- home
- Advanced Search
- Energy Research
- Sensors
- Energy Research
- Sensors
description Publicationkeyboard_double_arrow_right Article , Journal 2021Publisher:MDPI AG Rinki Rani; Sushil Kumar; Omprakash Kaiwartya; Ahmad M. Khasawneh; Jaime Lloret; Mahmoud Ahmad Al-Khasawneh; Marwan Mahmoud; Alaa Abdulsalm Alarood;Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that span several orders of magnitude in energy consumption and computation time, hence the sizes of the keys and signature are considered as another aspect of security by green design. To address these issues, the security solutions should migrate to the advanced and potent methods for protection against quantum attacks and offer energy efficient and faster cryptocomputations. In this context, a novel security framework Lightweight Postquantum ID-based Signature (LPQS) for secure communication in the IoE environment is presented. The proposed LPQS framework incorporates a supersingular isogeny curve to present a digital signature with small key sizes which is quantum-resistant. To reduce the size of the keys, compressed curves are used and the validation of the signature depends on the commutative property of the curves. The unforgeability of LPQS under an adaptively chosen message attack is proved. Security analysis and the experimental validation of LPQS are performed under a realistic software simulation environment to assess its lightweight performance considering embedded nodes. It is evident that the size of keys and the signature of LPQS is smaller than that of existing signature-based postquantum security techniques for IoE. It is robust in the postquantum environment and efficient in terms of energy and computations.
CORE arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2021License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s21051883&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 19 citations 19 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
visibility 19visibility views 19 download downloads 23 Powered bymore_vert CORE arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2021License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s21051883&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Other literature type , Journal 2019Publisher:MDPI AG Muhammad Sohail; Shafiullah Khan; Rashid Ahmad; Dhananjay Singh; Jaime Lloret;Internet of things (IoT) is a very important research area, having many applications such as smart cities, intelligent transportation system, tracing, and smart homes. The underlying technology for IoT are wireless sensor networks (WSN). The selection of cluster head (CH) is significant as a part of the WSN’s optimization in the context of energy consumption. In WSNs, the nodes operate on a very limited energy source, therefore, the routing protocols designed must meet the optimal utilization of energy consumption in such networks. Evolutionary games can be designed to meet this aspect by providing an adequately efficient CH selection mechanism. In such types of mechanisms, the network nodes are considered intelligent and independent to select their own strategies. However, the existing mechanisms do not consider a combination of many possible parameters associated with the smart nodes in WSNs, such as remaining energy, selfishness, hop-level, density, and degree of connectivity. In our work, we designed an evolutionary game-based approach for CH selection, combined with some vital parameters associated with sensor nodes and the entire networks. The nodes are assumed to be smart, therefore, the aspect of being selfish is also addressed in this work. The simulation results indicate that our work performs much better than typical evolutionary game-based approaches.
Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2019License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s19183835&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 24 citations 24 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
visibility 15visibility views 15 download downloads 24 Powered bymore_vert Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2019License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s19183835&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal 2020Publisher:MDPI AG Ahmad M. Khasawneh; Omprakash Kaiwartya; Jaime Lloret; Hayfa Y. Abuaddous; Laith Abualigah; Mohammad Al Shinwan; Mahmoud Ahmad Al-Khasawneh; Marwan Mahmoud; Rupak Kharel;In this paper, we propose a non-localization routing protocol for underwater wireless sensor networks (UWSNs), namely, the triangle metric based multi-layered routing protocol (TM2RP). The main idea of the proposed TM2RP is to utilize supernodes along with depth information and residual energy to balance the energy consumption between sensors. Moreover, TM2RP is the first multi-layered and multi-metric pressure routing protocol that considers link quality with residual energy to improve the selection of next forwarding nodes with more reliable and energy-efficient links. The aqua-sim package based on the ns-2 simulator was used to evaluate the performance of the proposed TM2RP. The obtained results were compared to other similar methods such as depth based routing (DBR) and multi-layered routing protocol (MRP). Simulation results showed that the proposed protocol (TM2RP) obtained better outcomes in terms of energy consumption, network lifetime, packet delivery ratio, and end-to-end delay.
Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2020License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s20247278&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 9 citations 9 popularity Top 10% influence Average impulse Top 10% Powered by BIP!
visibility 16visibility views 16 download downloads 19 Powered bymore_vert Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2020License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s20247278&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal 2014Publisher:MDPI AG Authors: Hongju Cheng; Zhihuang Su; Jaime Lloret; Guolong Chen;Future wireless sensor networks are expected to provide various sensing services and energy efficiency is one of the most important criterions. The node scheduling strategy aims to increase network lifetime by selecting a set of sensor nodes to provide the required sensing services in a periodic manner. In this paper, we are concerned with the service-oriented node scheduling problem to provide multiple sensing services while maximizing the network lifetime. We firstly introduce how to model the data correlation for different services by using Markov Random Field (MRF) model. Secondly, we formulate the service-oriented node scheduling issue into three different problems, namely, the multi-service data denoising problem which aims at minimizing the noise level of sensed data, the representative node selection problem concerning with selecting a number of active nodes while determining the services they provide, and the multi-service node scheduling problem which aims at maximizing the network lifetime. Thirdly, we propose a Multi-service Data Denoising (MDD) algorithm, a novel multi-service Representative node Selection and service Determination (RSD) algorithm, and a novel MRF-based Multi-service Node Scheduling (MMNS) scheme to solve the above three problems respectively. Finally, extensive experiments demonstrate that the proposed scheme efficiently extends the network lifetime.
Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2014License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s141120940&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 9 citations 9 popularity Top 10% influence Top 10% impulse Average Powered by BIP!
visibility 144visibility views 144 download downloads 198 Powered bymore_vert Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2014License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s141120940&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal 2021Publisher:MDPI AG Vinod Kumar; Sushil Kumar; Rabah AlShboul; Geetika Aggarwal; Omprakash Kaiwartya; Ahmad M. Khasawneh; Jaime Lloret; Mahmoud Ahmad Al-Khasawneh;Recently, green computing has received significant attention for Internet of Things (IoT) environments due to the growing computing demands under tiny sensor enabled smart services. The related literature on green computing majorly focuses on a cover set approach that works efficiently for target coverage, but it is not applicable in case of area coverage. In this paper, we present a new variant of a cover set approach called a grouping and sponsoring aware IoT framework (GS-IoT) that is suitable for area coverage. We achieve non-overlapping coverage for an entire sensing region employing sectorial sensing. Non-overlapping coverage not only guarantees a sufficiently good coverage in case of large number of sensors deployed randomly, but also maximizes the life span of the whole network with appropriate scheduling of sensors. A deployment model for distribution of sensors is developed to ensure a minimum threshold density of sensors in the sensing region. In particular, a fast converging grouping (FCG) algorithm is developed to group sensors in order to ensure minimal overlapping. A sponsoring aware sectorial coverage (SSC) algorithm is developed to set off redundant sensors and to balance the overall network energy consumption. GS-IoT framework effectively combines both the algorithms for smart services. The simulation experimental results attest to the benefit of the proposed framework as compared to the state-of-the-art techniques in terms of various metrics for smart IoT environments including rate of overlapping, response time, coverage, active sensors, and life span of the overall network.
CORE arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2021License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s21123948&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 11 citations 11 popularity Top 10% influence Average impulse Top 10% Powered by BIP!
visibility 16visibility views 16 download downloads 23 Powered bymore_vert CORE arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2021License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s21123948&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article 2022Publisher:MDPI AG Ibrahim Abunadi; Amjad Rehman; Khalid Haseeb; Lorena Parra; Jaime Lloret;In recent decades, networked smart devices and cutting-edge technology have been exploited in many applications for the improvement of agriculture. The deployment of smart sensors and intelligent farming techniques supports real-time information gathering for the agriculture sector and decreases the burden on farmers. Many solutions have been presented to automate the agriculture system using IoT networks; however, the identification of redundant data traffic is one of the most significant research problems. Additionally, farmers do not obtain the information they need in time, such as data on water pressure and soil conditions. Thus, these solutions consequently reduce the production rates and increase costs for farmers. Moreover, controlling all agricultural operations in a controlled manner should also be considered in developing intelligent solutions. Therefore, this study proposes a framework for a system that combines fog computing with smart farming and effectively controls network traffic. Firstly, the proposed framework efficiently monitors redundant information and avoids the inefficient use of communication bandwidth. It also controls the number of re-transmissions in the case of malicious actions and efficiently utilizes the network’s resources. Second, a trustworthy chain is built between agricultural sensors by utilizing the fog nodes to address security issues and increase reliability by preventing malicious communication. Through extensive simulation-based experiments, the proposed framework revealed an improved performance for energy efficiency, security, and network connectivity in comparison to other related works.
Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2022License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s22176676&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 9 citations 9 popularity Top 10% influence Average impulse Top 10% Powered by BIP!
more_vert Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2022License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s22176676&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article 2023Publisher:MDPI AG Safa Hamdare; Omprakash Kaiwartya; Mohammad Aljaidi; Manish Jugran; Yue Cao; Sushil Kumar; Mufti Mahmud; David Brown; Jaime Lloret;The increasing availability of Electric Vehicles (EVs) is driving a shift away from traditional gasoline-powered vehicles. Subsequently, the demand for Electric Vehicle Charging Systems (EVCS) is rising, leading to the significant growth of EVCS as public and private charging infrastructure. The cybersecurity-related risks in EVCS have significantly increased due to the growing network of EVCS. In this context, this paper presents a cybersecurity risk analysis of the network of EVCS. Firstly, the recent advancements in the EVCS network, recent EV adaptation trends, and charging use cases are described as a background of the research area. Secondly, cybersecurity aspects in EVCS have been presented considering infrastructure and protocol-centric vulnerabilities with possible cyber-attack scenarios. Thirdly, threats in EVCS have been validated with real-time data-centric analysis of EV charging sessions. The paper also highlights potential open research issues in EV cyber research as new knowledge for domain researchers and practitioners.
All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s23156716&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess Routesgold 43 citations 43 popularity Top 10% influence Top 10% impulse Top 1% Powered by BIP!
more_vert All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s23156716&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu
description Publicationkeyboard_double_arrow_right Article , Journal 2021Publisher:MDPI AG Rinki Rani; Sushil Kumar; Omprakash Kaiwartya; Ahmad M. Khasawneh; Jaime Lloret; Mahmoud Ahmad Al-Khasawneh; Marwan Mahmoud; Alaa Abdulsalm Alarood;Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that span several orders of magnitude in energy consumption and computation time, hence the sizes of the keys and signature are considered as another aspect of security by green design. To address these issues, the security solutions should migrate to the advanced and potent methods for protection against quantum attacks and offer energy efficient and faster cryptocomputations. In this context, a novel security framework Lightweight Postquantum ID-based Signature (LPQS) for secure communication in the IoE environment is presented. The proposed LPQS framework incorporates a supersingular isogeny curve to present a digital signature with small key sizes which is quantum-resistant. To reduce the size of the keys, compressed curves are used and the validation of the signature depends on the commutative property of the curves. The unforgeability of LPQS under an adaptively chosen message attack is proved. Security analysis and the experimental validation of LPQS are performed under a realistic software simulation environment to assess its lightweight performance considering embedded nodes. It is evident that the size of keys and the signature of LPQS is smaller than that of existing signature-based postquantum security techniques for IoE. It is robust in the postquantum environment and efficient in terms of energy and computations.
CORE arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2021License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s21051883&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 19 citations 19 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
visibility 19visibility views 19 download downloads 23 Powered bymore_vert CORE arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2021License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s21051883&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Other literature type , Journal 2019Publisher:MDPI AG Muhammad Sohail; Shafiullah Khan; Rashid Ahmad; Dhananjay Singh; Jaime Lloret;Internet of things (IoT) is a very important research area, having many applications such as smart cities, intelligent transportation system, tracing, and smart homes. The underlying technology for IoT are wireless sensor networks (WSN). The selection of cluster head (CH) is significant as a part of the WSN’s optimization in the context of energy consumption. In WSNs, the nodes operate on a very limited energy source, therefore, the routing protocols designed must meet the optimal utilization of energy consumption in such networks. Evolutionary games can be designed to meet this aspect by providing an adequately efficient CH selection mechanism. In such types of mechanisms, the network nodes are considered intelligent and independent to select their own strategies. However, the existing mechanisms do not consider a combination of many possible parameters associated with the smart nodes in WSNs, such as remaining energy, selfishness, hop-level, density, and degree of connectivity. In our work, we designed an evolutionary game-based approach for CH selection, combined with some vital parameters associated with sensor nodes and the entire networks. The nodes are assumed to be smart, therefore, the aspect of being selfish is also addressed in this work. The simulation results indicate that our work performs much better than typical evolutionary game-based approaches.
Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2019License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s19183835&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 24 citations 24 popularity Top 10% influence Top 10% impulse Top 10% Powered by BIP!
visibility 15visibility views 15 download downloads 24 Powered bymore_vert Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2019License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s19183835&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal 2020Publisher:MDPI AG Ahmad M. Khasawneh; Omprakash Kaiwartya; Jaime Lloret; Hayfa Y. Abuaddous; Laith Abualigah; Mohammad Al Shinwan; Mahmoud Ahmad Al-Khasawneh; Marwan Mahmoud; Rupak Kharel;In this paper, we propose a non-localization routing protocol for underwater wireless sensor networks (UWSNs), namely, the triangle metric based multi-layered routing protocol (TM2RP). The main idea of the proposed TM2RP is to utilize supernodes along with depth information and residual energy to balance the energy consumption between sensors. Moreover, TM2RP is the first multi-layered and multi-metric pressure routing protocol that considers link quality with residual energy to improve the selection of next forwarding nodes with more reliable and energy-efficient links. The aqua-sim package based on the ns-2 simulator was used to evaluate the performance of the proposed TM2RP. The obtained results were compared to other similar methods such as depth based routing (DBR) and multi-layered routing protocol (MRP). Simulation results showed that the proposed protocol (TM2RP) obtained better outcomes in terms of energy consumption, network lifetime, packet delivery ratio, and end-to-end delay.
Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2020License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s20247278&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 9 citations 9 popularity Top 10% influence Average impulse Top 10% Powered by BIP!
visibility 16visibility views 16 download downloads 19 Powered bymore_vert Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2020License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s20247278&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal 2014Publisher:MDPI AG Authors: Hongju Cheng; Zhihuang Su; Jaime Lloret; Guolong Chen;Future wireless sensor networks are expected to provide various sensing services and energy efficiency is one of the most important criterions. The node scheduling strategy aims to increase network lifetime by selecting a set of sensor nodes to provide the required sensing services in a periodic manner. In this paper, we are concerned with the service-oriented node scheduling problem to provide multiple sensing services while maximizing the network lifetime. We firstly introduce how to model the data correlation for different services by using Markov Random Field (MRF) model. Secondly, we formulate the service-oriented node scheduling issue into three different problems, namely, the multi-service data denoising problem which aims at minimizing the noise level of sensed data, the representative node selection problem concerning with selecting a number of active nodes while determining the services they provide, and the multi-service node scheduling problem which aims at maximizing the network lifetime. Thirdly, we propose a Multi-service Data Denoising (MDD) algorithm, a novel multi-service Representative node Selection and service Determination (RSD) algorithm, and a novel MRF-based Multi-service Node Scheduling (MMNS) scheme to solve the above three problems respectively. Finally, extensive experiments demonstrate that the proposed scheme efficiently extends the network lifetime.
Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2014License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s141120940&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 9 citations 9 popularity Top 10% influence Top 10% impulse Average Powered by BIP!
visibility 144visibility views 144 download downloads 198 Powered bymore_vert Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2014License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s141120940&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article , Journal 2021Publisher:MDPI AG Vinod Kumar; Sushil Kumar; Rabah AlShboul; Geetika Aggarwal; Omprakash Kaiwartya; Ahmad M. Khasawneh; Jaime Lloret; Mahmoud Ahmad Al-Khasawneh;Recently, green computing has received significant attention for Internet of Things (IoT) environments due to the growing computing demands under tiny sensor enabled smart services. The related literature on green computing majorly focuses on a cover set approach that works efficiently for target coverage, but it is not applicable in case of area coverage. In this paper, we present a new variant of a cover set approach called a grouping and sponsoring aware IoT framework (GS-IoT) that is suitable for area coverage. We achieve non-overlapping coverage for an entire sensing region employing sectorial sensing. Non-overlapping coverage not only guarantees a sufficiently good coverage in case of large number of sensors deployed randomly, but also maximizes the life span of the whole network with appropriate scheduling of sensors. A deployment model for distribution of sensors is developed to ensure a minimum threshold density of sensors in the sensing region. In particular, a fast converging grouping (FCG) algorithm is developed to group sensors in order to ensure minimal overlapping. A sponsoring aware sectorial coverage (SSC) algorithm is developed to set off redundant sensors and to balance the overall network energy consumption. GS-IoT framework effectively combines both the algorithms for smart services. The simulation experimental results attest to the benefit of the proposed framework as compared to the state-of-the-art techniques in terms of various metrics for smart IoT environments including rate of overlapping, response time, coverage, active sensors, and life span of the overall network.
CORE arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2021License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s21123948&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 11 citations 11 popularity Top 10% influence Average impulse Top 10% Powered by BIP!
visibility 16visibility views 16 download downloads 23 Powered bymore_vert CORE arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2021License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s21123948&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article 2022Publisher:MDPI AG Ibrahim Abunadi; Amjad Rehman; Khalid Haseeb; Lorena Parra; Jaime Lloret;In recent decades, networked smart devices and cutting-edge technology have been exploited in many applications for the improvement of agriculture. The deployment of smart sensors and intelligent farming techniques supports real-time information gathering for the agriculture sector and decreases the burden on farmers. Many solutions have been presented to automate the agriculture system using IoT networks; however, the identification of redundant data traffic is one of the most significant research problems. Additionally, farmers do not obtain the information they need in time, such as data on water pressure and soil conditions. Thus, these solutions consequently reduce the production rates and increase costs for farmers. Moreover, controlling all agricultural operations in a controlled manner should also be considered in developing intelligent solutions. Therefore, this study proposes a framework for a system that combines fog computing with smart farming and effectively controls network traffic. Firstly, the proposed framework efficiently monitors redundant information and avoids the inefficient use of communication bandwidth. It also controls the number of re-transmissions in the case of malicious actions and efficiently utilizes the network’s resources. Second, a trustworthy chain is built between agricultural sensors by utilizing the fog nodes to address security issues and increase reliability by preventing malicious communication. Through extensive simulation-based experiments, the proposed framework revealed an improved performance for energy efficiency, security, and network connectivity in comparison to other related works.
Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2022License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s22176676&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess RoutesGreen gold 9 citations 9 popularity Top 10% influence Average impulse Top 10% Powered by BIP!
more_vert Sensors arrow_drop_down Recolector de Ciencia Abierta, RECOLECTAArticle . 2022License: CC BYData sources: Recolector de Ciencia Abierta, RECOLECTAAll Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s22176676&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eudescription Publicationkeyboard_double_arrow_right Article 2023Publisher:MDPI AG Safa Hamdare; Omprakash Kaiwartya; Mohammad Aljaidi; Manish Jugran; Yue Cao; Sushil Kumar; Mufti Mahmud; David Brown; Jaime Lloret;The increasing availability of Electric Vehicles (EVs) is driving a shift away from traditional gasoline-powered vehicles. Subsequently, the demand for Electric Vehicle Charging Systems (EVCS) is rising, leading to the significant growth of EVCS as public and private charging infrastructure. The cybersecurity-related risks in EVCS have significantly increased due to the growing network of EVCS. In this context, this paper presents a cybersecurity risk analysis of the network of EVCS. Firstly, the recent advancements in the EVCS network, recent EV adaptation trends, and charging use cases are described as a background of the research area. Secondly, cybersecurity aspects in EVCS have been presented considering infrastructure and protocol-centric vulnerabilities with possible cyber-attack scenarios. Thirdly, threats in EVCS have been validated with real-time data-centric analysis of EV charging sessions. The paper also highlights potential open research issues in EV cyber research as new knowledge for domain researchers and practitioners.
All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s23156716&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euAccess Routesgold 43 citations 43 popularity Top 10% influence Top 10% impulse Top 1% Powered by BIP!
more_vert All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.3390/s23156716&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu