Next Issue
Volume 12, December
Previous Issue
Volume 12, August
 
 

J. Sens. Actuator Netw., Volume 12, Issue 5 (October 2023) – 13 articles

Cover Story (view full-size image): Intrusion detection systems are often calibrated with datasets that are unbalanced in terms of attack data and non-attack data causing bias effects, and therefore making them vulnerable to cyberattacks. As an approach to remedy this issue, we considered the Conditional Tabular Generative Adversarial Network (CTGAN) to balance an insider threat tabular dataset called the CMU-CERT. We generated insider threats using the CTGAN and combined them with the original data. We used the resulting dataset for an intrusion detection system implemented with Adversarial Environment Reinforcement Learning (AE-RL) in a multi-agent framework with an attacker and a defender. We showed that the performance of detecting intrusions using the AE-RL is significantly improved when the dataset is balanced. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
25 pages, 1144 KiB  
Article
Enhancing the Fault Tolerance of a Multi-Layered IoT Network through Rectangular and Interstitial Mesh in the Gateway Layer
by Sastry Kodanda Rama Jammalamadaka, Bhupati Chokara, Sasi Bhanu Jammalamadaka, Balakrishna Kamesh Duvvuri and Rajarao Budaraju
J. Sens. Actuator Netw. 2023, 12(5), 76; https://doi.org/10.3390/jsan12050076 - 16 Oct 2023
Viewed by 1335
Abstract
Most IoT systems designed for the implementation of mission-critical systems are multi-layered. Much of the computing is done in the service and gateway layers. The gateway layer connects the internal section of the IoT to the cloud through the Internet. The failure of [...] Read more.
Most IoT systems designed for the implementation of mission-critical systems are multi-layered. Much of the computing is done in the service and gateway layers. The gateway layer connects the internal section of the IoT to the cloud through the Internet. The failure of any node between the servers and the gateways will isolate the entire network, leading to zero tolerance. The service and gateway layers must be connected using networking topologies to yield 100% fault tolerance. The empirical formulation of the model chosen to connect the service’s servers to the gateways through routers is required to compute the fault tolerance of the network. A rectangular and interstitial mesh have been proposed in this paper to connect the service servers to the gateways through the servers, which yields 0.999 fault tolerance of the IoT network. Also provided is an empirical approach to computing the IoT network’s fault tolerance. A rectangular and interstitial mesh have been implemented in the network’s gateway layer, increasing the IoT network’s ability to tolerate faults by 11%. Full article
(This article belongs to the Topic Electronic Communications, IOT and Big Data)
Show Figures

Figure 1

27 pages, 2451 KiB  
Article
Short-Range Localization via Bluetooth Using Machine Learning Techniques for Industrial Production Monitoring
by Francesco Di Rienzo, Alessandro Madonna, Nicola Carbonaro, Alessandro Tognetti, Antonio Virdis and Carlo Vallati
J. Sens. Actuator Netw. 2023, 12(5), 75; https://doi.org/10.3390/jsan12050075 - 15 Oct 2023
Cited by 1 | Viewed by 1404
Abstract
Indoor short-range localization is crucial in many Industry 4.0 applications. Production monitoring for assembly lines, for instance, requires fine-grained positioning for parts or goods in order to keep track of the production process and the stations traversed by each product. Due to the [...] Read more.
Indoor short-range localization is crucial in many Industry 4.0 applications. Production monitoring for assembly lines, for instance, requires fine-grained positioning for parts or goods in order to keep track of the production process and the stations traversed by each product. Due to the unavailability of the Global Positioning System (GPS) for indoor positioning, a different approach is required. In this paper, we propose a specific design for short-range indoor positioning based on the analysis of the Received Signal Strength Indicator (RSSI) of Bluetooth beacons. To this aim, different machine learning techniques are considered and assessed: regressors, Convolution Neural Network (CNN) and Recurrent Neural Network (RNN). A realistic testbed is created to collect data for the training of the models and to assess the performance of each technique. Our analysis highlights the best models and the most convenient and suitable configuration for indoor localization. Finally, the localization accuracy is calculated in the considered use case, i.e., production monitoring. Our results show that the best performance is obtained using the K-Nearest Neighbors technique, which results in a good performance for general localization and in a high level of accuracy, 99%, for industrial production monitoring. Full article
Show Figures

Figure 1

20 pages, 2251 KiB  
Article
Self-Configuration Management towards Fix-Distributed Byzantine Sensors for Clustering Schemes in Wireless Sensor Networks
by Walaa M. Elsayed, Engy El-Shafeiy, Mohamed Elhoseny and Mohammed K. Hassan
J. Sens. Actuator Netw. 2023, 12(5), 74; https://doi.org/10.3390/jsan12050074 - 13 Oct 2023
Viewed by 1203
Abstract
To avoid overloading a network, it is critical to continuously monitor the natural environment and disseminate data streams in synchronization. Based on self-maintaining technology, this study presents a technique called self-configuration management (SCM). The purpose is to ensure consistency in the performance, functionality, [...] Read more.
To avoid overloading a network, it is critical to continuously monitor the natural environment and disseminate data streams in synchronization. Based on self-maintaining technology, this study presents a technique called self-configuration management (SCM). The purpose is to ensure consistency in the performance, functionality, and physical attributes of a wireless sensor network (WSN) over its lifetime. During device communication, the SCM approach delivers an operational software package for the radio board of system problematic nodes. We offered two techniques to help cluster heads manage autonomous configuration. First, we created a separate capability to determine which defective devices require the operating system (OS) replica. The software package was then delivered from the head node to the network’s malfunctioning device via communication roles. Second, we built an autonomous capability to automatically install software packages and arrange the time. The simulations revealed that the suggested technique was quick in transfers and used less energy. It also provided better coverage of system fault peaks than competitors. We used the proposed SCM approach to distribute homogenous sensor networks, and it increased system fault tolerance to 93.2%. Full article
Show Figures

Figure 1

26 pages, 2603 KiB  
Article
Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map
by Ahmad Al-Daraiseh, Yousef Sanjalawe, Salam Al-E’mari, Salam Fraihat, Mohammad Bany Taha and Muhammed Al-Muhammed
J. Sens. Actuator Netw. 2023, 12(5), 73; https://doi.org/10.3390/jsan12050073 - 10 Oct 2023
Viewed by 2012
Abstract
In recent years, there has been an increasing interest in employing chaotic-based random number generators for cryptographic purposes. However, many of these generators produce sequences that lack the necessary strength for cryptographic systems, such as Tent-Map. However, these generators still suffer from common [...] Read more.
In recent years, there has been an increasing interest in employing chaotic-based random number generators for cryptographic purposes. However, many of these generators produce sequences that lack the necessary strength for cryptographic systems, such as Tent-Map. However, these generators still suffer from common issues when generating random numbers, including issues related to speed, randomness, lack of statistical properties, and lack of uniformity. Therefore, this paper introduces an efficient pseudo-random number generator, called State-Based Tent-Map (SBTM), based on a modified Tent-Map, which addresses this and other limitations by providing highly robust sequences suitable for cryptographic applications. The proposed generator is specifically designed to generate sequences with exceptional statistical properties and a high degree of security. It utilizes a modified 1D chaotic Tent-Map with enhanced attributes to produce the chaotic sequences. Rigorous randomness testing using the Dieharder test suite confirmed the promising results of the generated keystream bits. The comprehensive evaluation demonstrated that approximately 97.4% of the tests passed successfully, providing further evidence of the SBTM’s capability to produce sequences with sufficient randomness and statistical properties. Full article
(This article belongs to the Section Network Security and Privacy)
Show Figures

Figure 1

13 pages, 3279 KiB  
Article
A Salinity-Impact Analysis of Polarization Division Multiplexing-Based Underwater Optical Wireless Communication System with High-Speed Data Transmission
by Sushank Chaudhary, Abhishek Sharma, Sunita Khichar, Shashi Shah, Rizwan Ullah, Amir Parnianifard and Lunchakorn Wuttisittikulkij
J. Sens. Actuator Netw. 2023, 12(5), 72; https://doi.org/10.3390/jsan12050072 - 7 Oct 2023
Cited by 2 | Viewed by 1403
Abstract
The majority of the Earth’s surface is covered by water, with oceans holding approximately 97% of this water and serving as the lifeblood of our planet. These oceans are essential for various purposes, including transportation, sustenance, and communication. However, establishing effective communication networks [...] Read more.
The majority of the Earth’s surface is covered by water, with oceans holding approximately 97% of this water and serving as the lifeblood of our planet. These oceans are essential for various purposes, including transportation, sustenance, and communication. However, establishing effective communication networks between the numerous sub-islands present in many parts of the world poses significant challenges. Underwater optical wireless communication, or UWOC, can indeed be an excellent solution to provide seamless connectivity underwater. UWOC holds immense significance due to its ability to transmit data at high rates, low latency, and enhanced security. In this work, we propose polarization division multiplexing-based UWOC system under the impact of salinity with an on–off keying (OOK) modulation format. The proposed system aims to establish high-speed network connectivity between underwater divers/submarines in oceans at different salinity levels. The numerical simulation results demonstrate the effectiveness of our proposed system with a 2 Gbps data rate up to 10.5 m range in freshwater and up to 1.8 m in oceanic waters with salinity up to 35 ppt. Successful transmission of high-speed data is reported in underwater optical wireless communication, especially where salinity impact is higher. Full article
Show Figures

Figure 1

17 pages, 4307 KiB  
Article
Applying an Adaptive Neuro-Fuzzy Inference System to Path Loss Prediction in a Ruby Mango Plantation
by Supachai Phaiboon and Pisit Phokharatkul
J. Sens. Actuator Netw. 2023, 12(5), 71; https://doi.org/10.3390/jsan12050071 - 7 Oct 2023
Viewed by 1168
Abstract
The application of wireless sensor networks (WSNs) in smart agriculture requires accurate path loss prediction to determine the coverage area and system capacity. However, fast fading from environment changes, such as leaf movement, unsymmetrical tree structures and near-ground effects, makes the path loss [...] Read more.
The application of wireless sensor networks (WSNs) in smart agriculture requires accurate path loss prediction to determine the coverage area and system capacity. However, fast fading from environment changes, such as leaf movement, unsymmetrical tree structures and near-ground effects, makes the path loss prediction inaccurate. Artificial intelligence (AI) technologies can be used to facilitate this task for training the real environments. In this study, we performed path loss measurements in a Ruby mango plantation at a frequency of 433 MHz. Then, an adaptive neuro-fuzzy inference system (ANFIS) was applied to path loss prediction. The ANFIS required two inputs for the path loss prediction: the distance and antenna height corresponding to the tree level (i.e., trunk and bottom, middle, and top canopies). We evaluated the performance of the ANFIS by comparing it with empirical path loss models widely used in the literature. The ANFIS demonstrated a superior prediction accuracy with high sensitivity compared to the empirical models, although the performance was affected by the tree level. Full article
(This article belongs to the Topic Machine Learning in Communication Systems and Networks)
Show Figures

Figure 1

18 pages, 4599 KiB  
Article
An Online Method for Supporting and Monitoring Repetitive Physical Activities Based on Restricted Boltzmann Machines
by Marcio Alencar, Raimundo Barreto, Eduardo Souto and Horacio Oliveira
J. Sens. Actuator Netw. 2023, 12(5), 70; https://doi.org/10.3390/jsan12050070 - 22 Sep 2023
Viewed by 1196
Abstract
Human activity recognition has been widely used to monitor users during physical activities. By embedding a pre-trained model into wearable devices with an inertial measurement unit, it is possible to identify the activity being executed, count steps and activity duration time, and even [...] Read more.
Human activity recognition has been widely used to monitor users during physical activities. By embedding a pre-trained model into wearable devices with an inertial measurement unit, it is possible to identify the activity being executed, count steps and activity duration time, and even predict when the user should hydrate himself. Despite these interesting applications, these approaches are limited by a set of pre-trained activities, making them unable to learn new human activities. In this paper, we introduce a novel approach for generating runtime models to give the users feedback that helps them to correctly perform repetitive physical activities. To perform a distributed analysis, the methodology focuses on applying the proposed method to each specific body segment. The method adopts the Restricted Boltzmann Machine to learn the patterns of repetitive physical activities and, at the same time, provides suggestions for adjustments if the repetition is not consistent with the model. The learning and the suggestions are both based on inertial measurement data mainly considering movement acceleration and amplitude. The results show that by applying the model’s suggestions to the evaluation data, the adjusted output was up to 3.68x more similar to the expected movement than the original data. Full article
(This article belongs to the Section Actuators, Sensors and Devices)
Show Figures

Figure 1

20 pages, 7156 KiB  
Article
A Quad-Port Nature-Inspired Lotus-Shaped Wideband Terahertz Antenna for Wireless Applications
by Jeenal Raghunath, Praveen Kumar, Tanweer Ali, Pradeep Kumar, Parveez Shariff Bhadrvathi Ghouse and Sameena Pathan
J. Sens. Actuator Netw. 2023, 12(5), 69; https://doi.org/10.3390/jsan12050069 - 21 Sep 2023
Cited by 4 | Viewed by 1328
Abstract
This article is aimed at designing an inventive compact-size quad-port antenna that can be operated within terahertz (THz) frequency spectra for a 6G high-speed wireless communication link. The single-element antenna comprises a lotus-petal-like radiating patch and a defected ground structure (DGS) on a [...] Read more.
This article is aimed at designing an inventive compact-size quad-port antenna that can be operated within terahertz (THz) frequency spectra for a 6G high-speed wireless communication link. The single-element antenna comprises a lotus-petal-like radiating patch and a defected ground structure (DGS) on a 20 × 20 × 2 µm3 polyamide substrate and is designed to operate within the 8.96–13.5 THz frequency range. The THz antenna is deployed for a two-port MIMO configuration having a size of 46 × 20 × 2 µm3 with interelement separation of less than a quarter-wavelength of 0.18λ (λ at 9 THz). The two-port configuration operates in the 9–13.25 THz frequency range, with better than −25 dB isolation. Further, the two-port THz antenna is mirrored vertically with a separation of 0.5λ to form the four-port MIMO configuration. The proposed four-port THz antenna has dimensions of 46 × 46 × 2 µm3 and operates in the frequency range of 9–13 THz. Isolation improvement better than −25 dB is realized by incorporating parasitic elements onto the ground plane. Performance analysis of the proposed antenna in terms of MIMO diversity parameters, viz., envelope correlation coefficient (ECC) < 0.05, diversity gain (DG) ≈ 10, mean effective gain (MEG) < −3 dB, total active reflection coefficient (TARC) < −10 dB, channel capacity loss (CCL) < 0.3 bps/Hz, and multiplexing efficiency (ME) < 0 dB, is performed to justify the appropriateness of the proposed antenna for MIMO applications. The antenna has virtuous radiation properties with good gain, which is crucial for any wireless communication system, especially for the THz communication network. Full article
Show Figures

Figure 1

29 pages, 6070 KiB  
Article
A Multi-Agent Intrusion Detection System Optimized by a Deep Reinforcement Learning Approach with a Dataset Enlarged Using a Generative Model to Reduce the Bias Effect
by Matthieu Mouyart, Guilherme Medeiros Machado and Jae-Yun Jun
J. Sens. Actuator Netw. 2023, 12(5), 68; https://doi.org/10.3390/jsan12050068 - 18 Sep 2023
Cited by 1 | Viewed by 1679
Abstract
Intrusion detection systems can defectively perform when they are adjusted with datasets that are unbalanced in terms of attack data and non-attack data. Most datasets contain more non-attack data than attack data, and this circumstance can introduce biases in intrusion detection systems, making [...] Read more.
Intrusion detection systems can defectively perform when they are adjusted with datasets that are unbalanced in terms of attack data and non-attack data. Most datasets contain more non-attack data than attack data, and this circumstance can introduce biases in intrusion detection systems, making them vulnerable to cyberattacks. As an approach to remedy this issue, we considered the Conditional Tabular Generative Adversarial Network (CTGAN), with its hyperparameters optimized using the tree-structured Parzen estimator (TPE), to balance an insider threat tabular dataset called the CMU-CERT, which is formed by discrete-value and continuous-value columns. We showed through this method that the mean absolute errors between the probability mass functions (PMFs) of the actual data and the PMFs of the data generated using the CTGAN can be relatively small. Then, from the optimized CTGAN, we generated synthetic insider threat data and combined them with the actual ones to balance the original dataset. We used the resulting dataset for an intrusion detection system implemented with the Adversarial Environment Reinforcement Learning (AE-RL) algorithm in a multi-agent framework formed by an attacker and a defender. We showed that the performance of detecting intrusions using the framework of the CTGAN and the AE-RL is significantly improved with respect to the case where the dataset is not balanced, giving an F1-score of 0.7617. Full article
(This article belongs to the Special Issue Machine-Environment Interaction, Volume II)
Show Figures

Figure 1

23 pages, 637 KiB  
Article
Recursive Feature Elimination with Cross-Validation with Decision Tree: Feature Selection Method for Machine Learning-Based Intrusion Detection Systems
by Mohammed Awad and Salam Fraihat
J. Sens. Actuator Netw. 2023, 12(5), 67; https://doi.org/10.3390/jsan12050067 - 18 Sep 2023
Cited by 3 | Viewed by 2817
Abstract
The frequency of cyber-attacks on the Internet of Things (IoT) networks has significantly increased in recent years. Anomaly-based network intrusion detection systems (NIDSs) offer an additional layer of network protection by detecting and reporting the infamous zero-day attacks. However, the efficiency of real-time [...] Read more.
The frequency of cyber-attacks on the Internet of Things (IoT) networks has significantly increased in recent years. Anomaly-based network intrusion detection systems (NIDSs) offer an additional layer of network protection by detecting and reporting the infamous zero-day attacks. However, the efficiency of real-time detection systems relies on several factors, including the number of features utilized to make a prediction. Thus, minimizing them is crucial as it implies faster prediction and lower storage space. This paper utilizes recursive feature elimination with cross-validation using a decision tree model as an estimator (DT-RFECV) to select an optimal subset of 15 of UNSW-NB15’s 42 features and evaluates them using several ML classifiers, including tree-based ones, such as random forest. The proposed NIDS exhibits an accurate prediction model for network flow with a binary classification accuracy of 95.30% compared to 95.56% when using the entire feature set. The reported scores are comparable to those attained by the state-of-the-art systems despite decreasing the number of utilized features by about 65%. Full article
Show Figures

Figure 1

21 pages, 1096 KiB  
Article
Output-Based Dynamic Periodic Event-Triggered Control with Application to the Tunnel Diode System
by Mahmoud Abdelrahim and Dhafer Almakhles
J. Sens. Actuator Netw. 2023, 12(5), 66; https://doi.org/10.3390/jsan12050066 - 14 Sep 2023
Viewed by 1077
Abstract
The integration of communication channels with the feedback loop in a networked control system (NCS) is attractive for many applications. A major challenge in the NCS is to reduce transmissions over the network between the sensors, the controller, and the actuators to avoid [...] Read more.
The integration of communication channels with the feedback loop in a networked control system (NCS) is attractive for many applications. A major challenge in the NCS is to reduce transmissions over the network between the sensors, the controller, and the actuators to avoid network congestion. An efficient approach to achieving this goal is the event-triggered implementation where the control actions are only updated when necessary from stability/performance perspectives. In particular, periodic event-triggered control (PETC) has garnered recent attention because of its practical implementation advantages. This paper focuses on the design of stabilizing PETC for linear time-invariant systems. It is assumed that the plant state is partially known; the feedback signal is sent to the controller at discrete-time instants via a digital channel; and an event-triggered controller is synthesized, solely based on the available plant measurement. The constructed event-triggering law is novel and only verified at periodic time instants; it is more adapted to practical implementations. The proposed approach ensures a global asymptotic stability property for the closed-loop system under mild conditions. The overall model is developed as a hybrid dynamical system to truly describe the mixed continuous-time and discrete-time dynamics. The stability is studied using appropriate Lyapunov functions. The efficiency of the technique is illustrated in the dynamic model of the tunnel diode system. Full article
Show Figures

Figure 1

22 pages, 1440 KiB  
Article
VNF-Enabled 5G Network Orchestration Framework for Slice Creation, Isolation and Management
by Thiruvenkadam Srinivasan, Sujitha Venkatapathy, Han-Gue Jo and In-Ho Ra
J. Sens. Actuator Netw. 2023, 12(5), 65; https://doi.org/10.3390/jsan12050065 - 13 Sep 2023
Viewed by 1344
Abstract
Network slicing is widely regarded as the most critical technique for allocating network resources to varied user needs in 5G networks. A Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two extensively used strategies for slicing the physical infrastructure according to [...] Read more.
Network slicing is widely regarded as the most critical technique for allocating network resources to varied user needs in 5G networks. A Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two extensively used strategies for slicing the physical infrastructure according to use cases. The most efficient use of virtual networks is realized by the application of optimal resource allocation algorithms. Numerous research papers on 5G network resource allocation focus on network slicing or on the best resource allocation for the sliced network. This study uses network slicing and optimal resource allocation to achieve performance optimization using requirement-based network slicing. The proposed approach includes three phases: (1) Slice Creation by Machine Learning methods (SCML), (2) Slice Isolation through Resource Allocation (SIRA) of requests via a multi-criteria decision-making approach, and (3) Slice Management through Resource Transfer (SMART). We receive a set of Network Service Requests (NSRs) from users. After receiving the NSRs, the SCML is used to form slices, and SIRA and SMART are used to allocate resources to these slices. Accurately measuring the acceptance ratio and resource efficiency helps to enhance overall performance. The simulation results show that the SMART scheme can dynamically change the resource allocation according to the test conditions. For a range of network situations and Network Service Requests (NSRs), the performance benefit is studied. The findings of the simulation are compared to those of the literature in order to illustrate the usefulness of the proposed work. Full article
Show Figures

Figure 1

21 pages, 1303 KiB  
Article
Output Feedback Stabilization of Doubly Fed Induction Generator Wind Turbines under Event-Triggered Implementations
by Mahmoud Abdelrahim and Dhafer Almakhles
J. Sens. Actuator Netw. 2023, 12(5), 64; https://doi.org/10.3390/jsan12050064 - 12 Sep 2023
Viewed by 1145
Abstract
The robust stabilization of doubly fed induction generators in wind turbines against external disturbances is considered in this study. It is assumed that the angular speeds of wind turbines can only be measured and sent to the controller in a discrete-time fashion over [...] Read more.
The robust stabilization of doubly fed induction generators in wind turbines against external disturbances is considered in this study. It is assumed that the angular speeds of wind turbines can only be measured and sent to the controller in a discrete-time fashion over a network. To generate the sampling times, three different triggering schemes were developed: time-triggering, static event-triggering, and dynamic event-triggering mechanisms; moreover, performance comparisons were conducted between such approaches. The design methodology is based on emulation, such that the plant is first stabilized in continuous-time where a robust feedback law is constructed based on the linear quadratic Gaussian regulator (LQG) approach. Then, the impact of the network is taken into account, and an event-triggering mechanism is built so that closed-loop stability is maintained and the Zeno phenomenon is avoided by using temporal regularization. The necessary stability constraints are framed as a linear matrix inequality, and the whole system is modeled as a hybrid dynamical system. A numerical simulation is used to demonstrate the effectiveness of the control strategy. The results show that the event-triggering mechanisms achieve a significant reduction of around 50% in transmissions compared to periodic sampling. Moreover, numerical comparisons with existing approaches show that the proposed approach provides better performance in terms of the stability guarantee and number of transmissions. Full article
(This article belongs to the Section Actuators, Sensors and Devices)
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop