical studies and mathematical approaches to model some of the existing routing protocols. In this research, we have built a comprehensive mathematical-based model to analyze the Destination-Sequenced Distance Vector protocol (DSDV), one of the main widely deployed proactive protocols and studied its performance on estimating the path duration based on the concepts of the probability density function and the expected values to find the best approximation values in real scenarios. We have tested the validity of the proposed model using simulation scenarios implemented by the Network Simulator tool (NS3). The results extracted from both the mathematical model and the simulation have shown that the path duration is inversely proportional to both the speed of the node and the hop count. Furthermore, it had shown that the path duration estimated from the DSDV protocol is less than the actual path duration, due to the implementation of the settling time concept and keeping the “periodic routes’ update” parameter at a constant level, despite the fact that the node’s speed reduces the effective path utilization.
Full article
(This article belongs to the Topic Wireless Sensor Networks)
►▼
Show Figures

Figure 1
Open AccessArticle
Portable IoT Body Temperature Screening System to Combat the Adverse Effects of COVID-19
by
, , , and
J. Sens. Actuator Netw. 2022, 11(2), 22; https://doi.org/10.3390/jsan11020022 - 21 Apr 2022
Abstract
►▼
Show Figures
In managing the COVID-19 pandemic, the Malaysian government enforced mandatory body temperature screening as a rudimentary form of infection detection at the entry points of establishments and public transportation. However, previous iterations of IoT body temperature screening systems were bulky, fragile, expensive, and
[...] Read more.
In managing the COVID-19 pandemic, the Malaysian government enforced mandatory body temperature screening as a rudimentary form of infection detection at the entry points of establishments and public transportation. However, previous iterations of IoT body temperature screening systems were bulky, fragile, expensive, and designed for personal use instead of the screening of many people. Therefore, a standalone, portable, and rugged IoT-enabled body temperature screening system for detecting elevated temperatures was developed in this research work. This system uses a proximity sensor to detect subjects and determine their body temperature using a non-contact temperature sensor. Body temperature data is displayed on the device and uploaded over a Wi-Fi network to a cloud server for data storage and analysis. From the cloud server, body temperature information is retrieved and displayed on the Blynk IoT client dashboard for remote monitoring. The device also provides alerts for body temperatures above 37.5 °C. The prototype system performed impressively during the assessment. Body temperature readings were impressively accurate compared to a medical-grade non-contact thermometer, with an average variance of less than 1%. Additionally, the system was highly reliable, with a 100% IoT data broadcast success rate.
Full article

Figure 1
Open AccessFeature PaperArticle
Sensitivity of Machine Learning Approaches to Fake and Untrusted Data in Healthcare Domain
J. Sens. Actuator Netw. 2022, 11(2), 21; https://doi.org/10.3390/jsan11020021 - 30 Mar 2022
Abstract
Machine Learning models are susceptible to attacks, such as noise, privacy invasion, replay, false data injection, and evasion attacks, which affect their reliability and trustworthiness. Evasion attacks, performed to probe and identify potential ML-trained models’ vulnerabilities, and poisoning attacks, performed to obtain skewed
[...] Read more.
Machine Learning models are susceptible to attacks, such as noise, privacy invasion, replay, false data injection, and evasion attacks, which affect their reliability and trustworthiness. Evasion attacks, performed to probe and identify potential ML-trained models’ vulnerabilities, and poisoning attacks, performed to obtain skewed models whose behavior could be driven when specific inputs are submitted, represent a severe and open issue to face in order to assure security and reliability to critical domains and systems that rely on ML-based or other AI solutions, such as healthcare and justice, for example. In this study, we aimed to perform a comprehensive analysis of the sensitivity of Artificial Intelligence approaches to corrupted data in order to evaluate their reliability and resilience. These systems need to be able to understand what is wrong, figure out how to overcome the resulting problems, and then leverage what they have learned to overcome those challenges and improve their robustness. The main research goal pursued was the evaluation of the sensitivity and responsiveness of Artificial Intelligence algorithms to poisoned signals by comparing several models solicited with both trusted and corrupted data. A case study from the healthcare domain was provided to support the pursued analyses. The results achieved with the experimental campaign were evaluated in terms of accuracy, specificity, sensitivity, F1-score, and ROC area.
Full article
(This article belongs to the Special Issue Wireless Sensors Networks and Artificial Intelligence for Intelligent Health Monitoring)
Open AccessFeature PaperReview
Blockchain as IoT Economy Enabler: A Review of Architectural Aspects
J. Sens. Actuator Netw. 2022, 11(2), 20; https://doi.org/10.3390/jsan11020020 - 29 Mar 2022
Abstract
In the IoT-based economy, a large number of subjects (companies, public bodies, or private citizens) are willing to buy data or services offered by subjects that provide, operate, or host IoT devices. To support economic transactions in this setting, and to pave the
[...] Read more.
In the IoT-based economy, a large number of subjects (companies, public bodies, or private citizens) are willing to buy data or services offered by subjects that provide, operate, or host IoT devices. To support economic transactions in this setting, and to pave the way for the implementation of decentralized algorithmic governance powered by smart contracts, the adoption of the blockchain has been proposed both in scientific literature and in actual projects. The blockchain technology promises a decentralized payment system independent of (and possibly cheaper than) conventional electronic payment systems. However, there are a number of aspects that need to be considered for an effective IoT–blockchain integration. In this review paper, we start from a number of real IoT projects and applications that (may) take advantage of blockchain technology to support economic transactions. We provide a reasoned review of several architectural choices in light of typical requirements of those applications and discuss their impact on transaction throughput, latency, costs, limits on ecosystem growth, and so on. We also provide a survey of additional financial tools that a blockchain can potentially bring to an IoT ecosystem, with their architectural impact. In the end, we observe that there are very few examples of IoT projects that fully exploit the potential of the blockchain. We conclude with a discussion of open problems and future research directions to make blockchain adoption easier and more effective for supporting an IoT economy.
Full article
(This article belongs to the Special Issue Journal of Sensor and Actuator Networks: 10th Year Anniversary)
►▼
Show Figures

Figure 1
Open AccessReview
Wearable Sensors for Vital Signs Measurement: A Survey
J. Sens. Actuator Netw. 2022, 11(1), 19; https://doi.org/10.3390/jsan11010019 - 11 Mar 2022
Abstract
With the outbreak of coronavirus disease-2019 (COVID-19) worldwide, developments in the medical field have aroused concerns within society. As science and technology develop, wearable medical sensors have become the main means of medical data acquisition. To analyze the intelligent development status of wearable
[...] Read more.
With the outbreak of coronavirus disease-2019 (COVID-19) worldwide, developments in the medical field have aroused concerns within society. As science and technology develop, wearable medical sensors have become the main means of medical data acquisition. To analyze the intelligent development status of wearable medical sensors, the current work classifies and prospects the application status and functions of wireless communication wearable medical sensors, based on human physiological data acquisition in the medical field. By understanding its working principles, data acquisition modes and action modes, the work chiefly analyzes the application of wearable medical sensors in vascular infarction, respiratory intensity, body temperature, blood oxygen concentration, and sleep detection, and reflects the key role of wearable medical sensors in human physiological data acquisition. Further exploration and prospecting are made by investigating the improvement of information security performance of wearable medical sensors, the improvement of biological adaptability and biodegradability of new materials, and the integration of wearable medical sensors and intelligence-assisted rehabilitation. The research expects to provide a reference for the intelligent development of wearable medical sensors and real-time monitoring of human health in the follow-up medical field.
Full article
(This article belongs to the Section Network Services and Applications)
►▼
Show Figures

Figure 1
Open AccessArticle
ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks
J. Sens. Actuator Netw. 2022, 11(1), 18; https://doi.org/10.3390/jsan11010018 - 09 Mar 2022
Cited by 1
Abstract
Due to the prompt expansion and development of intelligent systems and autonomous, energy-aware sensing devices, the Internet of Things (IoT) has remarkably grown and obstructed nearly all applications in our daily life. However, constraints in computation, storage, and communication capabilities of IoT devices
[...] Read more.
Due to the prompt expansion and development of intelligent systems and autonomous, energy-aware sensing devices, the Internet of Things (IoT) has remarkably grown and obstructed nearly all applications in our daily life. However, constraints in computation, storage, and communication capabilities of IoT devices has led to an increase in IoT-based botnet attacks. To mitigate this threat, there is a need for a lightweight and anomaly-based detection system that can build profiles for normal and malicious activities over IoT networks. In this paper, we propose an ensemble learning model for botnet attack detection in IoT networks called ELBA-IoT that profiles behavior features of IoT networks and uses ensemble learning to identify anomalous network traffic from compromised IoT devices. In addition, our IoT-based botnet detection approach characterizes the evaluation of three different machine learning techniques that belong to decision tree techniques (AdaBoosted, RUSBoosted, and bagged). To evaluate ELBA-IoT, we used the N-BaIoT-2021 dataset, which comprises records of both normal IoT network traffic and botnet attack traffic of infected IoT devices. The experimental results demonstrate that our proposed ELBA-IoT can detect the botnet attacks launched from the compromised IoT devices with high detection accuracy (99.6%) and low inference overhead (40 µ-seconds). We also contrast ELBA-IoT results with other state-of-the-art results and demonstrate that ELBA-IoT is superior.
Full article
(This article belongs to the Section Network Services and Applications)
►▼
Show Figures

Figure 1
Open AccessReview
Bio-Signals in Medical Applications and Challenges Using Artificial Intelligence
by
, , , and
J. Sens. Actuator Netw. 2022, 11(1), 17; https://doi.org/10.3390/jsan11010017 - 25 Feb 2022
Cited by 1
Abstract
►▼
Show Figures
Artificial Intelligence (AI) has broadly connected the medical field at various levels of diagnosis based on the congruous data generated. Different types of bio-signal can be used to monitor a patient’s condition and in decision making. Medical equipment uses signals to communicate information
[...] Read more.
Artificial Intelligence (AI) has broadly connected the medical field at various levels of diagnosis based on the congruous data generated. Different types of bio-signal can be used to monitor a patient’s condition and in decision making. Medical equipment uses signals to communicate information to care staff. AI algorithms and approaches will help to predict health problems and check the health status of organs, while AI prediction, classification, and regression algorithms are helping the medical industry to protect from health hazards. The early prediction and detection of health conditions will guide people to stay healthy. This paper represents the scope of bio-signals using AI in the medical area. It will illustrate possible case studies relevant to bio-signals generated through IoT sensors. The bio-signals that retrospectively occur are discussed, and the new challenges of medical diagnosis using bio-signals are identified.
Full article

Figure 1
Open AccessArticle
Combining 10 Matrix Pressure Sensor to Read Human Body’s Pressure in Sleeping Position in Relation with Decubitus Patients
J. Sens. Actuator Netw. 2022, 11(1), 16; https://doi.org/10.3390/jsan11010016 - 25 Feb 2022
Abstract
This work uses piezoresistive matrix pressure sensors to map the human body’s pressure profile in a sleeping position. This study aims to detect the area with the highest pressure, to visualize the pressure profile into a heatmap, and to reduce decubitus by alerting
[...] Read more.
This work uses piezoresistive matrix pressure sensors to map the human body’s pressure profile in a sleeping position. This study aims to detect the area with the highest pressure, to visualize the pressure profile into a heatmap, and to reduce decubitus by alerting the subject to changes in position. This research combines ten matrix pressure sensors to read a larger area. This work uses a Raspberry Pi 4 Model B with 8 GB memory as the data processor, and every sensor sheet uses ATMEGA 2560 as the sensor controller for data acquisition. Sensor calibration is necessary because each output must have the same value for the same weight value; the accuracy between different sensors is around 95%. After the calibration process, the output data must be smoothed to make visual representations more distinguishable. The areas with the highest pressure are the heel, tailbone, back, and head. When the subject’s weight increases, pressure on the tailbone and back increases, but that on the heel and head does not. The results of this research can be used to monitor people’s sleeping positions so that they can reduce the risk of decubitus.
Full article
(This article belongs to the Topic Wireless Sensor Networks)
►▼
Show Figures

Figure 1
Open AccessFeature PaperArticle
A Novel Road Maintenance Prioritisation System Based on Computer Vision and Crowdsourced Reporting
J. Sens. Actuator Netw. 2022, 11(1), 15; https://doi.org/10.3390/jsan11010015 - 14 Feb 2022
Abstract
The maintenance of critical infrastructure is a costly necessity that developing countries often struggle to deliver timely repairs. The transport system acts as the arteries of any economy in development, and the formation of potholes on roads can lead to injuries and the
[...] Read more.
The maintenance of critical infrastructure is a costly necessity that developing countries often struggle to deliver timely repairs. The transport system acts as the arteries of any economy in development, and the formation of potholes on roads can lead to injuries and the loss of lives. Recently, several countries have enabled pothole reporting platforms for their citizens, so that repair work data can be centralised and visible for everyone. Nevertheless, many of these platforms have been interrupted because of the rapid growth of requests made by users. Not only have these platforms failed to filter duplicate or fake reports, but they have also failed to classify their severity, albeit that this information would be key in prioritising repair work and improving the safety of roads. In this work, we aimed to develop a prioritisation system that combines deep learning models and traditional computer vision techniques to automate the analysis of road irregularities reported by citizens. The system consists of three main components. First, we propose a processing pipeline that segments road sections of repair requests with a UNet-based model that integrates a pretrained Resnet34 as the encoder. Second, we assessed the performance of two object detection architectures—EfficientDet and YOLOv5—in the task of road damage localisation and classification. Two public datasets, the Indian Driving Dataset (IDD) and the Road Damage Detection Dataset (RDD2020), were preprocessed and augmented to train and evaluate our segmentation and damage detection models. Third, we applied feature extraction and feature matching to find possible duplicated reports. The combination of these three approaches allowed us to cluster reports according to their location and severity using clustering techniques. The results showed that this approach is a promising direction for authorities to leverage limited road maintenance resources in an impactful and effective way.
Full article
(This article belongs to the Special Issue Machine Learning in IoT Networking and Communications)
►▼
Show Figures

Figure 1
Open AccessArticle
Utilizing B-Spline Curves and Neural Networks for Vehicle Trajectory Prediction in an Inverse Reinforcement Learning Framework
J. Sens. Actuator Netw. 2022, 11(1), 14; https://doi.org/10.3390/jsan11010014 - 10 Feb 2022
Abstract
The ability to accurately predict vehicle trajectories is essential in infrastructure-based safety systems that aim to identify critical events such as near-crash situations and traffic violations. In a connected environment, important information about these critical events can be communicated to road users or
[...] Read more.
The ability to accurately predict vehicle trajectories is essential in infrastructure-based safety systems that aim to identify critical events such as near-crash situations and traffic violations. In a connected environment, important information about these critical events can be communicated to road users or the infrastructure to avoid or mitigate potential crashes. Intersections require special attention in this context because they are hotspots for crashes and involve numerous and complex interactions between road users. In this work, we developed an advanced machine learning method for trajectory prediction using B-spline curve representations of vehicle trajectories and inverse reinforcement learning (IRL). B-spline curves were used to represent vehicle trajectories; a neural network model was trained to predict the coefficients of these curves. A conditional variational autoencoder (CVAE) was used to generate candidate trajectories from these predicted coefficients. These candidate trajectories were then ranked according to a reward function that was obtained by training an IRL model on the (spline smoothed) vehicle trajectories and the surroundings of the vehicles. In our experiments we found that the neural network model outperformed a Kalman filter baseline and the addition of the IRL ranking module further improved the performance of the overall model.
Full article
(This article belongs to the Special Issue Advances in Intelligent Transportation Systems (ITS))
►▼
Show Figures

Figure 1
Open AccessArticle
An AI-Empowered Home-Infrastructure to Minimize Medication Errors
by
and
J. Sens. Actuator Netw. 2022, 11(1), 13; https://doi.org/10.3390/jsan11010013 - 09 Feb 2022
Abstract
This article presents an Artificial Intelligence (AI)-based infrastructure to reduce medication errors while following a treatment plan at home. The system, in particular, assists patients who have some cognitive disability. The AI-based system first learns the skills of a patient using the Actor–Critic
[...] Read more.
This article presents an Artificial Intelligence (AI)-based infrastructure to reduce medication errors while following a treatment plan at home. The system, in particular, assists patients who have some cognitive disability. The AI-based system first learns the skills of a patient using the Actor–Critic method. After assessing patients’ disabilities, the system adopts an appropriate method for the monitoring process. Available methods for monitoring the medication process are a Deep Learning (DL)-based classifier, Optical Character Recognition, and the barcode technique. The DL model is a Convolutional Neural Network (CNN) classifier that is able to detect a drug even when shown in different orientations. The second technique is an OCR based on Tesseract library that reads the name of the drug from the box. The third method is a barcode based on Zbar library that identifies the drug from the barcode available on the box. The GUI demonstrates that the system can assist patients in taking the correct drug and prevent medication errors. This integration of three different tools to monitor the medication process shows advantages as it decreases the chance of medication errors and increases the chance of correct detection. This methodology is more useful when a patient has mild cognitive impairment.
Full article
(This article belongs to the Special Issue Wireless Sensors Networks and Artificial Intelligence for Intelligent Health Monitoring)
►▼
Show Figures

Figure 1
Open AccessFeature PaperArticle
Discrete-Time Takagi-Sugeno Stabilization Approach Applied in Autonomous Vehicles
J. Sens. Actuator Netw. 2022, 11(1), 12; https://doi.org/10.3390/jsan11010012 - 09 Feb 2022
Abstract
This paper deals with a new robust control design for autonomous vehicles. The goal is to perform lane-keeping under various constraints, mainly unknown curvature and lateral wind force. To reach this goal, a new formulation of Parallel Distributed Compensation (PDC) law is given.
[...] Read more.
This paper deals with a new robust control design for autonomous vehicles. The goal is to perform lane-keeping under various constraints, mainly unknown curvature and lateral wind force. To reach this goal, a new formulation of Parallel Distributed Compensation (PDC) law is given. The quadratic Lyapunov stability and stabilization conditions of the discrete-time Takagi–Sugeno (T-S) model representing the autonomous vehicles are discussed. Sufficient design conditions expressed in terms of strict Linear Matrix Inequalities (LMIs) extracted from the linearization of the Bilinear Matrix Inequalities (BMIs) are proposed. An illustrative example is provided to show the effectiveness of the proposed approach.
Full article
(This article belongs to the Special Issue Journal of Sensor and Actuator Networks: 10th Year Anniversary)
►▼
Show Figures

Figure 1
Open AccessEditorial
Acknowledgment to Reviewers of JSAN in 2021
J. Sens. Actuator Netw. 2022, 11(1), 11; https://doi.org/10.3390/jsan11010011 - 29 Jan 2022
Abstract
Rigorous peer-reviews are the basis of high-quality academic publishing [...]
Full article
Open AccessArticle
Uncoupled Wi-Fi Body CoM Acceleration for the Analysis of Lightweight Glass Slabs under Random Walks
by
and
J. Sens. Actuator Netw. 2022, 11(1), 10; https://doi.org/10.3390/jsan11010010 - 27 Jan 2022
Cited by 2
Abstract
►▼
Show Figures
The vibration serviceability assessment of slender and/or lightweight pedestrian systems with high sensitivity to walk-induced effects is rather challenging. In the same way, laminated glass (LG) is used in buildings for structural applications but still represents a not well known and vulnerable material.
[...] Read more.
The vibration serviceability assessment of slender and/or lightweight pedestrian systems with high sensitivity to walk-induced effects is rather challenging. In the same way, laminated glass (LG) is used in buildings for structural applications but still represents a not well known and vulnerable material. For pedestrian LG systems, the characterization of dynamic and mechanical parameters may require specific procedures which do not adapt from other constructional typologies. Among others, the mass of pedestrians is generally high compared with LG structural components. Size and restraints in LG may also lead to more pronounced vibration effects. For existing LG systems, moreover, knowledge of residual capacity may be rather difficult. In this paper, an original uncoupled experimental investigation is proposed to numerically address the accuracy and potential of low-cost laboratory body measures for vibration analysis of LG slabs to support (or even replace) field tests or more complex calculation approaches. A total of 40 experimental records are taken into account, in the form of body center of mass (CoM) acceleration time histories for an adult volunteer walking on a rigid concrete slab and equipped with a single high-precision, Wi-Fi triaxial sensor based on micro electromechanical systems (MEMS) technology. Body CoM records are elaborated and used as input for finite element (FE) nonlinear dynamic analysis in the time domain (WL1) of two LG slab configurations (GS1 and GS2) with identical geometry but different boundaries. A third reinforced concrete slab of literature (CS3) is also investigated for further assessment. Numerical parametric results from a total of 120 WL1-based nonlinear dynamic analyses are compared with FE numerical results based on a conventional deterministic approach (WL2) to describe walk-induced effects, as well as towards past field experiments (GS2). The accuracy and potential of the proposed procedure are discussed.
Full article

Figure 1
Open AccessArticle
Seamless Handover Scheme for MEC/SDN-Based Vehicular Networks
by
, , , , , and
J. Sens. Actuator Netw. 2022, 11(1), 9; https://doi.org/10.3390/jsan11010009 - 27 Jan 2022
Abstract
With the recent advances in the fifth-generation cellular system (5G), enabling vehicular communications has become a demand. The vehicular ad hoc network (VANET) is a promising paradigm that enables the communication and interaction between vehicles and other surrounding devices, e.g., vehicle-to-vehicle (V2V) and
[...] Read more.
With the recent advances in the fifth-generation cellular system (5G), enabling vehicular communications has become a demand. The vehicular ad hoc network (VANET) is a promising paradigm that enables the communication and interaction between vehicles and other surrounding devices, e.g., vehicle-to-vehicle (V2V) and vehicle-to-everything (V2X) communications. However, enabling such networks faces many challenges due to the mobility of vehicles. One of these challenges is the design of handover schemes that manage the communications at the intersection of coverage regions. To this end, this work considers developing a novel seamless and efficient handover scheme for V2X-based networks. The developed scheme manages the handover process while vehicles move between two neighboring roadside units (RSU). The developed mechanism is introduced for multilane bidirectional roads. The developed scheme is implemented by multiple-access edge computing (MEC) units connected to the RSUs to improve the implementation time and make the handover process faster. The considered MEC platform deploys an MEC controller that implements a control scheme of the software-defined networking (SDN) controller that manages the network. The SDN paradigm is introduced to make the handover process seamless; however, implementing such a controlling scheme by the introduction of an MEC controller achieves the process faster than going through the core network. The developed handover scheme was evaluated over the reliable platform of NS-3, and the results validated the developed scheme. The results obtained are presented and discussed.
Full article
(This article belongs to the Special Issue Journal of Sensor and Actuator Networks: 10th Year Anniversary)
►▼
Show Figures

Figure 1
Open AccessFeature PaperArticle
SDMob: SDN-Based Mobility Management for IoT Networks
by
, , , , , and
J. Sens. Actuator Netw. 2022, 11(1), 8; https://doi.org/10.3390/jsan11010008 - 21 Jan 2022
Cited by 1
Abstract
Internet-of-Things (IoT) applications are envisaged to evolve to support mobility of devices while providing quality of service in the system. To keep the connectivity of the constrained nodes upon topological changes, it is of vital importance to enhance the standard protocol stack, including
[...] Read more.
Internet-of-Things (IoT) applications are envisaged to evolve to support mobility of devices while providing quality of service in the system. To keep the connectivity of the constrained nodes upon topological changes, it is of vital importance to enhance the standard protocol stack, including the Routing Protocol for Lossy Low-power Networks (RPL), with accurate and real-time control decisions. We argue that devising a centralized mobility management solution based on a lightweight Software Defined Networking (SDN) controller provides seamless handoff with reasonable communication overhead. A centralized controller can exploit its global view of the network, computation capacity, and flexibility, to predict and significantly improve the responsiveness of the network. This approach requires the controller to be fed with the required input and to get involved in the distributed operation of the standard RPL. We present SDMob, which is a lightweight SDN-based mobility management architecture that integrates an external controller within a constrained IoT network. SDMob lifts the burden of computation-intensive filtering algorithms away from the resource-constrained nodes to achieve seamless handoffs upon nodes’ mobility. The current work extends our previous work, by supporting multiple mobile nodes, networks with a high density of anchors, and varying hop-distance from the controller, as well as harsh and realistic mobility patterns. Through analytical modeling and simulations, we show that SDMob outperforms the baseline RPL and the state-of-the-art ARMOR in terms of packet delivery ratio and end-to-end delay, with an adjustable and tolerable overhead. With SDMob, the network provides close to 100% packet delivery ratio (PDR) for a limited number of mobile nodes, and maintains sub-meter accuracy in localization under random mobility patterns and varying network topologies.
Full article
(This article belongs to the Special Issue Journal of Sensor and Actuator Networks: 10th Year Anniversary)
►▼
Show Figures

Figure 1
Open AccessArticle
Sentiment Analysis of Social Survey Data for Local City Councils
by
, , , , , and
J. Sens. Actuator Netw. 2022, 11(1), 7; https://doi.org/10.3390/jsan11010007 - 12 Jan 2022
Abstract
Big data analytics can be used by smart cities to improve their citizens’ liveability, health, and wellbeing. Social surveys and also social media can be employed to engage with their communities, and these can require sophisticated analysis techniques. This research was focused on
[...] Read more.
Big data analytics can be used by smart cities to improve their citizens’ liveability, health, and wellbeing. Social surveys and also social media can be employed to engage with their communities, and these can require sophisticated analysis techniques. This research was focused on carrying out a sentiment analysis from social surveys. Data analysis techniques using RStudio and Python were applied to several open-source datasets, which included the 2018 Social Indicators Survey dataset published by the City of Melbourne (CoM) and the Casey Next short survey 2016 dataset published by the City of Casey (CoC). The qualitative nature of the CoC dataset responses could produce rich insights using sentiment analysis, unlike the quantitative CoM dataset. RStudio analysis created word cloud visualizations and bar charts for sentiment values. These were then used to inform social media analysis via the Twitter application programming interface. The R codes were all integrated within a Shiny application to create a set of user-friendly interactive web apps that generate sentiment analysis both from the historic survey data and more immediately from the Twitter feeds. The web apps were embedded within a website that provides a customisable solution to estimate sentiment for key issues. Global sentiment was also compared between the social media approach and the 2016 survey dataset analysis and showed some correlation, although there are caveats on the use of social media for sentiment analysis. Further refinement of the methodology is required to improve the social media app and to calibrate it against analysis of recent survey data.
Full article
(This article belongs to the Special Issue Applications of Sensor Networks and Systems in Smart Cities)
►▼
Show Figures

Figure 1
Highly Accessed Articles
Latest Books
E-Mail Alert
News
Topics
Topic in
Applied Sciences, Sensors, Sustainability, Electronics, JSAN
Intelligent Transportation Systems
Topic Editors: Javier Alonso Ruiz, Angel LlamazaresDeadline: 31 December 2022
Topic in
Applied Sciences, Future Internet, IoT, JSAN, Sensors
Advanced Signal Processing and Data Analysis for Smart IoT Ecosystems
Topic Editors: Ying-Ren Chien, Mu Zhou, Liang-Hung Wang, Xun ZhangDeadline: 31 January 2023
Topic in
JSAN, Sensors, Applied Sciences, Sustainability, Electronics
Internet of Things: Latest Advances
Topic Editors: Yoshiyasu Takefuji, Subhas Mukhopadhyay, Enrico VezzettiDeadline: 28 February 2023
Topic in
Applied Sciences, Electronics, Information, JSAN, Sensors
Wireless Sensor Networks
Topic Editors: Alvaro Araujo Pinto, Hacene FouchalDeadline: 31 March 2023

Conferences
Special Issues
Special Issue in
JSAN
Smart Systems: Challenges, Enabling Technologies and Software Solutions
Guest Editors: Sanja Lazarova-Molnar, Jameela Al-Jaroodi, Nader MohamedDeadline: 30 June 2022
Special Issue in
JSAN
Optimization within Sensor Networks and Telecommunications
Guest Editors: Adriana Lipovac, Anamaria Bjelopera, Mario Miličević, Krunoslav ZubrinicDeadline: 31 July 2022
Special Issue in
JSAN
Feature Paper on Computer and Electrical Engineering 2022
Guest Editor: Chengwen LuoDeadline: 30 September 2022
Special Issue in
JSAN
Smart Grids: Sensing and Monitoring
Guest Editors: Gustavo Weber Denardin, Carlos Henrique BarriquelloDeadline: 31 October 2022