Sign in to use this feature.

Years

Between: -

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (668)

Search Parameters:
Journal = JSAN

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 4085 KiB  
Review
Urban Air Mobility, Personal Drones, and the Safety of Occupants—A Comprehensive Review
by Dmytro Zhyriakov, Mariusz Ptak and Marek Sawicki
J. Sens. Actuator Netw. 2025, 14(2), 39; https://doi.org/10.3390/jsan14020039 (registering DOI) - 6 Apr 2025
Abstract
Urban air mobility (UAM) is expected to provide environmental benefits while enhancing transportation for citizens and businesses, particularly in commercial and emergency medical applications. The rapid development of electric vertical take-off and landing (eVTOL) aircraft has demonstrated the potential to introduce new technological [...] Read more.
Urban air mobility (UAM) is expected to provide environmental benefits while enhancing transportation for citizens and businesses, particularly in commercial and emergency medical applications. The rapid development of electric vertical take-off and landing (eVTOL) aircraft has demonstrated the potential to introduce new technological capabilities to the market, fostering visions of widespread and diverse UAM applications. This paper reviews state-of-the-art occupant safety for personal drones and examines existing occupant protection methods in the aircraft. The study serves as a guide for stakeholders, including regulators, manufacturers, researchers, policymakers, and industry professionals—by providing insights into the regulatory landscape and safety assurance frameworks for eVTOL aircraft in UAM applications. Furthermore, we present a functional hazard assessment (FHA) conducted on a reference concept, detailing the process, decision-making considerations, and key variations. The analysis illustrates the FHA methodology while discussing the trade-offs involved in safety evaluations. Additionally, we provide a summary and a featured description of current eVTOL aircraft, highlighting their key characteristics and technological advancements. Full article
(This article belongs to the Special Issue Advances in Intelligent Transportation Systems (ITS))
33 pages, 9824 KiB  
Article
An Efficient Framework for Peer Selection in Dynamic P2P Network Using Q Learning with Fuzzy Linear Programming
by Mahalingam Anandaraj, Tahani Albalawi and Mohammad Alkhatib
J. Sens. Actuator Netw. 2025, 14(2), 38; https://doi.org/10.3390/jsan14020038 - 2 Apr 2025
Viewed by 47
Abstract
This paper proposes a new approach to integrating Q learning into the fuzzy linear programming (FLP) paradigm to improve peer selection in P2P networks. Using Q learning, the proposed method employs real-time feedback to adjust and update peer selection policies. The FLP framework [...] Read more.
This paper proposes a new approach to integrating Q learning into the fuzzy linear programming (FLP) paradigm to improve peer selection in P2P networks. Using Q learning, the proposed method employs real-time feedback to adjust and update peer selection policies. The FLP framework enriches this process by dealing with imprecise information through fuzzy logic. It is used to achieve multiple objectives, such as enhancing the throughput rate, reducing the delay, and guaranteeing a reliable connection. This integration effectively solves the problem of network uncertainty, making the network configuration more stable and flexible. It is also important to note that throughout the use of the Q-learning agent in the network, various state metric indicators, including available bandwidth, latency, packet drop rates, and connectivity of nodes, are observed and recorded. It then selects actions by choosing optimal peers for each node and updating a Q table that defines states and actions based on these performance indices. This reward system guides the agent’s learning, refining its peer selection policy over time. The FLP framework supports the Q-learning agent by providing optimized solutions that balance conflicting objectives under uncertain conditions. Fuzzy parameters capture variability in network metrics, and the FLP model solves a fuzzy linear programming problem, offering guidelines for the Q-learning agent’s decisions. The proposed method is evaluated under different experimental settings to reveal its effectiveness. The Erdos–Renyi model simulation is used, and it shows that throughput increased by 21% and latency decreased by 40%. The computational efficiency was also notably improved, with computation times diminishing by up to five orders of magnitude compared to traditional methods. Full article
Show Figures

Figure 1

42 pages, 1685 KiB  
Article
Heterogeneity Challenges of Federated Learning for Future Wireless Communication Networks
by Lorena Isabel Barona López and Thomás Borja Saltos
J. Sens. Actuator Netw. 2025, 14(2), 37; https://doi.org/10.3390/jsan14020037 - 1 Apr 2025
Viewed by 130
Abstract
Two technologies of great interest in recent years—Artificial Intelligence (AI) and massive wireless communication networks—have found a significant point of convergence through Federated Learning (FL). Federated Learning is a Machine Learning (ML) technique that enables multiple participants to collaboratively train a model while [...] Read more.
Two technologies of great interest in recent years—Artificial Intelligence (AI) and massive wireless communication networks—have found a significant point of convergence through Federated Learning (FL). Federated Learning is a Machine Learning (ML) technique that enables multiple participants to collaboratively train a model while keeping their data local. Several studies indicate that while improving performance metrics—such as accuracy, loss reduction, or computation time—is a primary goal, achieving this in real-world scenarios remains challenging. This difficulty arises due to various heterogeneity characteristics inherent to the wireless devices participating in the Federation. Heterogeneity in Federated Learning arises when participants contribute differently, leading to challenges in the model training process. Heterogeneity in Federated Learning may appear in architecture, statistics, and behavior. System heterogeneity arises from differences in device capabilities, including processing power, transmission speeds, availability, energy constraints, and network limitations, among others. Statistical heterogeneity occurs when participants contribute non-independent and non-identically distributed (non-IID) data. This situation can harm the global model instead of improving it, especially when the data are of poor quality or too scarce. The third type, behavioral heterogeneity, refers to cases where participants are unwilling to engage or expect rewards despite minimal effort. Given the growing research in this area, we present a summary of heterogeneity characteristics in Federated Learning to provide a broader perspective on this emerging technology. We also outline key challenges, opportunities, and future directions for Federated Learning. Finally, we conduct a simulation using the LEAF framework to illustrate the impact of heterogeneity in Federated Learning. Full article
(This article belongs to the Special Issue Federated Learning: Applications and Future Directions)
Show Figures

Figure 1

36 pages, 28868 KiB  
Article
Lower-Complexity Multi-Layered Security Partitioning Algorithm Based on Chaos Mapping-DWT Transform for WA/SNs
by Tarek Srour, Mohsen A. M. El-Bendary, Mostafa Eltokhy, Atef E. Abouelazm, Ahmed A. F. Youssef and Ali M. El-Rifaie
J. Sens. Actuator Netw. 2025, 14(2), 36; https://doi.org/10.3390/jsan14020036 - 31 Mar 2025
Viewed by 89
Abstract
The resource limitations of Low-Power Wireless Networks (LP-WNs), such as Wireless Sensor Networks (WSNs), Wireless Actuator/Sensor Networks (WA/SNs), and Internet of Things (IoT) outdoor applications, restrict the utilization of the error-performance-enhancing techniques and the use of the powerful and robust security tools. Therefore, [...] Read more.
The resource limitations of Low-Power Wireless Networks (LP-WNs), such as Wireless Sensor Networks (WSNs), Wireless Actuator/Sensor Networks (WA/SNs), and Internet of Things (IoT) outdoor applications, restrict the utilization of the error-performance-enhancing techniques and the use of the powerful and robust security tools. Therefore, these LP-WN applications require special techniques to satisfy the requirements of a low data loss rate and satisfy the security requirements while considering the accepted level of complexity and power efficiency of these techniques. This paper focuses on proposing a power-efficient, robust cryptographic algorithm for the WA/SNs. The lower-complexity cryptographic algorithm is proposed, based on merging the data composition tools utilizing data transforms and chaos mapping techniques. The decomposing tool is performed by the various data transforms: Discrete Cosine Transform (DCT), Discrete Cosine Wavelet (DWT), Fast Fourier Transform (FFT), and Walsh Hadamard Transform (WHT); the DWT performs better with efficient complexity. It is utilized to separate the plaintext into the main portion and side information portions to reduce more than 50% of complexity. The main plaintext portion is ciphered in the series of cryptography to reduce the complexity and increase the security capabilities of the proposed algorithm by two chaos mappings. The process of reduction saves complexity and is employed to feed the series of chaos cryptography without increasing the complexity. The two chaos mappings are used, and two-dimensional (2D) chaos logistic maps are used due to their high sensitivity to noise and attacks. The chaos 2D baker map is utilized due to its high secret key managing flexibility and high sensitivity to initial conditions and plaintext dimensions. Several computer experiments are demonstrated to evaluate the robustness, reliability, and applicability of the proposed complexity-efficient crypto-system algorithm in the presence of various attacks. The results prove the high suitability of the proposed lower-complexity crypto-system for WASN and LP-WN applications due to its robustness in the presence of attacks and its power efficiency. Full article
Show Figures

Figure 1

19 pages, 2620 KiB  
Article
A Zero-Trust Multi-Processor Reporter-Verifier Design of Edge Devices for Firmware Authenticity in Internet of Things and Blockchain Applications
by Ananda Maiti and Alexander A. Kist
J. Sens. Actuator Netw. 2025, 14(2), 35; https://doi.org/10.3390/jsan14020035 - 31 Mar 2025
Viewed by 61
Abstract
Firmware authenticity and integrity during upgrades are critical security factors in Internet of Things (IoT) applications in the age of edge artificial intelligence (AI). Data from IoT applications are vital for business decisions. Any unintended or malicious change in data can adversely impact [...] Read more.
Firmware authenticity and integrity during upgrades are critical security factors in Internet of Things (IoT) applications in the age of edge artificial intelligence (AI). Data from IoT applications are vital for business decisions. Any unintended or malicious change in data can adversely impact the goals of an IoT application. Several studies have focused on using blockchain to ensure the authentication of IoT devices and the integrity of data once the data are in the blockchain. Firmware upgrades on IoT edge devices have also been investigated with blockchain applications, with a focus on eliminating external threats during firmware upgrades on IoT devices. In this paper, we propose a new IoT device design that works against internal threats by preventing malicious codes from device manufacturers. In IoT applications that monitor critical data, it is important to ensure that the correct firmware reporting honest data is running on the devices. As devices are owned and operated by a small group of application stakeholders, this multiprocessor design extracts the firmware periodically and checks whether it matches the signatures of the expected firmware designed for the business goals of the IoT applications. The test results show that there is no significant increase in code, disruption, or power consumption when implementing such a device. This scheme provides a hardware-oriented solution utilizing processor-to-processor communication protocols and is an alternative to running lightweight blockchain on IoT edge devices. Full article
Show Figures

Figure 1

18 pages, 2545 KiB  
Article
Sensor Fusion Enhances Anomaly Detection in a Flood Forecasting System
by Andrew Ma, Abhir Karande, Natalie Dahlquist, Fabien Ferrero and N. Rich Nguyen
J. Sens. Actuator Netw. 2025, 14(2), 34; https://doi.org/10.3390/jsan14020034 - 25 Mar 2025
Viewed by 200
Abstract
To build an Internet of Things (IoT) infrastructure that provides flood susceptibility forecasts for granular geographic levels, an extensive network of IoT weather sensors in local regions is crucial. However, these IoT devices may exhibit anomalistic behavior due to factors such as diminished [...] Read more.
To build an Internet of Things (IoT) infrastructure that provides flood susceptibility forecasts for granular geographic levels, an extensive network of IoT weather sensors in local regions is crucial. However, these IoT devices may exhibit anomalistic behavior due to factors such as diminished signal strength, physical disturbance, low battery life, and more. To ensure that incorrect readings are identified and addressed appropriately, we devise a novel method for multi-stream sensor data verification and anomaly detection. Our method uses time-series anomaly detection to identify incorrect readings. We expand on the state-of-the-art by incorporating sensor fusion mechanisms between nearby devices to improve anomaly detection ability. Our system pairs nearby devices and fuses them by creating a new time series with the difference between the corresponding readings. This new time series is then input into a time-series anomaly detection model which identifies if any readings are anomalistic. By testing our system with nine different machine learning anomaly detection methods on synthetic data based on one year of real weather data, we find that our system outperforms the previous anomaly detection methods by improving F1-Score by 10.8%. Full article
(This article belongs to the Special Issue Fault Diagnosis in the Internet of Things Applications)
Show Figures

Figure 1

22 pages, 5973 KiB  
Article
Environmental Factors in Structural Health Monitoring—Analysis and Removal of Effects from Resonance Frequencies
by Rims Janeliukstis, Lasma Ratnika, Liga Gaile and Sandris Rucevskis
J. Sens. Actuator Netw. 2025, 14(2), 33; https://doi.org/10.3390/jsan14020033 - 20 Mar 2025
Viewed by 225
Abstract
Strategically important objects, such as dams, tunnels, bridges, and others, require long-term structural health monitoring programs in order to preserve their structural integrity with minimal downtime, financial expenses, and increased safety for civilians. The current study focuses on developing a damage detection methodology [...] Read more.
Strategically important objects, such as dams, tunnels, bridges, and others, require long-term structural health monitoring programs in order to preserve their structural integrity with minimal downtime, financial expenses, and increased safety for civilians. The current study focuses on developing a damage detection methodology that is applicable to the long-term monitoring of such structures. It is based on the identification of resonant frequencies from operational modal analysis, removing the effect of environmental factors on the resonant frequencies through support vector regression with optimized hyperparameters and, finally, classifying the global structural state as either healthy or damaged, utilizing the Mahalanobis distance. The novelty lies in two additional steps that supplement this procedure, namely, the nonlinear estimation of the relative effects of various environmental factors, such as temperature, humidity, and ambient loads on the resonant frequencies, and the selection of the most informative resonant frequency features using a non-parametric neighborhood component analysis algorithm. This methodology is validated on a wooden two-story truss structure with different artificial structural modifications that simulate damage in a non-destructive manner. It is found that, firstly, out of all environmental factors, temperature has a dominating decreasing effect on resonance frequencies, followed by humidity, wind speed, and precipitation. Secondly, the selection of only a handful of the most informative resonance frequency features not only reduces the feature space, but also increases the classification performance, albeit with a trade-off between false alarms and missed damage detection. The proposed approach effectively minimizes false alarms and ensures consistent damage detection under varying environmental conditions, offering tangible benefits for long-term SHM applications. Full article
(This article belongs to the Special Issue Fault Diagnosis in the Internet of Things Applications)
Show Figures

Figure 1

24 pages, 3015 KiB  
Article
Robust Distributed Collaborative Beamforming for WSANs in Dual-Hop Scattered Environments with Nominally Rectangular Layouts
by Oussama Ben Smida, Sofiène Affes, Dushantha Jayakody and Yoosuf Nizam
J. Sens. Actuator Netw. 2025, 14(2), 32; https://doi.org/10.3390/jsan14020032 - 19 Mar 2025
Viewed by 203
Abstract
We introduce a robust distributed collaborative beamforming (RDCB) approach for addressing channel estimation challenges in dual-hop transmissions within wireless sensor and actuator networks (WSANs) of K nodes. WSANs enhance wireless communication by reducing data transmission, latency, and energy consumption while optimizing network load [...] Read more.
We introduce a robust distributed collaborative beamforming (RDCB) approach for addressing channel estimation challenges in dual-hop transmissions within wireless sensor and actuator networks (WSANs) of K nodes. WSANs enhance wireless communication by reducing data transmission, latency, and energy consumption while optimizing network load through integrated sensing and actuation. The source S transmits signals to the WSAN, where nodes relay them to the destination D using beamforming weights to minimize noise and preserve signal integrity. These weights depend on channel state information (CSI), where estimation errors degrade performance. We develop RDCB solutions for three first-hop propagation scenarios—monochromatic [line-of-sight (LoS)] or “M”, bichromatic (moderately scattered) or “B”, and polychromatic (highly scattered) or “P”—while assuming a monochromatic LoS or “M” link for the second hop between the nodes and the far-field destination. Termed MM-RDCB, BM-RDCB, and PM-RDCB, respectively (“X” and “Y” in XY-RDCB—for X {M,B,P} and Y {M}—refer to the chromatic natures of the first- and second-hop channels, respectively, to which a specific RDCB solution is tailored), these solutions leverage asymptotic approximations for large K values and the nodes’ geometric symmetries. Our distributed solutions allow local weight computation, enhancing spectral and power efficiency. Simulation results show significant improvements in the signal-to-noise ratio (SNR) and robustness versus WSAN node placement errors, making the solutions well suited for emerging 5G and future 5G+/6G and Internet of Things (IoT) applications for different challenging environments. Full article
Show Figures

Figure 1

11 pages, 894 KiB  
Article
Optimizing Sensor Locations for Electrodermal Activity Monitoring Using a Wearable Belt System
by Riley Q. McNaboe, Youngsun Kong, Wendy A. Henderson, Xiaomei Cong, Aolan Li, Min-Hee Seo, Ming-Hui Chen, Bin Feng and Hugo F. Posada-Quintero
J. Sens. Actuator Netw. 2025, 14(2), 31; https://doi.org/10.3390/jsan14020031 - 18 Mar 2025
Viewed by 135
Abstract
Wearable devices for continuous health monitoring in humans are constantly evolving, yet the signal quality may be improved by optimizing electrode placement. While the commonly used locations to measure electrodermal activity (EDA) are at the fingers or the wrist, alternative locations, such as [...] Read more.
Wearable devices for continuous health monitoring in humans are constantly evolving, yet the signal quality may be improved by optimizing electrode placement. While the commonly used locations to measure electrodermal activity (EDA) are at the fingers or the wrist, alternative locations, such as the torso, need to be considered when applying an integrated multimodal approach of concurrently recording multiple bio-signals, such as the monitoring of visceral pain symptoms like those related to irritable bowel syndrome (IBS). This study aims to quantitatively determine the EDA signal quality at four torso locations (mid-chest, upper abdomen, lower back, and mid-back) in comparison to EDA signals recorded from the fingers. Concurrent EDA signals from five body locations were collected from twenty healthy participants as they completed a Stroop Task and a Cold Pressor task that elicited salient autonomic responses. Mean skin conductance (meanSCL), non-specific skin conductance responses (NS.SCRs), and sympathetic response (TVSymp) were derived from the torso EDA signals and compared with signals from the fingers. Notably, TVSymp recorded from the mid-chest location showed significant changes between baseline and Stroop phase, consistent with the TVSymp recorded from the fingers. A high correlation (0.77–0.83) was also identified between TVSymp recorded from the fingers and three torso locations: mid-chest, upper abdomen, and lower back locations. While the fingertips remain the optimal site for EDA measurement, the mid-chest exhibited the strongest potential as an alternative recording site, with the upper abdomen and lower back also demonstrating promising results. These findings suggest that torso-based EDA measurements have the potential to provide reliable measurement of sympathetic neural activities and may be incorporated into a wearable belt system for multimodal monitoring. Full article
Show Figures

Figure 1

73 pages, 5355 KiB  
Review
Key Enabling Technologies for 6G: The Role of UAVs, Terahertz Communication, and Intelligent Reconfigurable Surfaces in Shaping the Future of Wireless Networks
by Wagdy M. Othman, Abdelhamied A. Ateya, Mohamed E. Nasr, Ammar Muthanna, Mohammed ElAffendi, Andrey Koucheryavy and Azhar A. Hamdi
J. Sens. Actuator Netw. 2025, 14(2), 30; https://doi.org/10.3390/jsan14020030 - 17 Mar 2025
Viewed by 569
Abstract
Sixth-generation (6G) wireless networks have the potential to transform global connectivity by supporting ultra-high data rates, ultra-reliable low latency communication (uRLLC), and intelligent, adaptive networking. To realize this vision, 6G must incorporate groundbreaking technologies that enhance network efficiency, spectral utilization, and dynamic adaptability. [...] Read more.
Sixth-generation (6G) wireless networks have the potential to transform global connectivity by supporting ultra-high data rates, ultra-reliable low latency communication (uRLLC), and intelligent, adaptive networking. To realize this vision, 6G must incorporate groundbreaking technologies that enhance network efficiency, spectral utilization, and dynamic adaptability. Among them, unmanned aerial vehicles (UAVs), terahertz (THz) communication, and intelligent reconfigurable surfaces (IRSs) are three major enablers in redefining the architecture and performance of next-generation wireless systems. This survey provides a comprehensive review of these transformative technologies, exploring their potential, design challenges, and integration into future 6G ecosystems. UAV-based communication provides flexible, on-demand communication in remote, harsh areas and is a vital solution for disasters, self-driving, and industrial automation. THz communication taking place in the 0.1–10 THz band reveals ultra-high bandwidth capable of a data rate of multi-gigabits per second and can avoid spectrum bottlenecks in conventional bands. IRS technology based on programmable metasurface allows real-time wavefront control, maximizing signal propagation and spectral/energy efficiency in complex settings. The work provides architectural evolution, active current research trends, and practical issues in applying these technologies, including their potential contribution to the creation of intelligent, ultra-connected 6G networks. In addition, it presents open research questions, possible answers, and future directions and provides information for academia, industry, and policymakers. Full article
Show Figures

Figure 1

41 pages, 8160 KiB  
Article
Comprehensive Exploration of Limitations of Simplified Machine Learning Algorithm for Fault Diagnosis Under Fault and Ground Resistances of Multiterminal High-Voltage Direct Current System
by Raheel Muzzammel
J. Sens. Actuator Netw. 2025, 14(2), 29; https://doi.org/10.3390/jsan14020029 - 17 Mar 2025
Viewed by 218
Abstract
High power density and better efficiency make the multiterminal high-voltage direct current (MT-HVDC) system the best candidate for long-distance bulk power transfer in the cases of onshore and offshore power systems. Many machine learning-based algorithms have been developed for the protection of MT-HVDC [...] Read more.
High power density and better efficiency make the multiterminal high-voltage direct current (MT-HVDC) system the best candidate for long-distance bulk power transfer in the cases of onshore and offshore power systems. Many machine learning-based algorithms have been developed for the protection of MT-HVDC systems. However, the exploration of the effects of change in the fault and ground resistances of MT-HVDC systems has not been studied comprehensively. In this study, a four-terminal HVDC test system is employed for the analysis of the effects on fault diagnosis under change in the fault and ground resistances. A simplified medium tree-based machine learning algorithm that works on Gini’s index of diversity is developed for fault diagnosis in the MT-HVDC system. It is found from the simulation analysis that the preprocessing based on mean and differences in featured data extracted for fault current is required to reduce the impacts of the accuracy of machine learning algorithms. The preprocessing not only retains the accuracy of the machine learning algorithm in different cases of faults, but also minimizes the reduction in accuracy in some fault cases. In the test cases, the accuracy is 88.7%, 60%, and 57.1% without preprocessing of featured data for the machine learning algorithm under different values of fault and ground resistances, but the accuracy is improved to 99.5%, 84.1%, and 77.8%, respectively. Hence, the machine learning algorithm can be made applicable under different values of fault and ground resistances for the protection of the MT-HVDC system. This helps to develop a protected MT-HVDC system for long distances without the fear of different soil conditions. Full article
Show Figures

Figure 1

46 pages, 3073 KiB  
Review
Compressive Sensing in Power Engineering: A Comprehensive Survey of Theory and Applications, and a Case Study
by Lekshmi R. Chandran, Ilango Karuppasamy, Manjula G. Nair, Hongjian Sun and Parvathy Krishnan Krishnakumari
J. Sens. Actuator Netw. 2025, 14(2), 28; https://doi.org/10.3390/jsan14020028 - 7 Mar 2025
Viewed by 468
Abstract
Compressive Sensing (CS) is a transformative signal processing framework that enables sparse signal acquisition at rates below the Nyquist limit, offering substantial advantages in data efficiency and reconstruction accuracy. This survey explores the theoretical foundations of CS, including sensing matrices, sparse bases, and [...] Read more.
Compressive Sensing (CS) is a transformative signal processing framework that enables sparse signal acquisition at rates below the Nyquist limit, offering substantial advantages in data efficiency and reconstruction accuracy. This survey explores the theoretical foundations of CS, including sensing matrices, sparse bases, and recovery algorithms, with a focus on its applications in power engineering. CS has demonstrated significant potential in enhancing key areas such as state estimation (SE), fault detection, fault localization, outage identification, harmonic source identification (HSI), Power Quality Detection condition monitoring, and so on. Furthermore, CS addresses challenges in data compression, real-time grid monitoring, and efficient resource utilization. A case study on smart meter data recovery demonstrates the practical application of CS in real-world power systems. By bridging CS theory and its application, this survey underscores its potential to drive innovation, efficiency, and sustainability in power engineering and beyond. Full article
(This article belongs to the Section Wireless Control Networks)
Show Figures

Figure 1

36 pages, 570 KiB  
Review
Network Diffusion Algorithms and Simulators in IoT and Space IoT: A Systematic Review
by Charbel Mattar, Jacques Bou Abdo, Jacques Demerjian and Abdallah Makhoul
J. Sens. Actuator Netw. 2025, 14(2), 27; https://doi.org/10.3390/jsan14020027 - 4 Mar 2025
Cited by 1 | Viewed by 700
Abstract
Network diffusion algorithms and simulators play a critical role in understanding how information, data, and malware propagate across various network topologies in Internet of Things and Space IoT configurations. This paper conducts a systematic literature review (SLR) of the key diffusion algorithms and [...] Read more.
Network diffusion algorithms and simulators play a critical role in understanding how information, data, and malware propagate across various network topologies in Internet of Things and Space IoT configurations. This paper conducts a systematic literature review (SLR) of the key diffusion algorithms and network simulators utilized in studies over the past decade. The review focuses on identifying the algorithms and simulators employed, their strengths and limitations, and how their performance is evaluated under different IoT network topologies. Common network simulators, such as NS-3, Cooja, and OMNeT++ are explored, highlighting their features, scalability, and suitability for different IoT network scenarios. Additionally, network diffusion algorithms, including epidemic, cascading, and threshold models, are analyzed in terms of their effectiveness, complexity, and applicability in IoT environments with diverse network topologies. This SLR aims to provide a comprehensive reference for researchers and practitioners when selecting appropriate tools and methods for simulating and analyzing network diffusion across IoT and Space IoT configurations. Full article
Show Figures

Figure 1

26 pages, 552 KiB  
Article
A Proactive Charging Approach for Extending the Lifetime of Sensor Nodes in Wireless Rechargeable Sensor Networks
by Omar Banimelhem and Shifa’a Bani Hamad
J. Sens. Actuator Netw. 2025, 14(2), 26; https://doi.org/10.3390/jsan14020026 - 3 Mar 2025
Viewed by 410
Abstract
Although wireless sensor networks (WSNs) have a wide range of applications, their efficient utilization is still limited by the sensor node battery life. To overcome this issue, wireless power transfer technology (WPT) has recently been used to wirelessly charge sensor nodes and extend [...] Read more.
Although wireless sensor networks (WSNs) have a wide range of applications, their efficient utilization is still limited by the sensor node battery life. To overcome this issue, wireless power transfer technology (WPT) has recently been used to wirelessly charge sensor nodes and extend their lifespan. This technique paved the way to develop a wireless rechargeable sensor network (WRSN) in which a mobile charger (MC) is employed to recharge the sensor nodes. Several wireless charging technologies have been proposed in this field, but they are all tied up in two classes: periodic and on-demand strategies. This paper proposes a proactive charging method as a new charging strategy that anticipates the node’s need for energy in advance based on factors such as the node’s remaining energy, energy consumption rate, and the distance to the MC. The goal is to prevent sensor nodes from depleting their energy before the arrival of the MC. Unlike conventional methods where nodes have to request energy, the proactive charging strategy identifies the nodes that need energy before they reach a critical state. Simulation results have demonstrated that the proactive charging approach using a single MC can significantly improve the network lifespan by 500% and outperform the Nearest Job Next with Preemption (NJNP) and First Come First Serve (FCFS) techniques in terms of the number of survival nodes by 300% and 650%, respectively. Full article
Show Figures

Figure 1

23 pages, 5269 KiB  
Article
Monitoring Daily Activities in Households by Means of Energy Consumption Measurements from Smart Meters
by Álvaro Hernández, Rubén Nieto, Laura de Diego-Otón, José M. Villadangos-Carrizo, Daniel Pizarro, David Fuentes and María C. Pérez-Rubio
J. Sens. Actuator Netw. 2025, 14(2), 25; https://doi.org/10.3390/jsan14020025 - 27 Feb 2025
Viewed by 525
Abstract
Non-Intrusive Load Monitoring (NILM) includes a set of methods orientated to disaggregating the power consumption of a household per appliance. It is commonly based on a single metering point, typically a smart meter at the entry of the electrical grid of the building, [...] Read more.
Non-Intrusive Load Monitoring (NILM) includes a set of methods orientated to disaggregating the power consumption of a household per appliance. It is commonly based on a single metering point, typically a smart meter at the entry of the electrical grid of the building, where signals of interest, such as voltage or current, can be measured and analyzed in order to disaggregate and identify which appliance is turned on/off at any time. Although this information is key for further applications linked to energy efficiency and management, it may also be applied to social and health contexts. Since the activation of the appliances in a household is related to certain daily activities carried out by the corresponding tenants, NILM techniques are also interesting in the design of remote monitoring systems that can enhance the development of novel feasible healthcare models. Therefore, these techniques may foster the independent living of elderly and/or cognitively impaired people in their own homes, while relatives and caregivers may have access to additional information about a person’s routines. In this context, this work describes an intelligent solution based on deep neural networks, which is able to identify the daily activities carried out in a household, starting from the disaggregated consumption per appliance provided by a commercial smart meter. With the daily activities identified, the usage patterns of the appliances and the corresponding behaviour can be monitored in the long term after a training period. In this way, every new day may be assessed statistically, thus providing a score about how similar this day is to the routines learned during the training interval. The proposal has been experimentally validated by means of two commercially available smart monitors installed in real houses where tenants followed their daily routines, as well as by using the well-known database UK-DALE. Full article
Show Figures

Figure 1

Back to TopTop