Topic Editors

Prof. Dr. Yoshiyasu Takefuji
Faculty of Environment and Information Studies, Keio University, 5322 Endo, Fujisawa 252-0882, Japan
Prof. Dr. Subhas Mukhopadhyay
School of Engineering, Macquarie University, Sydney, NSW 2109, Australia
Prof. Dr. Enrico Vezzetti
Department of Management and Production Engineering, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Turin, Italy

Internet of Things: Latest Advances

Abstract submission deadline
31 December 2022
Manuscript submission deadline
28 February 2023
Viewed by
15331

Topic Information

Dear Colleagues,

The Internet of Things (IoT) is one of the most prominent tech trends to have emerged in recent years. It refers to the fact that while the word “internet” initially referred to the wide-scale networking of computers, today, devices of every size and shape – from cars to kitchen appliances to industrial machinery - are connected and sharing information digitally, on a global scale.

The purpose of this Topic is to bring together state-of-the-art achievements on IoT and its applications. It discusses all aspects of emerging IoT sciences and technologies and serves as a platform for colleagues to exchange novel ideas in this area.

Especially, IoT devices are used in many applications in non-harsh environments. Initially, there were no IoT devices for harsh environments or highly protected expensive IoT devices. However, with the advancement of AI, AI is now able to predict target parameters even without IoT devices in harsh environments. In addition to critical boundaries with IoT devices in non-harsh and harsh environments, this Topic is also interested in how engineers and scientists can cope with and overcome harsh situations by protecting fragile IoT devices, and other technologies including AI technologies that can predict without IoT devices.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). We encourage authors to submit original research articles, case studies, reviews, theoretical and critical perspectives, and viewpoint articles on (but not limited to) the following topics:

  • Artificial Intelligence;
  • Internet of Things;
  • vulnerable sensors;
  • AI prediction;
  • harsh environments;
  • non-harsh environments…

Keywords

Artificial Intelligence; IoT; Internet of Things; vulnerable sensors; AI prediction; harsh environments; non-harsh environment; AIoT; IIOT; smart sensing; smart sensors; Industrial Internet of Things; Artificial Intelligence of Things; Internet of Medical Things; IoMT; sensing; sensors

Participating Journals

Journal Name Impact Factor CiteScore Launched Year First Decision (median) APC
Journal of Sensor and Actuator Networks
jsan
- 6.9 2012 18.2 Days 1600 CHF Submit
Sensors
sensors
3.847 6.4 2001 16.2 Days 2400 CHF Submit
Applied Sciences
applsci
2.838 3.7 2011 17.4 Days 2300 CHF Submit
Sustainability
sustainability
3.889 5.0 2009 16.7 Days 2000 CHF Submit
Electronics
electronics
2.690 3.7 2012 16.6 Days 2000 CHF Submit

Preprints is a platform dedicated to making early versions of research outputs permanently available and citable. MDPI journals allow posting on preprint servers such as Preprints.org prior to publication. For more details about reprints, please visit https://www.preprints.org.

Published Papers (20 papers)

Order results
Result details
Journals
Select all
Export citation of selected articles as:
Article
Multi-Sensor Data Fusion with a Reconfigurable Module and Its Application to Unmanned Storage Boxes
Sensors 2022, 22(14), 5388; https://doi.org/10.3390/s22145388 - 19 Jul 2022
Abstract
We present a multi-sensor data fusion model based on a reconfigurable module (RM) with three fusion layers. In the data layer, raw data are refined with respect to the sensor characteristics and then converted into logical values. In the feature layer, a fusion [...] Read more.
We present a multi-sensor data fusion model based on a reconfigurable module (RM) with three fusion layers. In the data layer, raw data are refined with respect to the sensor characteristics and then converted into logical values. In the feature layer, a fusion tree is configured, and the values of the intermediate nodes are calculated by applying predefined logical operations, which are adjustable. In the decision layer, a final decision is made by computing the value of the root according to predetermined equations. In this way, with given threshold values or sensor characteristics for data refinement and logic expressions for feature extraction and decision making, we reconstruct an RM that performs multi-sensor fusion and is adaptable for a dedicated application. We attempted to verify its feasibility by applying the proposed RM to an actual application. Considering the spread of the COVID-19 pandemic, an unmanned storage box was selected as our application target. Four types of sensors were used to determine the state of the door and the status of the existence of an item inside it. We implemented a prototype system that monitored the unmanned storage boxes by configuring the RM according to the proposed method. It was confirmed that a system built with only low-cost sensors can identify the states more reliably through multi-sensor data fusion. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
A Communication Framework for Image Transmission through LPWAN Technology
Electronics 2022, 11(11), 1764; https://doi.org/10.3390/electronics11111764 - 02 Jun 2022
Abstract
Analyzing the conditions of use and selecting which technology is more efficient to apply is required when transmitting information through wireless networks.The Internet of Things (IoT) has gained traction in industry and academia as a paradigm in which information and communication technologies merge [...] Read more.
Analyzing the conditions of use and selecting which technology is more efficient to apply is required when transmitting information through wireless networks.The Internet of Things (IoT) has gained traction in industry and academia as a paradigm in which information and communication technologies merge to deliver unique solutions by detecting, actuating, calculating, and sharing massive volumes of data via embedded systems. In this scenario, Low-Power Wide-Area Networks (LPWAN) appear to be an attractive solution for node connectivity. Typical IoT solutions demand flexible restrictions for wireless communication networks in terms of data rates and latency in exchange for having larger communication ranges and low energy consumption. Nonetheless, as the amount of data and data speeds demanded for particular applications increase, such as image transmissions, IoT network connectivity deteriorates. This paper proposes a communication architecture for image transmission across LPWAN networks utilizing LoRa modulation. The framework combines image processing techniques (classification, compressive sensing (CS), and reconstruction) with an investigation of LoRa modulation parameters using a Software-Defined Radio (SDR) environment. The results show that is possible to communicate an image of 128×128 pixels with four packets and one frequency channel in 2.51 s. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Remote Laboratory Offered as Hardware-as-a-Service Infrastructure
Electronics 2022, 11(10), 1568; https://doi.org/10.3390/electronics11101568 - 13 May 2022
Abstract
This paper presents a solution for remote classes where hardware is offered as a service. The infrastructure was based on Raspberry Pi mini computers to which a set of different developments boards were connected. The proposed software architecture allows students to connect to [...] Read more.
This paper presents a solution for remote classes where hardware is offered as a service. The infrastructure was based on Raspberry Pi mini computers to which a set of different developments boards were connected. The proposed software architecture allows students to connect to remote resources and interact with them. Moreover, the services monitoring status of remote resources were introduced to facilitate software development and the learning process. Furthermore, live video feedback is available to visually monitor operation of the resources. Finally, a debugging server was deployed allowing us to establish a remote debugging session between a user’s PC and the dev board on the server premises. The solution offers a comprehensive remote service including user management. Safety risks of the Internet-exposed infrastructure and safety precautions were discussed. The presented RemoteLab system allows students of WUST to gain knowledge, practise and realize exercises in scope of academic courses such as robot controllers and advanced robot control. Thanks to advances in remote education and utilized tools, the RemoteLab was designed and deployed, allowing stationary classes to be substituted with remote ones, while maintaining a high level of class knowledge transfer. Up to the present, the system has been utilized by over 100 students who could realize exercises and prepare for classes thanks to 24 h system availability. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Trusted Blockchain-Driven IoT Security Consensus Mechanism
Sustainability 2022, 14(9), 5200; https://doi.org/10.3390/su14095200 - 26 Apr 2022
Abstract
Single point of failure and node attack tend to cause instability in the centralized Internet of Things (IoT). Combined with blockchain technology, the deficiency of traditional IoT architecture can be effectively alleviated. However, the existing blockchain consensus mechanism still has the problems of [...] Read more.
Single point of failure and node attack tend to cause instability in the centralized Internet of Things (IoT). Combined with blockchain technology, the deficiency of traditional IoT architecture can be effectively alleviated. However, the existing blockchain consensus mechanism still has the problems of forks and wasting of computing power. Therefore, this paper proposes a new framework based on a two-stage credit calculation to handle these problems. Notably, the nodes are selected through the model, and these nodes will compete on the chain according to the behavior of participating in the creation of the block. Then, a comparative simulation with the existing consensus mechanism proof of work (PoW) is presented. The results show that the proposed framework can quickly eliminate malicious nodes, maintain the overall security of the blockchain and reduce consensus delay. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
The Adaptation of Internet of Things in the Indian Insurance Industry—Reviewing the Challenges and Potential Solutions
Electronics 2022, 11(3), 419; https://doi.org/10.3390/electronics11030419 - 29 Jan 2022
Abstract
The concept of insurance was found several centuries before Christ. Correspondingly, Chinese and Babylonian traders practiced moving or dispensing risks in the second and third millennia BC. Nowadays, insurance is the backbone of the economy. The recent introduction of big data, IoT, and [...] Read more.
The concept of insurance was found several centuries before Christ. Correspondingly, Chinese and Babylonian traders practiced moving or dispensing risks in the second and third millennia BC. Nowadays, insurance is the backbone of the economy. The recent introduction of big data, IoT, and other forms of InsurTech led to the fourth industrial revolution in insurance in the developed world. The industry is looking to improve the ergonomics of remote sensing technology to improve the acceptability of the clients. The adaptation of IoT in developing economies may provide a solution in increasing insurance penetration. This study explores the challenges and solutions in adopting IoT to increase insurance penetration in India. This study applied a systematic literature review (SLR) to extract the themes/variables related to challenges and solutions in adopting IoT in India’s insurance sector. Several keywords were used to search the relevant literature from Google Scholar. Based on inclusion and exclusion criteria, the filtered studies were explored. This study listed several challenges and their solutions in the adaption of IoT in the Indian insurance industry. Policymakers could adapt the suggestions provided to improve the service delivery insurance sector. The authors listed several challenges and solutions in the adaption of IoT in the Indian insurance industry through a systematic literature review to facilitate the policymakers to make the right decisions. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
VLC Network Design for High Mobility Users in Urban Tunnels
Sensors 2022, 22(1), 88; https://doi.org/10.3390/s22010088 - 23 Dec 2021
Abstract
Current vehicular systems require real-time information to keep drivers safer and more secure on the road. In addition to the radio frequency (RF) based communication technologies, Visible Light Communication (VLC) has emerged as a complementary way to enable wireless access in intelligent transportation [...] Read more.
Current vehicular systems require real-time information to keep drivers safer and more secure on the road. In addition to the radio frequency (RF) based communication technologies, Visible Light Communication (VLC) has emerged as a complementary way to enable wireless access in intelligent transportation systems (ITS) with a simple design and low-cost deployment. However, integrating VLC in vehicular networks poses some fundamental challenges. In particular, the limited coverage range of the VLC access points and the high speed of vehicles create time-limited links that the existing handover procedures of VLC networks can not be accomplished timely. Therefore, this paper addresses the problem of designing a vehicular VLC network that supports high mobility users. We first modify the traditional VLC network topology to increase uplink reliability. Then, a low-latency handover scheme is proposed to enable mobility in a VLC network. Furthermore, we validate the functionality of the proposed VLC network design method by using system-level simulations of a vehicular tunnel scenario. The analysis and the results show that the proposed method provides a steady connection, where the vehicular node is available more than 99% of the time regardless of the number of vehicular nodes on this network. Additionally, the system is able to achieve a Frame-Error-Rate (FER) performance lower than 10−3. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Multi-Cloud Resource Management Techniques for Cyber-Physical Systems
Sensors 2021, 21(24), 8364; https://doi.org/10.3390/s21248364 - 15 Dec 2021
Cited by 1
Abstract
Information technology is based on data management between various sources. Software projects, as varied as simple applications or as complex as self-driving cars, are heavily reliant on the amounts, and types, of data ingested by one or more interconnected systems. Data is not [...] Read more.
Information technology is based on data management between various sources. Software projects, as varied as simple applications or as complex as self-driving cars, are heavily reliant on the amounts, and types, of data ingested by one or more interconnected systems. Data is not only consumed but is transformed or mutated which requires copious amounts of computing resources. One of the most exciting areas of cyber-physical systems, autonomous vehicles, makes heavy use of deep learning and AI to mimic the highly complex actions of a human driver. Attempting to map human behavior (a large and abstract concept) requires large amounts of data, used by AIs to increase their knowledge and better attempt to solve complex problems. This paper outlines a full-fledged solution for managing resources in a multi-cloud environment. The purpose of this API is to accommodate ever-increasing resource requirements by leveraging the multi-cloud and using commercially available tools to scale resources and make systems more resilient while remaining as cloud agnostic as possible. To that effect, the work herein will consist of an architectural breakdown of the resource management API, a low-level description of the implementation and an experiment aimed at proving the feasibility, and applicability of the systems described. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Determinants and Cross-National Moderators of Wearable Health Tracker Adoption: A Meta-Analysis
Sustainability 2021, 13(23), 13328; https://doi.org/10.3390/su132313328 - 01 Dec 2021
Abstract
Wearable health trackers improve people’s health management and thus are beneficial for social sustainability. Many prior studies have contributed to the knowledge on the determinants of wearable health tracker adoption. However, these studies vary remarkably in focal determinants and countries of data collection, [...] Read more.
Wearable health trackers improve people’s health management and thus are beneficial for social sustainability. Many prior studies have contributed to the knowledge on the determinants of wearable health tracker adoption. However, these studies vary remarkably in focal determinants and countries of data collection, leading to a call for a structured and quantitative review on what determinants are generally important, and whether and how their effects on adoption vary across countries. Therefore, this study performed the first meta-analysis on the determinants and cross-national moderators of wearable health tracker adoption. This meta-analysis accumulated 319 correlations between nine determinants and adoption from 59 prior studies in 18 countries/areas. The meta-analytic average effects of the determinants revealed the generalized effect and the relative importance of each determinant. For example, technological characteristics generally had stronger positive correlations with adoption than consumer characteristics, except for privacy risk. Second, drawing on institutional theory, it was observed that cross-national characteristics regarding socioeconomic status, regulative systems, and cultures could moderate the effects of the determinants on adoption. For instance, the growth rate of gross domestic product decreased the effect of innovativeness on adoption, while regulatory quality and control of corruption could increase this effect. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Energy Performance Analysis and Modelling of LoRa Prototyping Boards
Sensors 2021, 21(23), 7992; https://doi.org/10.3390/s21237992 - 30 Nov 2021
Cited by 2
Abstract
LoRaWAN has gained significant attention for Internet-of-Things (IOT) applications due to its low power consumption and long range potential for data transmission. While there is a significant body of work assessing LoRA coverage and data transmission characteristics, there is a lack of data [...] Read more.
LoRaWAN has gained significant attention for Internet-of-Things (IOT) applications due to its low power consumption and long range potential for data transmission. While there is a significant body of work assessing LoRA coverage and data transmission characteristics, there is a lack of data available about commercially available LoRa prototyping boards and their power consumption, in relation to their features. It is currently difficult to estimate the power consumption of a LoRa module operating under different transmission profiles, due to a lack of manufacturer data available. In this study, power testing has been carried out on physical hardware and significant variation was found in the power consumption of competing boards, all marketed as “extremely low power”. In this paper, testing results are presented alongside an experimentally-derived power model for the lowest power LoRa module, and power requirements are compared to firmware settings. The power analysis adds to existing work showing trends in data-rate and transmission power settings effects on electrical power consumption. The model’s accuracy is experimentally verified and shows acceptable agreement to estimated values. Finally, applications for the model are presented by way of a hypothetical scenario and calculations performed in order to estimate battery life and energy consumption for varying data transmission intervals. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Energy-Aware Wireless Sensor Networks for Smart Buildings: A Review
J. Sens. Actuator Netw. 2021, 10(4), 67; https://doi.org/10.3390/jsan10040067 - 26 Nov 2021
Abstract
The design of Wireless Sensor Networks (WSN) requires the fulfillment of several design requirements. The most important one is optimizing the battery’s lifetime, which is tightly coupled to the sensor lifetime. End-users usually avoid replacing sensors’ batteries, especially in massive deployment scenarios like [...] Read more.
The design of Wireless Sensor Networks (WSN) requires the fulfillment of several design requirements. The most important one is optimizing the battery’s lifetime, which is tightly coupled to the sensor lifetime. End-users usually avoid replacing sensors’ batteries, especially in massive deployment scenarios like smart agriculture and smart buildings. To optimize battery lifetime, wireless sensor designers need to delineate and optimize active components at different levels of the sensor’s layered architecture, mainly, (1) the number of data sets being generated and processed at the application layer, (2) the size and the architecture of the operating systems (OS), (3) the networking layers’ protocols, and (4) the architecture of electronic components and duty cycling techniques. This paper reviews the different relevant technologies and investigates how they optimize energy consumption at each layer of the sensor’s architecture, e.g., hardware, operating system, application, and networking layer. This paper aims to make the researcher aware of the various optimization opportunities when designing WSN nodes. To our knowledge, there is no other work in the literature that reviews energy optimization of WSN in the context of Smart Energy-Efficient Buildings (SEEB) and from the formerly four listed perspectives to help in the design and implementation of optimal WSN for SEEB. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
An Adaptive Routing Algorithm Based on Relation Tree in DTN
Sensors 2021, 21(23), 7847; https://doi.org/10.3390/s21237847 - 25 Nov 2021
Abstract
It is found that nodes in Delay Tolerant Networks (DTN) exhibit stable social attributes similar to those of people. In this paper, an adaptive routing algorithm based on Relation Tree (AR-RT) for DTN is proposed. Each node constructs its own Relation Tree based [...] Read more.
It is found that nodes in Delay Tolerant Networks (DTN) exhibit stable social attributes similar to those of people. In this paper, an adaptive routing algorithm based on Relation Tree (AR-RT) for DTN is proposed. Each node constructs its own Relation Tree based on the historical encounter frequency, and will adopt different forwarding strategies based on the Relation Tree in the forwarding phase, so as to achieve more targeted forwarding. To further improve the scalability of the algorithm, the source node dynamically controls the initial maximum number of message copies according to its own cache occupancy, which enables the node to make negative feedback to network environment changes. Simulation results show that the AR-RT algorithm proposed in this paper has significant advantages over existing routing algorithms in terms of average delay, average hop count, and message delivery rate. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Evaluation of the COVID-19 Era by Using Machine Learning and Interpretation of Confidential Dataset
Electronics 2021, 10(23), 2910; https://doi.org/10.3390/electronics10232910 - 24 Nov 2021
Cited by 1
Abstract
Various research approaches to COVID-19 are currently being developed by machine learning (ML) techniques and edge computing, either in the sense of identifying virus molecules or in anticipating the risk analysis of the spread of COVID-19. Consequently, these orientations are elaborating datasets that [...] Read more.
Various research approaches to COVID-19 are currently being developed by machine learning (ML) techniques and edge computing, either in the sense of identifying virus molecules or in anticipating the risk analysis of the spread of COVID-19. Consequently, these orientations are elaborating datasets that derive either from WHO, through the respective website and research portals, or from data generated in real-time from the healthcare system. The implementation of data analysis, modelling and prediction processing is performed through multiple algorithmic techniques. The lack of these techniques to generate predictions with accuracy motivates us to proceed with this research study, which elaborates an existing machine learning technique and achieves valuable forecasts by modification. More specifically, this study modifies the Levenberg–Marquardt algorithm, which is commonly beneficial for approaching solutions to nonlinear least squares problems, endorses the acquisition of data driven from IoT devices and analyses these data via cloud computing to generate foresight about the progress of the outbreak in real-time environments. Hence, we enhance the optimization of the trend line that interprets these data. Therefore, we introduce this framework in conjunction with a novel encryption process that we are proposing for the datasets and the implementation of mortality predictions. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Nomadic, Informal and Mediatised Work Practices: Role of Professional Social Approval and Effects on Quality of Life at Work
Sustainability 2021, 13(22), 12878; https://doi.org/10.3390/su132212878 - 21 Nov 2021
Abstract
Several studies have emphasised the effects of perceived social approval in employees’ professional environment (colleagues and managers) on the implementation of remote and mediatised work practices and, more specifically, on their spatial, temporal and material characteristics. The use of information and communication technologies [...] Read more.
Several studies have emphasised the effects of perceived social approval in employees’ professional environment (colleagues and managers) on the implementation of remote and mediatised work practices and, more specifically, on their spatial, temporal and material characteristics. The use of information and communication technologies has been identified in the literature not only as affecting the levels felt by employees in terms of their relation to work (organisational commitment and recognition for work accomplished) but also in terms of work-life balance and health (stress and addictions). However, these studies are few in number when it comes to nomadic and informal work practices and rarely address perceived social approval in employees’ professional entourage. We used an empirical study based on a questionnaire survey. The results indicate that employees favour smartphone and laptop use. The effects of perceived social approval in their professional entourage differ according to the technologies used. These uses also have an impact on commitment and recognition, but their effects on employees’ perception of the effects of work life on “non-work” life and on addiction-related behaviours are more nuanced. These findings lead us to discuss the “right to disconnect” and the development of support and supervision schemes for nomadic, informal and mediatised work practices. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Review
Edge Network Optimization Based on AI Techniques: A Survey
Electronics 2021, 10(22), 2830; https://doi.org/10.3390/electronics10222830 - 18 Nov 2021
Cited by 1
Abstract
The network edge is becoming a new solution for reducing latency and saving bandwidth in the Internet of Things (IoT) network. The goal of the network edge is to move computation from cloud servers to the edge of the network near the IoT [...] Read more.
The network edge is becoming a new solution for reducing latency and saving bandwidth in the Internet of Things (IoT) network. The goal of the network edge is to move computation from cloud servers to the edge of the network near the IoT devices. The network edge, which needs to make smart decisions with a high level of response time, needs intelligence processing based on artificial intelligence (AI). AI is becoming a key component in many edge devices, including cars, drones, robots, and smart IoT devices. This paper describes the role of AI in a network edge. Moreover, this paper elaborates and discusses the optimization methods for an edge network based on AI techniques. Finally, the paper considers the security issue as a major concern and prospective approaches to solving this issue in an edge network. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Experimental FIA Methodology Using Clock and Control Signal Modifications under Power Supply and Temperature Variations
Sensors 2021, 21(22), 7596; https://doi.org/10.3390/s21227596 - 16 Nov 2021
Abstract
The security of cryptocircuits is determined not only for their mathematical formulation, but for their physical implementation. The so-called fault injection attacks, where an attacker inserts faults during the operation of the cipher to obtain a malfunction to reveal secret information, pose a [...] Read more.
The security of cryptocircuits is determined not only for their mathematical formulation, but for their physical implementation. The so-called fault injection attacks, where an attacker inserts faults during the operation of the cipher to obtain a malfunction to reveal secret information, pose a serious threat for security. These attacks are also used by designers as a vehicle to detect security flaws and then protect the circuits against these kinds of attacks. In this paper, two different attack methodologies are presented based on inserting faults through the clock signal or the control signal. The optimization of the attacks is evaluated under supply voltage and temperature variation, experimentally determining the feasibility through the evaluation of different Trivium versions in 90 nm ASIC technology implementations, also considering different routing alternatives. The results show that it is possible to inject effective faults with both methodologies, improving fault efficiency if the power supply voltage decreases, which requires only half the frequency of the short pulse inserted into the clock signal to obtain a fault. The clock signal modification methodology can be extended to other NLFSR-based cryptocircuits and the control signal-based methodology can be applied to both block and stream ciphers. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Network Lifetime Improvement through Energy-Efficient Hybrid Routing Protocol for IoT Applications
Sensors 2021, 21(22), 7439; https://doi.org/10.3390/s21227439 - 09 Nov 2021
Cited by 3
Abstract
The application of the Internet of Things (IoT) in wireless sensor networks (WSNs) poses serious challenges in preserving network longevity since the IoT necessitates a considerable amount of energy usage for sensing, processing, and data communication. As a result, there are several conventional [...] Read more.
The application of the Internet of Things (IoT) in wireless sensor networks (WSNs) poses serious challenges in preserving network longevity since the IoT necessitates a considerable amount of energy usage for sensing, processing, and data communication. As a result, there are several conventional algorithms that aim to enhance the performance of WSN networks by incorporating various optimization strategies. These algorithms primarily focus on the network layer by developing routing protocols to perform reliable communication in an energy-efficient manner, thus leading to an enhanced network life. For increasing the network lifetime in WSNs, clustering has been widely accepted as an important method that groups sensor nodes (SNs) into clusters. Additionally, numerous researchers have been focusing on devising various methods to increase the network lifetime. The prime factor that helps to maximize the network lifetime is the minimization of energy consumption. The authors of this paper propose a multi-objective optimization approach. It selects the optimal route for transmitting packets from source to sink or the base station (BS). The proposed model employs a two-step approach. The first step employs a trust model to select the cluster heads (CHs) that manage the data communication between the BS and nodes in the cluster. Further, a novel hybrid algorithm, combining a particle swarm optimization (PSO) algorithm and a genetic algorithm (GA), is proposed to determine the routes for data transmission. To validate the efficacy of the proposed hybrid algorithm, named PSOGA, simulations were conducted and the results were compared with the existing LEACH method and PSO, with a random route selection for five different cases. The obtained results establish the efficiency of the proposed approach, as it outperforms existing methods with increased energy efficiency, increased network throughput, high packet delivery rate, and high residual energy throughout the entire iterations. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Direct-to-Satellite IoT Slotted Aloha Systems with Multiple Satellites and Unequal Erasure Probabilities
Sensors 2021, 21(21), 7099; https://doi.org/10.3390/s21217099 - 26 Oct 2021
Cited by 1
Abstract
Direct-to-satellite Internet of Things (IoT) solutions have attracted a lot of attention from industry and academia recently, as promising alternatives for large scale coverage of a massive number of IoT devices. In this work, we considered that a cluster of IoT devices was [...] Read more.
Direct-to-satellite Internet of Things (IoT) solutions have attracted a lot of attention from industry and academia recently, as promising alternatives for large scale coverage of a massive number of IoT devices. In this work, we considered that a cluster of IoT devices was under the coverage of a constellation of low-Earth orbit (LEO) satellites, while slotted Aloha was used as a medium access control technique. Then, we analyzed the throughput and packet loss rate while considering potentially different erasure probabilities at each of the visible satellites within the constellation. We show that different combinations of erasure probabilities at the LEO satellites and the IoT traffic load can lead to considerable differences in the system’s performance. Next, we introduce an intelligent traffic load distribution (ITLD) strategy, which, by choosing between a non-uniform allocation and the uniform traffic load distribution, guarantees a high overall system throughput, by allocating more appropriate amounts of traffic load at different positions (i.e., different sets of erasure probabilities) of the LEO constellation with respect to the IoT cluster. Finally, the results show that ITLD, a mechanism with low implementation complexity, allows the system to be much more scalable, intelligently exploiting the potential of the different positions of the satellite constellation. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Yield Estimation and Visualization Solution for Precision Agriculture
Sensors 2021, 21(19), 6657; https://doi.org/10.3390/s21196657 - 07 Oct 2021
Cited by 2
Abstract
We present an end-to-end smart harvesting solution for precision agriculture. Our proposed pipeline begins with yield estimation that is done through the use of object detection and tracking to count fruit within a video. We use and train You Only Look Once model [...] Read more.
We present an end-to-end smart harvesting solution for precision agriculture. Our proposed pipeline begins with yield estimation that is done through the use of object detection and tracking to count fruit within a video. We use and train You Only Look Once model (YOLO) on video clips of apples, oranges and pumpkins. The bounding boxes obtained through objection detection are used as an input to our selected tracking model, DeepSORT. The original version of DeepSORT is unusable with fruit data, as the appearance feature extractor only works with people. We implement ResNet as DeepSORT’s new feature extractor, which is lightweight, accurate and generically works on different fruits. Our yield estimation module shows accuracy between 91–95% on real footage of apple trees. Our modification successfully works for counting oranges and pumpkins, with an accuracy of 79% and 93.9% with no need for training. Our framework additionally includes a visualization of the yield. This is done through the incorporation of geospatial data. We also propose a mechanism to annotate a set of frames with a respective GPS coordinate. During counting, the count within the set of frames and the matching GPS coordinate are recorded, which we then visualize on a map. We leverage this information to propose an optimal container placement solution. Our proposed solution involves minimizing the number of containers to place across the field before harvest, based on a set of constraints. This acts as a decision support system for the farmer to make efficient plans for logistics, such as labor, equipment and gathering paths before harvest. Our work serves as a blueprint for future agriculture decision support systems that can aid in many other aspects of farming. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Secure Audio-Visual Data Exchange for Android In-Vehicle Ecosystems
Appl. Sci. 2021, 11(19), 9276; https://doi.org/10.3390/app11199276 - 06 Oct 2021
Abstract
Mobile device pairing inside vehicles is a ubiquitous task which requires easy to use and secure solutions. In this work we exploit the audio-video domain for pairing devices inside vehicles. In principle, we rely on the widely used elliptical curve version of the [...] Read more.
Mobile device pairing inside vehicles is a ubiquitous task which requires easy to use and secure solutions. In this work we exploit the audio-video domain for pairing devices inside vehicles. In principle, we rely on the widely used elliptical curve version of the Diffie-Hellman key-exchange protocol and extract the session keys from the acoustic domain as well as from the visual domain by using the head unit display. The need for merging the audio-visual domains first stems from the fact that in-vehicle head units generally do not have a camera so they cannot use visual data from smartphones, however, they are equipped with microphones and can use them to collect audio data. Acoustic channels are less reliable as they are more prone to errors due to environmental noise. However, this noise can be also exploited in a positive way to extract secure seeds from the environment and audio channels are harder to intercept from the outside. On the other hand, visual channels are more reliable but can be more easily spotted by outsiders, so they are more vulnerable for security applications. Fortunately, mixing these two types of channels results in a solution that is both more reliable and secure for performing a key exchange. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Article
Practical Particulate Matter Sensing and Accurate Calibration System Using Low-Cost Commercial Sensors
Sensors 2021, 21(18), 6162; https://doi.org/10.3390/s21186162 - 14 Sep 2021
Cited by 1
Abstract
Air pollution is a social problem, because the harmful suspended materials can cause diseases and deaths to humans. Specifically, particulate matters (PM), a form of air pollution, can contribute to cardiovascular morbidity and lung diseases. Nowadays, humans are exposed to PM pollution everywhere [...] Read more.
Air pollution is a social problem, because the harmful suspended materials can cause diseases and deaths to humans. Specifically, particulate matters (PM), a form of air pollution, can contribute to cardiovascular morbidity and lung diseases. Nowadays, humans are exposed to PM pollution everywhere because it occurs in both indoor and outdoor environments. To purify or ventilate polluted air, one need to accurately monitor the ambient air quality. Therefore, this study proposed a practical particulate matter sensing and accurate calibration system using low-cost commercial sensors. The proposed system basically uses noisy and inaccurate PM sensors to measure the ambient air pollution. This paper mainly deals with three types of error caused in the light scattering method: short-term noise, part-to-part variation, and temperature and humidity interferences. We propose a simple short-term noise reduction method to correct measurement errors, an auto-fitting calibration for part-to-part repeatability to pinpoint the baseline of the signal that affects the performance of the system, and a temperature and humidity compensation method. This paper also contains the experiment setup and performance evaluation to prove the superiority of the proposed methods. Based on the evaluation of the performance of the proposed system, part-to-part repeatability was less than 2 μg/m3 and the standard deviation was approximately 1.1 μg/m3 in the air. When the proposed approaches are used for other optical sensors, it can result in better performance. Full article
(This article belongs to the Topic Internet of Things: Latest Advances)
Show Figures

Figure 1

Back to TopTop