Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (217)

Search Parameters:
Keywords = ubiquitous sensor network

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
37 pages, 1895 KiB  
Review
A Review of Artificial Intelligence and Deep Learning Approaches for Resource Management in Smart Buildings
by Bibars Amangeldy, Timur Imankulov, Nurdaulet Tasmurzayev, Gulmira Dikhanbayeva and Yedil Nurakhov
Buildings 2025, 15(15), 2631; https://doi.org/10.3390/buildings15152631 - 25 Jul 2025
Viewed by 784
Abstract
This comprehensive review maps the fast-evolving landscape in which artificial intelligence (AI) and deep-learning (DL) techniques converge with the Internet of Things (IoT) to manage energy, comfort, and sustainability across smart environments. A PRISMA-guided search of four databases retrieved 1358 records; after applying [...] Read more.
This comprehensive review maps the fast-evolving landscape in which artificial intelligence (AI) and deep-learning (DL) techniques converge with the Internet of Things (IoT) to manage energy, comfort, and sustainability across smart environments. A PRISMA-guided search of four databases retrieved 1358 records; after applying inclusion criteria, 143 peer-reviewed studies published between January 2019 and April 2025 were analyzed. This review shows that AI-driven controllers—especially deep-reinforcement-learning agents—deliver median energy savings of 18–35% for HVAC and other major loads, consistently outperforming rule-based and model-predictive baselines. The evidence further reveals a rapid diversification of methods: graph-neural-network models now capture spatial interdependencies in dense sensor grids, federated-learning pilots address data-privacy constraints, and early integrations of large language models hint at natural-language analytics and control interfaces for heterogeneous IoT devices. Yet large-scale deployment remains hindered by fragmented and proprietary datasets, unresolved privacy and cybersecurity risks associated with continuous IoT telemetry, the growing carbon and compute footprints of ever-larger models, and poor interoperability among legacy equipment and modern edge nodes. The authors of researches therefore converges on several priorities: open, high-fidelity benchmarks that marry multivariate IoT sensor data with standardized metadata and occupant feedback; energy-aware, edge-optimized architectures that lower latency and power draw; privacy-centric learning frameworks that satisfy tightening regulations; hybrid physics-informed and explainable models that shorten commissioning time; and digital-twin platforms enriched by language-model reasoning to translate raw telemetry into actionable insights for facility managers and end users. Addressing these gaps will be pivotal to transforming isolated pilots into ubiquitous, trustworthy, and human-centered IoT ecosystems capable of delivering measurable gains in efficiency, resilience, and occupant wellbeing at scale. Full article
(This article belongs to the Section Building Energy, Physics, Environment, and Systems)
Show Figures

Figure 1

21 pages, 3672 KiB  
Article
Research on a Multi-Type Barcode Defect Detection Model Based on Machine Vision
by Ganglong Duan, Shaoyang Zhang, Yanying Shang, Yongcheng Shao and Yuqi Han
Appl. Sci. 2025, 15(15), 8176; https://doi.org/10.3390/app15158176 - 23 Jul 2025
Viewed by 294
Abstract
Barcodes are ubiquitous in manufacturing and logistics, but defects can reduce decoding efficiency and disrupt the supply chain. Existing studies primarily focus on a single barcode type or rely on small-scale datasets, limiting generalizability. We propose Y8-LiBAR Net, a lightweight two-stage framework for [...] Read more.
Barcodes are ubiquitous in manufacturing and logistics, but defects can reduce decoding efficiency and disrupt the supply chain. Existing studies primarily focus on a single barcode type or rely on small-scale datasets, limiting generalizability. We propose Y8-LiBAR Net, a lightweight two-stage framework for multi-type barcode defect detection. In stage 1, a YOLOv8n backbone localizes 1D and 2D barcodes in real time. In stage 2, a dual-branch network integrating ResNet50 and ViT-B/16 via hierarchical attention performs three-class classification on cropped regions of interest (ROIs): intact, defective, and non-barcode. Experiments conducted on the public BarBeR dataset, covering planar/non-planar surfaces, varying illumination, and sensor noise, show that Y8-LiBARNet achieves a detection-stage mAP@0.5 = 0.984 (1D: 0.992; 2D: 0.977) with a peak F1 score of 0.970. Subsequent defect classification attains 0.925 accuracy, 0.925 recall, and a 0.919 F1 score. Compared with single-branch baselines, our framework improves overall accuracy by 1.8–3.4% and enhances defective barcode recall by 8.9%. A Cohen’s kappa of 0.920 indicates strong label consistency and model robustness. These results demonstrate that Y8-LiBARNet delivers high-precision real-time performance, providing a practical solution for industrial barcode quality inspection. Full article
Show Figures

Figure 1

21 pages, 2469 KiB  
Article
Robust Low-Overlap Point Cloud Registration via Displacement-Corrected Geometric Consistency for Enhanced 3D Sensing
by Xin Wang and Qingguang Li
Sensors 2025, 25(14), 4332; https://doi.org/10.3390/s25144332 - 11 Jul 2025
Viewed by 493
Abstract
Accurate alignment of 3D point clouds, achieved by ubiquitous sensors such as LiDAR and depth cameras, is critical for enhancing perception capabilities in robotics, autonomous navigation, and environmental reconstruction. However, low-overlap scenarios—common due to limited sensor field-of-view or occlusions—severely degrade registration robustness and [...] Read more.
Accurate alignment of 3D point clouds, achieved by ubiquitous sensors such as LiDAR and depth cameras, is critical for enhancing perception capabilities in robotics, autonomous navigation, and environmental reconstruction. However, low-overlap scenarios—common due to limited sensor field-of-view or occlusions—severely degrade registration robustness and sensing reliability. To address this challenge, this paper proposes a novel geometric consistency optimization and rectification deep learning network named GeoCORNet. By synergistically designing a geometric consistency enhancement module, a bidirectional cross-attention mechanism, a predictive displacement rectification strategy, and joint optimization of overlap loss with displacement loss, GeoCORNet significantly improves registration accuracy and robustness in complex scenarios. The Attentive Cross-Consistency module of GeoCORNet integrates distance and angular consistency constraints with bidirectional cross-attention to significantly suppress noise from non-overlapping regions while reinforcing geometric coherence in overlapping areas. The predictive displacement rectification strategy dynamically rectifies erroneous correspondences through predicted 3D displacements instead of discarding them, maximizing the utility of sparse sensor data. Furthermore, a novel displacement loss function was developed to effectively constrain the geometric distribution of corrected point-pairs. Experimental results demonstrate that our method outperformed existing approaches in the aspects of registration recall, rotation error, and algorithm robustness under low-overlap conditions. These advances establish a new paradigm for robust 3D sensing in real-world applications where partial sensor data is prevalent. Full article
(This article belongs to the Section Sensing and Imaging)
Show Figures

Figure 1

16 pages, 3434 KiB  
Review
Multisource Heterogeneous Sensor Processing Meets Distribution Networks: Brief Review and Potential Directions
by Junliang Wang and Ying Zhang
Sensors 2025, 25(13), 4146; https://doi.org/10.3390/s25134146 - 3 Jul 2025
Viewed by 388
Abstract
The progressive proliferation of sensor deployment in distribution networks (DNs), propelled by the dual drivers of power automation and ubiquitous IoT infrastructure development, has precipitated exponential growth in real-time data generated by multisource heterogeneous (MSH) sensors within multilayer grid architectures. This phenomenon presents [...] Read more.
The progressive proliferation of sensor deployment in distribution networks (DNs), propelled by the dual drivers of power automation and ubiquitous IoT infrastructure development, has precipitated exponential growth in real-time data generated by multisource heterogeneous (MSH) sensors within multilayer grid architectures. This phenomenon presents dual implications: large-scale datasets offer an enhanced foundation for reliability assessment and dispatch planning in DNs; the dramatic escalation in data volume imposes demands on the computational precision and response speed of traditional evaluation approaches. The identification of critical influencing factors under extreme operating conditions, coupled with dynamic assessment and prediction of DN reliability through MSH data approaches, has emerged as a pressing challenge to address. Through a brief analysis of existing technologies and algorithms, this article reviews the technological development of MSH data analysis in DNs. By integrating the stability advantages of conventional approaches in practice with the computational adaptability of artificial intelligence, this article focuses on discussing key approaches for MSH data processing and assessment. Based on the characteristics of DN data, e.g., diverse sources, heterogeneous structures, and complex correlations, this article proposes several practical future directions. It is expected to provide insights for practitioners in power systems and sensor data processing that offer technical inspirations for intelligent, reliable, and stable next-generation DN construction. Full article
Show Figures

Figure 1

32 pages, 5675 KiB  
Article
Reducing Label Dependency in Human Activity Recognition with Wearables: From Supervised Learning to Novel Weakly Self-Supervised Approaches
by Taoran Sheng and Manfred Huber
Sensors 2025, 25(13), 4032; https://doi.org/10.3390/s25134032 - 28 Jun 2025
Viewed by 715
Abstract
Human activity recognition (HAR) using wearable sensors has advanced through various machine learning paradigms, each with inherent trade-offs between performance and labeling requirements. While fully supervised techniques achieve high accuracy, they demand extensive labeled datasets that are costly to obtain. Conversely, unsupervised methods [...] Read more.
Human activity recognition (HAR) using wearable sensors has advanced through various machine learning paradigms, each with inherent trade-offs between performance and labeling requirements. While fully supervised techniques achieve high accuracy, they demand extensive labeled datasets that are costly to obtain. Conversely, unsupervised methods eliminate labeling needs but often deliver suboptimal performance. This paper presents a comprehensive investigation across the supervision spectrum for wearable-based HAR, with particular focus on novel approaches that minimize labeling requirements while maintaining competitive accuracy. We develop and empirically compare: (1) traditional fully supervised learning, (2) basic unsupervised learning, (3) a weakly supervised learning approach with constraints, (4) a multi-task learning approach with knowledge sharing, (5) a self-supervised approach based on domain expertise, and (6) a novel weakly self-supervised learning framework that leverages domain knowledge and minimal labeled data. Experiments across benchmark datasets demonstrate that: (i) our weakly supervised methods achieve performance comparable to fully supervised approaches while significantly reducing supervision requirements; (ii) the proposed multi-task framework enhances performance through knowledge sharing between related tasks; (iii) our weakly self-supervised approach demonstrates remarkable efficiency with just 10% of labeled data. These results not only highlight the complementary strengths of different learning paradigms, offering insights into tailoring HAR solutions based on the availability of labeled data, but also establish that our novel weakly self-supervised framework offers a promising solution for practical HAR applications where labeled data are limited. Full article
Show Figures

Figure 1

21 pages, 4114 KiB  
Article
Noise Impact Analysis of School Environments Based on the Deployment of IoT Sensor Nodes
by Georgios Dimitriou and Fotios Gioulekas
Signals 2025, 6(2), 27; https://doi.org/10.3390/signals6020027 - 3 Jun 2025
Viewed by 740
Abstract
This work presents an on-field noise analysis during the class breaks in Greek school units (a high school and a senior high school) based on the design and deployment of low-cost IoT sensor nodes and IoT platforms. The course breaks form 20% of [...] Read more.
This work presents an on-field noise analysis during the class breaks in Greek school units (a high school and a senior high school) based on the design and deployment of low-cost IoT sensor nodes and IoT platforms. The course breaks form 20% of a regular school day, during which intense mobility and high noise levels usually evolve. Indoor noise levels, along with environmental conditions, have been measured through a wireless network that comprises IoT nodes that integrate humidity, temperature, and acoustic level sensors. PM10 and PM2.5 values have also been acquired through data sensors located nearby the school complex. School buildings that have been recently renovated for minimizing their energy footprint and CO2 emissions have been selected in comparison with similar works in academia. The data are collected, shipped, and stored into a time-series database in cloud facilities where an IoT platform has been developed for processing and analysis purposes. The findings show that low-cost sensors can efficiently monitor noise levels after proper adjustments. Additionally, the statistical evaluation of the received sensor measurements has indicated that ubiquitous high noise levels during the course breaks potentially affect teachers’ leisure time, despite the thermal isolation of the facilities. Within this context, we prove that the proposed IoT Sensor Network could form a tool to essentially monitor school infrastructures and thus to prompt for improvements regarding the building facilities. Several guides to further mitigate noise and achieve high-quality levels in learning institutes are also described. Full article
Show Figures

Figure 1

23 pages, 1402 KiB  
Article
Adaptive Scheduling in Cognitive IoT Sensors for Optimizing Network Performance Using Reinforcement Learning
by Muhammad Nawaz Khan, Sokjoon Lee and Mohsin Shah
Appl. Sci. 2025, 15(10), 5573; https://doi.org/10.3390/app15105573 - 16 May 2025
Cited by 1 | Viewed by 513
Abstract
Cognitive sensors are embedded in home appliances and other surrounding devices to create a connected, intelligent environment for providing pervasive and ubiquitous services. These sensors frequently create massive amounts of data with many redundant and repeating bit values. Cognitive sensors are always restricted [...] Read more.
Cognitive sensors are embedded in home appliances and other surrounding devices to create a connected, intelligent environment for providing pervasive and ubiquitous services. These sensors frequently create massive amounts of data with many redundant and repeating bit values. Cognitive sensors are always restricted in resources, and if careful strategy is not applied at the time of deployment, the sensors become disconnected, degrading the system’s performance in terms of energy, reconfiguration, delay, latency, and packet loss. To address these challenges and to establish a connected network, there is always a need for a system to evaluate the contents of detected data values and dynamically switch sensor states based on their function. Here in this article, we propose a reinforcement learning-based mechanism called “Adaptive Scheduling in Cognitive IoT Sensors for Optimizing Network Performance using Reinforcement Learning (ASC-RL)”. For reinforcement learning, the proposed scheme uses three types of parameters: internal parameters (states), environmental parameters (sensing values), and history parameters (energy levels, roles, number of switching states) and derives a function for the state-changing policy. Based on this policy, sensors adjust and adapt to different energy states. These states minimize extensive sensing, reduce costly processing, and lessen frequent communication. The proposed scheme reduces network traffic and optimizes network performance in terms of network energy. The main factors evaluated are joint Gaussian distributions and event correlations, with derived results of signal strengths, noise, prediction accuracy, and energy efficiency with a combined reward score. Through comparative analysis, ASC-RL enhances the overall system’s performance by 3.5% in detection and transition probabilities. The false alarm probabilities are reduced to 25.7%, the transmission success rate is increased by 6.25%, and the energy efficiency and reliability threshold are increased by 35%. Full article
(This article belongs to the Collection Trends and Prospects in Multimedia)
Show Figures

Figure 1

28 pages, 6222 KiB  
Article
IoTBystander: A Non-Intrusive Dual-Channel-Based Smart Home Security Monitoring Framework
by Haotian Chi, Qi Ma, Yuwei Wang, Jing Yang and Haijun Geng
Appl. Sci. 2025, 15(9), 4795; https://doi.org/10.3390/app15094795 - 25 Apr 2025
Viewed by 736
Abstract
The increasing prevalence of IoT technology in smart homes has significantly enhanced convenience but also introduced new security and safety challenges. Traditional security solutions, reliant on sequences of IoT-generated event data (e.g., notifications of device status changes and sensor readings), are vulnerable to [...] Read more.
The increasing prevalence of IoT technology in smart homes has significantly enhanced convenience but also introduced new security and safety challenges. Traditional security solutions, reliant on sequences of IoT-generated event data (e.g., notifications of device status changes and sensor readings), are vulnerable to cyberattacks, such as message forgery and interception and delaying attacks, and fail to monitor non-smart devices. Moreover, fragmented smart home ecosystems require vendor cooperation or system modifications for comprehensive monitoring, limiting the practicality of the existing approaches. To address these issues, we propose IoTBystander, a non-intrusive dual-channel smart home security monitoring framework that utilizes two ubiquitous platform-agnostic signals, i.e., audio and network, to monitor user and device activities. We introduce a novel dual-channel aggregation mechanism that integrates insights from both channels and cross-verifies the integrity of monitoring results. This approach expands the monitoring scope to include non-smart devices and provides richer context for anomaly detection, failure diagnosis, and configuration debugging. Empirical evaluations on a real-world testbed with nine smart and eleven non-smart devices demonstrate the high accuracy of IoTBystander in event recognition: 92.86% for recognizing events of smart devices, 95.09% for non-smart devices, and 94.27% for all devices. A case study on five anomaly scenarios further shows significant improvements in anomaly detection performance by combining the strengths of both channels. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

18 pages, 12587 KiB  
Article
Indirect Electrostatic Discharge (ESD) Effects on Shielded Components Installed in MV/LV Substations
by Giuseppe Attolini, Salvatore Celozzi and Erika Stracqualursi
Energies 2025, 18(5), 1056; https://doi.org/10.3390/en18051056 - 21 Feb 2025
Viewed by 624
Abstract
Standards describing the test procedures recommended to investigate the shielding effectiveness of enclosures have two major issues: they generally prescribe the assessment of the electromagnetic field of empty cavities, and they do not deal with very small enclosures. However, the dimensions of some [...] Read more.
Standards describing the test procedures recommended to investigate the shielding effectiveness of enclosures have two major issues: they generally prescribe the assessment of the electromagnetic field of empty cavities, and they do not deal with very small enclosures. However, the dimensions of some very common shielded apparatus are smaller than those considered in the standards and the electromagnetic field distribution inside the shielded structure is strongly affected by the enclosure content. In this paper, both issues have been investigated for two components commonly used in medium voltage/low voltage (MV/LV) substations: a mini personal computer used to store, process, and transmit relevant data on the status of the electric network, with these aspects being essential in smart grids, and an electronic relay which is ubiquitous in MV/LV substations. Both components are partially contained in a metallic enclosure which provides a certain amount of electromagnetic shielding against external interferences. It is observed that an electrostatic discharge may cause a failure and/or a loss of data, requiring an improvement of shielding characteristics or a wise choice of the positions where the most sensitive devices are installed inside the enclosure. Since the dimensions of very small enclosures, fully occupied by their internal components, do not allow for the insertion of sensors inside the protected volume, numerical analysis is considered as the only way for the appraisal of the effects induced by a typical source of interference, such as an electrostatic discharge. Full article
(This article belongs to the Section F3: Power Electronics)
Show Figures

Figure 1

15 pages, 1868 KiB  
Article
Integrated Dynamic Power Management Strategy with a Field Programmable Gate Array-Based Cryptoprocessor System for Secured Internet-of-Medical Things Networks
by Javier Vázquez-Castillo, Daniel Visairo, Ramón Atoche-Enseñat, Alejandro Castillo-Atoche, Renán Quijano-Cetina, Carolina Del-Valle-Soto, Jaime Ortegón-Aguilar and Johan J. Estrada-López
Technologies 2025, 13(2), 68; https://doi.org/10.3390/technologies13020068 - 4 Feb 2025
Viewed by 1783
Abstract
Advancements in electronics and sensor technologies are driving the deployment of ubiquitous sensor networks across various applications, including asset monitoring, security, and networking. At the same time, ensuring the integrity and confidentiality of data collected by sensor nodes is crucial to prevent unauthorized [...] Read more.
Advancements in electronics and sensor technologies are driving the deployment of ubiquitous sensor networks across various applications, including asset monitoring, security, and networking. At the same time, ensuring the integrity and confidentiality of data collected by sensor nodes is crucial to prevent unauthorized access or modification. However, the limited resources f low-power sensor networks present significant challenges for securing innovative Internet-of-Medical Things (IoMT) applications in complex environments. These miniature sensing systems, essential for diverse healthcare applications, grapple with constrained computational power and energy budgets. To address this challenge, this study proposes a dynamic power management strategy within a resource-constrained FPGA-based cryptoprocessor core for secure IoMT networks. The sensor node design comprises two main modules: an 8-bit reduced instruction set computer (RISC) and a cryptographic engine. These modules collaboratively manage their power consumption during the operational stages of data acquisition, encryption, transmission, and sleep mode activation. The cryptographic engine employs a pseudorandom number generator to generate a keystream for data encryption, utilizing direct sequence spread spectrum (DSSS) encoding to ensure secure communication. The experimental results demonstrate the effectiveness of the proposed dynamic power management strategy within the resource-constrained cryptoprocessor core. The sensor node achieves an average power consumption of 0.1 mW while utilizing 2414 logic cells and 5292 registers. A comparative analysis with other state-of-the-art lightweight sensor nodes highlights the advantages of our dynamic power management approach within the cryptoprocessor sensing system. Full article
(This article belongs to the Special Issue Perpetual Sensor Nodes for Sustainable Wireless Network Applications)
Show Figures

Figure 1

30 pages, 1713 KiB  
Article
Long-Range Wide Area Network Intrusion Detection at the Edge
by Gonçalo Esteves, Filipe Fidalgo, Nuno Cruz and José Simão
IoT 2024, 5(4), 871-900; https://doi.org/10.3390/iot5040040 - 4 Dec 2024
Cited by 1 | Viewed by 1752
Abstract
Internet of Things (IoT) devices are ubiquitous in various applications, such as smart homes, asset and people tracking, and city management systems. However, their deployment in adverse conditions, including unstable internet connectivity and power sources, present new cybersecurity challenges through new attack vectors. [...] Read more.
Internet of Things (IoT) devices are ubiquitous in various applications, such as smart homes, asset and people tracking, and city management systems. However, their deployment in adverse conditions, including unstable internet connectivity and power sources, present new cybersecurity challenges through new attack vectors. The LoRaWAN protocol, with its open and distributed network architecture, has gained prominence as a leading LPWAN solution, presenting novel security challenges. This paper proposes the implementation of machine learning algorithms, specifically the K-Nearest Neighbours (KNN) algorithm, within an Intrusion Detection System (IDS) for LoRaWAN networks. Through behavioural analysis based on previously observed packet patterns, the system can detect potential intrusions that may disrupt critical tracking services. Initial simulated packet classification attained over 90% accuracy. By integrating the Suricata IDS and extending it through a custom toolset, sophisticated rule sets are incorporated to generate confidence metrics to classify packets as either presenting an abnormal or normal behaviour. The current work uses third-party multi-vendor sensor data obtained in the city of Lisbon for training and validating the models. The results show the efficacy of the proposed technique in evaluating received packets, logging relevant parameters in the database, and accurately identifying intrusions or expected device behaviours. We considered two use cases for evaluating our work: one with a more traditional approach where the devices and network are static, and another where we assume that both the devices and the network are mobile; for example, when we need to report data back from sensors on a rail infrastructure to a mobile LoRaWAN gateway onboard a train. Full article
Show Figures

Figure 1

17 pages, 3991 KiB  
Article
Intelligent Wireless Charging Path Optimization for Critical Nodes in Internet of Things-Integrated Renewable Sensor Networks
by Nelofar Aslam, Hongyu Wang, Muhammad Farhan Aslam, Muhammad Aamir and Muhammad Usman Hadi
Sensors 2024, 24(22), 7294; https://doi.org/10.3390/s24227294 - 15 Nov 2024
Cited by 4 | Viewed by 1521
Abstract
Wireless sensor networks (WSNs) play a crucial role in the Internet of Things (IoT) for ubiquitous data acquisition and tracking. However, the limited battery life of sensor nodes poses significant challenges to the long-term scalability and sustainability of these networks. Wireless power transfer [...] Read more.
Wireless sensor networks (WSNs) play a crucial role in the Internet of Things (IoT) for ubiquitous data acquisition and tracking. However, the limited battery life of sensor nodes poses significant challenges to the long-term scalability and sustainability of these networks. Wireless power transfer technology offers a promising solution by enabling the recharging of energy-depleted nodes through a wireless portable charging device (WPCD). While this approach can extend node lifespan, it also introduces the challenge of bottleneck nodes—nodes whose remaining energy falls below a critical value of the threshold. The paper addresses this issue by formulating an optimization problem that aims to identify the optimal traveling path for the WPCD based on ant colony optimization (WPCD-ACO), with a focus on minimizing energy consumption and enhancing network stability. To achieve it, we propose an objective function by incorporating a time-varying z phase that is managed through linear programming to efficiently address the bottleneck nodes. Additionally, a gateway node continually updates the remaining energy levels of all nodes and relays this information to the IoT cloud. Our findings indicate that the outage-optimal distance achieved by WPCD-ACO is 6092 m, compared to 7225 m for the shortest path and 6142 m for Dijkstra’s algorithm. Furthermore, the WPCD-ACO minimizes energy consumption to 1.543 KJ, significantly outperforming other methods: single-hop at 4.8643 KJ, GR-Protocol at 3.165 KJ, grid clustering at 2.4839 KJ, and C-SARSA at 2.5869 KJ, respectively. Monte Carlo simulations validate that WPCD-ACO is outshining the existing methods in terms of the network lifetime, stability, survival rate of sensor nodes, and energy consumption. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

4 pages, 622 KiB  
Proceeding Paper
Optimal Sensor Placement in Water Distribution Networks Using Dynamic Prediction Graph Neural Networks
by Aly K. Salem and Ahmed A. Abokifa
Eng. Proc. 2024, 69(1), 171; https://doi.org/10.3390/engproc2024069171 - 25 Sep 2024
Cited by 2 | Viewed by 1148
Abstract
Sensors are a key component of water distribution networks due to their role in monitoring system variables. Specifically, water quality (WQ) sensors are utilized to measure chlorine concentrations in order to maintain water quality standards. However, the prohibitive costs of deploying these sensors [...] Read more.
Sensors are a key component of water distribution networks due to their role in monitoring system variables. Specifically, water quality (WQ) sensors are utilized to measure chlorine concentrations in order to maintain water quality standards. However, the prohibitive costs of deploying these sensors constrain their ubiquitous use. As a result, WQ sensors are typically placed in a subset of junctions that are selected via an optimization process. This study presents a framework for optimizing WQ sensor placement to maximize chlorine concentration state estimation, that is, the inference of water quality parameters at unmonitored junctions based on the measurements from monitored junctions. This is performed by integrating a Dynamic Prediction Graph Neural Network (DP-GNN) model with a Genetic Algorithm (GA). The DP-GNN model is trained to predict chlorine concentrations at all junctions based on the measurements from sensors with different placements, whereas the GA uses these predictions to find the optimal sensor placement. The framework performance was tested by applying it to the C-town benchmark network, considering different numbers of sensors. The results demonstrated the impact of different sensor placements on the prediction accuracy of the DP-GNN model. Additionally, the results showed the framework’s ability to find the sensor placement that maximizes the chlorine concentration state estimation performance. Full article
Show Figures

Figure 1

13 pages, 265 KiB  
Article
Efficient Elliptic Curve Diffie–Hellman Key Exchange for Resource-Constrained IoT Devices
by Vinayak Tanksale
Electronics 2024, 13(18), 3631; https://doi.org/10.3390/electronics13183631 - 12 Sep 2024
Cited by 7 | Viewed by 2913
Abstract
In the era of ubiquitous connectivity facilitated by the Internet of Things (IoT), ensuring robust security mechanisms for communication channels among resource-constrained devices has become imperative. Elliptic curve Diffie–Hellman (ECDH) key exchange offers strong security assurances and computational efficiency. This paper investigates the [...] Read more.
In the era of ubiquitous connectivity facilitated by the Internet of Things (IoT), ensuring robust security mechanisms for communication channels among resource-constrained devices has become imperative. Elliptic curve Diffie–Hellman (ECDH) key exchange offers strong security assurances and computational efficiency. This paper investigates the challenges and opportunities of deploying ECDH key exchange protocols on resource-constrained IoT devices. We review the fundamentals of ECDH and explore optimization techniques tailored to the limitations of embedded systems, including memory constraints, processing power, and energy efficiency. We optimize the implementation of five elliptic curves and compare them using experimental results. Our experiments focus on electronic control units and sensors in vehicular networks. The findings provide valuable insights for IoT developers, researchers, and industry stakeholders striving to enhance the security posture of embedded IoT systems while maintaining efficiency. Full article
(This article belongs to the Special Issue Security and Privacy in IoT Devices and Computing)
Show Figures

Figure 1

18 pages, 7815 KiB  
Article
An ADPLL-Based GFSK Modulator with Two-Point Modulation for IoT Applications
by Nam-Seog Kim
Sensors 2024, 24(16), 5255; https://doi.org/10.3390/s24165255 - 14 Aug 2024
Cited by 2 | Viewed by 2137
Abstract
To establish ubiquitous and energy-efficient wireless sensor networks (WSNs), short-range Internet of Things (IoT) devices require Bluetooth low energy (BLE) technology, which functions at 2.4 GHz. This study presents a novel approach as follows: a fully integrated all-digital phase-locked loop (ADPLL)-based Gaussian frequency [...] Read more.
To establish ubiquitous and energy-efficient wireless sensor networks (WSNs), short-range Internet of Things (IoT) devices require Bluetooth low energy (BLE) technology, which functions at 2.4 GHz. This study presents a novel approach as follows: a fully integrated all-digital phase-locked loop (ADPLL)-based Gaussian frequency shift keying (GFSK) modulator incorporating two-point modulation (TPM). The modulator aims to enhance the efficiency of BLE communication in these networks. The design includes a time-to-digital converter (TDC) with the following three key features to improve linearity and time resolution: fast settling time, low dropout regulators (LDOs) that adapt to process, voltage, and temperature (PVT) variations, and interpolation assisted by an analog-to-digital converter (ADC). It features a digital controlled oscillator (DCO) with two key enhancements as follows: ΔΣ modulator dithering and hierarchical capacitive banks, which expand the frequency tuning range and improve linearity, and an integrated, fast-converging least-mean-square (LMS) algorithm for DCO gain calibration, which ensures compliance with BLE 5.0 stable modulation index (SMI) requirements. Implemented in a 28 nm CMOS process, occupying an active area of 0.33 mm2, the modulator demonstrates a wide frequency tuning range of from 2.21 to 2.58 GHz, in-band phase noise of −102.1 dBc/Hz, and FSK error of 1.42% while consuming 1.6 mW. Full article
Show Figures

Figure 1

Back to TopTop