sensors-logo

Journal Browser

Journal Browser

Architectures, Protocols and Algorithms of Sensor Networks

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (20 September 2023) | Viewed by 14939

Special Issue Editors


E-Mail Website
Guest Editor
Institute of Computer Science, University of Silesia, 41-200 Sosnowiec, Poland
Interests: sensor networks; machine learning; intelligent transportation systems; sensor fusion; smart sensors; cellular automata
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science and Automatics, University of Bielsko-Biala, 43-309 Bielsko-Biala, Poland
Interests: sensor network; IoT; intelligent transport systems; vehicle detection; machine learning; edge computing; data fusion
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Sensor network technology provides new sources of information and opens perspectives for innovative applications in industry, smart cities, smart homes, healthcare, environmental monitoring, military, and other domains. The emerging sensor network applications require the development of new dedicated architectures, protocols, and algorithms that ensure reliable network operation for a long time, as well as cost-effective deployment, scalability, and seamless maintenance. Wireless sensor networks require efficient methods for power management. In various applications, the availability of accurate localization algorithms is also a prerequisite for success. Moreover, new solutions are necessary to ensure the usefulness and security of the information collected from sensor nodes.

This Special Issue is addressed to all types of architectures, protocols, and algorithms designed for innovative applications of sensor networks. Topics of interest include, but are not limited to, the following areas:

  • New architectures of wired and wireless sensor networks;
  • Application-aware communication protocols for sensor networks;
  • Data management in sensor networks;
  • Signal-processing algorithms for sensor networks;
  • In-network data processing and analysis;
  • Smart sensing and embedded machine learning algorithms;
  • Power management in wireless sensor networks;
  • Data transmission reduction in sensor networks;
  • Localization and tracking algorithms for sensor networks;
  • Mobility management in sensor networks;
  • Synchronization algorithms for sensor networks;
  • Information security in sensor networks.

Prof. Dr. Bartłomiej Płaczek
Dr. Marcin Bernaś
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • applications of sensor networks
  • sensor network architectures
  • communication protocols
  • information security
  • smart sensing
  • signal processing algorithms
  • in-network data processing
  • data reduction
  • internet of things
  • localization
  • object tracking

Related Special Issue

Published Papers (9 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

15 pages, 3306 KiB  
Article
Chaotic Mapping Lion Optimization Algorithm-Based Node Localization Approach for Wireless Sensor Networks
by Abdelwahed Motwakel, Aisha Hassan Abdalla Hashim, Hayam Alamro, Hamed Alqahtani, Faiz Abdullah Alotaibi and Ahmed Sayed
Sensors 2023, 23(21), 8699; https://0-doi-org.brum.beds.ac.uk/10.3390/s23218699 - 25 Oct 2023
Viewed by 646
Abstract
Wireless Sensor Networks (WSNs) contain several small, autonomous sensor nodes (SNs) able to process, transfer, and wirelessly sense data. These networks find applications in various domains like environmental monitoring, industrial automation, healthcare, and surveillance. Node Localization (NL) is a major problem in WSNs, [...] Read more.
Wireless Sensor Networks (WSNs) contain several small, autonomous sensor nodes (SNs) able to process, transfer, and wirelessly sense data. These networks find applications in various domains like environmental monitoring, industrial automation, healthcare, and surveillance. Node Localization (NL) is a major problem in WSNs, aiming to define the geographical positions of sensors correctly. Accurate localization is essential for distinct WSN applications comprising target tracking, environmental monitoring, and data routing. Therefore, this paper develops a Chaotic Mapping Lion Optimization Algorithm-based Node Localization Approach (CMLOA-NLA) for WSNs. The purpose of the CMLOA-NLA algorithm is to define the localization of unknown nodes based on the anchor nodes (ANs) as a reference point. In addition, the CMLOA is mainly derived from the combination of the tent chaotic mapping concept into the standard LOA, which tends to improve the convergence speed and precision of NL. With extensive simulations and comparison results with recent localization approaches, the effectual performance of the CMLOA-NLA technique is illustrated. The experimental outcomes demonstrate considerable improvement in terms of accuracy as well as efficiency. Furthermore, the CMLOA-NLA technique was demonstrated to be highly robust against localization error and transmission range with a minimum average localization error of 2.09%. Full article
(This article belongs to the Special Issue Architectures, Protocols and Algorithms of Sensor Networks)
Show Figures

Figure 1

24 pages, 1219 KiB  
Article
A Sensor-Aided System for Physical Perfect Control Applications in the Continuous-Time Domain
by Paweł Majewski, Wojciech P. Hunek, Dawid Pawuś, Krzysztof Szurpicki and Tomasz Wojtala
Sensors 2023, 23(4), 1947; https://0-doi-org.brum.beds.ac.uk/10.3390/s23041947 - 09 Feb 2023
Cited by 1 | Viewed by 987
Abstract
The recently introduced continuous-time perfect control algorithm has revealed a great potential in terms of the maximum-speed and maximum-accuracy behaviors. However, the discussed inverse model-originated control strategy is associated with considerable energy consumption, which has exceeded a technological limitation in a number of [...] Read more.
The recently introduced continuous-time perfect control algorithm has revealed a great potential in terms of the maximum-speed and maximum-accuracy behaviors. However, the discussed inverse model-originated control strategy is associated with considerable energy consumption, which has exceeded a technological limitation in a number of industrial cases. In order to prevent such an important drawback, several solutions could be considered. Therefore, an innovative perfect control scheme devoted to the multivariable real-life objects is investigated in this paper. Henceforth, the new IMC-related approach, strongly supported by the vital sensor-aided system, can successfully be employed in every real-time engineering task, where the precision of conducted processes plays an important role. Theoretical and practical examples strictly confirm the big implementation potential of the new established method over existing ones. It has been seen that the new perfect control algorithm outperforms the classical control law in the form of LQR (considered in two separate ways), which is clearly manifested by almost all simulation examples. For instance, in the case of the multi-tank system, the performance indices ISE, RT, and MOE for LQR without an integration action have been equal to 2.431, 2.4×102, and 3.655×106, respectively, whilst the respective values 1.638, 1.58×102, and 1.514×107 have been received for the proposed approach. Full article
(This article belongs to the Special Issue Architectures, Protocols and Algorithms of Sensor Networks)
Show Figures

Figure 1

15 pages, 2229 KiB  
Article
Comparison of Heuristic Algorithms in Identification of Parameters of Anomalous Diffusion Model Based on Measurements from Sensors
by Rafał Brociek , Agata Wajda and Damian Słota
Sensors 2023, 23(3), 1722; https://0-doi-org.brum.beds.ac.uk/10.3390/s23031722 - 03 Feb 2023
Cited by 3 | Viewed by 1460
Abstract
In recent times, fractional calculus has gained popularity in various types of engineering applications. Very often, the mathematical model describing a given phenomenon consists of a differential equation with a fractional derivative. As numerous studies present, the use of the fractional derivative instead [...] Read more.
In recent times, fractional calculus has gained popularity in various types of engineering applications. Very often, the mathematical model describing a given phenomenon consists of a differential equation with a fractional derivative. As numerous studies present, the use of the fractional derivative instead of the classical derivative allows for more accurate modeling of some processes. A numerical solution of anomalous heat conduction equation with Riemann-Liouville fractional derivative over space is presented in this paper. First, a differential scheme is provided to solve the direct problem. Then, the inverse problem is considered, which consists in identifying model parameters such as: thermal conductivity, order of derivative and heat transfer. Data on the basis of which the inverse problem is solved are the temperature values on the right boundary of the considered space. To solve the problem a functional describing the error of the solution is created. By determining the minimum of this functional, unknown parameters of the model are identified. In order to find a solution, selected heuristic algorithms are presented and compared. The following meta-heuristic algorithms are described and used in the paper: Ant Colony Optimization (ACO) for continous function, Butterfly Optimization Algorithm (BOA), Dynamic Butterfly Optimization Algorithm (DBOA) and Aquila Optimize (AO). The accuracy of the presented algorithms is illustrated by examples. Full article
(This article belongs to the Special Issue Architectures, Protocols and Algorithms of Sensor Networks)
Show Figures

Figure 1

19 pages, 1449 KiB  
Article
Adaptive Quality of Service Control for MQTT-SN
by Fabio Palmese, Alessandro E. C. Redondi and Matteo Cesana
Sensors 2022, 22(22), 8852; https://0-doi-org.brum.beds.ac.uk/10.3390/s22228852 - 16 Nov 2022
Cited by 4 | Viewed by 1587
Abstract
Internet of Things and wireless sensor network applications are becoming more and more popular these days, supported by new communication technologies and protocols tailored to their specific requirements. This paper focuses on improving the performance of a Wireless Sensor Network operated by the [...] Read more.
Internet of Things and wireless sensor network applications are becoming more and more popular these days, supported by new communication technologies and protocols tailored to their specific requirements. This paper focuses on improving the performance of a Wireless Sensor Network operated by the MQTT-SN protocol, one of the most popular publish/subscribe protocols for IoT applications. In particular, we propose a dynamic Quality of Service (QoS) controller for the MQTT-SN protocol, capable of evaluating the status of the underlying network in terms of end-to-end delay and packet error rate, reacting consequently by assigning the best QoS value to a node. We design and implement the QoS controller in a simulated environment based on the ns-3 network emulator, and we perform extensive experiments to prove its effectiveness compared to a non-controlled scenario. The reported results show that, by controlling the quality of service, it is possible to effectively manage the number of packets successfully received by each device and their average latency, to improve the quality of the communication of each end node. Full article
(This article belongs to the Special Issue Architectures, Protocols and Algorithms of Sensor Networks)
Show Figures

Figure 1

22 pages, 1483 KiB  
Article
Application of Heuristic Algorithms in the Tomography Problem for Pre-Mining Anomaly Detection in Coal Seams
by Rafał Brociek, Mariusz Pleszczyński, Adam Zielonka, Agata Wajda, Salvatore Coco, Grazia Lo Sciuto and Christian Napoli
Sensors 2022, 22(19), 7297; https://0-doi-org.brum.beds.ac.uk/10.3390/s22197297 - 26 Sep 2022
Cited by 4 | Viewed by 1316
Abstract
The paper presents research on a specific approach to the issue of computed tomography with an incomplete data set. The case of incomplete information is quite common, for example when examining objects of large size or difficult to access. Algorithms devoted to this [...] Read more.
The paper presents research on a specific approach to the issue of computed tomography with an incomplete data set. The case of incomplete information is quite common, for example when examining objects of large size or difficult to access. Algorithms devoted to this type of problems can be used to detect anomalies in coal seams that pose a threat to the life of miners. The most dangerous example of such an anomaly may be a compressed gas tank, which expands rapidly during exploitation, at the same time ejecting rock fragments, which are a real threat to the working crew. The approach presented in the paper is an improvement of the previous idea, in which the detected objects were represented by sequences of points. These points represent rectangles, which were characterized by sequences of their parameters. This time, instead of sequences in the representation, there are sets of objects, which allow for the elimination of duplicates. As a result, the reconstruction is faster. The algorithm presented in the paper solves the inverse problem of finding the minimum of the objective function. Heuristic algorithms are suitable for solving this type of tasks. The following heuristic algorithms are described, tested and compared: Aquila Optimizer (AQ), Firefly Algorithm (FA), Whale Optimization Algorithm (WOA), Butterfly Optimization Algorithm (BOA) and Dynamic Butterfly Optimization Algorithm (DBOA). The research showed that the best algorithm for this type of problem turned out to be DBOA. Full article
(This article belongs to the Special Issue Architectures, Protocols and Algorithms of Sensor Networks)
Show Figures

Figure 1

25 pages, 21742 KiB  
Article
Design of a Robust Tool for Deploying Large-Area Stretchable Sensor Networks from Microscale to Macroscale
by Elliot Ransom, Xiyuan Chen and Fu-Kuo Chang
Sensors 2022, 22(13), 4856; https://0-doi-org.brum.beds.ac.uk/10.3390/s22134856 - 27 Jun 2022
Cited by 2 | Viewed by 1491
Abstract
An investigation was conducted to develop an effective automated tool to deploy micro-fabricated stretchable networks of distributed sensors onto the surface of large structures at macroscale to create “smart” structures with embedded distributed sensor networks. Integrating a large network of distributed sensors with [...] Read more.
An investigation was conducted to develop an effective automated tool to deploy micro-fabricated stretchable networks of distributed sensors onto the surface of large structures at macroscale to create “smart” structures with embedded distributed sensor networks. Integrating a large network of distributed sensors with structures has been a major challenge in the design of so-called smart structures or devices for cyber-physical applications where a large amount of usage data from structures or devices can be generated for artificial intelligence applications. Indeed, many “island-and-serpentine”-type distributed sensor networks, while promising, remain difficult to deploy. This study aims to enable such networks to be deployed in a safe, automated, and efficient way. To this end, a scissor-hinge controlled system was proposed as the basis for a deployment mechanism for such stretchable sensor networks (SSNs). A model based on a kinematic scissor-hinge mechanism was developed to simulate and design the proposed system to automatically stretch a micro-scaled square network with uniformly distributed sensor nodes. A prototype of an automatic scissor-hinge stretchable tool was constructed during the study with an array of four scissor-hinge mechanisms, each belt-driven by a single stepper motor. Two micro-fabricated SSNs from a 100 mm wafer were fabricated at the Stanford Nanofabrication Facility for this deployment study. The networks were designed to be able to cover an area 100 times their manufacturing size (from a 100 mm diameter wafer to a 1 m2 active area) once stretched. It was demonstrated that the proposed deployment tool could place sensor nodes in prescribed locations efficiently within a drastically shorter time than in current labor-intensive manual deployment methods. Full article
(This article belongs to the Special Issue Architectures, Protocols and Algorithms of Sensor Networks)
Show Figures

Figure 1

17 pages, 4514 KiB  
Article
A Novel 3D Node Deployment Inspired by Dusty Plasma Crystallization in UAV-Assisted Wireless Sensor Network Applications
by Rongxin Tang, Yuhao Tao, Jiahao Li, Zhiming Hu, Kai Yuan, Zhiping Wu, Shiyun Liu and Yuhao Wang
Sensors 2021, 21(22), 7576; https://0-doi-org.brum.beds.ac.uk/10.3390/s21227576 - 15 Nov 2021
Cited by 3 | Viewed by 1418
Abstract
With the rapid progress of hardware and software, a wireless sensor network has been widely used in many applications in various fields. However, most discussions for the WSN node deployment mainly concentrated on the two-dimensional plane. In such a case, some large scale [...] Read more.
With the rapid progress of hardware and software, a wireless sensor network has been widely used in many applications in various fields. However, most discussions for the WSN node deployment mainly concentrated on the two-dimensional plane. In such a case, some large scale applications, such as information detection in deep space or deep sea, will require a good three dimensional (3D) sensor deployment scenario and also attract most scientists’ interests. Excellent deployment algorithms enable sensors to be quickly deployed in designated areas with the help of unmanned aerial vehicles (UAVs). In this paper, for the first time, we present a three dimensional network deployment algorithm inspired by physical dusty plasma crystallization theory in large-scale WSN applications. Four kinds of performance evaluation methods in 3D space, such as the moving distance, the spatial distribution diversion, system coverage rate, and the system utilization are introduced and have been carefully tested.Furthermore, in order to improve the performance of the final deployment, we integrated the system coverage rate and the system utilization to analyze the parameter effects of the Debye length and the node sensing radius. This criterion attempts to find the optimal sensing radius with a fixed Debye length to maximize the sensing range of the sensor network while reducing the system redundancy. The results suggest that our 3D algorithm can quickly complete an overall 3D network deployment and then dynamically adjust parameters to achieve a better distribution. In practical applications, engineers may choose appropriate parameters based on the sensor’s hardware capabilities to achieve a better 3D sensor network deployment. It may be significantly used in some large-scale 3D WSN applications in the near future. Full article
(This article belongs to the Special Issue Architectures, Protocols and Algorithms of Sensor Networks)
Show Figures

Figure 1

21 pages, 1109 KiB  
Article
Data Transmission Reduction in Wireless Sensor Network for Spatial Event Detection
by Marcin Lewandowski and Bartłomiej Płaczek
Sensors 2021, 21(21), 7256; https://0-doi-org.brum.beds.ac.uk/10.3390/s21217256 - 31 Oct 2021
Cited by 7 | Viewed by 2073
Abstract
Wireless sensor networks have found many applications in detecting events such as security threats, natural hazards, or technical malfunctions. An essential requirement for event detection systems is the long lifetime of battery-powered sensor nodes. This paper introduces a new method for prolonging the [...] Read more.
Wireless sensor networks have found many applications in detecting events such as security threats, natural hazards, or technical malfunctions. An essential requirement for event detection systems is the long lifetime of battery-powered sensor nodes. This paper introduces a new method for prolonging the wireless sensor network’s lifetime by reducing data transmissions between neighboring sensor nodes that cooperate in event detection. The proposed method allows sensor nodes to decide whether they need to exchange sensor readings for correctly detecting events. The sensor node takes into account the detection algorithm and verifies whether its current sensor readings can impact the event detection performed by another node. The data are transmitted only when they are found to be necessary for event detection. The proposed method was implemented in a wireless sensor network to detect the instability of cargo boxes during transportation. Experimental evaluation confirmed that the proposed method significantly extends the network lifetime and ensures the accurate detection of events. It was also shown that the introduced method is more effective in reducing data transmissions than the state-of-the-art event-triggered transmission and dual prediction algorithms. Full article
(This article belongs to the Special Issue Architectures, Protocols and Algorithms of Sensor Networks)
Show Figures

Figure 1

Review

Jump to: Research

22 pages, 2277 KiB  
Review
Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study
by Md Shahidur Rahaman, Sadia Nasrin Tisha, Eunjee Song and Tomas Cerny
Sensors 2023, 23(7), 3413; https://0-doi-org.brum.beds.ac.uk/10.3390/s23073413 - 24 Mar 2023
Cited by 5 | Viewed by 2785
Abstract
Protecting the resources of a cloud-native application is essential to meet an organization’s security goals. Cloud-native applications manage thousands of user requests, and an organization must employ a proper access control mechanism. However, unfortunately, developers sometimes grumble when designing and enforcing access decisions [...] Read more.
Protecting the resources of a cloud-native application is essential to meet an organization’s security goals. Cloud-native applications manage thousands of user requests, and an organization must employ a proper access control mechanism. However, unfortunately, developers sometimes grumble when designing and enforcing access decisions for a gigantic scalable application. It is sometimes complicated to choose the potential access control model for the system. Cloud-native software architecture has become an integral part of the industry to manage and maintain customer needs. A microservice is a combination of small independent services that might have hundreds of parts, where the developers must protect the individual services. An efficient access control model can defend the respective services and consistency. This study intends to comprehensively analyze the current access control mechanism and techniques utilized in cloud-native architecture. For this, we present a systematic mapping study that extracts current approaches, categorizes access control patterns, and provides developers guidance to meet security principles. In addition, we have gathered 234 essential articles, of which 29 have been chosen as primary studies. Our comprehensive analysis will guide practitioners to identify proper access control mechanisms applicable to ensuring security goals in cloud-native architectures. Full article
(This article belongs to the Special Issue Architectures, Protocols and Algorithms of Sensor Networks)
Show Figures

Figure 1

Back to TopTop