1
|
Blanco-Carmona P, Baeza-Moreno L, Hidalgo-Fort E, Martín-Clemente R, González-Carvajal R, Muñoz-Chavero F. AIoT in Agriculture: Safeguarding Crops from Pest and Disease Threats. Sensors (Basel) 2023; 23:9733. [PMID: 38139579 PMCID: PMC10747752 DOI: 10.3390/s23249733] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/07/2023] [Revised: 12/05/2023] [Accepted: 12/06/2023] [Indexed: 12/24/2023]
Abstract
A significant proportion of the world's agricultural production is lost to pests and diseases. To mitigate this problem, an AIoT system for the early detection of pest and disease risks in crops is proposed. It presents a system based on low-power and low-cost sensor nodes that collect environmental data and transmit it once a day to a server via a NB-IoT network. In addition, the sensor nodes use individual, retrainable and updatable machine learning algorithms to assess the risk level in the crop every 30 min. If a risk is detected, environmental data and the risk level are immediately sent. Additionally, the system enables two types of notification: email and flashing LED, providing online and offline risk notifications. As a result, the system was deployed in a real-world environment and the power consumption of the sensor nodes was characterized, validating their longevity and the correct functioning of the risk detection algorithms. This allows the farmer to know the status of their crop and to take early action to address these threats.
Collapse
Affiliation(s)
- Pedro Blanco-Carmona
- Department of Electronic Engineering, University of Seville, 41092 Seville, Spain; (P.B.-C.); (L.B.-M.); (R.G.-C.); (F.M.-C.)
| | - Lucía Baeza-Moreno
- Department of Electronic Engineering, University of Seville, 41092 Seville, Spain; (P.B.-C.); (L.B.-M.); (R.G.-C.); (F.M.-C.)
| | - Eduardo Hidalgo-Fort
- Department of Electronic Engineering, University of Seville, 41092 Seville, Spain; (P.B.-C.); (L.B.-M.); (R.G.-C.); (F.M.-C.)
| | - Rubén Martín-Clemente
- Department of Signal Processing and Communications, University of Seville, 41092 Seville, Spain;
| | - Ramón González-Carvajal
- Department of Electronic Engineering, University of Seville, 41092 Seville, Spain; (P.B.-C.); (L.B.-M.); (R.G.-C.); (F.M.-C.)
| | - Fernando Muñoz-Chavero
- Department of Electronic Engineering, University of Seville, 41092 Seville, Spain; (P.B.-C.); (L.B.-M.); (R.G.-C.); (F.M.-C.)
| |
Collapse
|
2
|
Chowdhary A, Jha K, Zhao M. Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications. Sensors (Basel) 2023; 23:8014. [PMID: 37766067 PMCID: PMC10534908 DOI: 10.3390/s23188014] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/23/2023] [Revised: 09/15/2023] [Accepted: 09/19/2023] [Indexed: 09/29/2023]
Abstract
The web application market has shown rapid growth in recent years. The expansion of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) has created new web-based communication and sensing frameworks. Current security research utilizes source code analysis and manual exploitation of web applications, to identify security vulnerabilities, such as Cross-Site Scripting (XSS) and SQL Injection, in these emerging fields. The attack samples generated as part of web application penetration testing on sensor networks can be easily blocked, using Web Application Firewalls (WAFs). In this research work, we propose an autonomous penetration testing framework that utilizes Generative Adversarial Networks (GANs). We overcome the limitations of vanilla GANs by using conditional sequence generation. This technique helps in identifying key features for XSS attacks. We trained a generative model based on attack labels and attack features. The attack features were identified using semantic tokenization, and the attack payloads were generated using conditional sequence GAN. The generated attack samples can be used to target web applications protected by WAFs in an automated manner. This model scales well on a large-scale web application platform, and it saves the significant effort invested in manual penetration testing.
Collapse
Affiliation(s)
- Ankur Chowdhary
- 6sense Insights Inc., San Francisco, CA 94105, USA
- School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ 85281, USA
| | - Kritshekhar Jha
- School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ 85281, USA
| | - Ming Zhao
- School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ 85281, USA
| |
Collapse
|
3
|
Loubet G, Alata E, Takacs A, Dragomirescu D. A Survey on the Security Challenges of Low-Power Wireless Communication Protocols for Communicating Concrete in Civil Engineerings. Sensors (Basel) 2023; 23:1849. [PMID: 36850446 PMCID: PMC9959860 DOI: 10.3390/s23041849] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/02/2022] [Revised: 02/02/2023] [Accepted: 02/03/2023] [Indexed: 06/18/2023]
Abstract
With the increase in low-power wireless communication solutions, the deployment of Wireless Sensor Networks is becoming usual, especially to implement Cyber-Physical Systems. These latter can be used for Structural Health Monitoring applications in critical environments. To ensure a long-term deployment, battery-free and energy-autonomous wireless sensors are designed and can be powered by ambient energy harvesting or Wireless Power Transfer. Because of the criticality of the applications and the limited resources of the nodes, the security is generally relegated to the background, which leads to vulnerabilities in the entire system. In this paper, a security analysis based on an example: the implementation of a communicating reinforced concrete using a network of battery-free nodes; is presented. First, the employed wireless communication protocols are presented in regard of their native security features, main vulnerabilities, and most usual attacks. Then, the security analysis is carried out for the targeted implementation, especially by defining the main hypothesis of the attack and its consequences. Finally, solutions to secure the data and the network are compared. From a global point-of-view, this security analysis must be initiated from the project definition and must be continued throughout the deployment to allow the use of adapted, updatable and upgradable solutions.
Collapse
Affiliation(s)
- Gaël Loubet
- LAAS-CNRS, Université de Toulouse, CNRS, INSA, 7, Avenue du Colonel Roche, 31400 Toulouse, France
| | - Eric Alata
- LAAS-CNRS, Université de Toulouse, CNRS, INSA, 7, Avenue du Colonel Roche, 31400 Toulouse, France
| | - Alexandru Takacs
- LAAS-CNRS, Université de Toulouse, CNRS, UPS, 7, Avenue du Colonel Roche, 31400 Toulouse, France
| | - Daniela Dragomirescu
- LAAS-CNRS, Université de Toulouse, CNRS, INSA, 7, Avenue du Colonel Roche, 31400 Toulouse, France
| |
Collapse
|
4
|
Lee CW, Lee GM, Roh BH. Adaptive Strategy to Change Firing Phases of Collided Nodes in Extended-Desync TDMA-Based MANETs. Sensors (Basel) 2021; 21:6776. [PMID: 34695989 DOI: 10.3390/s21206776] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/24/2021] [Revised: 10/02/2021] [Accepted: 10/08/2021] [Indexed: 11/17/2022]
Abstract
As a multi-hop extension of the desynchronization-based TDMA (Desync-TDMA), the extended Desync-TDMA (Ext-Desync) with self-adapting property is proposed to overcome the limitations of existing CSMA/CA and dynamic TDMA-based schemes for Mobile Ad-hoc Networks (MANETs). However, existing studies overlooked the potential problem of firing message collisions caused by node movements, leading to the severe degradation of MANET networking performance. In this paper, we derive a mathematical model to evaluate the problem due to collisions of firing messages for moving nodes. With the derived model, we propose a method for a collided node to determine whether it changes its firing phase or not, adaptively in a distributed manner, by considering both the collision situation and the slot utilization. The comparative analysis between the proposed method and existing representative ones is also presented for various networking features. The performances of the proposed method are compared with CSMA/CA as well as other existing Ext-Desync-based schemes. The numerical results show that the proposed method achieved much faster resolution and higher slot utilization in collision situations than other Ext-Desync-based schemes. In addition, we also show that the proposed method outperformed the comparable methods, including CSMA/CA, in terms of packet delivery ratios and end-to-end delays.
Collapse
|
5
|
Santana Sosa G, Santana Abril J, Sosa J, Montiel-Nelson JA, Bautista T. Design of a Practical Underwater Sensor Network for Offshore Fish Farm Cages. Sensors (Basel) 2020; 20:s20164459. [PMID: 32785043 PMCID: PMC7472483 DOI: 10.3390/s20164459] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/11/2020] [Revised: 08/03/2020] [Accepted: 08/07/2020] [Indexed: 11/16/2022]
Abstract
In this paper, we present the design of a practical underwater sensor network for offshore fish farm cages. An overview of the current structure of an offshore fish farm, applied sensor network solutions, and their weaknesses are given. A mixed wireless-wired approach is proposed to mitigate the problem of wire breakage in underwater wired sensor networks. The approach is based on the serial arrangement of identical sections with wired and wireless interconnections areas. Wireless section alleviates underwater maintenance operations when cages are damaged. The analytical model of the proposed solution is studied in terms of maximum power transfer efficiency and the general formulas of the current in their transmitting antennas and sensor nodes are provided. Subsequently, based on simulations, the effects of parasitic resistance across the network are evaluated. A practical underwater sensor network to reach the 30 m depth with sensor nodes distanced 6 m is used to determine the proposal compliance with the ISO 11784/11785 HDX standard in its normal operation. Taking into account the cable breakage scenario, the results from experiments demonstrate the robustness of the proposed approach to keep running the sensor nodes that are located before the short circuit. Sensor node run time is reduced only 4.07% at most using standard values when a cable breakage occurs at the second deepest section.
Collapse
|
6
|
Guerrero-Sanchez AE, Rivas-Araiza EA, Gonzalez-Cordoba JL, Toledano-Ayala M, Takacs A. Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network. Sensors (Basel) 2020; 20:s20102798. [PMID: 32423025 PMCID: PMC7287648 DOI: 10.3390/s20102798] [Citation(s) in RCA: 22] [Impact Index Per Article: 5.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/15/2020] [Revised: 05/03/2020] [Accepted: 05/06/2020] [Indexed: 11/16/2022]
Abstract
The Internet of Things (IoT) paradigm allows the connection and exchange of information between millions of smart devices. This paradigm grows and develops exponentially as do the risks and attacks on IoT infrastructures. Security, privacy, reliability, and autonomy are the most important requirements in IoT Systems. If these issues are not guaranteed, the IoT system could be susceptible to malicious users and malicious use. In centralized IoT systems, attacks and risks are greater, especially when data is transmitted between devices and shared with other organizations. To avoid these types of situations, this work presents a decentralized system that guarantees the autonomy and security of an IoT system. The proposed methodology helps to protect data integrity and availability based on the security advantages provided by blockchain and the use of cryptographic tools. The accuracy of the proposed methodology was measured on a temperature and humidity sensing IoT-based Wireless Sensor Network (WSN). The obtained results prove that the proposal fulfils the main requirements of an IoT system. It is autonomous, secure to share and send information between devices and users, has privacy, it is reliable, and the information is available in the infrastructure. Furthermore, this research demonstrates that the proposal is less susceptible to the most frequent attacks against IoT systems, such as linking attack, man in the middle, and Distributed Denial of Service (DDoS) attack.
Collapse
|
7
|
Bulić P, Kojek G, Biasizzo A. Data Transmission Efficiency in Bluetooth Low Energy Versions. Sensors (Basel) 2019; 19:E3746. [PMID: 31470669 DOI: 10.3390/s19173746] [Citation(s) in RCA: 24] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/15/2019] [Revised: 08/21/2019] [Accepted: 08/28/2019] [Indexed: 02/05/2023]
Abstract
One important aspect when choosing a Bluetooth Low Energy (BLE) solution is to analyze its energy consumption for various connection parameters and desired throughput to build an optimal low-power Internet-of-Things (IoT) application and to extend the battery life. In this paper, energy consumption and data throughput for various BLE versions are studied. We have tested the effect of connection interval on the throughput and compared power efficiency relating to throughput for various BLE versions and different transactions. The presented results reveal that shorter connection intervals increase throughput for read/write transactions, but that is not the case for the notify and read/write without response transactions. Furthermore, for each BLE version, the energy consumption is mainly dependable on the data volume. The obtained results provide a design guideline for implementing an optimal BLE IoT application.
Collapse
|
8
|
Shen S, Wei ZQ, Sun LJ, Su YQ, Wang RC, Jiang HM. The Shared Bicycle and Its Network-Internet of Shared Bicycle (IoSB): A Review and Survey. Sensors (Basel) 2018; 18:s18082581. [PMID: 30087263 PMCID: PMC6111972 DOI: 10.3390/s18082581] [Citation(s) in RCA: 22] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/11/2018] [Revised: 07/12/2018] [Accepted: 07/21/2018] [Indexed: 11/16/2022]
Abstract
With the expansion of Intelligent Transport Systems (ITS) in smart cities, the shared bicycle has developed quickly as a new green public transportation mode, and is changing the travel habits of citizens heavily across the world, especially in China. The purpose of the current paper is to provide an inclusive review and survey on shared bicycle besides its benefits, history, brands and comparisons. In addition, it proposes the concept of the Internet of Shared Bicycle (IoSB) for the first time, as far as we know, to find a feasible solution for those technical problems of the shared bicycle. The possible architecture of IoSB in our opinion is presented, as well as most of key IoT technologies, and their capabilities to merge into and apply to the different parts of IoSB are introduced. Meanwhile, some challenges and barriers to IoSB’s implementation are expressed thoroughly too. As far as the advice for overcoming those barriers be concerned, the IoSB’s potential aspects and applications in smart city with respect to technology development in the future provide another valuable further discussion in this paper.
Collapse
Affiliation(s)
- Shu Shen
- School of Computer Science & Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China.
- Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China.
| | - Zhao-Qing Wei
- School of Computer Science & Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China.
| | - Li-Juan Sun
- School of Computer Science & Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China.
- Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China.
| | - Yang-Qing Su
- School of Internet of things, Nanjing University of Posts and Telecommunications, Nanjing 210003, China.
| | - Ru-Chuan Wang
- School of Computer Science & Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China.
- Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China.
| | - Han-Ming Jiang
- School of Internet of things, Nanjing University of Posts and Telecommunications, Nanjing 210003, China.
| |
Collapse
|
9
|
Luo X, Guan Q, Tan H, Gao L, Wang Z, Luo X. Simultaneous Indoor Tracking and Activity Recognition Using Pyroelectric Infrared Sensors. Sensors (Basel) 2017; 17:E1738. [PMID: 28758934 PMCID: PMC5580159 DOI: 10.3390/s17081738] [Citation(s) in RCA: 39] [Impact Index Per Article: 5.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/20/2017] [Revised: 07/19/2017] [Accepted: 07/25/2017] [Indexed: 02/05/2023]
Abstract
Indoor human tracking and activity recognition are fundamental yet coherent problems for ambient assistive living. In this paper, we propose a method to address these two critical issues simultaneously. We construct a wireless sensor network (WSN), and the sensor nodes within WSN consist of pyroelectric infrared (PIR) sensor arrays. To capture the tempo-spatial information of the human target, the field of view (FOV) of each PIR sensor is modulated by masks. A modified partial filter algorithm is utilized to decode the location of the human target. To exploit the synergy between the location and activity, we design a two-layer random forest (RF) classifier. The initial activity recognition result of the first layer is refined by the second layer RF by incorporating various effective features. We conducted experiments in a mock apartment. The mean localization error of our system is about 0.85 m. For five kinds of daily activities, the mean accuracy for 10-fold cross-validation is above 92%. The encouraging results indicate the effectiveness of our system.
Collapse
Affiliation(s)
- Xiaomu Luo
- School of Medical Information Engineering, Guangzhou University of Chinese Medicine, Guangzhou 510000, China.
| | - Qiuju Guan
- College of Mechanical and Electrical Engineering, Zhongkai University of Agriculture Engineering, Guangzhou 510000, China.
| | - Huoyuan Tan
- School of Medical Information Engineering, Guangzhou University of Chinese Medicine, Guangzhou 510000, China.
| | - Liwen Gao
- School of Medical Information Engineering, Guangzhou University of Chinese Medicine, Guangzhou 510000, China.
| | - Zhengfei Wang
- School of Medical Information Engineering, Guangzhou University of Chinese Medicine, Guangzhou 510000, China.
| | - Xiaoyan Luo
- School of Medical Information Engineering, Guangzhou University of Chinese Medicine, Guangzhou 510000, China.
| |
Collapse
|
10
|
Yi WY, Lo KM, Mak T, Leung KS, Leung Y, Meng ML. A Survey of Wireless Sensor Network Based Air Pollution Monitoring Systems. Sensors (Basel) 2015; 15:31392-427. [PMID: 26703598 DOI: 10.3390/s151229859] [Citation(s) in RCA: 74] [Impact Index Per Article: 8.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/04/2015] [Revised: 11/27/2015] [Accepted: 12/01/2015] [Indexed: 11/17/2022]
Abstract
The air quality in urban areas is a major concern in modern cities due to significant impacts of air pollution on public health, global environment, and worldwide economy. Recent studies reveal the importance of micro-level pollution information, including human personal exposure and acute exposure to air pollutants. A real-time system with high spatio-temporal resolution is essential because of the limited data availability and non-scalability of conventional air pollution monitoring systems. Currently, researchers focus on the concept of The Next Generation Air Pollution Monitoring System (TNGAPMS) and have achieved significant breakthroughs by utilizing the advance sensing technologies, MicroElectroMechanical Systems (MEMS) and Wireless Sensor Network (WSN). However, there exist potential problems of these newly proposed systems, namely the lack of 3D data acquisition ability and the flexibility of the sensor network. In this paper, we classify the existing works into three categories as Static Sensor Network (SSN), Community Sensor Network (CSN) and Vehicle Sensor Network (VSN) based on the carriers of the sensors. Comprehensive reviews and comparisons among these three types of sensor networks were also performed. Last but not least, we discuss the limitations of the existing works and conclude the objectives that we want to achieve in future systems.
Collapse
|
11
|
Farooq MO, Kunz T. Operating systems for wireless sensor networks: a survey. Sensors (Basel) 2011; 11:5900-30. [PMID: 22163934 DOI: 10.3390/s110605900] [Citation(s) in RCA: 108] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/17/2011] [Revised: 05/17/2011] [Accepted: 05/30/2011] [Indexed: 11/17/2022]
Abstract
This paper presents a survey on the current state-of-the-art in Wireless Sensor Network (WSN) Operating Systems (OSs). In recent years, WSNs have received tremendous attention in the research community, with applications in battlefields, industrial process monitoring, home automation, and environmental monitoring, to name but a few. A WSN is a highly dynamic network because nodes die due to severe environmental conditions and battery power depletion. Furthermore, a WSN is composed of miniaturized motes equipped with scarce resources e.g., limited memory and computational abilities. WSNs invariably operate in an unattended mode and in many scenarios it is impossible to replace sensor motes after deployment, therefore a fundamental objective is to optimize the sensor motes’ life time. These characteristics of WSNs impose additional challenges on OS design for WSN, and consequently, OS design for WSN deviates from traditional OS design. The purpose of this survey is to highlight major concerns pertaining to OS design in WSNs and to point out strengths and weaknesses of contemporary OSs for WSNs, keeping in mind the requirements of emerging WSN applications. The state-of-the-art in operating systems for WSNs has been examined in terms of the OS Architecture, Programming Model, Scheduling, Memory Management and Protection, Communication Protocols, Resource Sharing, Support for Real-Time Applications, and additional features. These features are surveyed for both real-time and non-real-time WSN operating systems.
Collapse
|
12
|
Tufail A, Khayam SA, Raza MT, Ali A, Kim KH. An enhanced backbone-assisted reliable framework for wireless sensor networks. Sensors (Basel) 2010; 10:1619-51. [PMID: 22294890 PMCID: PMC3264442 DOI: 10.3390/s100301619] [Citation(s) in RCA: 10] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/10/2010] [Revised: 02/13/2010] [Accepted: 02/22/2010] [Indexed: 11/16/2022]
Abstract
An extremely reliable source to sink communication is required for most of the contemporary WSN applications especially pertaining to military, healthcare and disaster-recovery. However, due to their intrinsic energy, bandwidth and computational constraints, Wireless Sensor Networks (WSNs) encounter several challenges in reliable source to sink communication. In this paper, we present a novel reliable topology that uses reliable hotlines between sensor gateways to boost the reliability of end-to-end transmissions. This reliable and efficient routing alternative reduces the number of average hops from source to the sink. We prove, with the help of analytical evaluation, that communication using hotlines is considerably more reliable than traditional WSN routing. We use reliability theory to analyze the cost and benefit of adding gateway nodes to a backbone-assisted WSN. However, in hotline assisted routing some scenarios where source and the sink are just a couple of hops away might bring more latency, therefore, we present a Signature Based Routing (SBR) scheme. SBR enables the gateways to make intelligent routing decisions, based upon the derived signature, hence providing lesser end-to-end delay between source to the sink communication. Finally, we evaluate our proposed hotline based topology with the help of a simulation tool and show that the proposed topology provides manifold increase in end-to-end reliability.
Collapse
Affiliation(s)
- Ali Tufail
- Graduate School of Information and Communication, Ajou University, Suwon, Korea; E-Mails: (A.T.); (A.A.)
| | - Syed Ali Khayam
- School of Electrical Engineering and Computer Science, NUST, Islamabad, Pakistan; E-Mail:
| | - Muhammad Taqi Raza
- USN Networking Research Team, Electronics and Telecommunications Research Institute (ETRI), Korea; E-Mail:
| | - Amna Ali
- Graduate School of Information and Communication, Ajou University, Suwon, Korea; E-Mails: (A.T.); (A.A.)
| | - Ki-Hyung Kim
- Graduate School of Information and Communication, Ajou University, Suwon, Korea; E-Mails: (A.T.); (A.A.)
- Author to whom correspondence should be addressed; E-Mail:
| |
Collapse
|