Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (26)

Search Parameters:
Authors = Gerhard Hancke ORCID = 0000-0002-4026-687X

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 693 KiB  
Article
Collision Avoidance Adaptive Data Rate Algorithm for LoRaWAN
by Rachel Kufakunesu, Gerhard P. Hancke and Adnan M. Abu-Mahfouz
Future Internet 2024, 16(10), 380; https://doi.org/10.3390/fi16100380 - 19 Oct 2024
Cited by 5 | Viewed by 2267
Abstract
Long-Range Wide-Area Network (LoRaWAN) technology offers efficient connectivity for numerous end devices over a wide coverage area in the Internet of Things (IoT) network, enabling the exchange of data over the Internet between even the most minor Internet-connected devices and systems. One of [...] Read more.
Long-Range Wide-Area Network (LoRaWAN) technology offers efficient connectivity for numerous end devices over a wide coverage area in the Internet of Things (IoT) network, enabling the exchange of data over the Internet between even the most minor Internet-connected devices and systems. One of LoRaWAN’s hallmark features is the Adaptive Data Rate (ADR) algorithm. ADR is a resource allocation function which dynamically adjusts the network’s data rate, airtime, and energy dissipation to optimise its performance. The allocation of spreading factors plays a critical function in defining the throughput of the end device and its robustness to interference. However, in practical deployments, LoRaWAN networks experience considerable interference, severely affecting the packet delivery ratio, energy utilisation, and general network performance. To address this, we present a novel ADR framework, SSFIR-ADR, which utilises randomised spreading factor allocation to minimise energy consumption and packet collisions while maintaining optimal network performance. We implement a LoRa network composed of a single gateway that connects loads of end nodes to a network server. In terms of energy use, packet delivery rate, and interference rate (IR), our simulation implementation does better than LoRaWAN’s legacy ADR scheme for a range of application data intervals. Full article
Show Figures

Figure 1

23 pages, 1600 KiB  
Article
IoT-Enabled WBAN and Machine Learning for Speech Emotion Recognition in Patients
by Damilola D. Olatinwo, Adnan Abu-Mahfouz, Gerhard Hancke and Hermanus Myburgh
Sensors 2023, 23(6), 2948; https://doi.org/10.3390/s23062948 - 8 Mar 2023
Cited by 28 | Viewed by 3478
Abstract
Internet of things (IoT)-enabled wireless body area network (WBAN) is an emerging technology that combines medical devices, wireless devices, and non-medical devices for healthcare management applications. Speech emotion recognition (SER) is an active research field in the healthcare domain and machine learning. It [...] Read more.
Internet of things (IoT)-enabled wireless body area network (WBAN) is an emerging technology that combines medical devices, wireless devices, and non-medical devices for healthcare management applications. Speech emotion recognition (SER) is an active research field in the healthcare domain and machine learning. It is a technique that can be used to automatically identify speakers’ emotions from their speech. However, the SER system, especially in the healthcare domain, is confronted with a few challenges. For example, low prediction accuracy, high computational complexity, delay in real-time prediction, and how to identify appropriate features from speech. Motivated by these research gaps, we proposed an emotion-aware IoT-enabled WBAN system within the healthcare framework where data processing and long-range data transmissions are performed by an edge AI system for real-time prediction of patients’ speech emotions as well as to capture the changes in emotions before and after treatment. Additionally, we investigated the effectiveness of different machine learning and deep learning algorithms in terms of performance classification, feature extraction methods, and normalization methods. We developed a hybrid deep learning model, i.e., convolutional neural network (CNN) and bidirectional long short-term memory (BiLSTM), and a regularized CNN model. We combined the models with different optimization strategies and regularization techniques to improve the prediction accuracy, reduce generalization error, and reduce the computational complexity of the neural networks in terms of their computational time, power, and space. Different experiments were performed to check the efficiency and effectiveness of the proposed machine learning and deep learning algorithms. The proposed models are compared with a related existing model for evaluation and validation using standard performance metrics such as prediction accuracy, precision, recall, F1 score, confusion matrix, and the differences between the actual and predicted values. The experimental results proved that one of the proposed models outperformed the existing model with an accuracy of about 98%. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

18 pages, 661 KiB  
Review
Practical Challenges of Attack Detection in Microgrids Using Machine Learning
by Daniel T. Ramotsoela, Gerhard P. Hancke and Adnan M. Abu-Mahfouz
J. Sens. Actuator Netw. 2023, 12(1), 7; https://doi.org/10.3390/jsan12010007 - 18 Jan 2023
Cited by 16 | Viewed by 4010
Abstract
The move towards renewable energy and technological advancements in the generation, distribution and transmission of electricity have increased the popularity of microgrids. The popularity of these decentralised applications has coincided with advancements in the field of telecommunications allowing for the efficient implementation of [...] Read more.
The move towards renewable energy and technological advancements in the generation, distribution and transmission of electricity have increased the popularity of microgrids. The popularity of these decentralised applications has coincided with advancements in the field of telecommunications allowing for the efficient implementation of these applications. This convenience has, however, also coincided with an increase in the attack surface of these systems, resulting in an increase in the number of cyber-attacks against them. Preventative network security mechanisms alone are not enough to protect these systems as a critical design feature is system resilience, so intrusion detection and prevention system are required. The practical consideration for the implementation of the proposed schemes in practice is, however, neglected in the literature. This paper attempts to address this by generalising these considerations and using the lessons learned from water distribution systems as a case study. It was found that the considerations are similar irrespective of the application environment even though context-specific information is a requirement for effective deployment. Full article
(This article belongs to the Section Network Services and Applications)
Show Figures

Figure 1

18 pages, 2885 KiB  
Article
A Fuzzy-Logic Based Adaptive Data Rate Scheme for Energy-Efficient LoRaWAN Communication
by Rachel Kufakunesu, Gerhard Hancke and Adnan Abu-Mahfouz
J. Sens. Actuator Netw. 2022, 11(4), 65; https://doi.org/10.3390/jsan11040065 - 11 Oct 2022
Cited by 16 | Viewed by 3427
Abstract
Long Range Wide Area Network (LoRaWAN) technology is rapidly expanding as a technology with long distance connectivity, low power consumption, low data rates and a large number of end devices (EDs) that connect to the Internet of Things (IoT) network. Due to the [...] Read more.
Long Range Wide Area Network (LoRaWAN) technology is rapidly expanding as a technology with long distance connectivity, low power consumption, low data rates and a large number of end devices (EDs) that connect to the Internet of Things (IoT) network. Due to the heterogeneity of several applications with varying Quality of Service (QoS) requirements, energy is expended as the EDs communicate with applications. The LoRaWAN Adaptive Data Rate (ADR) manages the resource allocation to optimize energy efficiency. The performance of the ADR algorithm gradually deteriorates in dense networks and efforts have been made in various studies to improve the algorithm’s performance. In this paper, we propose a fuzzy-logic based adaptive data rate (FL-ADR) scheme for energy efficient LoRaWAN communication. The scheme is implemented on the network server (NS), which receives sensor data from the EDs via the gateway (GW) node and computes network parameters (such as the spreading factor and transmission power) to optimize the energy consumption of the EDs in the network. The performance of the algorithm is evaluated in ns-3 using a multi-gateway LoRa network with EDs sending data packets at various intervals. Our simulation results are analyzed and compared to the traditional ADR and the ns-3 ADR. The proposed FL-ADR outperforms the traditional ADR algorithm and the ns-3 ADR minimizing the interference rate and energy consumption. Full article
(This article belongs to the Section Big Data, Computing and Artificial Intelligence)
Show Figures

Figure 1

24 pages, 1392 KiB  
Review
A Review of Artificial Intelligence Technologies in Mineral Identification: Classification and Visualization
by Teng Long, Zhangbing Zhou, Gerhard Hancke, Yang Bai and Qi Gao
J. Sens. Actuator Netw. 2022, 11(3), 50; https://doi.org/10.3390/jsan11030050 - 29 Aug 2022
Cited by 23 | Viewed by 10682
Abstract
Artificial intelligence is a branch of computer science that attempts to understand the essence of intelligence and produce a new intelligent machine capable of responding in a manner similar to human intelligence. Research in this area includes robotics, language recognition, image identification, natural [...] Read more.
Artificial intelligence is a branch of computer science that attempts to understand the essence of intelligence and produce a new intelligent machine capable of responding in a manner similar to human intelligence. Research in this area includes robotics, language recognition, image identification, natural language processing, and expert systems. In recent years, the availability of large datasets, the development of effective algorithms, and access to powerful computers have led to unprecedented success in artificial intelligence. This powerful tool has been used in numerous scientific and engineering fields including mineral identification. This paper summarizes the methods and techniques of artificial intelligence applied to intelligent mineral identification based on research, classifying the methods and techniques as artificial neural networks, machine learning, and deep learning. On this basis, visualization analysis is conducted for mineral identification of artificial intelligence from field development paths, research hot spots, and keywords detection, respectively. In the end, based on trend analysis and keyword analysis, we propose possible future research directions for intelligent mineral identification. Full article
Show Figures

Figure 1

15 pages, 576 KiB  
Article
Quantum-Safe Group Key Establishment Protocol from Lattice Trapdoors
by Teklay Gebremichael, Mikael Gidlund, Gerhard P. Hancke and Ulf Jennehag
Sensors 2022, 22(11), 4148; https://doi.org/10.3390/s22114148 - 30 May 2022
Cited by 4 | Viewed by 2220
Abstract
Group communication enables Internet of Things (IoT) devices to communicate in an efficient and fast manner. In most instances, a group message needs to be encrypted using a cryptographic key that only devices in the group know. In this paper, we address the [...] Read more.
Group communication enables Internet of Things (IoT) devices to communicate in an efficient and fast manner. In most instances, a group message needs to be encrypted using a cryptographic key that only devices in the group know. In this paper, we address the problem of establishing such a key using a lattice-based one-way function, which can easily be inverted using a suitably designed lattice trapdoor. Using the notion of a bad/good basis, we present a new method of coupling multiple private keys into a single public key, which is then used for encrypting a group message. The protocol has the apparent advantage of having a conjectured resistance against potential quantum-computer-based attacks. All functions—key establishment, session key update, node addition, encryption, and decryption—are effected in constant time, using simple linear-algebra operations, making the protocol suitable for resource-constrained IoT networks. We show how a cryptographic session group key can be constructed on the fly by a user with legitimate credentials, making node-capture-type attacks impractical. The protocol also incorporates a mechanism for node addition and session-key generation in a forward- and backward-secrecy-preserving manner. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

23 pages, 16315 KiB  
Article
Smart Microgrid Energy Market: Evaluating Distributed Ledger Technologies for Remote and Constrained Microgrid Deployments
by Lehlogonolo P. I. Ledwaba, Gerhard P. Hancke, Sherrin J. Isaac and Hein S. Venter
Electronics 2021, 10(6), 714; https://doi.org/10.3390/electronics10060714 - 18 Mar 2021
Cited by 15 | Viewed by 3267
Abstract
The increasing strain on ageing generation infrastructure has seen more frequent instances of scheduled and unscheduled blackouts, rising reliability on fossil fuel based energy alternatives and a slow down in efforts towards achieving universal access to electrical energy in South Africa. To try [...] Read more.
The increasing strain on ageing generation infrastructure has seen more frequent instances of scheduled and unscheduled blackouts, rising reliability on fossil fuel based energy alternatives and a slow down in efforts towards achieving universal access to electrical energy in South Africa. To try and relieve the burden on the National Grid and still progress electrification activities, the smart microgrid model and secure energy trade paradigm is considered—enabled by the Industrial IoT (IIoT) and distributed ledger technologies (DLTs). Given the high availability requirements of microgrid operations, the limited resources available on IIoT devices and the high processing and energy requirements of DLT operations, this work aims to determine the effect of native DLT algorithms when implemented on IIoT edge devices to assess the suitability of DLTs as a mechanism to establish a secure, energy trading market for the Internet of Energy. Metrics such as the node transaction time, operating temperature, power consumption, processor and memory usage are considered towards determining possible interference on the edge node operation. In addition, the cost and time required for mining operations associated with the DLT-enabled node are determined in an effort to predict the cost to end users—in terms of fees payable and mobile data costs—as well as predicting the microgrid’s growth and potential blockchain network slowdown. Full article
(This article belongs to the Special Issue Security and Privacy for IoT and Multimedia Services)
Show Figures

Figure 1

41 pages, 687 KiB  
Review
Low Power Wide Area Network, Cognitive Radio and the Internet of Things: Potentials for Integration
by Adeiza J. Onumanyi, Adnan M. Abu-Mahfouz and Gerhard P. Hancke
Sensors 2020, 20(23), 6837; https://doi.org/10.3390/s20236837 - 30 Nov 2020
Cited by 39 | Viewed by 7584
Abstract
The Internet of Things (IoT) is an emerging paradigm that enables many beneficial and prospective application areas, such as smart metering, smart homes, smart industries, and smart city architectures, to name but a few. These application areas typically comprise end nodes and gateways [...] Read more.
The Internet of Things (IoT) is an emerging paradigm that enables many beneficial and prospective application areas, such as smart metering, smart homes, smart industries, and smart city architectures, to name but a few. These application areas typically comprise end nodes and gateways that are often interconnected by low power wide area network (LPWAN) technologies, which provide low power consumption rates to elongate the battery lifetimes of end nodes, low IoT device development/purchasing costs, long transmission range, and increased scalability, albeit at low data rates. However, most LPWAN technologies are often confronted with a number of physical (PHY) layer challenges, including increased interference, spectral inefficiency, and/or low data rates for which cognitive radio (CR), being a predominantly PHY layer solution, suffices as a potential solution. Consequently, in this article, we survey the potentials of integrating CR in LPWAN for IoT-based applications. First, we present and discuss a detailed list of different state-of-the-art LPWAN technologies; we summarize the most recent LPWAN standardization bodies, alliances, and consortia while emphasizing their disposition towards the integration of CR in LPWAN. We then highlight the concept of CR in LPWAN via a PHY-layer front-end model and discuss the benefits of CR-LPWAN for IoT applications. A number of research challenges and future directions are also presented. This article aims to provide a unique and holistic overview of CR in LPWAN with the intention of emphasizing its potential benefits. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

21 pages, 4200 KiB  
Article
Enabling a Battery-Less Sensor Node Using Dedicated Radio Frequency Energy Harvesting for Complete Off-Grid Applications
by Timothy Miller, Stephen S. Oyewobi, Adnan M. Abu-Mahfouz and Gerhard P. Hancke
Energies 2020, 13(20), 5402; https://doi.org/10.3390/en13205402 - 16 Oct 2020
Cited by 8 | Viewed by 3243
Abstract
The large-scale deployment of sensor nodes in difficult-to-reach locations makes powering of sensor nodes via batteries impractical. Besides, battery-powered WSNs require the periodic replacement of batteries. Wireless, battery-less sensor nodes represent a less maintenance-intensive, more environmentally friendly and compact alternative to battery powered [...] Read more.
The large-scale deployment of sensor nodes in difficult-to-reach locations makes powering of sensor nodes via batteries impractical. Besides, battery-powered WSNs require the periodic replacement of batteries. Wireless, battery-less sensor nodes represent a less maintenance-intensive, more environmentally friendly and compact alternative to battery powered sensor nodes. Moreover, such nodes are powered through wireless energy harvesting. In this research, we propose a novel battery-less wireless sensor node which is powered by a dedicated 4 W EIRP 920 MHz radio frequency (RF) energy device. The system is designed to provide complete off-grid Internet of Things (IoT) applications. To this end we have designed a power base station which derives its power from solar PV panels to radiate the RF energy used to power the sensor node. We use a PIC32MX220F32 microcontroller to implement a CC-CV battery charging algorithm to control the step-down DC-DC converter which charges lithium-ion batteries that power the RF transmitter and amplifier, respectively. A 12 element Yagi antenna was designed and optimized using the FEKO electromagnetic software. We design a step-up converter to step the voltage output from a single stage fully cross-coupled RF-DC converter circuit up to 3.3 V. Finally, we use the power requirements of the sensor node to size the storage capacity of the capacitor of the energy harvesting circuit. The results obtained from the experiments performed showed that enough RF energy was harvested over a distance of 15 m to allow the sensor node complete one sense-transmit operation for a duration of 156 min. The Yagi antenna achieved a gain of 12.62 dBi and a return loss of −14.11 dB at 920 MHz, while the battery was correctly charged according to the CC-CV algorithm through the control of the DC-DC converter. Full article
(This article belongs to the Special Issue Wireless Rechargeable Sensor Networks 2020-2022)
Show Figures

Graphical abstract

25 pages, 961 KiB  
Review
A Survey on Adaptive Data Rate Optimization in LoRaWAN: Recent Solutions and Major Challenges
by Rachel Kufakunesu, Gerhard P. Hancke and Adnan M. Abu-Mahfouz
Sensors 2020, 20(18), 5044; https://doi.org/10.3390/s20185044 - 5 Sep 2020
Cited by 158 | Viewed by 10771
Abstract
Long-Range Wide Area Network (LoRaWAN) is a fast-growing communication system for Low Power Wide Area Networks (LPWAN) in the Internet of Things (IoTs) deployments. LoRaWAN is built to optimize LPWANs for battery lifetime, capacity, range, and cost. LoRaWAN employs an Adaptive Data Rate [...] Read more.
Long-Range Wide Area Network (LoRaWAN) is a fast-growing communication system for Low Power Wide Area Networks (LPWAN) in the Internet of Things (IoTs) deployments. LoRaWAN is built to optimize LPWANs for battery lifetime, capacity, range, and cost. LoRaWAN employs an Adaptive Data Rate (ADR) scheme that dynamically optimizes data rate, airtime, and energy consumption. The major challenge in LoRaWAN is that the LoRa specification does not state how the network server must command end nodes pertaining rate adaptation. As a result, numerous ADR schemes have been proposed to cater for the many applications of IoT technology, the quality of service requirements, different metrics, and radio frequency (RF) conditions. This offers a challenge for the reliability and suitability of these schemes. This paper presents a comprehensive review of the research on ADR algorithms for LoRaWAN technology. First, we provide an overview of LoRaWAN network performance that has been explored and documented in the literature and then focus on recent solutions for ADR as an optimization approach to improve throughput, energy efficiency and scalability. We then distinguish the approaches used, highlight their strengths and drawbacks, and provide a comparison of these approaches. Finally, we identify some research gaps and future directions. Full article
(This article belongs to the Special Issue Intelligent Industrial Application of Consumer Wireless Technologies)
Show Figures

Figure 1

18 pages, 911 KiB  
Article
AACS: Attribute-Based Access Control Mechanism for Smart Locks
by Zhenghao Xin, Liang Liu and Gerhard Hancke
Symmetry 2020, 12(6), 1050; https://doi.org/10.3390/sym12061050 - 23 Jun 2020
Cited by 8 | Viewed by 6112
Abstract
This article researched the security and application of smart locks in Internet of Things environments in the domain of computer and engineer science and symmetry. Smart locks bring much convenience for users. However, most smart lock systems are cloud-based and it is problematic [...] Read more.
This article researched the security and application of smart locks in Internet of Things environments in the domain of computer and engineer science and symmetry. Smart locks bring much convenience for users. However, most smart lock systems are cloud-based and it is problematic managing and enforcing the permissions of an authorized device if the device is offline. Moreover, most smart lock systems lack fine-grained access control and cascading removal of permissions. In this paper, we leverage attribute-based access control mechanisms to manage the access of visitors with different identities. We use identity-based encryption to verify the identity of the visitor. In our proposed system, the administrator uses the policy set in the smart lock to implement access control on the device side, which reduces the dependence of access control on the server. We set attributes such as role, time, date, and location to have fine-grained control over access to different permissions and roles that might appear in the house. And the scheme provides the cascading delete function while providing the group access function. Our solution considers multiple roles in the home as well as hierarchical management issues, and improves the applicability of the smart lock system in complex residential and commercial situations. In the experimental section, we show that our system can be applied to premises with many different inhabitant identities. Full article
Show Figures

Figure 1

25 pages, 3049 KiB  
Article
Behavioral Acoustic Emanations: Attack and Verification of PIN Entry Using Keypress Sounds
by Sourav Panda, Yuanzhen Liu, Gerhard Petrus Hancke and Umair Mujtaba Qureshi
Sensors 2020, 20(11), 3015; https://doi.org/10.3390/s20113015 - 26 May 2020
Cited by 15 | Viewed by 5443
Abstract
This paper explores the security vulnerability of Personal Identification Number (PIN) or numeric passwords. Entry Device (PEDs) that use small strings of data (PINs, keys or passwords) as means of verifying the legitimacy of a user. Today, PEDs are commonly used by personnel [...] Read more.
This paper explores the security vulnerability of Personal Identification Number (PIN) or numeric passwords. Entry Device (PEDs) that use small strings of data (PINs, keys or passwords) as means of verifying the legitimacy of a user. Today, PEDs are commonly used by personnel in different industrial and consumer electronic applications, such as entry at security checkpoints, ATMs and customer kiosks, etc. In this paper, we propose a side-channel attack on a 4–6 digit random PIN key, and a PIN key user verification method. The intervals between two keystrokes are extracted from the acoustic emanation and used as features to train machine-learning models. The attack model has a 60% chance to recover the PIN key. The verification model has an 88% accuracy on identifying the user. Our attack methods can perform key recovery by using the acoustic side-channel at low cost. As a countermeasure, our verification method can improve the security of PIN entry devices. Full article
(This article belongs to the Special Issue Intelligent Industrial Application of Consumer Wireless Technologies)
Show Figures

Figure 1

31 pages, 3992 KiB  
Review
Artificial Intelligence Techniques for Cognitive Sensing in Future IoT: State-of-the-Art, Potentials, and Challenges
by Martins O. Osifeko, Gerhard P. Hancke and Adnan M. Abu-Mahfouz
J. Sens. Actuator Netw. 2020, 9(2), 21; https://doi.org/10.3390/jsan9020021 - 25 Apr 2020
Cited by 51 | Viewed by 8736
Abstract
Smart, secure and energy-efficient data collection (DC) processes are key to the realization of the full potentials of future Internet of Things (FIoT)-based systems. Currently, challenges in this domain have motivated research efforts towards providing cognitive solutions for IoT usage. One such solution, [...] Read more.
Smart, secure and energy-efficient data collection (DC) processes are key to the realization of the full potentials of future Internet of Things (FIoT)-based systems. Currently, challenges in this domain have motivated research efforts towards providing cognitive solutions for IoT usage. One such solution, termed cognitive sensing (CS) describes the use of smart sensors to intelligently perceive inputs from the environment. Further, CS has been proposed for use in FIoT in order to facilitate smart, secure and energy-efficient data collection processes. In this article, we provide a survey of different Artificial Intelligence (AI)-based techniques used over the last decade to provide cognitive sensing solutions for different FIoT applications. We present some state-of-the-art approaches, potentials, and challenges of AI techniques for the identified solutions. This survey contributes to a better understanding of AI techniques deployed for cognitive sensing in FIoT as well as future research directions in this regard. Full article
Show Figures

Figure 1

26 pages, 2997 KiB  
Review
A Survey on LPWAN Technologies in WBAN for Remote Health-Care Monitoring
by Damilola D. Olatinwo, Adnan Abu-Mahfouz and Gerhard Hancke
Sensors 2019, 19(23), 5268; https://doi.org/10.3390/s19235268 - 29 Nov 2019
Cited by 78 | Viewed by 10579
Abstract
In ubiquitous health-care monitoring (HCM), wireless body area networks (WBANs) are envisioned as appealing solutions that may offer reliable methods for real-time monitoring of patients’ health conditions by employing the emerging communication technologies. This paper therefore focuses more on the state-of-the-art wireless communication [...] Read more.
In ubiquitous health-care monitoring (HCM), wireless body area networks (WBANs) are envisioned as appealing solutions that may offer reliable methods for real-time monitoring of patients’ health conditions by employing the emerging communication technologies. This paper therefore focuses more on the state-of-the-art wireless communication systems that can be explored in the next-generation WBAN solutions for HCM. Also, this study addressed the critical issues confronted by the existing WBANs that are employed in HCM. Examples of such issues include wide-range health data communication constraint, health data delivery reliability concern, and energy efficiency, which are attributed to the limitations of the legacy short range, medium range, and the cellular technologies that are typically employed in WBAN systems. Since the WBAN sensor devices are usually configured with a finite battery power, they often get drained during prolonged operations. This phenomenon is technically exacerbated by the fact that the legacy communication systems, such as ZigBee, Bluetooth, 6LoWPAN, and so on, consume more energy during data communications. This unfortunate situation offers a scope for employing suitable communication systems identified in this study to improve the productivity of WBANs in HCM. For this to be achieved, the emerging communication systems such as the low-power wide-area networks (LPWANs) are investigated in this study based on their power transmission, data transmission rate, data reliability in the context of efficient data delivery, communication coverage, and latency, including their advantages, as well as disadvantages. As a consequence, the LPWAN solutions are presented for WBAN systems in remote HCM. Furthermore, this research work also points out future directions for the realization of the next-generation of WBANs, as well as how to improve the identified communication systems, to further enhance their productivity in WBAN solutions for HCM. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

28 pages, 3672 KiB  
Article
Evaluating the Implications of Varying Bluetooth Low Energy (BLE) Transmission Power Levels on Wireless Indoor Localization Accuracy and Precision
by Umair Mujtaba Qureshi, Zuneera Umair and Gerhard Petrus Hancke
Sensors 2019, 19(15), 3282; https://doi.org/10.3390/s19153282 - 25 Jul 2019
Cited by 35 | Viewed by 5644
Abstract
Bluetooth Low Energy (BLE) based Wireless Indoor Localization System (WILS) with high localization accuracy and high localization precision is a key requirement in enabling the Internet of Things (IoT) in today’s applications. In this paper, we investigated the effect of BLE signal variations [...] Read more.
Bluetooth Low Energy (BLE) based Wireless Indoor Localization System (WILS) with high localization accuracy and high localization precision is a key requirement in enabling the Internet of Things (IoT) in today’s applications. In this paper, we investigated the effect of BLE signal variations on indoor localization caused by the change in BLE transmission power levels. This issue is not often discussed as most of the works on localization algorithms use the highest power levels but has important practical implications for energy efficiency, e.g., if a designer would like to trade-off localization performance and node lifetime. To analyze the impact, we used the established trilateration based localization model with two methods i.e., Centroid Approximation (CA) and Minimum Mean Square Error (MMSE). We observed that trilateration based localization with MMSE method outperforms the CA method. We further investigated the use of two filters i.e., Low Pass Filter (LPF) and Kalman Filter (KF) and evaluated their effects in terms of mitigating the random variations from BLE signal. In comparison to non-filter based approach, we observed a great improvement in localization accuracy and localization precision with a filter-based approach. Furthermore, in comparison to LPF based trilateration localization with CA, the performance of a KF based trilateration localization with MMSE is far better. An average of 1 m improvement in localization accuracy and approximately 50% improvement in localization precision is observed by using KF in trilateration based localization model with the MMSE method. In conclusion, with KF in trilateration based localization model with MMSE method effectively eliminates random variations in BLE RSS with multiple transmission power levels and thus results in a BLE based WILS with high accuracy and high precision. Full article
(This article belongs to the Special Issue Intelligent Industrial Application of Consumer Wireless Technologies)
Show Figures

Figure 1

Back to TopTop