Pub Date : 2023-01-01DOI: 10.1504/ijsnet.2023.128505
N.D. Patel, B.M. Mehtre, Rajeev Wankar
Cybercrimes are rising rapidly with the increasing use of the internet of things (IoT)-based gadgets at home. For instance, the Mirai-BotNet infected and compromised many IoT-based devices and routers, creating a zombie network of robots that can be controlled remotely. There is a need for a cost-effective, secure router for a smart home. This paper investigates and proposes a Snort-based secure edge router for smart home (SERfSH), which is resilient to many cyberattacks. SERfSH automatically generates Snort content rules by combining the extracted string, location information, header information, and sequential pattern. The experimental setup of SERfSH consists of a Raspberry Pi 4 model, an ESP32 microcontroller, six IoT devices, and a malicious actor machine. The proposed SERfSH is tested for 15 attacks, and the results show that 14 attacks were detected and 12 attacks were mitigated.
{"title":"A Snort-based secure edge router for smart home","authors":"N.D. Patel, B.M. Mehtre, Rajeev Wankar","doi":"10.1504/ijsnet.2023.128505","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.128505","url":null,"abstract":"Cybercrimes are rising rapidly with the increasing use of the internet of things (IoT)-based gadgets at home. For instance, the Mirai-BotNet infected and compromised many IoT-based devices and routers, creating a zombie network of robots that can be controlled remotely. There is a need for a cost-effective, secure router for a smart home. This paper investigates and proposes a Snort-based secure edge router for smart home (SERfSH), which is resilient to many cyberattacks. SERfSH automatically generates Snort content rules by combining the extracted string, location information, header information, and sequential pattern. The experimental setup of SERfSH consists of a Raspberry Pi 4 model, an ESP32 microcontroller, six IoT devices, and a malicious actor machine. The proposed SERfSH is tested for 15 attacks, and the results show that 14 attacks were detected and 12 attacks were mitigated.","PeriodicalId":49177,"journal":{"name":"International Journal of Sensor Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135127098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijsnet.2023.133249
Mohd Shoaib, Mohammad Sarosh Umar
{"title":"Phishing detection model using feline finch optimisation-based LSTM classifier","authors":"Mohd Shoaib, Mohammad Sarosh Umar","doi":"10.1504/ijsnet.2023.133249","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.133249","url":null,"abstract":"","PeriodicalId":49177,"journal":{"name":"International Journal of Sensor Networks","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134887827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijsnet.2023.129632
Ngoc Son Duong, Thanh Phuc Nguyen, Quoc Tuan Nguyen, Thai Mai Dinh Thi
Indoor positioning has grasped great attention in recent years. Many of those technologies are related to the problem of determining the position of an object in space, such as the robot, people, and so on. In this paper, we combine a range-free method, i.e., fingerprinting, and a range-based method, i.e., multi-lateration, to propose a novel indoor positioning system using the received signal strength indicator (RSSI). First, we apply multi-layer perceptron neural network (MLP-NN) on a time series of RSS readings to coarsely estimate the target location. From the knowledge of the coarse location, we select reliable beacons and apply least square-based multi-lateration to their estimated distance to finely estimate the target position. We also proposed a novel weighted least square method based on uncertainty propagation to improve localisation accuracy. Experiments have shown that our proposed system, which is implemented on Raspberry Pi (RPi), is highly precise and deployable.
{"title":"Improving indoor positioning system using weighted linear least square and neural network","authors":"Ngoc Son Duong, Thanh Phuc Nguyen, Quoc Tuan Nguyen, Thai Mai Dinh Thi","doi":"10.1504/ijsnet.2023.129632","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.129632","url":null,"abstract":"Indoor positioning has grasped great attention in recent years. Many of those technologies are related to the problem of determining the position of an object in space, such as the robot, people, and so on. In this paper, we combine a range-free method, i.e., fingerprinting, and a range-based method, i.e., multi-lateration, to propose a novel indoor positioning system using the received signal strength indicator (RSSI). First, we apply multi-layer perceptron neural network (MLP-NN) on a time series of RSS readings to coarsely estimate the target location. From the knowledge of the coarse location, we select reliable beacons and apply least square-based multi-lateration to their estimated distance to finely estimate the target position. We also proposed a novel weighted least square method based on uncertainty propagation to improve localisation accuracy. Experiments have shown that our proposed system, which is implemented on Raspberry Pi (RPi), is highly precise and deployable.","PeriodicalId":49177,"journal":{"name":"International Journal of Sensor Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135584287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijsnet.2023.10058933
Jing Zhang, Gary Sun
{"title":"Cloud-Enabled Internet of Things for Environmental Data Collection: Prototype and Evaluation","authors":"Jing Zhang, Gary Sun","doi":"10.1504/ijsnet.2023.10058933","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.10058933","url":null,"abstract":"","PeriodicalId":49177,"journal":{"name":"International Journal of Sensor Networks","volume":"129 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76141742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijsnet.2023.10059503
Sunita Dahiya, Vijay Nandal
{"title":"A Comprehensive review of energy efficient wireless communication and routing protocols in smart agriculture","authors":"Sunita Dahiya, Vijay Nandal","doi":"10.1504/ijsnet.2023.10059503","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.10059503","url":null,"abstract":"","PeriodicalId":49177,"journal":{"name":"International Journal of Sensor Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijsnet.2023.133814
Zhiyong Tao, Lu Chen, Xijun Guo, Jie Li, Jing Guo, Ying Liu
With the popularity of commercial Wi-Fi devices, channel state information (CSI) based human activity recognition shows great potential and has made great progress. However, previous researchers always tried to remove the noise signals as much as possible without considering the distribution characteristics. Different from the previous methods, we observed the phenomenon that the signal distribution is different when the action exists and does not exist, so we propose GFBR. GFBR takes noise distribution as the entry point, proposes a novel human activity modelling method, and designs a dual-threshold segmentation algorithm based on the modelling method. Then, we extract features from amplitude and linearly corrected phase to describe different activities. Finally, a support vector machine (SVM) is used to recognise five different activities. The average recognition accuracy of GFBR in the three different environments is 94.8%, 96.2%, and 95.7%, respectively, which proves its good robustness.
{"title":"Gaussian fitting based human activity recognition using Wi-Fi signals","authors":"Zhiyong Tao, Lu Chen, Xijun Guo, Jie Li, Jing Guo, Ying Liu","doi":"10.1504/ijsnet.2023.133814","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.133814","url":null,"abstract":"With the popularity of commercial Wi-Fi devices, channel state information (CSI) based human activity recognition shows great potential and has made great progress. However, previous researchers always tried to remove the noise signals as much as possible without considering the distribution characteristics. Different from the previous methods, we observed the phenomenon that the signal distribution is different when the action exists and does not exist, so we propose GFBR. GFBR takes noise distribution as the entry point, proposes a novel human activity modelling method, and designs a dual-threshold segmentation algorithm based on the modelling method. Then, we extract features from amplitude and linearly corrected phase to describe different activities. Finally, a support vector machine (SVM) is used to recognise five different activities. The average recognition accuracy of GFBR in the three different environments is 94.8%, 96.2%, and 95.7%, respectively, which proves its good robustness.","PeriodicalId":49177,"journal":{"name":"International Journal of Sensor Networks","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135952763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijsnet.2023.133251
Lei Shi, Fei Zhao, Shuangliang Zhao, Zengwei Lyu, Yang Zhang
{"title":"An economic cost-saving strategy based on a hybrid 4G-5G offload architecture in vehicular edge computing","authors":"Lei Shi, Fei Zhao, Shuangliang Zhao, Zengwei Lyu, Yang Zhang","doi":"10.1504/ijsnet.2023.133251","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.133251","url":null,"abstract":"","PeriodicalId":49177,"journal":{"name":"International Journal of Sensor Networks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134887818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijsnet.2023.10059897
Zhongxue Yang, Hao Zheng, Bao YIqin
{"title":"A Design Strategy for Real-Time IoT Systems Based on Petri Net with Multi-connection and Multi-task","authors":"Zhongxue Yang, Hao Zheng, Bao YIqin","doi":"10.1504/ijsnet.2023.10059897","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.10059897","url":null,"abstract":"","PeriodicalId":49177,"journal":{"name":"International Journal of Sensor Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135002954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijsnet.2023.134288
Wenming Wang, Mideth Abisado
{"title":"Children's expression recognition based on a multiscale mixed attention mechanism","authors":"Wenming Wang, Mideth Abisado","doi":"10.1504/ijsnet.2023.134288","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.134288","url":null,"abstract":"","PeriodicalId":49177,"journal":{"name":"International Journal of Sensor Networks","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135009116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijsnet.2023.10059164
Geetanjali Rathee, Aparna Singh
{"title":"SMAP: Secure Mutual Authentication Protocol for Internet of Medical Things Using Physical Unclonable Functions","authors":"Geetanjali Rathee, Aparna Singh","doi":"10.1504/ijsnet.2023.10059164","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.10059164","url":null,"abstract":"","PeriodicalId":49177,"journal":{"name":"International Journal of Sensor Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135496705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}