Design of Energy Efficient and Secure Algorithms for Sensor Cloud

Design of Energy Efficient and Secure Algorithms for Sensor Cloud
Title Design of Energy Efficient and Secure Algorithms for Sensor Cloud PDF eBook
Author Rajendra Kumar Dwivedi
Publisher Rajendra Kumar Dwivedi
Pages 0
Release 2022-11-20
Genre
ISBN 9781805458425

Download Design of Energy Efficient and Secure Algorithms for Sensor Cloud Book in PDF, Epub and Kindle

Sensor cloud is an integration of sensor networks with the cloud to offer a variety of services to the end-users. Applications of this architecture can be seen in various fields such as healthcare information systems, forest fire monitoring systems, smart city, and other Internet-of-Things (IoT) applications. This technology is based on sensor networks; so, energy efficiency becomes one of the prime concerns. The sensed data that are stored in the cloud for further processing in order to get some insights are crucial in many applications; so, security also becomes another important challenge. This motivated us to design some energy-efficient and secure algorithms for the sensor cloud. Security can be implemented in many ways viz., access control, outlier detection, and security against various attacks. In the thesis, we are targeting access control and outlier detection to implement security concerns. We designed one scheme for energy efficiency, one for access control, and two for outlier detection using different approaches. Chapter 3 proposes an energy efficient and fault tolerant scheme for sensor cloud. Wireless Sensor Networks (WSN) find several applications in hard-to-reach areas. As sensors have limited battery power, so, many energy-aware protocols based on negotiation, clustering, and agents have been developed to increase the lifetime of the network. This thesis finds limitations with some multi-agent-based protocols as they place the sink node at the center of the monitoring region which is quite difficult in hard-toreach areas. Therefore, a multi-agent-based energy and fault aware protocol for hard-toreach territories (MAHT) is proposed which uses the technique of Impact Factor to identify a central node with high power capability and dynamic itinerary planning is done to make the protocol fault-tolerant. Its agent migration technique results in improvement of energy efficiency, task completion time, and network lifetime. MAHT is simulated using Castalia simulator, and the impact of payload size, network size, node failures, etc on various performance metrics is analyzed. The proposed protocol outperforms the existing schemes viz., Tree Based Itinerary Design (TBID) and Multiple Mobile Agents with Dynamic Itineraries based Data Dissemination (MMADIDD).

Intelligent Internet of Things

Intelligent Internet of Things
Title Intelligent Internet of Things PDF eBook
Author Farshad Firouzi
Publisher Springer Nature
Pages 647
Release 2020-01-21
Genre Technology & Engineering
ISBN 3030303675

Download Intelligent Internet of Things Book in PDF, Epub and Kindle

This holistic book is an invaluable reference for addressing various practical challenges in architecting and engineering Intelligent IoT and eHealth solutions for industry practitioners, academic and researchers, as well as for engineers involved in product development. The first part provides a comprehensive guide to fundamentals, applications, challenges, technical and economic benefits, and promises of the Internet of Things using examples of real-world applications. It also addresses all important aspects of designing and engineering cutting-edge IoT solutions using a cross-layer approach from device to fog, and cloud covering standards, protocols, design principles, reference architectures, as well as all the underlying technologies, pillars, and components such as embedded systems, network, cloud computing, data storage, data processing, big data analytics, machine learning, distributed ledger technologies, and security. In addition, it discusses the effects of Intelligent IoT, which are reflected in new business models and digital transformation. The second part provides an insightful guide to the design and deployment of IoT solutions for smart healthcare as one of the most important applications of IoT. Therefore, the second part targets smart healthcare-wearable sensors, body area sensors, advanced pervasive healthcare systems, and big data analytics that are aimed at providing connected health interventions to individuals for healthier lifestyles.

Green Computing in Network Security

Green Computing in Network Security
Title Green Computing in Network Security PDF eBook
Author Deepak Kumar Sharma
Publisher CRC Press
Pages 187
Release 2022-01-10
Genre Computers
ISBN 100051191X

Download Green Computing in Network Security Book in PDF, Epub and Kindle

This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.

Security in IoT-Enabled Spaces

Security in IoT-Enabled Spaces
Title Security in IoT-Enabled Spaces PDF eBook
Author Fadi Al-Turjman
Publisher CRC Press
Pages 287
Release 2019-02-07
Genre Computers
ISBN 0429629818

Download Security in IoT-Enabled Spaces Book in PDF, Epub and Kindle

Security and smart spaces are among the most significant topics in IoT nowadays. The implementation of secured smart spaces is at the heart of this concept, and its development is a key issue in the next generation IoT. This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud and IoT applications. The book focuses on both the design and implementation aspects of security models and strategies in smart that are enabled by wireless sensor networks and RFID systems. It mainly examines seamless data access approaches and encryption and decryption aspects in reliable IoT systems.

Energy-Efficient Algorithms and Protocols for Wireless Body Sensor Networks

Energy-Efficient Algorithms and Protocols for Wireless Body Sensor Networks
Title Energy-Efficient Algorithms and Protocols for Wireless Body Sensor Networks PDF eBook
Author Rongrong Zhang
Publisher Springer Nature
Pages 134
Release 2019-08-28
Genre Technology & Engineering
ISBN 3030285804

Download Energy-Efficient Algorithms and Protocols for Wireless Body Sensor Networks Book in PDF, Epub and Kindle

This book provides a systematic treatment of the theoretical foundation and algorithmic tools necessary in the design of energy-efficient algorithms and protocols in wireless body sensor networks (WBSNs). These problems addressed in the book are of both fundamental and practical importance. Specifically, the book delivers a comprehensive treatment on the following problems ranging from theoretical modeling and analysis, to practical algorithm design and optimization: energy-efficient clustering-based leader election algorithms in WBSNs; MAC protocol for duty-cycling WBSNs with concurrent traffic; multi-channel broadcast algorithms in duty-cycling WBSNs; and energy-efficient sleep scheduling algorithms in WBSNs. Target readers of the book are researchers and advanced-level engineering students interested in acquiring in-depth knowledge on the topic and on WBSNs and their applications, both from theoretical and engineering perspective.

Clustering and Routing Algorithms for Wireless Sensor Networks

Clustering and Routing Algorithms for Wireless Sensor Networks
Title Clustering and Routing Algorithms for Wireless Sensor Networks PDF eBook
Author Pratyay Kuila
Publisher CRC Press
Pages 273
Release 2017-09-22
Genre Technology & Engineering
ISBN 1351648705

Download Clustering and Routing Algorithms for Wireless Sensor Networks Book in PDF, Epub and Kindle

Wireless Sensor Networks have a wide range of applications in different areas. Their main constraint is the limited and irreplaceable power source of the sensor nodes. In many applications, energy conservation of the sensor nodes and their replacement or replenishment due to the hostile nature of the environment is the most challenging issue. Energy efficient clustering and routing are the two main important topics studied extensively for this purpose. This book focuses on the energy efficient clustering and routing with a great emphasis on the evolutionary approaches. It provides a comprehensive and systematic introduction of the fundamentals of WSNs, major issues and effective solutions.

Security Designs for the Cloud, IoT, and Social Networking

Security Designs for the Cloud, IoT, and Social Networking
Title Security Designs for the Cloud, IoT, and Social Networking PDF eBook
Author Dac-Nhuong Le
Publisher John Wiley & Sons
Pages 296
Release 2019-11-05
Genre Computers
ISBN 1119592267

Download Security Designs for the Cloud, IoT, and Social Networking Book in PDF, Epub and Kindle

Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media.