Article
Multidisciplinary Sciences
Muhammad Talha Rahim, Awais Khan, Uman Khalid, Junaid ur Rehman, Haejoon Jung, Hyundong Shin
Summary: Quantum secure metrology protocols utilize quantum effects to achieve enhanced precision and security in probing remote systems. This paper proposes a QSM scheme that employs Bell pairs for unconditional security and offers precision scaling beyond the standard quantum limit. The comparative analysis demonstrates the superiority of the controlled encoding strategy over the parallel encoding of multi-partite entangled states in terms of parameter secrecy. Additionally, a trade-off relationship between maximum achievable precision and security under limited resource availability is identified and characterized. The dynamic scalability of the proposed protocol makes it suitable for large-scale network sensing scenarios.
SCIENTIFIC REPORTS
(2023)
Article
Computer Science, Information Systems
Theofanis Xifilidis, Kostas E. Psannis
Summary: This paper investigates the performance of Wireless Sensor Networks in environmental monitoring by examining metrics such as normalized reconstruction error and energy estimation error, considering temporal, spatial, and spatiotemporal correlations. The study thoroughly examines both independent and correlated cases for dense measurement scenarios, and proposes applications in topology and routing for fifth generation sensor networks and IoT deployment scenarios.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Ahmad Arsalan, Muhammad Burhan, Rana Asif Rehman, Tariq Umer, Byung-Seo Kim
Summary: In this paper, a novel accumulative Interest-based content-store architecture called E-DRAFT is proposed for NDN-based WMSNs to improve the efficiency of individual nodes as well as the overall network, and to control packet flooding. The ndnSIM simulator is used for comprehensive simulations, and the results show that the proposed approach effectively stops additional packet flooding and enhances processing efficiency in storing and retrieving Data packets compared to existing methodologies.
Article
Multidisciplinary Sciences
Ahmed Salim, Ahmed Ismail, Walid Osamy, Ahmed M. Khedr
Summary: The study proposes a new security scheme that combines the advantages of CS and ECC to enhance the security and efficiency of data collection in IoT-based WSNs. It effectively addresses challenges related to key distribution and adversary attacks, and provides secure data exchange environment through new key sharing method and security measures.
Article
Engineering, Electrical & Electronic
Pengcheng Wei, Fangcheng He
Summary: This study combines compressed sensing technology with wireless networks to expand compression algorithms spatially, improving data processing capabilities and accuracy.
IEEE SENSORS JOURNAL
(2021)
Article
Computer Science, Information Systems
Jinho Choi
Summary: This study investigates data-aided sensing for distributed detection in wireless sensor networks, proposing a node selection criterion based on J-divergence to ensure reliable decision-making with minimal decision delay. Simulation results confirm that the J-divergence based DAS can provide reliable decisions with fewer sensors compared to other approaches.
IEEE WIRELESS COMMUNICATIONS LETTERS
(2021)
Article
Engineering, Electrical & Electronic
Ahmed Salim, Walid Osamy, Ahmed M. Khedr, Ahmed Aziz, Mohamed Abdel-Mageed
Summary: The paper introduces a new scheme for secure and efficient gathering of IoT data, consisting of Setup, Secure data gathering, and Data reconstruction phases. It utilizes the properties of prime numbers and Bezier curve function to improve power consumption during data transmission and enhance the reconstruction process.
IEEE SENSORS JOURNAL
(2021)
Article
Computer Science, Information Systems
Cong Peng, Min Luo, Pandi Vijayakumar, Debiao He, Omar Said, Amr Tolba
Summary: This study proposes a multifunctional and multidimensional secure data aggregation scheme to address security issues and functional requirements in wireless sensor networks. The scheme encodes multidimensional data into large integers using the Chinese remainder theorem conversion method and supports data analysis with various aggregation functions. Experimental results show that the scheme has lower computation and communication costs compared to existing schemes in high-dimensional scenarios.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Wenbing Zhao, Izdehar M. M. Aldyaflah, Pranav Gangwani, Santosh Joshi, Himanshu Upadhyay, Leonel Lagos
Summary: This paper presents a secure sensing data processing and logging system designed, implemented, and evaluated using blockchain technology. The system uses a public blockchain as an immutable datastore to log critical data and incorporates innovative blockchain-inspired mechanisms for enhanced security. The system focuses on admission control, data integrity, and data protection, and has been evaluated with two public blockchain systems, IOTA Shimmer test network and Ethereum.
Article
Computer Science, Information Systems
Jian Zhang, Yuan Wu, Yanjiao Chen, Junkongshuai Wang, Jinxing Huang, Qian Zhang
Summary: Fatigue is a leading factor for traffic accidents and health problems, but its risks are difficult to quantify due to the lack of efficient and reliable detection methods. The Ubi-Fatigue system presented in this study is a comfortable and contactless fatigue monitor that utilizes wireless signals. By combining vital signs and facial features, the system achieves reliable fatigue detection. Experimental results demonstrate that Ubi-Fatigue outperforms other detection systems in terms of accuracy.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Xin Tian, Guoliang Wei, Jianhua Wang
Summary: This paper proposes a target localization method based on compressive sensing and Hidden semi-Markov Model (HsMM), which can solve some problems in indoor localization. The method achieves both coarse and precise positioning by combining compressive sensing and HsMM, and introduces some parameter training methods and indices to improve the localization performance.
Article
Computer Science, Information Systems
Uzma Majeed, Aqdas Naveed Malik, Nasim Abbas, Waseem Abbass
Summary: This article presents an energy-efficient distributed congestion control protocol (DCCP) to mitigate congestion and improve network performance in wireless multimedia sensor networks (WMSNs). The proposed protocol intelligently selects the best path and uses two congestion indicators to detect congestion. Experimental results show that the DCCP protocol significantly improves network performance and is superior to existing congestion control protocols.
Article
Computer Science, Information Systems
Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen
Summary: The proliferation of Internet of Things (IoT) in healthcare has raised concerns about data security and privacy while attempts to provide secure and efficient IoT schemes still lack in achieving secure data analysis. Dynamic data about patient medical status is valuable for healthcare providers, but continually updating data over time poses challenges. The study focuses on developing an efficient and secure scheme for data collection and analysis using IoT wireless body sensors.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Chemistry, Analytical
Cuicui Lv, Linchuang Yang, Xinxin Zhang, Xiangming Li, Peijin Wang, Zhenbin Du
Summary: This paper addresses the challenge of handling large data volumes and minimizing energy consumption in wireless sensor networks through the use of data compression technology and a UAV-assisted compressed data acquisition algorithm. The algorithm reduces energy consumption and experimental results show promising performance.
Article
Chemistry, Analytical
Zhisheng Yan, Jun Yi
Summary: The time consumption of tasks in 360 degrees video camera sensing is crucial for improving delay performance and viewing experience. This study provides an in-depth measurement of task-level time consumption and finds that camera CPU-GPU transfer and server initialization are key factors, while video stitching has a negligible impact on delay.