首页 > 最新文献

Journal of Sensor and Actuator Networks最新文献

英文 中文
VNF-Enabled 5G Network Orchestration Framework for Slice Creation, Isolation and Management 支持vnf的5G网络编排框架,用于切片创建、隔离和管理
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-13 DOI: 10.3390/jsan12050065
Thiruvenkadam Srinivasan, Sujitha Venkatapathy, Han-Gue Jo, In-Ho Ra
Network slicing is widely regarded as the most critical technique for allocating network resources to varied user needs in 5G networks. A Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two extensively used strategies for slicing the physical infrastructure according to use cases. The most efficient use of virtual networks is realized by the application of optimal resource allocation algorithms. Numerous research papers on 5G network resource allocation focus on network slicing or on the best resource allocation for the sliced network. This study uses network slicing and optimal resource allocation to achieve performance optimization using requirement-based network slicing. The proposed approach includes three phases: (1) Slice Creation by Machine Learning methods (SCML), (2) Slice Isolation through Resource Allocation (SIRA) of requests via a multi-criteria decision-making approach, and (3) Slice Management through Resource Transfer (SMART). We receive a set of Network Service Requests (NSRs) from users. After receiving the NSRs, the SCML is used to form slices, and SIRA and SMART are used to allocate resources to these slices. Accurately measuring the acceptance ratio and resource efficiency helps to enhance overall performance. The simulation results show that the SMART scheme can dynamically change the resource allocation according to the test conditions. For a range of network situations and Network Service Requests (NSRs), the performance benefit is studied. The findings of the simulation are compared to those of the literature in order to illustrate the usefulness of the proposed work.
网络切片被广泛认为是5G网络中为不同用户需求分配网络资源的最关键技术。软件定义网络(SDN)和网络功能虚拟化(NFV)是根据用例对物理基础设施进行切片的两种广泛使用的策略。通过最优资源分配算法的应用,实现了虚拟网络的最有效利用。大量关于5G网络资源分配的研究论文集中在网络切片或切片网络的最佳资源分配上。本研究使用网络切片和最优资源分配来实现基于需求的网络切片的性能优化。提出的方法包括三个阶段:(1)通过机器学习方法(SCML)创建片,(2)通过多标准决策方法对请求进行资源分配(SIRA)的片隔离,以及(3)通过资源转移(SMART)进行片管理。我们从用户那里收到一组网络服务请求(nsr)。收到nsr后,使用SCML组成分片,并使用SIRA和SMART为这些分片分配资源。准确测量可接受率和资源效率有助于提高整体性能。仿真结果表明,SMART方案可以根据测试条件动态改变资源分配。针对一系列网络情况和网络服务请求(nsr),研究了性能效益。模拟的结果与文献的结果进行了比较,以说明所提出工作的有用性。
{"title":"VNF-Enabled 5G Network Orchestration Framework for Slice Creation, Isolation and Management","authors":"Thiruvenkadam Srinivasan, Sujitha Venkatapathy, Han-Gue Jo, In-Ho Ra","doi":"10.3390/jsan12050065","DOIUrl":"https://doi.org/10.3390/jsan12050065","url":null,"abstract":"Network slicing is widely regarded as the most critical technique for allocating network resources to varied user needs in 5G networks. A Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two extensively used strategies for slicing the physical infrastructure according to use cases. The most efficient use of virtual networks is realized by the application of optimal resource allocation algorithms. Numerous research papers on 5G network resource allocation focus on network slicing or on the best resource allocation for the sliced network. This study uses network slicing and optimal resource allocation to achieve performance optimization using requirement-based network slicing. The proposed approach includes three phases: (1) Slice Creation by Machine Learning methods (SCML), (2) Slice Isolation through Resource Allocation (SIRA) of requests via a multi-criteria decision-making approach, and (3) Slice Management through Resource Transfer (SMART). We receive a set of Network Service Requests (NSRs) from users. After receiving the NSRs, the SCML is used to form slices, and SIRA and SMART are used to allocate resources to these slices. Accurately measuring the acceptance ratio and resource efficiency helps to enhance overall performance. The simulation results show that the SMART scheme can dynamically change the resource allocation according to the test conditions. For a range of network situations and Network Service Requests (NSRs), the performance benefit is studied. The findings of the simulation are compared to those of the literature in order to illustrate the usefulness of the proposed work.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135742074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Output Feedback Stabilization of Doubly Fed Induction Generator Wind Turbines under Event-Triggered Implementations 事件触发实现下双馈风力发电机组输出反馈镇定
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-12 DOI: 10.3390/jsan12050064
Mahmoud Abdelrahim, Dhafer Almakhles
The robust stabilization of doubly fed induction generators in wind turbines against external disturbances is considered in this study. It is assumed that the angular speeds of wind turbines can only be measured and sent to the controller in a discrete-time fashion over a network. To generate the sampling times, three different triggering schemes were developed: time-triggering, static event-triggering, and dynamic event-triggering mechanisms; moreover, performance comparisons were conducted between such approaches. The design methodology is based on emulation, such that the plant is first stabilized in continuous-time where a robust feedback law is constructed based on the linear quadratic Gaussian regulator (LQG) approach. Then, the impact of the network is taken into account, and an event-triggering mechanism is built so that closed-loop stability is maintained and the Zeno phenomenon is avoided by using temporal regularization. The necessary stability constraints are framed as a linear matrix inequality, and the whole system is modeled as a hybrid dynamical system. A numerical simulation is used to demonstrate the effectiveness of the control strategy. The results show that the event-triggering mechanisms achieve a significant reduction of around 50% in transmissions compared to periodic sampling. Moreover, numerical comparisons with existing approaches show that the proposed approach provides better performance in terms of the stability guarantee and number of transmissions.
本文研究了风力发电机组双馈感应发电机对外界扰动的鲁棒镇定问题。假设风力涡轮机的角速度只能通过网络以离散时间方式测量并发送给控制器。为了生成采样时间,开发了三种不同的触发机制:时间触发机制、静态事件触发机制和动态事件触发机制;此外,还对这些方法进行了性能比较。设计方法基于仿真,首先在连续时间内稳定对象,然后基于线性二次高斯调节器(LQG)方法构建鲁棒反馈律。然后,考虑网络的影响,建立事件触发机制,通过时间正则化来保持闭环稳定性,避免芝诺现象。将必要的稳定性约束框架化为线性矩阵不等式,并将整个系统建模为混合动力系统。通过数值仿真验证了该控制策略的有效性。结果表明,与周期性采样相比,事件触发机制在传输中显著降低了约50%。与现有方法的数值比较表明,该方法在稳定性保证和传输次数方面具有更好的性能。
{"title":"Output Feedback Stabilization of Doubly Fed Induction Generator Wind Turbines under Event-Triggered Implementations","authors":"Mahmoud Abdelrahim, Dhafer Almakhles","doi":"10.3390/jsan12050064","DOIUrl":"https://doi.org/10.3390/jsan12050064","url":null,"abstract":"The robust stabilization of doubly fed induction generators in wind turbines against external disturbances is considered in this study. It is assumed that the angular speeds of wind turbines can only be measured and sent to the controller in a discrete-time fashion over a network. To generate the sampling times, three different triggering schemes were developed: time-triggering, static event-triggering, and dynamic event-triggering mechanisms; moreover, performance comparisons were conducted between such approaches. The design methodology is based on emulation, such that the plant is first stabilized in continuous-time where a robust feedback law is constructed based on the linear quadratic Gaussian regulator (LQG) approach. Then, the impact of the network is taken into account, and an event-triggering mechanism is built so that closed-loop stability is maintained and the Zeno phenomenon is avoided by using temporal regularization. The necessary stability constraints are framed as a linear matrix inequality, and the whole system is modeled as a hybrid dynamical system. A numerical simulation is used to demonstrate the effectiveness of the control strategy. The results show that the event-triggering mechanisms achieve a significant reduction of around 50% in transmissions compared to periodic sampling. Moreover, numerical comparisons with existing approaches show that the proposed approach provides better performance in terms of the stability guarantee and number of transmissions.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135827675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote Binaural System (RBS) for Noise Acoustic Monitoring 用于噪声监测的远程双耳系统(RBS)
IF 3.5 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-14 DOI: 10.3390/jsan12040063
Oscar Acosta, L. Hermida, Marcelo Herrera, Carlos Montenegro, E. Gaona, Mateo Bejarano, K. Gordillo, I. Pavón, C. Asensio
The recent emergence of advanced information technologies such as cloud computing, artificial intelligence, and data science has improved and optimized various processes in acoustics with potential real-world applications. Noise monitoring tasks on large terrains can be captured using an array of sound level meters. However, current monitoring systems only rely on the knowledge of a singular measured value related to the acoustic energy of the captured signal, leaving aside spatial aspects that complement the perception of noise by the human being. This project presents a system that performs binaural measurements according to subjective human perception. The acoustic characterization in an anechoic chamber is presented, as well as acoustic indicators obtained in the field initially for a short period of time. The main contribution of this work is the construction of a binaural prototype that resembles the human head and which transmits and processes acoustical data on the cloud. The above allows noise level monitoring via binaural hearing rather than a singular capturing device. Likewise, it can be highlighted that the system allows for obtaining spatial acoustic indicators based on the interaural cross-correlation function (IACF), as well as detecting the location of the source on the azimuthal plane.
最近出现的云计算、人工智能和数据科学等先进信息技术改进和优化了声学中的各种过程,具有潜在的现实应用。大型地形上的噪声监测任务可以使用一系列声级计进行捕捉。然而,当前的监测系统只依赖于与捕获信号的声能相关的奇异测量值的知识,而忽略了补充人类对噪声感知的空间方面。该项目提出了一个根据人类主观感知进行双耳测量的系统。介绍了消声室内的声学特性,以及最初在短时间内在现场获得的声学指标。这项工作的主要贡献是构建了一个类似人类头部的双耳原型,该原型在云上传输和处理声学数据。以上允许通过双耳听力而不是单一捕获设备来监测噪声水平。同样,可以强调的是,该系统允许基于耳间互相关函数(IACF)获得空间声学指示符,以及检测源在方位平面上的位置。
{"title":"Remote Binaural System (RBS) for Noise Acoustic Monitoring","authors":"Oscar Acosta, L. Hermida, Marcelo Herrera, Carlos Montenegro, E. Gaona, Mateo Bejarano, K. Gordillo, I. Pavón, C. Asensio","doi":"10.3390/jsan12040063","DOIUrl":"https://doi.org/10.3390/jsan12040063","url":null,"abstract":"The recent emergence of advanced information technologies such as cloud computing, artificial intelligence, and data science has improved and optimized various processes in acoustics with potential real-world applications. Noise monitoring tasks on large terrains can be captured using an array of sound level meters. However, current monitoring systems only rely on the knowledge of a singular measured value related to the acoustic energy of the captured signal, leaving aside spatial aspects that complement the perception of noise by the human being. This project presents a system that performs binaural measurements according to subjective human perception. The acoustic characterization in an anechoic chamber is presented, as well as acoustic indicators obtained in the field initially for a short period of time. The main contribution of this work is the construction of a binaural prototype that resembles the human head and which transmits and processes acoustical data on the cloud. The above allows noise level monitoring via binaural hearing rather than a singular capturing device. Likewise, it can be highlighted that the system allows for obtaining spatial acoustic indicators based on the interaural cross-correlation function (IACF), as well as detecting the location of the source on the azimuthal plane.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47940198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extraction of Hidden Authentication Factors from Possessive Information 从占有信息中提取隐藏的认证因素
IF 3.5 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-11 DOI: 10.3390/jsan12040062
Nilobon Nanglae, B. M. Yakubu, P. Bhattarakosol
Smartphones have emerged as a ubiquitous personal gadget that serve as a repository for individuals’ significant personal data. Consequently, both physiological and behavioral traits, which are classified as biometric technologies, are used in authentication systems in order to safeguard data saved on smartphones from unauthorized access. Numerous authentication techniques have been developed; however, several authentication variables exhibit instability in the face of external influences or physical impairments. The potential failure of the authentication system might be attributed to several unpredictable circumstances. This research suggests that the use of distinctive and consistent elements over an individual’s lifespan may be employed to develop an authentication classification model. This model would be based on prevalent personal behavioral biometrics and could be readily implemented in security authentication systems. The biological biometrics acquired from an individual’s typing abilities during data entry include their name, surname, email, and phone number. Therefore, it is possible to establish and use a biometrics-based security system that can be sustained and employed during an individual’s lifetime without the explicit dependance on the functionality of the smartphone devices. The experimental findings demonstrate that the use of a mobile touchscreen as the foundation for the proposed verification mechanism has promise as a high-precision authentication solution.
智能手机已经成为一种无处不在的个人小工具,可以作为个人重要个人数据的存储库。因此,被归类为生物识别技术的生理和行为特征都被用于身份验证系统,以保护保存在智能手机上的数据免受未经授权的访问。已经开发了许多身份验证技术;然而,一些身份验证变量在面对外部影响或身体损伤时表现出不稳定性。身份验证系统的潜在故障可能归因于几种不可预测的情况。这项研究表明,在个人的一生中使用独特和一致的元素可以用来开发身份验证分类模型。该模型将基于流行的个人行为生物特征,并且可以很容易地在安全认证系统中实现。在数据输入过程中,从个人的打字能力中获得的生物生物特征包括他们的姓名、姓氏、电子邮件和电话号码。因此,可以建立和使用一种基于生物特征的安全系统,该系统可以在个人一生中持续使用,而无需明确依赖智能手机设备的功能。实验结果表明,使用移动触摸屏作为所提出的验证机制的基础,有望成为一种高精度的身份验证解决方案。
{"title":"Extraction of Hidden Authentication Factors from Possessive Information","authors":"Nilobon Nanglae, B. M. Yakubu, P. Bhattarakosol","doi":"10.3390/jsan12040062","DOIUrl":"https://doi.org/10.3390/jsan12040062","url":null,"abstract":"Smartphones have emerged as a ubiquitous personal gadget that serve as a repository for individuals’ significant personal data. Consequently, both physiological and behavioral traits, which are classified as biometric technologies, are used in authentication systems in order to safeguard data saved on smartphones from unauthorized access. Numerous authentication techniques have been developed; however, several authentication variables exhibit instability in the face of external influences or physical impairments. The potential failure of the authentication system might be attributed to several unpredictable circumstances. This research suggests that the use of distinctive and consistent elements over an individual’s lifespan may be employed to develop an authentication classification model. This model would be based on prevalent personal behavioral biometrics and could be readily implemented in security authentication systems. The biological biometrics acquired from an individual’s typing abilities during data entry include their name, surname, email, and phone number. Therefore, it is possible to establish and use a biometrics-based security system that can be sustained and employed during an individual’s lifetime without the explicit dependance on the functionality of the smartphone devices. The experimental findings demonstrate that the use of a mobile touchscreen as the foundation for the proposed verification mechanism has promise as a high-precision authentication solution.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47708758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Investigation of the Effectiveness of Deepfake Models and Tools 深度造假模型和工具的有效性研究
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-04 DOI: 10.3390/jsan12040061
Md. Saddam Hossain Mukta, Jubaer Ahmad, Mohaimenul Azam Khan Raiaan, Salekul Islam, Sami Azam, Mohammed Eunus Ali, Mirjam Jonkman
With the development of computer vision and deep learning technologies, rapidly expanding approaches have been introduced that allow anyone to create videos and pictures that are both phony and incredibly lifelike. The term deepfake methodology is used to describe such technologies. Face alteration can be performed both in videos and pictures with extreme realism using deepfake innovation. Deepfake recordings, the majority of them targeting politicians or celebrity personalities, have been widely disseminated online. On the other hand, different strategies have been outlined in the research to combat the issues brought up by deepfake. In this paper, we carry out a review by analyzing and comparing (1) the notable research contributions in the field of deepfake models and (2) widely used deepfake tools. We have also built two separate taxonomies for deepfake models and tools. These models and tools are also compared in terms of underlying algorithms, datasets they have used and their accuracy. A number of challenges and open issues have also been identified.
随着计算机视觉和深度学习技术的发展,迅速扩展的方法已经被引入,允许任何人创建既虚假又令人难以置信的逼真的视频和图片。术语deepfake方法论用于描述此类技术。使用deepfake创新技术,可以在视频和图片中进行面部改变,具有极端的真实感。深度造假录音已在网上广泛传播,其中大多数是针对政客或名人的。另一方面,研究中概述了不同的策略来应对deepfake带来的问题。在本文中,我们通过分析和比较(1)在深度伪造模型领域的显著研究贡献和(2)广泛使用的深度伪造工具来进行综述。我们还为deepfake模型和工具构建了两个独立的分类法。这些模型和工具还会在基础算法、使用的数据集及其准确性方面进行比较。还确定了一些挑战和悬而未决的问题。
{"title":"An Investigation of the Effectiveness of Deepfake Models and Tools","authors":"Md. Saddam Hossain Mukta, Jubaer Ahmad, Mohaimenul Azam Khan Raiaan, Salekul Islam, Sami Azam, Mohammed Eunus Ali, Mirjam Jonkman","doi":"10.3390/jsan12040061","DOIUrl":"https://doi.org/10.3390/jsan12040061","url":null,"abstract":"With the development of computer vision and deep learning technologies, rapidly expanding approaches have been introduced that allow anyone to create videos and pictures that are both phony and incredibly lifelike. The term deepfake methodology is used to describe such technologies. Face alteration can be performed both in videos and pictures with extreme realism using deepfake innovation. Deepfake recordings, the majority of them targeting politicians or celebrity personalities, have been widely disseminated online. On the other hand, different strategies have been outlined in the research to combat the issues brought up by deepfake. In this paper, we carry out a review by analyzing and comparing (1) the notable research contributions in the field of deepfake models and (2) widely used deepfake tools. We have also built two separate taxonomies for deepfake models and tools. These models and tools are also compared in terms of underlying algorithms, datasets they have used and their accuracy. A number of challenges and open issues have also been identified.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136119404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Safe Data-Driven Lane Change Decision Using Machine Learning in Vehicular Networks 车辆网络中使用机器学习的安全数据驱动变道决策
IF 3.5 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-01 DOI: 10.3390/jsan12040059
R. Naja
This research proposes a unique platform for lane change assistance for generating data-driven lane change (LC) decisions in vehicular networks. The goal is to reduce the frequency of emergency braking, the rate of vehicle collisions, and the amount of time spent in risky lanes. In order to analyze and mine the massive amounts of data, our platform uses effective Machine Learning (ML) techniques to forecast collisions and advise the driver to safely change lanes. From the unprocessed large data generated by the car sensors, kinematic information is retrieved, cleaned, and evaluated. Machine learning algorithms analyze this kinematic data and provide an action: either stay in lane or change lanes to the left or right. The model is trained using the ML techniques K-Nearest Neighbor, Artificial Neural Network, and Deep Reinforcement Learning based on a set of training data and focus on predicting driver actions. The proposed solution is validated via extensive simulations using a microscopic car-following mobility model, coupled with an accurate mathematical modelling. Performance analysis show that KNN yields up to best performance parameters. Finally, we draw conclusions for road safety stakeholders to adopt the safer technique to lane change maneuver.
这项研究提出了一个独特的车道变更辅助平台,用于在车辆网络中生成数据驱动的车道变更(LC)决策。目标是减少紧急制动的频率、车辆碰撞率以及在危险车道上花费的时间。为了分析和挖掘大量数据,我们的平台使用有效的机器学习(ML)技术来预测碰撞,并建议驾驶员安全变道。从汽车传感器生成的未处理的大数据中,检索、清理和评估运动学信息。机器学习算法分析这些运动学数据,并提供一个动作:要么保持车道,要么向左或向右变道。该模型基于一组训练数据,使用ML技术K-最近邻、人工神经网络和深度强化学习进行训练,重点是预测驾驶员的行为。所提出的解决方案通过使用微观跟车移动模型的广泛模拟以及精确的数学建模进行了验证。性能分析表明,KNN可以获得最佳性能参数。最后,我们得出结论,供道路安全利益相关者采用更安全的变道策略。
{"title":"Safe Data-Driven Lane Change Decision Using Machine Learning in Vehicular Networks","authors":"R. Naja","doi":"10.3390/jsan12040059","DOIUrl":"https://doi.org/10.3390/jsan12040059","url":null,"abstract":"This research proposes a unique platform for lane change assistance for generating data-driven lane change (LC) decisions in vehicular networks. The goal is to reduce the frequency of emergency braking, the rate of vehicle collisions, and the amount of time spent in risky lanes. In order to analyze and mine the massive amounts of data, our platform uses effective Machine Learning (ML) techniques to forecast collisions and advise the driver to safely change lanes. From the unprocessed large data generated by the car sensors, kinematic information is retrieved, cleaned, and evaluated. Machine learning algorithms analyze this kinematic data and provide an action: either stay in lane or change lanes to the left or right. The model is trained using the ML techniques K-Nearest Neighbor, Artificial Neural Network, and Deep Reinforcement Learning based on a set of training data and focus on predicting driver actions. The proposed solution is validated via extensive simulations using a microscopic car-following mobility model, coupled with an accurate mathematical modelling. Performance analysis show that KNN yields up to best performance parameters. Finally, we draw conclusions for road safety stakeholders to adopt the safer technique to lane change maneuver.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43627196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Assessment and Mitigation of Timing Covert Channels over the IEEE 802.15.4 IEEE 802.15.4上定时隐蔽信道的性能评估和缓解
IF 3.5 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-01 DOI: 10.3390/jsan12040060
Ricardo Severino, João Rodrigues, João Alves, Luis Lino Ferreira
The fast development and adoption of IoT technologies has been enabling their application into increasingly sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount. While the number of deployed IoT devices increases annually, they still present severe cyber-security vulnerabilities, becoming potential targets and entry points for further attacks. As these nodes become compromised, attackers aim to set up stealthy communication behaviours, to exfiltrate data or to orchestrate nodes in a cloaked fashion, and network timing covert channels are increasingly being used with such malicious intents. The IEEE 802.15.4 is one of the most pervasive protocols in IoT and a fundamental part of many communication infrastructures. Despite this fact, the possibility of setting up such covert communication techniques on this medium has received very little attention. We aim to analyse the performance and feasibility of such covert-channel implementations upon the IEEE 802.15.4 protocol, particularly upon the DSME behaviour, one of the most promising for large-scale time critical communications. This enables us to better understand the involved risk of such threats and help support the development of active cyber-security mechanisms to mitigate these threats, which, for now, we provide in the form of practical network setup recommendations.
物联网技术的快速发展和采用使其能够应用于日益敏感的领域,例如医疗和工业物联网,其中安全和网络安全至关重要。虽然部署的物联网设备数量每年都在增加,但它们仍然存在严重的网络安全漏洞,成为进一步攻击的潜在目标和入口点。当这些节点受到损害时,攻击者的目标是建立隐蔽的通信行为,以隐蔽的方式泄露数据或编排节点,并且网络定时隐蔽通道越来越多地被用于此类恶意意图。IEEE 802.15.4是物联网中最普遍的协议之一,也是许多通信基础设施的基本组成部分。尽管如此,在这种媒介上建立这种秘密通信技术的可能性却很少受到关注。我们的目标是在IEEE 802.15.4协议上分析这种转换信道实现的性能和可行性,特别是在DSME行为上,这是大规模时间关键通信中最有前途的行为之一。这使我们能够更好地了解此类威胁所涉及的风险,并帮助支持主动网络安全机制的发展,以减轻这些威胁,目前,我们以实用的网络设置建议的形式提供这些建议。
{"title":"Performance Assessment and Mitigation of Timing Covert Channels over the IEEE 802.15.4","authors":"Ricardo Severino, João Rodrigues, João Alves, Luis Lino Ferreira","doi":"10.3390/jsan12040060","DOIUrl":"https://doi.org/10.3390/jsan12040060","url":null,"abstract":"The fast development and adoption of IoT technologies has been enabling their application into increasingly sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount. While the number of deployed IoT devices increases annually, they still present severe cyber-security vulnerabilities, becoming potential targets and entry points for further attacks. As these nodes become compromised, attackers aim to set up stealthy communication behaviours, to exfiltrate data or to orchestrate nodes in a cloaked fashion, and network timing covert channels are increasingly being used with such malicious intents. The IEEE 802.15.4 is one of the most pervasive protocols in IoT and a fundamental part of many communication infrastructures. Despite this fact, the possibility of setting up such covert communication techniques on this medium has received very little attention. We aim to analyse the performance and feasibility of such covert-channel implementations upon the IEEE 802.15.4 protocol, particularly upon the DSME behaviour, one of the most promising for large-scale time critical communications. This enables us to better understand the involved risk of such threats and help support the development of active cyber-security mechanisms to mitigate these threats, which, for now, we provide in the form of practical network setup recommendations.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":"70 ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41271876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Echo State Learning for User Trajectory Prediction to Minimize Online Game Breaks in 6G Terahertz Networks 回声状态学习用于6G太赫兹网络中用户轨迹预测以减少在线游戏中断
IF 3.5 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-25 DOI: 10.3390/jsan12040058
Benedetta Picano, Leonardo Scommegna, E. Vicario, R. Fantacci
Mobile online gaming is constantly growing in popularity and is expected to be one of the most important applications of upcoming sixth generation networks. Nevertheless, it remains challenging for game providers to support it, mainly due to its intrinsic and ever-stricter need for service continuity in the presence of user mobility. In this regard, this paper proposes a machine learning strategy to forecast user channel conditions, aiming at guaranteeing a seamless service whenever a user is involved in a handover, i.e., moving from the coverage area of one base station towards another. In particular, the proposed channel condition prediction approach involves the exploitation of an echo state network, an efficient class of recurrent neural network, that is empowered with a genetic algorithm to perform parameter optimization. The echo state network is applied to improve user decisions regarding the selection of the serving base station, avoiding game breaks as much as possible to lower game lag time. The validity of the proposed framework is confirmed by simulations in comparison to the long short-term memory approach and another alternative method, aimed at thoroughly testing the accuracy of the learning module in forecasting user trajectories and in reducing game breaks or lag time, with a focus on a sixth generation network application scenario.
移动在线游戏越来越受欢迎,有望成为即将到来的第六代网络最重要的应用之一。然而,对于游戏供应商来说,支持它仍然是一个挑战,主要是因为它在用户移动性存在的情况下对服务连续性的内在和更严格的需求。为此,本文提出了一种预测用户信道状况的机器学习策略,旨在保证用户在切换时,即从一个基站的覆盖区域移动到另一个基站的覆盖区域时,能够实现无缝服务。特别地,所提出的信道状态预测方法涉及利用回波状态网络,这是一种有效的递归神经网络,它被赋予了遗传算法来执行参数优化。采用回声状态网络改进用户对服务基站选择的决策,尽可能避免游戏中断,降低游戏延迟时间。与长短期记忆方法和另一种替代方法相比,通过模拟证实了所提出框架的有效性,该方法旨在彻底测试学习模块在预测用户轨迹和减少游戏中断或延迟时间方面的准确性,重点是第六代网络应用场景。
{"title":"Echo State Learning for User Trajectory Prediction to Minimize Online Game Breaks in 6G Terahertz Networks","authors":"Benedetta Picano, Leonardo Scommegna, E. Vicario, R. Fantacci","doi":"10.3390/jsan12040058","DOIUrl":"https://doi.org/10.3390/jsan12040058","url":null,"abstract":"Mobile online gaming is constantly growing in popularity and is expected to be one of the most important applications of upcoming sixth generation networks. Nevertheless, it remains challenging for game providers to support it, mainly due to its intrinsic and ever-stricter need for service continuity in the presence of user mobility. In this regard, this paper proposes a machine learning strategy to forecast user channel conditions, aiming at guaranteeing a seamless service whenever a user is involved in a handover, i.e., moving from the coverage area of one base station towards another. In particular, the proposed channel condition prediction approach involves the exploitation of an echo state network, an efficient class of recurrent neural network, that is empowered with a genetic algorithm to perform parameter optimization. The echo state network is applied to improve user decisions regarding the selection of the serving base station, avoiding game breaks as much as possible to lower game lag time. The validity of the proposed framework is confirmed by simulations in comparison to the long short-term memory approach and another alternative method, aimed at thoroughly testing the accuracy of the learning module in forecasting user trajectories and in reducing game breaks or lag time, with a focus on a sixth generation network application scenario.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46890697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Ledger as a Service: A Web 3.0-Oriented Architecture 分布式账本即服务:面向Web 3.0的体系结构
IF 3.5 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-20 DOI: 10.3390/jsan12040057
F. Chiti, Giorgio Gandini
This paper proposes a general and interoperable Web of Things (WoT)-oriented architecture to support a distributed storage application. In particular, the focus is on a distributed ledger service dedicated to machine-to-machine (M2M) transactions occurring in an intelligent ecosystem. For this purpose, the basic functional modules have been characterized and integrated into a comprehensive framework relying on an IOTA approach. Furthermore, a general protocol that is built upon an underlying publish-and-subscribe framework is proposed to support all the application phases. The proposed approach has been validated by a simulation campaign targeting the achievable latency and throughput and, further, by a qualitative analysis of high-level metrics, both pointing out several advantages in terms of interoperability, scalability, and mobility support, together with addressing some constraints affecting service availability and security.
本文提出了一种通用的、可互操作的面向物联网(WoT)的体系结构,以支持分布式存储应用。特别是,重点是分布式账本服务,专门用于智能生态系统中发生的机器对机器(M2M)交易。为此,基本功能模块已经被描述并集成到一个依赖于IOTA方法的综合框架中。此外,提出了建立在底层发布-订阅框架之上的通用协议,以支持所有应用程序阶段。所提出的方法已经通过针对可实现的延迟和吞吐量的模拟活动进行了验证,并且进一步通过对高级指标的定性分析进行了验证,两者都指出了互操作性、可伸缩性和移动性支持方面的几个优势,同时解决了影响服务可用性和安全性的一些约束。
{"title":"Distributed Ledger as a Service: A Web 3.0-Oriented Architecture","authors":"F. Chiti, Giorgio Gandini","doi":"10.3390/jsan12040057","DOIUrl":"https://doi.org/10.3390/jsan12040057","url":null,"abstract":"This paper proposes a general and interoperable Web of Things (WoT)-oriented architecture to support a distributed storage application. In particular, the focus is on a distributed ledger service dedicated to machine-to-machine (M2M) transactions occurring in an intelligent ecosystem. For this purpose, the basic functional modules have been characterized and integrated into a comprehensive framework relying on an IOTA approach. Furthermore, a general protocol that is built upon an underlying publish-and-subscribe framework is proposed to support all the application phases. The proposed approach has been validated by a simulation campaign targeting the achievable latency and throughput and, further, by a qualitative analysis of high-level metrics, both pointing out several advantages in terms of interoperability, scalability, and mobility support, together with addressing some constraints affecting service availability and security.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48923243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
STARC: Decentralized Coordination Primitive on Low-Power IoT Devices for Autonomous Intersection Management STARC:用于自主交叉管理的低功耗物联网设备的分散协调原语
IF 3.5 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-11 DOI: 10.3390/jsan12040056
Patrick Rathje, Valentin Poirot, O. Landsiedel
Wireless communication is an essential element within Intelligent Transportation Systems and motivates new approaches to intersection management, allowing safer and more efficient road usage. With lives at stake, wireless protocols should be readily available and guarantee safe coordination for all involved traffic participants, even in the presence of radio failures. This work introduces STARC, a coordination primitive for safe, decentralized resource coordination. Using STARC, traffic participants can safely coordinate at intersections despite unreliable radio environments and without a central entity or infrastructure. Unlike other methods that require costly and energy-consuming platforms, STARC utilizes affordable and efficient Internet of Things devices that connect cars, bicycles, electric scooters, pedestrians, and cyclists. For communication, STARC utilizes low-power IEEE 802.15.4 radios and Synchronous Transmissions for multi-hop communication. In addition, the protocol provides distributed transaction, election, and handover mechanisms for decentralized, thus cost-efficient, deployments. While STARC’s coordination remains resource-agnostic, this work presents and evaluates STARC in a roadside scenario. Our simulations have shown that using STARC at intersections leads to safer and more efficient vehicle coordination. We found that average waiting times can be reduced by up to 50% compared to using a fixed traffic light schedule in situations with fewer than 1000 vehicles per hour. Additionally, we design platooning on top of STARC, improving scalability and outperforming static traffic lights even at traffic loads exceeding 1000 vehicles per hour.
无线通信是智能交通系统的重要组成部分,它激发了十字路口管理的新方法,使道路使用更安全、更有效。在生命攸关的情况下,无线协议应该随时可用,并确保所有相关交通参与者的安全协调,即使存在无线电故障。这项工作引入了STARC,一种用于安全、分散的资源协调的协调原语。使用STARC,交通参与者可以在不可靠的无线电环境下,在没有中央实体或基础设施的情况下安全地在十字路口进行协调。与其他需要昂贵和耗能平台的方法不同,STARC利用价格合理且高效的物联网设备连接汽车、自行车、电动滑板车、行人和骑自行车的人。在通信方面,STARC利用低功耗IEEE 802.15.4无线电和同步传输进行多跳通信。此外,该协议为分散的部署提供分布式事务、选举和移交机制,从而具有成本效益。虽然STARC的协调仍然是资源不可知的,但这项工作提出并评估了路边情景中的STARC。我们的模拟表明,在十字路口使用STARC可以使车辆更安全、更高效地协调。我们发现,在每小时车辆少于1000辆的情况下,与使用固定交通灯计划相比,平均等待时间可减少多达50%。此外,我们在STARC之上设计了队列,提高了可扩展性,即使在交通负荷超过每小时1000辆的情况下,也优于静态交通灯。
{"title":"STARC: Decentralized Coordination Primitive on Low-Power IoT Devices for Autonomous Intersection Management","authors":"Patrick Rathje, Valentin Poirot, O. Landsiedel","doi":"10.3390/jsan12040056","DOIUrl":"https://doi.org/10.3390/jsan12040056","url":null,"abstract":"Wireless communication is an essential element within Intelligent Transportation Systems and motivates new approaches to intersection management, allowing safer and more efficient road usage. With lives at stake, wireless protocols should be readily available and guarantee safe coordination for all involved traffic participants, even in the presence of radio failures. This work introduces STARC, a coordination primitive for safe, decentralized resource coordination. Using STARC, traffic participants can safely coordinate at intersections despite unreliable radio environments and without a central entity or infrastructure. Unlike other methods that require costly and energy-consuming platforms, STARC utilizes affordable and efficient Internet of Things devices that connect cars, bicycles, electric scooters, pedestrians, and cyclists. For communication, STARC utilizes low-power IEEE 802.15.4 radios and Synchronous Transmissions for multi-hop communication. In addition, the protocol provides distributed transaction, election, and handover mechanisms for decentralized, thus cost-efficient, deployments. While STARC’s coordination remains resource-agnostic, this work presents and evaluates STARC in a roadside scenario. Our simulations have shown that using STARC at intersections leads to safer and more efficient vehicle coordination. We found that average waiting times can be reduced by up to 50% compared to using a fixed traffic light schedule in situations with fewer than 1000 vehicles per hour. Additionally, we design platooning on top of STARC, improving scalability and outperforming static traffic lights even at traffic loads exceeding 1000 vehicles per hour.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.5,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48049986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Sensor and Actuator Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1