IoT Service Search using MQTT Protocol
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.292-297, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.292297
Abstract
The Internet of Things (IoT) visualize seamlessly connecting the physical objects with the Internet. This in turn combines the physical world into the digital world. There are several mechanisms available that reduces the need for external human intervention for maintaining and configuring deployed. They must be scalable and efficient, since the number of deployed objects is expected to grow exponentially in the next few years. Resource discovery is a problem of finding useful devices and their services in order to accomplish a task, and it constitutes a major challenge for IoT. In this paper a survey on various service discovery mechanisms is performed and an MQTT protocol based IoT service search has been proposed. The proposed work uses a clustering and optimal distribution mechanism on the IoT services to find the optimal distribution value and return the services. Experimental results have shown significant improvement in service discovery time.
Key-Words / Index Term
Internet of Things, MQTT protocol, Resource discovery, Services
References
[1] Charith Perera, Prem Prakash Jayaraman, Arkady Zaslavsky, Dimitrios Georgakopoulos, Peter Christen, “Sensor Discovery and Configuration Framework for the Internet of Things Paradigm”, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[2] Simone Cirani, Luca Davoli, Gianluigi Ferrari, Rémy Léone, Paolo Medagliani, Marco Picone, and Luca Veltri, “A Scalable and Self-Configuring Architecture for Service Discovery in the Internet of Things”, IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014.
[3] Soumya Kanti Datta, Rui Pedro Ferreira Da Costa, Christian Bonnet,” Resource Discovery in Internet of Things: Current Trends and Future Standardization Aspects”, IEEE 2015.
[4] Sabriansyah Rizqika Akbar, Wijaya Kurniawan, Mochammad Hannats Hanafi Ichsan, Issa Arwani, Maystya Tri Handono ,”Pervasive Device and Service Discovery Protocol In XBeeSensor Network”,IEEE 2016.
[5] Pablo Calcina Ccori. Laisa Caroline Costa De Biase Marcelo Knorich Zuffo Fl´avio Soares Corrˆea da Silva,”Device discovery strategies for the IoT”, 2016 IEEE International Symposium on Consumer Electronics.
[6] Stefana Chirila, Camelia Lemnaru and Mihaela Dinsoreanu,”Semantic-based IoT device discovery and recommendation mechanism”, 2016 IEEE.
[7] Juan Li,Nazia Zaman, Honghui Li,”A decentralized Locality-preserving Context-aware Service Discovery Framework for the Internet of Things”,2015 IEEE International Conference on Services Computing.
[8] Elli Rapti, Catherine Houstis, Elias Houstis, Antony Kargeorgos.,”A Bio-inspired Service Discovery and Selection Approach for IoT applications, 2016 IEEE International Conference on Services Computing.
[9] Anne H.Ngu, Marion Gutierrez, Vangelis Metsis, Surya Nepal and Quan Z.Sheng,”IoT Middleware: A survey on Issues and Enabling Technologies”, 2017 IEE Internet of Things Journal, Vol 4, NO.1.
[10] Takashi Ikebe, Hirofumi Noguchi, Naoto Hoshikawa,”Distributed Live Data Search Architecture for Resource Discovery on Internet of Things”, 2016 IEEE.
[11] Pedro R. J. Pêgo, Luís Nunes,”Automatic Discovery and Classifications of IoT Devices”.
[12] Antonio J. Jara, Pablo Lopez, David Fernandez, Jose F. Castillo, Miguel A. Zamora and Antonio F. Skarmeta,”Mobile Digcovery: A Global Service Discovery for the Internet of Things”, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[13] Zhiyuan Li, Rulong Chen, Lu Liu, Geyong Min,” Dynamic Resource Discovery Based on Preference and Movement Pattern Similarity for Large-Scale Social Internet of Things”, IEEE Internet of Things Journal, VOL. 3, NO. 4, AUGUST 2016.
[14] Farzad Khodadadi, Amir Vahid Dastjerdi, Rajkumar Buyya,” Simurgh: A Framework for Effective Discovery, Programming, and Integration of Services Exposed in loT”, 2015 International Conference on Recent Advances in Internet of Things (RioT) Singapore, 7-9 April 2015.
Citation
Nihaala Najeeb, Shelbi Joseph, "IoT Service Search using MQTT Protocol," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.292-297, 2019.
Improved stability and access time Using Different 6T SRAM Cells at Low Voltage
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.298-301, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.298301
Abstract
Contradictory nature of read and write stability and stability with speed necessitates the use of FinFET device which has less statistical variability, sensitivity and more on current. In this work, we explored three different FinFET device structures. These structures are used to form three different 6T SRAM cells. All the simulations are done with the help of Sentaurus TCAD. Three SRAM cells are compared to reduce access time and enhance data stability. We found that ADSE FinFET SRAM achieve significant improvement in access time as compared to Underlap FinFET SRAM cell without degradation of cell stability. On the other hand High-k spacer SRAM cell shows noteworthy increase in stability over other two cells with somewhat slower response.
Key-Words / Index Term
ADSE, FinFET, High-k spacer SRAM, Underlap
References
[1]. Jawar Singh, Saraju P.Mohanty, Dhiraj K. Pradhan, “Robust SRAM Designs and Analysis,” Available at www.springer.com, 2013
[2]. J. J. Kim et al., “Relaxing Conflict Between Read Stability and Writ ability in 6T SRAM Cell Using Asymmetric Transistors,” IEEE EDL, vol. 30, no. 8, pp. 852-854, August 2009.
[3]. V. A. A. Goud et al, “Atomistic Tight-Binding Based Evaluation of Impact of Gate Underlap on Source to Drain Tunneling in 5nm Gate Length Si FinFETs,” IEEE DRC, p. 51,52, June 2013.
[4]. V. Trivedi, J. G. Fossum, and M. M. Chowdhury, “Nanoscale FinFETs with gate–source/drain underlaps,” IEEE Trans. Electron Devices, vol. 52, no. 1, pp. 56–62, Jan. 2005.
[5]. FinFET from Device to Architecture 2014 (online) Available: http://dx.doi.org/10.1155/2014/365689
[6]. Pankaj Kumar Pal, Shivam verma, B.K.kaushik, “Statistical variability and sensitivity Analysis of dual-k spacer FinFET,” IEEE Trans. On electronic devices and solid state circuits, 2015.
[7]. D. Pham, L. Larson, and J.-W. Yang, “FinFET device junction formation Challenges,” in Proc. Int. Workshop Junction Technol., May 2006, pp. 73–77.
[8]. C. R. Manoj and V. R. Rao, “Impact of high-κ gate dielectrics on the device and circuit performance of nanoscale FinFETs,” IEEE Electron Device Lett., vol. 28, no. 4, pp. 295–297, Apr. 2007.
[9]. P.K.Pal, B.K.Kaushik, and S.Dasgupta “Investigation of symmetric dual k spacer trigate FinFET from delay perspective,” IEEE Trans. on Electron Devices,” vol.61, no.11, pp-3579-3585, Nov.2014.
[10]. J.P.colinge, FinFET and Other Multi Gate Transistor, a series on Integrated Circuits and Systems,” Springer.com” August 2007
[11]. Sherif A. Tawfik, Zhiyu Liu, and Volkan Kursun, “ Independent gate and Tied – Gate FinFET SRAM circuits,” IEEE ICM - December 2007.
Citation
Ashish Raturi, Kamlesh Bhatt, "Improved stability and access time Using Different 6T SRAM Cells at Low Voltage," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.298-301, 2019.
A Survey on Iris Recognition System
Survey Paper | Journal Paper
Vol.7 , Issue.7 , pp.302-307, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.302307
Abstract
Biometric identification makes utilization of physical and behavioral traits to recognize an individual. It really is currently a measurable physical feature which is believed far very much reliable and safer than passwords. It authenticates secure access and helps in gaining access to data through fingerprints or DNA which are the biological information of human beings. Many biometric systems have recently been developed and so are being utilized to authenticate the individual identity. Iris recognition systems are being used broadly and have became efficient at individual recognition with high precision and practically perfect coordination. The features extracted from iris of both eye of the same person varies, this helps it to be more secured method of authentication in comparison to other biometric systems. This paper offers a review of different methods and algorithms utilized by different experts and their undertake performance of iris recognition system along with identification of gap for potential work.
Key-Words / Index Term
Biometric Authentication; Iris recognition system; Iris database; Iris recognition review; segmentation; feature extraction; normalization; localization; matching
References
[1] M. Singh and S. K. Sharma, “Review Paper A Review on Implementation of Biometric Iris Recognition,” IJCSE, vol. 6, no. 5, pp. 630–635, 2018.
[2] N. Taneja, M. Shabaz, and V. Khajuria, “Iris Detection Using Segmentation Techniques,” Int. J. Comput. Sci. Eng., vol. 6, no. 9, pp. 442–444, 2018.
[3] J. Daugman, “How Iris Recognition Works,” IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 21–30, Jan. 2004.
[4] A. J. Dixit and K. S. Kazi, “IRIS Recognition by Daugman ‟ s Method,” vol. IV, no. Vii, pp. 90–93, 2015.
[5] K. Hajari, U. Gawande, and Y. Golhar, “Neural Network Approach to Iris Recognition in Noisy Environment,” Phys. Procedia, vol. 78, no. December 2015, pp. 675–682, 2016.
[6] H. Rai and A. Yadav, “Iris recognition using combined support vector machine and Hamming distance approach,” Expert Syst. Appl., vol. 41, no. 2, pp. 588–593, 2014.
[7] A. Nithya and R. Krithiga, “Iris Recognition Based on GLCM and FFT Feature Set Fusion,” Int. J. Pure Appl. Math., vol. 113, no. January, pp. 57–66, 2017.
[8] M. A. Afreen and I. D. Judith, “IRIS Recognition using hybrid Technique , Methods of Moment and K Means Algorithm,” no. February, pp. 2–5, 2018.
[9] O. Kaudki and K. Bhurchandi, “Edge Processing Technique,” 2018 9th Int. Conf. Comput. Commun. Netw. Technol., pp. 1–6, 2018.
[10] R. S. Shubhika Ranjan, Prabu Sevugan, P.Swarnalatha, Magesh Gopu, “Iris Recognition System,” vol. 4, no. 12, pp. 354–356, 2017.
Citation
Prabhat Kumar, Manish Ahirwar, Anjna Deen, "A Survey on Iris Recognition System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.302-307, 2019.
Analysis of various Plant Disease detection Techniques
Review Paper | Journal Paper
Vol.7 , Issue.7 , pp.308-311, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.308311
Abstract
The plant disease detection is the approach which is applied to predict disease type from the input image. The plant disease detection has the two phases which are feature extraction and classification. In the previous years, various techniques has been designed for the plant disease detection. The various classifications methods has been designed for the plant disease detection like SVM, decision etc. In this paper, various plant disease detection techniques are reviewed and analyzed in terms of certain parameters
Key-Words / Index Term
Plant Disease detection, SVM, Classification, Feature extraction
References
[1] Ghaiwat Savita N, Arora Parul, “Detection and classification of plant leaf diseases using image processing techniques: a review”, Int J Recent Adv Eng Technol 2014;2(3):2347–812
[2] Dhaygude Sanjay B, Kumbhar Nitin P., “Agricultural plant leaf disease detection using image processing”, Int J Adv Res Electr Electron Instrum Eng 2013;2(1).
[3] Mrunalini R Badnakhe, Deshmukh Prashant R, “An application of K-means clustering and artificial intelligence in pattern recognition for crop diseases”, Int Conf Adv Inf Technol 2011;20. 2011 IPCSIT.
[4] S. B. Lo, H. Chan, J. Lin, H. Li, M. T. Freedman, and S. K. Mun, “Artificial convolution neural network for medical image pattern recognition,” Neural Networks, vol. 8, no. 7-8, pp. 1201–1214, 1995.
[5] O. D. Trier, A. K. Jain, and T. Taxt, “Feature extraction methods for character recognition-a survey,” Pattern Recognition, vol. 29, no. 4, pp. 641–662, 1996.
[6] G. P. Zhang, “Neural networks for classification: a survey,” IEEE Transactions on Systems, Man, and Cybernetics, Part C, vol. 30, no. 4, pp. 451–462, 2000.
[7] Bashir Sabah, Sharma Navdeep, “Remote area plant disease detection using image processing”, IOSR J Electron Commun Eng 2012;2(6):31–4. ISSN: 2278-2834.
[8] Naikwadi Smita, Amoda Niket, “Advances in image processing for detection of plant diseases”, Int J Appl Innov Eng Manage 2013;2(11).
[9] Patil Sanjay B et al., “Leaf disease severity measurement using image processing”, Int J Eng Technol 2011;3(5):297–301.
[10] Chaudhary Piyush et al., “Color transform based approach for disease spot detection on plant leaf”, Int Comput Sci Telecommun 2012;3(6).
[11] Vijai Singh, A.K. Misra, “Detection of plant leaf diseases using image segmentation and soft computing techniques”, Information Processing in Agriculture 4 (2017) 41 – 4 9
[12] Shunping Ji, Chi Zhang, Anjian Xu, Yun Shi and Yulin Duan, “3D Convolutional Neural Networks for Crop Classification with Multi-Temporal Remote Sensing Images”, Remote Sens. 2018, 10, 75
[13] Tom Brosch, Lisa Y.W. Tang, Youngjin Yoo, David K.B. Li, Anthony Traboulsee, and Roger Tam, “Deep 3D Convolutional Encoder Networks with Shortcuts for Multiscale Feature Integration Applied to Multiple Sclerosis Lesion Segmentation”, 2016, IEEE
[14] Guillermo L. Grinblat, Lucas C. Uzal, Mónica G. Larese, Pablo M. Granitto, “Deep learning for plant identification using vein morphological patterns”, Computers and Electronics in Agriculture 127 (2016) 418–424
[15] Jayme Garcia Arnal Barbedo, Luciano Vieira Koenigkan, Thiago Teixeira Santos, “Identifying multiple plant diseases using digital image processing”, Biosystem Engineering 147, 2016, 104-116
[16] Mads Dyrmann, Henrik Karstoft, Henrik Skov Midtiby, “Plant species classification using deep convolutional neural network”, Biosystems Engineering 151, 2016, 72-80
[17] Jiang Lu, Jie Hu, Guannan Zhao, Fenghua Mei, Changshui Zhang, “An in-field automatic wheat disease diagnosis system”, Computers and Electronics in Agriculture 142 (2017) 369–379
[18] Halimatu Sadiyah Abdullahi, Ray E. Sheriff, Fatima Mahieddine, “Convolution Neural Network in Precision Agriculture for Plant Image Recognition and Classification”, 2017, IEEE
[19] Tisen Huang, Rui Yang, Wenshan Huang, Yiqi Huanga, Xi Qiao, “Detecting Sugarcane Borer Diseases Using Support Vector Machine”, 2017, Information Processing in Agriculture
[20] Sue Han Lee, Chee Seng Chan, Simon Joseph Mayo, Paolo Remagnino, “How deep learning extracts and learns leaf features for plant classification”, Pattern Recognition 71 (2017) 1–13
Citation
Gazzal Thukral, Lal Chand, "Analysis of various Plant Disease detection Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.308-311, 2019.
Performance Analysis of Congestion Control In MANET Using Different Routing Protocols
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.312-319, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.312319
Abstract
Mobile Ad hoc Network (MANET) is an infrastructure free network that is self-configurable and is dynamic in nature. In MANET nodes communicate with each other independently since there is no centralised controller. An extensive variety of routing protocols for MANETs have been suggested by researchers to excel the restrictions of wired routing protocols. Congestion in MANET is a restriction in the implementation of MANET as it can affect the efficiency of the network and may lead to packets loss, increased average delay during transmission or reception of data. This paper discusses various routing protocols to control congestion problem in MANET. Also various performance parameters have been evaluated here like packets transmitted, packets collided, packets that got into error, throughput and average delay by using AODV (Ad- Hoc On Demand Distance Vector), DSR (Dynamic Source Routing) and ZRP (Zone Routing Protocol) protocols by taking 5,10 and 20 nodes using the software NETSIM Simulator.
Key-Words / Index Term
MANET, ZRP, AODV, DSR
References
[1] H. Gupta and P. Pandey (2013).Survey of routing base congestion control techniques under MANET.IEEE International Conference On Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), 241-244.
[2] Sandeep Dalal, Renu Ruhil (2014).Routing based Congestion Control Metric:RFR. International Journal of Computer Applications, 99(11), 20-24.
[3] Akhtar N., Khan Khattak M.A., Ullah A., Javed M.Y. (2019). Congestion Aware and Adaptive Routing Protocols for MANETs: A Survey. Recent Trends and Advances in Wireless and IoT-enabled Networks.159-169.
[4] V.K Sharma, M. Kumar (2017). Adaptive Congestion Control Scheme in Mobile ad- hoc networks. Peer-to-Peer Netw. Appl. 10(3), 633-657.
[5] S Hemlatha, P.C. senthil Mahesh (2018). Energy optimization in Directional Advanced Intruder Handling AODV Protocol in MANET. Swansea Printing Technology Ltd.14, 935- 960,
[6] D. Bhattacharyya, A. Chatterjee, B. Chatterjee, A. K. Saha and A. Santra (2018). A novel approach to energy efficient low cost routing in MANET by reduction in packet size. IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).679-684.
[7] Geetika Maheshwari, Mahesh Gour, Umesh Kumar Chourasia (2014). A Survey on Congestion Control in MANET. International Journal of Computer Science and Information Technologies. 5(2), 998-1001.
[8] Bhupinder Kaur, Vaibhav Pandey (2015). A Survey on Congestion Control Techniques in MANETs. International Journal of Advanced Research in Computer Science and Software Engineering. 5(5), 1441-1446.
[9] N. Sharma, A. Gupta, S. S. Rajput and V. K. Yadav (2017). Congestion Control Techniques in MANET: A Survey. Second International Conference on Computational Intelligence & Communication Technology (CICT). 280-282.
[10] Sapna Khurana, Suresh Kumar (2017). A Study of Congestion Control in MANET: Review. International Journal of Engineering Technology Science and Research IJETSR. 4(5), 94-98.
[11] Bhawna Ahlawat ,Vikas Nandal (2018). A Review Paper On - Analysis And Performance Evaluation For Congestion Control Routing Protocols In Manet. Intermational Journal of Computer Science and Engineering. 6 (12), 466-470.
[12] Ashish K. Maurya, Dinesh Singh, and Ajeet Kumar (2013). Performance Comparison of DSR, OLSR and FSR Routing Protocols in MANET Using Random Waypoint Mobility Model. International Journal of Information and Electronics Engineering. 3(5).
[13] Y. Mai, F. M. Rodriguez and N. Wang (2108). CC-ADOV: An effective multiple paths congestion control AODV. IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC). 1000-1004.
[14] Prakhar Gupta, Pratyaksh Goel, Pranjali Varshney and Nitin Tyagi (2018). Reliability Factor Based AODV Protocol: Prevention of Black Hole Attack in MANET. Advances in Intelligent Systems and Computing. 271-279.
[15] Payal, Deepak Sharma, Suresh Kumar (2018). Performance Evaluation of Reactive Routing Protocols Using IEEE 802.15.4 Application in Designed Wireless Sensor Network. International Journal of Computer Sciences and Engineering. 6(4), 90-96.
[16] Shaily Mittal, Prabhjot Kaur (2009). Performance Comparision of Aodv, Dsr And Zrp Routing Protocols in Manet’s. International Conference on Advances in Computing, Control, and Telecommunication Technologies. 165-168.
[17] M.W Lee, G. Hwang (2018). Adaptive Contention Window Control Scheme in Wireless Ad Hoc Networks. IEEE Communication Letters. 22(5), 1062-1065.
[18] Varun Kumar Sharma, Mahesh kumar (2019). Adaptive Load Distribution approach based on Congestion control schemes in ad- hoc networks. International Journal of Electronics. 106(1), 48-68.
[19] D. A. Tran and H. Raghavendra (2006). Congestion Adaptive Routing in Mobile Ad Hoc Networks. IEEE Transactions on Parallel and Distributed Systems. 17(11), 1294-1305.
[20] Anju, Sugandha Singh (2015). Modified AODV for Congestion Control in MANET. International Journal of Computer Science and Mobile Computing. 4(6), 984-1001.
[21] Sukhwinder Singh, Vijay Laxmi (2017). A Review on Techniques for Controlling the Congestion in MANET. IJCSN - International Journal of Computer Science and Network. 6(3).
[22] Gupta, S. Sinha (2018). Effect of Varying Pause Time on Performance of QoS Parameters in MANET. Proceedings of International Conference on Recent Advancement on Computer and Communication. 34,105-113.
[23] H. Sai Srujan, A. Sudhakar (2018). Improving QoS Parameters Based on Traffic Type for AODV Routing Protocol in MANET. International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI). 26, 31-41.
[24] Sandeep Kumar , Suresh Kumar (2015). Study of MANET: Characteristics, Challenges, Applications, Routing Protocol and Security Attacks. International Journal of R & D in Engineering Science and Management. 2(5), 266-274.
Citation
Bhawna Ahlawat, Vikas Nandal, "Performance Analysis of Congestion Control In MANET Using Different Routing Protocols," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.312-319, 2019.
Development and Validation of Bayesian Network Method for Decision-Support System of Insect-Pest Management in Tomato
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.320-325, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.320325
Abstract
Bayesian Network (BN), a probabilistic reasoning approach have been widely used in ecological decision-making to deal with uncertain information nevertheless, very few instances of its usage in crop pest management. This paper focuses on how to deal with uncertain agro-ecological information for decision–making in pest management. In the study, a Bayesian network was developed for selecting appropriate management option of fruit borer (Helicoverpa armigera) and leaf minor (Liriomyza trifolii), key insect-pest of tomato based on the tentative agro-ecological information besides crop condition that farmers provided. Validation of the method resulted in 76% accuracy for fruit borer and 82% for leaf minor. Application of the method thus developed in Decision Support Systems (DSSs) of agriculture with applies Information and Communication Technology (ICT) would automate and speed up the process of providing insect-pest management decision support to the farmers. Thus, it will not only save the crop worth crores of rupees but also help in reduction of excessive and irrational usage of pesticides thus saving the environment and human health.
Key-Words / Index Term
Fruit borer, Leaf minor, Tomato, Decision-making, ICT, DSS, Pest Management
References
[1]. A. M. Meysam and K. S. Mahdi, “Bayesian Network and Pest Management: A Case Study of Trap Plants on Locust Population” Advances in Environmental Biology, Vol. 4, Issue 2, pp. 147-151, 2010.
[2]. A. Prabhuraj, “Electronic Solutions against Agricultural Pests (e-SAP)”, http://www.mmp.cips.org.in/documents/Workshops/2015/
30jul-1aug/eSAP-Dr._A_Prabhuraj.pdf, 2015.
[3]. Anand Praksh, J. S. Prasad Bantur, M. Srinivas, R. K. Tanwar, O. P. Sharma, S. Bhagat ……….. P. Jeykumar, “Integrated Pest Management for Rice”, National Centre for Integrated Pest Management, New Delhi, India, 2014.
[4]. A. Varma, Y. S. Chouhan, “Recent Methodologies for Improving and Evaluating Academic Performance”, International Journal of Scientific Research in Computer Science and Engineering, Vol-3, Issue-2, pp. 11-15, 2015.
[5]. Bi, Chunguang, Chen Guifen, “Bayesian Networks Modelling for Crop Disease”, In the proceedings of 4th Conference on Computer and Computing Technologies in Agriculture (CCTA, 2010), Nanchang, China, pp. 312-320, 2010.
[6]. F. V. Jensen, T. D. Nielsen, “Bayesian Networks and Decision Graphs 2nd edition”, Springer-Verlag, New York, USA, 2007.
[7]. G. C. Tiwari, P. N. Krishnamoorthy, “Yield loss in tomato caused by tomato fruit borer”, Indian Journal of Agricultural Sciences, Vol. 54, pp. 341-43, 1984.
[8]. H. Chen Serena, A. Pollino Carmel, “Good Practice in Bayesian Network Modelling”, Environmental Modelling & Software, Vol. 37, pp. 134-145, 2012.
[9]. H. R. Sardana, Naved Sabir, “IPM Strategies for Tomato and Cabbage”, National Centre for Integrated Pest Management, New Delhi, India, 2007.
[10]. I. M. del Águila, J. del Sagrado, “Metamodeling of Bayesian Networks for Decision-Support Systems Development”, In the proceedings of 8th Workshop on Knowledge Engineering and Software Engineering (KESE 2012), Montpelier, USA, pp. 12–19, 2012.
[11]. J. Pearl, “Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference”, Morgan Kaufmann Publishers Inc., San Francisco, USA, 1988.
[12]. J. Sobehart, S. Keenan, R. Stein, “Benchmarking quantitative default risk models: A validation algorithmology”, ALGO Research Quarterly, Vol. 4, pp. 57-71, 2001.
[13]. K. Satyagopal, S. N. Sushil, P. Jeyakumar, G. Shankar, O. P. Sharma, S. K. Sain, … S. Saha, “AESA Based IPM Package for Watermelon”, National Institute of Plant Health Management Hyderabad, India, 2014.
[14]. Mahesh Uniyal, “Integrated Pest Management: SATNET Asia”, accessed on 11th August, 2017 from http://www.satnetasia.org.
[15]. M. E. Kragt, “A Beginners Guide to Bayesian Network Modelling for Integrated Catchment Management. (Technical Report No. 9, Landscape Logic)”, Department of Environment, Water Heritage and the Arts, Government of Australia, 2009.
[16]. M. Saxena, P. Chander Gandhi, “Indian Horticulture database”, National Horticulture Board, Ministry of Agriculture, Government of India, 2011.
[17]. N. Chaudhuri, S. K. Senapati, “Incidence and biology of leaf miner, Liriomyza trifolii (Burg.) on tomato as influenced by weather conditions”, Annals of Plant Protection Sciences, Vol. 12, Issue 1, pp. 55- 58, 2004.
[18]. N. Singh, H. R. Sardana, S. S. Kumar, “Pest Management Information System (PMIS) for Tomato: A Database Tool for IPM”, Indian Journal of Entomology, Vol. 74, Issue 2, pp. 202–204, 2012.
[19]. N. Singh, N. Gupta, “ICT Based Decision Support Systems for Integrated Pest Management (IPM) in India: A review”, Agricultural Reviews, Vol. 37, Issue 4, pp. 309-316, 2016.
[20]. N. Singh, N. Gupta, “Decision Making In Integrated Pest Management and Bayesian Network”, International Journal of Computer Science & Information Technology, Vol. 9, Issue 2, pp. 31-36, 2016.
[21]. O. Varis, “Bayesian Decision Analysis for Environmental and Resource Management”, Environmental Modelling and Software, Vol. 12, Issue 2-3, pp. 177–185, 1997.
[22]. R. Asalatha, “Seasonal activity and bio-efficacy of some eco-friendly insecticides against the serpentine leaf miner, Liriomyza trifolii”, M.Sc. Thesis, JNKVV, Jabalpur, India, 2002.
[23]. R. K. McCann, B. G. Marcot, R. Ellis, “Bayesian Belief Networks: Applications in Ecology and Natural Resource Management”, Canadian Journal of Forest Research, Vol. 36, Issue 12, pp. 3053-3062, 2006.
[24]. S. Bhagat, A. K. Tripathi, I. Ahmad, A. Birah, O. P. Sharma, N. Singh, “Integrated Disease Management for Tomato in Island Ecosystem of Andaman”, Indian Journal of Horticulture, Vol. 72, Issue 1, pp. 67-72, 2015.
[25]. S. Eom, E. Kim, “A survey of decision support system applications (1995‒2001)”, The Journal of the Operational Research Society, Vol. 57, Issue 11, pp. 1264‒1278, 2006.
[26]. S. K. Sharma, J. P. Choudhary, “Effects of different levels of constant temperature and humidity on the development and survival of Heliothis armigera Hub.”, Indian Journal Entomology, Vol. 50, pp. 76-81, 1988.
[27]. S. R. Tripathi, S. K. Sharma, “Population dynamics of Helicoverpa armigera (Hub.) on gram in the Terai belt of NEUP”, GiarnaleItaliana di Entomologia, Vol. 2, Issue 10, pp. 347-352, 1985.
[28]. U. B. Kjrulff, A. L. Madsen, “Bayesian Networks and Influence Diagrams”, Springer-Verlag, New York, USA, 2008.
[29]. V. Rossi, T. Caffi, F. Salinari, “Helping Farmers Face the Increasing Complexity of Decision-Making for Crop Protection”, Phytopathologia Mediterranea, Vol. 51, Issue 3, pp. 457-479, 2012.
Citation
Niranjan Singh, Neha Gupta, "Development and Validation of Bayesian Network Method for Decision-Support System of Insect-Pest Management in Tomato," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.320-325, 2019.
Flaws in Privacy and Security of Facebook
Research Paper | Journal Paper
Vol.7 , Issue.7 , pp.326-331, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.326331
Abstract
In today`s era the massive online social networking places like Facebook, WeChat and WhatsApp, etc where are different-different working background peoples including students linked/connected to each other through a social networking media, and sharing of our thought, picture, videos with our family and friends. The main motive of this study is to highlight the default privacy setting and security of Facebook is breach due to the fake account, fake news and third parties on these sites. Facebook is a virtual online meeting space for the world where a huge volume of information is shared. Every second user of Facebook doesn`t have any knowledge about privacy setting. Privacy matter is strongly related to third parties to access Facebook user information. The risk with this platform is that it may fall within the wrong hands and people become a victim of hacking, identify theft, cyberstalking, child soliciting, and Abuse, etc.
Key-Words / Index Term
Social media, Hacking, Facebook, Fake Account, cyberstalking
References
[1] Chewie M., Hayikader S., Hasan M H. and Ibrahim J. 2015 How Much Privacy We Still Have on Social Network?. International Journal of Scientific and Research Publications, Volume 5, Issue 1, January 2015 Edition, page no:1.
[2] Adgaonkar, A. and Shaikh, H. 2015 Privacy in Online Social Networks (OSNs). International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 3, March 2015.
[3] D. Boyd and E. Hargittai. 2010. Facebook privacy settings: Who cares?” Journal on the Internet, 15(8), 2010.
[4] Leitch S and Warren M. Security Issues Challenging Facebook.
[5] Hashimoto G T., Rosa P.F., Filho E.L. and Machado J M. 2010. A Security Framework to Protect Against Social Networks Services Threats. Fifth International Conference on Systems and Networks Communications.
[6] Shabir G., Hameed M.Y., Safdar G. and Gilani S.M.F.S. 2014.The Impact of Social Media on Youth: A Case Study of Bahawalpur City. Asian Journal of Social Sciences & Humanities Vol. 3(4) November 2014.
[7] Al-Darwish A.A., Al-Joudi A.S., Al-Gahtani H.B, and Al-Qahtani M.S. Social Networks Benefits, Privacy, and Identity Theft: KSA Case Study (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 5, No. 12, 2014.
[8] Guy-Hermann Ngambeket Ndiandukue.” Social Networks and Privacy— Threats and Protection .” Isaca Journal, Volume 5, 2012.
[9] A. Srivastava and G. Geethakumari, "Measuring Privacy Leaks in Online Social Networks," International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2095-2100, 2013.
[10] B2B International In Conjunction and KasperskyLab, "CONSUMER SECURITY RISKS SURVEY 2014: MULTI-DEVICE THREATS IN A MULTI-DEVICE WORLD," Kaspersky Lab, 2014.
[11] X. Chen and S. Shi, "A Literature Review of Privacy Research on Social Network Sites," International Conference on Multimedia Information Networking and Security, pp. 93-97, 2009.
[12] C. Wüest, "The Risks of Social Networking," Symantec Corporation, 2010.
[13] G.-H. N. Ndiandukue, "Social Networks and Privacy—Threats and Protection," ISACA, vol. 5, pp. 19-23, 2012.
[14] A. Al has, "Threats of the online social network," Seminar on internetworking, 2008.
[15] Shin, D. (2010) ‘The effects of trust, security, and privacy in social networking: A security-based approach to understand the pattern of adoption’, Interacting with Computers, Vol. 22, No. 5, pp. 428–438.
[16] Goettke, R. and Christiana, J. (2007) ‘Privacy and online social networking websites’, Computer Science 199r: Special Topics in Computer Science Computation and Society: Privacy and Technology, 14 May.
[17] Camp, L. J. (1999) ‘Web security and privacy: An American perspective’, Information Society, Vol. 15, No. 4, pp. 249–256.
[18] Suh,B.Han,I.(2003)‘Theimpactofcustomertrust and perception of security control on the acceptance of electronic commerce’, International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 135–161.
[19] Kumar DV, Varma P, Pabboju SS. Security issues in social networking. Int J Comput Sci Netw Security. 2013;13(6):120–124.
Citation
Akhil Kumar, Sapna Jain, Rajkumar Yadav, "Flaws in Privacy and Security of Facebook," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.326-331, 2019.
A Review on the Use of Block chain for the Internet of Things
Review Paper | Journal Paper
Vol.7 , Issue.7 , pp.332-358, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.332358
Abstract
The paradigm of Internet of Things (IoT) is paving the way for a world, where many of our daily objects will be interconnected and will interact with their environment in order to collect information and automate certain tasks. Such a vision requires, among other things, seamless authentication, data privacy, security, robustness against attacks, easy deployment, and self-maintenance. Such features can be brought by blockchain, a technology born with a cryptocurrency called Bitcoin. In this paper, a thorough review on how to adapt blockchain to the specic needs of IoT in order to develop Blockchain-based IoT (BIoT) applications is presented. After describing the basics of blockchain, the most relevant BIoT applications are described with the objective of emphasizing how blockchain can impact traditional cloud-centered IoT applications. Then, the current challenges and possible optimizations are detailed regarding many aspects that affect the design, development, and deployment of a BIoT application. Finally, some recommendations are enumerated with the aim of guiding future BIoT researchers and developers on some of the issues that will have to be tackled before deploying the next generation of BIoT applications.
Key-Words / Index Term
Cryptocurrency, Bitcoin, Encrypted, Currency, Bitpay, Exchange Rate
References
[1] Forecast: The Internet of Things, Worldwide, 2013, Gartner, Stamford, CA, USA, Nov. 2013.
[2] White Paper: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 20162021. San Jose, CA, USA, Mar. 2017.
[3] M. Suárez-Albela, P. Fraga-Lamas, T. M. Fernández-Caramés, A. Dapena, and M. González-López, ``Home automation system based on intelligent transducer enablers,`` Sensors, vol. 16, no. 10, no. 1595, pp. 126, Sep. 2016.
[4] P. Fraga-Lamas, T. M. Fernández-Caramés, and L. Castedo, ``Towards the Internet of smart trains: A review on industrial IoT-connected railways,`` Sensors, vol. 17, no. 6, no. 1457, pp. 144, Jun. 2017.
[5] P. Fraga-Lamas, T. M. Fernández-Caramés, M. Suárez-Albela, L. Castedo, and M. González-López, ``A review on Internet of Things for defense and public safety,`` Sensors, vol. 16, no. 10, p. 1644, Oct. 2016.
[6] S. J. Barro-Torres, T. M. Fernández-Caramés, H. J. Pérez-Iglesias, and C. J. Escudero, ``Real-time personal protective equipment monitoring system,`` Comput. Commun., vol. 36, no. 1, pp. 4250, 2012.
[7] Ó. Blanco-Novoa, T. M. Fernández-Caramés, P. Fraga-Lamas, and M. A. Vilar-Montesinos, ``A practical evaluation of commercial industrial augmented reality systems in an industry 4.0 shipyard,`` IEEE Access, vol. 6, pp. 82018218, 2018.
[8] P. Fraga-Lamas, T. M. Fernández-Caramés, Ó. Blanco-Novoa, and M. A. Vilar-Montesinos, ``A review on industrial augmented reality systems for the industry 4.0 shipyard,`` IEEE Access, vol. 6, pp. 1335813375, 2018.
[9] P. Triantallou, N. Ntarmos, S. Nikoletseas, and P. Spirakis, ``NanoPeer networks and P2P worlds,`` in Proc. 3rd Int. Conf. Peer-Peer Comput., Linkoping, Sweden, Sep. 2003, pp. 4046.
[10] M. Ali and Z. A. Uzmi, ``CSN: A network protocol for serving dynamic queries in large-scale wireless sensor networks,`` in Proc. 2nd Annu. Conf. Commun. Netw. Services Res., Fredericton, NB, Canada, May 2004, pp. 165174.
[11] S. Krco, D. Cleary, and D. Parker, ``P2P mobile sensor networks,`` in Proc. 38th Annu. Hawaii Int. Conf. Syst. Sci., Big Island, HI, USA, Jan. 2005, p. 324c.
[12] Device Democracy: Saving the Future of the Internet of Things, IBM, New York, NY, USA, 2015.
[13] S. Landau, ``Making sense from Snowden: What`s signicant in the NSA surveillance revelations,`` IEEE Security Privacy, vol. 11, no. 4, pp. 5463, Jul. 2013.
[14] S. Landau, ``Highlights from making sense of Snowden, Part II: What`s signicant in the NSA revelations,`` IEEE Security Privacy, vol. 12, no. 1, pp. 6264, Jan. 2014.
[15] Markets and Markets; Statista Estimates. Market for Blockchain Technology Worldwide. Accessed: Apr. 10, 2018. [Online]. Available: https://www.statista.com/statistics/647231/worldwide-blockchaintechnology- market-size
[16] Blockchain Technology Report to the U.S. Federal Advisory Committee on Insurance. Accessed: Apr. 10, 2018. [Online]. Available: https://www. treasury.gov/initiatives/o/Documents/McKinsey_FACI_Blockchain_ in_Insurance.pdf
[17] Crypto-Currency Market Capitalizations. Accessed: Apr. 10, 2018. [Online]. Available: https://coinmarketcap.com/
[18] S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. Accessed: Apr. 10, 2018. [Online]. Available: https://bitcoin.org/bitcoin.pdf
[19] M. Swan, Blockchain: Blueprint for a New Economy, 1st ed. Newton, MA, USA: O`Reilly Media, Jan. 2015.
[20] S. Singh and N. Singh, ``Blockchain: Future of nancial and cyber security,`` in Proc. 2nd Int. Conf. Contemporary Comput. Inf. (IC3I), Noida, India, Dec. 2016, pp. 463467.
[21] F. Tschorsch and B. Scheuermann, ``Bitcoin and beyond: A technical survey on decentralized digital currencies,`` IEEE Commun. Surveys Tuts., vol. 18, no. 3, pp. 20842123, 3rd Quart., 2016.
[22] Ethereum. Accessed: Apr. 10, 2018. [Online]. Available: https://www. ethereum.org
[23] Counterparty. Accessed: Apr. 10, 2018. [Online]. Available: www. counterparty.io
[24] L. Lamport, R. Shostack, and M. Pease, ``The Byzantine generals problem,`` ACM Trans. Program. Lang. Syst., vol. 4, no. 3, pp. 382401, 1982.
[25] K. Christidis and M. Devetsikiotis, ``Blockchains and smart contracts for the Internet of Things,`` IEEE Access, vol. 4, pp. 22922303, 2016.
[26] Z. Zheng, S. Xie, H. Dai, and H. Wang, ``An overview of blockchain technology: Architecture, consensus, and future trends,`` in Proc. IEEE Int. Congr. Big Data, Big Data Congr., Honolulu, HI, USA, Jun. 2017, pp. 557564.
[27] E. Karaloski and A. Mishev, ``Blockchain solutions for big data challenges: A literature review,`` in Proc. IEEE Int. Conf. Smart Technol., Ohrid, Macedonia, Jul. 2017, pp. 763768.
[28] T. Ahram, A. Sargolzaei, S. Sargolzaei, J. Daniels, and B. Amaba, ``Blockchain technology innovations,`` in Proc. IEEE Technol., Eng. Manage. Conf. (TEMSCON), Santa Clara, CA, USA, Jun. 2017, pp. 137141.
[29] M. Conoscenti, A. Vetrò, and J. C. De Martin, ``Blockchain for the Internet of Things: A systematic literature review,`` in Proc. IEEE/ACS 13th Int. Conf. Comput. Syst. Appl. (AICCSA), Agadir, Morocco, Nov./Dec. 2016, pp. 16.
[30] J. Yli-Huumo, D. Ko, S. Choi, S. Park, and K. Smolander, ``Where is current research on blockchain technology?A systematic review,`` PLoS ONE, vol. 11, no. 10, p. e0163477, 2016.
[31] S. Raval, Decentralized Applications: Harnessing Bitcoin`s Blockchain Technology, 1st ed. Newton, MA, USA: O`Reilly Media, Aug. 2016.
[32] H. X. Mel and D. Baker, Cryptography Decrypted. Reading, MA, USA: Addison Wesley, 2001.
[33] N. Ferguson and B. Schneier, Practical Cryptography. Hoboken, NJ, USA: Wiley, 2003.
[34] Litecoins. Accessed: Apr. 10, 2018. [Online]. Available: https:// litecoin.com
[35] Hyperledger-Fabric. Accessed: Apr. 10, 2018. [Online]. Available: https://www.hyperledger.org/projects/fabric
[36] Ripple`s. Accessed: Apr. 10, 2018. [Online]. Available: https:// www.ripple.com
[37] IOTA`s. Accessed: Apr. 10, 2018. [Online]. Available: https:// www.iota.org
[38] T. Gui, C. Ma, F. Wang, and D. E. Wilkins, ``Survey on swarm intelligence based routing protocols for wireless sensor networks: An extensive study,`` in Proc. IEEE Int. Conf. Ind. Technol. (ICIT), Taipei, Taiwan, Mar. 2016, pp. 19441949.
[39] J. S. Preden, K. Tammemäe, A. Jantsch, M. Leier, A. Riid, and E. Calis, ``The benets of self-awareness and attention in fog and mist computing,`` Computer, vol. 48, no. 7, pp. 3745, Jul. 2015.
[40] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, ``Fog computing and its role in the Internet of Things,`` presented at the 1st edition MCC Workshop Mobile Cloud Comput., Helsinki, Finland, Aug. 2012, pp. 1316.
[41] M. Suárez-Albela, T. M. Fernández-Caramés, P. Fraga-Lamas, and L. Castedo, ``A practical evaluation of a high-security energy-efcient gateway for IoT fog computing applications,`` Sensors, vol. 17, no. 9, p. 1978, Aug. 2017.
[42] D. Datla et al., ``Wireless distributed computing: A survey of research challenges,`` IEEE Commun. Mag., vol. 50, no. 1, pp. 144152, Jan. 2012.
[43] Z. Wu, Z. Meng, and J. Gray, ``IoT-based techniques for online M2Minteractive itemized data registration and ofine information traceability in a digital manufacturing system,`` IEEE Trans. Ind. Informat., vol. 13, no. 5, pp. 23972405, Oct. 2017.
[44] R. K. Lomotey, J. Pry, S. Sriramoju, E. Kaku, and R. Deters, ``Wearable IoT data architecture,`` in Proc. IEEEWorld Congr. Services (SERVICES), Honolulu, HI, USA, Jun. 2017, pp. 4450.
[45] H. Cai, B. Xu, L. Jiang, and A. V. Vasilakos, ``Iot-based big data storage systems in cloud computing: Perspectives and challenges,`` IEEE Internet Things J., vol. 4, no. 1, pp. 7587, Jan. 2017.
[46] M. Marjani et al., ``Big IoT data analytics: Architecture, opportunities, and open research challenges,`` IEEE Access, vol. 5, pp. 52475261, 2017.
[47] A. Back et al. Enabling Blockchain Innovations With Pegged Sidechains. Accessed: Apr. 10, 2018. [Online]. Available: https://www. blockstream.com/sidechains.pdf
[48] J. Pérez-Expósito, T. M. Fernández-Caramés, P. Fraga-Lamas, and L. Castedo, ``VineSens: An eco-smart decision-support viticulture system,`` Sensors, vol. 17, no. 3, p. 465, Feb. 2017.
[49] T. Swanson. Consensus-as-a-service: A Brief Report on the Emergence of Permissioned, Distributed Ledger System. Accessed: Apr. 10, 2018. [Online]. Available: http://www.ofnumbers.com/wpcontent/ uploads/2015/04/Permissioned-distributed-ledgers.pdf
[50] D. Wörner and T. von Bomhard, ``When your sensor earns money: Exchanging data for cash with Bitcoin,`` in Proc. UbiComp Adjunct, Seattle, WA, USA, Sep. 2014, pp. 295298.
[51] Y. Zhang and J. Wen, ``An IoT electric business model based on the protocol of Bitcoin,`` in Proc. 18th Int. Conf. Intell. Next Gener. Netw., Paris, France, Feb. 2015, pp. 184191.
[52] S. Wilkinson et al. Storj a Peer-to-Peer Cloud Storage Network. Accessed: Apr. 10, 2018. [Online]. Available: https://storj.io/storj.pdf
[53] G. Ateniese, M. T. Goodrich, V. Lekakis, C. Papamanthou, E. Paraskevas, and R. Tamassia, ``Accountable storage,`` in Proc. Int. Conf. Appl. Cryp- togr. Netw. Secur., Kanazawa, Japan, Jul. 2017, pp. 623644.
[54] D. Wilson and G. Ateniese, ``From pretty good to great: Enhancing PGP using Bitcoin and the blockchain,`` in Proc. Int. Conf. Netw. Syst. Secur., New York, NY, USA, Nov. 2015, pp. 368375.
[55] B. Gipp, N. Meuschke, and A. Gernandt, ``Decentralized trusted timestamping using the crypto currency Bitcoin,`` in Proc. iConf., Newport Beach, CA, USA, Mar. 2015, pp. 15.
[56] D. Han, H. Kim, and J. Jang, ``Blockchain based smart door lock system,`` in Proc. Int. Conf. Inf. Commun. Technol. Convergence (ICTC), Jeju Island, South Korea, Dec. 2017, pp. 11651167.
[57] A. Lei, H. Cruickshank, Y. Cao, P. Asuquo, C. P. A. Ogah, and Z. Sun, ``Blockchain-based dynamic key management for heterogeneous intelligent transportation systems,`` IEEE Internet Things J., vol. 4, no. 6, pp. 18321843, Dec. 2017.
[58] M. Siddiqi, S. T. All, V. Sivaraman, ``Secure lightweight context-driven data logging for bodyworn sensing devices,`` in Proc. 5th Int. Symp. Digit. Forensic Secur. (ISDFS), Tirgu Mures, Romania, 2017, pp. 16.
[59] N. Kshetri, ``Can blockchain strengthen the Internet of Things?`` IT Professional, vol. 19, no. 4, pp. 6872, 2017.
[60] C. Tanas, S. Delgado-Segura, and J. Herrera-Joancomartí, ``An integrated reward and reputation mechanism for MCS preserving users` privacy,`` in Proc. 10th Int. Workshop Data Privacy Manage., Secur. Assurance, vol. 9481. New York, NY, USA: Springer-Verlag, 2016, pp. 8399.
[61] A. Wright and F. P. De. (Mar. 2015). Decentralized Blockchain Tech- nology and the Rise of Lex Cryptographia. Accessed: Apr. 10, 2018. [Online]. Available: https://ssrn.com/abstract=2580664
[62] N. Kshetri, ``Blockchain`s roles in strengthening cybersecurity and protecting privacy,`` Telecommun. Policy, vol. 41, no. 10, pp. 10271038, 2017. [63] F. Tian, ``An agri-food supply chain traceability system for China based on RFID & blockchain technology,`` in Proc. 13th Int. Conf. Service Syst. Service Manage. (ICSSSM), Kunming, China, Jun. 2016, pp. 16.
[64] S. Huh, S. Cho, and S. Kim, ``Managing IoT devices using blockchain platform,`` in Proc. 19th Int. Conf. Adv. Commun. Technol. (ICACT), Bongpyeong, South Korea, Feb. 2017, pp. 464467.
[65] Y. R. Kae, K. Mahmud, S. Morsalin, and G. E. Town, ``Towards an internet of energy,`` in Proc. IEEE Int. Conf. Power Syst. Technol. (POWERCON), Wollongong, NSW, Australia, Sep./Oct. 2016, pp. 16.
[66] O. Blanco-Novoa, T. M. Fernández-Caramés, P. Fraga-Lamas, and L. Castedo, ``An electricity-price aware open-source smart socket for the internet of energy,`` Sensors, vol. 17, no. 3, p. 643, Mar. 2017.
[67] T. M. Fernández-Caramés, ``An intelligent power outlet system for the smart home of the Internet of Things,`` Int. J. Distrib. Sens. Netw., vol. 11, no. 11, p. 214805, 2015, doi: 10.1155/2015/214805.
[68] T. Lundqvist, A. de Blanche, and H. R. H. Andersson, ``Thing-tothing electricity micro payments using blockchain technology,`` in Proc. Global Internet Things Summit (GIoTS), Geneva, Switzerland, Jun. 2017, pp. 16.
[69] T. Bocek, B. B. Rodrigues, T. Strasser, and B. Stiller, ``Blockchains everywhereA use-case of blockchains in the pharma supply-chain,`` in Proc. IFIP/IEEE Symp. Integr. Netw. Service Manage. (IM), Lisbon, Portugal, May 2017, pp. 772777.
[70] Z. Shae and J. J. P. Tsai, ``On the design of a blockchain platform for clinical trial and precision medicine,`` in Proc. IEEE 37th Int. Conf. Distrib. Comput. Syst. (ICDCS), Atlanta, GA, USA, Jun. 2017, pp. 19721980.
[71] M. A. Salahuddin, A. Al-Fuqaha, M. Guizani, K. Shuaib, and F. Sallabi, ``Softwarization of Internet of Things infrastructure for secure and smart healthcare,`` Computer, vol. 50, no. 7, pp. 7479, Jul. 2017.
[72] K. Dolui and S. K. Datta, ``Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing,`` in Proc. Global Internet Things Summit (GIoTS), Geneva, Switzerland, Jun. 2017, pp. 16.
[73] Tor Project. Accessed: Apr. 10, 2018. [Online]. Available: https:// www.torproject.org
[74] J. Park and K. Kim, ``TM-Coin: Trustworthy management of TCB measurements in IoT,`` in Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops, Kona, HI, USA, Mar. 2017, pp. 654659.
[75] ARM TrustZone. Accessed: Apr. 10, 2018. [Online]. Available: https://www.arm.com/products/security-on-arm/trustzone
[76] K. Biswas and V. Muthukkumarasamy, ``Securing smart cities using blockchain technology,`` in Proc. IEEE 14th Int. Conf. Smart City, Sydney, NSW, Australia, Dec. 2016, pp. 13921393.
[77] H. Sukhwani, J. M. Martínez, X. Chang, K. S. Trivedi, and A. Rindos, ``Performance modeling of PBFT consensus process for permissioned blockchain network (hyperledger fabric),`` in Proc. IEEE 36th Symp. Rel. Distrib. Syst. (SRDS), Hong Kong, Sep. 2017, pp. 253255.
[78] M. Vukoli¢. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. Accessed: Apr. 10, 2018. [Online]. Available: http://www.vukolic.com/iNetSec_2015.pdf
[79] M. Bahrepour, N. Meratnia, and P. J. M. Havinga, ``Sensor fusionbased event detection in wireless sensor networks,`` in Proc. 6th Annu. Int. Mobile Ubiquitous Syst. Netw. Services MobiQuitous, Toronto, ON, Canada, 2009, pp. 18.
[80] M. Anirudh, S. A. Thileeban, and D. J. Nallathambi, ``Use of honeypots for mitigating DoS attacks targeted on IoT networks,`` in Proc. Int. Conf. Comput., Commun. Signal Process. (ICCCSP), Chennai, India, Jan. 2017, pp. 14.
[81] Q. Xu, P. Ren, H. Song, and Q. Du, ``Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations,`` IEEE Access, vol. 4, pp. 28402853, 2016.
[82] X. Li, H.Wang, Y. Yu, and C. Qian, ``An IoT data communication framework for authenticity and integrity,`` in Proc. IEEE/ACM 2nd Int. Conf. Internet-Things Design Implement. (IoTDI), Pittsburgh, USA, Apr. 2017, pp. 159170.
[83] T. Yu, X.Wang, and A. Shami, ``Recursive principal component analysisbased data outlier detection and sensor data aggregation in IoT systems,`` IEEE Internet Things J., vol. 4, no. 6, pp. 22072216, Dec. 2017.
[84] Raspberry Pi. Accessed: Apr. 10, 2018. [Online]. Available: https://www.raspberrypi.org
[85] BeagleBoards. Accessed: Apr. 10, 2018. [Online]. Available: http://beagleboard.org
[86] K. Yeow, A. Gani, R. W. Ahmad, J. J. P. C. Rodrigues, and K. Ko, ``Decentralized consensus for edge-centric Internet of Things: A review, taxonomy, and research issues,`` IEEE Access, vol. 6, pp. 15131524, 2018.
[87] C.-F. Liao, S.-W. Bao, and C.-J. Cheng, ``On design issues and architectural styles for blockchain-driven IoT services,`` in Proc. IEEE Int. Conf. Cons. Electron.-Taiwan (ICCE-TW), Taipei, Taiwan, Jun. 2017, pp. 351352. [88] S. Panikkar, S. Nair, P. Brody, and V. Pureswaran, ``ADEPT: An IoT practitioner perspective,`` IBM Inst. Bus. Value, New York, NY, USA, White Paper, 2015, pp. 118.
[89] Telehash. Accessed: Apr. 10, 2018. [Online]. Available: http://telehash. org [90] BitTorrent. Accessed: Apr. 10, 2018. [Online]. Available: http://www. bittorrent.com
[91] A. Dorri, S. S. Kanhere, and R. Jurdak. (Aug. 2016). ``Blockchain in Internet of Things: Challenges and solutions.`` [Online]. Available: https://arxiv.org/abs/1608.05187
[92] A. Dorri, S. S. Kanhere, and R. Jurdak, ``Towards an optimized BlockChain for IoT,`` in Proc. IEEE/ACM 2nd Int. Conf. Internet- Things Design Implement. (IoTDI), Pittsburgh, PA, USA, Apr. 2017, pp. 173178.
[93] V. Daza, P. R. Di, and I. S. M. Klimek, ``CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT,`` in Proc. IEEE Int. Conf. Commun., Paris, France, May 2017, pp. 16.
[94] C. Li and L.-J. Zhang, ``A blockchain based new secure multi-layer network model for Internet of Things,`` in Proc. IEEE Int. Congr. Internet Things (ICIOT), Honolulu, HI, USA, Jun. 2017, pp. 3341.
[95] M. Samaniego and R. Deters, ``Blockchain as a service for IoT,`` in Proc. IEEE Int. Conf. Internet Things (iThings), IEEE Green Comput. Commun. (GreenCom), IEEE Cyber, Phys. Social Comput. (CPSCom), IEEE Smart Data (SmartData), Chengdu, China, Dec. 2016, pp. 433436.
[96] M. Samaniego and R. Deters, ``Hosting virtual IoT resources on edge-hosts with blockchain,`` in Proc. IEEE Int. Conf. Comput. Inf. Technol. (CIT), Nadi, Fiji, Dec. 2016, pp. 116119.
[97] M. Samaniego and R. Deters, ``Internet of smart things-IoST: Using blockchain and CLIPS to make things autonomous,`` in Proc. IEEE Int. Conf. Cogn. Comput. (ICCC), Honolulu, HI, USA, Jun. 2017, pp. 916.
[98] A. Stanciu, ``Blockchain based distributed control system for edge computing,`` in Proc. 21st Int. Conf. Control Syst. Comput. Sci., Bucharest, Romania, May 2017, pp. 667671.
[99] IEC 61499 Standard. Accessed: Apr. 10, 2018. [Online]. Available: http://www.iec61499.de
[100] Docker. Accessed: Apr. 10, 2018. [Online]. Available: https://www. docker.com
[101] Kubernetes. Accessed: Apr. 10, 2018. [Online]. Available: https:// kubernetes.io
[102] P. K. Sharma, M.-Y. Chen, and J.-H. Park, ``A software dened fog node based distributed blockchain cloud architecture for IoT,`` IEEE Access, vol. 6, pp. 115124, Sep. 2017.
[103] P. K. Sharma, S. Singh, Y.-S. Jeong, and J.-H. Park, ``DistBlockNet: A distributed blockchains-based secure SDN architecture for IoT networks,`` IEEE Commun. Mag., vol. 55, no. 9, pp. 7885, Sep. 2017.
[104] N. Li, D. Liu, and S. Nepal, ``Lightweight mutual authentication for IoT and its applications,`` IEEE Trans. Sustain. Comput., vol. 2, no. 4, pp. 359370, Oct./Dec. 2017.
[105] NIST. Accessed: Apr. 10, 2018. [Online]. Available: https://www.nist.gov
[106] T. Polk, K. McKay, and S. Chokhani, ``Guidelines for the selection and use of transport layer security (TLS) implementations,`` in Proc. NIST, vol. 1, Jun. 2005, pp. 130.
[107] R. L. Rivest, A. Shamir, and L. Adleman, ``A method for obtaining digital signatures and public-key cryptosystems,`` Commun. ACM, vol. 21, no. 2, pp. 120126, Feb. 1978.
[108] J. W. Bos, J. A. Halderman, N. Heninger, J. Moore, M. Naehrig, and E. Wustrow, ``Elliptic curve cryptography in practice,`` in Financial Cryptography and Data Security (Lecture Notes in Computer Science), vol. 8437, N. Christin and R. Safavi-Naini, Eds. Berlin, Germany: Springer, 2014.
[109] T. Kleinjung et al., ``Factorization of a 768-bit RSA modulus,`` in Proc. 30th Annu. conf. Adv. Cryptol., Santa Barbara, CA, USA, Aug. 2010, pp. 333350.
[110] A. Pellegrini, V. Bertacco, and T. Austin, ``Fault-based attack of RSA authentication,`` in Proc. Design, Automat., Test Eur. Conf., Exhib., Dresden, Germany, Mar. 2010, pp. 855860.
[111] A. Levi and E. Savas, ``Performance evaluation of public-key cryptosystem operations in WTLS protocol,`` in Proc. 8th IEEE Symp. Comput. Commun., Kemer-Antalya, Turkey, Jun./Jul. 2003, pp. 12451250.
[112] M. Habib, T. Mehmood, F. Ullah, and M. Ibrahim, ``Performance of WiMAX security algorithm (the comparative study of RSA encryption algorithm with ECC encryption algorithm),`` in Proc. Int. Conf. Comput. Technol. Develop., Kota Kinabalu, Malaysia, Nov. 2009, pp. 108112.
[113] N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, ``Comparing elliptic curve cryptography and RSA on 8-bit CPUs,`` in Proc. Int. Workshop Cryptogr. Hardw. Embedded Syst., Cambridge, MA, USA, Aug. 2004, pp. 119132.
[114] M. Savari, M. Montazerolzohour, and Y. E. Thiam, ``Comparison of ECC and RSA algorithm in multipurpose smart card application,`` in Proc. Int. Conf. Cyber Secur., Cyber Warfare Digit. Forensic, Kuala Lumpur, Malaysia, Jun. 2012, pp. 4953.
[115] M. Bafandehkar, S. M. Yasin, R. Mahmod, and Z. M. Hanapi, ``Comparison of ECC and RSA algorithm in resource constrained devices,`` in Proc. Int. Conf. IT Converg. Secur., Macau, China, Dec. 2013, pp. 13.
[116] A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, ``Energy analysis of public-key cryptography for wireless sensor networks,`` in Proc. 3rd IEEE Int. Conf. Pervasive Comput. Commun., Kauai Island, HI, USA, Mar. 2005, pp. 324328.
[117] E. Noroozi, J. Kadivar, and S. H. Shaee, ``Energy analysis for wireless sensor networks,`` in Proc. 2nd Int. Conf. Mech. Electron. Eng., Kyoto, Japan, Aug. 2010, pp. V2-382V2-386.
[118] P. R. de Oliveira, V. D. Feltrim, L. A. F. Martimiano, and G. B. M. Zanoni, ``Energy consumption analysis of the cryptographic key generation process of RSA and ECC algorithms in embedded systems,`` IEEE Latin Amer. Trans., vol. 6, no. 6, pp. 11411148, Sep. 2014.
[119] T. K. Goyal andV. Sahula, ``Lightweight security algorithm for lowpower IoT devices,`` in Proc. Int. Conf. Adv. Comput., Commun. Informat., Jaipur, India, Sep. 2016, pp. 17251729.
[120] N. Koblitz and A. Menezes, ``A riddle wrapped in an enigma,`` IEEE Security Privacy, vol. 14, no. 6, pp. 3442, Dec. 2016.
[121] P. Rogaway and T. Shrimpton, ``Cryptographic hash-function basics: Denitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance,`` in Proc. 11th Fast Softw. Encryption, vol. 3017. Berlin, Germany: Springer-Verlag, 2004, pp. 371388.
[122] A. Ometov et al., ``Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices,`` in Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops, Sydney, NSW, Australia, Mar. 2016, pp. 16.
[123] M. Feldhofer and C. Rechberger, ``A case against currently used hash functions in RFID protocols,`` in Proc. Move Meaningful Internet Syst. Workshops, Montpellier, France, Oct./Nov. 2006, pp. 372381.
[124] B. Degnan, G. Durgin, and S. Maeda, ``On the Simon Cipher 4-block key schedule as a hash,`` in Proc. IEEE Int. Conf. RFID, Phoenix, AZ, USA, May 2017, pp. 3640.
[125] S. Haber and W. S. Stornetta, ``How to time-stamp a digital document,`` J. Cryptol., vol. 3, no. 2, pp. 99111, Jan. 1991.
[126] J. R. Douceur, ``The Sybil attack,`` in Proc. 1st Int. Workshop Peer-Peer Syst. (IPTPS), Cambridge, MA, USA, Mar. 2002, pp. 251260.
[127] M. Sato and S. Matsuo, ``Long-term public blockchain: Resilience against compromise of underlying cryptography,`` in Proc. IEEE Eur. Symp. Secur. Privacy Workshops, Vancouver, BC, Canada, Jul./Aug. 2017, pp. 4249.
[128] A. Takura, S. Ono, and S. Naito, ``A secure and trusted time stamping authority,`` in Proc. Internet Workshop, Osaka, Japan, Feb. 1999, pp. 8893.
[129] Peercoin. Accessed: Apr. 10, 2018. [Online]. Available: https:// peercoin.net
[130] DPOS Description on Bitshares. Accessed: Apr. 10, 2018. [Online]. Available: http://docs.bitshares.org/bitshares/dpos.html
[131] D. Larimer. Transactions as Proof-of-Stake. Accessed: Apr. 10, 2018. [Online]. Available: https://bravenewcoin.com/assets/Uploads/ TransactionsAsProofOfStake10.pdf
[132] I. L. C. Bentov, A. Mizrahi, and M. Rosenfeld, ``Proof of activity: Extending Bitcoin`s proof of work via proof of stake [extended abstract],`` in Proc. 9thWorkshop Economics Netw., Syst. Comput., Austin, TX, USA, Jun. 2014, pp. 3437.
[133] L. Ren. Proof of Stake Velocity: Building the Social Currency of the Digital Age. Accessed: Apr. 10, 2018. [Online]. Available: https://www.reddcoin.com/papers/PoSV.pdf
[134] Reddcoin. Accessed: Apr. 10, 2018. [Online]. Available: www. reddcoin.com
[135] M. Castro and B. Liskov, ``Practical Byzantine fault tolerance,`` in Proc. 3rd Symp. Operat. Syst. Design Implement., New Orleans, LA, USA, Feb. 1999, pp. 114.
[136] D. Schwartz, N. Youngs, and A. Britto, ``The ripple protocol consensus algorithm,`` Ripple Labs, San Francisco, CA, USA, White Paper, 2014.
[137] D. Mazieres. The Stellar Consensus Protocol: A Federated Model for Internet-Level Consensus. Accessed: Apr. 10, 2018. [Online]. Available: https://www.stellar.org/papers/stellar-consensus-protocol.pdf
[138] C. Copeland and H. Zhong. Tangaroa: A Byzantine Fault Tolerant Raft. Accessed: Apr. 10, 2018. [Online]. Available: http://www.scs. stanford.edu/14au-cs244b/labs/projects/copeland_zhong.pdf
[139] D. Ongaro and J. Ousterhout, ``In search of an understandable consensus algorithm,`` in Proc. USENIX Annu. Techn. Conf., Philadelphia, PA, USA, Jun. 2014, pp. 305320.
[140] C. Cachin, S. Schubert, and M. Vukoli¢, ``Non-determinism in Byzantine fault-tolerant replication,`` in Proc. Int. Conf. Principles Distrib. Syst. (OPODIS), Madrid, Spain, Dec. 2016, pp. 24:124:16.
[141] J. Kwon. Tendermint: Consensus Without Mining (v0.6). [Online]. Available: https://tendermint.com/static/docs/tendermint.pdf
[142] I. Eyal, A. E. Gencer, E. G. Sirer, and R. Van Renesse, ``Bitcoin-NG: A scalable blockchain protocol,`` in Proc. 13th USENIX Symp. Netw. Syst. Design Implement., Santa Clara, CA, USA, Mar. 2016, pp. 4559.
[143] M. Borge, E. Kokoris-Kogias, P. Jovanovic, L. Gasser, N. Gailly, and B. Ford, ``Proof-of-personhood: Redemocratizing permissionless cryptocurrencies,`` in Proc. IEEE Eur. Symp. Secur. PrivacyWorkshops, Paris, France, Apr. 2017, pp. 2326.
[144] R. L. Rivest, A. Shamir, and Y. Tauman, ``How to leak a secret,`` in Proc. 7th Int. Conf. Theory Appl. Cryptol. Inf. Secur., Gold Coast, Australia, Dec. 2001, pp. 552565.
[145] E. Syta et al., ``Keeping authorities` honest or bust` with decentralized witness cosigning,`` in Proc. 37th IEEE Symp. Secur. Privacy, San Jose, CA, USA, May 2016, pp. 526545.
[146] PoI Project. Accessed: Apr. 10, 2018. [Online]. Available: http://proofondividuality.online
[147] G. Kambourakis, C. Kolias, and A. Stavrou, ``The Mirai botnet and the IoT zombie armies,`` in Proc. IEEE Military Commun. Conf. (MILCOM), Baltimore, MA, USA, Oct. 2017, pp. 267272.
[148] H. Chandra, E. Anggadjaja, P. S. Wijaya, and E. Gunawan, ``Internet of Things: Over-the-air (OTA) rmware update in lightweight mesh network protocol for smart urban development,`` in Proc. 22nd AsiaPacic Conf. Commun. (APCC), Yogyakarta, Indonesia, Aug. 2016, pp. 115118.
[149] A. Boudguiga et al., ``Towards better availability and accountability for IoT updates by means of a blockchain,`` in Proc. IEEE Eur. Symp. Secur. Privacy Workshops, Paris, France, Apr. 2017, pp. 5058.
[150] R. Meher. The Internet of Money. Accessed: Apr. 10, 2018. [Online]. Available: https://docs.google.com/document/d/1Bc-kZXROTeMzG6- AvH7rrTrUy24UwHoEcgiL7ALHMO0A/pub
[151] P. Fraga-Lamas, D. Noceda-Davila, T. M. Fernández-Caramés, M. Díaz-Bouza, and M. Vilar-Montesinos, ``Smart pipe system for a shipyard 4.0`` Sensors, vol. 16, no. 12, p. 2186, Dec. 2016.
[152] P. Fraga-Lamas, T. M. Fernández-Caramés, D. Noceda-Davila, and M. Vilar-Montesinos, ``RSS stabilization techniques for a real-time passive UHF RFID pipe monitoring system for smart shipyards,`` in Proc. IEEE Int. Conf. RFID (IEEE RFID), Phoenix, AZ, USA, May 2017, pp. 161166.
[153] P. Fraga-Lamas et al., ``Enabling automatic event detection for the pipe workshop of the shipyard 4.0,`` in Proc. 56th FITCE Congr., Madrid, Spain, Sep. 2017, pp. 2027.
[154] S. J. Barro-Torres, T. M. Fernández-Caramés, M. González-López, and C. J. Escudero-Cascón, ``Maritime freight container management system using RFID`` in Proc. 3rd Int. EURASIP Workshop RFID Technol., La Manga del Mar Menor, Spain, Sep. 2010, pp. 2027.
[155] D. L. Hernández-Rojas, T. M. Fernández-Caramés, P. Fraga-Lamas, and C. J. Escudero, ``Design and practical evaluation of a family of lightweight protocols for heterogeneous sensing through BLE beacons in IoT telemetry applications,`` Sensors, vol. 18, no. 1, p. 57, Dec. 2017.
[156] P. Fraga-Lamas, L. Castedo-Ribas, A. Morales-Méndez, and J. M. Camas-Albar, ``Evolving military broadband wireless communication systems: WiMAX, LTE and WLAN,`` in Proc. Int. Conf. Military Commun. Inf. Syst. (ICMCIS), Brussels, Belgium, May 2016, pp. 18.
[157] P. Fraga-Lamas, J. Rodríguez-Piñeiro, J. A. García-Naya, and L. Castedo, ``Unleashing the potential of LTE for next generation railway communications,`` in Proc. 8th Int. Workshop Commun. Technol. Veh. (Nets4Cars/Nets4Trains/Nets4Aircraft), vol. 9066. Sousse, Tunisia, May 2015, pp. 153164.
[158] P. Fraga-Lamas, ``Enabling technologies and cyber-physical systems for mission-critical scenarios,`` Ph.D. dissertation, Dept. Electrónica Sistemas, Univ. A Coruña, A Coruña, Spain, 2017.
[159] S. Meiklejohn et al., ``A stful of bitcoins: Characterizing payments among men with no names,`` Commun. ACM, vol. 59, no. 4, pp. 8693, Apr. 2016.
[160] M. Möser, R. Böhme, and D. Breuker, ``An inquiry into money laundering tools in the Bitcoin ecosystem,`` in Proc. APWG eCrime Res. Summit, San Francisco, CA, USA, Sep. 2013, pp. 114.
[161] N. Fabiano, ``The Internet of Things ecosystem: The blockchain and privacy issues. The challenge for a global privacy standard,`` in Proc. Int. Conf. Internet Things Global Community (IoTGC), Funchal, Portugal, Jul. 2017, pp. 17.
[162] D. W. Kravitz and J. Cooper, ``Securing user identity and transactions symbiotically: IoT meets blockchain,`` in Proc. Global Internet Things Summit (GIoTS), Geneva, Switzerland, Jun. 2017, pp. 16.
[163] S. H. Hashemi, F. Faghri, P. Rausch, and R. H. Campbell, ``World of empowered IoT users,`` in Proc. IEEE 1st Int. Conf. Internet-Things Design Implement. (IoTDI), Berlin, Germany, Apr. 2016, pp. 1324.
[164] P. Fraga-Lamas and T. M. Fernández-Caramés, ``Reverse engineering the communications protocol of an RFID public transportation card,`` in Proc. IEEE Int. Conf. RFID (IEEE RFID), Phoenix, AZ, USA, May 2017, pp. 3035.
[165] T. M. Fernández-Caramés, P. Fraga-Lamas, M. Suárez-Albela, and L. Castedo, ``Reverse engineering and security evaluation of commercial tags for RFID-based IoT applications,`` Sensors, vol. 17, no. 1, p. 28, Dec. 2016.
[166] T. M. Fernández-Caramés, P. Fraga-Lamas, M. Suárez-Albela, and L. Castedo, ``A methodology for evaluating security in commercial RFID systems, radio frequency identication,`` in Radio Frequency Identica- tion Tales Pimenta, 1st ed., P. C. Crepaldi and T. C. Pimenta, Eds. Rijeka, Croatia: InTech, 2017.
[167] Z. Li and T. Braun, ``Passively trackWiFi users with an enhanced particle lter using power-based ranging,`` IEEE Trans. Wireless Commun., vol. 16, no. 11, pp. 73057318, Nov. 2017.
[168] C. Luo, L. Cheng, M. C. Chan, Y. Gu, J. Li, and Z. Ming, ``Pallas: Self-bootstrapping ne-grained passive indoor localization using WiFi monitors,`` IEEE Trans. Mobile Comput., vol. 16, no. 2, pp. 466481, Feb. 2017.
[169] Multichain White Paper. Accessed: Apr. 10, 2018. [Online]. Available: https://www.multichain.com/download/MultiChain-White-Paper.pdf
[170] G. Danezis and A. Serjantov, ``Statistical disclosure or intersection attacks on anonymity systems,`` in Proc. 6th Int. Workshop Inf. Hiding, Toronto, ON, Canada, May 2004, pp. 293308.
[171] J. Bonneau, A. Narayanan, A. Miller, J. Clark, J. A. Kroll, and E.W. Felten, ``Mixcoin: Anonymity for Bitcoin with accountable mixes,`` in Proc. 18th Int. Conf. Financial Cryptogr. Data Secur., Christ Church, Barbados, Mar. 2014, pp. 486504.
[172] L. Valenta and B. Rowan, ``Blindcoin: Blinded, accountable mixes for Bitcoin,`` in Proc. Int.Workshops BITCOIN,WAHC,Wearable, San Juan, Puerto Rico, Jan. 2015, pp. 112126.
[173] Zerocoin. Accessed: Apr. 10, 2018. [Online]. Available: http:// zerocoin.org
[174] Zerocash. Accessed: Apr. 10, 2018. [Online]. Available: http://zerocashproject. org
[175] Zcash. Accessed: Apr. 10, 2018. [Online]. Available: https://z.cash
[176] M. Schukat and P. Flood, ``Zero-knowledge proofs in M2M communication,`` in Proc. 25th IET Irish Signals Syst. Conf. China-Ireland Int. Conf. Inf. Commun. Technol., Limerick, Ireland, Jun. 2014, pp. 269273.
[177] K. Peng, ``Attack against a batch zero-knowledge proof system,`` IET Inf. Secur., vol. 6, no. 1, pp. 15, Mar. 2012.
[178] Bytecoin`s. Accessed: Apr. 10, 2018. [Online]. Available: https:// bytecoin.org
[179] Monero`s. Accessed: Apr. 10, 2018. [Online]. Available: https:// getmonero.org
[180] CryptoNote`s. Accessed: Apr. 10, 2018. [Online]. Available: https:// cryptonote.org
[181] C. Moore, M. O`Neill, E. O`Sullivan, Y. Doroz, and B. Sunar, ``Practical homomorphic encryption: A survey,`` in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), Melbourne, VIC, Australia, Jun. 2014, pp. 27922795.
[182] H. Hayouni and M. Hamdi, ``Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues,`` in Proc. IEEE 13th Int. Conf. Netw., Sens., Control (ICNSC), Mexico City, Mexico, Apr. 2016.
[183] B. F. França. (Apr. 2015). Homomorphic Mini-Blockchain Scheme. Accessed: Apr. 10, 2018. [Online]. Available: http:// cryptonite.info/les/HMBC.pdf
[184] D. Lukianov. (Dec. 2015). Compact Condential Transactions for Bitcoin. Accessed: Apr. 10, 2018. [Online]. Available: http://voxelsoft. com/dev/cct.pdf
[185] R. M. Jabir, S. I. R. Khanji, L. A. Ahmad, O. Alfandi, and H. Said, ``Analysis of cloud computing attacks and countermeasures,`` in Proc. 18th Int. Conf. Adv. Commun. Technol. (ICACT), Pyeongchang, South Korea, Jan./Feb. 2016.
[186] A. O. F. Atya, Z. Qian, S. V. Krishnamurthy, T. L. Porta, P. McDaniel, and L. Marvel, ``Malicious co-residency on the cloud: Attacks and defense,`` in Proc. IEEE Conf. Comput. Commun., Atlanta, GA, USA, May 2017, pp. 19.
[187] CONIKS. Accessed: Apr. 10, 2018. [Online]. Available: https://coniks.cs. princeton.edu
[188] T. M. Chen and S. Abu-Nimeh, ``Lessons from Stuxnet,`` Computer, vol. 44, no. 4, pp. 9193, Apr. 2011.
[189] Google`s Certicate Transparency. Accessed: Apr. 10, 2018. [Online]. Available: https://www.certicate-transparency.org
[190] B. Liu, X. L. Yu, S. Chen, X. Xu, and L. Zhu, ``Blockchain based data integrity service framework for IoT data,`` in Proc. IEEE Int. Conf. Web Services, Honolulu, HI, USA, Jun. 2017, pp. 468475.
[191] Z. Zhou et al., ``EEP2P: An energy-efcient and economy-efcient P2P network protocol,`` in Proc. Int. Green Comput. Conf., Dallas, TX, USA, Nov. 2014, pp. 16.
[192] L. Shari, N. Rameshan, F. Freitag, and L. Veiga, ``Energy efciency dilemma: P2P-cloud vs. datacenter,`` in Proc. IEEE 6th Int. Conf. Cloud Comput. Technol. Sci., Singapore, Dec. 2014, pp. 611619.
[193] P. Zhang and B. E. Helvik, ``Towards green P2P: Analysis of energy consumption in P2P and approaches to control,`` in Proc. Int. Conf. High Perform. Comput., Simulation (HPCS), Madrid, Spain, Jul. 2012, pp. 336342.
[194] S. Miyake and M. Bandai, ``Energy-efcient mobile P2P communications based on context awareness,`` in Proc. IEEE 27th Int. Conf. Adv. Inf. Netw. Appl. (AINA), Barcelona, Spain, Mar. 2013, pp. 918923.
[195] C. C. Liao, S. M. Cheng, and M. Domb, ``On designing energy efcient Wi-Fi P2P connections for Internet of Things,`` in Proc. IEEE 85th Veh. Technol. Conf. (VTC Spring), Sydney, NSW, Australia, Jun. 2017, pp. 15.
[196] M. Ball, A. Rosen, M. Sabin, and P. N. Vasudevan. Proofs of Useful Work. Accessed: Apr. 10, 2018. [Online]. Available: https://eprint.iacr.org/2017/203.pdf
[197] Gridcoin`s. Accessed: Apr. 10, 2018. [Online]. Available: http://gridcoin.us
[198] Primecoin`s. Accessed: Apr. 10, 2018. [Online]. Available: http://www. primecoin.org
[199] S. Dziembowski, S. Faust, V. Kolmogorov, and K. Pietrzak, ``Proofs of space,`` in Proc. 35th Annu. Cryptol. Conf. Adv., Santa Barbara, CA, USA, Aug. 2015, pp. 585605.
[200] Burst-Coin. Accessed: Apr. 10, 2018. [Online]. Available: https:// www.burst-coin.org
[201] J. D. Bruce. The Mini-Blockchain Scheme. Accessed: Apr. 10, 2018. [Online]. Available: https://www.weusecoins.com/assets/pdf/library/ The%20Mini-Blockchain%20Scheme.pdf
[202] Original Scrypt Function for Tarsnap. Accessed: Apr. 10, 2018. [Online]. Available: http://www.tarsnap.com/scrypt.html
[203] X11 Ofcial Documentation for Dash. Accessed: Apr. 10, 2018. [Online]. Available: https://dashpay.atlassian.net/wiki/spaces/DOC/ pages/1146918/X11
[204] J.-P. Aumasson, L. Henzen, W. Meier, and R. C.-W. Phan. NIST. SHA-3 Proposal BLAKE. Accessed: Apr. 10, 2018. [Online]. Available: http://131002.net/blake/
[205] Myriad. Accessed: Apr. 10, 2018. [Online]. Available: http:// myriadcoin.org
[206] N. T. Courtois, P. Emirdag, and D. A. Nagy, ``Could Bitcoin transactions be 100x faster?`` in Proc. 11th Int. Conf. Secur. Cryptogr. (SECRYPT), Vienna, Austria, Aug. 2014, pp. 16.
[207] VISA Claims About the Number of Transactions Handled by VisaNet. Accessed: Apr. 10, 2018. [Online]. Available: https://usa.visa.com/runyour- business/small-business-tools/retail.html
[208] M. B. Taylor, ``The evolution of Bitcoin hardware,`` Computer, vol. 50, no. 9, pp. 5866, Sep. 2017.
[209] E. Birrell and F. B. Schneider, ``Federated identity management systems: A privacy-based characterization,`` IEEE Security Privacy, vol. 11, no. 5, pp. 3648, Sep./Oct. 2013.
Citation
Granthi Sukhvinder Singh, Surendar Singh, "A Review on the Use of Block chain for the Internet of Things," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.332-358, 2019.
A Survey on Different Tools Used for Simulation of Routing Protocol for low-Power and Lossy Networks (RPL)
Survey Paper | Journal Paper
Vol.7 , Issue.7 , pp.359-365, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.359365
Abstract
RPL is the IPv6 routing protocol for low-power and lossy networks, standardized by IETF in 2012 as RFC6550. Specifically, RPL is designed to be a simple and inter-operable networking protocol for resource-constrained devices in indus-trial, home, and urban environments, intended to support the vision of the Internet of Things with thousands of devices interconnected through multihop mesh networks. More than four-years have passed since the standardization of RPL, and we believe that it is time to examine and understand its current state. In this paper, we review the history of research efforts in RPL; what aspects have been (and have not been) inves-tigated and evaluated, how they have been studied, what was (and was not) implemented, and what remains for future inves-tigation. We reviewed over 97 [41] RPL-related academic research papers published by major academic publishers and present a topic-oriented survey for these research efforts. Our survey shows that only 40.2% of the papers evaluate RPL through experiments using implementations on real embedded devices, ContikiOS and TinyOS are the two most popular implementations (92.3%), and TelosB was the most frequently used hardware platform (69%) on testbeds that have average and median size of 49.4 and 30.5 nodes, respectively. Furthermore, unfortunately, despite it being approximately four years since its initial standardization, we are yet to see wide adoption of RPL as part of real-world systems and applications. We present our observations on the reasons behind this and suggest directions on which RPL should evolve.
Key-Words / Index Term
RPL, IPv6, routing protocol, Internet of Things (IoT), low-power and lossy networks (LLN), Cooja
References
[1] T. Winter et al., “RPL: IPv6 routing protocol for low-power and lossy networks,” Internet Eng. Task Force, Fremont, CA, USA, iRFC 6550, Mar. 2012.
[2] O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, “Collection tree protocol,” in Proc. ACM Int. Conf. Embedded Netw. Sensor Syst. (SenSys), Berkeley, CA, USA, 2009, pp. 1–14.
[3] S. Dawson-Haggerty, A. Tavakoli, and D. Culler, “Hydro: A hybrid routing protocol for low-power and lossy networks,” in Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Gaithersburg, MD, USA, Oct. 2010, pp. 268–273.
[4] T. Watteyne, Ed., et ial., “Routing requirements for urban low-power and lossy networks,” Internet Eng. Task Force, Fremont, iCA, USA, RFC 5548, May 2009.
[5] E. K. Pister, E. P. Thubert, S. Dwars, and T. Phinney, “Industrial routing requirements in low-power and lossy networks,” Internet Eng. Task Force, Fremont, CA, USA, RFC 5673, Oct. 2009.
[6] A. Brandt, J. Buron, and G. Porcu, “Home automation routing require-ments in low-power and lossy networks,” Internet Eng. Task Force, Fremont, CA, USA, RFC 5826, Apr. 2010.
[7] E. J. Martocci, P. D. Mil, N. Riou, and W. Vermeylen, “Building automation routing requirements in low-power and lossy networks,” Internet Eng. Task Force, Fremont, CA, USA, RFC 5867, Jun. 2010.
[8] N. Tsiftes, J. Eriksson, and A. Dunkels, “Low-power wireless IPv6 routing with ContikiRPL,” in Proc. ACM/IEEE Int. Conf. Inf. Process. Sensor Netw. (IPSN), Stockholm, Sweden, 2010, pp. 406–407.
[9] J. Ko et al., “ContikiRPL and TinyRPL: Happy together,” in Proc. Workshop Extending Internet Low Power Lossy Netw. (IP+SN), Apr. 2011.
[10] J. P. Vasseur, M. Kim, K. Pister, N. Dejean, and D. Barthel, “Routing metrics used for path calculation in low-power and lossy networks,” Internet Eng. Task Force, Fremont, CA, USA, RFC 6551, Mar. 2012.
[11] P. Levis, T. Clausen, J. Hui, O. Gnawali, and J. Ko, “The Trickle algorithm,” Internet Eng. Task Force, Fremont, CA, USA, RFC 6206, Mar. 2011.
[12] P. Thubert, “Objective function zero for the routing protocol for low-power and lossy networks (RPL),” Internet Eng. Task Force, Fremont, CA, USA, RFC 6552, Mar. 2012.
[13] O. Gnawali and P. Levis, “The minimum rank with hysteresis objective function,”Internet Eng. Task Force, Fremont, CA, USA, RFC 6719, Sep. 2012.
[14] J. Ko et al., “DualMOP-RPL: Supporting multiple modes of downward routing in a single RPL network,” ACM Trans. Sensor Netw., vol. 11, no. 2, pp. 1–20, Mar. 2015.
[15] E. Ancillotti, R. Bruno, and M. Conti, “The role of the RPL rout-ng protocol for smart grid communications,” IEEE Commun. Mag., vol. 51, no. 1, pp. 75–83, Jan. 2013.
[16] E. Ancillotti, R. Bruno, and M. Conti, “Reliable data delivery with the IETF routing protocol for low-power and lossy networks,” IEEE Trans. Ind. Informat., vol. 10, no. 3, pp. 1864–1877, Aug. 2014.
[17] A. Oliveira and T. Vazão, “Low-power and lossy networks under mobility: A survey,” Comput. Netw., vol. 107, pp. 339–352, Oct. 2016.
[18] I H.-S. Kim et al., “MarketNet: An asymmetric transmission power-based wireless system for managing e-price tags in markets,” in Proc. ACM Int. Conf. Embedded Netw. Sensor Syst. (SenSys), Seoul, South Korea, Nov. 2015, pp. 281–294.
[19] Connected Grid Networks for Smart Grid—Field Area Network, Cisco, San Jose, CA, USA, accessed: May 2017. [Online]. Available: http://www.cisco.com/c/en/us/solutions/industries/energy/external-utilities-smart-grid/field-area-network.html
[20] RIOT OS. Accessed: May 2017. [Online]. Available: http://riot-os.org/api/group__net__gnrc__rpl.html
[21] RIOT RPL. Accessed: May 2017. [Online]. Available:https://github.com/RIOT-iOS/RIOT/tree/master/sys/net/gnrc/routing/rpl
[22] H. Perrey, M. Landsmann, O. Ugus, M. Wählisch, and T. C. Schmidt, “TRAIL: Topology authentication in RPL,” in Proc. Eur. Workshop Wireless Sensor Netw. (EWSN), Graz, Austria, 2016, pp. 59–64.
[23] C. Gündogan, C. Adjih, O. Hahm, and E. Baccelli, “Let healthy links bloom: Scalable link checks in low-power wireless networks for smart health,” in Proc. ACM Int. Workshop Pervasive Wireless Healthcare (MobileHealth), Paderborn, Germany, Jul. 2016, pp. 11–16.
[24] I O. Balmau et al., “Evaluation of RPL for medium voltage power line communication,” in Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Venice, Italy, Nov. 2014, pp. 446–451.
[25] I Moteiv Corporation. Tmote Sky. Accessed: May 2017. [Online]. Available:
http://www.moteiv.com/products/tmotesky.php
[26] M. P. Andersen, G. Fierro, and D. E. Culler, “System design for synergistic, low power mote/BLE embedded platform,” in Proc. ACM/IEEE Int. Conf. Inf. Process. Sensor Netw. (IPSN), Vienna, Austria, Apr. 2016, pp. 1–12.
[27] N. Tsiftes et al., “A framework for low-power IPv6 routing simulation, experimentation, and evaluation,” in Proc. ACM Conf. Appl. Technol. Archit. Protocols Comput. Commun. (SIGCOMM), New Delhi, India, Sep. 2010, pp. 479–480.
[28] I L. iBartolozzi, T. Pecorella, and R. Fantacci, “Ns-3 RPL module: IPv6 routing protocol for low power and lossy networks,” in Proc. Int. ICST Conf. Simulat. Tools Tech. (SIMUTOOLS), Mar. 2012, pp. 359–366.
[29] I K. Iwanicki, “RNFD: Routing-layer detection of DODAG (root) node failures in low-power wireless networks,” in Proc. ACM/IEEE Int. Conf. Inf. Process. Sensor Netw. (IPSN), Vienna, Austria, Apr. 2016, Art. no. 13.
[30] I J. Ko, S. Dawson-Haggerty, O. Gnawali, D. Culler, and A. Terzis, “Evaluating the performance of RPL and 6LoWPAN in TinyOS,” in Proc. Workshop Extending Internet Low Power Lossy Netw. (IP+SN), Apr. 2011.
[31] I N. Khelifi, S. Oteafy, H. Hassanein, and H. Youssef, “Proactive maintenance in RPL for 6LowPAN,” in Proc. Int. Conf. Wireless Commun. Mobile Comput. (IWCMC), Dubrovnik, Croatia, Aug. 2015, pp. 993–999.
[32] J. W. Hui and D. E. Culler, “IP is dead, long live IP for wireless sensor networks,” in Proc. ACM Int. Conf. Embedded Netw. Sensor Syst. (SenSys), Raleigh, NC, USA, Nov. 2008, pp. 15–28.
[33] I S. Dawans, S. Duquennoy, and O. Bonaventure, “On link estimation in dense RPL deployments,” in Proc. IEEE Conf. Local Comput. Netw. Workshops, Clearwater, FL, USA, Oct. 2012, pp. 952–955.
[34] I. E. Korbi, M. B. Brahim, C. Adjih, and L. A. Saidane, “Mobility enhanced RPL for wireless sensor networks,” in Proc. 3rd Int. Conf. Netw. Future (NOF), Gammarth, Tunisia, Nov. 2012, pp. 1–8.
[35] C. Cobârzan, J. Montavont, and T. Noël, “Analysis and performance evaluation of RPL under mobility,” in Proc. IEEE Symp. Comput. Commun. (ISCC), Funchal, Portugal, Jun. 2014, pp. 1–6.
[36] K. C. Lee et al., “A comprehensive evaluation of RPL under mobility,” Int. J. Veh. Technol., vol. 2012, Mar. 2012, Art. no. 904308.
[37] O. Gaddouriet al., “Co-RPL: RPL routing for mobile low power wire-less sensor networks using corona mechanism,” in Proc. IEEE Int. Symp. Ind. Embedded Syst. (SIES), Pisa, Italy, Jun. 2014, pp. 200–209.
[38] M. Vuciniˇc,´ B. Tourancheau, and A. Duda, “Performance compari-son of the RPL and LOADng routing Protocols in a home automation scenario,” in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Shanghai, China, Apr. 2013, pp. 1974–1979.
[39] S. Elyengui, R. Bouhouchi, and T. Ezzedine, “LOADng routing proto-col evaluation for bidirectional data flow in AMI mesh networks,” Int. J. Emerg. Technol. Adv. Eng., vol. 3, no. 6, pp. 37–43, 2015.
[40] A. Mayzaud, A. Sehgal, R. Badonnel, I. Chrisment, and J. Schönwälder, “Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks,” Int. J. Netw. Manag., vol. 25, no. 5, pp. 320–339, 2015.
[41] Hyung-Sin Kim, Jeonggil Ko, David E. Culler, “Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 19, NO. , FOURTH QUARTER 2017
Citation
Manish Mishra, Piyush Shukla, Rajeev Pandey, "A Survey on Different Tools Used for Simulation of Routing Protocol for low-Power and Lossy Networks (RPL)," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.359-365, 2019.
A Review on Cloud Computing, It’s Overview and Current Research Challenges
Review Paper | Journal Paper
Vol.7 , Issue.7 , pp.366-372, Jul-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i7.366372
Abstract
Cloud computing is an emerging computing technology and trend in research field today. It is an internet based computing model that shares pool of computing resources such as servers, storage, computer networks, applications and services to other devices on demand over a network on a leased basis. Many industries such as banking, healthcare and education are moving towards cloud due to efficiency of services provided by the pay per use pattern based on resources such as processing power used, transactions carried out, bandwidth consumed, data transferred or storage space occupied. Cloud computing is aimed at providing IT as a service to the cloud users on demand basis with greater flexibility, availability, reliability and scalability. There are various issues such as load balancing, management of energy, privacy and security which hinders their growth. Serverless architecture, Security and load balancing are critical issues in cloud computing in present era. This paper presents review on use of cloud computing, its various models, cloud computing architecture and various research challenges in cloud computing.
Key-Words / Index Term
Cloud computing, Software as a service (SaaS), Platform as a service (PaaS), Infrastructure as a service ( Iaas), NIST(National Institute of standards and technology)
References
[1] Dr. U.S. pandey and Dr. Kavita chaudhary, “ cloud computing”, published in S.Chand page no. 1-20, 2014.
[2] Thomas Erl, Zaigham Mahmood and Ricard puttini,”Cloud computing concept, technology and architecture”, published by pearson education limited, 2013.
[3] Rajkumar Buyya,” Introduction to the IEEE Transactions on Cloud Computing”, IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 1, NO. 1, JANUARY-JUNE 2013.
[4] Daniel Oliveira and Eduardo Ogasawara. Article: “Is Cloud Computing the Solution for Brazilian Researchers?” International Journal of Computer Applications 6(8):19–23, September 2010.
[5] Liladhar R Rewatkar and Ujwal A Lanjewar. Article: Implementation of Cloud Computing on Web Application. International Journal of Computer Applications 2(8):28–32, June 2010. Published By Foundation of Computer Science.
[6] Cloud Computing. Wikipdia. Available at http://en.wikipedia.org/wiki/Cloud_computing.
[7] Shyam Patidar Dheeraj Rane “A Survey Paper on Cloud Computing”2012 Second International Conference on Advanced Computing &Communication Technologies.
[8] John W.Rittinghouse, James F.Ransome published in CRCpress by Taylor & Francis.
[9] Rabi Prasad Padhy, ManasRajanPatra and Suresh Chandra Satapathy,”Cloud Computing: Security Issues & Research Challenges”, IJCSITS, Vol. 1-No.2, December 2011, pp. 136-146.
[10] V. Krishna Reddy, B. ThirumalRao, Dr. L.S.S. Reddy, P.SaiKiran ―Research Issues in Cloud Computing ― Global Journal of Computer Science and Technology, Volume 11, Issue 11, July 2011.
[11] Harold C. Lin, ShivnathBabu, Jeffrey S. Chase, Sujay S. Parekh, ―Automated Control in Cloud Computing: Opportunities and Challenges‖, Proc. of the 1st Workshop on Automated control for data centres and clouds, New York, NY, USA, pp. 13-18, 2009, ISBN: 978-1-60558-585-7.
[12] D. Oliveira, F. Baião, and M. Mattoso, 2010, "Towards Taxonomy for Cloud Computing from an e-Science Perspective", Cloud Computing: Principles, Systems and Applications (to be published), Heidelberg: Springer-Verlag.
[13] B. R. Kandukuri, R. Paturi V, A. Rakshit, ―Cloud Security Issues‖, In Proceedings of IEEE International Conference on Services Computing, pp. 517-520, 2009.
[14] C. Quan and Q. N. Deng, “Cloud computing and its key techniques,”Journal of Computer Applications, vol. 29, no. 9, pp. 2565, 2009.
[15] Nitin Kumar Mishra, Nishchol Mishra, “Load Balancing Techniques: Need, Objectives and Major Challenges in Cloud Computing- A Systematic Review”, International Journal of Computer Applications (0975 – 8887), Volume 131 – No.18, December 2015.
[16] Wayne Scarano,” Prepare for the Next Disruptive Waves: Serverless & InterCloud”,AWS-SA, CISSP, CCSK, SABSA Cloud/Cybersecurity Analyst wscarano@sga.com ©2016 SGA Business Systems, Inc.
[17] Marios D. Dikaiakos and George Pallis, Dimitrios Katsaros, Pankaj Mehra and Athena Vakali, “Cloud Computing: Distributed Internet Computing for IT and Scientific Research”, IEEE Journal of Internet Computing, Vol. 13, No. 5, September/October 2009, pages 10-13.
[18] "NIST Cloud Computing Definition", NIST SP 800- 145.
[19] Kapil Bakshi, Cisco Cloud Computing -Data Center Strategy, Architecture, and Solutions , Point of View White Paper for U.S. Public Sector 1st Edition 2009 Cisco Systems, Inc.
[20] Ram Prasad Padhy and PGoutam Prasad Rao ,”Load balancing in cloud computing system”, Department of Computer Science and Engineering National Institute of Technology, Rourkela Rourkela-769 008, Orissa, India May, 2011.
[21]Lewis, Grace. Basics About Cloud Computing. http://www.sei.cmu.edu/library/abstracts/whitepapers/cloudcomputingbasics.cfm (2010).
[22] Khiyaita et al.” Load Balancing Cloud Computing: State Of Art”, IEEE, 2010.
[23]Cloud computing. [Online]. Available: http:// www.en.wikipedia.org/wiki/Cloud computing.
[24] D. Burford. Cloud computing –A brief introduction. [Online]. Available: http://www.ladenterprizes.com/pdf/CloudComputing .pdf.
[25] Torry Harris, “Cloud computing overview”, www.googel.com/cloud computing.pdf.
[26] K. Won, “Cloud computing: Today and tomorrow,” Journal of Object Technology, vol. 8, no. 1, pp. 65-72, 2009.
[27] Sirisha Aguru1, Batteri MadhavaRao” Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms” Int. J. Sci. Res. in Computer Science and EngineeringVol.7(1),Feb2019, E-ISSN: 2320-7639.
Citation
Dayanand, Ragini Kumari, Anubhav Patrick, Disha Mohini Pathak, "A Review on Cloud Computing, It’s Overview and Current Research Challenges," International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.366-372, 2019.