Wireless sensor networks (WSNs) play an important role in the internet of things (IoT). these are networks of sensor nodes that are clustered to collect and exchange locally sensed data. In each cluster, a cluster hea...
详细信息
ISBN:
(纸本)9798350384826;9798350384819
Wireless sensor networks (WSNs) play an important role in the internet of things (IoT). these are networks of sensor nodes that are clustered to collect and exchange locally sensed data. In each cluster, a cluster head (CH) gathers data from its cluster members, aggregates it, and sends it to the sink node. To serve IoT applications, the sink node then shares this data withthe other CHs. Nevertheless, clustering a massive collection of sensor nodes is challenging. this is because these sensor nodes have limited energy resources and are distributed over a vast area. Recently, High Altitude Platform Stations (HAPS) have been shown to improve the connectivity in WSNs by serving as non-terrestrial sink nodes. the quasi-stationary nature of these non-terrestrial platforms can offer vast geographical coverage, and thus, improve WSNs' transmission reliability. this paper proposes HAPS-greedy clustering (HAPS-GC) of WSNs to support massive IoT applications. In contrast to existing HAPS-based WSN clustering schemes, HAPS-GC considers not only the connectivity between sensor nodes within each cluster but also their connectivity with HAPS. Simulation results show that the proposed HAPS-GC approach can significantly increase the WSN throughput while maintaining WSN energy consumption similar to the existing HAPS-based WSN clustering schemes and a scenario, where a terrestrial sink node is used.
the exponential growth of the number of internet of things (IoT) devices is placing significant strain on traditional wireless communication networks, particularly in terms of bandwidth, latency, and energy consumptio...
详细信息
As the internet plays an increasingly vital role in our daily lives, the threat of denial of service (DoS) attacks continues to loom, posing significant challenges to network security. Withthe proliferation of intern...
详细信息
As the internet plays an increasingly vital role in our daily lives, the threat of denial of service (DoS) attacks continues to loom, posing significant challenges to network security. Withthe proliferation of internet-of-things (IoT) devices, including those in the healthcare sector (IoMT), the need to secure these networks becomes even more critical. the emergence of Mobile Edge computing (MEC) servers has shifted the focus toward processing data near the network edge to alleviate network congestion. However, a new form of DoS attack, known as the crossfire attack, presents a complex challenge as it is difficult to detect and can have devastating effects on networks. While Software Defined Networks (SDNs) offer promise in mitigating DoS attacks, they also introduce vulnerabilities of their own. this paper explores the current landscape of IoT, IoMT, DoS attacks, and crossfire attacks. It discusses existing defense strategies and proposes a defense mechanism that leverages packet header inspection to differentiate between adversarial and benign packets. the paper concludes withthe execution of a crossfire attack in a Mininet environment withthe RYU SDN controller, highlighting the need for multiple approaches to protect critical servers in the face of persistent DDoS attacks.
this chapter examines the various applications, challenges, and future prospects of internet of things (IoT) technology from the perspective of Indian agriculture. It focuses on several key areas including smart irrig...
详细信息
distributed networks have gained increasing popularity due to their high reliability, resource-sharing convenience, and ample bandwidth. distributed networks play a pivotal role in enabling a wide range of application...
详细信息
ISBN:
(纸本)9798400717857
distributed networks have gained increasing popularity due to their high reliability, resource-sharing convenience, and ample bandwidth. distributed networks play a pivotal role in enabling a wide range of applications, including wireless sensor networks, cloud computing, social networks, and mobile ad hoc networks. Nevertheless, security and privacy concerns have consistently posed obstacles to the development of distributed networks. Trust management is an effective method for addressing these challenges. However, dealing withthe uncertainty of trust has always been a challenging academic problem. Currently, many researchers are devoted to finding solutions within uncertainty theories, and one of the most prominent approaches is fuzzy logic. Fuzzy logic permits "imprecise" expression and reasoning that align with human thinking. In this paper, a review of fuzzy-based trust management in distributed networks is conducted. First, applications and uncertainty of trust are introduced. then, the reasons why fuzzy logic is suitable for trust modeling are analyzed, and a classification method is proposed. Finally, an analysis of current research is presented to inspire further studies of researchers.
Multi-Access Edge computing (MEC) has become a key paradigm in contemporary network topologies due to the spread of internet of things (IoT) devices and the growing need for low-latency, high-performance applications....
详细信息
Modern battlefields are experiencing an increased dependency on smart devices that can sense, process, and communicate data, also known as the Military internet of things (MIoT) architecture. While MIoT supports and e...
详细信息
the internet of things (IoT) has got various applications in today's life. In IoT there is central server through which information and data passed between the connected devices. this will create many security and...
详细信息
ISBN:
(纸本)9798350398441
the internet of things (IoT) has got various applications in today's life. In IoT there is central server through which information and data passed between the connected devices. this will create many security and privacy issues. Phishing attack, Denial of service attack, false authentication etc are some of the security issues in IoT systems. To solve these issues, central server can be eliminated and technology like Blockchain, where there is no central authority can be adopted. In this paper various use cases of IoT and Blockchain are studied. IoT is vulnerable to many attacks. these vulnerabilities are studied and how blockchain technology and IoT can be integrated to enhance security are also discussed
the advancements of smart grid embedded internet of things for monitor, control and collection of energy data from smart meter to data aggregator points. In this aspect two-way smart meter current challenges of data p...
详细信息
Withthe rapid advancement of artificial intelligence, chips have become increasingly important. the emerging RISC-V instruction set gradually provides powerful computing support for this field. In this context, along...
详细信息
暂无评论