- Home
- A-Z Publications
- International Journal of Sensors Wireless Communications and Control
- Previous Issues
- Volume 14, Issue 4, 2024
International Journal of Sensors Wireless Communications and Control - Volume 14, Issue 4, 2024
Volume 14, Issue 4, 2024
- Computer and Information Science, Networking, Engineering, Telecommunication
-
-
-
Image Steganalysis using Deep Convolution Neural Networks: A Literature Survey
Authors: Numrena Farooq and Roohie Naaz MirSteganography is the technique of hiding data for secret communication in a public media format. The image in which the hidden data is stored is called a stego image. Steganalysis is the process of targeting the methods of steganography to identify, remove, destroy, and exploit the secret data in stego images. The identification of embedded secret data in the image is the basis for steganalysis. The proper selection of the type and composition of cover files contributes to a better embedding. Several steganalysis techniques exist for detecting steganography in the images given. Because of the embedded data, the performance of the steganalysis technique relies on the capacity to retrieve the feature representations to identify the statistical portion of the image. Steganalysis & steganography has experienced tremendous development in recent years with the emergence of Deep Convolution Neural Networks (DCNN). In this paper, we explored the current state of research from the latest systems of image steganalysis based on deep learning. This paper presents different methodologies and frameworks of CNN, the research being carried out on image steganalysis based on deep learning and implementation complexities, and highlights the benefits and limitations of the existing techniques. This study also provides the direction for future research and may serve as a fundamental source for further research in deep learning-based image steganalysis.
-
-
-
-
Sub-1 GHz RF-based Energy-efficient Sensor Node for Secure Communication in Low-power IoT and Embedded Applications
Authors: Ishfaq Sultan and Mohammad Tariq BandayBackgroundThe Internet of Things (IoT) devices consist of a microcontroller unit for data processing, a low-power wireless radio module for data transmission, and various sensors for data collection. The sensor nodes and processing devices used in the Internet of Things are resource-constrained, with power consumption and security being the two most critical parameters.
ObjectivesThis paper addresses the challenges of power consumption and security in IoT scenarios. It presents a low-power and secure heterogeneous multicore sensing architecture designed for low-power IoT and wireless sensor networks. The architecture comprises a sensing and control subsystem, an information processing unit, and a wireless communication module.
MethodsThe architecture uses a microcontroller unit based on ARM Cortex M4, a low-power sub-1 GHz RF-compliant communication radio, and a few sensors. The proposed architecture has been implemented and tested using the Contiki Operating System.
ResultsThe implemented sensor node architecture demonstrated performance efficiency, lower energy consumption, and higher security.
ConclusionBy leveraging efficient power management, data transmission strategies, and cryptographic security, the architecture contributes to developing energy-efficient and secure IoT devices.
-
-
-
Spectrum and Power Efficient Anti-jamming Approach for Cognitive Radio Networks Based on Reinforcement Learning
Authors: Hussein Jdeed, Wissam Altabban and Samer JamalBackgroundSpectrum scarcity, spectrum efficiency, power constraints, and jamming attacks are core challenges that face wireless networks. While cognitive radio networks (CRNs) enable the sharing of licensed bands when they are unoccupied, the spectrum should be used efficiently by the secondary user (SU) to ensure a high data rate transmission. In addition, the mobility of the SUs makes power consumption a matter of concern in wireless networks. Because of the open environment, the jamming attack can easily deteriorate the performance and disrupt the connections.
ObjectivesWe aim to enhance the performance of CRN and establish more reliable connections for the SU in the presence of smart jammer by ensuring efficient spectrum utilization and extending the network lifetime.
MethodsTo achieve our objectives, we propose an anti-jamming approach that adopts frequency hopping. Our approach assumes that SUs observe spectrum availability and channel gain. Then, SU learns the jammer behaviour and goes for the appropriate policy in terms of the number of data and control channels that optimize jointly spectrum efficiency and power consumption. Within, the interaction between the SU and the jammer is modelled as a zero-sum stochastic game, and we employ reinforcement learning (RL) to address this game.
ResultsSUs learn the optimal policy that maximizes the spectrum efficiency and minimizes the power consumption in the presence of a smart jammer. Simulation results show that the low channel gain leads the SU to select a high number of data channels. However, when the channel gain is high, the SU increases the number of control channels to guarantee a more reliable connection. Taking into account the spectrum efficiency, SUs save their energy by decreasing the number of used channels. The proposed strategy achieves better performance in comparison with myopic learning and the random strategy.
ConclusionUnder a jamming attack, considering the gain of utilized channels, SUs select the appropriate number of control and data channels to ensure a reliable, efficient, and long-term connection.
-
-
-
Novel Energy-efficient Modified LEACH Routing Protocol for Wireless Sensor Networks
More LessIntroductionIn wireless sensor networks (WSNs), hierarchical clustered routing protocols play a crucial role in minimizing energy consumption. The Low Energy Adaptive Clustering Hierarchy (LEACH) architecture is commonly employed for application-specific protocols in WSNs. However, the LEACH protocol may lead to increased energy consumption within the network if the rotational distribution of cluster heads (CHs) is not considered.
MethodsA novel average energy, residual energy-based modified LEACH (aerem-LEACH) routing protocol for improving the WSN’s energy efficiency is proposed. This approach simultaneously considers the average energy of the networks and the residual node energy for routing, thereby reducing overall power consumption.
ResultsThe suggested approach in aerem-LEACH accounts for optimal CHs numbers, and nodes in close proximity to the sink are forbidden from participating in cluster formation in order to achieve sufficient performance in the form of reduced sensor node energy consumption. Furthermore, a new threshold is employed in the proposed approach for selecting CHs for the network, and the aerem-LEACH uses free space, multiple hopping, and a hybrid communicating model for an energy-efficient network.
ConclusionThe simulation result demonstrates that there is a substantial reduction in the consumption of energy in WSNs with the proposed aerem-LEACH routing protocol compared with existing routing protocols, namely Stable Energy Efficient Network (SEEN), Energy Efficient LEACH (EE LEACH), Optical LEACH (O-LEACH), LEACH-Mobile (LEACH-M), LEACH-Centralized (LEACH-C), and LEACH for small-scale as well as large-scale sensor field.
-