Article
Biotechnology & Applied Microbiology
Jie Zhang, Huaqing Mao
Summary: With the advancement of technology, online classrooms have become popular for indoor physical exercise, while the Internet of Things connects every item in people's lives to the network. Wireless sensor networks are a key component, enabling environmental monitoring and applications in healthcare and households. A new authentication protocol for wireless sensor networks has been proposed to enhance security through multiple gateways, utilizing various authentication methods to ensure user safety during sensor node authentication.
ENVIRONMENTAL TECHNOLOGY & INNOVATION
(2021)
Article
Computer Science, Information Systems
Fengyin Li, Xinying Yu, Yang Cui, Siqi Yu, Yuhong Sun, Yilei Wang, Huiyu Zhou
Summary: This paper proposes an Anonymous Authentication and Key Agreement protocol (AAKA) to protect the privacy and data security of Wireless Sensor Networks (WSNs). Compared with other authentication schemes, the AAKA protocol has better security features and higher efficiency, making it suitable for smart living applications.
COMPUTER COMMUNICATIONS
(2022)
Article
Multidisciplinary Sciences
Kaiqin Yang
Summary: This article introduces the directed signature technique and its application in privacy protection, and presents attacks and improvements on a specific directed signature scheme. The research results show that the scheme has security flaws and propose a more secure and efficient alternative.
Article
Chemistry, Analytical
Shimaa A. Abdel Hakeem, HyungWon Kim
Summary: The study proposes a lightweight Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) based on bilinear pairing cryptography and short-size signature. By providing efficient authentication over multiple zones, the proposed protocol significantly reduces communication and computation overhead.
Article
Chemistry, Analytical
Fumin Yi, Lei Zhang, Lijuan Xu, Shumian Yang, Yanrong Lu, Dawei Zhao
Summary: This paper proposes an efficient authentication protocol for IIoT-oriented wireless sensor networks, aiming to protect the security of private data and reduce computation and communication costs. The protocol introduces PUF chip and Bloom filter, and implements continuous authentication through pre-authentication mechanism.
Article
Chemistry, Multidisciplinary
Murat Dener, Abdullah Orman
Summary: Wireless Sensor Networks (WSNs), as an important part of IoT, consist of sensor nodes with limited processing, memory capacities, and energy. The security of WSNs is often questioned due to the dangers they face in untrusted regions. This study aims to develop a new blockchain-based authentication protocol for WSNs to address the deficiencies in existing authentication protocols and utilize the security characteristics of blockchain.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Information Systems
Xiaodong Yang, Haoqi Wen, Runze Diao, Xiaoni Du, Caifen Wang
Summary: This article analyzes the security of the ZH-CLAS scheme and discovers that it is vulnerable to public key replacement attacks and coalition attacks from malicious sensor nodes. To address these security challenges, an enhanced scheme with fixed-length aggregate signature is proposed, which outperforms related pairing-free certificateless aggregate signature schemes in terms of both security and communication performance.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Engineering, Multidisciplinary
Xuanang Li, Shuangshuang Liu, Saru Kumari, Chien -Ming Chen
Summary: The widespread application of 5G has led to rapid development in various fields, particularly in the Internet of Things (IoT). Wireless sensor networks (WSNs) are crucial components of IoT and security in WSNs is becoming increasingly important. This study proposes an improved protocol called PSAP-WSN, which has been proven to be secure and efficient through analysis.
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES
(2023)
Article
Energy & Fuels
Ting Yang, Feng Zhai, HaiQing Xu, Wei Li
Summary: This paper proposes a PIoT-oriented WSNs communication model and designs an identity authentication protocol for multi-gateway WSNs. Through security analysis, the protocol is proven to be more secure and efficient compared to other multi-user access protocols.
Article
Computer Science, Information Systems
Fan Wu, Xiong Li, Lili Xu, Pandi Vijayakumar, Neeraj Kumar
Summary: The study introduces a new three-factor authentication scheme for providing session keys to wireless sensor networks. Formal and informal verification demonstrate that the scheme has good security and practicality. Simulation results show that the scheme can operate normally in IoT environments with promising practical applications.
IEEE SYSTEMS JOURNAL
(2021)
Article
Computer Science, Information Systems
Sujit Sangram Sahoo, Vijay Kumar Chaurasiya
Summary: An aggregate signature is a cost-effective digital signature method that reduces storage costs and bandwidth consumption, making it attractive for various blockchain applications. We propose a pairing-free aggregate signature scheme based on ECDSA, which is computationally efficient and does not require additional parameters and costs for signature aggregation and verification in blockchain applications.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Chemistry, Analytical
Syed Sajid Ullah, Saddam Hussain, Mueen Uddin, Roobaea Alroobaea, Jawaid Iqbal, Abdullah M. Baqasah, Maha Abdelhaq, Raed Alsaqour
Summary: Underwater wireless sensor networks (UWSNs) are widely used in various applications. User authentication is crucial for accessing data and information in UWSNs. A lightweight signature scheme is proposed to meet the unique communication and computation needs of UWSNs, and its superiority is demonstrated through security analysis and comparisons with existing schemes. Additionally, the effectiveness of the proposed scheme is demonstrated using the fuzzy-based Evaluation-based Distance from Average Solutions (EDAS) technique.
Article
Computer Science, Information Systems
Muhammad Asad Saleem, Salman Shamshad, Shafiq Ahmed, Zahid Ghaffar, Khalid Mahmood
Summary: The Internet of Things facilitates the connection of different devices with the Internet, with wireless sensor networks being applied in smart fields. Researchers introduced a three-factor user authentication protocol for WMSN, but it has security flaws.
IEEE SYSTEMS JOURNAL
(2021)
Article
Computer Science, Information Systems
Peng Yi, Jiguo Li, Chengdong Liu, Jinguang Han, Huaqun Wang, Yichen Zhang, Yu Chen
Summary: This paper introduces an efficient identity-based signature scheme that is proved secure under the standard model. The scheme's security is reduced to the well-known computational Diffie-Hellman assumption, and it outperforms related schemes in terms of computation cost for signing and verification.
INFORMATION SCIENCES
(2021)
Article
Chemistry, Analytical
Bashayer Othman Aloufi, Wajdi Alhakami
Summary: Cognitive radio is a highly investigated technique in wireless networks that solves the spectrum shortage problem and enhances network performance and security. This paper proposes a lightweight MAC protocol for CR-WSNs, which achieves secure and mutual authentication. The protocol is proven to be immune to passive and active attacks through simulation and formal verification.
Article
Computer Science, Information Systems
Muna Al-Hawawreh, Nour Moustafa
Summary: Cyber-physical control loops are crucial in the industrial Internet of Things, but vulnerable to attacks. This study proposes an AI-based attack intelligence framework for identifying and extracting attack intelligence, and demonstrates its effectiveness using a real-world case.
Article
Computer Science, Information Systems
Youcef Azzoug, Abdelmadjid Boukra
Summary: This paper presents a novel JBR routing protocol based on swarm-inspired optimization to reduce data packet loss and introduces a concept of route stability to predict the stability degree of road segments.
Article
Computer Science, Information Systems
Paulo Cesar Prandel, Priscila Solis Barreto
Summary: This study proposes two stateful techniques, LGFS-C and LGFS-C-peak, which optimize AoI metrics by making conditional preemption decisions on packets based on system state variables. Experimental results show that both techniques achieve better optimization results than the state-of-the-art techniques and may improve CPS performance.
Article
Computer Science, Information Systems
Michele Girolami, Davide La Rosa, Paolo Barsocchi
Summary: In this work, a CrowdSensing-based proximity detection technique for visitors in an indoor museum is proposed and investigated. The technique utilizes data collected from users' smartphones, which can collect and upload Received Signal Strength (RSS) values of nearby Bluetooth tags to a backend server along with context-information. Experimental results show a clear improvement in performance when data from the crowd are exploited with the proposed architecture.
Review
Computer Science, Information Systems
Nazli Tekin, Ahmet Aris, Abbas Acar, Selcuk Uluagac, Vehbi Cagri Gungor
Summary: This paper provides a review of existing studies on energy consumption of on-device machine learning models for IoT applications. It introduces a taxonomy to define approaches for energy-aware on-device ML models and discusses open issues for further research in this field.
Article
Computer Science, Information Systems
Yangyang Li, Lei Feng, Yang Yang, Wenjing Li
Summary: This study investigates a task offloading scheme and trajectory optimization in a multi-UAV-assisted system and proposes a heterogeneous multi-agent reinforcement learning-based approach. By training with generated environment states offline, the algorithm's performance is optimized, resulting in superior energy consumption and task latency.
Article
Computer Science, Information Systems
Xinrong Zhang, Ye-Hwa Chen, Dongsheng Zhang, Ruiying Zhao, Lei Guo
Summary: This paper proposes a game-theoretic method based on constraint following theory to enhance the control resilience of cyber-physical systems. It addresses the uncertainties, mechanical constraints, and cyberattacks that these systems may encounter. Experimental results demonstrate the resilience of the controlled system against cyberattack disturbances and other threat attacks, and simulations verify the superiority of the optimal control design parameter.
Article
Computer Science, Information Systems
Shahaf Yamin, Haim H. Permuter
Summary: This study examines the problem of downlink wireless routing in integrated access backhaul (IAB) networks and proposes a multi-agent reinforcement learning algorithm for joint routing optimization. Experimental results demonstrate the effectiveness of the algorithm in achieving near-centralized performance.
Article
Computer Science, Information Systems
Phuong T. Tran, Le Thi Thanh Huyen, Ba Cao Nguyen, Huu Minh Nguyen, Tran Manh Hoang
Summary: This paper introduces and investigates a system utilizing an unmanned aerial vehicle (UAV) to assist terrestrial backscattering devices (BDs) in wireless energy charging and data transmission. The study considers energy efficiency (EE) and age-of-information (AoI) in performance assessment, and solves an optimization problem to maximize EE and minimize transmit power. Analytical and simulation results show that optimizing packet length and UAV altitude can achieve the best performance.
Article
Computer Science, Information Systems
Mohammed Aissaoui, Chiraz Houaidia, Adrien Van Den Bossche, Thierry Val, Leila Azouz Saidane
Summary: This paper proposes a distributed MAC protocol that supports PNC in static multi-hop wireless networks. The protocol's advantages over conventional CSMA/CA and PNCOPP MAC protocols are demonstrated through practical testing and numerical results.
Article
Computer Science, Information Systems
Mohamed Selim Korium, Mohamed Saber, Alexander Beattie, Arun Narayanan, Subham Sahoo, Pedro H. J. Nardelli
Summary: This paper presents a novel framework for intrusion detection in the Internet of Vehicles environment, specifically designed to detect cyberattacks on vehicles. The proposed system uses machine learning to detect abnormal behavior by analyzing network traffic. Experimental results demonstrate the effectiveness of the system in terms of accuracy and speed.
Article
Computer Science, Information Systems
Xue Li, Xiaojuan Chen, Guohua Li
Summary: This study proposes a two-tier cooperative edge network model for Power Internet of Things (PIoT) and introduces a fairness indicator based on the Theil index. By formulating a fairness and delay guaranteed task offloading and load balancing optimization problem, the research demonstrates that cooperation at the edge can significantly improve the performance of PIoT.
Article
Computer Science, Information Systems
Kun Yang, Peng Sun, Dingkang Yang, Jieyu Lin, Azzedine Boukerche, Liang Song
Summary: The focus of this research is to effectively coordinate the limited computing power of various components in intelligent transportation systems (ITS) and provide reliable support for resource-intensive applications through efficient resource allocation methods in the highly dynamic Internet-of-Vehicles environment. A novel joint computing and communication resource scheduling method is proposed, which includes a hierarchical three-layer Vehicular Edge Computing (VEC) framework and onboard joint computation offloading and transmission scheduling policy. Extensive simulation tests and ablation experiments demonstrate the effectiveness and stability of the proposed method in achieving stable performance and reducing scheduling overhead, improving resource utilization, and minimizing data transmission delay caused by vehicle motion.
Article
Computer Science, Information Systems
Rakesh Das, Jitendra Nath Bera
Summary: This paper focuses on the development of a highly reliable customized home area networking (HAN) to provide a robust communication network for smart home owners. The proposed HAN utilizes a multi-gateway-based partial mesh networking topology with ZigBee control boards to enable remote monitoring and control of individual appliances within the home. The introduction of active and pseudo gateway concept enhances the reliability of the HAN by automatically reconfiguring in case of failure. Experimental verification demonstrates the fail-proof and reliable nature of the proposed HAN with alternate routes and activation of pseudo gateway as active gateway.
Article
Computer Science, Information Systems
Changhao Li, Huanjing Li, Tao Wu, Lei Yan, Suzhi Cao
Summary: The maximum flow problem based on a contact graph in Delay-Tolerant Networking (DTN) is important for routing and data planning. Existing algorithms cannot be directly applied to topological networks with time series changes. This paper proposes a method of dismantling and reconstructing the graph to solve the maximum flow problem in a continuously changing network. The method discretizes time on different nodes to reduce the scale of the graph, optimizing data transmission, improving data delivery rate, and reducing link occupation.