International Journal of Distributed Sensor Networks
Latest Publications


TOTAL DOCUMENTS

4095
(FIVE YEARS 620)

H-INDEX

44
(FIVE YEARS 11)

Published By Sage Publications

1550-1477, 1550-1329

2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110586
Author(s):  
Lu He ◽  
Shijun Wang ◽  
Yanchang Gu ◽  
Qiong Pang ◽  
Yunxing Wu ◽  
...  

Seepage behavior assessment is an important part of the safety operation assessment of earth-rock dams, because of insufficient intelligent analysis of monitoring information, abnormal phenomena or measured values are often ignored or improperly processed. To improve the intelligent performance of the monitoring system, this article has established an assessment framework covering project quality, maintenance status, monitoring data analysis, and on-site inspection based on the relevant norms of seepage safety assessment of earth-rock dams and the expert survey scoring method, and the Leaky Noisy-OR Gate extended model were used to determine the probability of events, and the dynamic and static Bayesian networks used to assess the possibility of seepage failure of earth-rock dams and diagnose the most likely cause of failure. The function of static and dynamic Bayesian networks to assess the seepage behavior of earth-rock dams, abnormal measured values, and causes of anomalies can make up for the limitations of reservoir management personnel and monitoring system in seepage failure experience and seepage knowledge of earth-rock dams and enable better handling of abnormal phenomena and monitoring information, making the monitoring system more intelligent.


2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110612
Author(s):  
Zhao Chunxiao ◽  
Guo Junjie

Nearest neighbor mobile social network means that movers approaching in position communicate through their social sensors, which is called Proximity Mobile Social Network. Proximity Mobile Social Network can provide more social and business opportunities for users. To carry out disaster relief work in post-disaster environment, we need to collect incident information during the search process and report to the sink in time. Proximity Mobile Social Network provides flexible systems for emergency handling and disaster relief. Therefore, how to find a better data forwarding and routing strategy is the key problem of post-disaster rescue, and the research of user mobility model is the basis of the above problems. This article presents an Autonomy-Oriented Proximity Mobile Social Network modeling for emergency rescue in smart city, which simulates the network operating environment. First, we verify the performance of Autonomy-Oriented Proximity Mobile Social Network model in terms of self-organization, scale-free, aggregation, and community structure. Then, the rescue efficiency is discussed through the coverage of mobile sensors. Finally, performance of the routing strategy based on Autonomy-Oriented Proximity Mobile Social Network model is analyzed, and the effectiveness of the method is proved.


2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110612
Author(s):  
Zhengqiang Ge ◽  
Xinyu Liu ◽  
Qiang Li ◽  
Yu Li ◽  
Dong Guo

To significantly protect the user’s privacy and prevent the user’s preference disclosure from leading to malicious entrapment, we present a combination of the recommendation algorithm and the privacy protection mechanism. In this article, we present a privacy recommendation algorithm, PrivItem2Vec, and the concept of the recommended-internet of things, which is a privacy recommendation algorithm, consisting of user’s information, devices, and items. Recommended-internet of things uses bidirectional long short-term memory, based on item2vec, which improves algorithm time series and the recommended accuracy. In addition, we reconstructed the data set in conjunction with the Paillier algorithm. The data on the server are encrypted and embedded, which reduces the readability of the data and ensures the data’s security to a certain extent. Experiments show that our algorithm is superior to other works in terms of recommended accuracy and efficiency.


2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110606
Author(s):  
Leigang Dong ◽  
Guohua Liu ◽  
Xiaowei Cui ◽  
Quan Yu

There are much data transmitted from sensors in wireless sensor network. How to mine vital information from these large amount of data is very important for decision-making. Aiming at mining more interesting information for users, the skyline technology has attracted more attention due to its widespread use for multi-criteria decision-making. The point which is not dominated by any other points can be called skyline point. The skyline consists of all these points which are candidates for users. However, traditional skyline which consists of individual points is not suitable for combinations. To address this gap, we focus on the group skyline query and propose efficient algorithm to computing the Pareto optimal group-based skyline (G-skyline). We propose multiple query windows to compute key skyline layers, then optimize the method to compute directed skyline graph, finally introduce primary points definition and propose a fast algorithm based on it to compute G-skyline groups directly and efficiently. The experiments on the real-world sensor data set and the synthetic data set show that our algorithm performs more efficiently than the existing algorithms.


2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110391
Author(s):  
Yuvaraja Teekaraman ◽  
Hariprasath Manoharan ◽  
Ramya Kuppusamy ◽  
Shabana Urooj ◽  
Fadwa Alrowais

This article focuses on intensifying in-vehicle biological wireless sensor networks for the persistence of monitoring the information on a precise vehicle. The wireless sensor networks will have enormous amount of nodules which are interrelated with each other. Therefore, these wireless sensor networks can be installed on a vehicle not only for monitoring perseverance but also for corroborating security with the support of a Global Positioning System expedient. In addition, the projected work focuses on reliable communiqué which is defined in terms of network reliability with discrepancy in reporting rate at each base station. To validate the efficiency of the proposed scheme, the simulation has been abetted using network simulator (NS2) and the outcomes indicate that when the sensors are installed, a robust system can be obtained with improved data transfer between the base stations. Moreover, a fortified in-vehicular sensor can be fixed in each vehicle with minimized path loss.


2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110559
Author(s):  
Yingjue Chen ◽  
Yingnan Gu ◽  
Panfeng Li ◽  
Feng Lin

In wireless rechargeable sensor networks, most researchers address energy scarcity by introducing one or multiple ground mobile vehicles to recharge energy-hungry sensor nodes. The charging efficiency is limited by the moving speed of ground chargers and rough environments, especially in large-scale or challenging scenarios. To address the limitations, researchers consider replacing ground mobile chargers with lightweight unmanned aerial vehicles to support large-scale scenarios because of the unmanned aerial vehicle moving at a higher speed without geographical limitation. Moreover, multiple automatic landing wireless charging PADs are deployed to recharge unmanned aerial vehicles automatically. In this work, we investigate the problem of introducing the minimal number of PADs in unmanned aerial vehicle–based wireless rechargeable sensor networks. We propose a novel PAD deployment scheme named clustering-with-double-constraints and disks-shift-combining that can adapt to arbitrary locations of the base station, arbitrary geographic distributions of sensor nodes, and arbitrary sizes of network areas. In the proposed scheme, we first obtain an initial PAD deployment solution by clustering nodes in geographic locations. Then, we propose a center shift combining algorithm to optimize this solution by shifting the location of PADs and attempting to merge the adjacent PADs. The simulation results show that compared to existing algorithms, our scheme can charge the network with fewer PADs.


2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110586
Author(s):  
Chu Ji ◽  
Qi Zhu

Spectrum sensing is the key technology of cognitive radio. In this article, we apply blockchain technology in spectrum sensing process and propose a related algorithm based on reputation. The algorithm builds a system model based on smart contract in blockchain and applies blockchain asymmetric encryption algorithm and digital signature technology in the process of secondary users’ transmitting local judgments to the secondary user base station. The algorithm can resist spectrum sensing data falsification (SSDF) attack launched by malicious users. This article comprehensively considers the channel error rate, detection probability, secondary user base station budget and remaining energy of the secondary users (SUs) and then establishes the SU’s utility function as well as the game model. By solving the Nash equilibrium, the SU determines whether it uploads sensing data. Finally, the SU base station selects registered SUs by calculating and updating their reputation, obtaining the final judgment by voting rule. With simulations, we prove that the algorithm proposed in this article increases the accuracy and security of spectrum sensing and can effectively resist SSDF attack.


2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110574
Author(s):  
Bilal Ur Rehman ◽  
Mohammad Inayatullah Babar ◽  
Arbab Waheed Ahmad ◽  
Hesham Alhumyani ◽  
Gamil Abdel Azim ◽  
...  

Orthogonal multiple access schemes based on assignment of communication resource blocks among multiple contenders, although widely available, still necessitate an upper limit on the number of concurrent users for minimization of multiple-user interference. The feature thwarts efforts to cater for pressing connectivity demands posed by modern-day cellular communication networks. Non-orthogonal multiple access, regarded as a key advancement towards realization of high-speed 5G wireless communication networks, enables multiple users to access the same set of resource blocks non-orthogonally in terms of power with controllable interference, thereby allowing for overall performance enhancement. Owing to the combinatorial nature of the underlying optimization problem involving user pairing/grouping scheme, power control and decoding order, the computational complexity in determining optimal and sub-optimal solutions remains considerably high. This work proposes three novel alternative approaches (Randomly, 2-Opt and Hybrid) for arriving at a near-optimal solution for the problem of user pairing/grouping. The algorithms not only offer reduced computational complexity but also outperform orthogonal multiple access and existing schemes reported in the literature for uplink non-orthogonal multiple access systems.


2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110590
Author(s):  
Zhihui Shang ◽  
Tao Zhang ◽  
Liwei Tao ◽  
Zhongwu Xiang ◽  
Weiwei Yang

This article studies the physical layer security in a downlink full-duplex cognitive non-orthogonal multiple access sensor networks (FD-C-NOMA). Compared with the existing works, this article proposes a FD-C-NOMA transmission scheme with a primary user (PU) and secondary user (SU) sensor nodes in the presence of an eavesdropper. The zero-forcing beamforming design problems of FD operation are investigated subject to the practical secrecy rate and the quality of services of PU. To characterize the security reliability trade-off of the FD-C-NOMA scheme, we first derive the closed-form expressions of connection outage probability (COP), the secrecy outage probability (SOP), and effective secrecy throughput (EST) of each SU in the NOMA networks. Then the impacts of the system parameters on the COP, SOP, and EST are investigated to evaluate the security and reliability in the FD-C-NOMA networks. Furthermore, in order to further verify the security and reliability of our considered network, an OMA scheme of FD operation is provided in the simulation for the purpose of comparison. Results demonstrate that the NOMA-based cognitive sensor networks of FD operation outperforms the OMA system in terms of EST. Finally, simulations are performed to validate the accuracy of our analysis results of the proposed scheme.


2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110586
Author(s):  
Agnieszka Paszkowska ◽  
Konrad Iwanicki

With the increasing adoption of Internet of Things technologies for controlling physical processes, their dependability becomes important. One of the fundamental functionalities on which such technologies rely for transferring information between devices is packet routing. However, while the performance of Internet of Things–oriented routing protocols has been widely studied experimentally, little work has been done on provable guarantees on their correctness in various scenarios. To stimulate this type of work, in this article, we give a tutorial on how such guarantees can be derived formally. Our focus is the dynamic behavior of distance-vector route maintenance in an evolving network. As a running example of a routing protocol, we employ routing protocol for low-power and lossy networks, and as the underlying formalism, a variant of linear temporal logic. By building a dedicated model of the protocol, we illustrate common problems, such as keeping complexity in control, modeling processing and communication, abstracting algorithms comprising the protocol, and dealing with open issues and external dependencies. Using the model to derive various safety and liveness guarantees for the protocol and conditions under which they hold, we demonstrate in turn a few proof techniques and the iterative nature of protocol verification, which facilitates obtaining results that are realistic and relevant in practice.


Sign in / Sign up

Export Citation Format

Share Document