sensors-logo

Journal Browser

Journal Browser

Selected Sensor Papers from ICGHIT 2019 –The 7th International Conference on Green and Human Information Technology

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (31 May 2019) | Viewed by 23997

Special Issue Editors

Department of Software and Communications Energy, Hongik University, Sejongro 2639, Republic of Korea
Interests: wireless networks and communications; WSN; wireless ICN; edge computing
Special Issues, Collections and Topics in MDPI journals
Room 907, West Wing of Science and Technology Building, 433 Huangshan Road, Hefei, Anhui 230027, China
Interests: wireless networks; network security; load-balancing; cognitive radio networks
403 Engineering South, Oklahoma State University, Stillwater, OK 74078-5032, USA
Interests: WSNs; cybersecurity; cloud/edge computing; IoT
Dept. of Computer Science, COMSATS institute of Information Technology, Quaid Avenue, Wah Cantt, Pakistan
Interests: wireless/wired networks; WSN; cognitive radio; VANETs

Special Issue Information

Dear Colleagues,

The 7th International Conference on Green and Human Information Technology (ICGHIT 2019) will be held 16–18 January, 2019, in Kuala Lumper, Malaysia (www.icghit.org).

ICGHIT 2019 is an international conference focusing on green and information technologies oriented to humanity. The goal of ICGHIT is to form a platform to seek the advancement of green technology and human related IT in an interdisciplinary manner. Under the goal, ICGHIT 2019 newly added one more specific area about “Future Sensor and Sensor Networks” which covers emerging technologies-based breakthrough technologies to enhance current sensor and sensor networks.

Authors of selected high-qualified papers related to sensors and sensor networks from the conference will be invited to submit extended versions of their original papers (50% extensions of contents of the conference paper) and contributions under the following conference topics:

  • Information-Centric Networkgking (ICN), Content-Centric Networking (CCN) and Content-Delivery Networking (CDN) architecture-based protocols for WSNs
  • Software Defined Network-based WSNs
  • Artificial Intelligence (AI) and Machine-Learning-based environment-adaptable WSNs
  • Blockchain-based secure WSNs
  • Full-duplex-communcation-based networking protocols for WSNs
  • Fog/Edge Computing-based WSNs
  • ICN with Fog Computing-based WSNs
  • Sensors and Sensor Networks for Autonoumous Driving Vehicle
  • Sensors and Sensor Networks for Industry 4.0
Dr. Byung-Seo Kim
Dr. Sung Won Kim
Dr. Chi Zhang
Dr. Yuanxiong Guo
Dr. Tariq Umer
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Wireless Sensor Networks
  • Information-Centric Networking
  • Software Defined Network
  • Artificial Intelligence
  • Machine-Learning
  • Blockchain

Published Papers (7 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Editorial

Jump to: Research, Other

3 pages, 151 KiB  
Editorial
Emerging Technologies for Future Sensor Networks—Selected Papers from ICGHIT 2019
by Byung-Seo Kim, Sung Won Kim, Chi Zhang, Yuanxiong Guo and Tariq Umer
Sensors 2019, 19(18), 3854; https://doi.org/10.3390/s19183854 - 06 Sep 2019
Viewed by 1980
Abstract
The International Conference on Green and Human Information Technology (ICGHIT) is an international conference focusing on green and information technologies oriented toward humanity [...] Full article

Research

Jump to: Editorial, Other

13 pages, 944 KiB  
Article
Inter-Relay Interference Mitigation for Chirp-Based Two-Path Successive Relaying Protocol
by Kwang-Yul Kim and Yoan Shin
Sensors 2019, 19(15), 3346; https://doi.org/10.3390/s19153346 - 30 Jul 2019
Cited by 2 | Viewed by 2666
Abstract
Since the chirp spread spectrum (CSS) system is considered as a communication technology for the Internet of things (IoT), long-range communication and a high data rate are required. In wireless communications, in order to increase spectral efficiency and to extend transmission coverage, a [...] Read more.
Since the chirp spread spectrum (CSS) system is considered as a communication technology for the Internet of things (IoT), long-range communication and a high data rate are required. In wireless communications, in order to increase spectral efficiency and to extend transmission coverage, a two-path successive relaying (TPSR) protocol has been proposed. Thus, in order to improve transmission performance of the CSS system, in this paper we apply the TPSR protocol to the CSS system. However, since the TPSR protocol is successively relaying data, the spectral efficiency may be limited due to inter-relay interference (IRI). Hence, we propose a multiple linear chirp-based IRI mitigation method for the CSS-based TPSR protocol. In the proposed scheme, the cross-correlation coefficient (CCC) has been derived mathematically according to a separating bandwidth in a given total bandwidth. Then, one separating bandwidth that guarantees the transmission performance is allocated to the primary relay by considering a single relay CCC (SR-CCC) and another separating bandwidth that guarantees the orthogonality from the primary relay is allocated to the secondary relay by considering the inter-relay CCC (IR-CCC). Since the IR-CCC means a degree of similarity between these two relays, it is possible to mitigate the IRI effect within the same bandwidth by allocating orthogonal separating bandwidths to each relay. Simulation results show that the proposed scheme can improve the transmission performance by mitigating the IRI effect even in high IRI environments. Consequently, we expect that the proposed scheme can extend the transmission coverage and increase the data rate of the CSS system. Full article
Show Figures

Figure 1

25 pages, 6641 KiB  
Article
Enhanced 3-D GM-MAC Protocol for Guaranteeing Stability and Energy Efficiency of IoT Mobile Sensor Networks
by Yoonkyung Jang, Ahreum Shin and Intae Ryoo
Sensors 2019, 19(14), 3230; https://doi.org/10.3390/s19143230 - 23 Jul 2019
Cited by 1 | Viewed by 2923
Abstract
In wireless sensor networks, energy efficiency is important because sensor nodes have limited energy. 3-dimensional group management medium access control (3-D GM-MAC) is an attractive MAC protocol for application to the Internet of Things (IoT) environment with various sensors. 3-D GM-MAC outperforms the [...] Read more.
In wireless sensor networks, energy efficiency is important because sensor nodes have limited energy. 3-dimensional group management medium access control (3-D GM-MAC) is an attractive MAC protocol for application to the Internet of Things (IoT) environment with various sensors. 3-D GM-MAC outperforms the existing MAC schemes in terms of energy efficiency, but has some stability issues. In this paper, methods that improve the stability and transmission performance of 3-D GM-MAC are proposed. A buffer management scheme for sensor nodes is newly proposed. Fixed sensor nodes that have a higher priority than the mobile sensor nodes in determining the group numbers that were added, and an advanced group number management scheme was introduced. The proposed methods were simulated and analyzed. The newly derived buffer threshold had a similar energy efficiency to the original 3-D GM-MAC, but improved performance in the aspects of data loss rate and data collection rate. Data delay was not included in the comparison factors as 3-D GM-MAC targets non-real-time applications. When using fixed sensor nodes, the number of group number resets is reduced by about 43.4% and energy efficiency increased by about 10%. Advanced group number management improved energy efficiency by about 23.4%. In addition, the advanced group number management with periodical group number resets of the entire sensor nodes showed about a 48.9% improvement in energy efficiency. Full article
Show Figures

Figure 1

28 pages, 2181 KiB  
Article
Hierarchical Name-Based Mechanism for Push-Data Broadcast Control in Information-Centric Multihop Wireless Networks
by Rehmat Ullah, Muhammad Atif Ur Rehman and Byung Seo Kim
Sensors 2019, 19(14), 3034; https://doi.org/10.3390/s19143034 - 10 Jul 2019
Cited by 25 | Viewed by 4297
Abstract
By design, Named Data Networking (NDN) supports pull-based traffic, where content is retrieved only upon consumer request. However, some of the use cases (i.e., emergency situations) in the Internet of Things (IoT) requires push-based traffic, where a producer broadcasts the data based on [...] Read more.
By design, Named Data Networking (NDN) supports pull-based traffic, where content is retrieved only upon consumer request. However, some of the use cases (i.e., emergency situations) in the Internet of Things (IoT) requires push-based traffic, where a producer broadcasts the data based on the emergency situation without any consumer request. Therefore, it is necessary to modify the existing NDN forwarding engine when designing for an IoT scenario. Although solutions are provided to enable push-based traffic in IoT, the main solutions in the current literature lack data broadcast control design. Moreover, the existing solutions use an additional interest messages exchange, which creates extra overheads in the network, thereby resulting in higher delay and lower throughput. In this paper, therefore, we propose a name-based push-data broadcast control scheme for IoT systems, and consider two scenarios, i.e., smart buildings and vehicular networks. The proposed scheme consists of a robust content namespace design, device namespace design, and minor amendments to the data packet format and unsolicited data policy of the forwarding engine as well. The evaluation is carried out for both scenarios. Simulation experiments show that the proposed scheme outperforms the recent proposed schemes in terms of total number of data packets processed in the network, total energy consumption, and average delay in the network by varying the number of data packets per 2 s and varying vehicle speed. Full article
Show Figures

Figure 1

30 pages, 1932 KiB  
Article
NINQ: Name-Integrated Query Framework for Named-Data Networking of Things
by Muhammad Atif Ur Rehman, Rehmat Ullah and Byung Seo Kim
Sensors 2019, 19(13), 2906; https://doi.org/10.3390/s19132906 - 30 Jun 2019
Cited by 18 | Viewed by 4295
Abstract
Information-Centric Networking (ICN) is a paradigm shift from host-to-host Internet Protocol (IP)-based communication to content-based communication. In ICN, the content-retrieval process employs names that are given through different naming schemes such as hierarchical, flat, attribute, and hybrid. Among different ICN architectures, Named-Data Networking [...] Read more.
Information-Centric Networking (ICN) is a paradigm shift from host-to-host Internet Protocol (IP)-based communication to content-based communication. In ICN, the content-retrieval process employs names that are given through different naming schemes such as hierarchical, flat, attribute, and hybrid. Among different ICN architectures, Named-Data Networking (NDN) has gained much interest in the research community and is actively being explored for the Internet of Things (IoT) and sensor networks, and follows a hierarchical naming format. NDN protocol follows a pull-based communication model where the content consumer gets content irrespective of the location of the content provider. The content provider in NDN and sensor networks can be considered to be a distributed database that monitors or controls the environment and caches the sensed data or controls information into their memory. The proposed Name-INtegrated Query (NINQ) framework for NDN-based IoT provides a flexible, expressive, and secure query mechanism that supports content retrieval as well as control and configuration command exchange among various nodes in a smart building. Different use cases are presented in this paper that expand on the behavior of proposed query framework in different scenarios. Simulation results of data collection and exchange of control commands show that proposed query framework significantly improves Interest Satisfaction Rate (ISR), Command Satisfaction Rate (CSR), energy efficiency, and average delay. Moreover, it is evident from the simulation results that proposed query framework significantly reduces the number of transmissions in the network in both data collection and exchange of control command scenarios, which improves the network performance. Full article
Show Figures

Figure 1

19 pages, 5286 KiB  
Article
IPSCL: An Accurate Indoor Positioning Algorithm Using Sensors and Crowdsourced Landmarks
by Beakcheol Jang, Hyunjung Kim and Jong Wook Kim
Sensors 2019, 19(13), 2891; https://doi.org/10.3390/s19132891 - 29 Jun 2019
Cited by 9 | Viewed by 3677
Abstract
Indoor positioning technology has attracted the attention of researchers due to the increasing pervasiveness of smartphones and the development of sensor technology, along with the increase of indoor time. Sensor technology, which is one of the most commonly used data sources for indoor [...] Read more.
Indoor positioning technology has attracted the attention of researchers due to the increasing pervasiveness of smartphones and the development of sensor technology, along with the increase of indoor time. Sensor technology, which is one of the most commonly used data sources for indoor positioning, has the advantage that sensors can receive data from a smartphone without installing any additional device. However, the readings of built-in sensors are easily affected by the surrounding environment and are even occasionally different from each other which adversely influence the accuracy of indoor positioning. Moreover, once an error occurs, it can accumulate because there is not any reference point in the sensor, only in indoor positioning. In this paper, we present an accurate indoor positioning technology, which uses smartphone built-in sensors and Bluetooth beacon-based landmarks. Our proposed algorithm chooses proper one between values of sensors alternately based on their characteristics. It exploits landmarks as the reference points of indoor positioning. It also allows individuals to add the location where they repeatedly detect the same and special beacon received signal strength indicator values as a crowdsourced landmark. Extensive experimental results show that our proposed algorithm facilitates the acquisition of accurate heading direction and coordinates of the user. Full article
Show Figures

Figure 1

Other

Jump to: Editorial, Research

16 pages, 685 KiB  
Concept Paper
Packet Key-Based End-to-End Security Management on a Blockchain Control Plane
by Younchan Jung, Marnel Peradilla and Ronnel Agulto
Sensors 2019, 19(10), 2310; https://doi.org/10.3390/s19102310 - 19 May 2019
Cited by 14 | Viewed by 3481
Abstract
The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing session key-based security scheme [...] Read more.
The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing session key-based security scheme and overcome the limitation that the existing vertical model, as well as the Software-Defined Networking (SDN) based horizontal model, confronts within solving end-to-end security management. The proposed blockchain-based security management (BSM) scheme enables each peer to easily obtain the necessary parameters required to manage the packet key-based security system. The important features of the BSM scheme include the renewal process, which enables the different packet data streams to use completely different security parameters for the security management. In addition, because even blind values cannot be exposed to the possible attackers, our BSM scheme guarantees very secure end-to-end data transfer against active attacks such as falsification of data and transactions. Finally, this paper compares the BSM scheme with the existing vertical model to prove the advantageous effects on latency. Full article
Show Figures

Figure 1

Back to TopTop