Recent Advanced Control, Applications, and Optimization for WSN and the IoT

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (30 September 2022) | Viewed by 20356

Special Issue Editors


E-Mail Website
Guest Editor
Knowtion GmbH, Amalienbadstraße 41, Bau, 76227 Karlsruhe, Germany
Interests: computer vision; machine learning; deep learning; wireless sensor networks; IoT
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Telecommunication Engineering, University of Jaén, 23071 Jaén, Spain
Interests: consumption; data centers; scientific workflows; machine learning; soft computing; artificial intelligence; optical communications; cloud computing
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) is a popular field of research, with great prospects. Numerous researchers are continuously working on Internet of Things systems and trying to enhance its applicability. The backbone of IoT systems consists of sensors, embedded devices, networks of smart things, etc. Established communication among devices embedded with wireless sensor networks (WSN) and IoT networks improves our quality of life and represents a significant step forward toward automatic systems. WSN and IoT systems are already deployed in various areas, such as smart cities, smart homes, healthcare systems, etc.

The collaborative processes of sensors or embedded devices faces many complex challenges which will differ from environment to environment. The efficiency and effectiveness of systems depends on physical environment issues, services, system requirements, privacy, heterogeneity, etc. Based on each situation, the networks of sensors or embedded devices need to tackle many different challenges and issues which can be improved, such as quality of services, network dynamic adaptions, network protocols, etc.

The main aim of this Special Issue is to compile original and high-quality research works related to innovative solutions in the field of “Advanced Control, Applications, and Optimization for WSN and IoT”.

Dr. Mohit Mittal
Prof. Dr. Rocío Pérez de Prado
Prof. Dr. Valentina E. Balas
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Energy efficiency and sustainability in the WSN/IoT
  • AI and machine learning for WSN/IoT
  • IoT communication technologies
  • Security, privacy, and trust in the WSN/IoT
  • Wireless sensors, 5G Internet and mobile communication networks, and their impact on the IoT
  • IoT health monitoring and management systems
  • IoT in agriculture challenges with interoperability
  • Wireless communication systems
  • IoT in monitoring and improving manufacturing process applications

Published Papers (7 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

19 pages, 715 KiB  
Article
A Self-Adaptable Angular Based K-Medoid Clustering Scheme (SAACS) for Dynamic VANETs
by Akhilesh Bijalwan, Kamlesh Chandra Purohit, Preeti Malik and Mohit Mittal
Electronics 2022, 11(19), 3071; https://doi.org/10.3390/electronics11193071 - 26 Sep 2022
Cited by 3 | Viewed by 1142
Abstract
Prior study suggests that VANET has two types of communications: Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications. V2V is very important and ensures cooperative communications between vehicles and safety measures. It is also defined as Inter-Vehicle Communication (IVC).The communication is [...] Read more.
Prior study suggests that VANET has two types of communications: Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications. V2V is very important and ensures cooperative communications between vehicles and safety measures. It is also defined as Inter-Vehicle Communication (IVC).The communication is based on clustering the nodes to transmit the data from vehicle to vehicle. The overhead and stability are considered as main challenges that need to be addressed during vehicle intersections. In this paper, a novel self-adaptable Angular based k-medoid Clustering Scheme (SAACS) is proposed to form flexible clusters. The clusters are formed by estimating the road length and transmission ranges to minimize the network delay. And the Cluster Head (CH) is elected from a novel performance metric, ‘cosine-based node uncoupling frequency,’ that finds the best nodes irrespective of their current network statistics. The parametric analysis varies according to the number of vehicular nodes with the transmission range. The experimental results have proven that the proposed technique serves better in comparison to existing approaches such as Cluster Head Lifetime (CHL), Cluster Member Lifetime (CML), Cluster Number (CL), Cluster Overhead (CO), Packet Loss Ratio (PLR) and Average Packet Delay (APD). CHL is enhanced 40% as compare to Real-Time Vehicular Communication (RTVC), Efficient Cluster Head Selection (ECHS) whereas CML is 50% better than RTVC and ECHS. Packet loss ratio and overhead is 45% better in our proposed algorithm than RTVC and ECHS. It is observed from the results that the incorporation of cosine-based node uncoupling frequency has minimized the incongruity between vehicular nodes placed in dense and sparse zones of highways. Full article
Show Figures

Figure 1

26 pages, 2253 KiB  
Article
Statistical Channel Model and Systematic Random Linear Network Coding Based QoS Oriented and Energy Efficient UWSN Routing Protocol
by Pramod Halebeedu Basavaraju, Gururaj Harinahalli Lokesh, Gowtham Mohan, Noor Zaman Jhanjhi and Francesco Flammini
Electronics 2022, 11(16), 2590; https://doi.org/10.3390/electronics11162590 - 18 Aug 2022
Cited by 12 | Viewed by 1717
Abstract
Considering the significance of an energy efficient, delay tolerant and reliable communication protocol for underwater acoustic wireless sensor network (UWSN), this paper proposes a novel systematic random linear network coding (SRLNC) based transmission system examined over a robust statistical UWSN channel model. The [...] Read more.
Considering the significance of an energy efficient, delay tolerant and reliable communication protocol for underwater acoustic wireless sensor network (UWSN), this paper proposes a novel systematic random linear network coding (SRLNC) based transmission system examined over a robust statistical UWSN channel model. The derived statistical channel model deals with both the small-scale fading primarily caused by scattering and small wavelength changes and large-scale fading introduced due to node dislocation in the underwater acoustic medium. The proposed SRLNC transmission-based routing approach has been applied over the proposed underwater acoustic (statistical) channel model, and respective performance assessment has been conducted in terms of throughput, energy efficiency, delay and computational complexity by varying network condition parameters. The contributions such as low coefficient vector and Galois filed, low redundant message requirements, computationally efficient pre-coding scheme, iterative buffer flush and enhanced FEC based decoding make the SRLNC based routing protocol sufficiently robust to enable reliable, energy-efficient and delay resilient communication over UWSN. The proposed SRLNC based UWSN routing protocol and its efficacy over dynamic channel conditions affirm that it can be a potential solution for QoS-oriented mission critical underwater communication purposes. Full article
Show Figures

Figure 1

22 pages, 3602 KiB  
Article
Optimization Selection Method of Post-Disaster Wireless Location Detection Equipment Based on Semi-Definite Programming
by Aihua Hu, Zhongliang Deng, Jianke Li, Yao Zhang, Yuhui Gao and Di Zhao
Electronics 2022, 11(14), 2170; https://doi.org/10.3390/electronics11142170 - 11 Jul 2022
Cited by 1 | Viewed by 1107
Abstract
Signal propagation attenuation is greater in the post-disaster collapsed environment than that it is indoor or outdoor. The transmission environment is seriously affected by multi-path and non-line-of-sight transmission. When the signals penetrate the ruins and reach the receiver, their power may become very [...] Read more.
Signal propagation attenuation is greater in the post-disaster collapsed environment than that it is indoor or outdoor. The transmission environment is seriously affected by multi-path and non-line-of-sight transmission. When the signals penetrate the ruins and reach the receiver, their power may become very weak, which greatly affects the success rate of signal acquisition by the receiver. In the post-disaster environment, wireless signal propagation is severely blocked, which leads to serious signal attenuation and non-line-of-sight propagation, and signal acquisition distance and direction of detection equipment are limited. An optimization method of post-disaster wireless positioning detection equipment based on semi-deterministic programming was proposed, which allowed us to construct a location model of multiple detection equipment. The decision variable with variable nodes was generated. The reference node and penalty function were determined by fast rough positioning of the target. The node selection algorithm based on semi-definite programming was used to find the optimal node combination and complete the precise location. The performance of this algorithm was better than other known SDP optimization algorithms for reference nodes, and the correct selection accuracy of locating nodes was higher than 90%. Compared with the fixed main nodes, the positioning accuracy of the optimization algorithm was improved by 15.8%. Full article
Show Figures

Figure 1

14 pages, 3241 KiB  
Article
An IoT System for Real-Time Monitoring of DC Motor Overload
by Milutin Radonjić, Žarko Zečević and Božo Krstajić
Electronics 2022, 11(10), 1555; https://doi.org/10.3390/electronics11101555 - 12 May 2022
Cited by 5 | Viewed by 2893
Abstract
The excavators are heavy machines widely used in the civil engineering and surface mining industry. Recent studies show that 95% of contractors face the problem of finding skilled operators. Unskilled operators not only worsen productivity but also very often cause machine failures through [...] Read more.
The excavators are heavy machines widely used in the civil engineering and surface mining industry. Recent studies show that 95% of contractors face the problem of finding skilled operators. Unskilled operators not only worsen productivity but also very often cause machine failures through unprofessional handling. Motivated by these studies and guided by the mining company’s requirements, we present a prototype of an IoT system for monitoring DC motor overload on the EKG-15 excavator. The IoT system consists of a microprocessor device mounted inside the excavator and an external cloud platform that can be accessed via the Internet. The proposed solution detects and warns the operator when the DC motor overload occurs, thus reducing the probability of its damage. In addition, overload data is sent to the cloud platform for later research, analysis and processing. The main benefit of the proposed solution is that it can be applied to existing industry machinery, thus reducing the maintenance cost and increasing productivity. After several months of use of the proposed system in real working conditions, it has been shown that the overload occurrence and its duration time are approximately reduced by 60% and 80%, respectively. Full article
Show Figures

Figure 1

25 pages, 3677 KiB  
Article
SDSWSN—A Secure Approach for a Hop-Based Localization Algorithm Using a Digital Signature in the Wireless Sensor Network
by Deepak Prashar, Mamoon Rashid, Shams Tabrez Siddiqui, Dilip Kumar, Amandeep Nagpal, Ahmed Saeed AlGhamdi and Sultan S. Alshamrani
Electronics 2021, 10(24), 3074; https://doi.org/10.3390/electronics10243074 - 09 Dec 2021
Cited by 10 | Viewed by 2269
Abstract
Localization and security are among the most dominant tasks of wireless sensor networks (WSN). For applications containing sensitive information on the location parameters of the event, secure localization is mandatory and must not be compromised at any cost. The main task, as if [...] Read more.
Localization and security are among the most dominant tasks of wireless sensor networks (WSN). For applications containing sensitive information on the location parameters of the event, secure localization is mandatory and must not be compromised at any cost. The main task, as if any node is malicious, is to authenticate nodes that are involved in the localization process. In this paper, we propose a secure hop-based algorithm that provides a better localization accuracy. In addition, to maintain the security of the localization process, the digital signature approach is used. Moreover, the impact of malicious nodes on the proposed scheme has also been observed. The proposed approach is also contrasted with the basic DV-Hop and improved DV-Hop based on error correction. From the simulation outcomes, we infer that this secure digital-signature-based localization strategy is quite robust against any node compromise attacks, thereby boosting its precision. Comparisons between the proposed algorithm and the state of the art were made on the grounds of different parameters such as the node quantity, ratio of anchor nodes, and range value towards the localization error. Full article
Show Figures

Figure 1

17 pages, 17036 KiB  
Article
Blockchain-Based Security Mechanism for the Medical Data at Fog Computing Architecture of Internet of Things
by Desire Ngabo, Dong Wang, Celestine Iwendi, Joseph Henry Anajemba, Lukman Adewale Ajao and Cresantus Biamba
Electronics 2021, 10(17), 2110; https://doi.org/10.3390/electronics10172110 - 30 Aug 2021
Cited by 47 | Viewed by 4591
Abstract
The recent developments in fog computing architecture and cloud of things (CoT) technology includes data mining management and artificial intelligence operations. However, one of the major challenges of this model is vulnerability to security threats and cyber-attacks against the fog computing layers. In [...] Read more.
The recent developments in fog computing architecture and cloud of things (CoT) technology includes data mining management and artificial intelligence operations. However, one of the major challenges of this model is vulnerability to security threats and cyber-attacks against the fog computing layers. In such a scenario, each of the layers are susceptible to different intimidations, including the sensed data (edge layer), computing and processing of data (fog (layer), and storage and management for public users (cloud). The conventional data storage and security mechanisms that are currently in use appear to not be suitable for such a huge amount of generated data in the fog computing architecture. Thus, the major focus of this research is to provide security countermeasures against medical data mining threats, which are generated from the sensing layer (a human wearable device) and storage of data in the cloud database of internet of things (IoT). Therefore, we propose a public-permissioned blockchain security mechanism using elliptic curve crypto (ECC) digital signature that that supports a distributed ledger database (server) to provide an immutable security solution, transaction transparency and prevent the patient records tampering at the IoTs fog layer. The blockchain technology approach also helps to mitigate these issues of latency, centralization, and scalability in the fog model. Full article
Show Figures

Figure 1

Review

Jump to: Research

22 pages, 704 KiB  
Review
Reliable Internet of Things: Challenges and Future Trends
by Mohammad Zubair Khan, Omar H. Alhazmi, Muhammad Awais Javed, Hamza Ghandorh and Khalid S. Aloufi
Electronics 2021, 10(19), 2377; https://doi.org/10.3390/electronics10192377 - 29 Sep 2021
Cited by 20 | Viewed by 4558
Abstract
The Internet of Things (IoT) is a vital component of many future industries. By intelligent integration of sensors, wireless communications, computing techniques, and data analytics, IoT can increase productivity and efficiency of industries. Reliability of data transmission is key to realize several applications [...] Read more.
The Internet of Things (IoT) is a vital component of many future industries. By intelligent integration of sensors, wireless communications, computing techniques, and data analytics, IoT can increase productivity and efficiency of industries. Reliability of data transmission is key to realize several applications offered by IoT. In this paper, we present an overview of future IoT applications, and their major communication requirements. We provide a brief survey of recent work in four major areas of reliable IoT including resource allocation, latency management, security, and reliability metrics. Finally, we highlight some of the important challenges for reliable IoT related to machine learning techniques, 6G communications and blockchain based security that need further investigation and discuss related future directions. Full article
Show Figures

Graphical abstract

Back to TopTop