Advancement and flourishment in mobile edge computing (MEC) have motivated the farmers to deploy an efficient ecosystem in their farms. For further real-time monitoring and surveillance of the environment along with t...
详细信息
Advancement and flourishment in mobile edge computing (MEC) have motivated the farmers to deploy an efficient ecosystem in their farms. For further real-time monitoring and surveillance of the environment along with the deployment of intelligent farming, digital twin is considered as one of the emerging and most promising technologies. For proper optimization and utilization of physical systems, the physical components of the ecosystems are connected with the digital space. Further, the smart technologies and devices have convinced to address the expected level of requirements for accessing the rapid growth in farming associated with digital twins. However, with a large number of smart devices, huge amount of generated information from heterogeneous devices may increase the privacy and security concern by challenging the interrupting operations and management of services in smart farming. In addition, the growing risks associated with MEC by modifying the sensor readings and quality of service further affect the overall growth of intelligent farming. In order to resolve these challenges, this paper has proposed a secure surveillance architecture to detect deviations by incorporating digital twins in the ecosystem. Further, for real-time monitoring and preprocessing of information, we have integrated a four-dimensional trust mechanism along with blockchain. The four-dimensional trusted method recognizes the behavior of each communicating device during the transmission of information in the network. Further, blockchain strengthens the surveillance process of each device behavior by continuously monitoring their activities. The proposed mechanism is tested and verified against various abnormalities received from sensors by simulating false use cases in the ecosystem and compared against various security metrics over existing approaches. Furthermore, the proposed mechanism is validated against several security threats such as control command threat, coordinated cyber th
Cloud computing is the development drift of the IT industry. This modern cloud computing has grabbed remarkable attention in recent days owing to its high-quality on-demand service accessibility and flexible nature. I...
详细信息
ISBN:
(纸本)9789819780501;9789819780518
Cloud computing is the development drift of the IT industry. This modern cloud computing has grabbed remarkable attention in recent days owing to its high-quality on-demand service accessibility and flexible nature. It not only has huge advantages but also has numerous security shortcomings that no organization can afford to overlook. The security perspective of cloud computing infrastructure is often viewed to be the prime element, as data and services of the cloud are not confined to a single organization. Therefore, cloud security plays a crucial role to establish trust among the cloud service providers and the multiple cloud service consumers. Subsequently, trust management ensures both security and privacy in the cloud computing infrastructure. However, in the traditional cloud computing infrastructure all the cloud entities once authorized can get access to the cloud services throughout the life cycle of the session. As a result, it is vulnerable to insider attack. Therefore, in this paper, we have proposed a Zero Trust network Access (ZTNA) architecture that intends to continuously verify a cloud entity throughout the lifecycle of the session, regardless of the fact that the entity is inside/outside the cloud computing infrastructure. Further, we have analyzed the security aspects of the proposed architecture that ensure our architecture is well-secured against relevant security attacks.
Traditional network architecture can no longer meet the development needs of technologies such as cloud computing and big data. SDN network architecture has the characteristics of high openness and programmability, wh...
详细信息
This article examines the requirements for informationsecurity in monitoring e-government systems. It discusses the informationsecurity framework for eGoverment system, a model for organizing multi-level network sec...
详细信息
The application of big data in the cloud computing environment has become more and more common. The advantage of big data is another leap in the role of modern computer technology. The interpretation of big data, data...
详细信息
As edge computing becomes an increasingly important computing model, trust management and security issues are becoming more severe. Problems such as malicious node attacks and trust isolation pose threats to the secur...
详细信息
In the development of China's power Internet construction, in order to better meet the characteristics of network transportation, the key technology to the edge computing framework as the core has been highly valu...
详细信息
As is widely recognized, a prevalent term in the realm of information Technology (IT) these days is the Internet of Things (IoT). IoT is a revolutionary paradigm in the world of networks which primarily focuses on sha...
详细信息
ISBN:
(纸本)9783031751691;9783031751707
As is widely recognized, a prevalent term in the realm of information Technology (IT) these days is the Internet of Things (IoT). IoT is a revolutionary paradigm in the world of networks which primarily focuses on sharing information through 'Things'. The 'Things' refer to the devices or objects that usually communicate with each other over the IP network. The crucial component of an IoT network that determines the path is routing. In this paper, the simulation was accomplished by creating a network in NetSim Simulator. A dataset of smoke detection using IoT sensors was taken into consideration by accessing it from Kaggle for routing purposes. IoT network designed in NetSim, comprised of 13 sensor nodes, a 6LoWPAN Gateway, a router, and a server. An application was configured for each sensor to periodically generate packets and forward them to the server via the 6LoWPAN Gateway.
This paper is based on artificial intelligence environment, combined with artificial neural network to quantify the evaluation index. By connecting the number of nodes to determine the input signal dimension to, from ...
详细信息
With the progress of information technology recently, mobile communication system edge computing (EC) has been widely used in all walks of life, but the traditional mobile communication system EC mode has security pro...
详细信息
With the progress of information technology recently, mobile communication system edge computing (EC) has been widely used in all walks of life, but the traditional mobile communication system EC mode has security problems such as privacy disclosure, malicious tampering, and virus attacks. Computer algorithms has brought new vitality to EC in mobile communication systems. This paper analyzed the application of computer algorithm in EC mode of mobile communication system, and selected 20 users as the research object. This paper adopted traditional computing mode (such as cloud computing) and computer algorithm-based mobile communication system EC security research. This text compared the effects of two modes on security performance, data transmission efficiency, energy consumption, cost savings, and user satisfaction. The experimental results in this paper showed that the average security of EC mode of mobile communication system based on computer algorithm was 84%, and the average data transmission time was 4.8s. The energy consumption was 40%, and the cost savings and user satisfaction were 432,000 yuan and 13 points, respectively. Both were superior to the traditional edge counting mode. The EC mode of mobile communication system using computer algorithms can significantly improve the security of mobile communication, data transmission speed, cost savings, user satisfaction, and reduce energy consumption. This model has important significance and value for social development.
暂无评论