sensors-logo

Journal Browser

Journal Browser

Scalable Blockchain and AI-Based Embedded IoT Systems for Smart Spaces

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Intelligent Sensors".

Deadline for manuscript submissions: closed (1 December 2022) | Viewed by 58586

Special Issue Editor

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) has been playing a vital role in adding value to human lives. In recent years, IoT applications have been coupled with machine learning techniques to form intelligent IoT-enabled blockchain applications. However, for intelligent IoT nodes, the machine learning technologies should be lightweight in order to meet the constrained capabilities of the embedded hardware. This Special Issue aims to highlight advances in the open research topics in this field, which include, but are not limited to, the following:

  • Optimize existing machine learning architecture for embedded IoT devices;
  • Lightweight machine learning architecture and frameworks;
  • Distributed predictive optimization;
  • Positioning systems and infrastructures;
  • Energy-saving and energy harvesting methods and techniques;
  • Blockchain for security and privacy;
  • Data collection and management methods (big data and data retrieval);
  • Lightweight intelligent IoT service orchestration;
  • Intelligent IoT for lightweight driver-assistance systems in electric vehicles.

Dr. Faisal Jamil
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Blockchain
  • Internet of things
  • Indoor localization
  • Service orchestration
  • Virtualization
  • Digital twin
  • Big data
  • Machine learning
  • Edge computing

Published Papers (15 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

29 pages, 5041 KiB  
Article
Towards Intelligent Zone-Based Content Pre-Caching Approach in VANET for Congestion Control
by Khola Nazar, Yousaf Saeed, Abid Ali, Abeer D. Algarni, Naglaa F. Soliman, Abdelhamied A. Ateya, Mohammed Saleh Ali Muthanna and Faisal Jamil
Sensors 2022, 22(23), 9157; https://doi.org/10.3390/s22239157 - 25 Nov 2022
Cited by 8 | Viewed by 1914
Abstract
In vehicular ad hoc networks (VANETs), content pre-caching is a significant technology that improves network performance and lowers network response delay. VANET faces network congestion when multiple requests for the same content are generated. Location-based dependency requirements make the system more congested. Content [...] Read more.
In vehicular ad hoc networks (VANETs), content pre-caching is a significant technology that improves network performance and lowers network response delay. VANET faces network congestion when multiple requests for the same content are generated. Location-based dependency requirements make the system more congested. Content pre-caching is an existing challenge in VANET; pre-caching involves the content’s early delivery to the requested vehicles to avoid network delays and control network congestion. Early content prediction saves vehicles from accidents and road disasters in urban environments. Periodic data dissemination without considering the state of the road and surrounding vehicles are considered in this research. The content available at a specified time poses considerable challenges in VANET for content delivery. To address these challenges, we propose a machine learning-based, zonal/context-aware-equipped content pre-caching strategy in this research. The proposed model improves content placement and content management in the pre-caching mode for VANET. Content caching is achieved through machine learning, which significantly improves content prediction by pre-caching the content early to the desired vehicles that are part of the zone. In this paper, three algorithms are presented, the first is zone selection using the customized algorithm, the second is the content dissemination algorithm, and the third is the content pre-caching decision algorithm using supervised machine learning that improves the early content prediction accuracy by 99.6%. The cache hit ratio for the proposed technique improves by 13% from the previous techniques. The prediction accuracy of the proposed technique is compared with CCMP, MLCP, and PCZS+PCNS on the number of vehicles from 10 to 150, with an improved average of 16%. Finally, the average delay reduces over time compared with the state-of-the-art techniques of RPSS, MLCP, CCMP, and PCZS+PCNS. Finally, the average delay shows that the proposed method effectively reduces the delay when the number of nodes increases. The proposed solution improves the content delivery request while comparing it with existing techniques. The results show improved pre-caching in VANET to avoid network congestion. Full article
Show Figures

Figure 1

24 pages, 1878 KiB  
Article
Enhanced Harmonics Reactive Power Control Strategy Based on Multilevel Inverter Using ML-FFNN for Dynamic Power Load Management in Microgrid
by Harun Jamil, Faiza Qayyum, Naeem Iqbal and Do-Hyeun Kim
Sensors 2022, 22(17), 6402; https://doi.org/10.3390/s22176402 - 25 Aug 2022
Cited by 6 | Viewed by 1728
Abstract
The shift of the world in the past two decades towards renewable energy (RES), due to the continuously decreasing fossil fuel reserves and their bad impact on the environment, has attracted researchers all around the world to improve the efficiency of RES and [...] Read more.
The shift of the world in the past two decades towards renewable energy (RES), due to the continuously decreasing fossil fuel reserves and their bad impact on the environment, has attracted researchers all around the world to improve the efficiency of RES and eliminate problems that arise at the point of common coupling (PCC). Harmonics and un-balance in 3-phase voltages because of dynamic and nonlinear loads cause a lagging power factor due to inductive load, active power losses, and instability at the point of common coupling. This also happens due to a lack of system inertia in micro-grids. Passive filters are used to eliminate harmonics at both the electrical converter’s input and output sides and improve the system’s power factor. A Synchronous Reference Frame (SRF) control method is used to overcome the problem related to grid synchronization. The sine pulse width modulation (SPWM) technique provides gating signals to the switches of the multilevel inverter. A multi-layer feed forward neural network (ML-FFNN) is employed at the output of a system to minimize mean square error (MSE) by removing the errors between target voltages and reference voltages produced at the output of a trained model. Simulations were performed using MATLAB Simulink to highlight the significance of the proposed research study. The simulation results show that our proposed intelligent control scheme used for the suppression of harmonics compensated for reactive power more effectively than the SRF-based control methods. The simulation-based results confirm that the proposed ML-FFNN-based harmonic and reactive power control technique performs 0.752 better in terms of MAE, 0.52 for the case of MSE, and 0.222 when evaluating based on the RMSE. Full article
Show Figures

Figure 1

17 pages, 3033 KiB  
Article
An Effective Color Image Encryption Based on Henon Map, Tent Chaotic Map, and Orthogonal Matrices
by Shamsa Kanwal, Saba Inam, Mohamed Tahar Ben Othman, Ayesha Waqar, Muhammad Ibrahim, Fariha Nawaz, Zainab Nawaz and Habib Hamam
Sensors 2022, 22(12), 4359; https://doi.org/10.3390/s22124359 - 08 Jun 2022
Cited by 17 | Viewed by 2504
Abstract
In the last decade, the communication of images through the internet has increased. Due to the growing demands for data transfer through images, protection of data and safe communication is very important. For this purpose, many encryption techniques have been designed and developed. [...] Read more.
In the last decade, the communication of images through the internet has increased. Due to the growing demands for data transfer through images, protection of data and safe communication is very important. For this purpose, many encryption techniques have been designed and developed. New and secured encryption schemes based on chaos theory have introduced methods for secure as well as fast communication. A modified image encryption process is proposed in this work with chaotic maps and orthogonal matrix in Hill cipher. Image encryption involves three phases. In the first phase, a chaotic Henon map is used for permuting the digital image. In the second phase, a Hill cipher is used whose encryption key is generated by an orthogonal matrix which further is produced from the equation of the plane. In the third phase, a sequence is generated by a chaotic tent map which is later XORed. Chaotic maps play an important role in the encryption process. To deal with the issues of fast and highly secured image processing, the prominent properties of non-periodical movement and non-convergence of chaotic theory play an important role. The proposed scheme is resistant to different attacks on the cipher image. Different tests have been applied to evaluate the proposed technique. The results of the tests such as key space analysis, key sensitivity analysis, and information entropy, histogram correlation of the adjacent pixels, number of pixel change rate (NPCR), peak signal to noise ratio (PSNR), and unified average changing intensity (UCAI) showed that our proposed scheme is an efficient encryption technique. The proposed approach is also compared with some state-of-the-art image encryption techniques. In the view of statistical analysis, we claim that our proposed encryption algorithm is secured. Full article
Show Figures

Figure 1

21 pages, 4574 KiB  
Article
Automatic Fire Detection and Notification System Based on Improved YOLOv4 for the Blind and Visually Impaired
by Mukhriddin Mukhiddinov, Akmalbek Bobomirzaevich Abdusalomov and Jinsoo Cho
Sensors 2022, 22(9), 3307; https://doi.org/10.3390/s22093307 - 26 Apr 2022
Cited by 36 | Viewed by 6704
Abstract
The growing aging population suffers from high levels of vision and cognitive impairment, often resulting in a loss of independence. Such individuals must perform crucial everyday tasks such as cooking and heating with systems and devices designed for visually unimpaired individuals, which do [...] Read more.
The growing aging population suffers from high levels of vision and cognitive impairment, often resulting in a loss of independence. Such individuals must perform crucial everyday tasks such as cooking and heating with systems and devices designed for visually unimpaired individuals, which do not take into account the needs of persons with visual and cognitive impairment. Thus, the visually impaired persons using them run risks related to smoke and fire. In this paper, we propose a vision-based fire detection and notification system using smart glasses and deep learning models for blind and visually impaired (BVI) people. The system enables early detection of fires in indoor environments. To perform real-time fire detection and notification, the proposed system uses image brightness and a new convolutional neural network employing an improved YOLOv4 model with a convolutional block attention module. The h-swish activation function is used to reduce the running time and increase the robustness of YOLOv4. We adapt our previously developed smart glasses system to capture images and inform BVI people about fires and other surrounding objects through auditory messages. We create a large fire image dataset with indoor fire scenes to accurately detect fires. Furthermore, we develop an object mapping approach to provide BVI people with complete information about surrounding objects and to differentiate between hazardous and nonhazardous fires. The proposed system shows an improvement over other well-known approaches in all fire detection metrics such as precision, recall, and average precision. Full article
Show Figures

Figure 1

27 pages, 17283 KiB  
Article
An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs
by Abdul Malik, Muhammad Zahid Khan, Mohammad Faisal, Faheem Khan and Jung-Taek Seo
Sensors 2022, 22(5), 1897; https://doi.org/10.3390/s22051897 - 28 Feb 2022
Cited by 39 | Viewed by 4160
Abstract
Rapid and tremendous advances in wireless technology, miniaturization, and Internet of things (IoT) technology have brought significant development to vehicular ad hoc networks (VANETs). VANETs and IoT together play a vital role in the current intelligent transport system (ITS). However, a VANET is [...] Read more.
Rapid and tremendous advances in wireless technology, miniaturization, and Internet of things (IoT) technology have brought significant development to vehicular ad hoc networks (VANETs). VANETs and IoT together play a vital role in the current intelligent transport system (ITS). However, a VANET is highly vulnerable to various security attacks due to its highly dynamic, decentralized, open-access medium, and protocol-design-related concerns. Regarding security concerns, a black hole attack (BHA) is one such threat in which the control or data packets are dropped by the malicious vehicle, converting a safe path/link into a compromised one. Dropping data packets has a severe impact on a VANET’s performance and security and may cause road fatalities, accidents, and traffic jams. In this study, a novel solution called detection and prevention of a BHA (DPBHA) is proposed to secure and improve the overall security and performance of the VANETs by detecting BHA at an early stage of the route discovery process. The proposed solution is based on calculating a dynamic threshold value and generating a forged route request (RREQ) packet. The solution is implemented and evaluated in the NS-2 simulator and its performance and efficacy are compared with the benchmark schemes. The results showed that the proposed DPBHA outperformed the benchmark schemes in terms of increasing the packet delivery ratio (PDR) by 3.0%, increasing throughput by 6.15%, reducing the routing overhead by 3.69%, decreasing the end-to-end delay by 6.13%, and achieving a maximum detection rate of 94.66%. Full article
Show Figures

Figure 1

22 pages, 966 KiB  
Article
AdPSO: Adaptive PSO-Based Task Scheduling Approach for Cloud Computing
by Said Nabi, Masroor Ahmad, Muhammad Ibrahim and Habib Hamam
Sensors 2022, 22(3), 920; https://doi.org/10.3390/s22030920 - 25 Jan 2022
Cited by 64 | Viewed by 4401
Abstract
Cloud computing has emerged as the most favorable computing platform for researchers and industry. The load balanced task scheduling has emerged as an important and challenging research problem in the Cloud computing. Swarm intelligence-based meta-heuristic algorithms are considered more suitable for Cloud scheduling [...] Read more.
Cloud computing has emerged as the most favorable computing platform for researchers and industry. The load balanced task scheduling has emerged as an important and challenging research problem in the Cloud computing. Swarm intelligence-based meta-heuristic algorithms are considered more suitable for Cloud scheduling and load balancing. The optimization procedure of swarm intelligence-based meta-heuristics consists of two major components that are the local and global search. These algorithms find the best position through the local and global search. To achieve an optimized mapping strategy for tasks to the resources, a balance between local and global search plays an effective role. The inertia weight is an important control attribute to effectively adjust the local and global search process. There are many inertia weight strategies; however, the existing approaches still require fine-tuning to achieve optimum scheduling. The selection of a suitable inertia weight strategy is also an important factor. This paper contributed an adaptive Particle Swarm Optimisation (PSO) based task scheduling approach that reduces the task execution time, and increases throughput and Average Resource Utilization Ratio (ARUR). Moreover, an adaptive inertia weight strategy namely Linearly Descending and Adaptive Inertia Weight (LDAIW) is introduced. The proposed scheduling approach provides a better balance between local and global search leading to an optimized task scheduling. The performance of the proposed approach has been evaluated and compared against five renown PSO based inertia weight strategies concerning makespan and throughput. The experiments are then extended and compared the proposed approach against the other four renowned meta-heuristic scheduling approaches. Analysis of the simulated experimentation reveals that the proposed approach attained up to 10%, 12% and 60% improvement for makespan, throughput and ARUR respectively. Full article
Show Figures

Figure 1

23 pages, 71061 KiB  
Article
An IoT-Enabled Information System for Smart Navigation in Museums
by Muhammad Nawaz Khan, Haseeb Ur Rahman, Mohammad Faisal, Faheem Khan and Shabir Ahmad
Sensors 2022, 22(1), 312; https://doi.org/10.3390/s22010312 - 31 Dec 2021
Cited by 6 | Viewed by 3059
Abstract
The Internet of Things (IoT) is a new paradigm that connects objects to provide seamless communication and contextual information to anyone, anywhere, at any time (AAA). These Internet-of-Things-enabled automated objects interact with visitors to present a variety of information during museum navigation and [...] Read more.
The Internet of Things (IoT) is a new paradigm that connects objects to provide seamless communication and contextual information to anyone, anywhere, at any time (AAA). These Internet-of-Things-enabled automated objects interact with visitors to present a variety of information during museum navigation and exploration. In this article, a smart navigation and information system (SNIS) prototype for museum navigation and exploration is developed, which delivers an interactive and more exciting museum exploration experience based on the visitor’s personal presence. The objects inside a museum share the information that assist and navigate the visitors about the different sections and objects of the museum. The system was deployed inside Chakdara Museum and experimented with 381 users to achieve the results. For results, different users marked the proposed system in terms of parameters such as interesting, reality, ease of use, satisfaction, usefulness, and user friendly. Of these 381 users, 201 marked the system as most interesting, 138 marked most realistic, 121 marked it as easy-in-use, 219 marked it useful, and 210 marked it as user friendly. These statistics prove the efficiency of SNIS and its usefulness in smart cultural heritage, including smart museums, exhibitions and cultural sites. Full article
Show Figures

Figure 1

17 pages, 2313 KiB  
Article
Novel Video Surveillance-Based Fire and Smoke Classification Using Attentional Feature Map in Capsule Networks
by Muksimova Shakhnoza, Umirzakova Sabina, Mardieva Sevara and Young-Im Cho
Sensors 2022, 22(1), 98; https://doi.org/10.3390/s22010098 - 24 Dec 2021
Cited by 11 | Viewed by 3933
Abstract
A fire is an extraordinary event that can damage property and have a notable effect on people’s lives. However, the early detection of smoke and fire has been identified as a challenge in many recent studies. Therefore, different solutions have been proposed to [...] Read more.
A fire is an extraordinary event that can damage property and have a notable effect on people’s lives. However, the early detection of smoke and fire has been identified as a challenge in many recent studies. Therefore, different solutions have been proposed to approach the timely detection of fire events and avoid human casualties. As a solution, we used an affordable visual detection system. This method is possibly effective because early fire detection is recognized. In most developed countries, CCTV surveillance systems are installed in almost every public location to take periodic images of a specific area. Notwithstanding, cameras are used under different types of ambient light, and they experience occlusions, distortions of view, and changes in the resulting images from different camera angles and the different seasons of the year, all of which affect the accuracy of currently established models. To address these problems, we developed an approach based on an attention feature map used in a capsule network designed to classify fire and smoke locations at different distances outdoors, given only an image of a single fire and smoke as input. The proposed model was designed to solve two main limitations of the base capsule network input and the analysis of large-sized images, as well as to compensate the absence of a deep network using an attention-based approach to improve the classification of the fire and smoke results. In term of practicality, our method is comparable with prior strategies based on machine learning and deep learning methods. We trained and tested the proposed model using our datasets collected from different sources. As the results indicate, a high classification accuracy in comparison with other modern architectures was achieved. Further, the results indicate that the proposed approach is robust and stable for the classification of images from outdoor CCTV cameras with different viewpoints given the presence of smoke and fire. Full article
Show Figures

Figure 1

22 pages, 39051 KiB  
Article
Multilevel Central Trust Management Approach for Task Scheduling on IoT-Based Mobile Cloud Computing
by Abid Ali, Muhammad Munawar Iqbal, Harun Jamil, Habib Akbar, Ammar Muthanna, Meryem Ammi and Maha M. Althobaiti
Sensors 2022, 22(1), 108; https://doi.org/10.3390/s22010108 - 24 Dec 2021
Cited by 15 | Viewed by 3089
Abstract
With the increasing number of mobile devices and IoT devices across a wide range of real-life applications, our mobile cloud computing devices will not cope with this growing number of audiences soon, which implies and demands the need to shift to fog computing. [...] Read more.
With the increasing number of mobile devices and IoT devices across a wide range of real-life applications, our mobile cloud computing devices will not cope with this growing number of audiences soon, which implies and demands the need to shift to fog computing. Task scheduling is one of the most demanding scopes after the trust computation inside the trustable nodes. The mobile devices and IoT devices transfer the resource-intensive tasks towards mobile cloud computing. Some tasks are resource-intensive and not trustable to allocate to the mobile cloud computing resources. This consequently gives rise to trust evaluation and data sync-up of devices joining and leaving the network. The resources are more intensive for cloud computing and mobile cloud computing. Time, energy, and resources are wasted due to the nontrustable nodes. This research article proposes a multilevel trust enhancement approach for efficient task scheduling in mobile cloud environments. We first calculate the trustable tasks needed to offload towards the mobile cloud computing. Then, an efficient and dynamic scheduler is added to enhance the task scheduling after trust computation using social and environmental trust computation techniques. To improve the time and energy efficiency of IoT and mobile devices using the proposed technique, the energy computation and time request computation are compared with the existing methods from literature, which identified improvements in the results. Our proposed approach is centralized to tackle constant SyncUPs of incoming devices’ trust values with mobile cloud computing. With the benefits of mobile cloud computing, the centralized data distribution method is a positive approach. Full article
Show Figures

Figure 1

18 pages, 3080 KiB  
Article
An Efficient and Reliable Algorithm for Wireless Sensor Network
by Faheem Khan, Shabir Ahmad, Hüseyin Gürüler, Gurcan Cetin, Taegkeun Whangbo and Cheong-Ghil Kim
Sensors 2021, 21(24), 8355; https://doi.org/10.3390/s21248355 - 14 Dec 2021
Cited by 16 | Viewed by 3226
Abstract
In wireless sensor networks (WSN), flooding increases the reliability in terms of successful transmission of a packet with higher overhead. The flooding consumes the resources of the network quickly, especially in sensor networks, mobile ad-hoc networks, and vehicular ad-hoc networks in terms of [...] Read more.
In wireless sensor networks (WSN), flooding increases the reliability in terms of successful transmission of a packet with higher overhead. The flooding consumes the resources of the network quickly, especially in sensor networks, mobile ad-hoc networks, and vehicular ad-hoc networks in terms of the lifetime of the node, lifetime of the network, and battery lifetime, etc. This paper aims to develop an efficient and reliable protocol by using multicasting and unicasting to overcome the issue of higher overhead due to flooding. Unicasting is used when the desired destination is at a minimum distance to avoid an extra overhead and increases the efficiency of the network in terms of overhead and energy because unicasting is favorable where the distance is minimum. Similarly, multicasting is used when the desired destination is at maximum distance and increases the network’s reliability in terms of throughput. The results are implemented in the Department of Computer Science, Bacha Khan University Charsadda (BKUC), Pakistan, as well as in the Network Simulator-2 (NS-2). The results are compared with benchmark schemes such as PUMA and ERASCA, and based on the results, the performance of the proposed approach is improved in terms of overhead, throughput, and packet delivery fraction by avoiding flooding. Full article
Show Figures

Figure 1

20 pages, 12346 KiB  
Article
Optimal Scheduling of Campus Microgrid Considering the Electric Vehicle Integration in Smart Grid
by Tehreem Nasir, Safdar Raza, Muhammad Abrar, Hafiz Abdul Muqeet, Harun Jamil, Faiza Qayyum, Omar Cheikhrouhou, Fawaz Alassery and Habib Hamam
Sensors 2021, 21(21), 7133; https://doi.org/10.3390/s21217133 - 27 Oct 2021
Cited by 33 | Viewed by 3551
Abstract
High energy consumption, rising environmental concerns and depleting fossil fuels demand an increase in clean energy production. The enhanced resiliency, efficiency and reliability offered by microgrids with distributed energy resources (DERs) have shown to be a promising alternative to the conventional grid system. [...] Read more.
High energy consumption, rising environmental concerns and depleting fossil fuels demand an increase in clean energy production. The enhanced resiliency, efficiency and reliability offered by microgrids with distributed energy resources (DERs) have shown to be a promising alternative to the conventional grid system. Large-sized commercial customers like institutional complexes have put significant efforts to promote sustainability by establishing renewable energy systems at university campuses. This paper proposes the integration of a photovoltaic (PV) system, energy storage system (ESS) and electric vehicles (EV) at a University campus. An optimal energy management system (EMS) is proposed to optimally dispatch the energy from available energy resources. The problem is mapped in a Linear optimization problem and simulations are carried out in MATLAB. Simulation results showed that the proposed EMS ensures the continuous power supply and decreases the energy consumption cost by nearly 45%. The impact of EV as a storage tool is also observed. EVs acting as a source of energy reduced the energy cost by 45.58% and as a load by 19.33%. The impact on the cost for continuous power supply in case of a power outage is also analyzed. Full article
Show Figures

Figure 1

24 pages, 65736 KiB  
Article
WPAN and IoT Enabled Automation to Authenticate Ignition of Vehicle in Perspective of Smart Cities
by Anita Gehlot, Rajesh Singh, Piyush Kuchhal, Adesh Kumar, Aman Singh, Khalid Alsubhi, Muhammad Ibrahim, Santos Gracia Villar and Jose Brenosa
Sensors 2021, 21(21), 7031; https://doi.org/10.3390/s21217031 - 23 Oct 2021
Cited by 4 | Viewed by 2322
Abstract
Currently, two-wheelers are the most popular mode of transportation, driven by the majority the people. Research by the World Health Organization (WHO) identifies that most two-wheeler deaths are caused due to not wearing a helmet. However, the advancement in sensors and wireless communication [...] Read more.
Currently, two-wheelers are the most popular mode of transportation, driven by the majority the people. Research by the World Health Organization (WHO) identifies that most two-wheeler deaths are caused due to not wearing a helmet. However, the advancement in sensors and wireless communication technology empowers one to monitor physical things such as helmets through wireless technology. Motivated by these aspects, this article proposes a wireless personal network and an Internet of Things assisted system for automating the ignition of two-wheelers with authorization and authentication through the helmet. The authentication and authorization are realized with the assistance of a helmet node and a two-wheeler node based on 2.4 GHz RF communication. The helmet node is embedded with three flex sensors utilized to experiment with different age groups and under different temperature conditions. The statistical data collected during the experiment are utilized to identify the appropriate threshold value through a t-test hypothesis for igniting the two-wheelers. The threshold value obtained after the t-test is logged in the helmet node for initiating the communication with the two-wheeler node. The pairing of the helmet node along with the RFID key is achieved through 2.4 GHZ RF communication. During real-time implementation, the helmet node updates the status to the server and LABVIEW data logger, after wearing the helmet. Along with the customization of hardware, a LABVIEW data logger is designed to visualize the data on the server side. Full article
Show Figures

Figure 1

31 pages, 2896 KiB  
Article
Enhanced PDR-BLE Compensation Mechanism Based on HMM and AWCLA for Improving Indoor Localization
by Harun Jamil, Faiza Qayyum, Faisal Jamil and Do-Hyeun Kim
Sensors 2021, 21(21), 6972; https://doi.org/10.3390/s21216972 - 21 Oct 2021
Cited by 9 | Viewed by 2391
Abstract
This paper presents an enhanced PDR-BLE compensation mechanism for improving indoor localization, which is considerably resilient against variant uncertainties. The proposed method of ePDR-BLE compensation mechanism (EPBCM) takes advantage of the non-requirement of linearization of the system around its current state in an [...] Read more.
This paper presents an enhanced PDR-BLE compensation mechanism for improving indoor localization, which is considerably resilient against variant uncertainties. The proposed method of ePDR-BLE compensation mechanism (EPBCM) takes advantage of the non-requirement of linearization of the system around its current state in an unscented Kalman filter (UKF) and Kalman filter (KF) in smoothing of received signal strength indicator (RSSI) values. In this paper, a fusion of conflicting information and the activity detection approach of an object in an indoor environment contemplates varying magnitude of accelerometer values based on the hidden Markov model (HMM). On the estimated orientation, the proposed approach remunerates the inadvertent body acceleration and magnetic distortion sensor data. Moreover, EPBCM can precisely calculate the velocity and position by reducing the position drift, which gives rise to a fault in zero-velocity and heading error. The developed EPBCM localization algorithm using Bluetooth low energy beacons (BLE) was applied and analyzed in an indoor environment. The experiments conducted in an indoor scenario shows the results of various activities performed by the object and achieves better orientation estimation, zero velocity measurements, and high position accuracy than other methods in the literature. Full article
Show Figures

Figure 1

Review

Jump to: Research

26 pages, 1093 KiB  
Review
Sustainable Solutions for Advanced Energy Management System of Campus Microgrids: Model Opportunities and Future Challenges
by Hafiz Abdul Muqeet, Haseeb Javed, Muhammad Naveed Akhter, Muhammad Shahzad, Hafiz Mudassir Munir, Muhammad Usama Nadeem, Syed Sabir Hussain Bukhari and Mikulas Huba
Sensors 2022, 22(6), 2345; https://doi.org/10.3390/s22062345 - 18 Mar 2022
Cited by 41 | Viewed by 5992
Abstract
Distributed generation connected with AC, DC, or hybrid loads and energy storage systems is known as a microgrid. Campus microgrids are an important load type. A university campus microgrids, usually, contains distributed generation resources, energy storage, and electric vehicles. The main aim of [...] Read more.
Distributed generation connected with AC, DC, or hybrid loads and energy storage systems is known as a microgrid. Campus microgrids are an important load type. A university campus microgrids, usually, contains distributed generation resources, energy storage, and electric vehicles. The main aim of the microgrid is to provide sustainable, economical energy, and a reliable system. The advanced energy management system (AEMS) provides a smooth energy flow to the microgrid. Over the last few years, many studies were carried out to review various aspects such as energy sustainability, demand response strategies, control systems, energy management systems with different types of optimization techniques that are used to optimize the microgrid system. In this paper, a comprehensive review of the energy management system of campus microgrids is presented. In this survey, the existing literature review of different objective functions, renewable energy resources and solution tools are also reviewed. Furthermore, the research directions and related issues to be considered in future microgrid scheduling studies are also presented. Full article
Show Figures

Figure 1

42 pages, 1128 KiB  
Review
Blockchain-Based Authentication in Internet of Vehicles: A Survey
by Sohail Abbas, Manar Abu Talib, Afaf Ahmed, Faheem Khan, Shabir Ahmad and Do-Hyeun Kim
Sensors 2021, 21(23), 7927; https://doi.org/10.3390/s21237927 - 27 Nov 2021
Cited by 32 | Viewed by 7351
Abstract
Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system that is capable of providing various intelligent services and supporting different applications for the drivers and passengers on roads. [...] Read more.
Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system that is capable of providing various intelligent services and supporting different applications for the drivers and passengers on roads. In order for the IoV and VANETs environments to be able to offer such beneficial road services, huge amounts of data are generated and exchanged among the different communicated entities in these vehicular networks wirelessly via open channels, which could attract the adversaries and threaten the network with several possible types of security attacks. In this survey, we target the authentication part of the security system while highlighting the efficiency of blockchains in the IoV and VANETs environments. First, a detailed background on IoV and blockchain is provided, followed by a wide range of security requirements, challenges, and possible attacks in vehicular networks. Then, a more focused review is provided on the recent blockchain-based authentication schemes in IoV and VANETs with a detailed comparative study in terms of techniques used, network models, evaluation tools, and attacks counteracted. Lastly, some future challenges for IoV security are discussed that are necessary to be addressed in the upcoming research. Full article
Show Figures

Figure 1

Back to TopTop