E-Mail Alert

Add your e-mail address to receive forthcoming issues of this journal:

Journal Browser

Journal Browser

Special Issue "Topology Control and Protocols in Sensor Network and IoT Applications"

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: 30 June 2019

Special Issue Editors

Guest Editor
Dr. Wenye Wang

Department of Electrical & Computer Engineering, North Carolina State University, Raleigh, NC 27695, USA
Website | E-Mail
Interests: algorithm and protocol design in mobile wireless networks; mobile clouds; vehicle-to-vehicle communications; wireless in the Smart Grid
Guest Editor
Dr. Yulong Shen

School of Computer Science and Technology, Xidian University, Xian 710071, China
Website | E-Mail
Interests: wireless network security and optimization; wireless network information theory; service computing; distributed network storage and security; Integrated Avionics System security technology
Guest Editor
Dr. Mingkui Wei

Department of Computer Science, Sam Houston State University, Huntsville, TX 77341, USA
Website | E-Mail
Interests: cyber-physical systems; network security and privacy; network and computer forensics; wireless in Smart Grid

Special Issue Information

Dear Colleagues,

In the last decade, we have witnessed substantial developments in fields such as computing, networking and communications, and sensing. The advancement of such technologies lay the foundation and bring traditional sensor networks into the new paradigm, i.e., the Internet of Things (IoT). IoT aims to facilitate the interconnection and interaction among numerous devices such as sensors and actuators, and enables the cyber system to sense and react to the physical world. On the other hand, IoT differs from traditional sensor networks in its vast scale and diversity. With billions of devices of various types all interconnected, issues such as system scalability and energy efficiency begin to emerge as new challenges, which call for the next generation of topology control and protocols to provide better network connectivity and energy efficiency.

The aim of this Special Issue is to solicit papers from academia and industry researchers with original and innovative works on all aspects of topology control and protocol in sensor networks and IoT applications, which review and report on start-of-the-art, highlight challenges, and point to future directions.

Topics of interest include, but are not limited to:

  • Topology management in IoT and sensor networks
  • Topology construction and maintenance algorithms
  • Failure detection in IoT and sensor networks
  • Failure tolerant in IoT and sensor networks
  • Power control and power management
  • Testbed, benchmark, and simulation studies in IoT and sensor networks
  • Security and privacy issues in topology control of sensor networks

Dr. Wenye Wang
Dr. Yulong Shen
Dr. Mingkui Wei
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Sensor network
  • Internet of Things
  • Topology control and protocol
  • IoT security and privacy

Published Papers (6 papers)

View options order results:
result details:
Displaying articles 1-6
Export citation of selected articles as:

Research

Open AccessArticle Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing
Sensors 2019, 19(5), 1037; https://doi.org/10.3390/s19051037
Received: 12 February 2019 / Accepted: 28 February 2019 / Published: 28 February 2019
PDF Full-text (2523 KB) | HTML Full-text | XML Full-text
Abstract
Achieving high source location privacy is critical when Wireless Sensor Networks (WSNs) are used in sensitive applications such as in asset or battlefield monitoring. Due to the sensitivity of information in these applications, it is important to ensure the flow of data between [...] Read more.
Achieving high source location privacy is critical when Wireless Sensor Networks (WSNs) are used in sensitive applications such as in asset or battlefield monitoring. Due to the sensitivity of information in these applications, it is important to ensure the flow of data between sensor nodes is secure and it does not expose any information about the monitored assets to an adversary. This paper proposes a routing scheme with stronger source location privacy than the privacy of traditional routing schemes. The paper addresses some limitations of four existing schemes by providing highly random routing paths between the source nodes and sink node. The scheme randomly sends packet to the sink node through tactically positioned proxy nodes to guarantee the routes are highly befuddling to the adversary. To achieve high privacy, the proposed scheme uses a randomizing factor to generate a new random route for every successive packet. Simulation results demonstrate that the proposed scheme provides longer safety period and stronger privacy to outperform other schemes. Furthermore the scheme provides stronger privacy against both, patient and cautious adversary models. Full article
(This article belongs to the Special Issue Topology Control and Protocols in Sensor Network and IoT Applications)
Figures

Figure 1

Open AccessArticle IoT-Based Resource Control for In-Vehicle Infotainment Services: Design and Experimentation
Sensors 2019, 19(3), 620; https://doi.org/10.3390/s19030620
Received: 29 November 2018 / Revised: 19 December 2018 / Accepted: 29 January 2019 / Published: 1 February 2019
PDF Full-text (12533 KB) | HTML Full-text | XML Full-text
Abstract
A variety of in-vehicle infotainment (IVI) devices and services have been developed by many vehicle vendors and software companies, which include navigation systems, cameras, speakers, headrest displays, and heating seat. However, there has not been enough research on how to effectively control and [...] Read more.
A variety of in-vehicle infotainment (IVI) devices and services have been developed by many vehicle vendors and software companies, which include navigation systems, cameras, speakers, headrest displays, and heating seat. However, there has not been enough research on how to effectively control and manage numerous IVI resources (devices and contents), so as to provide users with more enhanced services. This paper proposes a framework of resource control for IVI services so as to efficiently manage the IVI resources within an automobile. Differently from conventional IVI systems, in the proposed scheme, the IVI-Master is newly introduced for overall control of IVI resources, and IVI users are divided into owner and users. In addition, the IVI resources are classified as personal resources and shared resources, which are managed by the IVI-Master using the Lightweight Machine-to-Machine (LWM2M) standard. The proposed IoT-based IVI resource control scheme was implemented and tested. The experimental results showed that the proposed scheme can be used to effectively manage IVI resources for users. Additionally, the proposed resource control scheme shows lower bandwidth usage than the existing scheme. Full article
(This article belongs to the Special Issue Topology Control and Protocols in Sensor Network and IoT Applications)
Figures

Figure 1

Open AccessArticle Clustered Data Muling in the Internet of Things in Motion
Sensors 2019, 19(3), 484; https://doi.org/10.3390/s19030484
Received: 10 December 2018 / Revised: 2 January 2019 / Accepted: 10 January 2019 / Published: 24 January 2019
Cited by 1 | PDF Full-text (2314 KB) | HTML Full-text | XML Full-text
Abstract
This paper considers a case where an Unmanned Aerial Vehicle (UAV) is used to monitor an area of interest. The UAV is assisted by a Sensor Network (SN), which is deployed in the area such as a smart city or smart village. The [...] Read more.
This paper considers a case where an Unmanned Aerial Vehicle (UAV) is used to monitor an area of interest. The UAV is assisted by a Sensor Network (SN), which is deployed in the area such as a smart city or smart village. The area being monitored has a reasonable size and hence may contain many sensors for efficient and accurate data collection. In this case, it would be expensive for one UAV to visit all the sensors; hence the need to partition the ground network into an optimum number of clusters with the objective of having the UAV visit only cluster heads (fewer sensors). In such a setting, the sensor readings (sensor data) would be sent to cluster heads where they are collected by the UAV upon its arrival. This paper proposes a clustering scheme that optimizes not only the sensor network energy usage, but also the energy used by the UAV to cover the area of interest. The computation of the number of optimal clusters in a dense and uniformly-distributed sensor network is proposed to complement the k-means clustering algorithm when used as a network engineering technique in hybrid UAV/terrestrial networks. Furthermore, for general networks, an efficient clustering model that caters for both orphan nodes and multi-layer optimization is proposed and analyzed through simulations using the city of Cape Town in South Africa as a smart city hybrid network engineering use-case. Full article
(This article belongs to the Special Issue Topology Control and Protocols in Sensor Network and IoT Applications)
Figures

Figure 1

Open AccessArticle Implementation of an IoT Based Radar Sensor Network for Wastewater Management
Sensors 2019, 19(2), 254; https://doi.org/10.3390/s19020254
Received: 10 December 2018 / Revised: 3 January 2019 / Accepted: 7 January 2019 / Published: 10 January 2019
Cited by 1 | PDF Full-text (7421 KB) | HTML Full-text | XML Full-text
Abstract
Critical wastewater events such as sewer main blockages or overflows are often not detected until after the fact. These events can be costly, from both an environmental impact and monetary standpoint. A standalone, portable radar device allowing non-invasive benchmarking of sewer pumping station [...] Read more.
Critical wastewater events such as sewer main blockages or overflows are often not detected until after the fact. These events can be costly, from both an environmental impact and monetary standpoint. A standalone, portable radar device allowing non-invasive benchmarking of sewer pumping station (SPS) pumps is presented. Further, by configuring and deploying a complete Low Power Wide Area Network (LPWAN), Shoalhaven Water (SW) now has the opportunity to create “Internet of Things” (IoT)-capable devices that offer freedom from the reliance on mobile network providers, whilst avoiding congestion on the existing Supervisory Control and Data Acquisition (SCADA) telemetry backbone. This network infrastructure allows for devices capable of real-time monitoring to alert of any system failures, providing an effective tool to proactively capture the current state of the sewer network between the much larger SPSs. This paper presents novel solutions to improve the current wastewater network management procedures employed by SW. This paper also offers a complete review of wastewater monitoring networks and is one of the first to offer robust testing of Long Range Wide Area Network (LoRaWAN) network capabilities in Australia. The paper also provides a comprehensive summary of the LoRa protocol and all its functions. It was found that a LPWAN, utilising the LoRaWAN protocol and deployed appropriately within a geographic area, can attain maximum transmission distances of 20 km within an urban environment and up to 35 km line of sight. Full article
(This article belongs to the Special Issue Topology Control and Protocols in Sensor Network and IoT Applications)
Figures

Figure 1

Open AccessArticle Enhanced Message-Passing Based LEACH Protocol for Wireless Sensor Networks
Sensors 2019, 19(1), 75; https://doi.org/10.3390/s19010075
Received: 14 November 2018 / Revised: 12 December 2018 / Accepted: 21 December 2018 / Published: 25 December 2018
PDF Full-text (1615 KB) | HTML Full-text | XML Full-text
Abstract
This paper proposes a distributed energy-efficient clustering protocol for wireless sensor networks (WSNs). Based on low-energy adaptive clustering hierarchy (LEACH) protocol, the proposed LEACH-eXtended Message-Passing (LEACH-XMP) substantially improves a cluster formation algorithm, which is critical for WSN operations. Unlike the previous approaches, a [...] Read more.
This paper proposes a distributed energy-efficient clustering protocol for wireless sensor networks (WSNs). Based on low-energy adaptive clustering hierarchy (LEACH) protocol, the proposed LEACH-eXtended Message-Passing (LEACH-XMP) substantially improves a cluster formation algorithm, which is critical for WSN operations. Unlike the previous approaches, a realistic non-linear energy consumption model is considered, which renders the clustering optimization highly nonlinear and challenging. To this end, a state-of-the-art message-passing approach is introduced to develop an efficient distributed algorithm. The main benefits of the proposed technique are its inherent nature of a distributed algorithm and the saving of computational load imposed for each node. Thus, it proves useful for a practical deployment. In addition, the proposed algorithm rapidly converges to a very accurate solution within a few iterations. Simulation results ensure that the proposed LEACH-XMP maximizes the network lifetime and outperforms existing techniques consistently. Full article
(This article belongs to the Special Issue Topology Control and Protocols in Sensor Network and IoT Applications)
Figures

Figure 1

Open AccessFeature PaperArticle A Lightweight Anonymous Client–Server Authentication Scheme for the Internet of Things Scenario: LAuth
Sensors 2018, 18(11), 3695; https://doi.org/10.3390/s18113695
Received: 2 October 2018 / Revised: 19 October 2018 / Accepted: 26 October 2018 / Published: 30 October 2018
PDF Full-text (3598 KB) | HTML Full-text | XML Full-text
Abstract
The Internet of Things (IoT) connects different kinds of devices into a network, and enables two-way communication between devices. A large amount of data are collected by these devices and transmitted in this network, it is necessary to ensure secure communications between these [...] Read more.
The Internet of Things (IoT) connects different kinds of devices into a network, and enables two-way communication between devices. A large amount of data are collected by these devices and transmitted in this network, it is necessary to ensure secure communications between these devices, to make it impossible for an adversary to undermine this communication. To ensure secure communication, many authentication protocols have been proposed, in this study, a fully anonymous authentication scheme for the Internet of things scenario has been proposed, it enables the remote client to anonymously connect to the server and being serviced by the server. The proposed scheme has been verified by AVISPA and BAN Logic, and the result shows that it is safe. Besides, the simulation shows that the proposed scheme is more efficient in computation cost and communication cost. Full article
(This article belongs to the Special Issue Topology Control and Protocols in Sensor Network and IoT Applications)
Figures

Figure 1

Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top