Volume 12, Issue 2, May 2021
Cryptography Based IoT Hybrid Security Model Using Authorization Framework |
Pages: 1-8 (8) | [Full Text] PDF (481K) |
H. M. Yousaf |
Department of Computer Science and Engineering |
Abstract - The Internet of Things (IoT) is perceived to be the technology of the future according to the latest trends in the information technology industry, the everyday real-life objects are transformed into smart virtual objects in the IoT paradigm, that is the Internet of Things makes smart real-world objects the cornerstones of the creation of smart structure. The key concern of IoT is its Security. One of IoT ’s prime features is to enable ubiquitous access to IoT device services and environmental monitoring using sensory data. existing IoT devices are too focused on the operation’s mobility and dynamic nature. All these factors reduce the strength of physical security in this hardware, thus reducing the level of system security and can take advantage of the lightweight and distributed nature of the IoT network. However, the existing security solutions unable to address and close the security loop holes for the purpose of securing the network of IoT. In this research we highlight the issue of existing security solutions regarding to IoT, Create a security model for hybrid Security model with Open authorization Framework. Use the Application Server and the open authorization framework to improve IoT security. MQTT is integrated with proposed model for secure message passing. |
Index Terms - Hybrid Security, IoT Security, MQTT and Open Authorization |
Computational Intelligence in Wireless Sensory Networks |
Pages: 9-20 (12) | [Full Text] PDF (753K) |
Onoja Emmanuel Oche, Fatima Adamu Umar, Suleiman Muhammad Nasir, Adegboye Yusuf Kazeem |
Department of Cyber Security. Federal University of Technology Minna Department of Computer Science, National Open University of Nigeria Computer Science Department Federal Polytechnic Nasarawa Federal Polytechnic Nasarawa |
Abstract - Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. They are event-monitoring and data collecting devices which are tightly distributed, lightweight nodes deployed in large number to monitor the environment or system and collectively work for several tasks like intrusion detection, weather forecasting, event detection, health and area monitoring. The main challenges facing the operation of WSN are limited energy saving capability to prolong the network lifetime, communication failures, limited storage capability, computational constraints, data aggregation and fusion, energy aware routing, task scheduling, security, optimal deployment and localization. Computational intelligence (CI) which is a branch of artificial intelligence, capable of analyzing adaptive mechanisms to enable or facilitate intelligent behaviour in complex and changing environment have been successfully applied in wireless sensory network to address some of its challenges. This paper investigates and discuss in detail the various types, application and challenges of Wireless sensor networks. In order to find possible solution to the identified challenges of Wireless sensory networks, common computational intelligence (CI) paradigms such as fuzzy systems, artificial neural networks, evolutionary algorithm and swarm intelligence were discussed as possible solutions. |
Index Terms - Wireless Sensory Networks (WSNs), Computational Intelligence (CI), Reinforcement Learning, Evolutionary Algorithm, Artificial Immune System, Neural Network, Artificial Intelligence and Fuzzy Logic |
Centralized Solution for Deadlock Detection in the Distributed System |
Pages: 21-25 (5) | [Full Text] PDF (193K) |
Ansa Shahzadi, Muhammad Aurangzaib |
Department of Computer Science, University of Engineering and Technology, Lahore |
Abstract - In a split database system, detecting a deadlock is difficult since no monitor has completed and updated the data about the system and its data dependencies. In a circulating database system that uses locking as a concurrency control approach, there is a deadlock problem. The goal of this research is to investigate deadlock detection in circulating database systems in depth. To find dead spots, we employ a range of techniques. By sending priority to the procedures, our intended technique detects and resolves deadlocks while the initiator is indirectly or directly involved and eliminates superfluous messages in concurrent algorithm application. |
Index Terms - Deadlock Cycle, Detect Deadlock for Local & Global Cycle and Deadlock Prevention |
Pages: 28-35 (8) | [Full Text] PDF (426K) |
Abstract - |
Index Terms - |
Pages: 36-42 (7) | [Full Text] PDF (433K) |
Abstract - |
Index Terms - |