sensors-logo

Journal Browser

Journal Browser

Identification, Information & Knowledge in the Internet of Things

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (31 March 2016) | Viewed by 219235

Special Issue Editors


E-Mail Website
Guest Editor
University of Applied Sciences Western Switzerland (HES-SO) Techno-Pôle 3, CH - 3960 Sierre, Switzerland
Interests: Internet of things; machine-to-machine; pervasive; environment awareness; multiprotocol; assisted living; ubiquitous; ubicomp; building automation
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Business School, Beijing Normal University, Beijing 100875, China
Interests: data science; event-linked network; Internet of things; semantic technologies; knowledge engineering; information security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
College of Information Science and Technology, Beijing Normal University, Beijing 100875, China
Interests: Internet of Things; future networks

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) brings traditional Internet industry and society with new trends and promising technologies. Full intelligentialization would be the ultimate goal of the Internet of Things. Realizing the full potential of the Internet of Things requires solving serious technical and business challenges, such as identification of things, organization, integration and management of big data, and the effective use of knowledge-based decision systems. Varieties of different technologies have been emerging in the last few decades, such as RFID, sensors technologies, NFC, Bluetooth, Zigbee, WiFi, WiMAX, which leads to the high complexity of the IoT.

The Special Issue aims at bringing together research efforts, focusing on the developments of knowledge-driven and semantics-centered methods, self-managing models for pervasive services, and tools and techniques for the handling of various aspects of Internet of Things. In this Special Issue, we solicit high-quality contributions with consolidated and thoroughly evaluated application-oriented research results in the area of the Internet of Things that are worthy of archival publication in Sensors. It is intended to (i) provide a summary of research that advances the Internet of Things, and (ii) serve as a comprehensive collection of some of the current state-of-the-art technologies within this context. The Special Issue will collaborate with the international conferences: IIKI2015 (http://business.bnu.edu.cn/IIKI2015/) and WASA2015 (http://www.cs.gsu.edu/WASA/WASA2015/).

Dr. Yunchuan Sun
Dr. Antonio J. Jara
Dr. Shengling Wang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things/cyber-physical systems
  • big data modeling and analytics
  • cloud computing
  • industrial internet
  • wireless and mobile security
  • mobile health
  • applications

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (32 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

9785 KiB  
Article
On the Dynamic RSS Feedbacks of Indoor Fingerprinting Databases for Localization Reliability Improvement
by Xiaoyang Wen, Wenyuan Tao, Chung-Ming Own and Zhenjiang Pan
Sensors 2016, 16(8), 1278; https://doi.org/10.3390/s16081278 - 15 Aug 2016
Cited by 14 | Viewed by 4616
Abstract
Location data is one of the most widely used context data types in context-aware and ubiquitous computing applications. To support locating applications in indoor environments, numerous systems with different deployment costs and positioning accuracies have been developed over the past decade. One useful [...] Read more.
Location data is one of the most widely used context data types in context-aware and ubiquitous computing applications. To support locating applications in indoor environments, numerous systems with different deployment costs and positioning accuracies have been developed over the past decade. One useful method, based on received signal strength (RSS), provides a set of signal transmission access points. However, compiling a remeasurement RSS database involves a high cost, which is impractical in dynamically changing environments, particularly in highly crowded areas. In this study, we propose a dynamic estimation resampling method for certain locations chosen from a set of remeasurement fingerprinting databases. Our proposed method adaptively applies different, newly updated and offline fingerprinting points according to the temporal and spatial strength of the location. To achieve accuracy within a simulated area, the proposed method requires approximately 3% of the feedback to attain a double correctness probability comparable to similar methods; in a real environment, our proposed method can obtain excellent 1 m accuracy errors in the positioning system. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

6584 KiB  
Article
Closed-Loop Lifecycle Management of Service and Product in the Internet of Things: Semantic Framework for Knowledge Integration
by Min-Jung Yoo, Clément Grozel and Dimitris Kiritsis
Sensors 2016, 16(7), 1053; https://doi.org/10.3390/s16071053 - 8 Jul 2016
Cited by 28 | Viewed by 10931
Abstract
This paper describes our conceptual framework of closed-loop lifecycle information sharing for product-service in the Internet of Things (IoT). The framework is based on the ontology model of product-service and a type of IoT message standard, Open Messaging Interface (O-MI) and Open Data [...] Read more.
This paper describes our conceptual framework of closed-loop lifecycle information sharing for product-service in the Internet of Things (IoT). The framework is based on the ontology model of product-service and a type of IoT message standard, Open Messaging Interface (O-MI) and Open Data Format (O-DF), which ensures data communication. (1) Background: Based on an existing product lifecycle management (PLM) methodology, we enhanced the ontology model for the purpose of integrating efficiently the product-service ontology model that was newly developed; (2) Methods: The IoT message transfer layer is vertically integrated into a semantic knowledge framework inside which a Semantic Info-Node Agent (SINA) uses the message format as a common protocol of product-service lifecycle data transfer; (3) Results: The product-service ontology model facilitates information retrieval and knowledge extraction during the product lifecycle, while making more information available for the sake of service business creation. The vertical integration of IoT message transfer, encompassing all semantic layers, helps achieve a more flexible and modular approach to knowledge sharing in an IoT environment; (4) Contribution: A semantic data annotation applied to IoT can contribute to enhancing collected data types, which entails a richer knowledge extraction. The ontology-based PLM model enables as well the horizontal integration of heterogeneous PLM data while breaking traditional vertical information silos; (5) Conclusion: The framework was applied to a fictive case study with an electric car service for the purpose of demonstration. For the purpose of demonstrating the feasibility of the approach, the semantic model is implemented in Sesame APIs, which play the role of an Internet-connected Resource Description Framework (RDF) database. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

1594 KiB  
Article
Distance-Based Opportunistic Mobile Data Offloading
by Xiaofeng Lu, Pietro Lio and Pan Hui
Sensors 2016, 16(6), 878; https://doi.org/10.3390/s16060878 - 15 Jun 2016
Cited by 6 | Viewed by 5311
Abstract
Cellular network data traffic can be offload onto opportunistic networks. This paper proposes a Distance-based Opportunistic Publish/Subscribe (DOPS) content dissemination model, which is composed of three layers: application layer, decision-making layer and network layer. When a user wants new content, he/she subscribes on [...] Read more.
Cellular network data traffic can be offload onto opportunistic networks. This paper proposes a Distance-based Opportunistic Publish/Subscribe (DOPS) content dissemination model, which is composed of three layers: application layer, decision-making layer and network layer. When a user wants new content, he/she subscribes on a subscribing server. Users having the contents decide whether to deliver the contents to the subscriber based on the distance information. If in the meantime a content owner has traveled further in the immediate past time than the distance between the owner and the subscriber, the content owner will send the content to the subscriber through opportunistic routing. Simulations provide an evaluation of the data traffic offloading efficiency of DOPS. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

5069 KiB  
Article
A Task-Centric Cooperative Sensing Scheme for Mobile Crowdsourcing Systems
by Ziwei Liu, Xiaoguang Niu, Xu Lin, Ting Huang, Yunlong Wu and Hui Li
Sensors 2016, 16(5), 746; https://doi.org/10.3390/s16050746 - 23 May 2016
Cited by 9 | Viewed by 4971
Abstract
In a densely distributed mobile crowdsourcing system, data collected by neighboring participants often exhibit strong spatial correlations. By exploiting this property, one may employ a portion of the users as active participants and set the other users as idling ones without compromising the [...] Read more.
In a densely distributed mobile crowdsourcing system, data collected by neighboring participants often exhibit strong spatial correlations. By exploiting this property, one may employ a portion of the users as active participants and set the other users as idling ones without compromising the quality of sensing or the connectivity of the network. In this work, two participant selection questions are considered: (a) how to recruit an optimal number of users as active participants to guarantee that the overall sensing data integrity is kept above a preset threshold; and (b) how to recruit an optimal number of participants with some inaccurate data so that the fairness of selection and resource conservation can be achieved while maintaining sufficient sensing data integrity. For question (a), we propose a novel task-centric approach to explicitly exploit data correlation among participants. This subset selection problem is regarded as a constrained optimization problem and we propose an efficient polynomial time algorithm to solve it. For question (b), we formulate this set partitioning problem as a constrained min-max optimization problem. A solution using an improved version of the polynomial time algorithm is proposed based on (a). We validate these algorithms using a publicly available Intel-Berkeley lab sensing dataset and satisfactory performance is achieved. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

904 KiB  
Article
Optimizing Retransmission Threshold in Wireless Sensor Networks
by Ran Bi, Yingshu Li, Guozhen Tan and Liang Sun
Sensors 2016, 16(5), 665; https://doi.org/10.3390/s16050665 - 10 May 2016
Cited by 5 | Viewed by 4483
Abstract
The retransmission threshold in wireless sensor networks is critical to the latency of data delivery in the networks. However, existing works on data transmission in sensor networks did not consider the optimization of the retransmission threshold, and they simply set the same retransmission [...] Read more.
The retransmission threshold in wireless sensor networks is critical to the latency of data delivery in the networks. However, existing works on data transmission in sensor networks did not consider the optimization of the retransmission threshold, and they simply set the same retransmission threshold for all sensor nodes in advance. The method did not take link quality and delay requirement into account, which decreases the probability of a packet passing its delivery path within a given deadline. This paper investigates the problem of finding optimal retransmission thresholds for relay nodes along a delivery path in a sensor network. The object of optimizing retransmission thresholds is to maximize the summation of the probability of the packet being successfully delivered to the next relay node or destination node in time. A dynamic programming-based distributed algorithm for finding optimal retransmission thresholds for relay nodes along a delivery path in the sensor network is proposed. The time complexity is O n Δ · max 1 i n { u i } , where u i is the given upper bound of the retransmission threshold of sensor node i in a given delivery path, n is the length of the delivery path and Δ is the given upper bound of the transmission delay of the delivery path. If Δ is greater than the polynomial, to reduce the time complexity, a linear programming-based ( 1 + p m i n ) -approximation algorithm is proposed. Furthermore, when the ranges of the upper and lower bounds of retransmission thresholds are big enough, a Lagrange multiplier-based distributed O ( 1 ) -approximation algorithm with time complexity O ( 1 ) is proposed. Experimental results show that the proposed algorithms have better performance. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

1359 KiB  
Article
Healthcare4VideoStorm: Making Smart Decisions Based on Storm Metrics
by Weishan Zhang, Pengcheng Duan, Xiufeng Chen and Qinghua Lu
Sensors 2016, 16(4), 588; https://doi.org/10.3390/s16040588 - 23 Apr 2016
Viewed by 5841
Abstract
Storm-based stream processing is widely used for real-time large-scale distributed processing. Knowing the run-time status and ensuring performance is critical to providing expected dependability for some applications, e.g., continuous video processing for security surveillance. The existing scheduling strategies’ granularity is too coarse to [...] Read more.
Storm-based stream processing is widely used for real-time large-scale distributed processing. Knowing the run-time status and ensuring performance is critical to providing expected dependability for some applications, e.g., continuous video processing for security surveillance. The existing scheduling strategies’ granularity is too coarse to have good performance, and mainly considers network resources without computing resources while scheduling. In this paper, we propose Healthcare4Storm, a framework that finds Storm insights based on Storm metrics to gain knowledge from the health status of an application, finally ending up with smart scheduling decisions. It takes into account both network and computing resources and conducts scheduling at a fine-grained level using tuples instead of topologies. The comprehensive evaluation shows that the proposed framework has good performance and can improve the dependability of the Storm-based applications. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

3314 KiB  
Article
Towards A Self Adaptive System for Social Wellness
by Asad Masood Khattak, Wajahat Ali Khan, Zeeshan Pervez, Farkhund Iqbal and Sungyoung Lee
Sensors 2016, 16(4), 531; https://doi.org/10.3390/s16040531 - 13 Apr 2016
Cited by 8 | Viewed by 8296
Abstract
Advancements in science and technology have highlighted the importance of robust healthcare services, lifestyle services and personalized recommendations. For this purpose patient daily life activity recognition, profile information, and patient personal experience are required. In this research work we focus on the improvement [...] Read more.
Advancements in science and technology have highlighted the importance of robust healthcare services, lifestyle services and personalized recommendations. For this purpose patient daily life activity recognition, profile information, and patient personal experience are required. In this research work we focus on the improvement in general health and life status of the elderly through the use of an innovative services to align dietary intake with daily life and health activity information. Dynamic provisioning of personalized healthcare and life-care services are based on the patient daily life activities recognized using smart phone. To achieve this, an ontology-based approach is proposed, where all the daily life activities and patient profile information are modeled in ontology. Then the semantic context is exploited with an inference mechanism that enables fine-grained situation analysis for personalized service recommendations. A generic system architecture is proposed that facilitates context information storage and exchange, profile information, and the newly recognized activities. The system exploits the patient’s situation using semantic inference and provides recommendations for appropriate nutrition and activity related services. The proposed system is extensively evaluated for the claims and for its dynamic nature. The experimental results are very encouraging and have shown better accuracy than the existing system. The proposed system has also performed better in terms of the system support for a dynamic knowledge-base and the personalized recommendations. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

1906 KiB  
Article
A Novel Optimal Joint Resource Allocation Method in Cooperative Multicarrier Networks: Theory and Practice
by Yuan Gao, Weigui Zhou, Hong Ao, Jian Chu, Quan Zhou, Bo Zhou, Kang Wang, Yi Li and Peng Xue
Sensors 2016, 16(4), 522; https://doi.org/10.3390/s16040522 - 12 Apr 2016
Cited by 5 | Viewed by 5904
Abstract
With the increasing demands for better transmission speed and robust quality of service (QoS), the capacity constrained backhaul gradually becomes a bottleneck in cooperative wireless networks, e.g., in the Internet of Things (IoT) scenario in joint processing mode of LTE-Advanced Pro. This paper [...] Read more.
With the increasing demands for better transmission speed and robust quality of service (QoS), the capacity constrained backhaul gradually becomes a bottleneck in cooperative wireless networks, e.g., in the Internet of Things (IoT) scenario in joint processing mode of LTE-Advanced Pro. This paper focuses on resource allocation within capacity constrained backhaul in uplink cooperative wireless networks, where two base stations (BSs) equipped with single antennae serve multiple single-antennae users via multi-carrier transmission mode. In this work, we propose a novel cooperative transmission scheme based on compress-and-forward with user pairing to solve the joint mixed integer programming problem. To maximize the system capacity under the limited backhaul, we formulate the joint optimization problem of user sorting, subcarrier mapping and backhaul resource sharing among different pairs (subcarriers for users). A novel robust and efficient centralized algorithm based on alternating optimization strategy and perfect mapping is proposed. Simulations show that our novel method can improve the system capacity significantly under the constraint of the backhaul resource compared with the blind alternatives. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Graphical abstract

701 KiB  
Article
Data Collection for Mobile Group Consumption: An Asynchronous Distributed Approach
by Weiping Zhu, Weiran Chen, Zhejie Hu, Zuoyou Li, Yue Liang and Jiaojiao Chen
Sensors 2016, 16(4), 482; https://doi.org/10.3390/s16040482 - 6 Apr 2016
Cited by 2 | Viewed by 4318
Abstract
Mobile group consumption refers to consumption by a group of people, such as a couple, a family, colleagues and friends, based on mobile communications. It differs from consumption only involving individuals, because of the complex relations among group members. Existing data collection systems [...] Read more.
Mobile group consumption refers to consumption by a group of people, such as a couple, a family, colleagues and friends, based on mobile communications. It differs from consumption only involving individuals, because of the complex relations among group members. Existing data collection systems for mobile group consumption are centralized, which has the disadvantages of being a performance bottleneck, having single-point failure and increasing business and security risks. Moreover, these data collection systems are based on a synchronized clock, which is often unrealistic because of hardware constraints, privacy concerns or synchronization cost. In this paper, we propose the first asynchronous distributed approach to collecting data generated by mobile group consumption. We formally built a system model thereof based on asynchronous distributed communication. We then designed a simulation system for the model for which we propose a three-layer solution framework. After that, we describe how to detect the causality relation of two/three gathering events that happened in the system based on the collected data. Various definitions of causality relations based on asynchronous distributed communication are supported. Extensive simulation results show that the proposed approach is effective for data collection relating to mobile group consumption. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Graphical abstract

844 KiB  
Article
Evaluation of Smartphone Inertial Sensor Performance for Cross-Platform Mobile Applications
by Anton Kos, Sašo Tomažič and Anton Umek
Sensors 2016, 16(4), 477; https://doi.org/10.3390/s16040477 - 4 Apr 2016
Cited by 54 | Viewed by 8868
Abstract
Smartphone sensors are being increasingly used in mobile applications. The performance of sensors varies considerably among different smartphone models and the development of a cross-platform mobile application might be a very complex and demanding task. A publicly accessible resource containing real-life-situation smartphone sensor [...] Read more.
Smartphone sensors are being increasingly used in mobile applications. The performance of sensors varies considerably among different smartphone models and the development of a cross-platform mobile application might be a very complex and demanding task. A publicly accessible resource containing real-life-situation smartphone sensor parameters could be of great help for cross-platform developers. To address this issue we have designed and implemented a pilot participatory sensing application for measuring, gathering, and analyzing smartphone sensor parameters. We start with smartphone accelerometer and gyroscope bias and noise parameters. The application database presently includes sensor parameters of more than 60 different smartphone models of different platforms. It is a modest, but important start, offering information on several statistical parameters of the measured smartphone sensors and insights into their performance. The next step, a large-scale cloud-based version of the application, is already planned. The large database of smartphone sensor parameters may prove particularly useful for cross-platform developers. It may also be interesting for individual participants who would be able to check-up and compare their smartphone sensors against a large number of similar or identical models. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Graphical abstract

550 KiB  
Article
Dynamic RACH Partition for Massive Access of Differentiated M2M Services
by Qinghe Du, Wanyu Li, Lingjia Liu, Pinyi Ren, Yichen Wang and Li Sun
Sensors 2016, 16(4), 455; https://doi.org/10.3390/s16040455 - 30 Mar 2016
Cited by 18 | Viewed by 6067
Abstract
In machine-to-machine (M2M) networks, a key challenge is to overcome the overload problem caused by random access requests from massive machine-type communication (MTC) devices. When differentiated services coexist, such as delay-sensitive and delay-tolerant services, the problem becomes more complicated and challenging. This is [...] Read more.
In machine-to-machine (M2M) networks, a key challenge is to overcome the overload problem caused by random access requests from massive machine-type communication (MTC) devices. When differentiated services coexist, such as delay-sensitive and delay-tolerant services, the problem becomes more complicated and challenging. This is because delay-sensitive services often use more aggressive policies, and thus, delay-tolerant services get much fewer chances to access the network. To conquer the problem, we propose an efficient mechanism for massive access control over differentiated M2M services, including delay-sensitive and delay-tolerant services. Specifically, based on the traffic loads of the two types of services, the proposed scheme dynamically partitions and allocates the random access channel (RACH) resource to each type of services. The RACH partition strategy is thoroughly optimized to increase the access performances of M2M networks. Analyses and simulation demonstrate the effectiveness of our design. The proposed scheme can outperform the baseline access class barring (ACB) scheme, which ignores service types in access control, in terms of access success probability and the average access delay. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

856 KiB  
Article
Geometry-Based Distributed Spatial Skyline Queries in Wireless Sensor Networks
by Yan Wang, Baoyan Song, Junlu Wang, Li Zhang and Ling Wang
Sensors 2016, 16(4), 454; https://doi.org/10.3390/s16040454 - 29 Mar 2016
Cited by 8 | Viewed by 5213
Abstract
Algorithms for skyline querying based on wireless sensor networks (WSNs) have been widely used in the field of environmental monitoring. Because of the multi-dimensional nature of the problem of monitoring spatial position, traditional skyline query strategies cause enormous computational costs and energy consumption. [...] Read more.
Algorithms for skyline querying based on wireless sensor networks (WSNs) have been widely used in the field of environmental monitoring. Because of the multi-dimensional nature of the problem of monitoring spatial position, traditional skyline query strategies cause enormous computational costs and energy consumption. To ensure the efficient use of sensor energy, a geometry-based distributed spatial query strategy (GDSSky) is proposed in this paper. Firstly, the paper presents a geometry-based region partition strategy. It uses the skyline area reduction method based on the convex hull vertices, to quickly query the spatial skyline data related to a specific query area, and proposes a regional partition strategy based on the triangulation method, to implement distributed queries in each sub-region and reduce the comparison times between nodes. Secondly, a sub-region clustering strategy is designed to group the data inside into clusters for parallel queries that can save time. Finally, the paper presents a distributed query strategy based on the data node tree to traverse all adjacent sensors’ monitoring locations. It conducts spatial skyline queries for spatial skyline data that have been obtained and not found respectively, so as to realize the parallel queries. A large number of simulation results shows that GDSSky can quickly return the places which are nearer to query locations and have larger pollution capacity, and significantly reduce the WSN energy consumption. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Graphical abstract

1397 KiB  
Article
A Sensitive Secondary Users Selection Algorithm for Cognitive Radio Ad Hoc Networks
by Aohan Li, Guangjie Han, Liangtian Wan and Lei Shu
Sensors 2016, 16(4), 445; https://doi.org/10.3390/s16040445 - 26 Mar 2016
Cited by 8 | Viewed by 6193
Abstract
Secondary Users (SUs) are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs) in Cognitive Radio Ad Hoc Networks (CRAHNs). Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs) on SUs. However, the advanced CRs will increase energy cost [...] Read more.
Secondary Users (SUs) are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs) in Cognitive Radio Ad Hoc Networks (CRAHNs). Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs) on SUs. However, the advanced CRs will increase energy cost for their cognitive functionalities, which is undesirable for the battery powered devices. A new architecture referred to as spectral Requirement-based CRAHN (RCRAHN) is proposed to enhance energy efficiency for CRAHNs in this paper. In RCRAHNs, only parts of SUs are equipped with CRs. SUs equipped with CRs are referred to as Cognitive Radio Users (CRUs). To further enhance energy efficiency of CRAHNs, we aim to select minimum CRUs to sense available spectrum. A non-linear programming problem is mathematically formulated under the constraints of energy efficiency and real-time. Considering the NP-hardness of the problem, a framework of a heuristic algorithm referred to as Sensitive Secondary Users Selection (SSUS) was designed to compute the near-optimal solutions. The simulation results demonstrate that SSUS not only improves the energy efficiency, but also achieves satisfied performances in end-to-end delay and communication reliability. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

1920 KiB  
Article
LS Channel Estimation and Signal Separation for UHF RFID Tag Collision Recovery on the Physical Layer
by Hanjun Duan, Haifeng Wu, Yu Zeng and Yuebin Chen
Sensors 2016, 16(4), 442; https://doi.org/10.3390/s16040442 - 26 Mar 2016
Cited by 3 | Viewed by 5473
Abstract
In a passive ultra-high frequency (UHF) radio-frequency identification (RFID) system, tag collision is generally resolved on a medium access control (MAC) layer. However, some of collided tag signals could be recovered on a physical (PHY) layer and, thus, enhance the identification efficiency of [...] Read more.
In a passive ultra-high frequency (UHF) radio-frequency identification (RFID) system, tag collision is generally resolved on a medium access control (MAC) layer. However, some of collided tag signals could be recovered on a physical (PHY) layer and, thus, enhance the identification efficiency of the RFID system. For the recovery on the PHY layer, channel estimation is a critical issue. Good channel estimation will help to recover the collided signals. Existing channel estimates work well for two collided tags. When the number of collided tags is beyond two, however, the existing estimates have more estimation errors. In this paper, we propose a novel channel estimate for the UHF RFID system. It adopts an orthogonal matrix based on the information of preambles which is known for a reader and applies a minimum-mean-square-error (MMSE) criterion to estimate channels. From the estimated channel, we could accurately separate the collided signals and recover them. By means of numerical results, we show that the proposed estimate has lower estimation errors and higher separation efficiency than the existing estimates. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

888 KiB  
Article
Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks
by Zhen Li, Tao Jing, Liran Ma, Yan Huo and Jin Qian
Sensors 2016, 16(3), 339; https://doi.org/10.3390/s16030339 - 7 Mar 2016
Cited by 23 | Viewed by 6604
Abstract
The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely [...] Read more.
The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers) may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR) at the eavesdropper subject to the Quality of Service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI). By using Semi-Definite Programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme. The proposed auction framework jointly formulates the helper selection and the corresponding energy allocation problems under the constraint of the eavesdropper's SINR. By adopting the Vickrey auction, truthfulness and individual rationality can be achieved. Simulation results demonstrate the effective performance of the cooperative jamming scheme and the auction framework. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

1823 KiB  
Article
Device Data Ingestion for Industrial Big Data Platforms with a Case Study
by Cun Ji, Qingshi Shao, Jiao Sun, Shijun Liu, Li Pan, Lei Wu and Chenglei Yang
Sensors 2016, 16(3), 279; https://doi.org/10.3390/s16030279 - 26 Feb 2016
Cited by 38 | Viewed by 8922
Abstract
Despite having played a significant role in the Industry 4.0 era, the Internet of Things is currently faced with the challenge of how to ingest large-scale heterogeneous and multi-type device data. In response to this problem we present a heterogeneous device data ingestion [...] Read more.
Despite having played a significant role in the Industry 4.0 era, the Internet of Things is currently faced with the challenge of how to ingest large-scale heterogeneous and multi-type device data. In response to this problem we present a heterogeneous device data ingestion model for an industrial big data platform. The model includes device templates and four strategies for data synchronization, data slicing, data splitting and data indexing, respectively. We can ingest device data from multiple sources with this heterogeneous device data ingestion model, which has been verified on our industrial big data platform. In addition, we present a case study on device data-based scenario analysis of industrial big data. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

3147 KiB  
Article
An Efficient Virtual Machine Consolidation Scheme for Multimedia Cloud Computing
by Guangjie Han, Wenhui Que, Gangyong Jia and Lei Shu
Sensors 2016, 16(2), 246; https://doi.org/10.3390/s16020246 - 18 Feb 2016
Cited by 90 | Viewed by 10380
Abstract
Cloud computing has innovated the IT industry in recent years, as it can delivery subscription-based services to users in the pay-as-you-go model. Meanwhile, multimedia cloud computing is emerging based on cloud computing to provide a variety of media services on the Internet. However, [...] Read more.
Cloud computing has innovated the IT industry in recent years, as it can delivery subscription-based services to users in the pay-as-you-go model. Meanwhile, multimedia cloud computing is emerging based on cloud computing to provide a variety of media services on the Internet. However, with the growing popularity of multimedia cloud computing, its large energy consumption cannot only contribute to greenhouse gas emissions, but also result in the rising of cloud users’ costs. Therefore, the multimedia cloud providers should try to minimize its energy consumption as much as possible while satisfying the consumers’ resource requirements and guaranteeing quality of service (QoS). In this paper, we have proposed a remaining utilization-aware (RUA) algorithm for virtual machine (VM) placement, and a power-aware algorithm (PA) is proposed to find proper hosts to shut down for energy saving. These two algorithms have been combined and applied to cloud data centers for completing the process of VM consolidation. Simulation results have shown that there exists a trade-off between the cloud data center’s energy consumption and service-level agreement (SLA) violations. Besides, the RUA algorithm is able to deal with variable workload to prevent hosts from overloading after VM placement and to reduce the SLA violations dramatically. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

508 KiB  
Article
Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility
by Jianhui Huang, Xiuzhen Cheng, Jingping Bi and Biao Chen
Sensors 2016, 16(1), 94; https://doi.org/10.3390/s16010094 - 18 Jan 2016
Cited by 6 | Viewed by 5214
Abstract
Pocket switched networks (PSNs) take advantage of human mobility to deliver data. Investigations on real-world trace data indicate that human mobility shows an obvious spatial regularity: a human being usually visits a few places at high frequencies. These most frequently visited places form [...] Read more.
Pocket switched networks (PSNs) take advantage of human mobility to deliver data. Investigations on real-world trace data indicate that human mobility shows an obvious spatial regularity: a human being usually visits a few places at high frequencies. These most frequently visited places form the home of a node, which is exploited in this paper to design two HomE based Relay selectiOn (HERO) algorithms. Both algorithms input single data copy into the network at any time. In the basic HERO, only the first node encountered by the source and whose home overlaps a destination’s home is selected as a relay while the enhanced HERO keeps finding more optimal relay that visits the destination’s home with higher probability. The two proposed algorithms only require the relays to exchange the information of their home and/or the visiting frequencies to their home when two nodes meet. As a result, the information update is reduced and there is no global status information that needs to be maintained. This causes light loads on relays because of the low communication cost and storage requirements. Additionally, only simple operations are needed in the two proposed algorithms, resulting in little computation overhead at relays. At last, a theoretical analysis is performed on some key metrics and then the real-world based simulations indicate that the two HERO algorithms are efficient and effective through employing only one or a few relays. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

478 KiB  
Article
On Connected Target k-Coverage in Heterogeneous Wireless Sensor Networks
by Jiguo Yu, Ying Chen, Liran Ma, Baogui Huang and Xiuzhen Cheng
Sensors 2016, 16(1), 104; https://doi.org/10.3390/s16010104 - 15 Jan 2016
Cited by 52 | Viewed by 6927
Abstract
Coverage and connectivity are two important performance evaluation indices for wireless sensor networks (WSNs). In this paper, we focus on the connected target k-coverage (CTC k ) problem in heterogeneous wireless sensor networks (HWSNs). A centralized connected target k-coverage algorithm (CCTC k ) [...] Read more.
Coverage and connectivity are two important performance evaluation indices for wireless sensor networks (WSNs). In this paper, we focus on the connected target k-coverage (CTC k ) problem in heterogeneous wireless sensor networks (HWSNs). A centralized connected target k-coverage algorithm (CCTC k ) and a distributed connected target k-coverage algorithm (DCTC k ) are proposed so as to generate connected cover sets for energy-efficient connectivity and coverage maintenance. To be specific, our proposed algorithms aim at achieving minimum connected target k-coverage, where each target in the monitored region is covered by at least k active sensor nodes. In addition, these two algorithms strive to minimize the total number of active sensor nodes and guarantee that each sensor node is connected to a sink, such that the sensed data can be forwarded to the sink. Our theoretical analysis and simulation results show that our proposed algorithms outperform a state-of-art connected k-coverage protocol for HWSNs. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

728 KiB  
Article
Event Coverage Detection and Event Source Determination in Underwater Wireless Sensor Networks
by Zhangbing Zhou, Riliang Xing, Yucong Duan, Yueqin Zhu and Jianming Xiang
Sensors 2015, 15(12), 31620-31643; https://doi.org/10.3390/s151229875 - 15 Dec 2015
Cited by 17 | Viewed by 5284
Abstract
With the advent of the Internet of Underwater Things, smart things are deployed in the ocean space and establish underwater wireless sensor networks for the monitoring of vast and dynamic underwater environments. When events are found to have possibly occurred, accurate event coverage [...] Read more.
With the advent of the Internet of Underwater Things, smart things are deployed in the ocean space and establish underwater wireless sensor networks for the monitoring of vast and dynamic underwater environments. When events are found to have possibly occurred, accurate event coverage should be detected, and potential event sources should be determined for the enactment of prompt and proper responses. To address this challenge, a technique that detects event coverage and determines event sources is developed in this article. Specifically, the occurrence of possible events corresponds to a set of neighboring sensor nodes whose sensory data may deviate from a normal sensing range in a collective fashion. An appropriate sensor node is selected as the relay node for gathering and routing sensory data to sink node(s). When sensory data are collected at sink node(s), the event coverage is detected and represented as a weighted graph, where the vertices in this graph correspond to sensor nodes and the weight specified upon the edges reflects the extent of sensory data deviating from a normal sensing range. Event sources are determined, which correspond to the barycenters in this graph. The results of the experiments show that our technique is more energy efficient, especially when the network topology is relatively steady. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

557 KiB  
Article
Energy-Efficient Algorithm for Multicasting in Duty-Cycled Sensor Networks
by Quan Chen, Siyao Cheng, Hong Gao, Jianzhong Li and Zhipeng Cai
Sensors 2015, 15(12), 31224-31243; https://doi.org/10.3390/s151229860 - 11 Dec 2015
Cited by 22 | Viewed by 5088
Abstract
Multicasting is a fundamental network service for one-to-many communications in wireless sensor networks. However, when the sensor nodes work in an asynchronous duty-cycled way, the sender may need to transmit the same message several times to one group of its neighboring nodes, which [...] Read more.
Multicasting is a fundamental network service for one-to-many communications in wireless sensor networks. However, when the sensor nodes work in an asynchronous duty-cycled way, the sender may need to transmit the same message several times to one group of its neighboring nodes, which complicates the minimum energy multicasting problem. Thus, in this paper, we study the problem of minimum energy multicasting with adjusted power (the MEMAP problem) in the duty-cycled sensor networks, and we prove it to be NP-hard. To solve such a problem, the concept of an auxiliary graph is proposed to integrate the scheduling problem of the transmitting power and transmitting time slot and the constructing problem of the minimum multicast tree in MEMAP, and a greedy algorithm is proposed to construct such a graph. Based on the proposed auxiliary graph, an approximate scheduling and constructing algorithm with an approximation ratio of 4 l n K is proposed, where K is the number of destination nodes. Finally, the theoretical analysis and experimental results verify the efficiency of the proposed algorithm in terms of the energy cost and transmission redundancy. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

2959 KiB  
Article
Abnormal Condition Monitoring of Workpieces Based on RFID for Wisdom Manufacturing Workshops
by Cunji Zhang, Xifan Yao and Jianming Zhang
Sensors 2015, 15(12), 30165-30186; https://doi.org/10.3390/s151229789 - 3 Dec 2015
Cited by 10 | Viewed by 9358
Abstract
Radio Frequency Identification (RFID) technology has been widely used in many fields. However, previous studies have mainly focused on product life cycle tracking, and there are few studies on real-time status monitoring of workpieces in manufacturing workshops. In this paper, a wisdom manufacturing [...] Read more.
Radio Frequency Identification (RFID) technology has been widely used in many fields. However, previous studies have mainly focused on product life cycle tracking, and there are few studies on real-time status monitoring of workpieces in manufacturing workshops. In this paper, a wisdom manufacturing model is introduced, a sensing-aware environment for a wisdom manufacturing workshop is constructed, and RFID event models are defined. A synthetic data cleaning method is applied to clean the raw RFID data. The Complex Event Processing (CEP) technology is adopted to monitor abnormal conditions of workpieces in real time. The RFID data cleaning method and data mining technology are examined by simulation and physical experiments. The results show that the synthetic data cleaning method preprocesses data well. The CEP based on the Rifidi® Edge Server technology completed abnormal condition monitoring of workpieces in real time. This paper reveals the importance of RFID spatial and temporal data analysis in real-time status monitoring of workpieces in wisdom manufacturing workshops. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

1458 KiB  
Article
A Passive Testing Approach for Protocols in Wireless Sensor Networks
by Xiaoping Che, Stephane Maag, Hwee-Xian Tan, Hwee-Pink Tan and Zhangbing Zhou
Sensors 2015, 15(11), 29250-29272; https://doi.org/10.3390/s151129250 - 19 Nov 2015
Cited by 3 | Viewed by 5338
Abstract
Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and [...] Read more.
Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

1066 KiB  
Article
A Timing Estimation Method Based-on Skewness Analysis in Vehicular Wireless Networks
by Xuerong Cui, Juan Li, Chunlei Wu and Jian-Hang Liu
Sensors 2015, 15(11), 28942-28959; https://doi.org/10.3390/s151128942 - 13 Nov 2015
Cited by 5 | Viewed by 4521
Abstract
Vehicle positioning technology has drawn more and more attention in vehicular wireless networks to reduce transportation time and traffic accidents. Nowadays, global navigation satellite systems (GNSS) are widely used in land vehicle positioning, but most of them are lack precision and reliability in [...] Read more.
Vehicle positioning technology has drawn more and more attention in vehicular wireless networks to reduce transportation time and traffic accidents. Nowadays, global navigation satellite systems (GNSS) are widely used in land vehicle positioning, but most of them are lack precision and reliability in situations where their signals are blocked. Positioning systems base-on short range wireless communication are another effective way that can be used in vehicle positioning or vehicle ranging. IEEE 802.11p is a new real-time short range wireless communication standard for vehicles, so a new method is proposed to estimate the time delay or ranges between vehicles based on the IEEE 802.11p standard which includes three main steps: cross-correlation between the received signal and the short preamble, summing up the correlated results in groups, and finding the maximum peak using a dynamic threshold based on the skewness analysis. With the range between each vehicle or road-side infrastructure, the position of neighboring vehicles can be estimated correctly. Simulation results were presented in the International Telecommunications Union (ITU) vehicular multipath channel, which show that the proposed method provides better precision than some well-known timing estimation techniques, especially in low signal to noise ratio (SNR) environments. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

739 KiB  
Article
A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks
by Shalli Rani, Rajneesh Talwar, Jyoteesh Malhotra, Syed Hassan Ahmed, Mahasweta Sarkar and Houbing Song
Sensors 2015, 15(11), 28603-28626; https://doi.org/10.3390/s151128603 - 12 Nov 2015
Cited by 184 | Viewed by 13113
Abstract
One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by [...] Read more.
One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

1038 KiB  
Article
Harvesting Entropy for Random Number Generation for Internet of Things Constrained Devices Using On-Board Sensors
by Marcin Piotr Pawlowski, Antonio Jara and Maciej Ogorzalek
Sensors 2015, 15(10), 26838-26865; https://doi.org/10.3390/s151026838 - 22 Oct 2015
Cited by 10 | Viewed by 6340
Abstract
Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In [...] Read more.
Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In constrained devices of the Internet of Things ecosystem, high entropy random number generators are hard to achieve due to hardware limitations. For the purpose of the random number generation in constrained devices, this work proposes a solution based on the least-significant bits concatenation entropy harvesting method. As a potential source of entropy, on-board integrated sensors (i.e., temperature, humidity and two different light sensors) have been analyzed. Additionally, the costs (i.e., time and memory consumption) of the presented approach have been measured. The results obtained from the proposed method with statistical fine tuning achieved a Shannon entropy of around 7.9 bits per byte of data for temperature and humidity sensors. The results showed that sensor-based random number generators are a valuable source of entropy with very small RAM and Flash memory requirements for constrained devices of the Internet of Things. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

910 KiB  
Article
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks
by Raghav V. Sampangi and Srinivas Sampalli
Sensors 2015, 15(9), 23145-23167; https://doi.org/10.3390/s150923145 - 15 Sep 2015
Cited by 10 | Viewed by 6110
Abstract
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, [...] Read more.
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

1648 KiB  
Article
A Self-Assessment Stereo Capture Model Applicable to the Internet of Things
by Yancong Lin, Jiachen Yang, Zhihan Lv, Wei Wei and Houbing Song
Sensors 2015, 15(8), 20925-20944; https://doi.org/10.3390/s150820925 - 21 Aug 2015
Cited by 177 | Viewed by 9079
Abstract
The realization of the Internet of Things greatly depends on the information communication among physical terminal devices and informationalized platforms, such as smart sensors, embedded systems and intelligent networks. Playing an important role in information acquisition, sensors for stereo capture have gained extensive [...] Read more.
The realization of the Internet of Things greatly depends on the information communication among physical terminal devices and informationalized platforms, such as smart sensors, embedded systems and intelligent networks. Playing an important role in information acquisition, sensors for stereo capture have gained extensive attention in various fields. In this paper, we concentrate on promoting such sensors in an intelligent system with self-assessment capability to deal with the distortion and impairment in long-distance shooting applications. The core design is the establishment of the objective evaluation criteria that can reliably predict shooting quality with different camera configurations. Two types of stereo capture systems—toed-in camera configuration and parallel camera configuration—are taken into consideration respectively. The experimental results show that the proposed evaluation criteria can effectively predict the visual perception of stereo capture quality for long-distance shooting. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

500 KiB  
Article
Towards a Low-Cost Remote Memory Attestation for the Smart Grid
by Xinyu Yang, Xiaofei He, Wei Yu, Jie Lin, Rui Li, Qingyu Yang and Houbing Song
Sensors 2015, 15(8), 20799-20824; https://doi.org/10.3390/s150820799 - 21 Aug 2015
Cited by 43 | Viewed by 7491
Abstract
In the smart grid, measurement devices may be compromised by adversaries, and their operations could be disrupted by attacks. A number of schemes to efficiently and accurately detect these compromised devices remotely have been proposed. Nonetheless, most of the existing schemes detecting compromised [...] Read more.
In the smart grid, measurement devices may be compromised by adversaries, and their operations could be disrupted by attacks. A number of schemes to efficiently and accurately detect these compromised devices remotely have been proposed. Nonetheless, most of the existing schemes detecting compromised devices depend on the incremental response time in the attestation process, which are sensitive to data transmission delay and lead to high computation and network overhead. To address the issue, in this paper, we propose a low-cost remote memory attestation scheme (LRMA), which can efficiently and accurately detect compromised smart meters considering real-time network delay and achieve low computation and network overhead. In LRMA, the impact of real-time network delay on detecting compromised nodes can be eliminated via investigating the time differences reported from relay nodes. Furthermore, the attestation frequency in LRMA is dynamically adjusted with the compromised probability of each node, and then, the total number of attestations could be reduced while low computation and network overhead can be achieved. Through a combination of extensive theoretical analysis and evaluations, our data demonstrate that our proposed scheme can achieve better detection capacity and lower computation and network overhead in comparison to existing schemes. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

796 KiB  
Article
Statistical Analysis of the Performance of MDL Enumeration for Multiple-Missed Detection in Array Processing
by Fei Du, Yibo Li and Shijiu Jin
Sensors 2015, 15(8), 20250-20266; https://doi.org/10.3390/s150820250 - 18 Aug 2015
Viewed by 4899
Abstract
An accurate performance analysis on the MDL criterion for source enumeration in array processing is presented in this paper. The enumeration results of MDL can be predicted precisely by the proposed procedure via the statistical analysis of the sample eigenvalues, whose distributive properties [...] Read more.
An accurate performance analysis on the MDL criterion for source enumeration in array processing is presented in this paper. The enumeration results of MDL can be predicted precisely by the proposed procedure via the statistical analysis of the sample eigenvalues, whose distributive properties are investigated with the consideration of their interactions. A novel approach is also developed for the performance evaluation when the source number is underestimated by a number greater than one, which is denoted as “multiple-missed detection”, and the probability of a specific underestimated source number can be estimated by ratio distribution analysis. Simulation results are included to demonstrate the superiority of the presented method over available results and confirm the ability of the proposed approach to perform multiple-missed detection analysis. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Graphical abstract

1562 KiB  
Article
A Fast Robot Identification and Mapping Algorithm Based on Kinect Sensor
by Liang Zhang, Peiyi Shen, Guangming Zhu, Wei Wei and Houbing Song
Sensors 2015, 15(8), 19937-19967; https://doi.org/10.3390/s150819937 - 14 Aug 2015
Cited by 22 | Viewed by 7258
Abstract
Internet of Things (IoT) is driving innovation in an ever-growing set of application domains such as intelligent processing for autonomous robots. For an autonomous robot, one grand challenge is how to sense its surrounding environment effectively. The Simultaneous Localization and Mapping with RGB-D [...] Read more.
Internet of Things (IoT) is driving innovation in an ever-growing set of application domains such as intelligent processing for autonomous robots. For an autonomous robot, one grand challenge is how to sense its surrounding environment effectively. The Simultaneous Localization and Mapping with RGB-D Kinect camera sensor on robot, called RGB-D SLAM, has been developed for this purpose but some technical challenges must be addressed. Firstly, the efficiency of the algorithm cannot satisfy real-time requirements; secondly, the accuracy of the algorithm is unacceptable. In order to address these challenges, this paper proposes a set of novel improvement methods as follows. Firstly, the ORiented Brief (ORB) method is used in feature detection and descriptor extraction. Secondly, a bidirectional Fast Library for Approximate Nearest Neighbors (FLANN) k-Nearest Neighbor (KNN) algorithm is applied to feature match. Then, the improved RANdom SAmple Consensus (RANSAC) estimation method is adopted in the motion transformation. In the meantime, high precision General Iterative Closest Points (GICP) is utilized to register a point cloud in the motion transformation optimization. To improve the accuracy of SLAM, the reduced dynamic covariance scaling (DCS) algorithm is formulated as a global optimization problem under the G2O framework. The effectiveness of the improved algorithm has been verified by testing on standard data and comparing with the ground truth obtained on Freiburg University’s datasets. The Dr Robot X80 equipped with a Kinect camera is also applied in a building corridor to verify the correctness of the improved RGB-D SLAM algorithm. With the above experiments, it can be seen that the proposed algorithm achieves higher processing speed and better accuracy. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Figure 1

Review

Jump to: Research

846 KiB  
Review
Search Techniques for the Web of Things: A Taxonomy and Survey
by Yuchao Zhou, Suparna De, Wei Wang and Klaus Moessner
Sensors 2016, 16(5), 600; https://doi.org/10.3390/s16050600 - 27 Apr 2016
Cited by 56 | Viewed by 9290
Abstract
The Web of Things aims to make physical world objects and their data accessible through standard Web technologies to enable intelligent applications and sophisticated data analytics. Due to the amount and heterogeneity of the data, it is challenging to perform data analysis directly; [...] Read more.
The Web of Things aims to make physical world objects and their data accessible through standard Web technologies to enable intelligent applications and sophisticated data analytics. Due to the amount and heterogeneity of the data, it is challenging to perform data analysis directly; especially when the data is captured from a large number of distributed sources. However, the size and scope of the data can be reduced and narrowed down with search techniques, so that only the most relevant and useful data items are selected according to the application requirements. Search is fundamental to the Web of Things while challenging by nature in this context, e.g., mobility of the objects, opportunistic presence and sensing, continuous data streams with changing spatial and temporal properties, efficient indexing for historical and real time data. The research community has developed numerous techniques and methods to tackle these problems as reported by a large body of literature in the last few years. A comprehensive investigation of the current and past studies is necessary to gain a clear view of the research landscape and to identify promising future directions. This survey reviews the state-of-the-art search methods for the Web of Things, which are classified according to three different viewpoints: basic principles, data/knowledge representation, and contents being searched. Experiences and lessons learned from the existing work and some EU research projects related to Web of Things are discussed, and an outlook to the future research is presented. Full article
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Show Figures

Graphical abstract

Back to TopTop