样式: 排序: IF: - GO 导出 标记为已读
-
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-11-29 Yong Shen, Xiaokang Tang, Xiang Zhang, Yongzhuang Zhou, Hongxin Zou
As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. Therefore, a key establis...
-
Evolutionary modeling and robustness analysis of multi-domain cooperative communication network under the environment of Internet of things Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-11-29 Jianrong Wang, Pan Zhang, Wei Bai, Guoyuan Yang, Yunyun Yang
In the future, the Internet of things will reduce the cell radius and increase the number of low-power nodes to support thousands of times of traffic growth under 5G. As a virtual multiple input mu...
-
New timestamp mark–based energy efficient time synchronization method for wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-11-18 Yourui Huang, Gang Zhang, Min Kong, Fugui He
Aimed at the demands of wireless sensor networks for high energy-efficient time synchronization, the reduction of synchronization energy consumption is studied from the aspects of both accurate tim...
-
Cross-domain entity identity association analysis and prediction based on representation learning Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-11-14 Mingcheng Gao, Ruiheng Wang, Lu Wang, Yang Xin, Hongliang Zhu
Cross-domain identity association of network entities is a significant research challenge and a vital issue of practical value in relationship discovery and service recommendation between things in...
-
Teletraffic analysis of a mobile crowdsensing system: The pedestrian-to-vehicle scenario Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-11-10 David Miguel-Santiago, Mario E Rivero-Angeles, Laura I Garay-Jiménez, Izlian Y Orea-Flores, Blanca Tovar-Corona
Crowdsensing systems are developed in order to use the computational and communication capabilities of registered users to monitor specific variables and phenomena in an opportunistic manner. As su...
-
An online intelligent electronic medical record system via speech recognition Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-11-08 Xin Xia, Yunlong Ma, Ye Luo, Jianwei Lu
Traditional electronic medical record systems in hospitals rely on healthcare workers to manually enter patient information, resulting in healthcare workers having to spend a significant amount of ...
-
Machine learning for Internet of things anomaly detection under low-quality data Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-10-28 Shangbin Han, Qianhong Wu, Yang Yang
With the popularization of Internet of things, its network security has aroused widespread concern. Anomaly detection is one of the important technologies to protect network security. To meet the n...
-
An improved dual-sink architecture with a modified media access control protocol, energy-aware, and quality-of-service guaranteed routing algorithms for wireless body area network Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-10-20 Abdullahi Abdu Ibrahim
To reduce frequent sensor recharging and replacement due to resource constraint, it becomes imperative to increase the management of energy and network’s quality of service. To this end, this artic...
-
Uplink non-orthogonal multiple access in heterogeneous networks: A review of recent advances and open research challenges Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-10-18 Bilal Ur Rehman, Mohammad Inayatullah Babar, Arbab Waheed Ahmad, Mohammad Amir, Wasim Habib, Muhammad Farooq, Gamil Abdel Azim
Fifth-generation wireless communications provide several benefits, including high throughput, lower latency, massive connectivity, considerable improvement in the number of users, higher base stati...
-
Survey on authentication and security protocols and schemes over 5G networks Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-10-06 Yahya Tashtoush, Dirar Darweesh, Ola Karajeh, Omar Darwish, Majdi Maabreh, Safa’ Swedat, Rawan Koraysh, Omar Almousa, Nasser Alsaedi
The emergence of fifth generation networks opens the doors for Internet of Things environment to spread widely. The number of connected devices to fifth generation networks is expected to increase ...
-
Hybrid multi-objective node deployment for energy-coverage problem in mobile underwater wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-09-23 Salmah Fattah, Ismail Ahmedy, Mohd Yamani Idna Idris, Abdullah Gani
Underwater wireless sensor networks have grown considerably in recent years and now contribute substantially to ocean surveillance applications, marine monitoring and target detection. However, the...
-
PSD characteristics for the random vibration signals used in bridge structural health monitoring in Vietnam based on a multi-sensor system Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-09-22 Thanh Q Nguyen, Tuan Anh Nguyen, Thuy T Nguyen
This study proposes two parameters, including the appearance frequency of harmonics (AFH) and the change in shape of the power spectral density (PSD), which are examined to assess the decline in st...
-
Research on privacy protection of dummy location interference for Location-Based Service location Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-09-21 Ai Zhang, XiaoHui Li
Location privacy refers to the individual private and sensitive location information involved in the user’s access to location services. Achieving location privacy protection has become a hot topic...
-
Energy-efficient and intelligent cooperative spectrum sensing algorithm in cognitive radio networks Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-09-19 Tangsen Huang, Xiangdong Yin, Xiaowu Li
Green communication is the demand of current and future wireless communication. As the next-generation communication network, cognitive radio network also needs to meet the requirements of green co...
-
Unmanned aerial vehicles: Applications, techniques, and challenges as aerial base stations Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-09-19 Rinju Mariam Rolly, Pandy Malarvezhi, Thomas D Lagkas
Next generation wireless networks are expected to be greatly supported by unmanned aerial vehicles, which can act as aerial base stations and constitute a promising solution for the exorbitant rise...
-
A willingness-aware user recruitment strategy based on the task attributes in mobile crowdsensing Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-09-19 Yang Liu, Yong Li, Wei Cheng, Weiguang Wang, Junhua Yang
With the powerful sensing, computing capabilities of mobile devices, large-scale users with smart devices throughout the city would be the perfect carrier for the people-centric scheme, namely, mob...
-
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-09-08 Umesh Kumar Lilhore, Dr. Osamah Ibrahim Khalaf, Sarita Simaiya, Carlos Andrés Tavera Romero, Dr. Ghaida Muttashar Abdulsahib, Poongodi M, Dinesh Kumar
Underwater wireless sensor network attracted massive attention from researchers. In underwater wireless sensor network, many sensor nodes are distributed at different depths in the sea. Due to its ...
-
Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-09-03 Ting Fan, Lingchen Li, Yongzhuang Wei, Enes Pasalic
Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmi...
-
A structural health monitoring method proposal based on optical scanning and computational models Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-08-29 Wendy Flores-Fuentes, Ivan Yeniseysk Alba-Corpus, Oleg Sergiyenko, Julio C. Rodríguez-Quiñonez
This article proposes a method for continuous bridge displacement monitoring combining the dynamic triangulation scanning and load estimation by vehicle image recognition. The vehicle–bridge intera...
-
Security performance analysis for cell-free massive multiple-input multiple-output system with multi-antenna access points deployment in presence of active eavesdropping Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-08-23 Xiaoyu Wang, Yuanyuan Gao, Guangna Zhang, Mingxi Guo, Kui Xu
This article investigates the influence of multiple-antenna deployment at access points on physical layer security under cell-free massive multiple-input multiple-output systems. To embody the conc...
-
Crack fault diagnosis of vibration exciter rolling bearing based on genetic algorithm–optimized Morlet wavelet filter and empirical mode decomposition Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-08-16 Xiaoming Han, Jin Xu, Songnan Song, Jiawei Zhou
The fault diagnosis of vibration exciter rolling bearing is of great significance to maintain the stability of vibration equipment. When the crack fault of the bearing occurs, the effective fault f...
-
Machine vision-based testing action recognition method for robotic testing of mobile application Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-08-04 Tao Zhang, Zhengqi Su, Jing Cheng, Feng Xue, Shengyu Liu
The explosive growth and rapid version iteration of various mobile applications have brought enormous workloads to mobile application testing. Robotic testing methods can efficiently handle repetit...
-
A dynamic decentralized strategy of replica placement on edge computing Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-08-02 Yingying Yin, Leilei Deng
Smart phone and its applications are used more and more extensively in our daily life. Short delay of arriving data is important to these applications, especially to some time-sensitive ones. To re...
-
A non-asymptotic analysis of adaptive TD(λ) learning in wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-07-29 Bing Li, Tao Li, Muhua Liu, Junlong Zhu, Mingchuan Zhang, Qingtao Wu
Wireless sensor network has been widely used in different fields, such as structural health monitoring and artificial intelligence technology. The routing planning, an important part of wireless sensor network, can be formalized as an optimization problem needing to be solved. In this article, a reinforcement learning algorithm is proposed to solve the problem of optimal routing in wireless sensor
-
Threshold-free multi-attributes physical layer authentication based on expectation–conditional maximization channel estimation in Internet of Things Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-07-28 Tao Jing, Hongyan Huang, Yue Wu, Qinghe Gao, Yan Huo, Jiayu Sun
With the number of Internet of Things devices continually increasing, the endogenous security of Internet of Things communication systems is growingly critical. Physical layer authentication is a powerful means of resisting active attacks by exploiting the unique characteristics inherent in wireless signals and physical devices. Many existing physical layer authentication schemes usually assume physical
-
Connected and automated vehicle control at unsignalized intersection based on deep reinforcement learning in vehicle-to-infrastructure environment Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-07-26 Juan Chen, Vijayan Sugumaran, Peiyan Qu
In order to reduce the number of vehicle collisions and average travel time when vehicles pass through an unsignalized intersection with connected and automated vehicle, an improved Double Dueling Deep Q Network method with Convolutional Neutral Network and Long Short-Term Memory is presented in this article. This method designs a multi-step reward and penalty method to alleviate the sparse reward
-
Fuzzy logic, genetic algorithms, and artificial neural networks applied to cognitive radio networks: A review Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-07-19 Ahmed Alkhayyat, Firas Abedi, Ashish Bagwari, Pooja Joshi, Haider Mahmood Jawad, Sarmad Nozad Mahmood, Yousif K Yousif
Cognitive radios are expected to play an important role in capturing the constantly growing traffic interest on remote networks. To improve the usage of the radio range, a cognitive radio hub detects the weather, evaluates the open-air qualities, and then makes certain decisions and distributes the executives’ space assets. The cognitive radio works in tandem with artificial intelligence and artificial
-
Three-dimensional localization algorithm of mobile nodes based on received signal strength indicator-angle of arrival and least-squares support-vector regression Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-07-18 Lieping Zhang, Huihao Peng, Jiajie He, Shenglan Zhang, Zuqiong Zhang
Node localization is one of the key technologies in the wireless sensor network research field, which is crucial to the high-accuracy localization of mobile nodes, but the positioning error of traditional algorithms such as received signal strength indicator and angle of arrival is more than 4 m, which has almost no practical value. For example, the localization accuracy of the localization algorithm
-
The robustness of popular multiclass machine learning models against poisoning attacks: Lessons and insights Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-07-14 Majdi Maabreh, Arwa Maabreh, Basheer Qolomany, Ala Al-Fuqaha
Despite the encouraging outcomes of machine learning and artificial intelligence applications, the safety of artificial intelligence–based systems is one of the most severe challenges that need further exploration. Data set poisoning is a severe problem that may lead to the corruption of machine learning models. The attacker injects data into the data set that are faulty or mislabeled by flipping the
-
Distributed filtering in sensor networks based on linear minimum mean square error criterion with limited sensing range Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-07-14 Teng Shao
One of the fundamental problems in sensor networks is to estimate and track the target states of interest that evolve in the sensing field. Distributed filtering is an effective tool to deal with state estimation in which each sensor only communicates information with its neighbors in sensor networks without the requirement of a fusion center. However, in the majority of the existing distributed filters
-
Research and application of XGBoost in imbalanced data Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-06-29 Ping Zhang, Yiqiao Jia, Youlin Shang
As a new and efficient ensemble learning algorithm, XGBoost has been widely applied for its multitudinous advantages, but its classification effect in the case of data imbalance is often not ideal. Aiming at this problem, an attempt was made to optimize the regularization term of XGBoost, and a classification algorithm based on mixed sampling and ensemble learning is proposed. The main idea is to combine
-
Dynamic incentive mechanism in mobile crowdsourcing networks by combining reputation and contract theory Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-06-28 Nan Zhao, Qixuan Wan, Jinlian Chen, Minghu Wu
By utilizing the mobile terminals’ sensing and computing capabilities, mobile crowdsourcing network is considered to be a promising technology to support the various large-scale sensing applications. However, considering the limited resources and security issue, mobile users may be unwilling to participate in crowdsourcing without any incentive. In this work, by combining reputation and contract theory
-
Design of a general complex problem-solving architecture based on task management and predictive optimization Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-06-28 Shabir Ahmad, Salman Khan, Faisal Jamil, Faiza Qayyum, Abid Ali, DoHyeun Kim
Many real-life problems have different contradicting goals and no simple solution. Therefore, an analysis is made to select the appropriate solution based on the scenario, which is considered the best compromise toward the achievement of a goal. In literature, it is known as complex problem-solving and is a kind of paradigm that has been around since the last century, but the cognition involved in
-
Wet aggregate stability modeling based on support vector machine in multiuse soils Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-06-25 Ruizhi Zhai, Jianping Wang, Deshun Yin, Ziheng Shangguan
Accurate assessment of wet aggregate stability is critical in evaluating soil quality. However, a few general models are used to assess it. In this work, we use the support vector machine to evaluate wet aggregate stability and compare it with a benchmark model based on artificial neural networks. One hundred thirty-four soil samples from various land uses, such as crops, grasslands, and bare land
-
A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-06-23 Zhen Li, Qingkai Miao, Shehzad Ashraf Chaudhry, Chien-Ming Chen
The Internet of vehicles technology has developed rapidly in recent years and has become increasingly important. The social Internet of vehicles provides better resources and services for the development of the Internet of vehicles and provides better experience for users. However, there are still many security problems in social vehicle networking environments. Once the vehicle is networked, the biggest
-
Joint timeliness and security provisioning for enhancement of dependability in Internet of Vehicle system Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-06-23 Tao Jing, Hengyu Yu, Xiaoxuan Wang, Qinghe Gao
The Internet of Things has emerged as a wonder-solution to numerous problems in our everyday lives, such as smart homes and intelligent transportation. As an extension of the IoTs, the Internet of Vehicles (IoVs) also requires increasingly high security and timeliness. This article proposes a vehicle-assisted batch verification (VABV) system for IoV, in which some vehicles called auxiliary authentication
-
TEZEM: A new energy-efficient routing protocol for next-generation wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-06-23 Zain ul Abidin Jaffri, Muhammad Asif, Wali Ullah Khan, Zeeshan Ahmad, Zain ul Abiden Akhtar, Kalim Ullah, Md. Sadek Ali
The design and implementation of energy-efficient routing protocols for next-generation wireless sensor networks is always a challenge due to limited power resource capabilities. Hierarchical (clustering) routing protocols appeared to be a remarkable solution for extending the lifetime of wireless sensor networks, particularly in application-aware (threshold-sensitive) and heterogeneity-aware cluster-based
-
Robust security transmission design for multi-user peer-to-peer wireless relay networks Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-06-23 Dongmei Yang, Hongjun Li, Baoquan Ren, Xudong Zhong
In this article, we studied the robust security transmission design for multi-user peer-to-peer relay networks, where all users demand secure communication and the eavesdropper is passive. Although the previous researches have designed the physical-layer security schemes under perfect channel state information, this study focuses on investigating the robust transmission design in the presence of a
-
Embedded intelligence and the data-driven future of application-specific Internet of Things for smart environments Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-06-16 Li-Minn Ang, Kah Phooi Seng, Monica Wachowicz
The advances and convergence in sensor technology, information and communication technology, and intelligent analytics have given rise to the Internet of Things or also known as the Internet of Everything or the Industrial Internet. The research and development works for the Internet of Things can be seen to have progressed in two main phases: (1) In the first phase, the earlier works for the Internet
-
Deep learning–based resource allocation for secure transmission in a non-orthogonal multiple access network Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-06-16 Miao Zhang, Yao Zhang, Qian Cen, Shixun Wu
Machine learning techniques, especially deep learning algorithms have been widely utilized to deal with different kinds of research problems in wireless communications. In this article, we investigate the secrecy rate maximization problem in a non-orthogonal multiple access network based on deep learning approach. In this non-orthogonal multiple access network, the base station intends to transmit
-
Vehicle state estimation based on extended Kalman filter and radial basis function neural networks Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-06-01 Yunfei Zha, Xinye Liu, Fangwu Ma, CC Liu
To improve the reliability of vehicle state parameter estimation, a vehicle state fusion estimation method based on dichotomy is proposed. An extended Kalman filter algorithm is designed based on the vehicle 3 degrees of freedom dynamic model. Meanwhile, considering the influence of dynamic model and sensor noise and its coefficient selection on the estimation results, a radial basis function neural
-
A novel ambiguity resolution model of BeiDou navigation satellite system/inertial navigation system tightly coupled for kinematic-to-kinematic precise relative positioning Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-06-01 Ling Wu, Yongrong Sun, Xiyu Fu, Qinghua Zeng
The carrier-based kinematic-to-kinematic relative positioning can obtain the precise baseline between two moving stations, which greatly expands the application field of dynamic relative positioning. However, the relative positioning performance is degraded greatly with low fixation rate of ambiguity with low-cost receivers. Especially, in the complex dynamic environment, ambiguity resolution effect
-
Method for predicting cutter remaining life based on multi-scale cyclic convolutional network Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-26 Tao Li, Yinquan Yu, Chaoqiang Huang, Jinwen Yang, Yuanchang Zhong, Yong Hao
In the process of predicting the remaining cutter life, the deep-learning method such as convolutional neural network does not consider the time correlation of different degradation states, which directly affects the accuracy of the remaining cutter life prediction. To extract the features with time-series information to predict the remaining cutter life more effectively, this article proposes a new
-
Multi-sensor fusion algorithm in cooperative vehicle-infrastructure system for blind spot warning Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-30 Chao Xiang, Li Zhang, Xiaopo Xie, Longgang Zhao, Xin Ke, Zhendong Niu, Feng Wang
With the rapid development of electric vehicles and artificial intelligence technology, the automatic driving industry has entered a rapid development stage. However, there is a risk of traffic accidents due to the blind spot of vision, whether autonomous vehicles or traditional vehicles. In this article, a multi-sensor fusion perception method is proposed, in which the semantic information from the
-
A distributed scheme for energy-efficient event-based target recognition using Internet of Multimedia Things Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-24 Manal Alsabhan, Adel Soudani, Manan Almusallam
The availability of low-cost embedded devices for multimedia sensing has encouraged their integration with low-power wireless sensors to create systems that enable advanced services and applications referred to as the Internet of Multimedia Things. Image-based sensing applications are challenged by energy efficiency and resource availability. Mainly, image sensing and transmission in Internet of Multimedia
-
A distributed energy-efficient opportunistic routing accompanied by timeslot allocation in wireless sensor networks Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-19 Man Gun Ri, Ye Song Han, Jin Pak
Sensed data can be forwarded only in one direction to the base station in one-dimensional queue wireless sensor networks different from mesh structure, so the network lifetime will be shortened if some continuous neighboring nodes have run out of their energy. So designing routing protocols for balancing energy consumption is a challenging problem. However, traditional and existing opportunistic routing
-
Multi-Kinects fusion for full-body tracking in virtual reality-aided assembly simulation Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-16 Yu Wang, Fuxiang Chang, Yuanjie Wu, Ziran Hu, Lihui Li, Pengyu Li, Pu Lang, Shouwen Yao
Skeleton tracking based on multiple Kinects data fusion has been proved to have better accuracy and robustness than single Kinect. However, previous works did not consider the inconsistency of tracking accuracy in the tracking field of Kinect and the self-occlusion of human body in assembly operation, which are of vital importance to the fusion performance of the multiple Kinects data in assembly task
-
A hybrid trust model based on communication and social trust for vehicular social networks Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-13 Na Fan, Shuai Shen, Chase Q Wu, Junfeng Yao
Vehicular social networks are emerging hybrid networks that combine traditional vehicular networks and social networks, with two key types of nodes, that is, vehicles and drivers. Since vehicle behaviors are controlled or influenced by drivers, the trustworthiness of a vehicle node is essentially determined by its own communication behaviors and its driver’s social characteristics. Therefore, human
-
Delay-reliability-aware protocol adaption and quality of service guarantee for message queuing telemetry transport-empowered electric Internet of things Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-13 Hao Zhang, Hongshuo Zhang, Zhao Wang, Zhenyu Zhou, Qiang Wang, Guangyuan Xu, Junzhong Yang, Zhong Gan
Message queuing telemetry transport has emerged as a promising communication protocol for resource-constrained electric Internet of things due to high bandwidth utilization, simple implementation, and various quality of service levels. Enabled by message queuing telemetry transport, electric Internet of things gateways adopt dynamic protocol adaptation, conversion, and quality of service level selection
-
Analysis of relay selection schemes in underlay cognitive radio non-orthogonal multiple access networks Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-13 Dongmei Yang, Cheng Li, Baoquan Ren, Hongjun Li, Kefeng Guo
This article investigates the impacts of relay selection schemes on cooperative underlay cognitive radio non-orthogonal multiple access networks, where the partial relay selection scheme, the max–min relay selection scheme and the two-stage relay selection scheme are applied in the network. Moreover, decode-and-forward protocol is used at the transmission relays. What’s more, in order to show the effect
-
Viability characterization of a proof-of-concept Bluetooth mesh smart building application Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-10 Leonardo Eras, Federico Domínguez, Caril Martinez
Bluetooth low energy is an almost ubiquitous technology currently embedded in billions of power-constrained Internet of Things devices around the world. The Bluetooth mesh profile, released by the Bluetooth Special Interest Group in July 2017, allows Bluetooth low energy devices to form a mesh network, further enabling smart home and building applications where long-range connectivity is required.
-
A certificateless aggregate signature scheme for security and privacy protection in VANET Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-07 Eko Fajar Cahyadi, Tzu-Wei Su, Chou-Chen Yang, Min-Shiang Hwang
In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection. However, since many users transmit a substantial number of messages, it may cause reception delays and affect the entire system. A certificateless aggregate signature scheme can provide a signature compression that keeps the verification
-
Vulnerability association evaluation of Internet of thing devices based on attack graph Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-07 Yao Ma, Yuting Wu, Dan Yu, Lv Ding, Yongle Chen
Device vulnerabilities emerge one after another in the Internet of thing environment, the attackers attack vulnerabilities on several low-level devices simultaneously by multi-step attack method to trigger the vulnerabilities on other high-level devices to damage or control the information system. Considering the correlation between device vulnerabilities, we proposed a method based on attack graph
-
A graph-based sensor recommendation model in semantic sensor network Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-07 Yuanyi Chen, Yihao Lin, Peng Yu, Yanyun Tao, Zengwei Zheng
In the past few years, introducing ontology to describe the concepts and relationships between different entities in semantic sensor network enhances the interoperability between entities. Existing works mostly based on SPARQL retrieval ignore the user’s specific requirements of sensor attributes. Therefore, the recommendation results cannot satisfy the user’s needs. In this article, we propose a graph-based
-
A reduced dimension multiple signal classification–based direct location algorithm with dense arrays Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-05-05 Jianfeng Li, Gaofeng Zhao, Baobao Li, Xianpeng Wang, Mengxing Huang
Aiming at the issue of parameter matching in conventional two-step location, a reduced dimension multiple signal classification direct position determination algorithm based on multi-array is proposed. Based on the idea of dimension reduction, the algorithm avoids multi-dimensional search in spatial domain and attenuation coefficient domain and reduces the search complexity. Simulation results show
-
An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-04-28 Huan Wang, Zhongyuan Jiang, Qing Qian, Hong Wang
This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images. The encryption scheme aims to encrypt secret images by mapping them to several shared images that do not suffer any pixel expansion problem and do not reveal any information of the secret images
-
Artificial intelligence analysis in cyber domain: A review Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-04-26 Liguo Zhao, Derong Zhu, Wasswa Shafik, S Mojtaba Matinkhah, Zubair Ahmad, Lule Sharif, Alisa Craig
The application of Big Data Analytics is identified through the Cyber Research Alliance for cybersecurity as the foremost preference for future studies and advancement in the field of cybersecurity. In this study, we develop a repeatable procedure for detecting cyber-attacks in an accurate, scalable, and timely manner. An in-depth learning algorithm is utilized for training a neural network for detecting
-
Distributed consensus problem with caching on federated learning framework Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-04-22 Xin Yan, Yiming Qin, Xiaodong Hu, Xiaoling Xiao
Federated learning framework facilitates more applications of deep learning algorithms on the existing network architectures, where the model parameters are aggregated in a centralized manner. However, some of federated learning participants are often inaccessible, such as in a power shortage or dormant state. That will force us to explore the possibility that the parameter aggregation is operated
-
Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-04-22 Caixue Zhou, Lihua Wang, Lingmin Wang
The smart grid is considered to be the next-generation electric power network. In a smart grid, there are massive data to be processed, so cloud computing is introduced into it to form a cloud-based smart grid data management system. However, with data no longer being stored locally, how to ensure the integrity of data stored in the cloud in the smart grid has become an urgent problem awaiting solution
-
Load frequency control under false data inject attacks based on multi-agent system method in multi-area power systems Int. J. Distrib. Sens. Netw. (IF 2.3) Pub Date : 2022-04-21 Tengfei Weng, Yan Xie, Guorong Chen, Qi Han, Yuan Tian, Liping Feng, Yangjun Pei
This article considers the load frequency control of multi-area power system-based multi-agent system method under false data injection attacks. The research can provide better solutions for multi-area power system load frequency control under false data injection attacks. First, an event-triggered mechanism is introduced to decide which data should be transmitted in the controller to save the limited