Forthcoming and Online First Articles

International Journal of Sensor Networks

International Journal of Sensor Networks (IJSNet)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Sensor Networks (3 papers in press)

Regular Issues

  • IoT Trust Aggregation using Hybrid Outlier Detection and Consensus   Order a copy of this article
    by Vishwanath G. Garagad, Nalini C. Iyer 
    Abstract: Trust modelling and management strategy to identify and mitigate threats by malicious devices relies on peer recommendations to compute trustworthiness. Aggregating opinions from independent devices is crucial in such recommendation-based systems to arrive at a consensus for decision-making. Existing aggregation techniques like arithmetic mean, geometric mean (weighted/non-weighted), and maximum/minimum functions ignore the risk of biased and uncertain recommendations. To encounter such vulnerabilities, we propose a novel trust assessment model, Outlier and Uncertain Recommendation-based Trust Management (OUR-Trust). It uses an outlier elimination and similarity-based scheme to evaluate the recommender's credibility before aggregation for consensus and decision making. The model employs revised Dempster-Shaffer combination rule for aggregation, which considers the uncertainty factor. Effectiveness of proposed approach is analyzed for a dynamic and heterogeneous IoT network of dynamic and heterogeneous devices. OUR-Trust is validated for storage, power-efficiency, and scalability in terms of convergence time for more extensive IoT networks that employ recommender systems.
    Keywords: trust management; distributed model; reputation system; recommender system; median absolute deviation; outlier detection; uncertainty; aggregation; consensus.
    DOI: 10.1504/IJSNET.2023.10054580
     
  • Servant: A User Service Requirements, Timeslot Sacrifice, and Triple Benefit-aware Resource and Worker Provisioning Scheme for Digital Twin and MEC Enhanced 6G Networks   Order a copy of this article
    by Mahfuzul H. Chowdhury  
    Abstract: To meet the service requirements of 6G applications, multi-access edge computing (MEC) plays an indispensable role to minimize application execution latencies. The digital twin is another important 6G technology that offers data analysis and prediction of system resources. The existing research works on digital twin and MEC empowered networks investigate either a emerging new generation or traditional application execution, not both. An intelligent resource and worker provisioning scheme for emerging and traditional application execution were absent in literatures. To confront these problems, this paper develops a user service requirements, timeslot sacrifice, and triple benefit-aware resource provisioning scheme with innovative network, timing, and mathematical analysis model for digital twin and MEC enhanced 6G networks by taking heterogeneous applications, online arrival, heterogenous resources, applications priority, and requirements, into account. The results depict that 67% time, 54.53% payment, and 10.35% energy gain is achieved in proposed scheme over conventional scheme.
    Keywords: Worker and Resource Provisioning; MEC; Emerging 6G Application; Digital Twin Enhanced Network; Application completion time; Time; Energy; and Fee Benefit; Throughput; Utility.
    DOI: 10.1504/IJSNET.2023.10055076
     
  • Grouping Visual Enhancements for Picviz Logging Visualization   Order a copy of this article
    by Yue Yang, Sheaddha Pradip Sen, Yang Xiao, Tieshan Li 
    Abstract: The logs generated during various processes, such as networking and web surfing, can be voluminous. These logs need to be processed and analysed to enhance the system’s quality and performance and facilitate proactive fault detection and handling. Log analysis software such as Picviz, which was built to show huge volumes of data for the sake of security, is one example. The parallel coordinate system in Picviz allows data to be presented in multiple dimensions. Its main aim is to simplify data analysis and identify correlations among variables. However, representing a large amount of data all at once in the software can lead to congested and clustered lines, making it challenging to distinguish and extract information. To address this issue, we propose two improved methods:
    Keywords: data visualisation; sensor data visualisation; logging; security; software; security.
    DOI: 10.1504/IJSNET.2023.10055113