Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City
|
|
- Gerald O’Connor’
- 5 years ago
- Views:
Transcription
1 Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities Secure Multimedia Big Data in Trust-Assisted Sensor- for Smart City Chunsheng Zhu, Lei Shu, Victor C. M. Leung, Song Guo, Yan Zhang, and Laurence T. Yang The authors reviewed the recent work on multimedia big data and SC. They observe three critical issues that affect the success of secure multimedia big data in TASC. With that, motivated by addressing the identified critical issues, they introduce two types of TASC: and. Abstract Lately, with the prevalence of digital devices and social network applications, the explosive growth of multimedia big data poses many challenges for users to obtain them securely in various application scenarios. In this article, investigating secure multimedia big data application in trust-assisted sensor cloud (TASC), which is one kind of SC for smart city, the recent work about multimedia big data and SC is reviewed first. Further, the critical issues that affect the success of secure multimedia big data in TASC are identified. With that, motivated by addressing the identified critical issues, this article proposes two types of TASC: (TASC with a single trust value threshold), and (TASC with multiple trust value thresholds). Finally, with extensive simulation results about and as well as SC without trust assistance (SCWTA), the following insights into secure multimedia big data in TASC are achieved: the throughput of and can both be generally higher than that of SCWTA; the throughput of can trend with tuned trust value threshold; and the throughput of can fluctuate with the same trust value thresholds. Introduction Recently, as a unique branch of big data that represents the explosive growth of data from a variety of sources happening in our society, multimedia big data is utilized to describe the huge amounts of multimedia data produced with the prevalence of cameras, mobile devices, social media, the Internet, and so on. Particularly, multimedia big data has the following features. First, it is unstructured, heterogeneous, and multimodal. Second, it has cognition, which bridges the semantic gap between low-level features and high-level semantics. Third, it typically has realtime delivery. Fourth, it is acquired, processed, and analyzed efficiently and scalably. Multimedia big data technology greatly boosts a lot of multimedia applications/services (e.g., multimedia search, multimedia advertisement). Meanwhile, the boom of multimedia big data poses many challenges for users to achieve them securely in various application scenarios. For instance, as discussed in [1], in terms of secure multimedia big data sharing in social networks, substantial potential risks (e.g., illegal copying, illegal distribution, misappropriation) could exist for maliciously utilizing the multimedia big data. In such cases, security mechanisms are needed to ensure the security of multimedia big data with respect to its source identity, content integrity, privacy, and so on. In this article, studying secure multimedia big data application in trust-assisted sensor cloud (TASC) [2] which is one kind of sensor cloud (SC) for smart city [3], we review the recent work about multimedia big data and SC first. Further, we identify the critical issues that affect the success of secure multimedia big data in TASC. Then, triggered by addressing the identified critical issues, we propose two types of TASC: (TASC with a single trust value threshold) (TASC with multiple trust value thresholds) Eventually, with extensive simulation results about and as well as SC without trust assistance (SCWTA), we observe the following insights into secure multimedia big data in TASC: The throughput of and can both be generally higher than that of SCWTA. The throughput of can trend with tuned trust value threshold. The throughput of can fluctuate with the same trust value thresholds. The main contributions of this article are as follows: This article is the first work that explores secure multimedia big data application in TASC. This clearly demonstrates the novelty of this work compared to other works on multimedia big data and SC. Induced by addressing the observed critical issues that influence the success of secure multimedia big data in TASC, this article puts forward two types of TASC (i.e., and ). With extensive simulation results on and as well as SCWTA, this article obtains three insights into secure multimedia big data in TASC. The remainder of this article is organized as follows. We present the preliminaries about TASC. We review the recent work about multimedia big data and SC. The identified critical issues that affect the success of secure multimedia big Digital Object Identifier: 1.119/MCOM Chunsheng Zhu and Victor C. M. Leung are with the University of British Columbia; Lei Shu is with Nanjing Agricultural University and the University of Lincoln; Song Guo is with Hong Kong Polytechnic University; Yan Zhang is with the University of Oslo; Laurence T. Yang is with St. Francis Xavier University /17/$ IEEE
2 Figure 1. An example of SC. Temperature sensor Humidity sensor Motion sensor Video sensor Data center 1 Data center 3 Data center 2 Data server With TASC, since the used sensors and data centers are assured and reliable sensors and data centers with trust values exceeding certain thresholds, the throughput and response time that users achieve sensory data from the SC can be substantially improved. data in TASC are illustrated. The proposed and are introduced. Evaluation of and as well as SCWTA is conducted. This article is then concluded. Preliminaries about TASC SC As an essential component of the Internet of Things (IoT) [4], which aims to connect everything, SC is a new paradigm that integrates the wireless sensor network (WSN) and the cloud for smart city. Specifically, as shown in Fig. 1, SC includes three basic entities: the WSN, the cloud, and the users. The WSN, consisting of sensor nodes, is for gathering and transmitting various sensory data (temperature, humidity, motion, video, etc.) to the cloud. The cloud consists of data centers and is for storing and processing the received sensory data (e.g., multimedia big sensory data) as well as further delivering the processed sensory data to the users on demand. Therefore, with SC, the WSN and the cloud can complement each other. For example, the utility of the WSN can be enhanced by serving multiple applications via the cloud, while the services that the cloud offers can be enriched by offering the service the WSN provides. Moreover, the users are able to conveniently have access to their desirable sensory data (e.g., multimedia big sensory data) from the cloud anytime and anywhere if there is an Internet connection. All these features are desired for smart city, which strategically incorporates various networks and computing platforms to offer desirable services for people. Trust With different definitions regarding various fields, trust [2] is defined as assured reliance on the character, ability, strength or truth of someone or something by the Merriam-Webster Dictionary. Particularly in terms of wireless communications, trust can be defined as trust of a node A in a node B is the subjective expectation of node A receiving positive outcomes from the interaction with node B in a specific context. Generally, to evaluate the trust from node A to node B, node A needs to collect various evidences (e.g., maliciousness, selfishness, honesty) about node B, based on either direct interactions or information from third parties. Further, the trust value of node B is determined by utilizing a function or functions to convert the collected evidence into the trustworthiness (i.e., trust value). TASC Improving the quality of service (QoS) at which users obtain sensory data (e.g., multimedia big sensory data) from the cloud, TASC is a new kind of SC, recently proposed in [2]. Particularly, as presented in Fig. 2, the basic concept of TASC is incorporating trust into SC. In other words, the trusted sensors (i.e., sensors with trust values exceeding a threshold) are adopted in the WSN for collecting and transmitting sensory data to the cloud, while the trusted data centers (i.e., data centers with trust values exceeding a threshold) are utilized in the cloud to store, process, and further deliver the processed sensory data to the users on demand. With TASC, since the used sensors and data centers are assured and reliable sensors and data centers with trust values exceeding certain thresholds, the throughput and response time in which users achieve sensory data from the SC can be substantially improved. System Model of TASC Based on [2], the system model of TASC is presented as follows as an instance. The SC includes one WSN, one cloud, and Q users. In the WSN, there is one sink node s and D normal sensor nodes s i (1 i D). Normal sensor nodes transmit sensed sensory data to the sink node, and the data rate is r s kb/s. Regarding the cloud, there are L data centers d j (1 j L), which store and process the sensory data received from the WSN. The Q users obtain the processed sensory data from the cloud. In addition, time is divided into G time epochs t k (1 k G). In each time epoch t k, each sensor node s i has a trust value v tk si and each data center d j has a trust value v tk di. Recent Work about Multimedia Big Data and SC Regarding the authorization of multimedia big data, a framework is presented in [5] for the composition and enforcement of priva- 25
3 Regarding the trust value in TASC, since the neighbor node number and behaviors as well as energy consumption of sensor nodes and data centers are critical issues regarding enabling secure multimedia big sensory data in TASC, they are incorporated together to determine the trust values of sensor nodes and data centers in TASC. Case 1 Case 2 Trusted sensor Non-trusted sensor Figure 2. An example of TASC. cy-aware and context-driven access for users. Focusing on the recommendation of multimedia big data, [6] designs a cloud-assisted differentially private video recommendation system based on distributed online learning in social networks. Concerning the transfer of multimedia big data, [7] introduces a bandwidth on-demand broker employing a scheduling algorithm that considers various deadlines of multimedia big data transfer requests across geo-distributed cloud data centers. In terms of the computing of multimedia big data, [8] shows a framework that processes the streams of digital photos generated by online communities for enabling real-time monitoring of the relationship between real world events and social media user reactions. Discussing the application of multimedia big data, a gesture controlled e-therapy online framework is proposed in [9] for monitoring physical and occupational therapy exercises utilizing multimedia data from different sensors. Researching the sensory data transmission of SC, a time and priority-based selective data transmission technique and a priority-based sleep scheduling technique are presented in [1] toward offering more useful data reliably from WSNs to mobile cloud. In terms of the energy efficiency of SC, two collaborative location-based sleep scheduling mechanisms are shown in [11] for prolonging the lifetime of WSNs integrated with cloud. Exploring the pricing of SC, five pricing models are introduced in [12] for SC, and they serve as guidance for future research with respect to pricing in SC. Concerning the framework of SC, a novel sensory data processing framework is proposed in [13] to integrate WSNs with mobile cloud, while transmitting desirable sensory data to mobile users in a fast, reliable, and secure way. Focusing on the application of SC, [14] investigates the integration of SC and power line communication and further envisions their applications and advantages. To the best of our knowledge, there are only a few recent studies about the security of multimedia big data, and there is no recent work directly regarding TASC. Our work is the first that investigates secure multimedia big data application in TASC. Case 1 Case 2 Trusted data center Non-trusted data center Issues about Secure Multimedia Big Data in TASC Intuitively, the following critical issues can be obtained regarding the success of secure multimedia big data in TASC. Neighbor Node Number of Sensor Nodes and Data Centers This issue is related to whether there are sufficient sensor nodes in the WSN and whether there are sufficient data centers in the cloud to enable secure multimedia big sensory data in TASC. For instance, as shown in cases (a) and (a) in Fig. 3, if there is only one neighbor node for a certain sensor node in the WSN and for a certain data center in the cloud, regardless of whether the utilization of that neighbor node could enable secure multimedia big sensory data, that neighbor node has to be utilized if needed. Moreover, it may happen that there is no neighbor node for an intermediate sensor node in the WSN and for an intermediate data center in the cloud, for a variety of reasons (e.g., deployment of SC, mobility of sensor node, workload of data center). Behaviors of Sensor Nodes and Data Centers This issue is related to whether the behaviors (e.g., data collection behavior, data transmission behavior) of sensor nodes in the WSN are positive enough and whether the behaviors (e.g., data storage behavior, data processing behavior, data delivery behavior) of data centers in the cloud are positive enough for enabling secure multimedia big sensory data in TASC. For instance, as shown in cases (b) and (b) in Fig. 3, although there are several neighbor nodes for a certain sensor node in the WSN and for a certain data center in the cloud, the behaviors of these neighbor nodes might be too negative (marked with values lower than.5 for both sensor nodes and data centers) to be utilized for secure multimedia big sensory data. Energy Consumption of Sensor Nodes and Data Centers This issue is related to whether the sensor nodes in the WSN and the data centers in the cloud have enough residual energy to enable secure multimedia big sensory data in TASC. For instance, as 26
4 Case (a).1 Case (b) , 2J.1, 2J, 2J Case (c).2, 2J, 1J.9, 2J,.1J.9, 2J,.1J Case (b) Normal sensor Case (a).1, J.1 Case (c), J.9.9, J.4.4, 1J.9.9, J Normal data center Trust agents can be established to collect various evidences about the neighbor node number, behaviors, and energy consumption of the sensor nodes and data centers. After the evidence is gathered, functions can be utilized to convert the gathered evidence into the trust values of sensor nodes and data centers. Figure 3. Analysis of secure multimedia big data in TASC. shown in cases (c) and (c) in Fig. 3, even when there are available neighbor nodes with positive enough behaviors for a certain sensor node in the WSN and for a certain data center in the cloud, the residual energy of these neighbor nodes probably are too low (marked with values lower than 5 J for sensor nodes and lower than J for data centers) to be utilized for secure multimedia big sensory data. and Motivated by the above observed critical issues that influence the success of secure multimedia big data in TASC, the proposed two types of TASC (i.e., and ) are illustrated as follows considering the trust value and the trust value threshold, which are two fundamental elements in TASC. Trust Value in TASC Regarding the trust value in TASC, since the neighbor node number and behaviors as well as energy consumption of sensor nodes and data centers are critical issues regarding enabling secure multimedia big sensory data in TASC, they are incorporated together to determine the trust values of sensor nodes and data centers in TASC. In particular, trust agents can be established to collect various pieces of evidence about the neighbor node number, behaviors, and energy consumption of sensor nodes and data centers. After the evidence is gathered, functions (e.g., multidimensional trust evaluation functions) can be utilized to convert the gathered evidence into the trust values of sensor nodes and data centers. In such a way, the trust values of sensor nodes and data centers reflect the assurance or reliability that the sensor nodes and data centers realize secure multimedia big sensory data in TASC. Further, based on the trust values of sensor nodes and data centers, various sensor nodes and data centers can be utilized in each time epoch to realize different QoS, regarding secure multimedia big sensory data in TASC. With a single trust value threshold in, the trust value thresholds for all the sensor nodes in the WSN and for all the data centers in the cloud are the same in each time epoch. For example, as shown in Fig. 4, the trust value threshold for each sensor node in the WSN is v 1 and the trust value threshold for each data center in the cloud is V 1 during that time epoch. In other words, only sensor nodes with trust values exceeding v 1 will be utilized in the WSN, and only data centers with trust values exceeding V 1 will be utilized in the cloud during that time epoch. In such a manner, the aim of is to achieve scalable QoS with lower bound in terms of secure multimedia big sensory data in TASC. With multiple trust value thresholds in, the trust value thresholds for different sensor nodes in the WSN and for different data centers in the cloud vary in each time epoch. For example, as presented in Fig. 5, the trust value thresholds for the sensor nodes in the WSN are v 1, v 2, v 3, v 4, v 5, v 6, and v 7 during that time epoch. Meanwhile, the trust value thresholds for the data centers in the cloud are V 1, V 2, V 3, V 4, and V 5 during that time epoch. Thus, in the WSN, the utilized trusted sensor nodes are with trust values exceeding v 1, v 2, v 3, v 4, v 5, v 6, and v 7 during that time epoch. In the cloud, the utilized trusted data centers are with trust values exceeding V 1, V 2, V 3, V 4, and V 5 during that time epoch. In such a way, the target of is to obtain scalable QoS without bound, with respect to secure multimedia big sensory data in TASC. 27
5 For, the trust values for the sensor nodes in the WSN exceed a trust value threshold and the trust values for the data centers in the cloud exceed a trust value threshold. About, the trust values for different sensor nodes in the WSN exceed various trust value thresholds and the trust values for the data centers in the cloud exceed various trust value thresholds. Figure 4. An example of. v4 v3 v5 v6 v2 v7 Normal sensor Normal sensor Normal data center v5 v4 v2 v3 Normal data center Figure 5. An example of. Evaluation Performed in NetTopo [15] with SC s throughput as the QoS metric, the evaluation is presented as follows regarding secure multimedia big data in, and SCWTA. Evaluation Setup The SC consists of one WSN, one cloud, and 1 users [2]. Regarding the WSN, it includes one sink node and normal video sensor nodes with a data rate of kb/s. The cloud includes 1 data centers. It is assumed that each time epoch is 1 s. In each time epoch, the sensor nodes and data centers have trust values which indicate the probabilities that secure multimedia big sensory data is successfully realized utilizing them, as illustrated earlier. For, the trust values for the sensor nodes in the WSN exceed a trust value threshold, and the trust values for the data centers in the cloud exceed a trust value threshold. About, the trust values for different sensor nodes in the WSN exceed various trust value thresholds, and the trust values for the data centers in the cloud exceed various trust value thresholds. In terms of SCWTA, the trust values for the sensor nodes in the WSN and the trust values for the data centers in the cloud are always random between and 1. Moreover, it is given that five sensor nodes and one data center are utilized for,, and SCWTA. Scenario 1: Three tests are conducted, and each test has different topologies for,, and SCWTA. In each test, regarding, the trust value thresholds for both sensor nodes and data centers are.5. Regarding, the trust value thresholds for different sensor nodes and different data centers are random between.3 and.7. Scenario 2: Three tests are conducted, and each test has a specific topology for. Particularly, in each test, the trust value threshold for the sensor nodes and the trust value threshold for the data centers are changed nine times from.1 to.9 for. Scenario 3: Three tests are conducted, and each test has 1 different topologies for. Particularly, in each test, different topologies have the same trust value thresholds between.1 and.9 for. Evaluation Results The evaluation results in scenarios 1, 2, and 3 are presented in Fig. 6. Specifically, from Figs. 6a 6c, it can be observed that the throughput of SCWTA is generally lower than that of and. In other words, the throughput of and can both be generally higher than that of SCWTA. From Figs. 6d 6f, it can be seen that when the trust value threshold for grows, the throughput of is increased. Namely, the throughput of can trend with tuned trust value threshold. From Figs. 6g 6i, ruleless throughput of can be achieved with the same trust value thresholds. In other words, the throughput of can fluctuate with the same trust value thresholds. Conclusion Concerning secure multimedia big data application in TASC for smart city, this article has reviewed the recent work on multimedia big data and SC first. Further, this article has observed three critical issues that affect the success of 28
6 45 SCWTA SCWTA SCWTA #Throughput (kb/s) Topology (a) Topology (b) Topology (c) #Throughput (kb/s) #Throughput (kb/s) Trust value threshold (d) Trust value threshold (e) Trust value threshold (f) Same trust value thresholds (g) Same trust value thresholds (h) Same trust value thresholds (i) Figure 6. Evaluation results in scenarios 1, 2, and 3: a) test 1 in scenario 1 regarding the throughput of,, and SCWTA; b) test 2 in scenario 1 regarding the throughput of, and SCWTA; c) test 3 in scenario 1 regarding the throughput of,, and SCWTA; d) test 1 in scenario 2 regarding the throughput of ; e) test 2 in scenario 2 regarding the throughput of ; f) test 3 in scenario 2 regarding the throughput of ; g) test 1 in scenario 3 regarding the throughput of ; h) test 2 in scenario 3 regarding the throughput of ; i) test 3 in scenario 3 regarding the throughput of. secure multimedia big data in TASC. Motivated by addressing the identified critical issues, this article has introduced two types of TASC (i.e., and ). Eventually, with extensive simulation results on and as well as SCWTA, this article has achieved three insights into secure multimedia big data in TASC: The throughput of and can both be generally higher than that of SCWTA. The throughput of can trend with tuned trust value threshold. The throughput of can fluctuate with the same trust value thresholds. Acknowledgment This work was supported by a Four Year Doctoral Fellowship from the University of British Columbia and funding from the Natural Sciences and Engineering Research Council of Canada, the ICICS/ 29
7 TELUS People & Planet Friendly Home Initiative at the University of British Columbia, TELUS, and other industry partners. This work was partially supported by the Maoming Engineering Research Center of Industrial Internet of Things under Grant No This work was partially supported by the project IoTSec Security in IoT for Smart Grids, with number /O7, part of the IKTPLUSS program funded by the Norwegian Research Council. This research is partially supported by the projects 279/F2 funded by the Research Council of Norway. References [1] C. Ye et al., Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the jpeg Compressed Domain, Proc. IEEE 13th Int l. Conf. Trust, Security Privacy Comp. Commun., 214, pp [2] C. Zhu et al., Trust Assistance in Sensor-, Proc. IEEE Conf. Comp. Commun. Wksps., 215, pp [3] J. Wu et al., A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities, IEEE Access, vol. 4, Jan. 216, pp [4] A. Al-Fuqaha et al., Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications, IEEE Commun. Surveys & Tutorials, vol. 17, no. 4, 4th qtr. 215, pp [5] A. Samuel et al., A Framework for Composition and Enforcement of Privacy-Aware and Context-Driven Authorization Mechanism for Multimedia Big Data, IEEE Trans. Multimedia, vol. 17, no. 9, Sept. 215, pp [6] P. Zhou et al., Differentially Private Online Learning for -Based Video Recommendation with Multimedia Big Data in Social Networks, IEEE Trans. Multimedia, vol. 18, no. 6, June 216, pp [7] A. Yassine, A. A. N. Shirehjini, and S. Shirmohammadi, Bandwidth On-Demand for Multimedia Big Data Transfer Across Geo-Distributed Data Centers, IEEE Trans. Comp., vol. 6, no. 9, Oct. 216, pp [8] R. Tous, J. Torres, and E. Ayguade, Multimedia Big Data Computing for In-Depth Event Analysis, Proc. IEEE Int l. Conf. Multimedia Big Data, 215, pp [9] A. M. Qamar et al., A Multimedia Big Data E-Therapy Framework, Proc. IEEE Int l. Conf. Multimedia Big Data, 215, pp [1] C. Zhu et al., Towards Offering More Useful Data Reliably to Mobile From Wireless Sensor Network, IEEE Trans. Emerg. Topics Comp., vol. 3, no. 1, Mar. 215, pp [11] C. Zhu et al., Collaborative Location-Based Sleep Scheduling for Wireless Sensor Networks Integrated with Mobile Computing, IEEE Trans. Comp., vol. 64, no. 7, July 215, pp [12] C. Zhu et al., Pricing Models for Sensor-, Proc. 7th IEEE Int l. Conf. Comp. Tech. Sci., 215, pp [13] C. Zhu et al., A Novel Sensory Data Processing Framework to Integrate Sensor Networks with Mobile, IEEE Sys. J., vol. 1, no. 3, Sept. 216, pp [14] C. Zhu et al., Sensor- and Power Line Communication: Recent Developments and Integration, Proc. 14th IEEE Int. Conf. Depend., Autonomic, Secure Comp., 216, pp [15] L. Shu et al., Nettopo: A Framework of Simulation and Visualization for Wireless Sensor Networks, Ad Hoc Net., vol. 9, no. 5, July 211, pp Biographies Chunsheng Zhu (cszhu@ece.ubc.ca) is a postdoctoral research fellow in the Department of Electrical and Computer Engineering, University of British Columbia, Canada. He received his Ph.D. degree in electrical and computer engineering from the University of British Columbia in 216. His current research interests mainly include wireless sensor networks, cloud computing, the Internet of Things, social networks, and security. Lei Shu (lei.shu@ieee.org) is a Lincoln Professor at the University of Lincoln, United Kingdom, and a Distinguished Professor at Nanjing Agricultural University, China. He is an Associate Editor of IEEE Transactions on Industrial Informatics, the IEEE Systems Journal, and IEEE Access. His research interests include wireless sensor networks and cloud computing. Victor C. M. Leung [F] (vleung@ece.ubc.ca) is a professor in the Department of Electrical and Computer Engineering and holder of the TELUS Mobility Research Chair, University of British Columbia. His research is in the areas of wireless networks and mobile systems. Dr. Leung is a Fellow of the Royal Society of Canada, a Fellow of the Canadian Academy of Engineering, and a Fellow of the Engineering Institute of Canada. Song Guo (cssongguo@comp.polyu.edu.hk) is a professor in the Department of Computing, Hong Kong Polytechnic University. He received his Ph.D. degree in computer science from the University of Ottawa, Canada. His research interests are mainly in the areas of big data, cloud computing, green communication and computing, wireless networks, and cyber-physical systems. He serves as an Associate Editor of IEEE TETC and IEEE TGCN. Yan Zhang (yanzhang@ieee.org) is a professor in the Department of Informatics, University of Oslo, Norway. He is also a chief research scientist at Simula Research Laboratory, Norway. He is an Associate Technical Editor of IEEE Communications Magazine, and an Editor of IEEE Transactions on Green Communications and Networking and IEEE Communications Surveys & Tutorials. His current research interests include next-generation wireless networks leading to 5G, and green and secure cyber-physical systems. Laurence T. Yang (ltyang@stfx.ca) is a professor in the Department of Computer Science, St. Francis Xavier University, Canada. His research interests include parallel and distributed computing, embedded and ubiquitous/pervasive computing, and big data. His research has been supported by the National Sciences and Engineering Research Council and the Canada Foundation for Innovation. 3
Multi-Method Data Delivery for Green Sensor-Cloud
Green Communications and Computing Multi-Method Data Delivery for Green Sensor-Cloud Chunsheng Zhu, Victor C. M. Leung, Kun Wang, Laurence T. Yang, and Yan Zhang The authors discuss the potential applications
More informationCall for Papers for Communication QoS, Reliability and Modeling Symposium
Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end
More informationCollaborative Next Generation Networking
CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing
More informationFunded Project Final Survey Report
Funded Project Final Survey Report Principal Investigator: Prof Andrea Goldsmith Project Title: Wireless Sensor Networks Technology for Smart Buildings 1. Project Description: This project sets forth a
More informationTrust4All: a Trustworthy Middleware Platform for Component Software
Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop
More informationSoftware Defined Networking for Flexible and Green Energy Internet
Integrated Communications, Control, and Computing Technologies for Enabling Autonomous Smart Grid Software Defined Networking for Flexible and Green Energy Internet Weifeng Zhong, Rong Yu, Shengli Xie,
More informationEEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks
EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks M.Sudha 1, J.Sundararajan 2, M.Maheswari 3 Assistant Professor, ECE, Paavai Engineering College, Namakkal, Tamilnadu, India 1 Principal,
More informationSleep Scheduling Technique for Geographic Routing in MANET
Sleep Scheduling Technique for Geographic Routing in MANET Asha L Nair 1, Dr S.Perumal Sankar 2 PG Student [WT], Dept. of ECE, TocH Institute of Science and Technology, Kochi, Kerala, India 1 Professor,
More informationA Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things
A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things Xuchao Chang, Chunhong Zhang, Li Sun Beijing University of Posts and Telecommunications, Beijing, 100876, China E-mail:
More informationMohamed Mahmoud Mahmoud Azab. Education: Ongoing research:
Mohamed Mahmoud Mahmoud Azab -Assistant Prof., Informatics Research Institute, The City of Scientific Research & Technology Applications, Alexandria-Egypt. - Researcher, VT-MENA research center of Excellence,
More informationImpact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN
Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing
More informationService-Oriented Advanced Metering Infrastructure for Smart Grids
Journal of Energy and Power Engineering 5 (2011) 455-460 Service-Oriented Advanced Metering Infrastructure for Smart Grids S. Chen 1, J.J. Lukkien 1 and L. Zhang 2 1. Department of Mathematics and Computer
More informationEnsuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks
Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,
More informationScheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network
International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge
More informationSECURE AND ROBUST ENERGY-EFFICIENT AND RELIABLE ROUTING FOR MULTI HOP NETWORKS USING WIRELESS SENSOR NETWORKS
SECURE AND ROBUST ENERGY-EFFICIENT AND RELIABLE ROUTING FOR MULTI HOP NETWORKS USING WIRELESS SENSOR NETWORKS Sridevi H K 1, Praveen K B 2 1M.Tech student, Department of Telecommunication Engineering,
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
More informationPRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS
PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationAnalysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN
Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationEnergy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network
Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network G.Premalatha 1, T.K.P.Rajagopal 2 Computer Science and Engineering Department, Kathir College of Engineering
More informationMitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 1 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0005 Mitigating Hot Spot Problems
More informationUdaipur, Rajasthan, India. University, Udaipur, Rajasthan, India
ROLE OF NETWORK VIRTUALIZATION IN CLOUD COMPUTING AND NETWORK CONVERGENCE 1 SHAIKH ABDUL AZEEM, 2 SATYENDRA KUMAR SHARMA 1 Research Scholar, Department of Computer Science, Pacific Academy of Higher Education
More informationA Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid
A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid Yijia Cao Hunan University, China 2014-10 10-21 OUTLINE 1 IOT Application in Smart Grid 2 3 Requirements for Communication
More informationL2 - Internet of Things
UNIK4750 - Measurable Security for the Internet of Things L2 - Internet of Things György Kálmán, UiO/NTNU/mnemonic gyorgy.kalman@its.uio.no Josef Noll UiO/UNIK josef.noll@its.uio.no http://cwi.unik.no/wiki/unik4750,
More informationModeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review
Modeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review R. Sinde Nelson Mandela African Institution of Science and Technology School of
More informationVol. 2 Issue III, March 2014
Literature survey of network reconstruction, reconfiguration & QOS optimization approach in case of link failure in existing SSA protocol in Mobile Ad-Hoc Network Vikas Deswal (Student), M.Tech (CSE),
More informationA PROPOSAL FOR IMPROVE THE LIFE- TIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFE- TIME OF WIRELESS SENSOR NETWORK ABSTRACT Tran Cong Hung1 and Nguyen Hong Quan2 1Post & Telecommunications Institute of Technology, Vietnam 2University of Science, Ho Chi
More informationApplication of Redundant Backup Technology in Network Security
2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Application of Redundant Backup Technology in Network Security Shuwen Deng1, Siping Hu*, 1, Dianhua Wang1, Limin
More informationIntra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network
Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College
More informationA Study on Traffic Aware Routing Protocol for Wireless Sensor Networks
A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks Gopi.T 1, Santhi.B 2 School of computing, SASTRA University Tirumalaisamudram, Thanjavur, Tamilnadu, India. 1 gopi_fgh@yahoo.co.in
More informationMobile Edge Computing and Networking for Green and Low-Latency Internet of Things
ACHIEVING ENERGY EFFICIENCY AND SUSTAINABILITY IN EDGE/FOG DEPLOYMENT Mobile Edge Computing and Networking for Green and Low-Latency Internet of Things Ke Zhang, Supeng Leng, Yejun He, Sabita Maharjan,
More informationData-Driven Computing and Caching in 5G Networks: Architecture and Delay Analysis
WIRELESS BIG DATA: TECHNOLOGIES AND APPLICATIONS Data-Driven Computing and Caching in 5G Networks: Architecture and Delay Analysis Min Chen, Yongfeng Qian, Yixue Hao, Yong Li, and Jeungeun Song Abstract
More informationAn Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.934
More informationCLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS
http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationAn Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs
An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,
More informationFeaturing Trust and Reputation Management Systems for Constrained Hardware Devices*
Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Rodrigo Román, M. Carmen Fernández-Gago, Javier López University of Málaga, Spain *(Wireless Sensor Networks) Contents
More informationFramework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm
Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Huiqi Zhao 1,2,3, Yinglong Wang 2,3*, Minglei Shu 2,3 1 Department of Information
More informationConstruction Scheme for Cloud Platform of NSFC Information System
, pp.200-204 http://dx.doi.org/10.14257/astl.2016.138.40 Construction Scheme for Cloud Platform of NSFC Information System Jianjun Li 1, Jin Wang 1, Yuhui Zheng 2 1 Information Center, National Natural
More informationContext-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions
Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions Siran Pavankumar(149344152) siranpavankumar@gmail.com Computer Science Department Seoul National
More informationService-Oriented Middleware for Smart Grid: Principle, Infrastructure, and Application
ULTIMATE TECHNOLOGIES AND ADVANCES FOR FUTURE SMART GRID UTASG Service-Oriented Middleware for Smart Grid: Principle, Infrastructure, and Application Liang Zhou, Nanjing University of Posts and Telecommunications
More informationAn Industrial Employee Development Application Protocol Using Wireless Sensor Networks
RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni
More informationModernizing the Grid for a Low-Carbon Future. Dr. Bryan Hannegan Associate Laboratory Director
Modernizing the Grid for a Low-Carbon Future Dr. Bryan Hannegan Associate Laboratory Director Aspen Energy Policy Forum July 5, 2016 40 YEARS OF CLEAN ENERGY RESEARCH Founded as Solar Energy Research Institute
More informationEffective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report
Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini
More informationFinding Optimal Tour Length of Mobile Agent in Wireless Sensor Network
Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network Anil Kumar Mahto anil.fiem16@gmail.com Ajay Prasad Department
More informationCOMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS
COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS Saraswati Mishra 1 and Prabhjot Kaur 2 Department of Electrical, Electronics and Communication Engineering,
More informationISSN: [Powar * et al., 7(6): June, 2018] Impact Factor: 5.164
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY ROUTING TECHNIQUES FOR ENERGY EFFICIENT PROTOCOL OF UNDERWATER WIRELESS SENSOR NETWORK (UWSN) IN THE INTERNET OF UNDERWATER THINGS
More informationCOMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY
COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY UNIVERSITY OF DIGITAL REVOLUTION. Fourth industrial revolution is upon us and you can be part of
More informationA Survey on Resource Allocation policies in Mobile ad-hoc Computational Network
A Survey on policies in Mobile ad-hoc Computational S. Kamble 1, A. Savyanavar 2 1PG Scholar, Department of Computer Engineering, MIT College of Engineering, Pune, Maharashtra, India 2Associate Professor,
More informationThe quality of any business or industrial process outcomes depend upon three major foundations:
Ensuring Quality in an Internet of Things Messages between devices, or to/from humans benefits from structure. Version 4, February 5, 2018 Prepared by Michael Scofield, M.B.A. Synopsis... 1 What is the
More informationEnhancing Security With SQL Server How to balance the risks and rewards of using big data
Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company
More informationKeywords: Cloud computing, ZigBee, Smart home, Security cloud
2016 International Conference on Information Engineering and Communications Technology (IECT 2016) ISBN: 978-1-60595-375-5 Design of the Smart-home Security System based on Cloud Computing Yan Wang 1,a,
More informationTowards a Search-based Interactive Configuration of Cyber Physical. System Product Lines 1
Towards a Search-based Interactive Configuration of Cyber Physical System Product Lines Kunming Nie, Tao Yue, Shaukat Ali Software Engineering Institute, Beihang University, Beijing, China niekunming@cse.buaa.edu.cn
More informationA Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang
A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts
More informationMobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm
Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111
More informationQoS-Enabled Video Streaming in Wireless Sensor Networks
QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical
More informationEvaluation of Communication Overheads in Wireless Sensor Networks
Evaluation of Communication Overheads in Wireless Sensor Networks Shiv Prasad Kori 1, Dr. R. K. Baghel 2 1 Deptt. of ECE, JIJA Mata Govt. Women Polytechnic College, Burhanpur (MP)- INDIA 2 Electronics
More informationDynamic Design of Cellular Wireless Networks via Self Organizing Mechanism
Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing
More informationDetection of Vampire Attack in Wireless Adhoc
Detection of Vampire Attack in Wireless Adhoc Network Ankita Shrivastava 1 ; Rakesh Verma 2 Master of Engineering Research Scholar, Medi-caps Institute of Technology and Management 1 ; Asst. Professor,
More informationEnergy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2
Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,
More informationCybersecurity ecosystem and TDL Antonio F. Skarmeta
Cybersecurity ecosystem and TDL Antonio F. Skarmeta University of Murcia (UMU) SPAIN CyberSecurity Challenges in a fully connected World Trust Framework 1. Policies for trust in heterogeneous
More informationA QoE Friendly Rate Adaptation Method for DASH
A QoE Friendly Rate Adaptation Method for DASH Yuming Cao 1,3, Xiaoquan You 2,3, Jia Wang 1,3, Li Song 1,3 1 Institute of Image Communication and Network Engineering, Shanghai Jiao Tong University 2 Communication
More informationEnd-To-End Delay Optimization in Wireless Sensor Network (WSN)
Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationInternational Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN
International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization
More informationPreFeed: Cloud-Based Content Prefetching of Feed Subscriptions for Mobile Users. Xiaofei Wang and Min Chen Speaker: 饒展榕
PreFeed: Cloud-Based Content Prefetching of Feed Subscriptions for Mobile Users Xiaofei Wang and Min Chen Speaker: 饒展榕 Outline INTRODUCTION RELATED WORK PREFEED FRAMEWORK SOCIAL RSS SHARING OPTIMIZATION
More informationAn Adaptive and Optimal Distributed Clustering for Wireless Sensor
An Adaptive and Optimal Distributed Clustering for Wireless Sensor M. Senthil Kumaran, R. Haripriya 2, R.Nithya 3, Vijitha ananthi 4 Asst. Professor, Faculty of CSE, SCSVMV University, Kanchipuram. 2,
More informationQUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose
QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,
More informationAnalysis and Implementation Wireless Sensor Network of Information Technology Systems
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 3 (March 2017), PP.69-73 Analysis and Implementation Wireless Sensor Network
More informationA Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks
International Journal of Engineering and Technical Research (IJETR) A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks Ms. Arati Phadtare,
More informationWeVe: When Smart Wearables Meet Intelligent Vehicles
WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet
More informationStudy of Smart Home System based on Zigbee Wireless Sensor System. Jie Huang 1
2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Study of Smart Home System based on Zigbee Wireless Sensor System Jie Huang 1 1 College of Mechanical and Electronic
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More informationAggregation on the Fly: Reducing Traffic for Big Data in the Cloud
Aggregation on the Fly: Reducing Traffic for Big Data in the Cloud Huan Ke, Peng Li, Song Guo, and Ivan Stojmenovic Abstract As a leading framework for processing and analyzing big data, MapReduce is leveraged
More informationA Brief Introduction to CFINS
A Brief Introduction to CFINS Center for Intelligent and Networked Systems (CFINS) Department of Automation Tsinghua University Beijing 100084, China 6/30/2016 1 Outline Mission People Professors Students
More informationTowards offering more useful data reliably to mobile cloudfrom wireless sensor network
Towards offering more useful data reliably to mobile cloudfrom wireless sensor network Article (Accepted Version) Zhu, Chunsheng, Sheng, Zhengguo, Leung, Victor C M, Shu, Lei and Yang, Laurence T (2015)
More informationIEEE networking projects
IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationINTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT
MOBILE OFFLOADING USING POWER BASED DECISION IN WIRELESS COMMUNICATION M.Nivethamani 1*, Soma Prathinha 2 1* PG Scholar, Student Member, IEEE, Sri Sairam Engineering College, Chennai 2 Associate Professor,
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 286 A SURVEY ON FACTORS EFFECTING ENERGY CONSUMPTION IN MANET Pooja Ph.D Scholar, Department of Computer Science
More informationNovel Cluster Based Routing Protocol in Wireless Sensor Networks
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer
More informationJournal of Electronics and Communication Engineering & Technology (JECET)
Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X
More informationResearch on Control Routing Technology in Communication Network
Appl. Math. Inf. Sci. 6 No. 1S pp. 129S-133S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Research on Control Routing Technology
More informationA Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks
Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission
More informationComparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation
Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation Paramvir Kaur * Sukhwinder Sharma # * M.Tech in CSE with specializationl in E-Security, BBSBEC,Fatehgarh sahib,
More informationImprovement of Buffer Scheme for Delay Tolerant Networks
Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science
More informationA Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk
More informationWIRELESS Multimedia Sensor Networks (WMSNs) is a
INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 279-283 Manuscript received October 9, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0037 Energy-Efficient Routing Based
More informationInformation Retrieval System Based on Context-aware in Internet of Things. Ma Junhong 1, a *
Information Retrieval System Based on Context-aware in Internet of Things Ma Junhong 1, a * 1 Xi an International University, Shaanxi, China, 710000 a sufeiya913@qq.com Keywords: Context-aware computing,
More informationA Composite Trust based Public Key Management in MANETs
USMA 6 th Network Science Workshop April 23, 2012 West Point, NY U.S. Army Research, Development and Engineering Command A Composite Trust based Public Key Management in MANETs Jin-Hee Cho and Kevin Chan
More informationSELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC Su Man Nam and Tae Ho Cho College of Information and Communication Engineering,
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More informationResearch on Relative Coordinate Localization of Nodes Based on Topology Control
Journal of Information Hiding and Multimedia Signal Processing c 2018 ISSN 2073-4212 Ubiquitous International Volume 9, Number 2, March 2018 Research on Relative Coordinate Localization of Nodes Based
More informationADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT
ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision
More informationFast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services
Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Jina Han Department of Information and Computer Engineering Ajou University Suwon, South Korea hangn0808@ajou.ac.kr
More informationShu, Lei; Wu, Chun; Hauswirth, Manfred
Provided by the author(s) and NUI Galway in accordance with publisher policies. Please cite the published version when available. Title NetTopo: Beyond Simulator and Visualizer for Wireless Sensor Networks
More informationVertical Handover in Vehicular Ad-hoc Networks A Survey
Vertical Handover in Vehicular Ad-hoc Networks A Survey U. Kumaran Department of computer Applications Noorul Islam Center for Higher Education, Kumaracoil,Tamilnadu, India. Abstract- Vehicular Ad-hoc
More information