Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (53)

Search Parameters:
Keywords = WMSN

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 1463 KB  
Article
PUF-Based Secure Authentication Protocol for Cloud-Assisted Wireless Medical Sensor Networks
by Minsu Kim, Taehun Kim, Deokkyu Kwon and Youngho Park
Electronics 2026, 15(1), 240; https://doi.org/10.3390/electronics15010240 - 5 Jan 2026
Viewed by 332
Abstract
Wireless medical sensor networks (WMSNs) have evolved alongside the development of communication systems, and the integration of cloud computing has enabled scalable and efficient medical data management. However, since the messages in WMSNs are transmitted over open channels, they are vulnerable to eavesdropping, [...] Read more.
Wireless medical sensor networks (WMSNs) have evolved alongside the development of communication systems, and the integration of cloud computing has enabled scalable and efficient medical data management. However, since the messages in WMSNs are transmitted over open channels, they are vulnerable to eavesdropping, replay, impersonation, and other various attacks. In response to these security concerns, Keshta et al. suggested an authentication protocol to establish secure communication in the cloud-assisted WMSNs. However, our analysis reveals their protocol cannot prevent session key disclosure, impersonation of the user and sensor node, and denial of service (DoS) attacks. Moreover, Keshta et al.’s protocol cannot support user untraceability due to fixed hidden identity. To address these weaknesses, we propose a physical unclonable function (PUF) based secure authentication protocol for cloud-assisted WMSNs. The protocol uses lightweight operations, provides mutual authentication between user, cloud server, and sensor node, and supports user anonymity and untraceability. We validate the proposed protocol’s security through informal analysis on various security attacks and formal analysis including “Burrows–Abadi–Needham (BAN) logic”, “Real-or-Random (RoR) model” for session key security, and “Automated Validation of Internet Security Protocols and Application (AVISPA) simulations”. Performance evaluation demonstrates lower communication cost and computation overhead compared with existing protocols, making the proposed protocol suitable for WMSN environments. Full article
(This article belongs to the Special Issue Trends in Information Systems and Security)
Show Figures

Figure 1

26 pages, 12018 KB  
Article
A Secure and Lightweight ECC-Based Authentication Protocol for Wireless Medical Sensors Networks
by Yu Shang, Junhua Chen, Shenjin Wang, Ya Zhang and Kaixuan Ma
Sensors 2025, 25(21), 6567; https://doi.org/10.3390/s25216567 - 24 Oct 2025
Cited by 1 | Viewed by 1147
Abstract
Wireless Medical Sensor Networks (WMSNs) collect and transmit patients’ physiological data in real time through various sensors, playing an increasingly important role in intelligent healthcare. Authentication protocols in WMSNs ensure that users can securely access real-time data from sensor nodes. Although many researchers [...] Read more.
Wireless Medical Sensor Networks (WMSNs) collect and transmit patients’ physiological data in real time through various sensors, playing an increasingly important role in intelligent healthcare. Authentication protocols in WMSNs ensure that users can securely access real-time data from sensor nodes. Although many researchers have proposed authentication schemes to resist common attacks, insufficient attention has been paid to insider attacks and ephemeral secret leakage (ESL) attacks. Moreover, existing adversary models still have limitations in accurately characterizing an attacker’s capabilities. To address these issues, this paper extends the traditional adversary model to better reflect practical deployment scenarios, assuming a semi-trusted server and allowing adversaries to obtain users’ temporary secrets. Based on this enhanced model, we design an efficient ECC-based authentication and key agreement protocol that ensures the confidentiality of users’ passwords, biometric data, and long-term private keys during the registration phase, thereby mitigating insider threats. The proposed protocol combines anonymous authentication and elliptic curve cryptography (ECC) key exchange to satisfy security requirements. Performance analysis demonstrates that the proposed protocol achieves lower computational and communication costs compared with existing schemes. Furthermore, the protocol’s security is formally proven under the Random Oracle (ROR) model and verified using the ProVerif tool, confirming its security and reliability. Therefore, the proposed protocol can be effectively applied to secure data transmission and user authentication in wireless medical sensor networks and other IoT environments. Full article
(This article belongs to the Section Biomedical Sensors)
Show Figures

Figure 1

13 pages, 6123 KB  
Article
Energy-Efficient Wireless Multimedia Sensor Nodes for Plant Proximal Monitoring
by Daniele Trinchero, Giovanni Paolo Colucci, Elena Filipescu, Ussama Syed Muhammad Zafar and Paola Battilani
Sensors 2024, 24(24), 8088; https://doi.org/10.3390/s24248088 - 18 Dec 2024
Cited by 2 | Viewed by 1934
Abstract
The paper presents a double-radio wireless multimedia sensor node (WMSN) with a camera on board, designed for plant proximal monitoring. Camera sensor nodes represent an effective solution to monitor the crop at the leaf or fruit scale, with details that cannot be retrieved [...] Read more.
The paper presents a double-radio wireless multimedia sensor node (WMSN) with a camera on board, designed for plant proximal monitoring. Camera sensor nodes represent an effective solution to monitor the crop at the leaf or fruit scale, with details that cannot be retrieved with the same precision through satellites or unnamed aerial vehicles (UAVs). From the technological point of view, WMSNs are characterized by very different requirements, compared to standard wireless sensor nodes; in particular, the network data rate results in higher energy consumption and incompatibility with the usage of battery-powered devices. Avoiding energy harvesters allows for device miniaturization and, consequently, application flexibility, even for small plants. To do this, the proposed node has been implemented with two radios, with different roles. A GPRS modem has been exclusively implemented for image transmission, while all other tasks, including node monitoring and camera control, are performed by a LoRaWAN class A end-node that connects every 10 min. Via the LoRaWAN downlink, it is possible to efficiently control the camera settings; the shooting times and periodicity, according to weather conditions; the eventual farming operations; the crop growth stages and the season. The node energy consumption has been verified in the laboratory and in the field, showing that it is possible to acquire one picture per day for more than eight months without any energy harvester, opening up further possible implementations for disease detection and production optimization. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

26 pages, 1111 KB  
Article
Buffer Occupancy-Based Congestion Control Protocol for Wireless Multimedia Sensor Networks
by Uzma Majeed, Aqdas Naveed Malik, Nasim Abbas, Ahmed S. Alfakeeh, Muhammad Awais Javed and Waseem Abbass
Electronics 2024, 13(22), 4454; https://doi.org/10.3390/electronics13224454 - 13 Nov 2024
Cited by 4 | Viewed by 1847
Abstract
Wireless multimedia sensor networks (WMSNs) have stringent constraints and need to deliver data packets to the sink node within a predefined limited time. However, due to congestion, buffer overflow occurs and leads to the degradation of the quality-of-service (QoS) parameters of event information. [...] Read more.
Wireless multimedia sensor networks (WMSNs) have stringent constraints and need to deliver data packets to the sink node within a predefined limited time. However, due to congestion, buffer overflow occurs and leads to the degradation of the quality-of-service (QoS) parameters of event information. Congestion in WMSNs results in exhausted node energy, degraded network performance, increased transmission delays, and high packet loss. Congestion occurs when the volume of data trying to pass through a network exceeds its capacity. First, the BOCC protocol uses two congestion indicators to detect congestion. One is the buffer occupancy and other is the buffer occupancy change rate. Second, a rate controller is proposed to protect high-priority I-frame packets during congestion. BOCC sends a congestion notification to the source node to reduce congestion in the network. The source node adjusts its data transmission rate after receiving the congestion notification message. In the proposed algorithm, the rate adjustment is made by discarding low-priority P-frame packets from the source nodes. Third, to further improve the performance of the BOCC protocol, the problem is formulated as a constrained optimization problem and solved using convex optimization and sequential quadratic programming (SQP) methods. Experimental results based on Raspberry Pi sensor nodes show that the BOCC protocol achieves up to 16% reduction in packet loss and up to 23% reduction in average end-to-end delay compared to state-of-the-art congestion control algorithms. Full article
(This article belongs to the Special Issue Recent Advances in Wireless Ad Hoc and Sensor Networks)
Show Figures

Figure 1

13 pages, 574 KB  
Article
Optimizing Energy Consumption and QoS in WMSNs Using Queueing Theory
by Mohammed B. Abazeed, Mohammed Ali and Ali Alqahtani
Sustainability 2023, 15(18), 13559; https://doi.org/10.3390/su151813559 - 11 Sep 2023
Cited by 3 | Viewed by 2035
Abstract
The limited resources and enormous amounts of data generated by multimedia sensors require efficient strategies to extend network lifetime while taking into account quality-of-service requirements such as reliability and delay. In contrast, limited battery resources require new techniques to balance energy consumption and [...] Read more.
The limited resources and enormous amounts of data generated by multimedia sensors require efficient strategies to extend network lifetime while taking into account quality-of-service requirements such as reliability and delay. In contrast, limited battery resources require new techniques to balance energy consumption and multimedia application requirements in wireless multimedia sensor networks (WMSNs). These requirements are very critical, especially for network stability and performance. In this paper, an energy-efficient mechanism based on the M/D/1/B queueing model is proposed. According to the packets in the queue and the waiting time, the nodes decide their activation time, so the nodes wake up for a while to transmit the data in the queue and then go to sleep mode. The simulation results of the proposed algorithm show that the proposed mechanism achieves optimal values to reduce energy consumption while meeting the quality-of-service requirements under different conditions. Full article
(This article belongs to the Special Issue Smart Grid Optimization and Sustainable Power System Management)
Show Figures

Figure 1

17 pages, 4683 KB  
Article
An Energy-Efficient Sensing Matrix for Wireless Multimedia Sensor Networks
by Vusi Skosana and Adnan Abu-Mahfouz
Sensors 2023, 23(10), 4843; https://doi.org/10.3390/s23104843 - 17 May 2023
Cited by 3 | Viewed by 1840
Abstract
A measurement matrix is essential to compressed sensing frameworks. The measurement matrix can establish the fidelity of a compressed signal, reduce the sampling rate demand, and enhance the stability and performance of the recovery algorithm. Choosing a suitable measurement matrix for Wireless Multimedia [...] Read more.
A measurement matrix is essential to compressed sensing frameworks. The measurement matrix can establish the fidelity of a compressed signal, reduce the sampling rate demand, and enhance the stability and performance of the recovery algorithm. Choosing a suitable measurement matrix for Wireless Multimedia Sensor Networks (WMSNs) is demanding because there is a sensitive weighing of energy efficiency against image quality that must be performed. Many measurement matrices have been proposed to deliver low computational complexity or high image quality, but only some have achieved both, and even fewer have been proven beyond doubt. A Deterministic Partial Canonical Identity (DPCI) matrix is proposed that has the lowest sensing complexity of the leading energy-efficient sensing matrices while offering better image quality than the Gaussian measurement matrix. The simplest sensing matrix is the basis of the proposed matrix, where random numbers were replaced with a chaotic sequence, and the random permutation was replaced with random sample positions. The novel construction significantly reduces the computational complexity as well time complexity of the sensing matrix. The DPCI has lower recovery accuracy than other deterministic measurement matrices such as the Binary Permuted Block Diagonal (BPBD) and Deterministic Binary Block Diagonal (DBBD) but offers a lower construction cost than the BPBD and lower sensing cost than the DBBD. This matrix offers the best balance between energy efficiency and image quality for energy-sensitive applications. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

30 pages, 5403 KB  
Article
A Study on Energy Efficiency of a Distributed Processing Scheme for Image-Based Target Recognition for Internet of Multimedia Things
by Adel Soudani, Manal Alsabhan and Manan Almusallam
Computers 2023, 12(5), 99; https://doi.org/10.3390/computers12050099 - 4 May 2023
Cited by 2 | Viewed by 2640
Abstract
A growing number of services and applications are developed using multimedia sensing low-cost wireless devices, thus creating the Internet of Multimedia Things (IoMT). Nevertheless, energy efficiency and resource availability are two of the most challenging issues to overcome when developing image-based sensing applications. [...] Read more.
A growing number of services and applications are developed using multimedia sensing low-cost wireless devices, thus creating the Internet of Multimedia Things (IoMT). Nevertheless, energy efficiency and resource availability are two of the most challenging issues to overcome when developing image-based sensing applications. In depth, image-based sensing and transmission in IoMT significantly drain the sensor energy and overwhelm the network with redundant data. Event-based sensing schemes can be used to provide efficient data transmission and an extended network lifetime. This paper proposes a novel approach for distributed event-based sensing achieved by a cluster of processing nodes. The proposed scheme aims to balance the processing load across the nodes in the cluster. This study demonstrates the adequacy of distributed processing to extend the lifetime of the IoMT platform and compares the efficiency of Haar wavelet decomposition and general Fourier descriptors (GFDs) as a feature extraction module in a distributed features-based target recognition system. The results show that the distributed processing of the scheme based on the Haar wavelet transform of the image outperforms the scheme based on a general Fourier shape descriptor in recognition accuracy of the target as well as the energy consumption. In contrast to a GFD-based scheme, the recognition accuracy of a Haar-based scheme was increased by 26%, and the number of sensing cycles was increased from 40 to 70 cycles, which attests to the adequacy of the proposed distributed Haar-based processing scheme for deployment in IoMT devices. Full article
(This article belongs to the Section Internet of Things (IoT) and Industrial IoT)
Show Figures

Figure 1

27 pages, 517 KB  
Article
A Secure and Anonymous Authentication Protocol Based on Three-Factor Wireless Medical Sensor Networks
by JoonYoung Lee, Jihyeon Oh and Youngho Park
Electronics 2023, 12(6), 1368; https://doi.org/10.3390/electronics12061368 - 13 Mar 2023
Cited by 28 | Viewed by 3084
Abstract
Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have enabled medical professionals to identify patients’ health information in real time to identify and diagnose their conditions. However, since wireless communication is performed through an open channel, an attacker can [...] Read more.
Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have enabled medical professionals to identify patients’ health information in real time to identify and diagnose their conditions. However, since wireless communication is performed through an open channel, an attacker can steal or manipulate the transmitted and received information. Because these attacks are directly related to the patients’ lives, it is necessary to prevent these attacks upfront by providing the security of WMSN communication. Although authentication protocols are continuously developed to establish the security of WMSN communication, they are still vulnerable to attacks. Recently, Yuanbing et al. proposed a secure authentication scheme for WMSN. They emphasized that their protocol is able to resist various attacks and can ensure mutual authentication. Unfortunately, this paper demonstrates that Yuanbing et al.’s protocol is vulnerable to smart card stolen attacks, ID/password guessing attacks, and sensor node capture attacks. In order to overcome the weaknesses and effectiveness of existing studies and to ensure secure communication and user anonymity of WMSN, we propose a secure and anonymous authentication protocol. The proposed protocol can prevent sensor capture, guessing, and man-in-the-middle attacks. To demonstrate the security of the proposed protocol, we perform various formal and informal analyses using AVISPA tools, ROR models, and BAN logic. Additionally, we compare the security aspects with related protocols to prove that the proposed protocol has excellent security. We also prove the effectiveness of our proposed protocol compared with related protocols in computation and communication costs. Our protocol has low or comparable computation and communication costs compared to related protocols. Thus, our protocol can provide services in the WMSN environment. Full article
(This article belongs to the Special Issue Feature Papers in Computer Science & Engineering)
Show Figures

Figure 1

22 pages, 4162 KB  
Article
A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN
by M. A. Matheen and S. Sundar
Sensors 2023, 23(4), 2218; https://doi.org/10.3390/s23042218 - 16 Feb 2023
Cited by 10 | Viewed by 3301
Abstract
Wireless Multimedia Sensor Network (WMSN) is a powerful technology that is widely used to gather data and monitor the actual environment for analysis. Furthermore, multimedia applications’ needs and the features, such as constrained latency and high bandwidth consumption, complicate the design of WMSN [...] Read more.
Wireless Multimedia Sensor Network (WMSN) is a powerful technology that is widely used to gather data and monitor the actual environment for analysis. Furthermore, multimedia applications’ needs and the features, such as constrained latency and high bandwidth consumption, complicate the design of WMSN routing protocols. Despite several methods, the trouble of designing WMSNs routing protocol remains a hurdle. The miniaturization and enhancement of hardware facilitate an extensive range of applications in the military and public sectors. On the contrary, the streaming of multimedia content is captured and generated due to some event-triggered surveillance for a long duration of time. Hence, it is necessary for wireless multimedia sensor network (WMSN) to provide a strong hardware foundation, thereby satisfying Quality of Service (QoS) requirements. Initially, the network is clustered into several clusters and the nodes with rich resources are chosen as cluster heads. The significant intention of this paper is to eliminate data redundancy and to select optimal cluster heads, thereby minimizing the energy consumption. Therefore, this paper proposes a novel Fuzzy Criminal Search Ebola Optimization (FCSEO) algorithm for optimal selection of cluster heads. In addition to this, the data redundancy present in the proposed algorithm is mitigated and thus the network lifetime is enhanced. Finally, extensive experimentation is carried out for various performance measures to determine the efficiency of the proposed approach. Full article
(This article belongs to the Special Issue Advanced Technologies in Sensor Networks and Internet of Things)
Show Figures

Figure 1

16 pages, 5286 KB  
Article
An Energy-Efficient Distributed Congestion Control Protocol for Wireless Multimedia Sensor Networks
by Uzma Majeed, Aqdas Naveed Malik, Nasim Abbas and Waseem Abbass
Electronics 2022, 11(20), 3265; https://doi.org/10.3390/electronics11203265 - 11 Oct 2022
Cited by 18 | Viewed by 2944
Abstract
Wireless multimedia sensor networks (WMSNs) generate a huge amount of multimedia data. Congestion is one of the most challenging open issues in WMSNs. Congestion causes low throughput, high packet loss and low energy efficiency. Congestion happens when the data carried by the network [...] Read more.
Wireless multimedia sensor networks (WMSNs) generate a huge amount of multimedia data. Congestion is one of the most challenging open issues in WMSNs. Congestion causes low throughput, high packet loss and low energy efficiency. Congestion happens when the data carried by the network surpasses the available capacity. This article presents an energy-efficient distributed congestion control protocol (DCCP) to mitigate congestion and improve end-to-end delay. Compared to the other protocols, the DCCP protocol proposed in this article can alleviate congestion by intelligently selecting the best path. First, congestion is detected by using two congestion indicators. Second, each node aggregates the received data and builds a traffic congestion map. The traffic congestion map is used to calculate the best path. Therefore, the traffic is balanced on different routes, which reduces the end-to-end delay. Finally, a rate controller is designed to prevent congestion in the network by sending a congestion notification message to a source node. After receiving a congestion notification message, the source node immediately adjusts its transmission rate. Experimental results based on raspberry pi sensor nodes show that the proposed DCCP protocol significantly improves network performance and is superior to existing modern congestion control protocols. Full article
(This article belongs to the Topic Wireless Sensor Networks)
Show Figures

Figure 1

22 pages, 19376 KB  
Article
An Intra-Vehicular Wireless Multimedia Sensor Network for Smartphone-Based Low-Cost Advanced Driver-Assistance Systems
by Christiaan M. Fourie and Hermanus Carel Myburgh
Sensors 2022, 22(8), 3026; https://doi.org/10.3390/s22083026 - 15 Apr 2022
Cited by 4 | Viewed by 3834
Abstract
Advanced driver-assistance system(s) (ADAS) are more prevalent in high-end vehicles than in low-end vehicles. Wired solutions of vision sensors in ADAS already exist, but are costly and do not cater for low-end vehicles. General ADAS use wired harnessing for communication; this approach eliminates [...] Read more.
Advanced driver-assistance system(s) (ADAS) are more prevalent in high-end vehicles than in low-end vehicles. Wired solutions of vision sensors in ADAS already exist, but are costly and do not cater for low-end vehicles. General ADAS use wired harnessing for communication; this approach eliminates the need for cable harnessing and, therefore, the practicality of a novel wireless ADAS solution was tested. A low-cost alternative is proposed that extends a smartphone’s sensor perception, using a camera-based wireless sensor network. This paper presents the design of a low-cost ADAS alternative that uses an intra-vehicle wireless sensor network structured by a Wi-Fi Direct topology, using a smartphone as the processing platform. The proposed system makes ADAS features accessible to cheaper vehicles and investigates the possibility of using a wireless network to communicate ADAS information in a intra-vehicle environment. Other ADAS smartphone approaches make use of a smartphone’s onboard sensors; however, this paper shows the application of essential ADAS features developed on the smartphone’s ADAS application, carrying out both lane detection and collision detection on a vehicle by using wireless sensor data. A smartphone’s processing power was harnessed and used as a generic object detector through a convolution neural network, using the sensory network’s video streams. The network’s performance was analysed to ensure that the network could carry out detection in real-time. A low-cost CMOS camera sensor network with a smartphone found an application, using Wi-Fi Direct, to create an intra-vehicle wireless network as a low-cost advanced driver-assistance system. Full article
(This article belongs to the Topic Wireless Sensor Networks)
Show Figures

Figure 1

27 pages, 532 KB  
Article
Provably Secure Three-Factor-Based Mutual Authentication Scheme with PUF for Wireless Medical Sensor Networks
by DeokKyu Kwon, YoHan Park and YoungHo Park
Sensors 2021, 21(18), 6039; https://doi.org/10.3390/s21186039 - 9 Sep 2021
Cited by 33 | Viewed by 4253
Abstract
Wireless medical sensor networks (WMSNs) are used in remote medical service environments to provide patients with convenient healthcare services. In a WMSN environment, patients wear a device that collects their health information and transmits the information via a gateway. Then, doctors make a [...] Read more.
Wireless medical sensor networks (WMSNs) are used in remote medical service environments to provide patients with convenient healthcare services. In a WMSN environment, patients wear a device that collects their health information and transmits the information via a gateway. Then, doctors make a diagnosis regarding the patient, utilizing the health information. However, this information can be vulnerable to various security attacks because the information is exchanged via an insecure channel. Therefore, a secure authentication scheme is necessary for WMSNs. In 2021, Masud et al. proposed a lightweight and anonymity-preserving user authentication scheme for healthcare environments. We discover that Masud et al.’s scheme is insecure against offline password guessing, user impersonation, and privileged insider attacks. Furthermore, we find that Masud et al.’s scheme cannot ensure user anonymity. To address the security vulnerabilities of Masud et al.’s scheme, we propose a three-factor-based mutual authentication scheme with a physical unclonable function (PUF). The proposed scheme is secure against various security attacks and provides anonymity, perfect forward secrecy, and mutual authentication utilizing biometrics and PUF. To prove the security features of our scheme, we analyze the scheme using informal analysis, Burrows–Abadi–Needham (BAN) logic, the Real-or-Random (RoR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. Furthermore, we estimate our scheme’s security features, computation costs, communication costs, and energy consumption compared with the other related schemes. Consequently, we demonstrate that our scheme is suitable for WMSNs. Full article
(This article belongs to the Special Issue Security Assessment in IoT-Based Wireless Sensor Networks)
Show Figures

Figure 1

11 pages, 3476 KB  
Article
Energy Aware and Quality of Service Routing Mechanism for Hybrid Internet of Things Network
by Eyassu Dilla Diratie, Durga Prasad Sharma and Khaldoun Al Agha
Computers 2021, 10(8), 93; https://doi.org/10.3390/computers10080093 - 3 Aug 2021
Cited by 3 | Viewed by 3006
Abstract
Wireless Multimedia Sensor Networks (WMSNs) based on IEEE 802.11 mesh networks are effective and suitable solutions for video surveillance systems in detecting intrusions in selected monitored areas. The IEEE 802.11-based WMSNs offer high bit rate video transmissions but are challenged by energy inefficiency [...] Read more.
Wireless Multimedia Sensor Networks (WMSNs) based on IEEE 802.11 mesh networks are effective and suitable solutions for video surveillance systems in detecting intrusions in selected monitored areas. The IEEE 802.11-based WMSNs offer high bit rate video transmissions but are challenged by energy inefficiency issues and concerns. To resolve the energy inefficiency challenges, the salient research studies proposed a hybrid architecture. This newly evolved architecture is based on the integration of IEEE 802.11-based mesh WMSNs along with the LoRa network to form an autonomous and high bitrate, energy-efficient video surveillance system. This paper proposes an energy-aware and Quality of Service (QoS) routing mechanism for mesh-connected visual sensor nodes in a hybrid Internet of Things (IoT) network. The routing algorithm allows routing a set of video streams with guaranteed bandwidth and limited delay using as few visual sensor nodes as possible in the network. The remaining idle visual sensor nodes can be turned off completely, and thus it can significantly minimize the overall energy consumption of the network. The proposed algorithm is numerically simulated, and the results show that the proposed approach can help in saving a significant amount of energy consumption while guaranteeing bandwidth and limited delay. Full article
(This article belongs to the Special Issue Edge Computing for the IoT)
Show Figures

Figure 1

15 pages, 4310 KB  
Article
An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
by Shadi Nashwan and Imad I. H. Nashwan
Sensors 2021, 21(15), 4980; https://doi.org/10.3390/s21154980 - 22 Jul 2021
Cited by 1 | Viewed by 1971
Abstract
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LAP is executed between [...] Read more.
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LAP is executed between all communication nodes, the SAP is executed (m) times between the physician and patient by deriving a new key from the PSij key generated by healthcare service provider during the LAP. In addition, the WAP is executed between the connected sensor and patient (m + 1) times without going back to the service provider. Thus, it is critical to determine an appropriate (m) value to maintain a specific security level and to minimize the cost of E2EA. Therefore, we proposed an analytic model in which the authentication signaling traffic is represented by a Poisson process to derive an authentication signaling traffic cost function for the (m) value. wherein the residence time of authentication has three distributions: gamma, hypo-exponential, and exponential. Finally, using the numerical analysis of the derived cost function, an optimal value (m) that minimizes the authentication signaling traffic cost of the E2EA scheme was determined. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

17 pages, 650 KB  
Article
Cross-SN: A Lightweight Authentication Scheme for a Multi-Server Platform Using IoT-Based Wireless Medical Sensor Network
by Haqi Khalid, Shaiful Jahari Hashim, Sharifah Mumtazah Syed Ahmad, Fazirulhisyam Hashim and Muhammad Akmal Chaudhary
Electronics 2021, 10(7), 790; https://doi.org/10.3390/electronics10070790 - 26 Mar 2021
Cited by 15 | Viewed by 3353
Abstract
Several wireless devices and applications can be connected through wireless communication technologies to exchange data in future intelligent health systems (e.g., the Internet of Medical Things (IoMT)). Smart healthcare requires ample bandwidth, reliable and effective communications networks, energy-efficient operations, and quality of service [...] Read more.
Several wireless devices and applications can be connected through wireless communication technologies to exchange data in future intelligent health systems (e.g., the Internet of Medical Things (IoMT)). Smart healthcare requires ample bandwidth, reliable and effective communications networks, energy-efficient operations, and quality of service support (QoS). Healthcare service providers host multi-servers to ensure seamless services are provided to the end-users. By supporting a multi-server environment, healthcare medical sensors produce many data transmitted via servers, which is impossible in a single-server architecture. To ensure data security, secure online communication must be considered since the transmitted data are sensitive. Hence, the adversary may try to interrupt the transmission and drop or modify the message. Many researchers have proposed an authentication scheme to secure the data, but the schemes are vulnerable to specific attacks (modification attacks, replay attacks, server spoofing attacks, Man-in-the middle (MiTM) attacks, etc.). However, the absence of an authentication scheme that supports a multi-server security in such a comprehensive development in a distributed server is still an issue. In this paper, a secure authentication scheme using wireless medical sensor networks for a multi-server environment is proposed (Cross-SN). The scheme is implemented with a smart card, password, and user identity. Elliptic curve cryptography is utilized in the scheme, and Burrows–Abadi–Needham (BAN) logic is utilized to secure mutual authentication and to analyse the proposed scheme’s security. It offers adequate protection against replies, impersonation, and privileged insider attacks and secure communication in multi-server parties that communicate with each other. Full article
(This article belongs to the Special Issue Cybersecurity for Wireless Networking)
Show Figures

Figure 1

Back to TopTop