Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,102)

Search Parameters:
Keywords = ad hoc networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
33 pages, 629 KiB  
Article
Enhancing Smart City Connectivity: A Multi-Metric CNN-LSTM Beamforming Based Approach to Optimize Dynamic Source Routing in 6G Networks for MANETs and VANETs
by Vincenzo Inzillo, David Garompolo and Carlo Giglio
Smart Cities 2024, 7(5), 3022-3054; https://doi.org/10.3390/smartcities7050118 - 17 Oct 2024
Viewed by 331
Abstract
The advent of Sixth Generation (6G) wireless technologies introduces challenges and opportunities for Mobile Ad Hoc Networks (MANETs) and Vehicular Ad Hoc Networks (VANETs), necessitating a reevaluation of traditional routing protocols. This paper introduces the Multi-Metric Scoring Dynamic Source Routing (MMS-DSR), a novel [...] Read more.
The advent of Sixth Generation (6G) wireless technologies introduces challenges and opportunities for Mobile Ad Hoc Networks (MANETs) and Vehicular Ad Hoc Networks (VANETs), necessitating a reevaluation of traditional routing protocols. This paper introduces the Multi-Metric Scoring Dynamic Source Routing (MMS-DSR), a novel enhancement of the Dynamic Source Routing (DSR) protocol, designed to meet the demands of 6G-enabled MANETs and the dynamic environments of VANETs. MMS-DSR integrates advanced technologies and methodologies to enhance routing performance in dynamic scenarios. Key among these is the use of a CNN-LSTM-based beamforming algorithm, which optimizes beamforming vectors dynamically, exploiting spatial-temporal variations characteristic of 6G channels. This enables MMS-DSR to adapt beam directions in real time based on evolving network conditions, improving link reliability and throughput. Furthermore, MMS-DSR incorporates a multi-metric scoring mechanism that evaluates routes based on multiple QoS parameters, including latency, bandwidth, and reliability, enhanced by the capabilities of Massive MIMO and the IEEE 802.11ax standard. This ensures route selection is context-aware and adaptive to changing dynamics, making it effective in urban settings where vehicular and mobile nodes coexist. Additionally, the protocol uses machine learning techniques to predict future route performance, enabling proactive adjustments in routing decisions. The integration of dynamic beamforming and machine learning allows MMS-DSR to effectively handle the high mobility and variability of 6G networks, offering a robust solution for future wireless communications, particularly in smart cities. Full article
Show Figures

Figure 1

12 pages, 278 KiB  
Article
Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks
by Alejandro Martínez-Arce, Alberto Bermejo-Cantarero, Laura Muñoz de Morales-Romero, Víctor Baladrón-González, Natalia Bejarano-Ramírez, Gema Verdugo-Moreno, María Antonia Montero-Gaspar and Francisco Javier Redondo-Calvo
Nurs. Rep. 2024, 14(4), 3040-3051; https://doi.org/10.3390/nursrep14040221 - 17 Oct 2024
Viewed by 474
Abstract
Background: In the transition to a professional learning environment, healthcare professionals in their first year of specialized postgraduate clinical training (known as residents in Spain) are suddenly required to handle confidential information with little or no prior training in the safe and appropriate [...] Read more.
Background: In the transition to a professional learning environment, healthcare professionals in their first year of specialized postgraduate clinical training (known as residents in Spain) are suddenly required to handle confidential information with little or no prior training in the safe and appropriate use of digital media with respect to confidentiality issues. The aims of this study were: (1) to explore the usefulness of an advanced clinical simulation program for educating residents from different healthcare disciplines about confidentiality and the dissemination of clinical data or patient images; (2) to explore the use of social networks in healthcare settings; and (3) to explore participants’ knowledge and attitudes on current regulations regarding confidentiality, image dissemination, and the use of social networks; Methods: This was a cross-sectional study. Data were collected from all 49 first-year residents of different health professions at a Spanish hospital between June and August 2022. High-fidelity clinical simulation sessions designed to address confidentiality and health information dissemination issues in hospital settings, including the use of social networks, were developed and implemented. Data were assessed using a 12-item ad hoc questionnaire on confidentiality and the use of social media in the healthcare setting. Descriptive of general data and chi-square test or Fisher’s exact test were performed using the SPSS 25.0 software; Results: All the participants reported using the messaging application WhatsApp regularly during their working day. A total of 20.4% of the participants stated that they had taken photos of clinical data (radiographs, analyses, etc.) without permission, with 40.8% claiming that they were unaware of the legal consequences of improper access to clinical records. After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. Further follow-up studies are needed to see how these attitudes are incorporated into clinical practice. Full article
12 pages, 1157 KiB  
Article
Multi-Layered Unsupervised Learning Driven by Signal-to-Noise Ratio-Based Relaying for Vehicular Ad Hoc Network-Supported Intelligent Transport System in eHealth Monitoring
by Ali Nauman, Adeel Iqbal, Tahir Khurshaid and Sung Won Kim
Sensors 2024, 24(20), 6548; https://doi.org/10.3390/s24206548 - 11 Oct 2024
Viewed by 608
Abstract
Every year, about 1.19 million people are killed in traffic accidents; hence, the United Nations has a goal of halving the number of road traffic deaths and injuries by 2030. In line with this objective, technological innovations in telecommunication, particularly brought about by [...] Read more.
Every year, about 1.19 million people are killed in traffic accidents; hence, the United Nations has a goal of halving the number of road traffic deaths and injuries by 2030. In line with this objective, technological innovations in telecommunication, particularly brought about by the rise of 5G networks, have contributed to the development of modern Vehicle-to-Everything (V2X) systems for communication. A New Radio V2X (NR-V2X) was introduced in the latest Third Generation Partnership Project (3GPP) releases which allows user devices to exchange information without relying on roadside infrastructures. This, together with Massive Machine Type Communication (mMTC) and Ultra-Reliable Low Latency Communication (URLLC), has led to the significantly increased reliability, coverage, and efficiency of vehicular communication networks. The use of artificial intelligence (AI), especially K-means clustering, has been very promising in terms of supporting efficient data exchange in vehicular ad hoc networks (VANETs). K-means is an unsupervised machine learning (ML) technique that groups vehicles located near each other geographically so that they can communicate with one another directly within these clusters while also allowing for inter-cluster communication via cluster heads. This paper proposes a multi-layered VANET-enabled Intelligent Transportation System (ITS) framework powered by unsupervised learning to optimize communication efficiency, scalability, and reliability. By leveraging AI in VANET solutions, the proposed framework aims to address road safety challenges and contribute to global efforts to meet the United Nations’ 2030 target. Additionally, this framework’s robust communication and data processing capabilities can be extended to eHealth monitoring systems, enabling real-time health data transmission and processing for continuous patient monitoring and timely medical interventions. This paper’s contributions include exploring AI-driven approaches for enhanced data interaction, improved safety in VANET-based ITS environments, and potential applications in eHealth monitoring. Full article
(This article belongs to the Special Issue Intelligent Sensors and Control for Vehicle Automation)
Show Figures

Figure 1

16 pages, 275 KiB  
Article
A Cross-Entropy Approach to the Domination Problem and Its Variants
by Ryan Burdett, Michael Haythorpe and Alex Newcombe
Entropy 2024, 26(10), 844; https://doi.org/10.3390/e26100844 - 6 Oct 2024
Viewed by 369
Abstract
The domination problem and three of its variants (total domination, 2-domination, and secure domination) are considered. These problems have various real-world applications, including error correction codes, ad hoc routing for wireless networks, and social network analysis, among others. However, each of them is [...] Read more.
The domination problem and three of its variants (total domination, 2-domination, and secure domination) are considered. These problems have various real-world applications, including error correction codes, ad hoc routing for wireless networks, and social network analysis, among others. However, each of them is NP-hard to solve to provable optimality, making fast heuristics for these problems desirable. There are a wealth of highly developed heuristics and approximation algorithms for the domination problem; however, such heuristics are much less common for variants of the domination problem. We redress this gap in the literature by proposing a novel implementation of the cross-entropy method that can be applied to any sensible variant of domination. We present results from experiments that demonstrate that this approach can produce good results in an efficient manner even for larger graphs and that it works roughly as well for any of the domination variants considered. Full article
Show Figures

Figure 1

37 pages, 1076 KiB  
Article
Distributed Ledger-Based Authentication and Authorization of IoT Devices in Federated Environments
by Michał Jarosz, Konrad Wrona and Zbigniew Zieliński
Electronics 2024, 13(19), 3932; https://doi.org/10.3390/electronics13193932 - 4 Oct 2024
Viewed by 522
Abstract
One of the main security challenges when federating separate Internet of Things (IoT) administrative domains is effective Identity and Access Management, which is required to establish trust and secure communication between federated IoT devices. The primary goal of the work is to develop [...] Read more.
One of the main security challenges when federating separate Internet of Things (IoT) administrative domains is effective Identity and Access Management, which is required to establish trust and secure communication between federated IoT devices. The primary goal of the work is to develop a “lightweight” protocol to enable authentication and authorization of IoT devices in federated environments and ensure the secure communication of IoT devices. We propose a novel Lightweight Authentication and Authorization Framework for Federated IoT (LAAFFI) which takes advantage of the unique fingerprint of IoT devices based on their configuration and additional hardware modules, such as Physical Unclonable Function, to provide flexible authentication and authorization based on Distributed Ledger technology. Moreover, LAAFFI supports IoT devices with limited computing resources and devices not equipped with secure storage space. We implemented a prototype of LAAFFI and evaluated its performance in the Hyperledger Fabric-based IoT framework. Three main metrics were evaluated: latency, throughput (number of operations or transactions per second), and network resource utilization rate (transmission overhead introduced by the LAAFFI protocol). The performance tests conducted confirmed the high efficiency and suitability of the protocol for federated IoT environments. Also, all LAAFFI components are scalable as confirmed by tests. We formally evaluated LAAFFI security using Verifpal as a formal verification tool. Based on the models developed for Verifpal, we validated their security properties, such as message secrecy, authenticity, and freshness. Our results show that the proposed solution can improve the security of federated IoT environments while providing zero-day interoperability and high scalability. Compared to existing solutions, LAAFFI is more efficient due to the use of symmetric cryptography and algorithms adapted for operations involving IoT devices. LAAFFI supports multiple authorization mechanisms, and since it also offers authentication and accountability, it meets the requirements of Authentication, Authorization and Accounting (AAA). It uses Distributed Ledger (DL) and smart contracts to ensure that the request complies with the policies agreed between the organizations. LAAFFI offers authentication of devices belonging to a single organization and different organizations, with the assurance that the encryption key will be shared with another device only if the appropriate security policy is met. The proposed protocol is particularly useful for ensuring the security of federated IoT environments created ad hoc for special missions, e.g., operations conducted by NATO countries and disaster relief operations Humanitarian Assistance and Disaster Relief (HADR) involving military forces and civilian services, where immediate interoperability is required. Full article
(This article belongs to the Special Issue Security and Trust in Internet of Things and Edge Computing)
Show Figures

Graphical abstract

30 pages, 1625 KiB  
Article
A Robust Routing Protocol in Cognitive Unmanned Aerial Vehicular Networks
by Anatte Rozario, Ehasan Ahmed and Nafees Mansoor
Sensors 2024, 24(19), 6334; https://doi.org/10.3390/s24196334 - 30 Sep 2024
Viewed by 601
Abstract
The adoption of UAVs in defence and civilian sectors necessitates robust communication networks. This paper presents a routing protocol for Cognitive Radio Unmanned Aerial Vehicles (CR-UAVs) in Flying Ad-hoc Networks (FANETs). The protocol is engineered to optimize route selection by considering crucial parameters [...] Read more.
The adoption of UAVs in defence and civilian sectors necessitates robust communication networks. This paper presents a routing protocol for Cognitive Radio Unmanned Aerial Vehicles (CR-UAVs) in Flying Ad-hoc Networks (FANETs). The protocol is engineered to optimize route selection by considering crucial parameters such as distance, speed, link quality, and energy consumption. A standout feature is the introduction of the Central Node Resolution Factor (CNRF), which enhances routing decisions. Leveraging the Received Signal Strength Indicator (RSSI) enables accurate distance estimation, crucial for effective routing. Moreover, predictive algorithms are integrated to tackle the challenges posed by high mobility scenarios. Security measures include the identification of malicious nodes, while the protocol ensures resilience by managing multiple routes. Furthermore, it addresses route maintenance and handles link failures efficiently, cluster formation, and re-clustering with joining and leaving new nodes along with the predictive algorithm. Simulation results showcase the protocol’s self-comparison under different packet sizes, particularly in terms of end-to-end delay, throughput, packet delivery ratio, and normalized routing load. However, superior performance compared to existing methods, particularly in terms of throughput and packet transmission delay, underscoring its potential for widespread adoption in both defence and civilian UAV applications. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

22 pages, 1246 KiB  
Article
SROR: A Secure and Reliable Opportunistic Routing for VANETs
by Huibin Xu and Ying Wang
Vehicles 2024, 6(4), 1730-1751; https://doi.org/10.3390/vehicles6040084 - 30 Sep 2024
Viewed by 445
Abstract
In Vehicular Ad Hoc Networks (VANETs), high mobility of vehicles issues a huge challenge to the reliability and security of transmitting packets. Therefore, a Secure and Reliable Opportunistic Routing (SROR) is proposed in this paper. During construction of Candidate Forwarding Nodes (CFNs) set, [...] Read more.
In Vehicular Ad Hoc Networks (VANETs), high mobility of vehicles issues a huge challenge to the reliability and security of transmitting packets. Therefore, a Secure and Reliable Opportunistic Routing (SROR) is proposed in this paper. During construction of Candidate Forwarding Nodes (CFNs) set, the relative velocity, connectivity probability, and packet forwarding ratio are taken into consideration. The aim of SROR is to maximally improve the packet delivery ratio as well as reduce the end-to-end delay. The selection of a relay node from CFNs is formalized as a Markov Decision Process (MDP) optimization. The SROR algorithm extracts useful knowledge from historical behavior of nodes by interacting with the environment. This useful knowledge are utilized to select the relay node as well as to prevent the malicious nodes from forwarding packets. In addition, the influence of different learning rate and exploratory factor policy on rewards of agents are analyzed. The experimental results show that the performance of SROR outperforms the benchmarks in terms of the packet delivery ratio, end-to-end delay, and attack success ratio. As vehicle density ranges from 10 to 50 and percentage of malicious vehicles is fixed at 10%, the average of packet delivery ratio, end-to-end delay, and attack success ratio are 0.82, 0.26s, and 0.37, respectively, outperforming benchmark protocols. Full article
Show Figures

Figure 1

20 pages, 1008 KiB  
Article
Dynamics of Blood Flows in the Cardiocirculatory System
by Maria Pia D’Arienzo and Luigi Rarità
Computation 2024, 12(10), 194; https://doi.org/10.3390/computation12100194 - 25 Sep 2024
Viewed by 404
Abstract
Models and simulations of blood flow in vascular networks are useful to deepen knowledge of cardiovascular diseases. This paper considers a model based on partial differential equations that mimic the dynamics of vascular networks in terms of flow velocities and arterial pressures. Such [...] Read more.
Models and simulations of blood flow in vascular networks are useful to deepen knowledge of cardiovascular diseases. This paper considers a model based on partial differential equations that mimic the dynamics of vascular networks in terms of flow velocities and arterial pressures. Such quantities are found by using ad hoc numerical schemes to examine variations in the pressure and homeostatic conditions of a whole organism. Two different case studies are examined. The former uses 15 arteries—a network that shows the real oscillations in pressures and velocities due to variations in artery volume. The latter focuses on the 55 principal arteries, and blood flows are studied by using a model of a heart valve that opens and closes via the differences in the aortic and left ventricle pressures. This last case confirms the possibility of autonomously regulating blood pressure and velocity in arteries in general and when tilt tests are applied to patients. Full article
(This article belongs to the Section Computational Engineering)
Show Figures

Figure 1

17 pages, 2297 KiB  
Article
Context-Driven Service Deployment Using Likelihood-Based Approach for Internet of Things Scenarios
by Nandan Banerji, Chayan Paul, Bikash Debnath, Biplab Das, Gurpreet Singh Chhabra, Bhabendu Kumar Mohanta and Ali Ismail Awad
Future Internet 2024, 16(10), 349; https://doi.org/10.3390/fi16100349 - 25 Sep 2024
Viewed by 471
Abstract
In a context-aware Internet of Things (IoT) environment, the functional contexts of devices and users will change over time depending on their service consumption. Each iteration of an IoT middleware algorithm will also encounter changes occurring in the contexts due to the joining/leaving [...] Read more.
In a context-aware Internet of Things (IoT) environment, the functional contexts of devices and users will change over time depending on their service consumption. Each iteration of an IoT middleware algorithm will also encounter changes occurring in the contexts due to the joining/leaving of new/old members; this is the inherent nature of ad hoc IoT scenarios. Individual users will have notable preferences in their service consumption patterns; by leveraging these patterns, the approach presented in this article focuses on how these changes impact performance due to functional-context switching over time. This is based on the idea that consumption patterns will exhibit certain time-variant correlations. The maximum likelihood estimation (MLE) is used in the proposed approach to capture the impact of these correlations and study them in depth. The results of this study reveal how the correlation probabilities and the system performance change over time; this also aids with the construction of the boundaries of certain time-variant correlations in users’ consumption patterns. In the proposed approach, the information gleaned from the MLE is used in arranging the service information within a distributed service registry based on users’ service usage preferences. Practical simulations were conducted over small (100 nodes), medium (1000 nodes), and relatively larger (10,000 nodes) networks. It was found that the approach described helps to reduce service discovery time and can improve the performance in service-oriented IoT scenarios. Full article
Show Figures

Figure 1

22 pages, 4895 KiB  
Article
Adaptive MAC Scheme for Interference Management in Ad Hoc IoT Networks
by Ehsan Ali, Adnan Fazil, Jihyoung Ryu, Muhammad Ashraf and Muhammad Zakwan
Appl. Sci. 2024, 14(19), 8628; https://doi.org/10.3390/app14198628 - 25 Sep 2024
Viewed by 599
Abstract
The field of wireless communication has undergone revolutionary changes driven by technological advancements in recent years. Central to this evolution is wireless ad hoc networks, which are characterized by their decentralized nature and have introduced numerous possibilities and challenges for researchers. Moreover, most [...] Read more.
The field of wireless communication has undergone revolutionary changes driven by technological advancements in recent years. Central to this evolution is wireless ad hoc networks, which are characterized by their decentralized nature and have introduced numerous possibilities and challenges for researchers. Moreover, most of the existing Internet of Things (IoT) networks are based on ad hoc networks. This study focuses on the exploration of interference management and Medium Access Control (MAC) schemes. Through statistical derivations and systematic simulations, we evaluate the efficacy of guard zone-based MAC protocols under Rayleigh fading channel conditions. By establishing a link between network parameters, interference patterns, and MAC effectiveness, this work contributes to optimizing network performance. A key aspect of this study is the investigation of optimal guard zone parameters, which are crucial for interference mitigation. The adaptive guard zone scheme demonstrates superior performance compared to the widely recognized Carrier Sense Multiple Access (CSMA) and the system-wide fixed guard zone protocol under fading channel conditions that mimic real-world scenarios. Additionally, simulations reveal the interactions between network variables such as node density, path loss exponent, outage probability, and spreading gain, providing insights into their impact on aggregated interference and guard zone effectiveness. Full article
Show Figures

Figure 1

16 pages, 1860 KiB  
Article
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs
by Ahmad Kabil, Heba Aslan, Marianne A. Azer and Mohamed Rasslan
Cryptography 2024, 8(3), 43; https://doi.org/10.3390/cryptography8030043 - 17 Sep 2024
Viewed by 482
Abstract
Vehicular ad hoc networks (VANETs), which are the backbone of intelligent transportation systems (ITSs), facilitate critical data exchanges between vehicles. This necessitates secure transmission, which requires guarantees of message availability, integrity, source authenticity, and user privacy. Moreover, the traceability of network participants is [...] Read more.
Vehicular ad hoc networks (VANETs), which are the backbone of intelligent transportation systems (ITSs), facilitate critical data exchanges between vehicles. This necessitates secure transmission, which requires guarantees of message availability, integrity, source authenticity, and user privacy. Moreover, the traceability of network participants is essential as it deters malicious actors and allows lawful authorities to identify message senders for accountability. This introduces a challenge: balancing privacy with traceability. Conditional privacy-preserving authentication (CPPA) schemes are designed to mitigate this conflict. CPPA schemes utilize cryptographic protocols, including certificate-based schemes, group signatures, identity-based schemes, and certificateless schemes. Due to the critical time constraints in VANETs, efficient batch verification techniques are crucial. Combining certificateless schemes with batch verification leads to certificateless aggregate signature (CLAS) schemes. In this paper, cryptanalysis of Xiong’s CLAS scheme revealed its vulnerabilities to partial key replacement and identity replacement attacks, alongside mathematical errors in the batch verification process. Our proposed CLAS scheme remedies these issues by incorporating an identity authentication module that leverages chameleon hashing within elliptic curve cryptography (CHAM-CLAS). The signature and verification modules are also redesigned to address the identified vulnerabilities in Xiong’s scheme. Additionally, we implemented the small exponents test within the batch verification module to achieve Type III security. While this enhances security, it introduces a slight performance trade-off. Our scheme has been subjected to formal security and performance analyses to ensure robustness. Full article
Show Figures

Figure 1

27 pages, 1181 KiB  
Article
Joint Resource Scheduling of the Time Slot, Power, and Main Lobe Direction in Directional UAV Ad Hoc Networks: A Multi-Agent Deep Reinforcement Learning Approach
by Shijie Liang, Haitao Zhao, Li Zhou, Zhe Wang, Kuo Cao and Junfang Wang
Drones 2024, 8(9), 478; https://doi.org/10.3390/drones8090478 - 12 Sep 2024
Viewed by 405
Abstract
Directional unmanned aerial vehicle (UAV) ad hoc networks (DUANETs) are widely applied due to their high flexibility, strong anti-interference capability, and high transmission rates. However, within directional networks, complex mutual interference persists, necessitating scheduling of the time slot, power, and main lobe direction [...] Read more.
Directional unmanned aerial vehicle (UAV) ad hoc networks (DUANETs) are widely applied due to their high flexibility, strong anti-interference capability, and high transmission rates. However, within directional networks, complex mutual interference persists, necessitating scheduling of the time slot, power, and main lobe direction for all links to improve the transmission performance of DUANETs. To ensure transmission fairness and the total count of transmitted data packets for the DUANET under dynamic data transmission demands, a scheduling algorithm for the time slot, power, and main lobe direction based on multi-agent deep reinforcement learning (MADRL) is proposed. Specifically, modeling is performed with the links as the core, optimizing the time slot, power, and main lobe direction variables for the fairness-weighted count of transmitted data packets. A decentralized partially observable Markov decision process (Dec-POMDP) is constructed for the problem. To process the observation in Dec-POMDP, an attention mechanism-based observation processing method is proposed to extract observation features of UAVs and their neighbors within the main lobe range, enhancing algorithm performance. The proposed Dec-POMDP and MADRL algorithms enable distributed autonomous decision-making for the resource scheduling of time slots, power, and main lobe directions. Finally, the simulation and analysis are primarily focused on the performance of the proposed algorithm and existing algorithms across varying data packet generation rates, different main lobe gains, and varying main lobe widths. The simulation results show that the proposed attention mechanism-based MADRL algorithm enhances the performance of the MADRL algorithm by 22.17%. The algorithm with the main lobe direction scheduling improves performance by 67.06% compared to the algorithm without the main lobe direction scheduling. Full article
(This article belongs to the Special Issue Space–Air–Ground Integrated Networks for 6G)
Show Figures

Figure 1

16 pages, 627 KiB  
Article
Enhancing Reliability and Stability of BLE Mesh Networks: A Multipath Optimized AODV Approach
by Muhammad Rizwan Ghori, Tat-Chee Wan, Gian Chand Sodhy, Mohammad Aljaidi, Amna Rizwan, Ali Safaa Sadiq and Omprakash Kaiwartya
Sensors 2024, 24(18), 5901; https://doi.org/10.3390/s24185901 - 11 Sep 2024
Viewed by 692
Abstract
Bluetooth Low Energy (BLE) mesh networks provide flexible and reliable communication among low-power sensor-enabled Internet of Things (IoT) devices, enabling them to communicate in a flexible and robust manner. Nonetheless, the majority of existing BLE-based mesh protocols operate as flooding-based piconet or scatternet [...] Read more.
Bluetooth Low Energy (BLE) mesh networks provide flexible and reliable communication among low-power sensor-enabled Internet of Things (IoT) devices, enabling them to communicate in a flexible and robust manner. Nonetheless, the majority of existing BLE-based mesh protocols operate as flooding-based piconet or scatternet overlays on top of existing Bluetooth star topologies. In contrast, the Ad hoc On-Demand Distance Vector (AODV) protocol used primarily in wireless ad hoc networks (WAHNs) is forwarding-based and therefore more efficient, with lower overheads. However, the packet delivery ratio (PDR) and link recovery time for AODV performs worse compared to flooding-based BLE protocols when encountering link disruptions. We propose the Multipath Optimized AODV (M-O-AODV) protocol to address these issues, with improved PDR and link robustness compared with other forwarding-based protocols. In addition, M-O-AODV achieved a PDR of 88%, comparable to the PDR of 92% for flooding-based BLE, unlike protocols such as Reverse-AODV (R-AODV). Also, M-O-AODV was able to perform link recovery within 3700 ms in the case of node failures, compared with other forwarding-based protocols that require 4800 ms to 6000 ms. Consequently, M-O-AODV-based BLE mesh networks are more efficient for wireless sensor-enabled IoT environments. Full article
(This article belongs to the Special Issue Energy Harvesting and Self-Powered Sensors)
Show Figures

Figure 1

50 pages, 3004 KiB  
Review
Hazard Susceptibility Mapping with Machine and Deep Learning: A Literature Review
by Angelly de Jesus Pugliese Viloria, Andrea Folini, Daniela Carrion and Maria Antonia Brovelli
Remote Sens. 2024, 16(18), 3374; https://doi.org/10.3390/rs16183374 - 11 Sep 2024
Cited by 1 | Viewed by 842
Abstract
With the increase in climate-change-related hazardous events alongside population concentration in urban centres, it is important to provide resilient cities with tools for understanding and eventually preparing for such events. Machine learning (ML) and deep learning (DL) techniques have increasingly been employed to [...] Read more.
With the increase in climate-change-related hazardous events alongside population concentration in urban centres, it is important to provide resilient cities with tools for understanding and eventually preparing for such events. Machine learning (ML) and deep learning (DL) techniques have increasingly been employed to model susceptibility of hazardous events. This study consists of a systematic review of the ML/DL techniques applied to model the susceptibility of air pollution, urban heat islands, floods, and landslides, with the aim of providing a comprehensive source of reference both for techniques and modelling approaches. A total of 1454 articles published between 2020 and 2023 were systematically selected from the Scopus and Web of Science search engines based on search queries and selection criteria. ML/DL techniques were extracted from the selected articles and categorised using ad hoc classification. Consequently, a general approach for modelling the susceptibility of hazardous events was consolidated, covering the data preprocessing, feature selection, modelling, model interpretation, and susceptibility map validation, along with examples of related global/continental data. The most frequently employed techniques across various hazards include random forest, artificial neural networks, and support vector machines. This review also provides, per hazard, the definition, data requirements, and insights into the ML/DL techniques used, including examples of both state-of-the-art and novel modelling approaches. Full article
(This article belongs to the Special Issue Women’s Special Issue Series: Remote Sensing 2023-2024)
Show Figures

Graphical abstract

14 pages, 884 KiB  
Article
Secure Cognitive Radio Vehicular Ad Hoc Networks Using Blockchain Technology in Smart Cities
by Fatima Asif, Huma Ghafoor and Insoo Koo
Appl. Sci. 2024, 14(18), 8146; https://doi.org/10.3390/app14188146 - 11 Sep 2024
Viewed by 564
Abstract
Security is an important consideration when delivering information-aware messages to vehicles that are far away from the current location of the information-sending vehicle. This information helps the receiver to save fuel and time by making wise decisions to avoid damaged or blocked roads. [...] Read more.
Security is an important consideration when delivering information-aware messages to vehicles that are far away from the current location of the information-sending vehicle. This information helps the receiver to save fuel and time by making wise decisions to avoid damaged or blocked roads. To ensure the safety and security of this type of information using blockchain technology, we propose a new cognitive vehicular communication scheme to transfer messages from source to destination. Due to spectrum scarcity in vehicular networks, there needs to be a wireless medium available for every communication link since vehicles require it to communicate. The primary user (PU) makes a public announcement about a free channel to all secondary users nearby and only gives it to authentic vehicles. The authenticity of vehicles is guaranteed by a roadside unit (RSU) that offers secure keys to any vehicle that joins this blockchain network. Those who participate in this network must pay a certain amount and receive rewards for their honesty that exceed the amount spent. To test the performance of various parameters, the proposed scheme utilizes the Ethereum smart contract and compares them to blockchain and non-blockchain methods. Our results show a minimum delivery time of 0.16 s and a minimum overhead of 350 bytes in such a dynamic vehicle environment. Full article
(This article belongs to the Special Issue Transportation in the 21st Century: New Vision on Future Mobility)
Show Figures

Figure 1

Back to TopTop