Skip Content
You are currently on the new version of our website. Access the old version .

Journal of Sensor and Actuator Networks, Volume 14, Issue 4

2025 August - 22 articles

Cover Story: Images often contain sensitive content such as personal data, medical records, confidential documents, or military intelligence. Unauthorized access can lead to severe consequences. Encryption is an effective approach to safeguarding image security and privacy. Recently, a JPEG image encryption method using an adaptive encryption key was presented by He et al. However, He’s scheme has shown to be vulnerable to chosen plaintext attack. This study first demonstrates that the adaptive key generation in He’s scheme introduces exploitable security risks and then proposes an improved chosen plaintext attack scheme by replacing the single-permutation approach with an additive value method, which can significantly improve the attack success rates. The proposed method also provides insights for developing more robust image cryptographic schemes. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (22)

  • Article
  • Open Access
2,561 Views
23 Pages

Can Differential Privacy Hinder Poisoning Attack Detection in Federated Learning?

  • Chaitanya Aggarwal,
  • Divya G. Nair,
  • Jafar Aco Mohammadi,
  • Jyothisha J. Nair and
  • Jörg Ott

We consider the problem of data poisoning attack detection in a federated learning (FL) setup with differential privacy (DP). Local DP in FL ensures that privacy leakage caused by shared gradients is controlled by adding randomness to the process. We...

  • Article
  • Open Access
1 Citations
1,972 Views
18 Pages

This paper presents a microcontroller-based technique for accurately measuring resistive sensors over a wide dynamic range using an adaptive constant current source. Unlike conventional voltage dividers or fixed-current methods—often limited by...

  • Article
  • Open Access
1 Citations
1,617 Views
20 Pages

Space-Air-Ground Integrated Network (SAGIN), which is considered a network architecture with great development potential, exhibits significant cross-domain collaboration characteristics at present. However, most of the existing works ignore the match...

  • Article
  • Open Access
3 Citations
1,924 Views
21 Pages

Nondestructive Inspection of Steel Cables Based on YOLOv9 with Magnetic Flux Leakage Images

  • Min Zhao,
  • Ning Ding,
  • Zehao Fang,
  • Bingchun Jiang,
  • Jiaming Zhong and
  • Fuqin Deng

The magnetic flux leakage (MFL) method is widely acknowledged as a highly effective non-destructive evaluation (NDE) technique for detecting local damage in ferromagnetic structures such as steel wire ropes. In this study, a multi-channel MFL sensor...

  • Article
  • Open Access
4 Citations
5,274 Views
40 Pages

Real-Time Service Migration in Edge Networks: A Survey

  • Yutong Zhang,
  • Ke Zhao,
  • Yihong Yang and
  • Zhangbing Zhou

With the rapid proliferation of Internet of Things (IoT) devices and mobile applications and the growing demand for low-latency services, edge computing has emerged as a transformative paradigm that brings computation and storage closer to end users....

  • Article
  • Open Access
9 Citations
10,329 Views
24 Pages

Federated Learning-Based Intrusion Detection in IoT Networks: Performance Evaluation and Data Scaling Study

  • Nurtay Albanbay,
  • Yerlan Tursynbek,
  • Kalman Graffi,
  • Raissa Uskenbayeva,
  • Zhuldyz Kalpeyeva,
  • Zhastalap Abilkaiyr and
  • Yerlan Ayapov

This paper presents a large-scale empirical study aimed at identifying the optimal local deep learning model and data volume for deploying intrusion detection systems (IDS) on resource-constrained IoT devices using federated learning (FL). While prev...

  • Article
  • Open Access
1 Citations
1,201 Views
16 Pages

Traditional methods for predicting feeding amounts rely on historical data and experience but fail to account for non-linear fish growth and the influence of water quality and meteorological factors. This study presents a novel approach for sea bass...

  • Article
  • Open Access
5 Citations
12,063 Views
40 Pages

Research and Education in Robotics: A Comprehensive Review, Trends, Challenges, and Future Directions

  • Mutaz Ryalat,
  • Natheer Almtireen,
  • Ghaith Al-refai,
  • Hisham Elmoaqet and
  • Nathir Rawashdeh

Robotics has emerged as a transformative discipline at the intersection of the engineering, computer science, and cognitive sciences. This state-of-the-art review explores the current trends, methodologies, and challenges in both robotics research an...

  • Article
  • Open Access
2,591 Views
20 Pages

Dual-Purpose Star Tracker and Space Debris Detector: Miniature Instrument for Small Satellites

  • Beltran N. Arribas,
  • João G. Maia,
  • João P. Castanheira,
  • Joel Filho,
  • Rui Melicio,
  • Hugo Onderwater,
  • Paulo Gordo,
  • R. Policarpo Duarte and
  • André R. R. Silva

This paper presents the conception, design and real miniature instrument implementation of a dual-purpose sensor for small satellites that can act as a star tracker and space debris detector. In the previous research work, the authors conceived, desi...

  • Article
  • Open Access
1,627 Views
23 Pages

This paper details the development and implementation of an intelligent energy efficiency system for an electrical grid that incorporates renewable energy sources, specifically photovoltaic systems. The system is applied in a small locality of approx...

  • Article
  • Open Access
1,814 Views
15 Pages

Low Earth orbit (LEO) satellite networks deliver superior real-time performance and responsiveness compared to conventional satellite networks, despite technical and economic challenges such as high deployment costs and operational complexity. Nevert...

  • Article
  • Open Access
1,557 Views
19 Pages

An Improved Chosen Plaintext Attack on JPEG Encryption

  • Junhui He,
  • Kaitian Gu,
  • Yihan Huang,
  • Yue Li and
  • Xiang Chen

Format-compatible encryption can be used to ensure the security and privacy of JPEG images. Recently, a JPEG image encryption method proved to be secure against known plaintext attacks by employing an adaptive encryption key, which depends on the his...

  • Article
  • Open Access
2,141 Views
17 Pages

A Federated Learning Architecture for Bird Species Classification in Wetlands

  • David Mulero-Pérez,
  • Javier Rodriguez-Juan,
  • Tamai Ramirez-Gordillo,
  • Manuel Benavent-Lledo,
  • Pablo Ruiz-Ponce,
  • David Ortiz-Perez,
  • Hugo Hernandez-Lopez,
  • Anatoli Iarovikov,
  • Jose Garcia-Rodriguez and
  • Bamidele Adebisi
  • + 3 authors

Federated learning allows models to be trained on edge devices with local data, eliminating the need to share data with a central server. This significantly reduces the amount of data transferred from edge devices to central servers, which is particu...

  • Article
  • Open Access
1,922 Views
18 Pages

AI-Driven Differentiation and Quantification of Metal Ions Using ITIES Electrochemical Sensors

  • Muzammil M. N. Ahmed,
  • Parth Ganeriwala,
  • Anthi Savvidou,
  • Nicholas Breen,
  • Siddhartha Bhattacharyya and
  • Pavithra Pathirathna

Electrochemical sensors, particularly those based on ion transfer at the interface between two immiscible electrolyte solutions (ITIES), offer significant advantages such as high selectivity, ease of fabrication, and cost effectiveness for toxic meta...

  • Review
  • Open Access
2 Citations
3,831 Views
20 Pages

Detecting Abnormal Behavior Events and Gatherings in Public Spaces Using Deep Learning: A Review

  • Rafael Rodrigo-Guillen,
  • Nahuel Garcia-D’Urso,
  • Higinio Mora-Mora and
  • Jorge Azorin-Lopez

Public security is a crucial aspect of maintaining social order. Although crime rates in Western cultures may be considered socially acceptable, it is important to continually improve security measures to prevent potential risks. With the advancement...

  • Case Report
  • Open Access
1 Citations
1,704 Views
18 Pages

This case study aims to combine the advantage of the additive manufacturing of sensors with a mixed reality (MR) app, developed in a lab-scale workshop, to safely monitor and control the temperature of parts. Namely, the measurements were carried out...

  • Article
  • Open Access
3,563 Views
23 Pages

Practical Aspects of Cross-Vendor TSN Time Synchronization Using IEEE 802.1AS

  • Kilian Brunner,
  • Florian Frick,
  • Martin Ostertag and
  • Armin Lechler

Multi-vendor interoperability is essential for the stable operation, scalability, and successful market adoption of Time-Sensitive Networking (TSN). Conformance tests address protocol conformance. Informal interoperability testing and plugfests help...

  • Article
  • Open Access
2,961 Views
25 Pages

Animal-Borne Adaptive Acoustic Monitoring

  • Devin Jean,
  • Jesse Turner,
  • Will Hedgecock,
  • György Kalmár,
  • George Wittemyer and
  • Ákos Lédeczi

Animal-borne acoustic sensors provide valuable insights into wildlife behavior and environments but face significant power and storage constraints that limit deployment duration. We present a novel adaptive acoustic monitoring system designed for lon...

  • Review
  • Open Access
9 Citations
7,351 Views
27 Pages

The edge computing paradigm has gained prominence in both academic and industry circles in recent years. When edge computing facilities and services are implemented in robotics, they become a key enabler in the deployment of artificial intelligence a...

  • Article
  • Open Access
1,887 Views
17 Pages

This paper explores the integration of Internet of Things (IoT) devices into modern cybersecurity frameworks, and it is intended to be a binder for the incorporation of these devices into emerging cybersecurity paradigms. Most IoT devices rely on WPA...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Sens. Actuator Netw. - ISSN 2224-2708