Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City

Size: px
Start display at page:

Download "Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City"

Transcription

1 Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities Secure Multimedia Big Data in Trust-Assisted Sensor- for Smart City Chunsheng Zhu, Lei Shu, Victor C. M. Leung, Song Guo, Yan Zhang, and Laurence T. Yang The authors reviewed the recent work on multimedia big data and SC. They observe three critical issues that affect the success of secure multimedia big data in TASC. With that, motivated by addressing the identified critical issues, they introduce two types of TASC: and. Abstract Lately, with the prevalence of digital devices and social network applications, the explosive growth of multimedia big data poses many challenges for users to obtain them securely in various application scenarios. In this article, investigating secure multimedia big data application in trust-assisted sensor cloud (TASC), which is one kind of SC for smart city, the recent work about multimedia big data and SC is reviewed first. Further, the critical issues that affect the success of secure multimedia big data in TASC are identified. With that, motivated by addressing the identified critical issues, this article proposes two types of TASC: (TASC with a single trust value threshold), and (TASC with multiple trust value thresholds). Finally, with extensive simulation results about and as well as SC without trust assistance (SCWTA), the following insights into secure multimedia big data in TASC are achieved: the throughput of and can both be generally higher than that of SCWTA; the throughput of can trend with tuned trust value threshold; and the throughput of can fluctuate with the same trust value thresholds. Introduction Recently, as a unique branch of big data that represents the explosive growth of data from a variety of sources happening in our society, multimedia big data is utilized to describe the huge amounts of multimedia data produced with the prevalence of cameras, mobile devices, social media, the Internet, and so on. Particularly, multimedia big data has the following features. First, it is unstructured, heterogeneous, and multimodal. Second, it has cognition, which bridges the semantic gap between low-level features and high-level semantics. Third, it typically has realtime delivery. Fourth, it is acquired, processed, and analyzed efficiently and scalably. Multimedia big data technology greatly boosts a lot of multimedia applications/services (e.g., multimedia search, multimedia advertisement). Meanwhile, the boom of multimedia big data poses many challenges for users to achieve them securely in various application scenarios. For instance, as discussed in [1], in terms of secure multimedia big data sharing in social networks, substantial potential risks (e.g., illegal copying, illegal distribution, misappropriation) could exist for maliciously utilizing the multimedia big data. In such cases, security mechanisms are needed to ensure the security of multimedia big data with respect to its source identity, content integrity, privacy, and so on. In this article, studying secure multimedia big data application in trust-assisted sensor cloud (TASC) [2] which is one kind of sensor cloud (SC) for smart city [3], we review the recent work about multimedia big data and SC first. Further, we identify the critical issues that affect the success of secure multimedia big data in TASC. Then, triggered by addressing the identified critical issues, we propose two types of TASC: (TASC with a single trust value threshold) (TASC with multiple trust value thresholds) Eventually, with extensive simulation results about and as well as SC without trust assistance (SCWTA), we observe the following insights into secure multimedia big data in TASC: The throughput of and can both be generally higher than that of SCWTA. The throughput of can trend with tuned trust value threshold. The throughput of can fluctuate with the same trust value thresholds. The main contributions of this article are as follows: This article is the first work that explores secure multimedia big data application in TASC. This clearly demonstrates the novelty of this work compared to other works on multimedia big data and SC. Induced by addressing the observed critical issues that influence the success of secure multimedia big data in TASC, this article puts forward two types of TASC (i.e., and ). With extensive simulation results on and as well as SCWTA, this article obtains three insights into secure multimedia big data in TASC. The remainder of this article is organized as follows. We present the preliminaries about TASC. We review the recent work about multimedia big data and SC. The identified critical issues that affect the success of secure multimedia big Digital Object Identifier: 1.119/MCOM Chunsheng Zhu and Victor C. M. Leung are with the University of British Columbia; Lei Shu is with Nanjing Agricultural University and the University of Lincoln; Song Guo is with Hong Kong Polytechnic University; Yan Zhang is with the University of Oslo; Laurence T. Yang is with St. Francis Xavier University /17/$ IEEE

2 Figure 1. An example of SC. Temperature sensor Humidity sensor Motion sensor Video sensor Data center 1 Data center 3 Data center 2 Data server With TASC, since the used sensors and data centers are assured and reliable sensors and data centers with trust values exceeding certain thresholds, the throughput and response time that users achieve sensory data from the SC can be substantially improved. data in TASC are illustrated. The proposed and are introduced. Evaluation of and as well as SCWTA is conducted. This article is then concluded. Preliminaries about TASC SC As an essential component of the Internet of Things (IoT) [4], which aims to connect everything, SC is a new paradigm that integrates the wireless sensor network (WSN) and the cloud for smart city. Specifically, as shown in Fig. 1, SC includes three basic entities: the WSN, the cloud, and the users. The WSN, consisting of sensor nodes, is for gathering and transmitting various sensory data (temperature, humidity, motion, video, etc.) to the cloud. The cloud consists of data centers and is for storing and processing the received sensory data (e.g., multimedia big sensory data) as well as further delivering the processed sensory data to the users on demand. Therefore, with SC, the WSN and the cloud can complement each other. For example, the utility of the WSN can be enhanced by serving multiple applications via the cloud, while the services that the cloud offers can be enriched by offering the service the WSN provides. Moreover, the users are able to conveniently have access to their desirable sensory data (e.g., multimedia big sensory data) from the cloud anytime and anywhere if there is an Internet connection. All these features are desired for smart city, which strategically incorporates various networks and computing platforms to offer desirable services for people. Trust With different definitions regarding various fields, trust [2] is defined as assured reliance on the character, ability, strength or truth of someone or something by the Merriam-Webster Dictionary. Particularly in terms of wireless communications, trust can be defined as trust of a node A in a node B is the subjective expectation of node A receiving positive outcomes from the interaction with node B in a specific context. Generally, to evaluate the trust from node A to node B, node A needs to collect various evidences (e.g., maliciousness, selfishness, honesty) about node B, based on either direct interactions or information from third parties. Further, the trust value of node B is determined by utilizing a function or functions to convert the collected evidence into the trustworthiness (i.e., trust value). TASC Improving the quality of service (QoS) at which users obtain sensory data (e.g., multimedia big sensory data) from the cloud, TASC is a new kind of SC, recently proposed in [2]. Particularly, as presented in Fig. 2, the basic concept of TASC is incorporating trust into SC. In other words, the trusted sensors (i.e., sensors with trust values exceeding a threshold) are adopted in the WSN for collecting and transmitting sensory data to the cloud, while the trusted data centers (i.e., data centers with trust values exceeding a threshold) are utilized in the cloud to store, process, and further deliver the processed sensory data to the users on demand. With TASC, since the used sensors and data centers are assured and reliable sensors and data centers with trust values exceeding certain thresholds, the throughput and response time in which users achieve sensory data from the SC can be substantially improved. System Model of TASC Based on [2], the system model of TASC is presented as follows as an instance. The SC includes one WSN, one cloud, and Q users. In the WSN, there is one sink node s and D normal sensor nodes s i (1 i D). Normal sensor nodes transmit sensed sensory data to the sink node, and the data rate is r s kb/s. Regarding the cloud, there are L data centers d j (1 j L), which store and process the sensory data received from the WSN. The Q users obtain the processed sensory data from the cloud. In addition, time is divided into G time epochs t k (1 k G). In each time epoch t k, each sensor node s i has a trust value v tk si and each data center d j has a trust value v tk di. Recent Work about Multimedia Big Data and SC Regarding the authorization of multimedia big data, a framework is presented in [5] for the composition and enforcement of priva- 25

3 Regarding the trust value in TASC, since the neighbor node number and behaviors as well as energy consumption of sensor nodes and data centers are critical issues regarding enabling secure multimedia big sensory data in TASC, they are incorporated together to determine the trust values of sensor nodes and data centers in TASC. Case 1 Case 2 Trusted sensor Non-trusted sensor Figure 2. An example of TASC. cy-aware and context-driven access for users. Focusing on the recommendation of multimedia big data, [6] designs a cloud-assisted differentially private video recommendation system based on distributed online learning in social networks. Concerning the transfer of multimedia big data, [7] introduces a bandwidth on-demand broker employing a scheduling algorithm that considers various deadlines of multimedia big data transfer requests across geo-distributed cloud data centers. In terms of the computing of multimedia big data, [8] shows a framework that processes the streams of digital photos generated by online communities for enabling real-time monitoring of the relationship between real world events and social media user reactions. Discussing the application of multimedia big data, a gesture controlled e-therapy online framework is proposed in [9] for monitoring physical and occupational therapy exercises utilizing multimedia data from different sensors. Researching the sensory data transmission of SC, a time and priority-based selective data transmission technique and a priority-based sleep scheduling technique are presented in [1] toward offering more useful data reliably from WSNs to mobile cloud. In terms of the energy efficiency of SC, two collaborative location-based sleep scheduling mechanisms are shown in [11] for prolonging the lifetime of WSNs integrated with cloud. Exploring the pricing of SC, five pricing models are introduced in [12] for SC, and they serve as guidance for future research with respect to pricing in SC. Concerning the framework of SC, a novel sensory data processing framework is proposed in [13] to integrate WSNs with mobile cloud, while transmitting desirable sensory data to mobile users in a fast, reliable, and secure way. Focusing on the application of SC, [14] investigates the integration of SC and power line communication and further envisions their applications and advantages. To the best of our knowledge, there are only a few recent studies about the security of multimedia big data, and there is no recent work directly regarding TASC. Our work is the first that investigates secure multimedia big data application in TASC. Case 1 Case 2 Trusted data center Non-trusted data center Issues about Secure Multimedia Big Data in TASC Intuitively, the following critical issues can be obtained regarding the success of secure multimedia big data in TASC. Neighbor Node Number of Sensor Nodes and Data Centers This issue is related to whether there are sufficient sensor nodes in the WSN and whether there are sufficient data centers in the cloud to enable secure multimedia big sensory data in TASC. For instance, as shown in cases (a) and (a) in Fig. 3, if there is only one neighbor node for a certain sensor node in the WSN and for a certain data center in the cloud, regardless of whether the utilization of that neighbor node could enable secure multimedia big sensory data, that neighbor node has to be utilized if needed. Moreover, it may happen that there is no neighbor node for an intermediate sensor node in the WSN and for an intermediate data center in the cloud, for a variety of reasons (e.g., deployment of SC, mobility of sensor node, workload of data center). Behaviors of Sensor Nodes and Data Centers This issue is related to whether the behaviors (e.g., data collection behavior, data transmission behavior) of sensor nodes in the WSN are positive enough and whether the behaviors (e.g., data storage behavior, data processing behavior, data delivery behavior) of data centers in the cloud are positive enough for enabling secure multimedia big sensory data in TASC. For instance, as shown in cases (b) and (b) in Fig. 3, although there are several neighbor nodes for a certain sensor node in the WSN and for a certain data center in the cloud, the behaviors of these neighbor nodes might be too negative (marked with values lower than.5 for both sensor nodes and data centers) to be utilized for secure multimedia big sensory data. Energy Consumption of Sensor Nodes and Data Centers This issue is related to whether the sensor nodes in the WSN and the data centers in the cloud have enough residual energy to enable secure multimedia big sensory data in TASC. For instance, as 26

4 Case (a).1 Case (b) , 2J.1, 2J, 2J Case (c).2, 2J, 1J.9, 2J,.1J.9, 2J,.1J Case (b) Normal sensor Case (a).1, J.1 Case (c), J.9.9, J.4.4, 1J.9.9, J Normal data center Trust agents can be established to collect various evidences about the neighbor node number, behaviors, and energy consumption of the sensor nodes and data centers. After the evidence is gathered, functions can be utilized to convert the gathered evidence into the trust values of sensor nodes and data centers. Figure 3. Analysis of secure multimedia big data in TASC. shown in cases (c) and (c) in Fig. 3, even when there are available neighbor nodes with positive enough behaviors for a certain sensor node in the WSN and for a certain data center in the cloud, the residual energy of these neighbor nodes probably are too low (marked with values lower than 5 J for sensor nodes and lower than J for data centers) to be utilized for secure multimedia big sensory data. and Motivated by the above observed critical issues that influence the success of secure multimedia big data in TASC, the proposed two types of TASC (i.e., and ) are illustrated as follows considering the trust value and the trust value threshold, which are two fundamental elements in TASC. Trust Value in TASC Regarding the trust value in TASC, since the neighbor node number and behaviors as well as energy consumption of sensor nodes and data centers are critical issues regarding enabling secure multimedia big sensory data in TASC, they are incorporated together to determine the trust values of sensor nodes and data centers in TASC. In particular, trust agents can be established to collect various pieces of evidence about the neighbor node number, behaviors, and energy consumption of sensor nodes and data centers. After the evidence is gathered, functions (e.g., multidimensional trust evaluation functions) can be utilized to convert the gathered evidence into the trust values of sensor nodes and data centers. In such a way, the trust values of sensor nodes and data centers reflect the assurance or reliability that the sensor nodes and data centers realize secure multimedia big sensory data in TASC. Further, based on the trust values of sensor nodes and data centers, various sensor nodes and data centers can be utilized in each time epoch to realize different QoS, regarding secure multimedia big sensory data in TASC. With a single trust value threshold in, the trust value thresholds for all the sensor nodes in the WSN and for all the data centers in the cloud are the same in each time epoch. For example, as shown in Fig. 4, the trust value threshold for each sensor node in the WSN is v 1 and the trust value threshold for each data center in the cloud is V 1 during that time epoch. In other words, only sensor nodes with trust values exceeding v 1 will be utilized in the WSN, and only data centers with trust values exceeding V 1 will be utilized in the cloud during that time epoch. In such a manner, the aim of is to achieve scalable QoS with lower bound in terms of secure multimedia big sensory data in TASC. With multiple trust value thresholds in, the trust value thresholds for different sensor nodes in the WSN and for different data centers in the cloud vary in each time epoch. For example, as presented in Fig. 5, the trust value thresholds for the sensor nodes in the WSN are v 1, v 2, v 3, v 4, v 5, v 6, and v 7 during that time epoch. Meanwhile, the trust value thresholds for the data centers in the cloud are V 1, V 2, V 3, V 4, and V 5 during that time epoch. Thus, in the WSN, the utilized trusted sensor nodes are with trust values exceeding v 1, v 2, v 3, v 4, v 5, v 6, and v 7 during that time epoch. In the cloud, the utilized trusted data centers are with trust values exceeding V 1, V 2, V 3, V 4, and V 5 during that time epoch. In such a way, the target of is to obtain scalable QoS without bound, with respect to secure multimedia big sensory data in TASC. 27

5 For, the trust values for the sensor nodes in the WSN exceed a trust value threshold and the trust values for the data centers in the cloud exceed a trust value threshold. About, the trust values for different sensor nodes in the WSN exceed various trust value thresholds and the trust values for the data centers in the cloud exceed various trust value thresholds. Figure 4. An example of. v4 v3 v5 v6 v2 v7 Normal sensor Normal sensor Normal data center v5 v4 v2 v3 Normal data center Figure 5. An example of. Evaluation Performed in NetTopo [15] with SC s throughput as the QoS metric, the evaluation is presented as follows regarding secure multimedia big data in, and SCWTA. Evaluation Setup The SC consists of one WSN, one cloud, and 1 users [2]. Regarding the WSN, it includes one sink node and normal video sensor nodes with a data rate of kb/s. The cloud includes 1 data centers. It is assumed that each time epoch is 1 s. In each time epoch, the sensor nodes and data centers have trust values which indicate the probabilities that secure multimedia big sensory data is successfully realized utilizing them, as illustrated earlier. For, the trust values for the sensor nodes in the WSN exceed a trust value threshold, and the trust values for the data centers in the cloud exceed a trust value threshold. About, the trust values for different sensor nodes in the WSN exceed various trust value thresholds, and the trust values for the data centers in the cloud exceed various trust value thresholds. In terms of SCWTA, the trust values for the sensor nodes in the WSN and the trust values for the data centers in the cloud are always random between and 1. Moreover, it is given that five sensor nodes and one data center are utilized for,, and SCWTA. Scenario 1: Three tests are conducted, and each test has different topologies for,, and SCWTA. In each test, regarding, the trust value thresholds for both sensor nodes and data centers are.5. Regarding, the trust value thresholds for different sensor nodes and different data centers are random between.3 and.7. Scenario 2: Three tests are conducted, and each test has a specific topology for. Particularly, in each test, the trust value threshold for the sensor nodes and the trust value threshold for the data centers are changed nine times from.1 to.9 for. Scenario 3: Three tests are conducted, and each test has 1 different topologies for. Particularly, in each test, different topologies have the same trust value thresholds between.1 and.9 for. Evaluation Results The evaluation results in scenarios 1, 2, and 3 are presented in Fig. 6. Specifically, from Figs. 6a 6c, it can be observed that the throughput of SCWTA is generally lower than that of and. In other words, the throughput of and can both be generally higher than that of SCWTA. From Figs. 6d 6f, it can be seen that when the trust value threshold for grows, the throughput of is increased. Namely, the throughput of can trend with tuned trust value threshold. From Figs. 6g 6i, ruleless throughput of can be achieved with the same trust value thresholds. In other words, the throughput of can fluctuate with the same trust value thresholds. Conclusion Concerning secure multimedia big data application in TASC for smart city, this article has reviewed the recent work on multimedia big data and SC first. Further, this article has observed three critical issues that affect the success of 28

6 45 SCWTA SCWTA SCWTA #Throughput (kb/s) Topology (a) Topology (b) Topology (c) #Throughput (kb/s) #Throughput (kb/s) Trust value threshold (d) Trust value threshold (e) Trust value threshold (f) Same trust value thresholds (g) Same trust value thresholds (h) Same trust value thresholds (i) Figure 6. Evaluation results in scenarios 1, 2, and 3: a) test 1 in scenario 1 regarding the throughput of,, and SCWTA; b) test 2 in scenario 1 regarding the throughput of, and SCWTA; c) test 3 in scenario 1 regarding the throughput of,, and SCWTA; d) test 1 in scenario 2 regarding the throughput of ; e) test 2 in scenario 2 regarding the throughput of ; f) test 3 in scenario 2 regarding the throughput of ; g) test 1 in scenario 3 regarding the throughput of ; h) test 2 in scenario 3 regarding the throughput of ; i) test 3 in scenario 3 regarding the throughput of. secure multimedia big data in TASC. Motivated by addressing the identified critical issues, this article has introduced two types of TASC (i.e., and ). Eventually, with extensive simulation results on and as well as SCWTA, this article has achieved three insights into secure multimedia big data in TASC: The throughput of and can both be generally higher than that of SCWTA. The throughput of can trend with tuned trust value threshold. The throughput of can fluctuate with the same trust value thresholds. Acknowledgment This work was supported by a Four Year Doctoral Fellowship from the University of British Columbia and funding from the Natural Sciences and Engineering Research Council of Canada, the ICICS/ 29

7 TELUS People & Planet Friendly Home Initiative at the University of British Columbia, TELUS, and other industry partners. This work was partially supported by the Maoming Engineering Research Center of Industrial Internet of Things under Grant No This work was partially supported by the project IoTSec Security in IoT for Smart Grids, with number /O7, part of the IKTPLUSS program funded by the Norwegian Research Council. This research is partially supported by the projects 279/F2 funded by the Research Council of Norway. References [1] C. Ye et al., Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the jpeg Compressed Domain, Proc. IEEE 13th Int l. Conf. Trust, Security Privacy Comp. Commun., 214, pp [2] C. Zhu et al., Trust Assistance in Sensor-, Proc. IEEE Conf. Comp. Commun. Wksps., 215, pp [3] J. Wu et al., A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities, IEEE Access, vol. 4, Jan. 216, pp [4] A. Al-Fuqaha et al., Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications, IEEE Commun. Surveys & Tutorials, vol. 17, no. 4, 4th qtr. 215, pp [5] A. Samuel et al., A Framework for Composition and Enforcement of Privacy-Aware and Context-Driven Authorization Mechanism for Multimedia Big Data, IEEE Trans. Multimedia, vol. 17, no. 9, Sept. 215, pp [6] P. Zhou et al., Differentially Private Online Learning for -Based Video Recommendation with Multimedia Big Data in Social Networks, IEEE Trans. Multimedia, vol. 18, no. 6, June 216, pp [7] A. Yassine, A. A. N. Shirehjini, and S. Shirmohammadi, Bandwidth On-Demand for Multimedia Big Data Transfer Across Geo-Distributed Data Centers, IEEE Trans. Comp., vol. 6, no. 9, Oct. 216, pp [8] R. Tous, J. Torres, and E. Ayguade, Multimedia Big Data Computing for In-Depth Event Analysis, Proc. IEEE Int l. Conf. Multimedia Big Data, 215, pp [9] A. M. Qamar et al., A Multimedia Big Data E-Therapy Framework, Proc. IEEE Int l. Conf. Multimedia Big Data, 215, pp [1] C. Zhu et al., Towards Offering More Useful Data Reliably to Mobile From Wireless Sensor Network, IEEE Trans. Emerg. Topics Comp., vol. 3, no. 1, Mar. 215, pp [11] C. Zhu et al., Collaborative Location-Based Sleep Scheduling for Wireless Sensor Networks Integrated with Mobile Computing, IEEE Trans. Comp., vol. 64, no. 7, July 215, pp [12] C. Zhu et al., Pricing Models for Sensor-, Proc. 7th IEEE Int l. Conf. Comp. Tech. Sci., 215, pp [13] C. Zhu et al., A Novel Sensory Data Processing Framework to Integrate Sensor Networks with Mobile, IEEE Sys. J., vol. 1, no. 3, Sept. 216, pp [14] C. Zhu et al., Sensor- and Power Line Communication: Recent Developments and Integration, Proc. 14th IEEE Int. Conf. Depend., Autonomic, Secure Comp., 216, pp [15] L. Shu et al., Nettopo: A Framework of Simulation and Visualization for Wireless Sensor Networks, Ad Hoc Net., vol. 9, no. 5, July 211, pp Biographies Chunsheng Zhu (cszhu@ece.ubc.ca) is a postdoctoral research fellow in the Department of Electrical and Computer Engineering, University of British Columbia, Canada. He received his Ph.D. degree in electrical and computer engineering from the University of British Columbia in 216. His current research interests mainly include wireless sensor networks, cloud computing, the Internet of Things, social networks, and security. Lei Shu (lei.shu@ieee.org) is a Lincoln Professor at the University of Lincoln, United Kingdom, and a Distinguished Professor at Nanjing Agricultural University, China. He is an Associate Editor of IEEE Transactions on Industrial Informatics, the IEEE Systems Journal, and IEEE Access. His research interests include wireless sensor networks and cloud computing. Victor C. M. Leung [F] (vleung@ece.ubc.ca) is a professor in the Department of Electrical and Computer Engineering and holder of the TELUS Mobility Research Chair, University of British Columbia. His research is in the areas of wireless networks and mobile systems. Dr. Leung is a Fellow of the Royal Society of Canada, a Fellow of the Canadian Academy of Engineering, and a Fellow of the Engineering Institute of Canada. Song Guo (cssongguo@comp.polyu.edu.hk) is a professor in the Department of Computing, Hong Kong Polytechnic University. He received his Ph.D. degree in computer science from the University of Ottawa, Canada. His research interests are mainly in the areas of big data, cloud computing, green communication and computing, wireless networks, and cyber-physical systems. He serves as an Associate Editor of IEEE TETC and IEEE TGCN. Yan Zhang (yanzhang@ieee.org) is a professor in the Department of Informatics, University of Oslo, Norway. He is also a chief research scientist at Simula Research Laboratory, Norway. He is an Associate Technical Editor of IEEE Communications Magazine, and an Editor of IEEE Transactions on Green Communications and Networking and IEEE Communications Surveys & Tutorials. His current research interests include next-generation wireless networks leading to 5G, and green and secure cyber-physical systems. Laurence T. Yang (ltyang@stfx.ca) is a professor in the Department of Computer Science, St. Francis Xavier University, Canada. His research interests include parallel and distributed computing, embedded and ubiquitous/pervasive computing, and big data. His research has been supported by the National Sciences and Engineering Research Council and the Canada Foundation for Innovation. 3

Multi-Method Data Delivery for Green Sensor-Cloud

Multi-Method Data Delivery for Green Sensor-Cloud Green Communications and Computing Multi-Method Data Delivery for Green Sensor-Cloud Chunsheng Zhu, Victor C. M. Leung, Kun Wang, Laurence T. Yang, and Yan Zhang The authors discuss the potential applications

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

Collaborative Next Generation Networking

Collaborative Next Generation Networking CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing

More information

Funded Project Final Survey Report

Funded Project Final Survey Report Funded Project Final Survey Report Principal Investigator: Prof Andrea Goldsmith Project Title: Wireless Sensor Networks Technology for Smart Buildings 1. Project Description: This project sets forth a

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

Software Defined Networking for Flexible and Green Energy Internet

Software Defined Networking for Flexible and Green Energy Internet Integrated Communications, Control, and Computing Technologies for Enabling Autonomous Smart Grid Software Defined Networking for Flexible and Green Energy Internet Weifeng Zhong, Rong Yu, Shengli Xie,

More information

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks M.Sudha 1, J.Sundararajan 2, M.Maheswari 3 Assistant Professor, ECE, Paavai Engineering College, Namakkal, Tamilnadu, India 1 Principal,

More information

Sleep Scheduling Technique for Geographic Routing in MANET

Sleep Scheduling Technique for Geographic Routing in MANET Sleep Scheduling Technique for Geographic Routing in MANET Asha L Nair 1, Dr S.Perumal Sankar 2 PG Student [WT], Dept. of ECE, TocH Institute of Science and Technology, Kochi, Kerala, India 1 Professor,

More information

A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things

A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things Xuchao Chang, Chunhong Zhang, Li Sun Beijing University of Posts and Telecommunications, Beijing, 100876, China E-mail:

More information

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research:

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research: Mohamed Mahmoud Mahmoud Azab -Assistant Prof., Informatics Research Institute, The City of Scientific Research & Technology Applications, Alexandria-Egypt. - Researcher, VT-MENA research center of Excellence,

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

Service-Oriented Advanced Metering Infrastructure for Smart Grids

Service-Oriented Advanced Metering Infrastructure for Smart Grids Journal of Energy and Power Engineering 5 (2011) 455-460 Service-Oriented Advanced Metering Infrastructure for Smart Grids S. Chen 1, J.J. Lukkien 1 and L. Zhang 2 1. Department of Mathematics and Computer

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

SECURE AND ROBUST ENERGY-EFFICIENT AND RELIABLE ROUTING FOR MULTI HOP NETWORKS USING WIRELESS SENSOR NETWORKS

SECURE AND ROBUST ENERGY-EFFICIENT AND RELIABLE ROUTING FOR MULTI HOP NETWORKS USING WIRELESS SENSOR NETWORKS SECURE AND ROBUST ENERGY-EFFICIENT AND RELIABLE ROUTING FOR MULTI HOP NETWORKS USING WIRELESS SENSOR NETWORKS Sridevi H K 1, Praveen K B 2 1M.Tech student, Department of Telecommunication Engineering,

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network G.Premalatha 1, T.K.P.Rajagopal 2 Computer Science and Engineering Department, Kathir College of Engineering

More information

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 1 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0005 Mitigating Hot Spot Problems

More information

Udaipur, Rajasthan, India. University, Udaipur, Rajasthan, India

Udaipur, Rajasthan, India. University, Udaipur, Rajasthan, India ROLE OF NETWORK VIRTUALIZATION IN CLOUD COMPUTING AND NETWORK CONVERGENCE 1 SHAIKH ABDUL AZEEM, 2 SATYENDRA KUMAR SHARMA 1 Research Scholar, Department of Computer Science, Pacific Academy of Higher Education

More information

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid Yijia Cao Hunan University, China 2014-10 10-21 OUTLINE 1 IOT Application in Smart Grid 2 3 Requirements for Communication

More information

L2 - Internet of Things

L2 - Internet of Things UNIK4750 - Measurable Security for the Internet of Things L2 - Internet of Things György Kálmán, UiO/NTNU/mnemonic gyorgy.kalman@its.uio.no Josef Noll UiO/UNIK josef.noll@its.uio.no http://cwi.unik.no/wiki/unik4750,

More information

Modeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review

Modeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review Modeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review R. Sinde Nelson Mandela African Institution of Science and Technology School of

More information

Vol. 2 Issue III, March 2014

Vol. 2 Issue III, March 2014 Literature survey of network reconstruction, reconfiguration & QOS optimization approach in case of link failure in existing SSA protocol in Mobile Ad-Hoc Network Vikas Deswal (Student), M.Tech (CSE),

More information

A PROPOSAL FOR IMPROVE THE LIFE- TIME OF WIRELESS SENSOR NETWORK

A PROPOSAL FOR IMPROVE THE LIFE- TIME OF WIRELESS SENSOR NETWORK A PROPOSAL FOR IMPROVE THE LIFE- TIME OF WIRELESS SENSOR NETWORK ABSTRACT Tran Cong Hung1 and Nguyen Hong Quan2 1Post & Telecommunications Institute of Technology, Vietnam 2University of Science, Ho Chi

More information

Application of Redundant Backup Technology in Network Security

Application of Redundant Backup Technology in Network Security 2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Application of Redundant Backup Technology in Network Security Shuwen Deng1, Siping Hu*, 1, Dianhua Wang1, Limin

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks

A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks Gopi.T 1, Santhi.B 2 School of computing, SASTRA University Tirumalaisamudram, Thanjavur, Tamilnadu, India. 1 gopi_fgh@yahoo.co.in

More information

Mobile Edge Computing and Networking for Green and Low-Latency Internet of Things

Mobile Edge Computing and Networking for Green and Low-Latency Internet of Things ACHIEVING ENERGY EFFICIENCY AND SUSTAINABILITY IN EDGE/FOG DEPLOYMENT Mobile Edge Computing and Networking for Green and Low-Latency Internet of Things Ke Zhang, Supeng Leng, Yejun He, Sabita Maharjan,

More information

Data-Driven Computing and Caching in 5G Networks: Architecture and Delay Analysis

Data-Driven Computing and Caching in 5G Networks: Architecture and Delay Analysis WIRELESS BIG DATA: TECHNOLOGIES AND APPLICATIONS Data-Driven Computing and Caching in 5G Networks: Architecture and Delay Analysis Min Chen, Yongfeng Qian, Yixue Hao, Yong Li, and Jeungeun Song Abstract

More information

An Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review

An Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.934

More information

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices*

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Rodrigo Román, M. Carmen Fernández-Gago, Javier López University of Málaga, Spain *(Wireless Sensor Networks) Contents

More information

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Huiqi Zhao 1,2,3, Yinglong Wang 2,3*, Minglei Shu 2,3 1 Department of Information

More information

Construction Scheme for Cloud Platform of NSFC Information System

Construction Scheme for Cloud Platform of NSFC Information System , pp.200-204 http://dx.doi.org/10.14257/astl.2016.138.40 Construction Scheme for Cloud Platform of NSFC Information System Jianjun Li 1, Jin Wang 1, Yuhui Zheng 2 1 Information Center, National Natural

More information

Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions

Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions Siran Pavankumar(149344152) siranpavankumar@gmail.com Computer Science Department Seoul National

More information

Service-Oriented Middleware for Smart Grid: Principle, Infrastructure, and Application

Service-Oriented Middleware for Smart Grid: Principle, Infrastructure, and Application ULTIMATE TECHNOLOGIES AND ADVANCES FOR FUTURE SMART GRID UTASG Service-Oriented Middleware for Smart Grid: Principle, Infrastructure, and Application Liang Zhou, Nanjing University of Posts and Telecommunications

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

Modernizing the Grid for a Low-Carbon Future. Dr. Bryan Hannegan Associate Laboratory Director

Modernizing the Grid for a Low-Carbon Future. Dr. Bryan Hannegan Associate Laboratory Director Modernizing the Grid for a Low-Carbon Future Dr. Bryan Hannegan Associate Laboratory Director Aspen Energy Policy Forum July 5, 2016 40 YEARS OF CLEAN ENERGY RESEARCH Founded as Solar Energy Research Institute

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network

Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network Anil Kumar Mahto anil.fiem16@gmail.com Ajay Prasad Department

More information

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS Saraswati Mishra 1 and Prabhjot Kaur 2 Department of Electrical, Electronics and Communication Engineering,

More information

ISSN: [Powar * et al., 7(6): June, 2018] Impact Factor: 5.164

ISSN: [Powar * et al., 7(6): June, 2018] Impact Factor: 5.164 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY ROUTING TECHNIQUES FOR ENERGY EFFICIENT PROTOCOL OF UNDERWATER WIRELESS SENSOR NETWORK (UWSN) IN THE INTERNET OF UNDERWATER THINGS

More information

COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY

COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY UNIVERSITY OF DIGITAL REVOLUTION. Fourth industrial revolution is upon us and you can be part of

More information

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network A Survey on policies in Mobile ad-hoc Computational S. Kamble 1, A. Savyanavar 2 1PG Scholar, Department of Computer Engineering, MIT College of Engineering, Pune, Maharashtra, India 2Associate Professor,

More information

The quality of any business or industrial process outcomes depend upon three major foundations:

The quality of any business or industrial process outcomes depend upon three major foundations: Ensuring Quality in an Internet of Things Messages between devices, or to/from humans benefits from structure. Version 4, February 5, 2018 Prepared by Michael Scofield, M.B.A. Synopsis... 1 What is the

More information

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

Keywords: Cloud computing, ZigBee, Smart home, Security cloud

Keywords: Cloud computing, ZigBee, Smart home, Security cloud 2016 International Conference on Information Engineering and Communications Technology (IECT 2016) ISBN: 978-1-60595-375-5 Design of the Smart-home Security System based on Cloud Computing Yan Wang 1,a,

More information

Towards a Search-based Interactive Configuration of Cyber Physical. System Product Lines 1

Towards a Search-based Interactive Configuration of Cyber Physical. System Product Lines 1 Towards a Search-based Interactive Configuration of Cyber Physical System Product Lines Kunming Nie, Tao Yue, Shaukat Ali Software Engineering Institute, Beihang University, Beijing, China niekunming@cse.buaa.edu.cn

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

Evaluation of Communication Overheads in Wireless Sensor Networks

Evaluation of Communication Overheads in Wireless Sensor Networks Evaluation of Communication Overheads in Wireless Sensor Networks Shiv Prasad Kori 1, Dr. R. K. Baghel 2 1 Deptt. of ECE, JIJA Mata Govt. Women Polytechnic College, Burhanpur (MP)- INDIA 2 Electronics

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

Detection of Vampire Attack in Wireless Adhoc

Detection of Vampire Attack in Wireless Adhoc Detection of Vampire Attack in Wireless Adhoc Network Ankita Shrivastava 1 ; Rakesh Verma 2 Master of Engineering Research Scholar, Medi-caps Institute of Technology and Management 1 ; Asst. Professor,

More information

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,

More information

Cybersecurity ecosystem and TDL Antonio F. Skarmeta

Cybersecurity ecosystem and TDL Antonio F. Skarmeta Cybersecurity ecosystem and TDL Antonio F. Skarmeta University of Murcia (UMU) SPAIN CyberSecurity Challenges in a fully connected World Trust Framework 1. Policies for trust in heterogeneous

More information

A QoE Friendly Rate Adaptation Method for DASH

A QoE Friendly Rate Adaptation Method for DASH A QoE Friendly Rate Adaptation Method for DASH Yuming Cao 1,3, Xiaoquan You 2,3, Jia Wang 1,3, Li Song 1,3 1 Institute of Image Communication and Network Engineering, Shanghai Jiao Tong University 2 Communication

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

PreFeed: Cloud-Based Content Prefetching of Feed Subscriptions for Mobile Users. Xiaofei Wang and Min Chen Speaker: 饒展榕

PreFeed: Cloud-Based Content Prefetching of Feed Subscriptions for Mobile Users. Xiaofei Wang and Min Chen Speaker: 饒展榕 PreFeed: Cloud-Based Content Prefetching of Feed Subscriptions for Mobile Users Xiaofei Wang and Min Chen Speaker: 饒展榕 Outline INTRODUCTION RELATED WORK PREFEED FRAMEWORK SOCIAL RSS SHARING OPTIMIZATION

More information

An Adaptive and Optimal Distributed Clustering for Wireless Sensor

An Adaptive and Optimal Distributed Clustering for Wireless Sensor An Adaptive and Optimal Distributed Clustering for Wireless Sensor M. Senthil Kumaran, R. Haripriya 2, R.Nithya 3, Vijitha ananthi 4 Asst. Professor, Faculty of CSE, SCSVMV University, Kanchipuram. 2,

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

Analysis and Implementation Wireless Sensor Network of Information Technology Systems

Analysis and Implementation Wireless Sensor Network of Information Technology Systems International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 3 (March 2017), PP.69-73 Analysis and Implementation Wireless Sensor Network

More information

A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks

A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks International Journal of Engineering and Technical Research (IJETR) A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks Ms. Arati Phadtare,

More information

WeVe: When Smart Wearables Meet Intelligent Vehicles

WeVe: When Smart Wearables Meet Intelligent Vehicles WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet

More information

Study of Smart Home System based on Zigbee Wireless Sensor System. Jie Huang 1

Study of Smart Home System based on Zigbee Wireless Sensor System. Jie Huang 1 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Study of Smart Home System based on Zigbee Wireless Sensor System Jie Huang 1 1 College of Mechanical and Electronic

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

Aggregation on the Fly: Reducing Traffic for Big Data in the Cloud

Aggregation on the Fly: Reducing Traffic for Big Data in the Cloud Aggregation on the Fly: Reducing Traffic for Big Data in the Cloud Huan Ke, Peng Li, Song Guo, and Ivan Stojmenovic Abstract As a leading framework for processing and analyzing big data, MapReduce is leveraged

More information

A Brief Introduction to CFINS

A Brief Introduction to CFINS A Brief Introduction to CFINS Center for Intelligent and Networked Systems (CFINS) Department of Automation Tsinghua University Beijing 100084, China 6/30/2016 1 Outline Mission People Professors Students

More information

Towards offering more useful data reliably to mobile cloudfrom wireless sensor network

Towards offering more useful data reliably to mobile cloudfrom wireless sensor network Towards offering more useful data reliably to mobile cloudfrom wireless sensor network Article (Accepted Version) Zhu, Chunsheng, Sheng, Zhengguo, Leung, Victor C M, Shu, Lei and Yang, Laurence T (2015)

More information

IEEE networking projects

IEEE networking projects IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT MOBILE OFFLOADING USING POWER BASED DECISION IN WIRELESS COMMUNICATION M.Nivethamani 1*, Soma Prathinha 2 1* PG Scholar, Student Member, IEEE, Sri Sairam Engineering College, Chennai 2 Associate Professor,

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 286 A SURVEY ON FACTORS EFFECTING ENERGY CONSUMPTION IN MANET Pooja Ph.D Scholar, Department of Computer Science

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Research on Control Routing Technology in Communication Network

Research on Control Routing Technology in Communication Network Appl. Math. Inf. Sci. 6 No. 1S pp. 129S-133S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Research on Control Routing Technology

More information

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission

More information

Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation

Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation Paramvir Kaur * Sukhwinder Sharma # * M.Tech in CSE with specializationl in E-Security, BBSBEC,Fatehgarh sahib,

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

WIRELESS Multimedia Sensor Networks (WMSNs) is a

WIRELESS Multimedia Sensor Networks (WMSNs) is a INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 279-283 Manuscript received October 9, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0037 Energy-Efficient Routing Based

More information

Information Retrieval System Based on Context-aware in Internet of Things. Ma Junhong 1, a *

Information Retrieval System Based on Context-aware in Internet of Things. Ma Junhong 1, a * Information Retrieval System Based on Context-aware in Internet of Things Ma Junhong 1, a * 1 Xi an International University, Shaanxi, China, 710000 a sufeiya913@qq.com Keywords: Context-aware computing,

More information

A Composite Trust based Public Key Management in MANETs

A Composite Trust based Public Key Management in MANETs USMA 6 th Network Science Workshop April 23, 2012 West Point, NY U.S. Army Research, Development and Engineering Command A Composite Trust based Public Key Management in MANETs Jin-Hee Cho and Kevin Chan

More information

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC Su Man Nam and Tae Ho Cho College of Information and Communication Engineering,

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

Research on Relative Coordinate Localization of Nodes Based on Topology Control

Research on Relative Coordinate Localization of Nodes Based on Topology Control Journal of Information Hiding and Multimedia Signal Processing c 2018 ISSN 2073-4212 Ubiquitous International Volume 9, Number 2, March 2018 Research on Relative Coordinate Localization of Nodes Based

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Jina Han Department of Information and Computer Engineering Ajou University Suwon, South Korea hangn0808@ajou.ac.kr

More information

Shu, Lei; Wu, Chun; Hauswirth, Manfred

Shu, Lei; Wu, Chun; Hauswirth, Manfred Provided by the author(s) and NUI Galway in accordance with publisher policies. Please cite the published version when available. Title NetTopo: Beyond Simulator and Visualizer for Wireless Sensor Networks

More information

Vertical Handover in Vehicular Ad-hoc Networks A Survey

Vertical Handover in Vehicular Ad-hoc Networks A Survey Vertical Handover in Vehicular Ad-hoc Networks A Survey U. Kumaran Department of computer Applications Noorul Islam Center for Higher Education, Kumaracoil,Tamilnadu, India. Abstract- Vehicular Ad-hoc

More information