sensors-logo

Journal Browser

Journal Browser

Application of Wireless Sensor Networks for Emerging Internet, Data and Web Technologies

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Intelligent Sensors".

Deadline for manuscript submissions: closed (30 December 2022) | Viewed by 3724

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Information Technology, Monash University, Melbourne, VIC 3800, Australia
Interests: data warehousing; computing for healthcare; big data; IoT; digital health
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Cryptography and Cognitive Informatics Laboratory, AGH University of Science and Technology, 30-059 Krakow, Poland
Interests: computer science (cognitive informatics, pattern classification); biomedical engineering (medical image understanding and semantic analysis); cryptography (secret splitting and sharing, secure information management)
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue is dedicated to the dissemination of original contributions related to theories, practices and concepts of emerging Internet, data and web technologies and the applicability of wireless sensors networks (WSNs) towards a collective intelligence approach. It will mainly discuss advances in information networking and the exploitation of data generated from WSNs and emerging data technologies such as data centers, data grids and clouds. Highly qualified papers from EIDWT2022 (http://voyager.ce.fit.ac.jp/conf/eidwt/2022/), which need to significantly extended and rewritten, are welcomed for submission to this Special Issue, but we also welcome new papers related to the following topics: 

  • Network and data security, trust and reputation;
  • Big data and cloud computing;
  • Mobile and wireless networks;
  • P2P and grid computing;
  • Knowledge discovery and mining;
  • Databases and data warehouses;
  • Data centers and IT virtualization technologies;
  • Web science and business intelligence;
  • Data analytics for learning and virtual organizations;
  • Data management and information retrieval;
  • Machine learning on large data sets and massive processing;
  • Data modeling, visualization and representation tools;
  • Data sensing, integration and querying systems and interfaces;
  • e-Science data sets, repositories, digital infrastructures;
  • Energy-aware and green computing in data centers.

WSNs are now usually used for collecting data and information, and a great amount of data need to be stored, processed and transferred; thus, emerging internet, data and web technologies and WSNs applications are essential topics for this field, and it is necessary to collect papers in this field to advance this research area.

Dr. Xu An Wang
Prof. Dr. David Taniar
Prof. Dr. Marek R. Ogiela
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 5476 KiB  
Article
Distributed Rule-Enabled Interworking Architecture Based on the Transparent Rule Proxy in Heterogeneous IoT Networks
by Wenquan Jin and Dohyeun Kim
Sensors 2023, 23(4), 1893; https://doi.org/10.3390/s23041893 - 08 Feb 2023
Cited by 3 | Viewed by 1381
Abstract
Rule-enabled Internet of Things (IoT) systems operate autonomous and dynamic service scenarios through real-time events and actions based on deployed rules. For handling the increasing events and actions in the IoT networks, the computational ability can be distributed and deployed to the edge [...] Read more.
Rule-enabled Internet of Things (IoT) systems operate autonomous and dynamic service scenarios through real-time events and actions based on deployed rules. For handling the increasing events and actions in the IoT networks, the computational ability can be distributed and deployed to the edge of networks. However, operating a consistent rule to provide the same service scenario in heterogeneous IoT networks is difficult because of the difference in the protocols and rule models. In this paper, we propose a transparent rule deployment approach based on the rule translator by integrating the interworking proxy to IoT platforms for operating consistent service scenarios in heterogeneous IoT networks. The rule-enabled IoT architecture is proposed to provide functional blocks in the layers of the client, rule service, IoT service, and device. Additionally, the interworking proxy is used for translating and transferring rules between IoT platforms in different IoT networks. Based on the interactions between the IoT platforms, the same service scenarios are operated in the IoT environment. Moreover, the integrated interworking proxy enables the heterogeneity of IoT frameworks in the IoT platform. Therefore, rules are deployed on IoT platforms transparently, and consistent rules are operated in heterogeneous IoT networks without considering the underlying IoT frameworks. Full article
Show Figures

Figure 1

9 pages, 2611 KiB  
Communication
Cognitive Based Authentication Protocol for Distributed Data and Web Technologies
by Natalia Krzyworzeka, Lidia Ogiela and Marek R. Ogiela
Sensors 2021, 21(21), 7265; https://doi.org/10.3390/s21217265 - 31 Oct 2021
Cited by 4 | Viewed by 1643
Abstract
The objective of the verification process, besides guaranteeing security, is also to be effective and robust. This means that the login should take as little time as possible, and each time allow for a successful authentication of the authorised account. In recent years, [...] Read more.
The objective of the verification process, besides guaranteeing security, is also to be effective and robust. This means that the login should take as little time as possible, and each time allow for a successful authentication of the authorised account. In recent years, however, online users have been experiencing more and more issues with recalling their own passwords on the spot. According to research done in 2017 by LastPass on its employees, the number of personal accounts assigned to one business user currently exceeds 191 profiles and keeps growing. Remembering these many passwords, especially to applications which are not used every week, seems to be impossible without storing them either on paper, in a password manager, or saved in a file somewhere on a PC. In this article a new verification model using a Google Street View image as well as the user’s personal experience and knowledge will be presented. The purpose of this scheme is to assure secure verification by creating longer passwords as well as delivering a ‘password reminder’ already embedded into the login scheme. Full article
Show Figures

Figure 1

Back to TopTop