Frequency: Quarterly E- ISSN: 2277-2286 P- ISSN: Awaited Abstracted/ Indexed in: Ulrich's International Periodical Directory, Google Scholar, SCIRUS, getCITED, Genamics JournalSeek, EBSCO Information Services
Quarterly published in print and online "Inventi Impact: Distributed Sensor Networks" publishes high quality unpublished as well as high impact pre-published research and reviews catering to the needs of researchers and professional engineers. The journal deals with the theory and experimentation aspects of sensor networks in an interdisciplinary manner and covers many fields such as wireless networks and communications, protocols, distributed algorithms, signal processing, embedded systems, and information management.
This paper proposes a consensus-based guidance methodology for multiple air vehicles to arrive at the same spot cooperatively.\nFirst, based on the Lyapunov stability theory, a guidance law with only one control parameter is proposed, and the exact\nexpression of total flight time can be obtained with a control parameter equal to one. Then, a two-step guidance scheme, which can\nachieve a finite-time consensus of the flight time, is built upon the Lyapunov-based guidance law. In the first step, on account of\nthe information exchange between the air vehicles through an undirected and connected communication topology, a time-varying\ncontrol parameter is designed to reduce the disparities of the flight time. After the consensus of the flight time, the control\nparameter will remain constant at one, and simultaneous arrival can be achieved. Besides, the guidance strategy is applied in a\nleader-follower case that one of the vehicles cannot receive information from the others and acts as the leader. The effectiveness of\nthe proposed method is demonstrated with simulations....
The control of water quality is crucial to ensure the survival of fish in aquaculture production facilities. Today, the combination of sensors with communication technologies permits to monitor these crucial parameters in real‐time, allowing to take fast management decisions. However, out‐of‐the‐box solutions are expensive, due to the small market and the industrial nature of sensors, besides being little customizable. To solve this, the present work describes a low‐cost hardware and software architecture developed to achieve the autonomous water quality assessment and management on a remote facility for fish conservation aquaculture within the framework of the Smart Comunidad Rural Digital (smartCRD) project. The developed sensor network has been working uninterruptedly since its installation (20 April 2021). It is based on open source technology and includes a central gateway for on‐site data monitoring of water quality nodes as well as an online management platform for data visualization and sensor network configuration. Likewise, the system can detect autonomously water quality parameters outside configurable thresholds and deliver management alarms. The described architecture, besides low‐cost, is highly customizable, compatible with other sensor network projects, machine‐learning applications, and is capable of edge computing. Thus, it contributes to making open sensorization more accessible to real‐world applications....
Node localization is an important supporting technology in wireless sensor networks (WSNs). Traditional maximum likelihood\nestimation based localization methods (MLE) assume that measurement errors are independent of the distance between the\nanchor node and a target node. However, such an assumption may not reflect the physical characteristics of existing measurement\ntechniques, such as the widely used received signal strength indicator. To address this issue, we propose a distance-based MLE that\nconsiders measurement errors that depend on distance values in this paper. The proposed distance-based MLE is formulated as\na complicated nonlinear optimization problem. An exact solution is developed based on first-order optimal condition to improve\nthe efficiency of search. In addition, a two-dimensional search method is also presented. Simulation experiments are performed\nto demonstrate the effectiveness of this localization.The simulation results show that the distance-based localization method has\nbetter localization accuracy compared to other range-based localization methods....
Outlier detection is an important data mining task, whose target is to find the abnormal or atypical objects from a given dataset.\nThe techniques for detecting outliers have a lot of applications, such as credit card fraud detection and environment monitoring.\nOur previous work proposed the Cluster-Based (CB) outlier and gave a centralized method using unsupervised extreme learning\nmachines to compute CB outliers. In this paper, we propose a new distributed algorithm for the CB outlier detection (DACB). On\nthe master node, we collect a small number of points from the slave nodes to obtain a threshold. On each slave node, we design a\nnew filtering method that can use the threshold to efficiently speed up the computation. Furthermore, we also propose a ranking\nmethod to optimize the order of cluster scanning. At last, the effectiveness and efficiency of the proposed approaches are verified\nthrough a plenty of simulation experiments....
Wireless sensors are battery-limited sensing and computing devices. How to prolong the lifetime of wireless sensors becomes an\r\nimportant issue. In order to reduce the energy consumptions when nodes are in idle listening, duty-cycle-based MAC protocols are\r\nintroduced to let node go into sleep mode periodically or aperiodically. The long duty cycle makes sensors increase the transmission\r\nthroughput but consumes more energy. The short duty cycle makes sensors have low energy consumption rate but increases the\r\ntransmission delay. In this paper, a dynamic traffic-aware MAC protocol for energy conserving in wireless sensor networks is\r\nproposed. The proposed MAC protocol can provide better data transmission rate when sensors are with high traffic loading. On\r\nthe other hand, the proposed MAC protocol can save energy when sensors are with low traffic loading. Simulation results show\r\nthat the proposed protocol has better data throughput than other duty-cycle-based MAC protocols, for example, S-MAC and UMAC.\r\nWe also developed a set of comprehensive experiments based on the well-known OMNET++ simulator and revealed that\r\nour proposed TA-MAC performs significantly outstanding than related schemes under various situations....
This paper mainly describes a fault diagnosis scheme for aircraft multi branches wiring networks. The background theory is based\non the matching algorithm with theoretical reflection waveform and realistic reflection waveform. Firstly, a numerical model\nwith a comprehensive database was built to create the theoretical waveform of the measured wiring network. On the other hand,\nthe realistic reflection waveform of the measured wiring network can be collected by reflectometry detection system. Then, the\nwave form matching algorithm and fault diagnosis algorithm were applied to detect the fault type and fault location in the measured\nwiring network. With all the steps above, the fault diagnosis scheme was designed and realized. Finally, a multi branches wiring\nnetwork, which includes two branches, and one of its branches contains two sub branches with different types of faults, was built to\nverify the fault diagnosis scheme and the results show that the scheme is an effective way to diagnose faults in multi branches wiring\nnetwork...
Software defined networking (SDN) has been adopted in many application domains as it provides functionalities to dynamically\ncontrol the network flow more robust and more economical compared to the traditional networks. In order to\nstrengthen the security of the SDN against cyber attacks, many security solutions have been proposed. However, those\nsolutions need to be compared in order to optimize the security of the SDN. To assess and evaluate the security of the SDN\nsystematically, one can use graphical security models (e.g., attack graphs and attack trees). However, it is difficult to provide\ndefense against an attack in real time due to their high computational complexity. In this paper, we propose a real-time\nintrusion response in SDN using precomputation to estimate the likelihood of future attack paths from an ongoing attack. We\nalso take into account various SDN components to conduct a security assessment, which were not available when addressing\nonly the components of an existing network. Our experimental analysis shows that we are able to estimate possible attack paths\nof an ongoing attack to mitigate it in real time, as well as showing the security metrics that depend on the flow table, including\nthe SDN component. Hence, the proposed approach can be used to provide effective real-time mitigation solutions for\nsecuring SDN....
Clustering provides an effective way to extend the lifetime and improve the energy efficiency of wireless sensor networks (WSNs).\r\nHowever, the cluster heads will deplete energy faster than cluster members due to the additional tasks of information collection\r\nand transmission. The cluster head rotation among sensors is adopted to solve this problem. Cluster head rotation strategies can\r\nbe generally divided into two categories: time-driven strategy and energy-driven strategy. The time-driven strategy can balance\r\nenergy consumption better, but it is not suitable for heterogonous WSNs. The energy-driven cluster head rotation strategy has\r\nhigh energy efficiency, especially in heterogonous networks. However, the rotation will become increasingly frequent with the\r\nreduction of the nodes residual energy for this strategy, which causes lots of energy waste. In this paper, we propose a hybrid cluster\r\nhead rotation strategy which combines the advantages of both energy-driven and time-driven cluster head rotation strategies. In\r\nour hybrid rotation strategy, the time-driven strategy or energy-driven strategy will be selected according to the residual energy.\r\nSimulations show that the hybrid strategy can enhance the energy efficiency and prolong network lifetime in both homogeneous\r\nand heterogeneous networks, compared with either single time-driven or energy-driven cluster head rotation method....
With the rapid growth of Internet of Things technologies, the management and control of Internet of Things networks\nface remarkable challenges. As such, software-defined networking, which decouples the control layer from data layer,\nresults in various advantages. An association of software-defined networking and Internet of Things, which is referred to\nas software-defined Internet of Things, provides a robust platform to improve the management and control abilities of\nInternet of Things networks. However, these benefits have resulted in an increase in the number of malicious attacks on\nlogically centralized controllers. For that reason, we have performed a specific vulnerability analysis in the link service,\nwhere the controller learns network topology through discovering every link between switches. In addition, we demonstrate\nlink spoofing attacks on the link service, and discuss a hybrid countermeasure to address this security problem...
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of\napplications. Monitoring tasks can be performed in various environments. This may be beneficial\nin many scenarios, but it certainly exhibits new challenges in terms of security due to increased\ndata transmission over the wireless channel with potentially unknown threats. Among possible\nsecurity issues are timing attacks, which are not prevented by traditional cryptographic security.\nMoreover, the limited energy and memory resources prohibit the use of complex security mechanisms\nin such systems. Therefore, balancing between security and the associated energy consumption\nbecomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the\nrequirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of\nthis problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward,\nand the tradeoff analysis of the security and performance attributes is carried out. By extending and\ntransforming this model, the mean time to security attributes failure is evaluated. Through tradeoff\nanalysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate\nof the performance and security tradeoff can be obtained....
Loading....