A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sarathambekai, S.
- A Study about Security Issues and its Solution Directives in Distributed Systems
Authors
Source
Artificial Intelligent Systems and Machine Learning, Vol 10, No 10 (2018), Pagination: 212-215Abstract
A research issue in distributed systems is the development of secured and trusted systems in the distributed environment. Several approaches like authentication based approaches, development of trust based models, access control based approaches etc, such security aspects of the distributed systems have been discussed. Apart from this, many research lines about secure distributed systems like study about security issues associated with its respective solution directives to circumvent those issues in distributed systems have been discussed. Finally the security issues and the solutions are summarized.
Keywords
Distributed System Security, Cryptography, Quorum, Authentication, Mobile Agent.- Security Issues in Wireless Sensor Network and Healthcare Related Applications
Authors
1 Department of Information Technology, PSG College of Technology, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 10, No 10 (2018), Pagination: 192-195Abstract
Sensors play a major role in today’s world. They play a tremendous role in all the gadgets we use today. Earlier sensors were used to monitor environmental conditions but now with the recent technological advancements the sensors size has been minimized and its efficiency has been increased greatly and thus becoming a part of human body as well. Sensors play a big role in applications in Internet of Things (IoT) especially in the field of medicine. Nano Sensors are injected into human body and were used to monitor critical areas of human body which are hardly accessible. Security is one important measures while transmission of data in Wireless Sensor Communication (WSN). Sensors are prone to a lot of threats and hacks. In Healthcare, data security has to be taken into consideration while transmission of medical data. Some of the security issues related to WSN and security in healthcare applications are dealt in this paper.
Keywords
WSN, WBAN, WPAN, IoT, Network Security, Healthcare.References
- Patel MM, Aggarwal A (2016) “Two phase wormhole detection approach for dynamic wireless sensor networks”, in Wireless Communications Signal Processing and Networking (Wisp NET), International Conference on IEEE, 2016.
- Krishnan NS, Srinivasan P “A QOS parameter based solution for black hole denial of service attack in wireless sensor networks”, Indian J Sci Technol 9: 38, (2016).
- Healy M, Newe T, Lewis E Security for wireless sensor networks: A review in Sensors Applications Symposium (SAS), 2009 IEEE pp: 80-85, (2009).
- Pathan KSA, Lee WH, Hong SC Security in wireless sensor networks:
- Issues and Challenges in Advanced Communication Technology (ICACT), 8th International Conference on IEEE 2: 6, 2006.
- Verma. "Challenges in wireless sensor networks with different performance metrics in routing protocols." In Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 4th International Conference on, IEEE, 2015.
- A. Perrig et al., “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, vol. 8, no. 5, Sept. 2002, pp. 521–34.
- Kahina CHELLI, “Security Issues in Wireless Sensor Networks: Attacks and Countermeasures”, Proceedings of the World Congress on Engineering Vol I, 2015.
- Ndibanje Bruce, MangalSain, Hoon Jae Lee, “A Support Middleware Solution for e-Healthcare System Security”, February 16~19, ICACT2014.
- Chol-soon Jang, Deok-Gyu Lee, Jong-wook Han, “A Proposal of Security Framework for Wireless Body Area Network”, International Conference on Security Technology, 2008.
- Z. EsatAnkaral, Qammer H. Abbasi, A.FatihDemir, ErchinSerpedin, Khalid Qaraqe, and HuseyinArslan, “A Comparative Review on the Wireless Implantable Medical Devices Privacy and Security”, In Wireless Mobile Communication and Healthcare (Mobihealth), EAI 4th International Conference on (pp. 246-249). IEEE, 2014.
- Haiping Huang, Member, Tianhe Gong, Ning Ye, Ruchuan Wang, and Yi Dou, “Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System”, IEEE Transactions on Industrial Informatics, Vol. 13, No. 3, June 2017.
- Ronnie D. Caytiles and Sungwon Park, “Securing the Communication Links between u-Healthcare System Components for Protecting Patient Bio-Information”, 8th International Conference on Bio-Science and Bio-Technology, 2015.
- Pardeep Kumar, PawaniPorambage, Mika Ylianttila, Andrei Gurtov, Hoon-Jae Lee, and MangalSain, “Addressing a Secure Session-Key Scheme for Mobility Supported e-Healthcare Systems”, February 16~19, 2014 ICACT2014.
- RuslanDautov and Gill R. Tsouri, “Securing While Sampling in Wireless Body Area Networks with Application to Electrocardiography”, IEEE journal of Biomedical and Health Informatics, vol. 20, no. 1, Jan 2016.
- Anass RGHIOUI, Aziza L’AARJE, Fatiha ELOUAAI, Mohammed BOUHORMA, “The Internet of Things for Healthcare Monitoring: Security Review and Proposed Solution”, IEEE, 2014.
- Ahmad Salehi S.,yM.A. Razzaque, Inmaculada Tomeo-Reyes, Nasir Hussain andzVahid Kaviani, “Efficient High-Rate Key Management Technique for Wireless Body Area Networks”, The 22nd Asia-Pacific Conference on Communications (APCC2016).
- A Survey on Scheduling Tasks in Fog Nodes
Authors
1 Department of Information Technology, PSG College of Technology, Coimbatore, Tamilnadu, IN
Source
Networking and Communication Engineering, Vol 10, No 10 (2018), Pagination: 196-199Abstract
IoT is an emerging technology in recent times. Fog computing is a part of Internet of Things. Fog computing has good business agility, high security, deeper privacy control, lesser operating expenses. Scheduling of task is an importance function in multitasking systems where multiple requests are submitted for processing simultaneously. Various scheduling algorithms are available for ordering the requests in cloud type of storage. But tasks are handles differently in fog computing. Fog nodes are the devices involved in fog computing. The fog computing devices can be used anywhere in the open space with a network establishment without any constraints on environment like cloud servers.
Keywords
Fog Computing, Edge Computing, Embedded Servers, Rank Mechanism, Delay Priority.References
- Pham, X. Q., & Huh, E. N. (2016, October). Towards task scheduling in a cloud-fog computing system. In Network Operations and Management Symposium (APNOMS), 2016 18th Asia-Pacific (pp. 1-4). IEEE.
- Chen, Y. C., Chang, Y. C., Chen, C. H., Lin, Y. S., Chen, J. L., & Chang, Y. Y. (2017, May). Cloud-fog computing for information-centric Internet-of-Things applications. In Applied System Innovation (ICASI), 2017 International Conference on (pp. 637-640). IEEE.
- Hoang, D., & Dang, T. D. (2017, August). FBRC: Optimization of task scheduling in Fog-based Region and Cloud. In Trustcom/BigDataSE/ICESS, 2017 IEEE (pp. 1109-1114). IEEE.
- Liu, Z., Zhang, J., Li, Y., Bai, L., & Ji, Y. (2018). Joint jobs scheduling and lightpath provisioning in fog computing micro datacenter networks. Journal of Optical Communications and Networking, 10(7), B152-B163.
- H. A. M., Oladipo, F. O., & Ariwa, E. (2017, August). 0 In 2017 Seventh International Conference on Innovative Computing Technology (INTECH) (pp. 191-196). IEEE.
- Liu, Q., Wei, Y., Leng, S., & Chen, Y. (2017, October). Task scheduling in fog enabled Internet of Things for smart cities. In Communication Technology (ICCT), 2017 IEEE 17th International Conference on (pp. 975-980). IEEE.
- Abreu, D. P., Velasquez, K., Assis, M. R. M., Bittencourt, L. F., Curado, M., Monteiro, E., & Madeira, E. (2018, August). A Rank Scheduling Mechanism for Fog Environments. In 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 363-369). IEEE.
- Bittencourt, L. F., Diaz-Montes, J., Buyya, R., Rana, O. F., & Parashar, M. (2017). Mobility-aware application scheduling in fog computing. IEEE Cloud Computing, 4(2), 26-35.
- Chen, X., & Wang, L. (2017). Exploring fog computing-based adaptive vehicular data scheduling policies through a compositional formal method—PEPA. IEEE Communications Letters, 21(4), 745-748.
- Zhang, G., Shen, F., Yang, Y., Qian, H., & Yao, W. (2018, May). Fair Task Offloading among Fog Nodes in Fog Computing Networks. In 2018 IEEE International Conference on Communications (ICC) (pp. 1-6). IEEE.
- Yang, Y., Wang, K., Zhang, G., Chen, X., Luo, X., & Zhou, M. T. (2018). MEETS: Maximal Energy Efficient Task Scheduling in Homogeneous Fog Networks. IEEE Internet of Things Journal.
- Fan, J., Wei, X., Wang, T., Lan, T., & Subramaniam, S. (2017, December). Deadline-aware task scheduling in a tiered IoT infrastructure. In GLOBECOM 2017-2017 IEEE Global Communications Conference (pp. 1-7). IEEE.
- Yin, L., Luo, J., & Luo, H. (2018). Tasks scheduling and resource allocation in fog computing based on containers for smart manufacture. IEEE Transactions on Industrial Informatics.
- Chekired, D. A., Khoukhi, L., & Mouftah, H. T. (2018). Industrial IoT Data Scheduling based on Hierarchical Fog Computing: A key for Enabling Smart Factory. IEEE Transactions on Industrial Informatics.
- Rahbari, D., Kabirzadeh, S., & Nickray, M. (2017, December). A security aware scheduling in fog computing by hyper heuristic algorithm. In Intelligent Systems and Signal Processing (ICSPIS), 2017 3rd Iranian Conference on (pp. 87-92). IEEE.