BookPDF Available

Computational Intelligent Security in Wireless Communications

Authors:

Abstract and Figures

Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security. It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval. The book: Discusses computational algorithms for system modeling and optimization in security perspective Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies Explores a group of practical research problems where security experts can help develop new data-driven methodologies Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
Content may be subject to copyright.
Computational Intelligent
Security in Wireless
Communications
Wireless network security research is multidisciplinary in nature, including data
analysis, economics, mathematics, forensics, information technology, and computer
science. This text covers cutting-edge research in computational intelligence systems
from diverse elds on the complex subject of wireless communications security.
It discusses important topics including computational intelligence in wireless
networks and communications, articial intelligence and wireless communications
security, security risk scenarios in communications, security/resilience metrics
and their measurements, data analytics of cybercrimes, modeling of wireless
communications security risks, advances in cyber threats and computer crimes,
adaptive and learning techniques for secure estimation and control, decision support
systems, fault tolerance and diagnosis, cloud forensics and information systems, and
intelligent information retrieval.
The book –
Discusses computational algorithms for system modeling and optimization
from a security perspective.
Focuses on error prediction and fault diagnosis through intelligent
information retrieval via wireless technologies.
Explores a group of practical research problems where security experts can
help develop new data-driven methodologies.
Covers application on articial intelligence and wireless communications
security risk perspectives.
The text is primarily written for senior undergraduate students, graduate students,
and researchers in the elds of electrical engineering, electronics and communication
engineering, and computer engineering.
The text comprehensively discusses a wide range of wireless communications
techniques with emerging computational intelligent trends, to help readers
understand the role of wireless technologies in applications touching various spheres
of human life with the help of hesitant fuzzy set-based computational modeling. It
will be a valuable resource for senior undergraduate students, graduate students, and
researchers in the elds of electrical engineering, electronics and communication
engineering, and computer engineering.
Wireless Communications and Networking Technologies:
Classications, Advancement and Applications
Series Editor:
D.K. Lobiyal, R.S. Rao and Vishal Jain
The series addresses different algorithms, architecture, standards and protocols,
tools and methodologies which could be benecial in implementing next generation
mobile network for the communication. Aimed at senior undergraduate students,
graduate students, academic researchers and professionals, the proposed series will
focus on the fundamentals and advances of wireless communication and networking,
and their such as mobile ad-hoc network (MANET), wireless sensor network (WSN),
wireless mess network (WMN), vehicular ad-hoc networks (VANET), vehicular
cloud network (VCN), vehicular sensor network (VSN) reliable cooperative network
(RCN), mobile opportunistic network (MON), delay tolerant networks (DTN), ying
ad-hoc network (FANET) and wireless body sensor network (WBSN).
Cloud Computing Enabled Big-Data Analytics in Wireless Ad-hoc Networks
Sanjoy Das, Ram Shringar Rao, Indrani Das, Vishal Jain and Nanhay Singh
Smart Cities
Concepts, Practices, and Applications
Krishna Kumar, Gaurav Saini, Duc Manh Nguyen, Narendra Kumar
and Rachna Shah
Wireless Communication
Advancements and Challenges
Prashant Ranjan, Ram Shringar Rao, Krishna Kumar and Pankaj Sharma
Wireless Communication with Articial Intelligence
Emerging Trends and Applications
Anuj Singal, Sandeep Kumar, Sajjan Singh and Ashish Kr. Luhach
Computational Intelligent Security in Wireless Communications
Suhel Ahmad Khan, Rajeev Kumar, Omprakash Kaiwartya, Mohammad Faisal
and Raees Ahmad Khan
For more information about this series, please visit: https://www .routledge .com /
Wire l ess %20 C om m unic at i o ns %2 0a nd %2 0 Netwo rk ing %20Tec hn o l o gies /b ook -
series /WCANT
Computational Intelligent
Security in Wireless
Communications
Edited by
Suhel Ahmad Khan, Rajeev Kumar,
Omprakash Kaiwartya, Mohammad Faisal,
and Raees Ahmad Khan
First edition published 2023
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
and by CRC Press
4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
CRC Press is an imprint of Taylor & Francis Group, LLC
© 2022 selection a nd editorial mat ter, [Suhel Ahmad Kh an, Rajeev Kumar, Ompr akash Kaiwar tya, Mohammad
Faisal, and Raees Ahmad Khan]; individual chapters, the contributors
Reasonable effor ts have been made to publish reliable data and i nformation, but the aut hor and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The aut hors and publish-
ers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission to publish in this form has not been obtained. If any copyright material has not
been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit-
ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented,
including phot ocopying, microlm ing, and recording, or i n any information stora ge or retrieval system, witho ut
written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www .copyright .com or con-
tact the Copyright Clea rance Center, Inc. (CCC), 222 Rosewood Dr ive, Danvers, MA 01923, 978-750-840 0. For
works that are not available on CCC please contact mpkbookspermissions @tandf .co .uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only
for identication and explanation without intent to infringe.
ISBN: 9781032081663 (hbk)
ISBN: 9781032347028 (pbk)
ISBN: 9781003323426 (ebk)
DOI: 10.1201/9781003323426
Typeset in Times
by Deanta Global Publishing Services, Chennai, India
v
Contents Contents
Contents
Preface......................................................................................................................vii
Editors ....................................................................................................................... ix
Acknowledgment ......................................................................................................xi
Contributor List ...................................................................................................... xiii
Chapter 1 An investigation on Cooperative Communication Techniques
in Mobile Ad-Hoc Networks ................................................................1
Prasannavenkatesan Theerthagiri
Chapter 2 IoE-Based Genetic Algorithms and Their Requisition ...................... 25
Neeraj Kumar Rathore, and Shubhangi Pande
Chapter 3 A Framework for Hybrid WBSN-VANET-based Health
Monitoring Systems ........................................................................... 51
Pawan Singh, Ram Shringar Raw, and Dac-Nhuong Le
Chapter 4 Managing IoT – Cloud-based Security: Needs and Importance ........ 63
Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey,
Rajat Sharma, Yogesh Pal, Bineet Kumar Gupta, and Alka Agrawal
Chapter 5 Predictive Maintenance in Industry 4.0 ............................................. 79
Manoj Devare
Chapter 6 Fast and Efcient Lightweight Block Ciphers Involving
2d-Key Vectors for Resource-Poor Settings ...................................... 99
Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao, and
M. Raghavender Sharma
Chapter 7 Sentiment Analysis of Scraped Consumer Reviews (SASCR)
Using Parallel and Distributed Analytics Approaches on Big
Data in Cloud Environment.............................................................. 121
Mahboob Alam, Mohd. Amjad, and Mohd. Amjad
Chapter 8 The UAV-Assisted Wireless Ad hoc Network .................................. 131
Mohd Asim Sayeed, Raj Shree, and Mohd Waris Khan
vi Contents
Chapter 9 Integrating Cybernetics into Healthcare Systems:
Security Perspective ......................................................................... 161
Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad,
Kanika Sharma, Amal Krishna Sarkar, Alka Agrawal, and
Ranjit Rajak
Chapter 10 Threats and Countermeasures in Digital Crime and
Cyberterrorism ................................................................................. 173
Mohit Kumar, Ram Shringar Raw, and Bharti Nagpal
Chapter 11 Cryptography Techniques for Information Security: A Review ...... 191
Ganesh Chandra, Satya Bhushan Verma, and Abhay Kumar Yadav
Chapter 12 A Critical Analysis of Cyber Threats and Their Global Impact ...... 201
Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello,
and Halima Sadia
Chapter 13 A Cybersecurity Perspective of Machine Learning Algorithms .........221
Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad,
Mohd Faizan, Nitish Pathak, Majid Zaman, and Alka Agrawal
Chapter 14 Statistical Trend in Cyber Attacks and Security Measures ..............241
Shirisha Kakarla, Deekonda Narsinga Rao, Geeta Kakarla,
and Srilatha Gorla
Index ...................................................................................................................... 259
vii
Preface
The widespread use of wireless technology in our daily lives has resulted in the
increased demand for these devices. While the widespread use of wireless com-
munications systems provides undeniable benets to consumers, the communication
exchanges are vulnerable to adversarial assaults due to the open broadcast nature of
the wireless signals.
Wireless communications systems, unlike their wired equivalents, have major
security risks from the physical layer to the application layer, which makes them
less versatile than their wired counterparts. Security measures should be available to
the user in order to secure wireless communications from harmful attacks. Wireless
communications infrastructure and services require regular upgradation to man-
age the rapidly increasing demands to improve wireless communications security
to ght against cybercriminal activities, especially because more and more people
are using wireless networks (e.g., cellular networks and Wi-Fi) for online banking
and personal emails, owing to the widespread use of smartphones. Wireless com-
munications makes transmission of data more valuable than wired communication.
Wireless communications have more vulnerable, secure, passive eavesdropping for
data interception and active jamming. It needs authenticity, availability, condential-
ity, and integrity requirements. To ensure the requirements, we need to design the
wireless communications system to be secure and easy, to gain the users’ satisfaction.
Further, due to the rapid expansion of modern and developing information tech-
nology such as social media, articial intelligence, big data, Internet of Things (IoT),
and smart devices in the past several decades, cyber threats and computer crimes
have escalated in recent decades. Organizations due to actual and suspected cyber
threats correlated with such developments have slowed the implementation of big
data and the cloud. Secure communication will protect the cyber risks and it is an
emerging area of ongoing research, as there is generally no clear view of how to
model cyber risk and therefore how to price it. For companies, the value of cyber/
wireless communications protection is rising. Security of wireless communications
implies the ability to develop and assess a typology of cyber offenses and cyber
threats in order to address them.
Wireless communications security research is multidisciplinary in nature, includ-
ing researchers from data analysis, economics, mathematics, forensics, information
systems, information technology, and computer science. The proposed book delivers
an ideal platform to gather leading-edge work from diverse elds on the complex
subject of Computational Intelligence Security in Wireless Communications.
ix
Editors
Suhel Ahmad Khan is currently working as Assistant Professor in the Department
of Computer Science, Indira Gandhi National Tribal University (A Central
University), Amarkantak, Madhya Pradesh, India. He has 10 years of teaching
and research experience. His areas of interest are Software Engineering, Software
Security, Security Testing, Cyber Security, and Network Security. He has completed
one major research project with PI funded by UGC, New Delhi, India. He has pub-
lished numerous papers in international journals and conferences including IEEE,
Elsevier, IGI Global, Springer, etc. He is an active member of various professional
bodies such as IAENG, ISOC-USA, IACSIT, and UACEE.
Dr. Rajeev Kumar is currently working as Associate Professor in the Department of
Computer Science and Engineering, Babu Banarsi Das University, Lucknow, Uttar
Pradesh, India. He is a young and energetic researcher and has worked on two major
projects (with PI) funded by University Grants Commission, New Delhi, India and
Council of Science & Technology, Uttar Pradesh (CST-UP), India. He has more than
ve years of research and teaching experience. He has published numerous papers
in international journals and conferences including IEEE, Elsevier, IGI Global,
Springer, etc. His research interests are in the different areas of Security Engineering
and Computational Techniques.
Omprakash Kaiwartya is currently working at the School of Science and
Technology, Nottingham Trent University (NTU), Nottingham, UK, as Senior
Lecturer and Course Leader for MSc Engineering (Electronics, Cybernetics and
Communications). Previously, he was a research associate (equivalent to Senior
Lecturer) in the Department of Computer and Information Science at Northumbria
University, Newcastle, UK, where, he was involved in the gLINK, European
Union project. Prior to this, he was a post-doctoral fellow (equivalent to Lecturer)
in the Faculty of Computing, University of Technology (UTM), Johor, Malaysia.
Before moving to Malaysia, he completed his BSc in Computer Science from Guru
Ghansidas Central University, Bilaspur, Chhattisgarh, India, and combined MSc
and Ph.D. from the School of Computer and Systems Science, Jawaharlal Nehru
University (JNU), New Delhi, India. Overall, he has authored/co-authored over 100
international publications including journal articles, conference proceedings, book
chapters, and books. His research interest focuses on IoT-centric smart environment
for diverse domain areas including transport, healthcare, and industrial produc-
tion. His recent scientic contributions are in Internet of Connected Vehicles (IoV),
EMobility, Electronic Vehicles Charging Management (EV), Internet of Healthcare
Things (IoHT), Smart use case implementation of Sensor Networks, and Next
Generation Wireless Communication Technologies (6G and Beyond). Furthermore,
he is Fellow of Higher Education Academy (FHEA), IEEE Senior Member and
BCS Professional Member. He has served as a TPC member and reviewer in 100+
xEditors
international conferences and workshops including IEEE Globecom, IEEE ICC,
IEEE CCNC, IEEE ICNC, IEEE VTC, IEEE INFOCOM, ACM CoNEXT, ACM
MobiHoc, ACM SAC, and many more. Furthermore, he has been reviewing papers for
30+ international journals including IEEE Magazines on Wireless Communications,
Networks, Communications, IEEE Communications Letters, IEEE Sensors Letters,
IEEE Transactions on Industrial Informatics, Vehicular Technologies, Intelligent
Transportation Systems, Big Data, and Mobile Computing. Moreover, he has
been an editorial member of various special issues with top-ranked journals in
Communication Society and serving as Associate Editor of IET Intelligent Transport
Systems, IEEE Internet of Things Journal, Springer, EURASIP Journal on Wireless
Communication and Networking, MDPI Electronics, Ad-Hoc and Sensor Wireless
Networks, and KSII Transactions on Internet and Information Systems.
Mohammad Faisal is currently working as Associate Professor and Head of the
Department in the Department of Computer Application, Integral University,
Lucknow, Uttar Pradesh, India. He has more than 15 years of teaching and research
experience. His areas of interest are Software Engineering, Requirement Volatility,
Distributed Operating System, Cyber Security, and Mobile Computing. He has pub-
lished a book “Requirement Risk Management: A Practioner’s Approach” published
by Lambert Academic Publication, Germany, ISBN: 978-3-659-15494-2. He has
published quality research papers in journals and national and international confer-
ences of repute. He is contributing his knowledge and experience as a member of
the Editorial Board/Advisory committee and TPC in various international journals/
conferences of repute. He is an active member of various professional bodies such as
IAENG, CSTA, ISOC-USA, EASST, HPC, ISTE, IAENG, and UACEE.
Raees Ahmad Khan (Member, IEEE, ACM, CSI, etc.) is currently working as
Professor and Head of the Department in the Department of Information Technology,
Dean of School for Information Science and Technology, Babasaheb Bhimrao
Ambedka r University (A Central University), Vidya Vihar, Raebareli Road, Lucknow,
India. He has more than 20 years of teaching and research experience. He has pub-
lished more than 300 research publications with good impact factors in reputed inter-
national journals and conferences including IEEE, Springer, Elsevier, Inderscience,
Hindawi, IGI Global, etc. He has published a number of national and international
books (authored and edited) (including Chinese language). His research interests are
in the different areas of Security Engineering and Computational Techniques.
xi
Acknowledgment
The authors wish to express their sincere thanks to all those who participated in
developing and evaluating the work contained in this book. The authors are espe-
cially grateful to CRC publishing and their representatives for administering and
monitoring the process of the development of the manuscript, and for exercising such
care and expertise to see the work of this book through to publication.
We are also thankful to all who participated in the review process of the book’s
chapters. The authors would also like to thank Mr. Gauravjeet Singh Reen, Senior
Commissioning Editor-Engineering, for communicating, correcting errors, and
careful reading of the various materials during the process of developing the book.
Thanks also go to Dr. Ram Shringar Raw for his reading and administering the
material in this book and for communicating with various parties during the process
of nalizing the material covered by the book.
Dr. Suhel Ahmad Khan
Dr. Rajeev Kumar
Dr. Omprakash Kaiwartya
Dr. Mohammad Faisal
Prof. Raees Ahmad Khan
xiii
Contributor List
Syed Adnan Afaq
Integral University, Lucknow, Uttar
Pradesh, India
Alka Agrawal
Babasaheb Bhimrao Ambedkar
University, Lucknow, Uttar Pradesh,
India
Masood Ahmad
Babasaheb Bhimrao Ambedkar
University, Lucknow, Uttar Pradesh,
India
Mahboob Alam
Jamia Millia Islamia University,
NewDelhi, India
Saquib Ali
Department of BCA, Azad Degree
College, University of Lucknow,
Lucknow, Uttar Pradesh, India
Mohd. Amjad
Jamia Millia Islamia University,
NewDelhi, India
Ganesh Chandra
Goel Institute of Technology and
Management, Lucknow, Uttar
Pradesh, India
Manoj Devare
Amity University, Bhatan Pada,
Maharashtra, India
Mohd. Faizan
Babasaheb Bhimrao Ambedkar
University, Lucknow, Uttar Pradesh,
India
Srilatha Gorla
Ministry of Electronics and Information
Technology, Hyderabad, Telangana,
India
Bineet Kumar Gupta
Shri Ramswaroop Memorial University,
Barabanki, Uttar Pradesh, India
Vanshita Gupta
Kamla Nehru Institute of Technology,
Sultanpur, Uttar Pradesh, India
Mohd. Shahid Husain
University of Technology and Applied
Sciences, CAS-Ibri Campus, Oman
Geeta Kakarla
Department of CSE, Sreenidhi
Institute of Science and Technology,
Hyderabad, Telangana, India
Shirisha Kakarla
Department of CSE, Sreenidhi
Institute of Science and Technology,
Hyderabad, Telangana, India
Jalaluddin Khan
University of Electronic Science
and Technology of China,
Chengdu,China
Mohd. Waris Khan
Integral University, Lucknow, Uttar
Pradesh, India
Mohit Kumar
NSUT East Campus Formerly
Ambedkar Institute of Advanced
Communication Technologies and
Research, New Delhi, India
xiv Contributor List
Dac-Nhuong Le
Faculty of Information Technology,
Hai Phong University, Hai Phong,
Vietnam
Jian Ping Li
University of Electronic Science and
Technology of China, Chengdu,
China
Bharti Nagpal
NSUT East Campus Formerly
Ambedkar Institute of Advanced
Communication Technologies and
Research, New Delhi, India
Mohd. Naseem
Baba Ghulam Shah Badshah University,
Rajouri, Jammu and Kashmir, India
Yogesh Pal
Shri Ramswaroop Memorial University,
Barabanki, Uttar Pradesh, India
Shubhangi Pande
Shri G. S. Institute of Technology and
Science (SGSITS), Indore, Madhya
Pradesh, India
Abhishek Kumar Pandey
Department of Computer Science,
M.L. K. PG. College, Balrampur,
India
Nitish Pathak
Guru Gobind Singh Indraprastha
University, New Delhi, India
Ranjit Rajak
Dr. Harisingh Gour Central University,
Sagar, Madhya Pradesh, India
D. Narsinga Rao
Directorate of Economics and
Statistics (DES), Govt. of Telangana
State, India
Neeraj Kumar Rathore
Indira Gandhi National Tribal
University (A Central University),
Amarkantak, Madhya Pradesh, India
Ram Shringar Raw
NSUT East Campus Formerly
Ambedkar Institute of Advanced
Communication Technologies and
Research, New Delhi, India
Halima Sadia
Integral University, Lucknow, Uttar
Pradesh, India
Amal Krishna Sarkar
Babasaheb Bhimrao Ambedkar
University, Lucknow, Uttar Pradesh,
India
Mohd. Asim Sayeed
Babasaheb Bhimrao Ambedkar
University, Lucknow, Uttar Pradesh,
India
Adil Hussain Seh
Babasaheb Bhimrao Ambedkar
University, Lucknow, Uttar Pradesh,
India
Kanika Sharma
Mangalmay Institute of Engineering
and Technology, Greater Noida,
Uttar Pradesh, India
M. Raghavender Sharma
Osmania University, Hyderabad,
Telangana, India
xv Contributor List
Rajat Sharma
Shri Ramswaroop Memorial University,
Barabanki, Uttar Pradesh, India
Raj Shree
Babasaheb Bhimrao Ambedkar
University, Lucknow, Uttar Pradesh,
India
Sarita Shukla
Shri Ramswaroop Memorial University,
Barabanki, Uttar Pradesh, India
Pawan Singh
Indira Gandhi National Tribal
University (A Central University),
Amarkantak, Madhya Pradesh, India
Prasannavenkatesan Theerthagiri
GITAM University, Bengaluru,
Karnataka, India
Satya Bhushan Verma
Goel Institute of Technology and
Management, Lucknow, Uttar
Pradesh, India
Abhay Kumar Yadav
Shri Ramswaroop Memorial University,
Barabanki, Uttar Pradesh, India
Hagos Yirgaw
Adigrat University, Adigrat, Ethiopia
Majid Zaman
University of Kashmir, Srinagar,
Jammu and Kashmir, India
1
1An investigation
on Cooperative
Communication
Techniques in Mobile
Ad-Hoc Networks
Prasannavenkatesan Theerthagiri
1.1 INTRODUCTION
In mobile ad-hoc networks (MANETs), the terminals (nodes) such as mobile phones,
gaming devices, laptops, tablets, and PDA communicate through cooperation. The
wireless broadcasting mechanism is utilized for the communication of mobile nodes.
In recent days, as many applications utilize MANETs specically, cooperation is
an essential issue in this kind of application, including discovery, military battle-
eld, event monitoring systems, and more civilian applications. In cooperation, any
Computational Intelligent Security in Wireless Communications Cooperative Communication Techniques
CONTENTS
1.1 Introduction ......................................................................................................1
1.2 Cooperation Techniques ...................................................................................3
1.2.1 Crediting Mechanisms .......................................................................... 3
1.2.1.1 Incentive-based Approach .....................................................4
1.2.1.2 Reputation Schemes ...............................................................5
1.2.1.3 Hybrid system ........................................................................7
1.2.1.4 Trust-based schemes ..............................................................8
1.2.2 Acknowledgment-based Mechanisms ..................................................8
1.2.2.1 End-to-End ACK Method ...................................................... 8
1.2.2.2 TWO ACK Method ................................................................ 9
1.2.2.3 Cryptographic-based signature .............................................. 9
1.2.3 Punishment-based mechanism ........................................................... 10
1.2.3.1 Game-Theoretic Approach ................................................... 10
1.2.3.2 Non-cooperative Game-Theoretic Approach ....................... 12
1.3 Discussion and Evaluation of research ndings ............................................. 14
1.4 Conclusion ......................................................................................................20
References ................................................................................................................ 21
DOI: 10.1201/9781003323426-1
10.1201/9781003323426 -1
2 Computational Intelligent Security in Wireless Communications
information is processed, communicated, and forwarded by every node. The node
cooperation with the other nodes is randomly generated, and the routes are discov-
ered and used by MANET routing protocols [1]. As there is no centralized admin-
istration, cooperative communication plays a dynamic role in MANETs. The nodes
in the network act as a router and host to perform all of its network operations. The
MANET nodes are self-organizing and should cooperate well with the intermedi-
ate node to provide effective communication. In this concern, the neighbor nodes
play a vital role in forwarding the packets to reach the destination [2]. If the source
node’s packet needs to reach the destination, which is within the source node’s wire-
less communication (coverage) range, then the rate of successful data transmission
is reasonable. If the destination is beyond the coverage area, they need to reach
via the cooperative intermediate neighbor nodes intended to forward the packet to
the destination [3, 4]. Figure 1.1 shows the cooperation of nodes in the MANET.
Considering the example shown in Figure 1.1, node 1 needs to forward the packet to
the destination node 6; thus, it needs the well cooperating neighbor nodes. As shown
in Figure 1.1, nodes 4 and 5 are the well cooperating nodes so that the relaying pack-
ets can reach the destination node.
The best network performance can be achieved if the entire node in the network
involves relaying the packets. It cannot be achieved in the real world because of
MANET nodes’ nature, such as resource constraints and dynamic topology. The
behaviors of preserving their energy to survive in the network are called selshness,
and malicious activities can easily break this dynamic cooperation. The malicious
activities are generated by the malicious node to either break the actual operation
MANETs or disturb the whole MANET system. The selsh activity also shows
the behavior of a disturbing network, but in the way of non-cooperation [5]. This
kind of non-helping tendency in the forwarding of the packet is called selsh nodes.
Selshness is challenging to observe and qualify, unlike with the malicious nodes.
Causes for selshness are the heavy load in the network, which leads to dropping
any incoming packet beyond the specic limit, and depletion of unwanted energy is
FIGURE 1.1 Cooperation.
3Cooperative Communication Techniques
sustained. It seems to behave like malicious nodes instead of selshness [6]. These
selsh behaving nodes are detected and avoided or stimulated to cooperate with other
nodes in the network through cooperation mechanisms. One of the widely accepted
models for stimulating cooperation is the reputation-based model. In this model,
the reputation is collected directly from the node or indirectly from the neighbors’
collection. By observing and monitoring each node’s cooperation, the reputation is
evaluated. The direct information from the node is more trusted than the neighbor’s
indirect information [7].
1.2 COOPERATION TECHNIQUES
Many researchers have devoted their work to the development of several cooperative
techniques and have proposed many algorithms. These cooperative techniques are
commonly categorized into three major modules: crediting mechanisms, acknowl-
edgment-based mechanisms, and punishing mechanisms, based on the strategy
utilized to enable cooperativeness. Figure 1.2 shows the different classication of
cooperation techniques.
1.2.1 Crediting MeChanisMs
The credits are used on a node for its cooperativeness with other nodes. The
increase in the credits of a node shows that it helps in cooperatively forwarding
the packets. The non-cooperation decreases the credit of a node in the network.
A node earns the credits by forwarding the packets to others. Thus, it becomes
the motivation for another node to behave cooperatively. The nodes which are not
having credits will not participate in the cooperation process and not forward the
packets. The crediting mechanism is further classied into four methods: incen-
tive-based, reputation-based, hybrid-based, and trust-based approaches, as shown
in Figure 1.3.
FIGURE 1.2 Cooperation Techniques.
4 Computational Intelligent Security in Wireless Communications
1.2.1.1 Incentive-based Approach
Incentive-based methods are intended to motivate the nodes in the network to coop-
erate with all intermediate neighbor nodes. The incentives are given to the nodes in
the form of credits or awards, based on the observation and behaviors of the par-
ticular node. Many researchers analyzed the nodes’ cooperation based on the incen-
tive method, such as tamper-proof devices, central agent methods, ad-hoc Vickrey,
Clarke, and Groves (VCG), COMMIT Protocol, and Report-based pAyment
sChemE (RACE).
1.2.1.1.1 Ta m p e r- proof device
Buttyan and Hubaux (2001) had proposed a tamper-proof device for assigning the
credits. This device is installed on each node [8]. Credits are given to nodes based on
the node’s network services such as forwarding, sending packets. The authors also
dene two models as the Packet Purse Model (PPM) and the Packet Trade Model
(PTM). In the PPM, the source node is responsible for paying the credit to the nodes
based on their behavior along the path to the destination. The opposite method is
used on the PTM; here, the destination node pays the credit to the node. The author
introduces the credit count to avoid overloading of the packet by the source nodes.
Counter increases/decreases based on cooperation. This scheme has many draw-
backs as follows: rst, the tamper-proof device should be installed at each node,
which is impossible, and the device needs to be protected from external attack. It is
not produced in the real world. Only the central node achieves more credits than the
other nodes. Even for forwarding a node’s packets, it should have enough credits. It
affects the Packet Delivery Ratio (PDR), throughput of the network.
1.2.1.1.2 Cent ral Age nt
Zhong etal. (2003) proposed a credit-based scheme where the central agent is used
for paying the credits to a node [9]. The central agent veries the issuance of the
credit paid to a node and then conrms the credit based on the reports by each
forwarding node. The nodes have to keep track of their actions and then claim their
credit from the central agent. After receiving the claims, the agent gives credit to
FIGURE 1.3 Crediting Mechanisms.
5Cooperative Communication Techniques
the nodes; the agent gives credit to the participating nodes using the source node
and the cooperating node. Because of the central node, it reduces the burden of each
node credit assignment and tamper-proof device. However, it has the drawback of
a communication bottleneck between the nodes and the central agent. The authors
Anderegg et al. (2003) had introduced the ad-hoc VCG routing protocol; in this
protocol, every node should generally publish their available energy in the route dis-
covery process. The source node then chooses the best cost-effective energy path for
data packet forwarding and assigning the credit to those participating intermediating
nodes. It is an effective way of choosing a truthful energy-efcient route. However,
it is not necessary for all the nodes to give genuine energy values. There may be the
occurrence of collision between the nodes having similar energy values [10].
1.2.1.1.3 COMMIT Protocol
The COMMIT Protocol was proposed by Eldebenz et al. (2005). Rather than
depending on all intermediate participating nodes, the source node only involves in
the route discovery process. The source node should announce the maximum total
credits that it offers for data forwarding. On receiving this information, all of the
intermediate nodes agree or reject based on credits. When the offered credits are
found, the destination will send a path to the sender. Even though, it is easier to con-
trol the sender, for the nodes with tedious communication overhead, it is not easier to
achieve the offered credits [11]. A report-based payment scheme had been proposed
by the authors Mohmoud etal. (2003). They had proposed the lightweight payment-
reporting scheme. The credit reports are submitted to the central agent. The report
contains only less important information. When extra information is needed, the
central agent requests proof on the node. These proofs were stored only temporarily
because of the storage overhead concern [12].
1.2.1.2 Reputation Schemes
The reputation is another type of scheme in monitoring node cooperation to antici-
patory work with the intermediate neighbor nodes. In the reputation scheme, each
node should monitor, observe, and collect the other nodes’ behaviors and reports
in the network. This information was used to evaluate the reputation value of the
observed nodes. Based on these values, the node’s selshness level is determined. If
the reputation value is less than a certain verge value, it shows the particular node’s
selshness. This node needs to be avoided in the routing process. The important
issue in evaluating reputation values is based on the node behavior to determine the
passive/active or negative/positive acknowledgments. When the node’s behaviors are
examined, the reputation system takes further evaluation.
1.2.1.2.1 Trusting/voting system
In the reputation scheme, the trusting/voting technique is used by the monitoring
nodes to determine the other node’s cooperation or non-cooperation in the network
service, such as forwarding the packets and routing, and the opinion on the particu-
lar node is examined from the other nodes, to detect the selsh node. The watch-
dog mechanism had been proposed by Marti et al. (2000), the rating scheme for
6 Computational Intelligent Security in Wireless Communications
computing the reputation in which the monitoring node’s activities are involved [13].
The rate is assigned to the node by the information gathered from other nodes, and
the node, which has a low rating, is avoided from the routing path. This type of rat-
ing of the nodes is called the path rating. Here, the watchdog node listens, the next
neighbor hops transmission to know whether it helps in forwarding the relay or drops
the packets. When the packets are dropped by such a node, then the counter value
will be increased, that is, the misbehaving value for that particular node. When the
rate reaches a certain threshold value, the watchdog node makes it as the misbehav-
ing node, then the particular node will be excluded from the routing path established.
1.2.1.2.2 CONFIDENT Method
Authors Buchesser etal. (2002) had improved the path rating mechanism by a vot-
ing mechanism called Cooperation of Node: Fairness in Dynamic Ad-hoc Network
(CONFIDENT). When the neighbor node detects misbehavior in the network, this
information is forwarded to the reputation system. It gathers information from all
observing nodes and enough proof for such misbehavior. The modied Bayesian
approach gives less importance to the past observations. Here, assigning the rate to
different functions is based on their behavior in the network. If this rating exceeds the
threshold values, then the particular node is punished by not forwarding any packet
to it. In condent schemes, each node uses four components for detecting and isolat-
ing the selsh nodes. (1) The monitor is to listen to the nodes with deviating behavior
from the transmission in the network. Deviating node’s information (ALARM) was
alerted to the next component. (2) The Trust Manager analyzes these ALARM mes-
sages and decides whether to route with the node or not. (3) The Reputation System
provides the reputation value based on the behaviors in the network. (4) The Path
Manager nally avoids the nodes from the routing path, which are determined as the
malicious non-cooperative nodes. However, it requires periodic packet exchanges as
overhead [14].
1.2.1.2.3 CORE Metho d
In Collaborative Reputation Mechanism (CORE), Michiardi etal. (2002) had calcu-
lated the reputation values in three ways: the reputation value calculated by directly
observing node behavior is called subjective reputation. The reputation value calcu-
lated based on the information provided by other nodes is called indirect reputation.
The functional reputation is a combination of both. During the routing discovery
process (in the route request (RREQ), route reply (RREP)), the reputation values are
updated on each node’s reputation table. The nodes that did not relay the packet were
punished. It is important to the condent concept that the problem in condence is
false node voting. Here, it is conquered by restricting the negative rating dissemina-
tion in the network. The CORE only allows the good rating node [15]. Even when the
node has a false rating as acting good, it is actually a bad node.
1.2.1.2.4 SORI M etho d
On improving these two CONFIDENT, CORE, instead of globally broadcasting the
two-reputation information, is shared only on the intermediate neighbor nodes in
7Cooperative Communication Techniques
the Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Network
(SORI) system. In SORI authors He etal. (2004) aim to reduce selshness by encour-
aging the nodes to participate in the relaying of packets [16]. The reputation values
are assigned to nodes by the neighbor nodes using the one-way hash chain-based
algorithm. In this way, the penalties are given to the selsh nodes refusing in the
packet relaying.
1.2.1.2.5 OCEAN Method
The Observation-based Cooperative Enforcement in Ad-hoc Networks (OCEAN)
was proposed by Bansal etal. (2003). In the OCEAN, the observation of the node’s
activities is not yet shared globally like in SORI. Here, each node maintains the rat-
ing information of the neighbor node [17]. Based on the cooperation of the nodes in
packet forwarding, the rating value can be increased or decreased. When the node’s
value is less than the threshold value, then such a node is listed in the misbehaving
node list. The services of such nodes are also avoided. The feature of this scheme
is that the nodes that are in the misbehaving list are inactive for some period. After
that, it allows the network to behave cooperatively, reducing the chance of false
detection. This scheme betters in all previous attempts at detecting cooperativeness
between the nodes in the network. Even though it was affected by false nodes, it will
be reported as misbehaving node by other nodes. The attacks are also possible for
those nodes in the misbehaving list. Guo etal. (2007) developed the Hybrid mecha-
nism to Enforce Nodes Cooperation (HEAD). The HEAD scheme uses the alerting
messages instead of broadcasting the faulty misbehavior lost in the route discovery
process [18]. S. Zhong etal. (2003) had developed a simple cheat-proof, credit-based
system (SPRITE) for effective communication [19]. In this strategy, cooperation
among the nodes is encouraged by assigning the reward in terms of credits called
the cheat-proof system. Tamper-proof hardware is not used in any node; instead, it
uses the receipts. The receipts from the forwarded or routed message are validated,
and the credits are assigned to each node in the system. The central credit clearance
service (CCCS) is to manage all the credits assigned to the nodes.
1.2.1.3 Hybrid system
The hybrid system utilizes the advantages of both credit and reputation schemes to
stimulate the MANET’s cooperation.
1.2.1. 3.1 ICAR US Metho d
Charilas etal. (2012) had presented the ICARUS: Hybrid incentive mechanism for the
cooperation stimulation scheme to control the credit exchanges between the partici-
pating nodes by utilizing the reputation schemes [20]. In the ICARUS, credit account
service (ICAS) is used by the central agent for assigning credits to the nodes to deter-
mine the selsh non-cooperative nodes. However, in ad-hoc networks, the reliance on
a central agent is difcult because of its dynamic nature. The account-based hierar-
chical Reputation Management (ARM) system uses the credit and reputation scheme
proposed by Shen etal. (2008) but does not use any central agent for the detection
[21]. In this scheme, each node maintains the credits for the peer nodes based on
8 Computational Intelligent Security in Wireless Communications
the reputation value. The nodes act as reputation managers for relaying the packets.
However, in heavy trafc, the relaying task on nodes could not be a good way.
1.2.1.4 Trust-based schemes
The trust-based mechanism uses trust features for determining node behaviors.
Based on the trust values, the good or bad trust on the particular node is to take.
Several researchers worked on computing and evaluating trust features and node’s
trustworthiness in determining cooperative nodes.
1.2.1.4.1 SDA Me t h o d
The authors Z. K. Chong etal. (2013) adopted the Separation of Detection Authority
(SDA) for detecting the selsh nodes in the network and improving the trustworthi-
ness of the nodes [22]. The improvement to the node behavior’s trustworthiness is
done by using three components, such as the reporting node, agent node, and central
authority. The reporting node nds out the misbehaving non-cooperative node and
generates reports to forward it to the central authority. The central authority investi-
gates the reports by using the agent nodes. The agent nodes are the neighbor moni-
toring nodes. Finally, all the agents submit the reports about the suspicious node to
the central authority. However, here, communication overload is tight between the
three entities and may degrade network performance.
1.2.1.4.2 TEAM Method
In the Trust-based Exclusion Access Control Mechanism, authors L. H. G. Ferraz
etal. (2014) used the two modules for computing node’s trustworthiness as local
and global. The nodes observe and gather the one-hop neighbor’s information from
the local module. Then, this collected behavioral information is forwarded to this
global module. The global module consists of nodes that evaluate the evidence on
such trusts by using the voting mechanisms [23]. Then the non-cooperative nodes are
dened in the access to the network. Here, the main advantage is the low overhead of
messages that have been used for detecting and excluding such misbehaving nodes.
However, the trust features and the friendship mechanisms need to be strengthened
in the modules.
1.2.1.4.3 Weighting Metho d
The authors Yu etal. (2009) had calculated the average of the observed node’s per-
formance to detect the node’s trustworthiness. The link quality information is also
measured to improve the accuracy of the trust value [24]. However, the routing anom-
alies, interference problems, need to be avoided in these trust-based techniques.
1.2.2 aCknowledgMent-based MeChanisMs
1.2.2.1 End-to-End ACK Method
End-to-End ACK is an acknowledgment-based mechanism proposed by Conti etal.
(2003) in which when the destination node receives the packet from the source node,
it has the responsibility to send back an ACK to the source node [25]. The source
9Cooperative Communication Techniques
node waits for some time to receive an ACK from the destination; if it does not
receive ACK within the time, it assumes that the packet did not reach the destination.
Here, authors use the reliability index for maintaining the performance and reli-
ability of packets. When the index exceeds threshold values, then the corresponding
route needs to be excluded. The reliability index is updated based on ACK from the
destination node to the source node. However, every node’s reliability index is vis-
ible to other nodes; it provides the attackers with chances to making an attack [26].
Refaei etal. (2005) had developed TCP acknowledgment, an ACK-based mecha-
nism, but the neighbor node’s activity was only used to measure the RI (Reliability
Index). The authors [27] used the same ACK scheme and maintained the RI for
neighbor nodes. When the source node receives ACK from the destination node, the
RI of their neighbor nodes increases. It decreases when the source node does not
receive ACK, or when some node retransmits the same packet.
1.2.2.2 TWO ACK Method
Instead of using many nodes in the network for end-to-end ACK, in TWO ACK
authors, Balakrishnan etal. (2005) used two hops for ACK. This scheme works by
sending ACK by a two-hop query from the sender node [28]. The two-hop away node
is required to send an ACK back to the sender node on receiving the packet. The RI
is calculated by the waiting time. The sender node waits for some time to receive the
ACK from the two-hop away node. The RI is increased or decreased in threshold
time values. When the RI is decreased to a low, the node and the link are avoided
from routing and are marked as misbehaving. However, there may be the occur-
rence of a potential false neighbor on the RI. It is not yet analyzed in this paper. It
is needed to gather the evidence on such occurrences from the neighbor node. Also,
the congestion causes misbehavior when the network trafc is high [29]. Figure 1.4
illustrates the working of the TWO ACK scheme.
1.2.2.3 Cryptographic-based signature
Authors H. Yang etal. (2002) adopted the cryptographic-based signature with the
Ad-hoc On-demand Distance Vector (AODV) to protect data forwarding and routing
FIGURE 1.4 Two ACK Scheme.
10 Computational Intelligent Security in Wireless Communications
in the network. This technique uses the cryptographically signed tokens to provide
such protection against misbehaviors [30]. This token has an expiry period, which
depends on the token holder’s behavior in the network. It means that the token holder
relays the packet as receive means, it will have a better expiry. It is also required
to renew the token before its expiration. The renewing is done by gathering the
k-number of different signals from its neighbor nodes. The neighbor node monitors
every other node for detecting the misbehavior about whether the data packet has
been dropped uncertainly. Based on such values, the nodes renew the request for the
token signature that is needed to be granted. It has a better solution in advance to the
watchdog. However, only depending on k-neighbor nodes for detecting misbehavior
causes the drawback. Even though the node is not misbehaving, the low k-valued
nodes are declared a suspicious node. The high k-value means that it has high con-
nectivity, which is not possible in MANETs.
1.2.3 PunishMent-based MeChanisM
In the punishment-based mechanism, the penalties are given to the node, which
behaves selshly. Moreover, they are isolated from the routing path and avoided in
any services because of the penalty. The punishing mechanism uses game-theoretic
approaches and non-cooperative game-theoretic approaches depicted in Figure 1.5.
1.2.3.1 Game-Theoretic Approach
1.2.3.1.1 DECADE Method
The selsh nodes, which will not participate in the cooperative forwarding of pack-
ets, are detected by using the Dynamic Source Routing (DSR) protocol in the distrib-
uted emergent cooperation through adaptive evolution in the MANET (DECADE)
FIGURE 1.5 Punishing Mechanisms.
11Cooperative Communication Techniques
technique proposed by M. Majia etal. (2012). In this method, the author uses this
scheme for each node to enable cooperation [31]. It uses the non-cooperative game
theory in which each node in the network is encouraged to maximize the successful
packet delivery, thus isolating the selsh node. By introducing the sociality param-
eter for each node in the network, the node’s interactions are also to be improved.
If any node forwards the packet to others, which they receive from neighbors, they
will be rewarded with “X.” However, cooperating intermediate node’s energy will
be reduced to the amount of “Y;” thus, “X-Y” reward will be given. Considering the
example as node “A” sends a packet to node “B;” here, the rewarding and punish-
ing the node are done by three scenarios. (1) If both nodes cooperatively transmit
the packet without any deviations, then the reward is “X-2Y.” (2) If any node does
not forward the packets cooperatively to others, then the reward is “X-Y.” (3) If both
nodes are unwilling to cooperate in forwarding the packets, punishment such as
“–Y” will be assigned to that node for that selshness. The DECADE uses the clas-
sical cellular algorithm; it is the feedback-based algorithm. It works based on the
intermediate node’s feedback about the packet, whether to forward or drop to detect
the cooperating nodes and isolate the selsh nodes. The sociality parameter was
included in the DECADE algorithm, which improves the general trust model’s per-
formance by encouraging the nodes to choose the best path by availing the wider
information from the intermediate nodes and providing the best performance when
the network environment changes, i.e., on mobility. However, in the DECADE mech-
anism, too many algorithms and parameters such as availability and sociality are
utilized to perform better on detecting and isolating the selsh nodes. It may degrade
the overall network performance, and the computations used are more complex. The
authors Niu etal. (2011) had proposed the approach, which uses three aspects for
cooperation stimulation among the nodes. (1) Using innite reported game concepts
to determine the optimal cooperativeness. (2) The worst behavior tit-for-tat strategy
for punishing the node cooperatively. (3) The realistic estimation mechanism for
node behavior monitoring, which is maybe imperfect. The monitoring results in pun-
ishing nodes that act selshly [32]. However, the monitoring results may be affected
by external factors like noise and interference.
1.2.3.1.2 Tit-for-tat (TFT) strategy:
The game-theoretical strategy called the tit-for-tat (TFT) strategy was used to detect
the selsh node by S. Ng etal. (2010). All nodes in the network will be cooperating
in the rst stage of the game. Based on the opponent’s behavior, further actions are
taken in the preceding stage. It works based on the forwarding game and repeated
game. The connectivity among the node, routing path, and network property for the
cooperation is also determined for detecting the node’s willingness to forward the
packets to others [33]. Huang etal. (2001) had proposed the resolving technique for
dropping of route request (RREQ) control packets, which are received during the
route discovery process. It is a monitoring approach utilized during the transmission
for detecting the selsh node. Authors utilized the concept that the number of RREQ
packets should be equal to the number of nodes in the network. When it is unequal,
it is assumed that there are some nodes acting as selsh nodes [34]. To reduce false
12 Computational Intelligent Security in Wireless Communications
detection, this gaming approach was used. However, it uses indirect communication
and complex distributed monitoring schemes for detecting the selsh nodes. Toledo
etal. (2007) had improved the non-cooperative behaviors by concentrating on layers
such as the network layer and the medium access control (MAC) layer. The selsh-
ness occurs in the network layer by refusing the route discovery process, delaying or
dropping the forwarding of packets by idle state nodes [35]. In the MAC layer, the
selshness can be monitored as the uneven channel access, false signal state.
1.2.3.2 Non-cooperative Game-Theoretic Approach
1.2.3.2.1 Eliminating Packet Droppers scheme
The authors Djenouri etal. (2009) had proposed the Eliminating Packet Droppers
scheme. It includes ve modules to detect and eliminate the misbehaving nodes,
such as monitors, detectors, isolators, investigators, and witnesses. These modules
have the responsibility to detect these misbehaving nodes [36]. The monitor controls
the relaying of data packets. The detector is responsible for detecting the misbe-
having node, based on the monitor module response. Isolator collaborates with the
witness module, which means it gets enough evidence before any node is isolated as
the misbehaving node. The investigator module investigates such suspected node’s
accusations for whether it has enough experience for the accusation. Finally, the wit-
ness module helps the isolator in isolating the misbehaving node. Isolating means
that the data packets cannot be forwarded to other nodes. Here, the randomized
two-hop acknowledgment algorithm is utilized for better performance. The random-
ized two-hop acknowledgment algorithm has less overhead compared to the two-hop
acknowledgment algorithm. However, using the randomized ACK, the possibility of
accurately detecting the misbehavior is not possible. The authors also made some
assumptions for detecting the misbehavior. The isolated nodes are permanently
excluded from the network, and they are not provided the option to rejoin the net-
work after some occurrences if it is falsely isolated.
1.2.3.2.2 Cross-layer Anomaly-based Intrusion Detection System (IDS)
The authors L.S. Casado et al. (2015) had developed the IDS system model for
detecting dropping attacks in the network. Here, authors concentrate on the mobil-
ity, collisions, and packet errors, which will deeply affect the communication
between the nodes in the network [37]. The RTS/CTS data-forwarding model
is intensely examined under the MANET conditions. The enhanced windowing
method is used to detect mobility and channel errors; this windowing helps to
detect packet dropping under these conditions. When the RTS is sent to a node,
which is not replied because of mobility, it is also categorized as the misbehaving
node, even though it uses temporal time-based windowing. By using the temporal
window, the node can be considered illegitimately as malicious, because it is not
able to detect the node’s mobility in a particular temporal windowing period. To
overcome this, the authors use event-based windowing instead of a time-based
one, thus avoiding the previously mentioned issues. However, using the time-based
windowing, each node exclusively needs to monitor and collect information of all
other nodes and carry out all features to determine the network’s misbehaving
13Cooperative Communication Techniques
actions. In addition, it is not feasible to trust each node’s monitoring and the imple-
mentation of the detection techniques.
1.2.3.2.3 FACES Method
The authors S. K. Dhurandher etal. (2011) had developed the Friend-based Ad-hoc
Routing using Challenges to Establish Security in MANET system (FACES) algo-
rithm to isolate the malicious nodes from the network. It uses the concept of sharing
the friend lists and sending the challenges to each node. The friend list is a list of
nodes having a friendship with other nodes obtained from the previous transmission
and it will be used for routing, instead of proving the list of trustful nodes to the
source node [38]. To improve the friendship with other nodes, the periodic process
called “Share Your Friend” is initiated into the network. By doing so, the friends for
each node are updated. The friends mean that the nodes that fully cooperate in the
relaying process of the network. The FACES works in four stages: in the “Challenge
Your neighbor,” stage nodes are challenged to provide the neighbor nodes authen-
tication details, and nodes which provide these details are listed in the “friend list”.
The “Question mark list” contains the nodes, which have not completed the rst
stage. The nodes in the question mark list are not used for the relaying packets. The
nodes, which did not perform well in the friend list, are also moved to the question
mark list. In “Rate Friends,” the nodes are rated based on their performance in the
network activities such as relaying packets, cooperation, etc. Based on the involve-
ment in the relaying process, the rating is given from 0 to 10. The authors have used
the DSR protocol for routing by checking whether the node is in the friend list and
not in the question mark list. Quality of the route is checked by every node, and the
source node is encrypted by the public key cryptography to protect against eaves-
dropping and man in the middle attack. However, maintaining too many lists such as
the question mark list, friend list, unauthorized list on each node may cause network
overhead. Moreover, it gradually decreases the network throughput on larger net-
works. In highly dynamic battery-constrained mobile nodes, preserving these lists
also consumes some battery power.
1.2.3.2.4 ERCRM Method
In the Exponential Reliability coefcient-based Reputation Mechanism for isolating
selsh nodes in MANET (ERCRM) method, the authors J. Sengathir etal. (2015)
estimate the energy measures on nodes and manipulate the reliability coefcient
for isolating selsh nodes from the routing path in the MANET [39]. By using the
exponential failure rate on nodes in networks through the moving average method, it
is highly utilized on the nodes for calculating the reliability coefcient. The moving
average method works by the most recent mobile nodes’ most recent past behavior in
relaying the packets to the neighbor nodes. The authors categorize the selsh nodes
into three types as, type I, II, and III. In type I, the selsh node participates in the
route discovery and maintenance process but does not participate and refers to relay
packets to other nodes. In type II, it participates neither in the route discovery and
maintenance process nor in relaying packets. In type III, the selsh nodes dynami-
cally change their behavior by forwarding the packets and dropping the packets. The
14 Computational Intelligent Security in Wireless Communications
protocol used for the routing process itself removes the type II selsh nodes. The
type III selsh nodes are removed from the network by using the estimated energy
metric. When this value falls below the threshold value, the mobile node is isolated
as the selsh node. By using both the energy metric and reliability coefcient values,
the type I, selsh nodes are isolated from the routing path in the network. However,
the estimated energy metric and reliability coefcient are computed for every node
in the network; it increases the network overhead gradually. Moreover, the nodes that
are not in the routing path and maintaining these values make the energy of nodes
decrease. The authors use the predened estimated energy metric of 0.45 Joules
and the reliability coefcient of 0.4 for determining the MANET’s selsh nodes. It
should be dynamically changed under different conditions for better results in isolat-
ing the selsh nodes.
1.2.3.2.5 Collaboration enforcement in MANET
Authors N. Jiang etal. (2007) developed the novel approach instead of using repu-
tation mechanisms. It has the scalability issues that cause bad accusations on the
neighbor nodes; it can lead to the misjudgment of determining malicious nodes [40].
To overcome these issues, the author introduced a one-hop neighbor observation
and rerouting the packets. Even though in this technique, each node needs to main-
tain the list of observations and actions of all nodes in the network. Moreover, the
DSR protocol maintains the list of route caches; it also adds the routing overhead to
the network. The Route Redirect (RRDIR) concept used for dynamic rerouting has
another route discovery process; it may also increase the throughput of the network
and the overall performance of the network. In addition, the number of the node used
for the simulation is 50; it is very small as the scalability concern. For the simulation
analysis, the selsh node’s percentage increases by up to 20% only. As the scalability
and robust concern, the nodes’ selshness should be evaluated up to 60%.
1.2.3.2.6 Best neighbor strategy
K. Komathy etal. (2007) used the best neighbor strategy to maintain scalability
and robustness among neighbor nodes while enforcing cooperation among selsh
nodes [41]. In this strategy, each node should play a packet forwarding to its neigh-
bors. Recording and updating these values are done in each round. Trust values are
obtained by this way of interaction with the individual neighbor nodes.
1.3 DISCUSSION AND EVALUATION OF RESEARCH FINDINGS
In this section, the discussion about the various categories of cooperation techniques
and their challenges in establishing cooperation are to be presented. The summary
and the comparison of different cooperative solutions for the MANET are tabu-
lated in Table 1.1. The cooperation in the wireless and Ad-hoc network faces several
issues, and those were considered in this summary. Moreover, it is not feasible to
assure the network similarity, and its stability and scalability create uneven con-
sequences for cooperative schemes. Mobile Ad-hoc networks contemporarily have
several constrictions such as mobile resources, storage capacity, battery, processor
15Cooperative Communication Techniques
TABLE 1.1
Summary and Comparison of the Cooperation Techniques
S. No. Authors Cooperation Strategy Cooperative Approach Type Key Concepts Features
1. L. Buttyan and J.
Hubaux [8]
Tamper-proof device Incentive-based
credit mechanism
Assigning credits based on
cooperation ability
Packet Purse Model and
Packet Trade Model were
adopted
2. S. Zhong etal. [19] Central agent Incentive-based crediting
mechanism
Paying credits by central
agents and it veries paid
nodes
Central agents reduce the
burden of other nodes in the
credit assignment
3. L. Anderegg and S.
Elderbenz [10]
Ad-hoc VCG Incentive-based crediting
mechanism
Nodes publish remaining
energy for routing
Best available energy path
discovered based on their
values
4. S. Elderbenz etal. [11] COMMIT Protocol Incentive-based crediting
mechanism
Source takes the
responsibility of credit
assignment
Source nodes reveal
maximum total credit to
participating nodes
5. M. Mohmoud and X.
S. Shen [12]
RACE Incentive-based crediting
mechanism
Central agents manage
reports from nodes
Central agents store the data
temporarily for future
evidence
6. S. Marti etal. [13] Watchdog scheme Reputation-based crediting
mechanism
A rating scheme for
reputation computation
Neighbor node activities were
monitored, and low rated
nodes avoided
7. S. Buchegger and J. Y.
Boudec [14]
CONFIDENT Reputation-based crediting
mechanism
Misbehaving nodes and their
reputations are collected
Lower reputation nodes from
other neighbor nodes were
identied
8. P. Michiardi and R.
Molva [15]
CORE Reputation-based crediting
mechanism
False reputation values were
restricted
Good rating nodes only
allowed for the routing
(Continued)
16 Computational Intelligent Security in Wireless Communications
TABLE 1.1 (CONTINUED)
Summary and Comparison of the Cooperation Techniques
S. No. Authors Cooperation Strategy Cooperative Approach Type Key Concepts Features
9. Q. He etal. [16] SORI Reputation-based crediting
mechanism
One-way hash chain
algorithm for packet relay
Reputation values shared only
on neighbor nodes
10. S. Bensal and M.
Baker [18]
OCEAN Reputation-based crediting
mechanism
Rating value, the
misbehaving list is used for
cooperation
Rating increased or decreased
based on node cooperation
and reduced false detection
11. J. Guo et al [22] HEAD Reputation-based crediting
mechanism
Enforces cooperation by the
alert-based route discovery
process
Alerting messages are used
for faulty nodes instead of
broadcasting
12. D. Charles et al [21] ICARUS Hybrid-based crediting
mechanism
Controls credits exchanged
between nodes
The central agent uses credit
control service for credit
assignment to nodes
13. H. Shen and Z. Li [31] ARM Hybrid-based crediting
mechanism
No central agents were used
for the for-credit
assignment
Each node maintains credits
for peer nodes based on the
reputation value of nodes
14. Z. K. Chong et al [23] SDA Trust-based crediting
mechanism
Reporting node, agent node,
the central authority for
trust analysis
Central authority investigates
the trust reports from all
agents for trustworthiness
15. L. H. G. Ferraz
etal. [24]
TEAM Trust-based crediting
mechanism
The local and global model
is used to calculate the trust
of node
The global model observes
and gathers the one-hop
neighbor values to evaluate
trust
16. M. Yu et al [20] Weighting Method Trust-based crediting
mechanism
Link quality and average
weights are calculated
Accurate trust values are
calculated by averages for
trusted node detection
(Continued)
17Cooperative Communication Techniques
TABLE 1.1 (CONTINUED)
Summary and Comparison of the Cooperation Techniques
S. No. Authors Cooperation Strategy Cooperative Approach Type Key Concepts Features
17. S. K. Ng and W. K. G.
Seah [33]
TFT Strategy Game theory-based
punishment mechanism
Forwarding game and
repeated game are adopted
The game theory denes the
routing path, network
topology for forwarding the
packets
18. B. Niu et al [34] Game Theory Game theory-based
punishment mechanism
Stimulation of nodes for the
cooperation among nodes
by game theory mechanism
The innite repeated game,
TFT worst behavior strategy,
and realistic estimation
mechanism are developed
for cooperation
19. L. Huang et al [35] Game Theory Game theory-based
punishment mechanism
Resolves the packet dropping
problems in the network
The concept of route request
packets should equal to the
number of nodes adopted
20. A. L. Toledo and X.
Wang [36]
Game Theory Game theory-based
punishment mechanism
Development of the network
layer and the Medium
Access Layer (MAC)
The MAC layer designed to
determine the
cooperativeness of nodes
using channel access, fake
signal state
21. M. Mejia et al [32] DECADE Non-cooperative Game-
Theoretic Approach
Sociality parameter and
encouraging the nodes for
cooperation
Rewarding and punishment
are given to nodes based on
packet delivery and
cooperation in three ways
(Continued)
18 Computational Intelligent Security in Wireless Communications
TABLE 1.1 (CONTINUED)
Summary and Comparison of the Cooperation Techniques
S. No. Authors Cooperation Strategy Cooperative Approach Type Key Concepts Features
22. M. Conti et al [26] End-to-End Acknowledgment based The receiver node and source
node are responsible for
acknowledgment (ACK)
The reliability index is
updated based on
acknowledgment and
cooperative nodes
determined
23. M. Refaei et al [28] TCP ACK Acknowledgment based Neighbor node activities
were utilized for the
reliability index
The neighbor nodes
determine the reliability of
nodes and neighbor works
by ACK of other nodes
24. K. Balakrishnan
etal. [29]
TWO ACK Acknowledgment based Two nodes were adopted for
the acknowledgment
instead of the end-to-end
acknowledgment process
Sending ACK by two hops
away from the sender node.
Corresponding two hops
required to send
acknowledgment
25. H. Yang et al [19] Cryptography-Signatures Acknowledgment based Cryptographic Token
renewal, K-neighbors for
detecting misbehaving
nodes
Cryptographically signed
tokens on nodes protect
nodes on cooperation
26. D. Djenouri and N.
Badache [37]
Eliminating packet Droppers Non-cooperative Game-
Theoretic Approach
Monitor, detector, isolator,
witness, investigator,
randomized ACK modules
adopted
Based on the evidence, the
misbehaving nodes are
isolated by using each stage
of modules
(Continued)
19Cooperative Communication Techniques
TABLE 1.1 (CONTINUED)
Summary and Comparison of the Cooperation Techniques
S. No. Authors Cooperation Strategy Cooperative Approach Type Key Concepts Features
27. L.S. Casaclo et al [38] Anomaly-based IDS Non-cooperative Game-
Theoretic Approach
To detect the packing
dropping attack IDS system
model developed and RTS/
CTS model adopted
Mobility and collision packet
error, the channel error
event-based windowing
method is adapted to detect
misbehaviors
28. S. Zhong et al [41] SPRITE Credit based Credit proof system, receipts
of nodes, assigning reward
in terms of credits
Receipts of nodes are
validated and credits
assigned. CCCS encourages
cooperation
29. S. K. Dhurandher
etal. [39]
FACES Non-cooperative Game-
Theoretic Approach
Friend list, Sharing friend
list, share your friend,
Challenging the neighbor
nodes
Misbehaving nodes are listed
in the Question mark list. A
node in this list was not used
for relaying
30. J. Sengathir and R.
Manoharan [40]
ERCRM Non-cooperative Game-
Theoretic Approach
Estimated energy node,
Reliability coefcient (RC),
Exponential failure rate
Based on the energy of nodes,
the RC calculated and selsh
nodes are isolated in routing
31. N. Jiang et al [25] SRACEM Non-cooperative Game-
Theoretic Approach
Scalability issues, one-hop
neighbor observation, DSR
protocol
Each node maintains the
observation of all other
nodes. It nds selsh nodes
32. K. Komathy and P.
Narayana samy [42]
Neighbor Strategy Non-cooperative Game
theory-based
Trust values are updated for
each neighbor node for
cooperation
Scalability, stability, and
robustness of nodes are
evaluated
20 Computational Intelligent Security in Wireless Communications
power, limited bandwidth, network connections, and latency, which make the coop-
eration strategy deployment for the mobile environments as a challenging task. Most
signicantly, the cooperation mechanisms aim to solve such problems. The coopera-
tion systems necessitate solving the network latency issues and low bandwidth for
network efciency and effectiveness. In addition, issues in synchronization, security,
and trustfulness require extra add-ons to the systems.
Generally, the cooperation systems typically undertake the selsh node discov-
ery to determine the superlative node to cooperate in the network and to accom-
plish the nest routing path. Nonetheless, this one could be toughest in the presence
of unpredictable non-cooperative nodes. The cooperation strategy should also be
capable of incorporating the node heterogeneity. Thus, cooperation schemes need to
adjust their operating environments and control node communication to attain the
best cooperation. For mobile environments, fault-tolerance could be often required
to enhance the fault/disconnections in communication. Consequently, identifying
the cause of disconnection, recovering the original message, and retransmitting the
original is most essential. For the effective and efcient establishment and organiza-
tion of cooperation mechanisms, all the aspects mentioned above are the key issues
and should be considered. Moreover, the best cooperation-based approaches have an
optimal QoS delivery and quality in the network performance.
In this paper, the major classications of the cooperative schemes in MANETs
are discussed. As mentioned previously, it is generally divided into three types of
approaches as credit-based approaches, acknowledgment-based mechanisms, and pun-
ishment-based approaches. Based on the study performed in this paper, the reputation
mechanisms have further concerns compared to acknowledgment- and credit-based
methods. There is more ease of possibility of communication with the non-coopera-
tive nodes to gain more reputation in reputation schemes. The efcient node reputa-
tion computation through the network is also another challenging issue. Likewise, the
dependence on the wireless broadcast approach is another weakness in these schemes.
Better reliability is achieved in the credit-based approaches to these issues.
However, the dependence of tamper-proof hardware and node cheating behaviors
should be avoided for this scheme, and it may add more complexity to the cooperative
system. Most of the credit-based systems attempted to avoid tamper-proof hardware
even though it has many difculties for the security mechanisms. The effective coop-
eration-based approaches should aim to provide better efciency and performance for
the mobile devices in terms of device battery, storage, and network. In many network
architectures, the cooperation between the applications is much needed, supported by
mobile devices. Generally, in industry services, the agents must cooperate and share
information over mobile devices and healthcare services. In contrast, mobile health
(m-health) applications share medical information with patients and physicians [42].
Likewise, in healthcare scenarios, the cooperation among applications is more chal-
lenging, which requires a comprehensive study of these approaches.
1.4 CONCLUSION
The cooperation between nodes is much needed for communication establishment
in dynamically unstable network infrastructures, and many solutions (cooperation
21Cooperative Communication Techniques
approaches) have been proposed to address the issues and challenges. The mobile
nodes should cooperate with each other for relaying data and accomplishing all net-
working functions. In this paper, the elaborated deep literature analysis from various
research developments and their limitations and features of the network is per-
formed. In addition, the cooperation stimulation strategies such as cooperative game
theory-based approaches, and non-cooperative game theory-based approaches, pun-
ishment mechanisms, incentive-based methods, and hybrid methods are focused on
the MANETs. The challenges, merits, weaknesses of approaches, and their signi-
cance in cooperation establishment are also included in this paper. Furthermore, the
open issues in the construction and design of cooperative solutions for MANETs are
also surveyed.
REFERENCES
1. X. Wang, J. Li, and S. Member, “Improving the network lifetime of MANETs through
cooperative MAC protocol design,” IEEE transactions on parallel and distributed sys-
tems vol. 26, no. 4, pp. 1010–1020, 2015.
2. B. Karaoglu, W. Heinzelman, and S. Member, “Cooperative load balancing and
dynamic channel allocation for cluster-based mobile ad hoc networks,” IEEE transac-
tions on mobile computing vol. 14, no. 5, pp. 951–963, 2015.
3. T. Prasannavenkatesan, “FUCEM: Futuristic cooperation evaluation model using
Markov process for evaluating node reliability and link stability in mobile ad hoc net-
work ”, Wireless Networks, Springer, (Article in Press), 2020, IF: 2.405, ISSN: 1572-
8196, DOI: https://doi .org /10 .1007 /s11276 - 020 -02326 -y.
4. P. Theerthagiri, “COFEE: Context-aware futuristic energy estimation model for
sensor nodes using Markov model and auto-regression”, International Journal of
Communication System, p. e4248, 2019. IF: 1.278, ISSN: 1099-1131, DOI: https://doi
.org /10 .1002 /dac .4248.
5. T. Prasannavenkatesan, K. Udhayakumar, and R. Ramkumar “Security attacks and
detection techniques for MANET,Discovery Journal, vol. 15, no. 42, pp. 89–93,
Ghaziabad, March 2014.
6. J. N. Al-karaki, and A. E. Kamal, “Stimulating node cooperation in mobile ad hoc
networks,” Wireless Personal Communications, vol. 44, pp. 1–15.
7. N. Samian, Z. Ahmad, W. K. G. Seah, and A. Abdullah, “Cooperation stimulation
mechanisms for wireless multihop networks: A survey,” Journal of Network and
Computer Applications, vol. 54, pp. 88–106, 2015.
8. L. Buttyan, and J. P. Hubaux, “Nuglets: A virtual currency to stimulate cooperation
in self- organized mobile ad hoc networks,” Technical Report DSC/2001/001. Swiss
Federal Institute of Technology, Lausanne, Switzerland; 2001.
9. B. M. C. Silva, J. Rodrigues, N. Kumar, and G. Han, “Cooperative strategies for chal-
lenged networks and applications: A survey,” IEEE Systems Journal, vol. 11, pp. 1–12,
2015.
10. L. Anderegg, S. Eidenbenz, “Ad-hoc-VCG: A truthful and cost-efcient routing pro-
tocol for mobile Ad-hoc networks with selsh agents,” in: Proceedings of the 9th
International Conference on Mobile Computing and Networking (MobiCom). San
Diego, CA; 14–19 September 2003. pp. 245–259.
11. S. Eidenbenz, G. Resta, P. Santi, “COMMIT: a sender-centric truthful and energy-ef-
cient routing protocol for Ad-hoc networks with selsh nodes,” in Proceedings of 19th
IEEE International, Parallel and Distributed Processing Symposium (IPDPS). Denver,
Colorado, USA; 3–8 April 2005. pp. 239–49, 2005.
22 Computational Intelligent Security in Wireless Communications
12. M. Mahmoud, X. Shen, “A secure payment scheme with low communication and pro-
cessing overhead for multihop wireless networks,” IEEE Trans Parallel Distrib Syst,
vol. 24, no. 2, pp. 209–24, 2013.
13. S. Marti, T. J. Giuli, K. Lai, M. Baker, “Mitigating routing misbehavior in mobile ad-
hoc networks,” In: Proceedings of the 6th Annual International Conference on Mobile
Computing and Networking. Boston, MA; August 2000, pp. 255–65, 2000.
14. S. Buchegger, J. Y. L. Boudec, “Performance analysis of the CONFIDANT protocol,” in
Proceedings of the 3rd ACM International Symposium on Mobile Ad-Hoc Networking and
Computing (MOBIHOC). Lausanne, Switzerland; 9–11 June 2002, pp. 226–236, 2002.
15. P. Michiardi, R. Molva, “CORE: A collaborative reputation mechanism to enforce
node cooperation in mobile Ad-hoc networks,” in Proceedings of the 6th Joint Working
Conference on Communications and Multimedia Security. Netherlands; 26–27
September 2002, pp. 107–12, 2002.
16. Q. He, D. Wu, P. Khosla, “SORI: A secure and objective reputation-based incentive
scheme for Ad-hoc networks,” in Proceedings of the IEEE Wireless Communications
and Networking Conference (WCNC). NewOrleans, LA; 21–25 March 2004, pp. 825–
30, 2004.
17. S. Bansal, M. Baker, “Observation-based cooperation enforcement in ad hoc networks,”
Technical Report cs.NI/0307012. Computer Science Department, Stanford University,
USA; 2003.
18. J. Guo, H. Liu, J. Dong, X. Yang, “HEAD: A hybrid mechanism to enforce node coop-
eration in mobile Ad-hoc networks,” Tsinghua Science and Technology, vol. 12, no. 1,
pp. 202–207, 2007.
19. S. Zhong, Y. R. Yang, J. Chen. “Sprite: A simple, cheat proof, a credit-based system for
mobile Ad-hoc networks,” in: Proceedings of the 22nd IEEE International Conference
on Information Communications (INFOCOM). San Francisco; 1–3 April 2003, pp.
1987–1997, 2003.
20. D. E. Charilas, K. D. Georgilakis, A. D. Panagopoulos, “ICARUS: hybrid inCentive
mechanism for cooperation stimulation in ad-hoc networks,” Ad-hoc Networks, vol. 10,
no.6, pp. 976–989, 2012.
21. H. Shen, Z. Li, “ARM: an account-based hierarchical reputation management sys-
tem for wireless ad-hoc networks,” in 28th International Conference on Distributed
Computing Systems Workshops (ICDCS'08). Beijing, China; 17–20 June 2008, pp.
370–375.
22. Z. K. Chong, S. W. Tan, B. M. Goi, B. C. K. Ng, “Outwitting smart selsh nodes in
wireless mesh networks”, International Journal of Communication System, vol. 26 no.
9, 2013, ISSN: 1163–1175.
23. L. H. G. Ferraz, P. B. Velloso, O. C. M. B. Duarte, “An accurate and precise mali-
cious node exclusion mechanism for Ad-hoc networks”, Ad-hoc Networks, vol. 19, pp.
142–155, 2014.
24. M. Yu, M. Zhou, W. Su. “A secure routing protocol against Byzantine attacks for
manets in adversarial environments,” IEEE Trans Veh Technol, vol. 58, no. 1, pp. 449–
460, 200 9.
25. M. Conti, E. Gregori, G. Maselli, “Towards reliable forwarding for ad-hoc networks,”
in: Proceedings of the Personal Wireless Communications (PWC). Venice, Italy; 23–25
September 2003, pp. 790–804.
26. T. Prasannavenkatesan, R. Raja, P. Ganeshkumar, “PDA-misbehaving node detec-
tion & prevention for MANETs,” in IEEE Explore and Proceedings of International
Conference on Communication and Signal Processing (ICCSP). Melmaruvathur, pp.
1808–1812, Apr il 2014.
23Cooperative Communication Techniques
27. M. T. Refaei, V. Srivastava, L. Da Silva, M. Eltoweissy, “A reputation-based mecha-
nism for isolating selsh nodes in ad-hoc networks,” in Proceedings of the Second
Annual International Conference on Mobile and Ubiquitous Systems: Networking and
Services (MobiQuitous). SanDiego, CA; 17–21 July 2005, pp. 3–11, 2005.
28. K. Balakrishnan, J. Deng, P. K. Varshney, “TWOACK: Preventing selshness in
mobile ad hoc networks,” in Proceedings of the IEEE Wireless Communications and
Networking Conference (WCNC). New Orleans, LA; 13–17 March 2005, pp. 2137–
2142, 2005.
29. T. Prasannavenkatesan, P. Rajakumar, A. Pitchaikkannu, “An effective intrusion
detection system for MANETs,” in Proceedings on International Journal of Computer
Applications (IJCA) and ICACEA. Ghaziabad, vol. 3, pp. 29–34, March 2014.
30. H. Yang, J. Shu, X. Meng, S. Lu, “SCAN: Self-organized network-layer security in
mobile ad hoc networks." IEEE Journal on Selected Areas in Communications vol. 24,
no. 2, 261-273, 2006.
31. M. Mejia, N. Pena, J. L. Munoz, O. Esparza, and M. Alzate, “Ad hoc networks
DECADE: Distributed emergent cooperation through adaptive evolution in mobile ad
hoc networks,” Ad Hoc Networks, vol. 10, no. 7, pp. 1379–1398, 2012.
32. S. K. Ng, W. K. G. Seah, “Game-theoretic approach for improving cooperation in wire-
less multihop networks,” IEEE Transactions on Systems, Man, and Cybernetics, Part
B, 40(3), 559–574.
33. B. Niu, H. V. Zhao, J. Hai, “A cooperation stimulation strategy in wireless multicast
networks,” IEEE Transactions on Signal Processing, vol. 59, no. 5, pp. 2355–2369,
2011.
34. L. Huang, L. Li, L. Liu, H. Zhang, L. Tang, “Stimulating cooperation in route discovery
of ad hoc networks,” in Proceedings of the 3rd ACM Workshop on QoS and Security
for Wireless and Mobile Networks (Q2SWinet'07). Chania, Crete Island, Greece;
22–26 October 2007, pp. 39–46, 2007.
35. A. L. Toledo, X. Wang, “Robust detection of selsh misbehavior in wireless networks,”
IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1124–1134,
2007.
36. D. Djenouri and N. Badache, “Ad hoc networks on eliminating packet droppers in
MANET: A modular solution,Ad Hoc Networks, vol. 7, no. 6, pp. 1243–1258, 2009.
37. L. Sanchez-casado, G. Macia-Fernandez, P. García-Teodoro, and R. Magán-carrión,
A model of data forwarding in MANETs for lightweight detection of malicious packet
dropping,” Computer Networks, vol. 87, pp. 44–58, 2015.
38. S. K. Dhurandher, M. S. Obaidat, K. Verma, and P. Gupta, “FACES: Friend-based ad
hoc routing using challenges to establish security in MANETs systems,IEEE Systems
Journal, vol. 5, no. 2, pp. 176–188, 2011.
39. J. Sengathir and R. Manoharan, “Exponential reliability coefcient based reputation
mechanism for isolating selsh nodes in MANETs,Egyptian Informatics Journal,
vol. 16, no. 2, pp. 231–241, 2015.
40. N. Jiang, K. A. Hua, and D. Liu, “A scalable and robust approach to collaboration
enforcement in mobile ad-hoc networks,” Journal of Communications and Networks,
vol. 9, no. 1, pp. 56–66, 2007.
41. K. Komathy and P. Narayanasamy, “Best neighbor strategy to enforce cooperation
among selsh nodes in wireless ad hoc network,” Computer Communications, vol. 30,
pp. 3721–3735, 2007.
42. G. F. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, “Cooperation enforcement
schemes for MANETs: A survey,” Wireless Communications and Mobile Computing,
vol. 6, pp. 319–332, 2006.
An investigation on Cooperative Communication Techniques in Mobile
Ad-Hoc Networks
X. Wang , J. Li , and S. Member , “Improving the network lifetime of MANETs through
cooperative MAC protocol design,” IEEE transactions on parallel and distributed systems vol.
26, no. 4, pp. 1010–1020, 2015.
B. Karaoglu , W. Heinzelman , and S. Member , “Cooperative load balancing and dynamic
channel allocation for cluster-based mobile ad hoc networks,” IEEE transactions on mobile
computing vol. 14, no. 5, pp. 951–963, 2015.
T. Prasannavenkatesan , “FUCEM: Futuristic cooperation evaluation model using Markov
process for evaluating node reliability and link stability in mobile ad hoc network”, Wireless
Networks, Springer, (Article in Press), 2020, IF: 2.405, ISSN: 1572-8196, DOI:
https://doi.org/10.1007/s11276-020-02326-y.
P. Theerthagiri , “COFEE: Context-aware futuristic energy estimation model for sensor nodes
using Markov model and auto-regression”, International Journal of Communication System, p.
e4248, 2019. IF: 1.278, ISSN: 1099-1131, DOI: https://doi.org/10.1002/dac.4248.
T. Prasannavenkatesan , K. Udhayakumar , and R. Ramkumar “Security attacks and detection
techniques for MANET,” Discovery Journal, vol. 15, no. 42, pp. 89–93, Ghaziabad, March 2014.
J. N. Al-karaki, and A. E. Kamal , “Stimulating node cooperation in mobile ad hoc networks,”
Wireless Personal Communications, vol. 44, pp. 1–15.
N. Samian , Z. Ahmad , W. K. G. Seah , and A. Abdullah , “Cooperation stimulation
mechanisms for wireless multihop networks: A survey,” Journal of Network and Computer
Applications, vol. 54, pp. 88–106, 2015.
L. Buttyan , and J. P. Hubaux , “Nuglets: A virtual currency to stimulate cooperation in self-
organized mobile ad hoc networks,” Technical Report DSC/2001/001. Swiss Federal Institute of
Technology, Lausanne, Switzerland; 2001.
B. M. C. Silva , J. Rodrigues , N. Kumar , and G. Han , “Cooperative strategies for challenged
networks and applications: A survey,” IEEE Systems Journal, vol. 11, pp. 1–12, 2015.
L. Anderegg , S. Eidenbenz , “Ad-hoc-VCG: A truthful and cost-efficient routing protocol for
mobile Ad-hoc networks with selfish agents,” in: Proceedings of the 9th International
Conference on Mobile Computing and Networking (MobiCom). San Diego, CA; 14–19
September 2003. pp. 245–259.
S. Eidenbenz , G. Resta , P. Santi , “COMMIT: a sender-centric truthful and energy-efficient
routing protocol for Ad-hoc networks with selfish nodes,” in Proceedings of 19th IEEE
International, Parallel and Distributed Processing Symposium (IPDPS). Denver, Colorado, USA;
3–8 April 2005. pp. 239–249, 2005.
M. Mahmoud , X. Shen , “A secure payment scheme with low communication and processing
overhead for multihop wireless networks,” IEEE Trans Parallel Distrib Syst, vol. 24, no. 2, pp.
209–224, 2013.
S. Marti , T. J. Giuli , K. Lai , M. Baker , “Mitigating routing misbehavior in mobile ad-hoc
networks,” In: Proceedings of the 6th Annual International Conference on Mobile Computing
and Networking. Boston, MA; August 2000, pp. 255–265, 2000.
S. Buchegger , J. Y. L. Boudec , “Performance analysis of the CONFIDANT protocol,” in
Proceedings of the 3rd ACM International Symposium on Mobile Ad-Hoc Networking and
Computing (MOBIHOC). Lausanne, Switzerland; 9–11 June 2002, pp. 226–236, 2002.
P. Michiardi , R. Molva , “CORE: A collaborative reputation mechanism to enforce node
cooperation in mobile Ad-hoc networks,” in Proceedings of the 6th Joint Working Conference on
Communications and Multimedia Security. Netherlands; 26–27 September 2002, pp. 107–112,
2002.
Q. He , D. Wu , P. Khosla , “SORI: A secure and objective reputation-based incentive scheme
for Ad-hoc networks,” in Proceedings of the IEEE Wireless Communications and Networking
Conference (WCNC). NewOrleans, LA; 21–25 March 2004, pp. 825–830, 2004.
S. Bansal , M. Baker , “Observation-based cooperation enforcement in ad hoc networks,”
Technical Report cs.NI/0307012. Computer Science Department, Stanford University, USA;
2003.
J. Guo , H. Liu , J. Dong , X. Yang , “HEAD: A hybrid mechanism to enforce node cooperation in
mobile Ad-hoc networks,” Tsinghua Science and Technology, vol. 12, no. 1, pp. 202–207, 2007.
S. Zhong , Y. R. Yang , J. Chen . “Sprite: A simple, cheat proof, a credit-based system for
mobile Ad-hoc networks,” in: Proceedings of the 22nd IEEE International Conference on
Information Communications (INFOCOM). San Francisco; 1–3 April 2003, pp. 1987–1997,
2003.
D. E. Charilas , K. D. Georgilakis , A. D. Panagopoulos , “ICARUS: hybrid inCentive mechanism
for cooperation stimulation in ad-hoc networks,” Ad-hoc Networks, vol. 10, no.6, pp. 976–989,
2012.
H. Shen , Z. Li , “ARM: an account-based hierarchical reputation management system for
wireless ad-hoc networks,” in 28th International Conference on Distributed Computing Systems
Workshops (ICDCS'08). Beijing, China; 17–20 June 2008, pp. 370–375.
Z. K. Chong , S. W. Tan , B. M. Goi , B. C. K. Ng , “Outwitting smart selfish nodes in wireless
mesh networks”, International Journal of Communication System, vol. 26 no. 9, 2013, ISSN:
1163–1175.
L. H. G. Ferraz , P. B. Velloso , O. C. M. B. Duarte , “An accurate and precise malicious node
exclusion mechanism for Ad-hoc networks”, Ad-hoc Networks, vol. 19, pp. 142–155, 2014.
M. Yu , M. Zhou , W. Su . “A secure routing protocol against Byzantine attacks for manets in
adversarial environments,” IEEE Trans Veh Technol, vol. 58, no. 1, pp. 449–460, 2009.
M. Conti , E. Gregori , G. Maselli , “Towards reliable forwarding for ad-hoc networks,” in:
Proceedings of the Personal Wireless Communications (PWC). Venice, Italy; 23–25 September
2003, pp. 790–804.
T. Prasannavenkatesan , R. Raja , P. Ganeshkumar , “PDA-misbehaving node detection &
prevention for MANETs,” in IEEE Explore and Proceedings of International Conference on
Communication and Signal Processing (ICCSP). Melmaruvathur, pp. 1808–1812, April 2014.
M. T. Refaei , V. Srivastava , L. Da Silva , M. Eltoweissy , “A reputation-based mechanism for
isolating selfish nodes in ad-hoc networks,” in Proceedings of the Second Annual International
Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous).
SanDiego, CA; 17–21 July 2005, pp. 3–11, 2005.
K. Balakrishnan , J. Deng , P. K. Varshney , “TWOACK: Preventing selfishness in mobile ad hoc
networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference
(WCNC). New Orleans, LA; 13–17 March 2005, pp. 2137–2142, 2005.
T. Prasannavenkatesan , P. Rajakumar , A. Pitchaikkannu , “An effective intrusion detection
system for MANETs,” in Proceedings on International Journal of Computer Applications (IJCA)
and ICACEA. Ghaziabad, vol. 3, pp. 29–34, March 2014.
H. Yang , J. Shu , X. Meng , S. Lu , “SCAN: Self-organized network-layer security in mobile ad
hoc networks." IEEE Journal on Selected Areas in Communications vol. 24, no. 2, 261-273,
2006.
M. Mejia , N. Pena , J. L. Munoz , O. Esparza , and M. Alzate , “Ad hoc networks DECADE:
Distributed emergent cooperation through adaptive evolution in mobile ad hoc networks,” Ad
Hoc Networks, vol. 10, no. 7, pp. 1379–1398, 2012.
S. K. Ng , W. K. G. Seah , “Game-theoretic approach for improving cooperation in wireless
multihop networks,” IEEE Transactions on Systems, Man, and Cybernetics, Part B, 40(3),
559–574.
B. Niu , H. V. Zhao , J. Hai , “A cooperation stimulation strategy in wireless multicast networks,”
IEEE Transactions on Signal Processing, vol. 59, no. 5, pp. 2355–2369, 2011.
L. Huang , L. Li , L. Liu , H. Zhang , L. Tang , “Stimulating cooperation in route discovery of ad
hoc networks,” in Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and
Mobile Networks (Q2SWinet'07). Chania, Crete Island, Greece; 22–26 October 2007, pp.
39–46, 2007.
A. L. Toledo , X. Wang , “Robust detection of selfish misbehavior in wireless networks,” IEEE
Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1124–1134, 2007.
D. Djenouri and N. Badache , “Ad hoc networks on eliminating packet droppers in MANET: A
modular solution,” Ad Hoc Networks, vol. 7, no. 6, pp. 1243–1258, 2009.
L. Sanchez-casado, G. Macia-Fernandez , P. García-Teodoro , and R. Magán-carrión, “A model
of data forwarding in MANETs for lightweight detection of malicious packet dropping,” Computer
Networks, vol. 87, pp. 44–58, 2015.
S. K. Dhurandher , M. S. Obaidat , K. Verma , and P. Gupta , “FACES: Friend-based ad hoc
routing using challenges to establish security in MANETs systems,” IEEE Systems Journal, vol.
5, no. 2, pp. 176–188, 2011.
J. Sengathir and R. Manoharan , “Exponential reliability coefficient based reputation mechanism
for isolating selfish nodes in MANETs,” Egyptian Informatics Journal, vol. 16, no. 2, pp.
231–241, 2015.
N. Jiang , K. A. Hua , and D. Liu , “A scalable and robust approach to collaboration enforcement
in mobile ad-hoc networks,” Journal of Communications and Networks, vol. 9, no. 1, pp. 56–66,
2007.
K. Komathy and P. Narayanasamy , “Best neighbor strategy to enforce cooperation among
selfish nodes in wireless ad hoc network,” Computer Communications, vol. 30, pp. 3721–3735,
2007.
G. F. Marias , P. Georgiadis , D. Flitzanis , and K. Mandalas , “Cooperation enforcement
schemes for MANETs : A survey,” Wireless Communications and Mobile Computing, vol. 6, pp.
319–332, 2006.
IoE-Based Genetic Algorithms and Their Requisition
S.N. Shivanandam , S.N. Deepa , Principles of Soft Computing, Wiley, 2008.
M.H. Miraz , M. Ali , P.S. Excell , R. Picking , “A review on Internet of Things (IoT), Internet of
Everything (IoE) and Internet of Nano Things (IoNT)”, Internet Technologies and Applications
(ITA), pp. 219–224, Sept. 2015.
L.T. Yang , B. Di Martino , Q.C. Zhang , Internet of Everything, p. 8035421, Hindawi, Jul. 2017.
T. Škorić , K. Katzis , S. Jovanović , “Four pillars of IoT in health application”, in: IEEE
EUROCON 2019 -18th International Conference on Smart Technologies, pp. 1–4, Novi Sad,
Serbia, Jul. 2019.
X. Fan , X. Liu . W. Hu , C. Zhong , J. Lu , “Advances in the development of power supplies for
the Internet of Everything”, InfoMat, pp. 130–139, May 2019.
D.J. Langley , J. van Doorn , I.C.L. Ng , S. Stieglitz , A. Lazovik , A. Boonstra , “The Internet of
Everything: Smart things and their impact on business models”, Journal of Business Research,
vol. 122, pp. 853–863, Jan. 2021.
D.J. Feng , W.S. Wijesoma , “Improving Rao-Blackwellised genetic algorithmic filter SLAM
through genetic learning”, in: 2008 10th International Conference on Control, Automation,
Robotics and Vision, pp. 1200–1205, Hanoi, Vietnam, Dec. 2008.
I. Moon , J-H. Lee , J. Seong , “Vehicle routing problem with time windows considering overtime
and outsourcing vehicles”, Expert Systems with Applications, vol. 39, pp. 13202–13213, Dec.
2012.
B. Singh , R.P. Payasi , J. Sharma , “Effects of DG Operating Power Factor on Its Location and
Size by Using GA in Distribution Systems”, in: Bansal R. (eds) Handbook of Distributed
Generation. Springer, 2017.
I. Nishizaki , M. Sakawa , “Computational methods through genetic algorithms for obtaining
Stackelberg solutions to two level mixed zero-one programming problems”, Cybernetics and
Systems, vol. 31, pp. 203–221, Oct 2010.
J. Lin , B. Foote , S. Pulat , C. Chang , J.Y. Cheung , “Hybrid genetic algorithm for container
packing in three dimensions”, in: Proceedings of 9th IEEE Conference on Artificial Intelligence
for Applications, pp. 353–359, Orlando, FL, USA, 1993.
N.S. Chaudhari , Y.S. Ong , V. Trivedi , “Computational capabilities of soft-computing
frameworks: An overview”, 2006 9th International Conference on Control, Automation, Robotics
and Vision, pp. 1–6, Singapore, Dec. 2006.
B.L. Miller , D.E. Goldberg , “Genetic algorithms, selection schemes, and the varying effects of
noise”, Evolutionary Computation, vol. 4, no. 2, pp. 113–131, June 1996.
N. Rathore , I. Chana , “Load balancing and job migration algorithm: A survey of recent trends”,
Wireless Personal Communication (Q-3), vol. 79, no. 3, pp. 2089–2125, IF- 2.313, July 2014.
Springer Publication-New-York (USA), ISSN print 0929-6212
V. Sharma , R. Kumar , N.K. Rathore , “Topological broadcasting using parameter sensitivity-
based logical proximity graphs in coordinated ground-flying ad hoc networks”, Journal of
Wireless Mobile Networks Ubiquitous Computing and Dependable Applications(JoWUA) (Q-2),
vol. 6, no. 3, pp. 54–72, Sept. 2015. ISSN: 2093-5374 (printed), ISSN: 2093-5382 (online), IF-
2.40.
N. Rathore , I. Chana , “Variable threshold based hierarchical load balancing technique in grid”,
Engineering with Computers (Q-1), vol. 31, no. 3, IF- 3.938, pp. 597–615, June 2015. Springer
publication-London (England (UK), ISSN: 0177-0667 (print version).
N.K. Rathore , I. Chana , “A cognitive analysis of load balancing technique with job migration in
grid environment”, in: World Congress on Information and Communication Technology (WICT),
Mumbai, pp. 77–82, Dec. 2011. IEEE proceedings paper, ISBN -978-1-4673-0127-5.
N.K. Rathore , I. Chana , “A sender initiate based hierarchical load balancing technique for grid
using variable threshold value” in International Conference IEEE-ISPC, pp. 1–6, Solan, India,
26–28 Sept. 2013. Paper Presented & Published, ISBN- 978-1-4673-6188-0.
N. Rathore , I. Chana , “Job migration with fault tolerance and QoS scheduling using hash table
functionality in social grid computing”, Journal of Intelligent & Fuzzy Systems (Q-3), vol. 27, no.
6, pp. 2821–2833, June 2014. IOS Press publication-Netherland, ISSN print 1064-1246, IF-
1.851,.
N. Rathore , I. Chana , “Job migration policies for grid environment”, Wireless Personal
Communication (Q-3), vol. 89, no. 1, pp. 241–269, July 2016. Springer Publication-New-York
(USA), ISSN print 0929-6212, IF- 2.313.
N.K. Rathore , I. Chana , “Report on hierarchal load balancing technique in grid environment”,
Journal on Information Technology (JIT), vol. 2, no. 4, pp. 21–35, Sept.–Nov. 2013. ISSN Print:
2277-5110, ISSN Online: 2277-5250, IF= 2.235.
N.K. Rathore , I. Chana , “Checkpointing algorithm in Alchemi.NET”, in: Annual Conference of
Vijnana Parishad of India and National Symposium Recent Development in Applied Math-
ematics & Information Technology, JUET, Guna, MP, Dec. 2009. Abstract Published.
N. Rathore , “Performance of hybrid load balancing algorithm in distributed web server system”,
Wireless Personal Communication (Q-3), vol. 101, no. 3, pp. 1233–1246, 2018. Springer
Publication-New-York (USA), ISSN print 0929-6212, IF -2.313.
N. Rathore , “Dynamic threshold based load balancing algorithms”, Wireless Personal
Communication (Q-3), vol. 91, no. 1, pp. 151–185, Nov 2016. Springer Publication-New-York
(USA), ISSN print 0929–6212, ISSN online 1572-834X, IF -2.313.
N.K. Rathore , “Ethical hacking & security against cyber crime”, Journal on Information
Technology (JIT), vol. 5, no. 1, pp. 7–11, 2016. December 2015–February 2016. ISSN Print:
2277-5110, ISSN Online: 2277-5250, IF= 2.235.
N.K. Rathore , I. Chana , “Comparative analysis of checkpointing”, IT Enabled Practices and
Emerging Management Paradigm, pp. 321–327, 2008.
N.K. Rathore , “Efficient agent-based priority scheduling and load balancing using fuzzy logic in
grid computing”, Journal on Computer Science (JCOM), vol. 3, no. 3, pp. 11–22, Sept.–Nov.
2015. ISSN Print: 2347-2227, ISSN online: 2347-6141, IF= 0.750.
N.K. Rathore , “Map reduce architecture for grid”, Journal on Software Engineering (JSE), vol.
10, no. 1, pp. 21–30, July–Sept. 2015. ISSN Print: 0973-5151, ISSN Online: 2230-7168, IF=
3.765.
N.K. Rathore , “Faults in grid”, International Journal of Software and Computer Science
Engineering, ManTech Publication, vol. 1, no. 1, pp. 1–19, 2016.
N.K. Rathore , A. Sharma , Efficient Dynamic Distributed Load Balancing Technique: A Smart
Tool & Technology to Balance the Load Among the Network, LAP LAMBERT Academic
Publishing, 19 Oct. 2015. Project ID: 127478, ISBN no-978-3-659-78288-6.
N.K. Rathore , “Efficient hierarchical load balancing technique based on grid”, in: 29th MP
Young Scientist Congress, vol. 55, Solan, India, 2014.
N.K. Rathore , I. Chana , “Fault tolerance algorithm in Alchemi.NET”, in: Middleware, National
Conference on Education & Research (ConFR10), Third CSI National conference, Jaypee
University of Engg. & Tech., Guna, 2010.
N.K. Rathore , “Efficient load balancing algorithm in grid”, 30th MP Young Scientist Congress,
vol. 56, Bhopal, MP, 2015.
R. Chouhan , N.K. Rathore , “Comparision of load balancing technique in grid”, in: 17th Annual
Conference of Gwalior Academy of Mathematical Science, Jaypee University of Engg. & Tech.,
Guna, 2012.
R.I. Doewes , A.A.A. Ahmed , A. Bhagat , R. Nair , P.K. Donepudi , S. Goon , V. Jain , N.K.
Rathore , A regression analysis based system for sentiment analysis and a method thereof,
Patent Application No: 2021101792, Australian Official Journal of Patents, vol. 35, no. 17, 2021.
N.K. Rathore , R. Chohan , An Enhancement of Gridsim Architecture with Load Balancing.
Scholar's Press, 23 Oct. 2016. ISBN: 978-3-639-76989-0, Project id: 4900.
N.K. Rathore , U. Rawat , S.C. Kulhari , “Efficient hybrid load balancing algorithm”, National
Academy Science Letters, vol. 43, no. 2, pp. 177–185, 2020.
N.K. Jain , N.K. Rathore , A. Mishra , “An efficient image forgery detection using biorthogonal
wavelet transform and improved relevance vector machine”, Wireless Personal
Communications, vol. 101, no. 4, pp. 1983–2008, 2018.
N.K. Rathore , “Installation of Alchemi.NET in computational grid”, Journal on Computer
Science (JCOM),vol. 4, no. 2, pp. 1–5, 2016.
N.K. Rathore , P. Singh , An Efficient Load Balancing Algorithm in Distributed Networks.
Lambert Academic Publication House (LBA), 2016.
N.K. Rathore , “Checkpointing: Fault tolerance mechanism”, Journal on Cloud Computing
(JCC), vol. 4, no. 1, pp. 28–35, 2017.
N.K. Rathore , P.K. Singh , “A comparative analysis of fuzzy based load balancing algorithm”,
i`manager Journal of Computer Science (JCS), vol. 5, no. 2, pp. 23–33, 2017.
N.K. Rathore , “GridSim installation and implementation process”, Journal on Cloud Computing
(JCC), vol. 2, no. 4, pp. 29–40, 2015.
N.K. Rathore , An Efficient Dynamic & Decentralized Load Balancing Technique for Grid.
Scholars' Press, 2018. Project id: 6621.
N. Jain , N. Rathore , A. Mishra , “An efficient image forgery detection using improved relevance
vector machine”, Interciencia Journal, vol. 42, no. 11, pp. 95–120, 2017.
N.K. Rathore , H. Singh , “Analysis of grid simulators architecture”, Journal on Mobile
Applications and Technologies (JMT), vol. 4, no. 2, pp. 32–41, 2017.
N. Rathore , “A review towards: Load balancing techniques”, i-Manager's Journal on Power
Systems Engineering, vol. 4, no. 4, p. 47, 2016.
N.K. Rathore , I. Chana , PIMR ThirdNational IT conference, IT Enabled Practices and
Emerging Management Paradigm book and category is Communication Technologies and
Security Issues, pp. 32–35, Topic No/Name-46, Prestige Management And Research, Indore,
2008.
F. Khan , N.K. Rathore , “Internet of things: A review article”, i-manager's Journal on Cloud
Computing, vol. 5, no. 1, pp. 20–25, 2018.
N. Jain , N.K. Rathore , A. Mishra , “An efficient image forgery detection using biorthogonal
wavelet transform and singular value decomposition”, in: 5th International Conference on
Advance Research Applied Science, Environment, Agriculture & Entrepreneurship Development
(ARABSEED), Bhopal organized & sponsored by Jan Parishad, JMBVSS & International
Council of people at Bhopal, pp. 274–281, held on 04-06 December 2017, 2017. ISBN No-978-
93-5267-869-3
N.K. Rathore , N.K. Jain , P.K. Shukla , U.S. Rawat , R. Dubey , “Image forgery detection using
singular value decomposition with some attacks”, National Academy Science Letters, vol. 44,
no. 4, pp. 331–338, 2021.
D. Pandey , U. Rawat , N.K. Rathore , K. Pandey , P.K. Shukla , “Distributed biomedical
scheme for controlled recovery of medical encrypted images'', IRBM, 2020. Innovation
andResearch in BioMedical Engineering (Q-3), Elsevier IF=1.09, ISSN no- 1959-0318, Issue-
43, pp. 151160, May 2022. https://doi.org/10.1016/j.irbm.2020.07.003
N.K. Rathore , I. Channa , “Checkpointing algorithm in Alchemi.NET”, Journal of Information
Technology, vol. 8, no. 1, pp. 32–38, 2010.
N.K. Rathore , “Rupendra tandekar and Alok Gour \Hotel Management" in Scholar's Press,
Mauritius, Project id: 12332, ISBN: 978-613-8-95576-4, 2021
N. Rathore , D. Pandey , R.I. Doewes , A. Bhatt , “A novel security technique based on
controlled pixel based encryption of image blocks for sharing a secret image”, Wireless
Personal Communication (Q-3), pp. 191207, 18-June 2021, DOI: 10.1007/s11277-021-08630-
w, ISSN print 0929-6212, IF-2.313.
N.K. Rathore , V. Jaiswal , V. Sharma , S. Varma , A Hybrid Methodology for Flower Images
Segmentation & Recognition with extended Deep-Convolution Neural Network. CNN, 2021.
P. Laxkar , N.K. Rathore , “Load balancing algorithm in distributed network”, Solid State
Technology, vol. 63, no. 2s, pp. 6633–6645, 2020. ISSN: 0038–111X, SCOPUS Indexed,
IF=0.05.
N.K. Rathore , Load balancing algorithm in distributed network”, in: Janparishad 6th
International Conference on Science & Environmental, Sustainability for a peaceful Society
(SESPS-2018)in association with international cities of Peace (USA), SusTranCon (USA),
International Council of people(India), Global Network for Sustainable Development, Center for
Global Nonkilling (USA) and JMBVSSat Bhopal (M.P.) India, Conference ID-SESPS 2018:06,
ISBN No-978-93-5321-737-2, pp. 02–03, held on 19-21 January 2019
N.K. Rathore , J. Rathore , “Efficient checkpoint algorithm for distributed system”, International
Journal of Engineering and Computer Science (IJECS), vol. 1, no. 2, pp. 59–66, 2019. E-ISSN:
2663-3590, P-ISSN: 2663-3582.
N.K. Rathore , An Efficient Load Balancing Technique for Grid. Scholar's Press, Mauritius,
2018. ISBN: 978-3-330-65134-0, Project id: 6621.
N.K. Rathore , F. Khan , “Survey of IoT”, International Journal of Computer Science and Soft
Computing, vol. 1, no. 1, pp. 1–13, 2018. ManTech Publication, ISSN no-2319-7242.
N.K. Rathore , presented paper on “Big data analysis”, in: 4th International Conference on latest
Concept in Science, Technology & Management (ICLCSTM-2017), held in Sinhgad College of
Engineering, Vadgao, Pune, 17-August-2017.
S. Sivanandam , S. Deepa , “Terminologies and operators of GA”, in: Introduction to Genetic
Algorithms. Springer, pp. 39–81, 2008.
C.R. Reeves , “Genetic algorithms”, in: Gendreau M. , Potvin J.Y. (eds) Handbook of
Metaheuristics. International Series in Operations Research & Management Science, vol 146.
Springer, pp. 109–139, 2010.
http://www.quora.com/
http://mindmajix.com/
http://towardsdatascience.com/
https://www.youtube.com/watch?v=IZEhdgjZyf0
https://www.bbvaopenmind.com/en/technology/digital-world/the-internet-of-everything-ioe/
https://www.sam-solutions.com/blog/what-is-internet-of-everything-ioe/
J. Rathore , V.S. Chouhan , “Employee job satisfaction: Empirical study of Indian public and
private industry”, Turkish Online Journal of Qualitative Inquiry (TOJQI), vol. 12, no. 6, pp.
9860–99875, July 2021.
A Framework for Hybrid WBSN-VANET-based Health Monitoring
Systems
S. El-Masri and B. Saddik , “An emergency system to improve ambulance dispatching,
ambulance diversion and clinical handover communication: A proposed model,” J Med Syst.,
vol. 36, no. 6, pp. 3917–3923, Dec. 2012, doi: 10.1007/s10916-012-9863-x.
P. Singh , R. S. Raw , and S. A. Khan , “Development of novel framework for patient health
monitoring system using VANET: An Indian perspective,” Int J Inf Technol., vol. 13, pp.
383–390, 2020, doi: 10.1007/s41870-020-00551-4.
H. Noshadi , E. Giordano , H. Hagopian , and W. Universit , “Remote medical monitoring
through vehicular ad hoc network,” in International Symposium on Wireless Vehicular
Communications, Calgary, AB, Canada, (WiVeC 2008), pp. 1–5, 2008, doi:
10.1109/VETECF.2008.456.
S. Umamaheswari and R. M. Priya , “An efficient healthcare monitoring system in vehicular ad
hoc networks,” Int J Comput Appl., vol. 78, no. 7, pp. 45–49, 2013, doi: 10.5120/13505-1254.
P. K. Sahoo , M.-J. Chiang , and S.-L. Wu , “SVANET: A smart vehicular ad hoc network for
efficient data transmission with wireless sensors,” Sensors, vol. 14, no. 12, pp. 22230–22260,
2014, doi: 10.3390/s141222230.
P. Singh , “Internet of things based health monitoring system: Opportunities and challenges,” Int
J Adv Res Comput Sci., vol. 9, no. 1, Feb. 2018, doi: 10.26483/ijarcs.v9i1.5308.
A. Hussain , R. Wenbi , A. L. Da Silva , M. Nadher , and M. Mudhish , “Health and emergency-
care platform for the elderly and disabled people in the Smart City,” J Syst Softw., vol. 110, pp.
253–263, 2015, doi: 10.1016/j.jss.2015.08.041.
S. Al-Sultan , M. M. Al-Doori , A. H. Al-Bayatti , and H. Zedan , “A comprehensive survey on
vehicular ad hoc network,” J Netw Comput Appl., vol. 37, no. 1, pp. 380–392, 2014, doi:
10.1016/j.jnca.2013.02.036.
R. S. Raw , M. Kumar , and N. Singh , “Security challenges, issues and their solutions for
VANET,” Int J Netw Secur Its Appl., vol. 5, no. 5, pp. 95–105, Sep. 2013, doi:
10.5121/ijnsa.2013.5508.
M. R. Ghori , K. Z. Zamli , N. Quosthoni , M. Hisyam , and M. Montaser , “Vehicular ad-hoc
network (VANET): Review,” in 2018 IEEE International Conference on Innovative Research and
Development, Bangkok, Thailand, pp. 1–6, 2018.
C. T. Barba , K. Ornelas Aguirre , and M. Aguilar Igartua , “Performance evaluation of a hybrid
sensor and vehicular network to improve road safety,” in PE-WASUN'10: Proceedings of the
14th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous
Networks, Co-located with MSWiM'10, Bodrum, Turkey, pp. 71–78, 2010, doi:
10.1145/1868589.1868604.
J. Sun , X. Zhu , C. Zhang , and Y. Fang , “RescueMe: Location-based secure and dependable
VANETs for disaster rescue,” IEEE Journal on Selected Areas in Communications, vol. 29, no.
3, pp. 659–669, 2011, doi: 10.1109/JSAC.2011.110314.
N. Kumar , K. Kaur , S. C. Misra , and R. Iqbal , “An intelligent RFID-enabled authentication
scheme for healthcare applications in vehicular mobile cloud,” Peer-to-Peer Netw Appl., vol. 9,
no. 5, pp. 824–840, 2016, doi: 10.1007/s12083-015-0332-4.
K. Ahed , M. Benamar , A. A. Lahcen , and R. El Ouazzani , “Forwarding strategies in vehicular
named data networks: A survey,” J King Saud Univ: Comput Inf Sci., vol. 34, Issue 5, pp.
1819–1835, 2022, doi: 10.1016/j.jksuci.2020.06.014.
A. B. Adeyemo , W. O. Adesanya , and O. Ariyo , “Framework for a cloud based health
monitoring system,” in Proceedings of the 2nd International Conference on Computing
Research and Innovations, Ibadan, Nigeria, Sep. 2016.
M. Barua , X. Liang , R. Lu , and X. Shen , “RCare: Extending secure health care to rural area
using VANETs,” Mob Networks Appl., vol. 19, no. 3, pp. 318–330, 2014, doi: 10.1007/s11036-
013-0446-y.
S. K. Bhoi and P. M. Khilar , “VehiHealth: An emergency routing protocol for vehicular ad hoc
network to support healthcare system,” J Med Syst., vol. 40, no. 3, pp. 1–12, 2016, doi:
10.1007/s10916-015-0420-2.
S. DasGupta , S. Choudhury , and R. Chaki , “VADiRSYRem: VANET-based diagnosis and
response system for remote locality,” SN Comput Sci., vol. 2, no. 1, p. 41, 2021, doi:
10.1007/s42979-020-00430-6.
S. Kumar , A. Bansal , and R. S. Raw , “Health monitoring planning for on-board ships through
flying ad hoc network,” Advances in Intelligent Systems and Computing, vol. 1089, pp. 391–402,
2020, doi: 10.1007/978-981-15-1483-8_33.
P. Singh , R. S. Raw , S. A. Khan , M. A. Mohammed , A. A. Aly , and D.-N. Le , “W-GeoR:
Weighted geographical routing for VANET's health monitoring applications in urban traffic
networks,” IEEE Access, vol. 10, pp. 38850–38869, 2022, doi:
10.1109/ACCESS.2021.3092426.
H. Noshadi , E. Giordano , H. Hagopian , and W. Universit , “Remote medical monitoring
through vehicular ad hoc network,” in International Symposium on Wireless Vehicular
Communications, Calgary, Canada, (WiVeC 2008), pp. 1–5, 2008.
A. Aliyu et al., “Cloud computing in VANETs: Architecture, taxonomy, and challenges,” IETE
Tech. Rev. (Institution Electron. Telecommun. Eng. India), vol. 35, no. 5, pp. 523–547, Sep.
2018, doi: 10.1080/02564602.2017.1342572.
Managing IoT – Cloud-based Security
S. A. Alabady , et al., “A novel security model for cooperative virtual networks in the IoT era”,
International Journal of Parallel Programming, p. 1–16, 2018.
T. Adhikary , et al., “The internet of things (IoT) augmentation in healthcare: An application
analytics”, International Conference on Intelligent Computing and Communication Technologies,
Beijing. 2019, Springer.
D. Silveira ., et al., “Analysis of industry 4.0 technologies applied to the health sector:
Systematic literature review”, Occupational and Environmental Safety and Health. 2019,
Springer. pp. 701–709.
H. Arasteh , et al., “Iot-based smart cities: A survey”, IEEE 16th International Conference on
Environment and Electrical Engineering (EEEIC), New Delhi, 2016.
D.-M. Park , et al., “Smart home framework for common household appliances in IoT”, Network
Journal of Information Processing Systems, 15(2), pp. 56–65, 2019.
S. Mahmud , et al.,“A smart home automation and metering system using internet of things
(IoT)”, International Conference on Robotics, Electrical and Signal Processing Techniques
(ICREST), Lucknow, 2019.
H. F. Atlam , et al., “Integration of cloud computing with internet of things: Challenges and open
issues”, International Conference on Internet of Things (iThings), Paris, 2017.
Dr. M. L. Sharma , et al., “Internet of Things Application, Challenges and Future Scope”,
International Research Journal of Engineering and Technology (IRJET), Vol. 3, pp. 156–169,
2018.
A. K. Mani , et al., “A review: IoT and cloud computing for future internet”, International
Research Journal of Engineering and Technology (IRJET), 2019.
M. Chopra , et al., “A comparative study of cloud computing through IoT”, International Journal
of Engineering Development and Research (IJEDR), 2019.
W. Zhou , et al., “Discovering and understanding the security hazards in the interactions
between IoT devices, mobile apps, and clouds on smart home platforms”, 28th {USENIX}
Security Symposium ({USENIX} Security 19), Tokyo, 2019.
A. Ahmed , et al., “Malicious insiders attack in IoT based multi-cloud e-healthcare environment:
A systematic literature review”, Multimedia Tools and Applications, 77(17), pp. 21947–21965,
2018.
A. N. Moussa , et al., “A consumer-oriented cloud forensic process model”, IEEE 10th Control
and System Graduate Research Colloquium (ICSGRC), Noida, 2019.
Z. Han , et al., “A software defined network-based security assessment framework for cloudIoT”,
IEEE Internet of Things Journal, 5(3), pp. 1424–1434, 2018.
Guechi , et al., “Secure and parallel expressive search over encrypted data with access control
in multi-cloudIoT”, 3rd Cloudification of the Internet of Things (CIoT), Frankfurt, 2018.
Y. Mo , “A data security storage method for IoT under Hadoop cloud computing Platform”,
International Journal of Wireless Information Networks, pp. 1–6, 2019.
G. Sharma et al., “Advanced lightweight multi-factor remote user authentication scheme for
cloud-IoT applications”, Journal of Ambient Intelligence and Humanized Computing, pp. 1–24,
2019.
Choi , et al., “Ontology-based security context reasoning for power IoT-cloud security service”,
IEEE Access,7, pp. 110510–110517, 2019.
N. Almolhis , et al., The Security Issues in IoT-Cloud: A Review, IEEE, 2020.
V. Sharma , et al., “A review paper on ‘IOT' & it's smart applications”, International Journal of
Science, Engineering and Technology Research (IJSETR), 5(2), p. 472, February 2016.
M. Mahmud , et al., “A brain-inspired trust management model to assure security in a cloud
based IoT framework for neuroscience applications”, Cognitive Computation, 10(5), pp.
864–873, 2018.
A. Skaržauskienė , et al., “The future potential of internet of things”, Social Technologies, 2(1),
pp. 102–113, 2012.
D. A. Vyas , et al., “IoT: Trends, challenges and future scope”, IJCSC, 7, pp. 26–35, March
2016.
S. M. Babu , et al., “A study on cloud based internet of things: Cloud-IoT”, Global Conference on
Communication Technologies, no. GCCT, Berlin, 2015, pp. 60–65.
A. Alenezi , et al., “The impact of cloud forensic readiness on security”, 7th International
Conference on Cloud Computing and Services Science, Beijing, 2017, pp. 1–8.
J. Zhou , et al., “Security and privacy for cloud-based IoT: Challenges, countermeasures, and
future directions”, IEEE Communications Magazine, 55, pp. 26–33, January 2017.
K. S. Dar , et al., “Enhancing dependability of cloud-based IoT services through virtualization”,
1st International Conference on Internet IEEE, Hamburg, 2016.
J. Zhu , et al., “Research on supply chain simulation system based on internet of things”,
Advances in Internet of Things, 5, pp. 1–6, 2015.
Y. Yang , et al., “A survey on security and privacy issues in internet-of-things”, IEEE Internet of
Things Journal, vol. 4, no. 5, pp. 1250–1258, Oct. 2017, doi: 10.1109/JIOT.2017.2694844.
S. Jun , “Technology analysis for Internet of Things Using Big Data Learning”, International
Journal of Research in Engineering and Technology, Vol. 263, No. 4, p. 042–070. IOP
Publishing. eISSN: 2319-1163 | pISSN: 2321-7308.
G. Suciu , et al., "Smart cities built on resilient cloud computing and secure internet of things”,
19th International Conference on Control Systems and Computer Science (CSCS), Chicago,
2013, pp. 513–518.
M. Díaz , et al., "State-of-the-art, challenges, and open issues in the integration of Internet of
things and cloud computing”, Journal of Network and Computer Applications, 2016, pp. 99–117.
C. Doukas et al., “Bringing IoT and Cloud Computing Towards Pervasive Healthcare”,
Proceedings of the 6th International Conference on Innovative Mobile and Internet Services in
ubiquitous computing IMIS, Beijing, 2012, pp. 922–926.
H. F. Atlam , et al., “An overview of risk estimation techniques in risk-based access control for
the internet of things”, 2nd International Conference on Internet of Things, Big Data and
Security, New Delhi, 2017, pp. 1–8.
A. Botta , et al., “On the integration of cloud computing and internet of things”, International
Conference on Future Internet of Things and Cloud, Barcelona, 2014, pp. 23–30.
R. Buyya , et al., “Cloud computing and emerging IT platforms: Vision, hype and reality for
delivering computing as the 5th utility”, Future Generation Computer Systems, vol. 2, pp.
599–616, 2009.
M. Armbrust , et al., “A view of cloud computing”, Communications of the ACM, vol. 53, no. 4,
pp. 50–58, 2010.
P. Velmurugadass , et al., “Enhancing blockchain security in cloud computing with IoT
environment using ECIES and cryptography hash algorithm”, Materials Today: Proceedings,
vol. 37, pp. 2653–2659, 2021.
A. Wilczyński et al., “Modelling and simulation of security aware task scheduling in cloud
computing based on blockchain technology”, Simulation Modelling Practice and Theory, vol. 99,
p. 102038, Feb. 2020.
J. Cha , et al., “Blockchain-empowered cloud architecture based on secret sharing for smart
city”, Journal of Information Security and Applications, vol. 57, p. 102686, Mar. 2021.
H. Huang , et al., “Blockchain-based eHealth system for auditable EHRs manipulation in cloud
environments”, Journal of Parallel and Distributed Computing, vol. 148, pp. 46–57, Feb. 2021.
Y. Ren , et al., “Multiple cloud storage mechanism based on blockchain in smart homes”, Future
Generation Computer Systems, vol. 115, pp. 304–313, Feb. 2021.
J. Li , et al., “Blockchain-based public auditing for big data in cloud storage”, Information
Processing and Management, vol. 57, no. 6, p. 102382, Nov. 2020.
N. Eltayieb , et al., “A blockchain-based attribute-based signcryption scheme to secure data
sharing in the cloud”, Journal of Systems Architecture, vol. 102, p. 101653, Jan. 2020
M. Zhaofeng , et al., “Blockchain-enabled decentralized trust management and secure usage
control of IoT big data”, IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4000–4015, May
2020.
S. Algarni , et al., “Blockchain-based secured access control in an IoT system”, Applied
Sciences, vol. 11, no. 4, p. 1772, Feb. 2021
R. Kumar , et al., “Revisiting software security: durability perspective”, International Journal of
Hybrid Information Technology, vol. 8, no. 2, pp. 311–322, 2015.
R. Kumar , et al., “Durability challenges in software engineering”, Crosstalk-The Journal of
Defense Software Engineering, pp. 29–31, 2016.
K. Sahu , et al., “Risk management perspective in SDLC”, International Journal of Advanced
Research in Computer Science and Software Engineering, vol. 4, no. 3, pp. 1–15, 2014.
K. Sahu , et al., “Hesitant fuzzy sets based symmetrical model of decision-making for estimating
the durability of Web application”, Symmetry, vol. 12, no. 11, p. 1770, 2020
R. Kumar , et al., “Analytical network process for software security: a design perspective”, CSI
Transactions on ICT, vol. 4, no. 2, pp. 255–258, 2016.
K. Sahu , et al., “Evaluating the impact of prediction techniques: Software reliability
perspective”, Computers Materials and Continua, vol. 67, no. 2, pp. 1471–1488, 2021.
R. Kumar , et al., “Durable security in software development: Needs and importance”, CSI
Communication, vol. 39, no. 7, pp. 34–36, 2015.
M. T. J. Ansari , et al., “P-STORE: Extension of STORE methodology to elicit privacy
requirements”, Arabian Journal for Science and Engineering, vol. 46, no. 9, pp.8287–8310,
2021.
R. Kumar , et al., “Software security testing: A pertinent framework”, Journal of Global Research
in Computer Science, vol. 5, no. 3, pp. 23–27, 2014.
A. Attaallah , et al., “Analyzing the big data security through a unified decision-making
approach”, Intelligent Automation and Soft Computing, vol. 32, no. 2, pp. 1071–1088, 2022.
A. H. Almulihi , et al., “Analyzing the implications of healthcare data breaches through
computational technique”, Intelligent Automation and Soft Computing, pp. 1763–1779, 2022.
A. K. Pandey , et al., “Analyzing the implications of COVID-19 pandemic through an intelligent-
computing technique”, Computer Systems Science and Engineering, pp. 959–974, 2022.
R. Kumar , et al., “An integrated approach of fuzzy logic, AHP and TOPSIS for estimating
usable-security of web applications”, IEEE Access, vol. 8, pp. 50944–50957, 2020.
R. Kumar , et al., “Measuring security durability of software through fuzzy-based decision-
making process”, International Journal of Computational Intelligence Systems, vol. 12, no. 2, p.
627, 2019.
R. Kumar , et al., “A knowledge-based integrated system of hesitant fuzzy set, ahp and topsis
for evaluating security-durability of web applications”, IEEE Access, vol. 8, pp. 48870–48885,
2020.
Predictive Maintenance in Industry 4.0
Ahmadi, S. , Hajihassani, M. , Moosazadeh, S. , & Moomivand, H. (2020). An overview of the
reliability analysis methods of tunneling equipment. The Open Construction and Building
Technology Journal, 14(1), 218–229. https://doi.org/10.2174/1874836802014010218
Bramer, M. (2013). Introduction to Data Mining. In: Principles of Data Mining. Undergraduate
Topics in Computer Science. Springer, London. https://doi.org/10.1007/978-1-4471-4884-5_1
Cartella, F. , Lemeire, J. , Dimiccoli, L. , & Sahli, H. (2015). Hidden semi-markov models for
predictive maintenance. Mathematical Problems in Engineering, 1–23. 2015
https://doi.org/10.1155/2015/278120
Deka, B. , Birklykke, A. A. , Duwe, H. , Mansinghka, V. K. , & Kumar, R. (2014). Markov chain
algorithms: A template for building future robust low-power systems. Philosophical Transactions
of the Royal Society A: Mathematical, Physical and Engineering Sciences, 372, (2018), 1–16.
https://doi.org/10.1098/rsta.2013.0277
Gugulothu, N. , Gugulothu, N. , Tv, V. , Malhotra, P. , Vig, L. , Agarwal, P. , & Shro, G. (2017).
Predicting Remaining Useful Life using Time Series Embeddings based on Recurrent Neural
Networks International Journal of Prognostics and Health Management.
https://doi.org/10.1145/nnnnnnn.nnnnnnn
Dinov, I. D. (2018). Data Science and Predictive Analytics: Biomedical and Health Applications
using R., Springer, Cham. https://doi.org/10.1007/978-3-319-72347-1
Gupta, R. , & Bhardwaj, P. (2014). Analysis of a discrete parametric Markov-chain model of A
two unit cold standby system with repair machine failure. International Journal of Scientific &
Engineering Research, 5(2), 924–927.
Hofmann, P. , & Tashman, Z. (2020). Hidden markov models and their application for predicting
failure events. In Computational Science – ICCS 2020. ICCS 2020, Amsterdam, The
Netherlands. Lecture Notes in Computer Science, vol 12139. Springer, Cham.
https://doi.org/10.1007/978-3-030-50420-5_35
Holladay, D. W. , Dallman, B. D. , & Grigg, C. H. (2006). Reliability centered maintenance study
on voltage regulators. In Proceedings of the IEEE International Conference on Transmission
and Distribution Construction and Live Line Maintenance, Albuquerque, NM, USA, ESMO, 2–6.
https://doi.org/10.1109/TDCLLM.2006.340728
Hu, C. , Pei, H. , Wang, Z. , Si, X. , & Zhang, Z. (2018). A new remaining useful life estimation
method for Equipment subjected to intervention of imperfect maintenance activities. Chinese
Journal of Aeronautics, 31(3), 514–528. https://doi.org/10.1016/j.cja.2018.01.009
Peng, C. , Chen, Y. , Chen, Q. , Tang, Z. , Li, L. , & Gui, W. (2021). A Remaining Useful Life
Prognosis of Turbofan Engine Using Temporal and Spatial Feature Fusion. Sensors (Basel,
Switzerland), 21(2), 418. https://doi.org/10.3390/s21020418
Kalaiarasi, S. , Merceline Anita, A. , & Geethanjalii, R. (2017). Analysis of system reliability
using markov technique. Global Journal of Pure and Applied Mathematics, 13(9), 5265–5273.
http://www.ripublication.com
Kanawaday, A. (2017). Machine Learning for Predictive Maintenance of Industrial Machines
using IoT Sensor Data. IEEE. Figures 2, 4–7.
Kubat, M. (2017). An introduction to machine learning. In An Introduction to Machine Learning
(Vol. 2). Cham, Switzerland: Springer International Publishing. https://doi.org/10.1007/978-3-
319-63913-0
Kuzin, T. , & Borovi, T. (2016). Early failure detection for predictive maintenance of sensor
parts. ITAT 2016 Proceedings, CEUR Workshop Proceedings, 1649, 123–130.
Mishra, K. , & Manjhi, S. K. (2018). Failure prediction model for predictive maintenance. In 2018
IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore,
India, 72–75. https://doi.org/10.1109/CCEM.2018.00019
Nakamura, J. (2007). Predicting Time to Failure of Industrial Machines with Temporal Data
Mining. Masters of Science, University of Washington.
Pedregosa . (2011). JMLR. https://scikit-learn.org/stable/about.html#citing-scikit-learn
Qin, A. , Zhang, Q. , Hu, Q. , Sun, G. , He, J. , & Lin, S. (2017). Remaining useful life prediction
for rotating machinery based on optimal degradation indicator. Shock and Vibration, 2017, 1-12.
https://doi.org/10.1155/2017/6754968
Ramos, P. , Oliveira, J. M. S. , & Silva, P. (2014). Predictive maintenance of production
equipment based on neural network autoregression and ARIMA. In 21st International EurOMA
Conference-Operations Management in an Innovation Economy.
https://core.ac.uk/download/pdf/143396566.pdf
Salfner, F. (2005). Predicting failures with hidden Markov models. In Proceedings of 5th
European Dependable Computing Conference (EDCC-5), 41–46. http://www.rok.informatik.hu-
berlin.de/Members/Members/salfner/publications/salfner05predicting.pdf
Tai, A. H. , Ching, W. K. , & Chan, L. Y. (2006). Hidden Markov model for the detection of
machine failure. In 36th International Conference on Computers and Industrial Engineering, ICC
and IE 2006, Taipei, Taiwan, 2009–2020.
Yuan, C. (2015). Unsupervised machine condition monitoring using segmental hidden Markov
models. In IJCAI International Joint Conference on Artificial Intelligence, Buenos Aires,
Argentina, 2015-Janua(IJCAI), 4009–4016.
Fast and Efficient Lightweight Block Ciphers Involving 2d-Key Vectors
for Resource-Poor Settings
Adler-Milstein J. , DesRoches C.M. , Kralovec P. et al. 2015. Electronic health record adoption
in US hospitals: progress continues, but challenges persist. Health Aff. 34:2174–2180.
Adler-Milstein J. , Lin S.C. , Jha A.K. . 2016. The number of health information exchange efforts
is declining, leaving the viability of broad clinical data exchange uncertain. Health Aff.
35:1278–1285.
Atasoy H. , Greenwood B.N. , McCullough J.S. . 2019. The digitization of patient care: A review
of the effects of electronic health records on health care quality and utilization, Annu Rev Public
Health. 40(1):487–500
Braa J. , Hanseth O. , Heywood A. , et al. 2007. Developing health information systems in
developing countries: the flexible standards strategy. MIS Quarter. 31:381–402.
Braa J. , Sahay S. . 2012. Integrated Health Information Architecture: Power to the Users:
Design, Development and Use. New Delhi: Matrix Publishers.
Gebre-Mariam, M. , & Fruijtier, E. 2017. Countering the ‘dam eect': The case for architecture
and governance in large scale developing country health information systems. Inf Technol
Develop. 24(2): 1–26.
Mihailescu M. , Mihailescu D. , Schultze U. . 2015. The generative mechanisms of healthcare
digitalization. In Thirty Sixth International Conference on Information Systems. Fort Worth.
Manda T.D. 2015. Developing capacity for maintenance of HIS in the context of loosely
coordinated project support arrangements. In IST-Africa Conference (pp. 1–10). 2015 IST-Africa
Conference.
Mingers J. , Standing C. 2017. Why things happen–developing the critical realist view of causal
mechanisms. Inf Organ. 27:171–189.
Kimaro H.C. , Nhampossa J.L. 2005. Analyzing the problem of unsustainable health information
systems in less-developed economies: Case studies from Tanzania and Mozambique. Inf
Technol Develop. 11:273–298.
Kakarla S. . 2019. Securing large datasets involving fast-performing key bunch matrix block
cipher. Healthcare Data Analytics and Management, Advances in Ubiquitous Sensing
Applications for Healthcare, Elsevier Publications, Paperback ISBN: 9780128153680, Vol 2,
111–132, https://doi.org/10.1016/C2017-0-03245-7.
Shirisha K. , Sastry V.U.K. . 2013. A block cipher involving the elements of a key bunch matrix
as powers of the plaintext elements. Int J Comput Netw Secur. 23(2):1192–1197, Recent
Science Publications, ISSN: 2051-6878, USA.
Resources.data.gov . 2017 Accessed. Demographic statistics by zip code, Retrieved from
https://catalog.data.gov/data set/demographic-statistics-by-zip-code-cfc9/resource/e43f1938-
3c4a-4501-9aaf- 46891bb21553.
Stallings W. . 2003. Cryptography and Network Security: Principle and Practices. 3rd Edition.
New Delhi: Springer, 29–30.
Hill L. . 1929. Cryptography in an algebraic alphabet. Am Math Mon. 36(6):306–312.
Albanesius C. . 2011. LulzSec on Hacks: ‘We Find it Entertaining'. PC Magazine. Available at:
https://news.yahoo.com/lulzsec-hacks-entertaining-132426237.html.
The UAV-Assisted Wireless Ad hoc Network
M. Mozaffari , W. Saad , M. Bennis , Y. H. Nam , and M. Debbah , “A tutorial on UAVs for
wireless networks: Applications, challenges, and open problems,” arXiv, vol. 21, no. 3, pp.
2334–2360, 2018.
L. Gupta , R. Jain , and G. Vaszkun , “Survey of important issues in UAV communication
networks,” IEEE Commun. Surv. Tutorials, vol. 18, no. 2, pp. 1123–1152, 2016, doi:
10.1109/COMST.2015.2495297.
Y. Chen , H. Zhang , and M. Xu , “The coverage problem in UAV network: A survey,” in Fifth
International Conference on Computing, Communications and Networking Technologies
(ICCCNT), New Delhi, Jul. 2014, pp. 1–5, doi: 10.1109/ICCCNT.2014.6963085.
R. A. Nazib and S. Moh , “Routing protocols for unmanned aerial vehicle-aided vehicular Ad
Hoc Networks: A survey,” IEEE Access, vol. 8, pp. 77535–77560, 2020, doi:
10.1109/ACCESS.2020.2989790.
C. Perkings , E. Belding-Royer , and S. Das , “Ad hoc on-demand distance vector (AODV)
routing,” IETF RFC, 3561, pp. 1–37, July 2003, [Online]. Available:
http://tools.ietf.org/pdf/rfc3561.pdf.
T. Clausen and P. Jacquet , “Optimized link state routing protocol (OLSR),” RFC Editor, 2003,
[Online]. Available: https://www.rfc-editor.org/info/rfc3626.
C. E. Perkins and P. Bhagwat , “Highly dynamic destination-sequenced distance-vector routing
(DSDV) for mobile computers,” SIGCOMM Comput Commun Rev., vol. 24, no. 4, pp. 234–244,
Oct. 1994, doi: 10.1145/190809.190336.
N. Beijar , “Zone routing protocol (ZRP),” Netw Lab Helsinki Univ Technol Finl., vol. 9, pp. 1–12,
2002.
D. B. Johnson and D. A. Maltz , “DSR: The dynamic source routing protocol for multi-hop
wireless ad hoc networks,” Comput. Sci. Dep. Carnegie Mellon Univ. Addison-Wesley, vol. 5,
no. 1, pp. 139–172, 1996, [Online]. Available: http://www.monarch.cs.cmu.edu/.
P. Xie , “An enhanced OLSR routing protocol based on node link expiration time and residual
energy in ocean FANETS,” in 2018 24th Asia-Pacific Conference on Communications, APCC
2018, Chicago, 2019, pp. 598–603, doi: 10.1109/APCC.2018.8633484.
Y. Chen , X. Liu , N. Zhao , and Z. Ding , “Using multiple UAVs as relays for reliable
communications,” in 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Omaha,
June 2018, pp. 1–5, doi: 10.1109/VTCSpring.2018.8417733.
S. C. Choi , H. R. Hussen , J. H. Park , and J. Kim , “Geolocation-based routing protocol for
flying ad hoc networks (FANETs),” in International Conference on Ubiquitous and Future
Networks, ICUFN, Washington, DC, 2018, vol. 2018-July, pp. 50–52, doi:
10.1109/ICUFN.2018.8436724.
F. Khelifi , A. Bradai , K. Singh , and M. Atri , “Localization and energy-efficient data routing for
unmanned aerial vehicles: Fuzzy-logic-based approach,” IEEE Commun Mag., vol. 56, no. 4,
pp. 129–133, 2018, doi: 10.1109/MCOM.2018.1700453.
C. Pu , “Link-quality and traffic-load aware routing for UAV ad hoc networks,” in Proceedings:
4th IEEE International Conference on Collaboration and Internet Computing, CIC 2018,
Phoenix, 2018, pp. 71–79, doi: 10.1109/CIC.2018.00-38.
M. Song , J. Liu , and S. Yang , “A mobility prediction and delay prediction routing protocol for
UAV networks,” in 2018 10th International Conference on Wireless Communications and Signal
Processing, WCSP 2018, Plymouth, 2018, pp. 1–6, doi: 10.1109/WCSP.2018.8555927.
S. Y. Dong , “Optimization of OLSR routing protocol in UAV ad HOC network,” in 2016 13th
International Computer Conference on Wavelet Active Media Technology and Information
Processing, ICCWAMTIP 2017, Oakland, 2017, pp. 90–94, doi:
10.1109/ICCWAMTIP.2016.8079811.
G. Gankhuyag , A. P. Shrestha , and S. J. Yoo , “Robust and reliable predictive routing strategy
for flying ad-hoc networks,” IEEE Access, vol. 5, pp. 643–654, 2017, doi:
10.1109/ACCESS.2017.2647817.
X. Li and J. Yan , “LEPR: Link stability estimation-based preemptive routing protocol for flying
ad hoc networks,” in Proceedings: IEEE Symposium on Computers and Communications,
Atlanta, 2017, pp. 1079–1084, doi: 10.1109/ISCC.2017.8024669.
O. S. Oubbati , A. Lakas , F. Zhou , M. Güneş , N. Lagraa , and M. B. Yagoubi , “Intelligent
UAV-assisted routing protocol for urban VANETs,” Comput Commun., vol. 107, pp. 93–111,
2017, doi: 10.1016/j.comcom.2017.04.001.
A. Rovira-Sugranes and A. Razi , “Predictive routing for dynamic UAV networks,” in 2017 IEEE
International Conference on Wireless for Space and Extreme Environments, WiSEE 2017, New
York, 2017, pp. 43–47, doi: 10.1109/WiSEE.2017.8124890.
J. Lee et al., “Constructing a reliable and fast recoverable network for drones,” in 2016 IEEE
International Conference on Communications, ICC 2016, Tacoma, 2016, pp. 1–6, doi:
10.1109/ICC.2016.7511317.
S. Rosati , K. Kruzelecki , G. Heitz , D. Floreano , and B. Rimoldi , “Dynamic routing for flying ad
hoc networks,” IEEE Trans Veh Technol., vol. 65, no. 3, pp. 1690–1700, 2016, doi:
10.1109/TVT.2015.2414819.
J. D. M. M. Biomo , T. Kunz , and M. St-Hilaire , “Routing in unmanned aerial ad hoc networks:
Introducing a route reliability criterion,” in 2014 7th IFIP Wireless and Mobile Networking
Conference, WMNC 2014, Vail, May 2014, pp. 1–7, doi: 10.1109/WMNC.2014.6878853.
Y. Zheng , Y. Wang , Z. Li , L. Dong , Y. Jiang , and H. Zhang , “A mobility and load aware olsr
routing protocol for uav mobile AD-HOC networks,” in IET Conference Publications, San Diego,
May 2014, vol. 2014, no. 650 CP, pp. 1–7, doi: 10.1049/cp.2014.0575.
S. Rosati , K. Kruzelecki , L. Traynard , and B. Rimoldi , “Speed-aware routing for UAV ad-hoc
networks,” in 2013 IEEE Globecom Workshops, GC Workshops, San Ramon, 2013, pp.
1367–1373, doi: 10.1109/GLOCOMW.2013.6825185.
L. Lin , Q. Sun , S. Wang , and F. Yang , “A geographic mobility prediction routing protocol for
ad hoc UAV network,” in 2012 IEEE Globecom Workshops, GC Workshops, Shipshewana,
2012, pp. 1597–1602, doi: 10.1109/GLOCOMW.2012.6477824.
A. I. Alshabtat and L. Dong , “Low latency routing algorithm for unmanned aerial vehicles ad-
hoc networks,” World Acad Sci Eng Technol., vol. 80, no. 1, pp. 705–711, 2011, doi:
10.5281/zenodo.1061573.
R. A. Hunjet , A. Coyle , and M. Sorell , “Enhancing mobile adhoc networks through node
placement and topology control,” in 2010 7th International Symposium on Wireless
Communication Systems, Boca Raton, 2010, pp. 536–540, doi: 10.1109/ISWCS.2010.5624347.
C. M. Cheng , P. H. Hsiao , H. T. Kung , and D. Vlah , “Maximizing throughput of UAV-relaying
networks with the load-carry-and-deliver paradigm,” in IEEE Wireless Communications and
Networking Conference, WCNC, Boston, Mar. 2007, pp. 4420–4427, doi:
10.1109/WCNC.2007.805.
I. Rubin and R. Zhang , “Placement of UAVs as communication relays aiding mobile ad hoc
wireless networks,” in MILCOM 2007: IEEE Military Communications Conference, Oct. 2007,
pp. 1–7, doi: 10.1109/MILCOM.2007.4455114.
O. Bouhamed , H. Ghazzai , H. Besbes , and Y. Massoud , “A UAV-assisted data collection for
wireless sensor networks: Autonomous navigation and scheduling,” IEEE Access, vol. 8, pp.
110446–110460, 2020, doi: 10.1109/ACCESS.2020.3002538.
L. Wang , B. Hu , and S. Chen , “Energy efficient placement of a drone base station for
minimum required transmit power,” IEEE Wirel Commun Lett., vol. 9, no. 12, pp. 2010–2014,
2020, doi: 10.1109/LWC.2018.2808957.
C. C. Lai , C. T. Chen , and L. C. Wang , “On-demand density-aware UAV base station 3D
placement for arbitrarily distributed users with guaranteed data rates,” IEEE Wirel Commun
Lett., vol. 8, no. 3, pp. 913–916, Jun. 2019, doi: 10.1109/LWC.2019.2899599.
W. Qi , Q. Song , X. Kong , and L. Guo , “A traffic-differentiated routing algorithm in Flying Ad
Hoc Sensor Networks with SDN cluster controllers,” J Franklin Inst., vol. 356, no. 2, pp.
766–790, 2019, doi: 10.1016/j.jfranklin.2017.11.012.
F. Aadil , A. Raza , M. F. Khan , M. Maqsood , I. Mehmood , and S. Rho , “Energy aware
cluster-based routing in flying ad-hoc networks,” Sensors (Switzerland), vol. 18, no. 5, pp.
1589–1597, 2018, doi: 10.3390/s18051413.
M. Alzenad , A. El-Keyi , F. Lagum , and H. Yanikomeroglu , “3-D placement of an unmanned
aerial vehicle base station (UAV-BS) for energy-efficient maximal coverage,” IEEE Wirel
Commun Lett., vol. 6, no. 4, pp. 434–437, Aug. 2017, doi: 10.1109/LWC.2017.2700840.
J. Wang , Y. Cao , B. Li , H. jin. Kim , and S. Lee , “Particle swarm optimization based clustering
algorithm with mobile sink for WSNs,” Futur Gener Comput Syst., vol. 76, pp. 452–457, Nov.
2017, doi: 10.1016/j.future.2016.08.004.
J. Lyu , Y. Zeng , R. Zhang , and T. J. Lim , “Placement optimization of UAV-mounted mobile
base stations,” IEEE Commun Lett., vol. 21, no. 3, pp. 604–607, 2017, doi:
10.1109/LCOMM.2016.2633248.
M. Mozaffari , W. Saad , M. Bennis , and M. Debbah , “Efficient deployment of multiple
unmanned aerial vehicles for optimal wireless coverage,” IEEE Commun Lett., vol. 20, no. 8,
pp. 1647–1650, Aug. 2016, doi: 10.1109/LCOMM.2016.2578312.
E. Kalantari , H. Yanikomeroglu , and A. Yongacoglu , “On the number and 3D placement of
drone base stations in wireless cellular networks,” in IEEE Vehicular Technology Conference,
Boston, 2016, doi: 10.1109/VTCFall.2016.7881122.
R. I. Bor-Yaliniz , A. El-Keyi , and H. Yanikomeroglu , “Efficient 3-D placement of an aerial base
station in next generation cellular networks,” Journal of Computers, vol. 78, pp. 156–171. 2016,
doi: 10.1109/ICC.2016.7510820.
J. Shu , Y. Ge , L. Liu , and L. Sun , “Mobility prediciton clustering routing in UAVs,” in
Proceedings of 2011 International Conference on Computer Science and Network Technology,
ICCSNT 2011, 2011, vol. 3, pp. 1983–1987, doi: 10.1109/ICCSNT.2011.6182360.
C. Zang and S. Zang , “Mobility prediction clustering algorithm for UAV networking,” in 2011
IEEE GLOBECOM Workshops, GC Workshops, 2011, pp. 1158–1161, doi:
10.1109/GLOCOMW.2011.6162360.
B. Fu and L. A. DaSilva , “A Mesh in the sky: A routing protocol for airborne networks,” in
Proceedings: IEEE Military Communications Conference MILCOM, New York, 2007, pp. 1–7,
doi: 10.1109/MILCOM.2007.4454819.
V. Sharma , I. You , R. Kumar , and V. Chauhan , “OFFRP: Optimised fruit fly based routing
protocol with congestion control for UAVs guided ad hoc networks,” Int J Ad Hoc Ubiquitous
Comput., vol. 27, no. 4, pp. 233–255, 2018, doi: 10.1504/IJAHUC.2018.090596.
D. Wu et al., “ADDSEN: Adaptive data processing and dissemination for drone swarms in urban
sensing,” IEEE Trans Comput., vol. 66, no. 2, pp. 183–198, 2017, doi:
10.1109/TC.2016.2584061.
P. Chandhar , D. Danev , and E. G. Larsson , “Massive MIMO for communications with drone
swarms,” in arXiv, pp. 347–354, 2017.
J. Sanchez-Garcia , J. M. Garcia-Campos , S. L. Toral , D. G. Reina , and F. Barrero , “An
intelligent strategy for tactical movements of UAVs in disaster scenarios,” Int. J. Distrib. Sens.
Networks, vol. 2016, no. 3, p. 8132812, 2016, doi: 10.1155/2016/8132812.
D. G. Reina , R. I. Ciobanu , S. L. Toral , and C. Dobre , “A multi-objective optimization of data
dissemination in delay tolerant networks,” Expert Syst Appl., vol. 57, pp. 178–191, Sep. 2016,
doi: 10.1016/j.eswa.2016.03.038.
V. Sharma , M. Bennis , and R. Kumar , “UAV-assisted heterogeneous networks for capacity
enhancement,” IEEE Commun Lett., vol. 20, no. 6, pp. 1207–1210, 2016, doi:
10.1109/LCOMM.2016.2553103.
S. Say , H. Inata , J. Liu , and S. Shimamoto , “Priority-based data gathering framework in UAV-
assisted wireless sensor networks,” IEEE Sens J., vol. 16, no. 14, pp. 5785–5794, 2016, doi:
10.1109/JSEN.2016.2568260.
X. Zheng , J. Wang , W. Dong , Y. He , and Y. Liu , “Bulk data dissemination in wireless sensor
networks: Analysis, implications and improvement,” IEEE Trans Comput., vol. 65, no. 5, pp.
1428–1439, 2016, doi: 10.1109/TC.2015.2435778.
R. Kim , H. Lim , and B. Krishnamachari , “Prefetching-based data dissemination in vehicular
cloud systems,” IEEE Trans Veh Technol., vol. 65, no. 1, pp. 292–306, 2016, doi:
10.1109/TVT.2015.2388851.
V. Sharma , I. You , and R. Kumar , “Energy efficient data dissemination in multi-UAV
coordinated wireless sensor networks,” Mob Inf Syst., vol. 2016, 2016, doi:
10.1155/2016/8475820.
A. Wichmann and T. Korkmaz , “Smooth path construction and adjustment for multiple mobile
sinks in wireless sensor networks,” Comput Commun., vol. 72, pp. 93–106, 2015, doi:
10.1016/j.comcom.2015.06.001.
C. Tunca , S. Isik , M. Y. Donmez , and C. Ersoy , “Ring routing: An energy-efficient routing
protocol for wireless sensor networks with a mobile sink,” IEEE Transactions on Mobile
Computing, 2015, vol. 14, no. 9, pp. 1947–1960, doi: 10.1109/TMC.2014.2366776.
X. Zhu , X. Tao , T. Gu , and J. Lu , “Target-aware, transmission power-adaptive, and collision-
free data dissemination in wireless sensor networks,” IEEE Trans Wirel Commun., vol. 14, no.
12, pp. 6911–6925, 2015.
S. Temel and I. Bekmezci , “LODMAC: Location oriented directional MAC protocol for FANETs,”
Comput. Networks, vol. 83, pp. 76–84, 2015, doi: 10.1016/j.comnet.2015.03.001.
T. Yan , W. Zhang , and G. Wang , “DOVE: Data dissemination to a desired number of
receivers in VANET,” IEEE Trans Veh Technol., vol. 63, no. 4, pp. 1903–1916, 2014, doi:
10.1109/TVT.2013.2287692.
X. Shen , X. Cheng , L. Yang , R. Zhang , and B. Jiao , “Data dissemination in VANETs: A
scheduling approach,” IEEE Trans Intell Transp Syst., vol. 15, no. 5, pp. 2213–2223, 2014, doi:
10.1109/TITS.2014.2313631.
R. I. Ciobanu , D. G. Reina , C. Dobre , S. L. Toral , and P. Johnson , “JDER: A history-based
forwarding scheme for delay tolerant networks using Jaccard distance and encountered ration,”
J Netw Comput Appl., vol. 40, no. 1, pp. 279–291, 2014, doi: 10.1016/j.jnca.2013.09.012.
V. Sharma and R. Kumar , “A cooperative network framework for multi-UAV guided ground ad
hoc networks,” J Intell Robot Syst Theory Appl., vol. 77, no. 3–4, pp. 629–652, 2015, doi:
10.1007/s10846-014-0091-0.
F. J. Ros and P. M. Ruiz , “Minimum broadcasting structure for optimal data dissemination in
vehicular networks,” IEEE Trans Veh Technol., vol. 62, no. 8, pp. 3964–3973, 2013, doi:
10.1109/TVT.2013.2244107.
Y. Cai , F. R. Yu , J. Li , Y. Zhou , and L. Lamont , “Medium access control for Unmanned Aerial
Vehicle (UAV) ad-hoc networks with full-duplex radios and multipacket reception capability,”
IEEE Trans Veh Technol., vol. 62, no. 1, pp. 390–394, 2013, doi: 10.1109/TVT.2012.2211905.
W. Alasmary and W. Zhuang , “Mobility impact in IEEE 802.11p infrastructureless vehicular
networks,” Ad Hoc Networks, vol. 10, no. 2, pp. 222–230, 2012, doi:
10.1016/j.adhoc.2010.06.006.
D. T. Ho and S. Shimamoto , “Highly reliable communication protocol for WSN-UAV system
employing TDMA and PFS scheme,” in 2011 IEEE GLOBECOM Workshops, GC Workshops,
New Delhi, 2011, pp. 1320–1324, doi: 10.1109/GLOCOMW.2011.6162401.
Y. Ding and L. Xiao , “SADV: Static-node-assisted adaptive data dissemination in vehicular
networks,” IEEE Trans Veh Technol., vol. 59, no. 5, pp. 2445–2455, 2010, doi:
10.1109/TVT.2010.2045234.
J. Zhao , Y. Zhang , and G. Cao , “Data pouring and buffering on the road: A new data
dissemination paradigm for vehicular ad hoc networks,” IEEE Trans Veh Technol., vol. 56, no. 6
I, pp. 3266–3277, 2007, doi: 10.1109/TVT.2007.906412.
S. Eichler , “Performance evaluation of the IEEE 802.11p WAVE communication standard,” in
IEEE Vehicular Technology Conference, 2007, pp. 2199–2203, doi:
10.1109/VETECF.2007.461.
X. Chen , H. Zhai , X. Tian , and Y. Fang , “Supporting QoS in IEEE 802.11e wireless LANs,”
IEEE Trans Wirel Commun., vol. 5, no. 8, pp. 2217–2227, 2006, doi:
10.1109/TWC.2006.1687738.
R. C. Palat , A. Annamalai , and J. H. Reed , “Cooperative relaying for ad-hoc ground networks
using swarm UAVs,” in Proceedings - IEEE Military Communications Conference MILCOM, vol.
2005, pp. 1588–1594, 2005, doi: 10.1109/MILCOM.2005.1605902.
L. Xie , J. Xu , and Y. Zeng , “Common throughput maximization for UAV-enabled interference
channel with wireless powered communications,” Network Security, vol. 68, no. 5, pp.
3197–3212, 2019.
S. Ahmed , M. Z. Chowdhury , and Y. M. Jang , “Energy-efficient UAV-to-user scheduling to
maximize throughput in wireless networks,” IEEE Access, vol. 8, pp. 21215–21225, 2020, doi:
10.1109/ACCESS.2020.2969357.
G. Tang , Z. Hou , C. Claramunt , and X. Hu , “UAV trajectory planning in a port environment,” J
Mar Sci Eng., vol. 8, no. 8, p. 592, 2020, doi: 10.3390/JMSE8080592.
J. Tang , J. Song , J. Ou , J. Luo , X. Zhang , and K. K. Wong , “Minimum throughput
maximization for multi-UAV enabled WPCN: A deep reinforcement learning method,” IEEE
Access, vol. 8, pp. 9124–9132, 2020, doi: 10.1109/ACCESS.2020.2964042.
Y. Qian , F. Wang , J. Li , L. Shi , K. Cai , and F. Shu , “User association and path planning for
UAV-aided mobile edge computing with energy restriction,” Journal of Network Security, vol. 8,
no. 5, pp. 1312–1315, 2019.
A. Mardani , M. Chiaberge , and P. Giaccone , “Communication-aware UAV path planning,”
IEEE Access, vol. 7, pp. 52609–52621, 2019, doi: 10.1109/ACCESS.2019.2911018.
X. Liu , D. He , and H. Ding , “Throughput maximization for UAV-enabled full-duplex relay
system in 5G communications,” Phys Commun., vol. 32, pp. 104–111, 2019, doi:
10.1016/j.phycom.2018.11.014.
M. Hua , L. Yang , C. Pan , and A. Nallanathan , “Throughput maximization for full-duplex uav
aided small cell wireless systems,” arXiv, vol. 9, no. 4, pp. 475–479, 2019.
B. Liu and H. Zhu , “Energy-effective data gathering for uav-aided wireless sensor networks,”
Sensors, vol. 19, no. 11, p. 2506, 2019, doi: 10.3390/s19112506.
Y. Zeng , J. Xu , and R. Zhang , “Energy minimization for wireless communication with rotary-
wing UAV,” International Journal of Network Security & Its Applications, vol. 18, no. 4, pp.
2329–2345, 2018.
F. Wu , D. Yang , L. Xiao , and L. Cuthbert , “Minimum-throughput maximization for multi-UAV-
enabled wireless-powered communication networks,” Sensors, vol. 19, no. 7, p. 1491, 2019,
doi: 10.3390/s19071491.
R. Zhang , Y. Zeng , and Q. Wu , “Joint Trajectory and Communication Design for Multi-UAV
Enabled Wireless Networks,” International Journal of Security and Networks, vol. 17, no. 3, pp.
2109–2121, 2017.
L. Xie , J. Xu , and R. Zhang , “Throughput maximization for UAV-enabled wireless powered
communication networks,” International Journal of Information Security, vol. 6, no. 2, pp.
1690–1703, 2018.
Q. Wu and R. Zhang , “Common throughput maximization in UAV-enabled OFDMA systems
with delay consideration,” Journal of Network Security Computer Networks, vol. 66, no. 12, pp.
6614–6627, 2018.
H. Sallouha , M. M. Azari , and S. Pollin , “Energy-constrained UAV trajectory design for ground
node localization,” Security and Communication Networks, vol. 56, pp. 1–7, 2018.
M. Abuzar Sayeed and R. Kumar , “An efficient mobility model for improving transmissions in
multi-UAVs enabled WSNs,” Drones, vol. 2, no. 3, pp. 1–23, 2018, doi:
10.3390/drones2030031.
Y. Xu , L. Xiao , D. Yang , Q. Wu , and L. Cuthbert , “Throughput maximization in multi-UAV
enabled communication systems with difference consideration,” IEEE Access, vol. 6, pp.
55291–55301, 2018, doi: 10.1109/ACCESS.2018.2872736.
Y. Zeng , X. Xu , and R. Zhang , “Trajectory optimization for completion time minimization in
UAV-enabled multicasting,” Journal of Cybersecurity, vol. 17, no. 4, pp. 2233–2246, 2017.
F. Cheng et al., “UAV trajectory optimization for data offloading at the edge of multiple cells,”
IEEE Trans Veh Technol., vol. 67, no. 7, pp. 6732–6736, 2018, doi:
10.1109/TVT.2018.2811942.
J. Ouyang , Y. Che , J. Xu , and K. Wu , “Throughput maximization for laser-powered UAV
wireless communication systems,” International Journal of Computer Science and Network
Security, vol. 56, pp. 1–6, 2018.
E. Bulut and I. Guevenc , “Trajectory optimization for cellular-connected UAVs with
disconnectivity constraint,” in 2018 IEEE International Conference on Communications
Workshops, ICC Workshops 2018 - Proceedings, 2018, pp. 1–6, doi:
10.1109/ICCW.2018.8403623.
S. Ur. Rahman , G. H. Kim , Y. Z. Cho , and A. Khan , “Positioning of UAVs for throughput
maximization in software-defined disaster area UAV communication networks,” J. Commun.
Networks, vol. 20, no. 5, pp. 452–463, 2018, doi: 10.1109/JCN.2018.000070.
X. Jiang , Z. Wu , Z. Yin , and Z. Yang , “Power and trajectory optimization for UAV-enabled
amplify-and-forward relay networks,” IEEE Access, vol. 6, pp. 48688–48696, 2018, doi:
10.1109/ACCESS.2018.2867849.
G. Zhang , H. Yan , Y. Zeng , M. Cui , and Y. Liu , “Trajectory optimization and power allocation
for multi-hop UAV relaying communications,” IEEE Access, vol. 6, pp. 48566–48576, 2018, doi:
10.1109/ACCESS.2018.2868117.
J. Liu , X. Wang , B. Bai , and H. Dai , “Age-optimal trajectory planning for UAV-assisted data
collection,” International Journal of Computer Network and Information Security, vol. 56, 2018,
pp. 553–558.
Y. Lin and S. Saripalli , “Sampling-based path planning for UAV collision avoidance,” IEEE
Trans Intell Transp Syst., vol. 18, no. 11, pp. 3179–3192, 2017, doi:
10.1109/TITS.2017.2673778.
R. Kumar , M. A. Sayeed , V. Sharma , and I. You , “An SDN-based secure mobility model for
UAV-ground communications,” in Communications in Computer and Information Science, 2019,
vol. 971, pp. 169–179, doi: 10.1007/978-981-13-3732-1_14.
Y. Zeng and R. Zhang , “Energy-efficient UAV communication with trajectory optimization,”
IEEE Trans Wirel Commun., vol. 16, no. 6, pp. 3747–3760, Jun. 2017, doi:
10.1109/TWC.2017.2688328.
Integrating Cybernetics into Healthcare Systems
http://healthlab.edu.au/cybernetics/
Glanville, R. A. (cybernetic) musing: Design and cybernetics. Cybern. Hum. Knowing 2009, 16,
175–186.
Alhakami, W. ; Baz, A. ; Alhakami, H. ; Pandey, A.K. ; Khan, R.A. Symmetrical model of smart
healthcare data management: A cybernetics perspective. Symmetry 2020, 12, 2089.
Agrawal, A. and Alharbe, N. R. , Need and importance of healthcare data integrity. Int J Eng
Technol., Aug. 2019, 11, no. 4, 854–859.
Chakraborty, R. , Mathew, J. , and Vasilakos, A. , Eds., Security and fault tolerance in Internet
of things. Signal and Communication. Springer,2019, doi: 10.1007/978-3-030-02807-7.
Healthcare Data Breach Statistics. 2019. Accessed: Oct. 21, 2019. [Online]. Available:
https://www.hipaajournal.com/healthcare-data-breach-statistics/
Filkins, B. SANS Health Care Cyber-threat Report: Widespread Compromises Detected,
Compliance Nightmare on Horizon. Norse, 2014. Accessed: Oct. 21, 2019. [Online]. Available:
https://www.sans.org/reading-room/whitepapers/_rewalls/paper/34735
Breached Patient Records Tripled in 2018 vs 2017, as Health Data Security Challenges
Worsen. 2018. Accessed: Oct. 23, 2019. https://www.protenus.com/press/press-
release/breached-patient-records- tripled-in-2018-vs-2017-as-health-data-security challenges-
worsen
Here's How Much Your Personal Information Is Selling for on the Dark Web. 2017. Accessed:
Oct. 23, 2019. https://www.experian.com/blogs/ask-experian/heres-how-much-your-personal-
information-is-selling-for-on-the-dark-web/
Healthcare Data Breaches Reach Record High in April. 2019. Accessed: Oct. 27, 2019.
https://www.modernhealthcare.com/ cybersecurity/healthcare-data-breaches-reach-record-high-
april
The 10 Biggest Healthcare Data Breaches of 2019. 2019. Accessed: Nov. 4, 2019. [Online].
Available: https://healthitsecurity.com/news/the-10-biggest-healthcare-data-breaches-of-2019-
so-far
Wang Y. , Attebury G. , Ramamurthy B. A survey of security issues in wireless sensor networks.
IEEE Commun Surv Tutor.2006;8, 2–23.
Korotkova, O.M. ; Korotkova, O.M. ; Belokoneva, I.V. ; Belokoneva, I.V. Development of it and
cybernetics in Russian healthcare: Past, present, future. Ìîëîäåæíûéèííîâaöèîííûéâåñòíèê 2019,
8, 107–108.
Faggini, M. ; Cosimato, S. ; Nota, F.D. ; Nota, G. Pursuing sustainability for healthcare through
digital platforms. Sustainability 2019, 11, 165. [CrossRef]
Yang, P. ; Stankevicius, D. ; Marozas, V. ; Deng, Z. ; Liu, E. ; Lukosevicius, A. ; Min, G.
Lifelogging data validation model for internet of things enabled personalized healthcare. IEEE
Trans Syst Man Cybern Syst.2016, 48, 50–64. [CrossRef]
https://www.sciencedirect.com/topics/computer-
science/cybernetics?__cf_chl_captcha_tk__=pmd_jxGS6UioOnd8USXGiV4bmksldK_y_fSvhoo
sFycd62o-1632890525-0-gqNtZGzNAuWjcnBszQi9
Misic J. , Misic V. Enforcing Patient Privacy in Healthcare WSNs Through Key Distribution
Algorithms. Secur. Commun. Network. 2008;1, 417–429.
http://www.techrepublic.com/whitepapers/strong-user-authentication-and-hipaa-cost-effective-
compliance-with-federal-security-mandates/2345053.
Kumar, R. ; Khan, S. A. ; Khan, R. A. Revisiting software security: durability perspective. Int J
Hybrid Inf Technol. 2015, 8, no. 2, 311–322.
Kumar, R. ; Khan, S. A. ; Khan, R. A. Durability challenges in software engineering. Crosstalk-J
Defense Software Eng. 2016, 29–31.
Sahu, K. ; Shree, R. ; Kumar, R. Risk management perspective in SDLC. Int J Adv Res Comput
Sci Software Eng., 2014, 4, no. 3, 1–15.
Sahu, K. ; Alzahrani, F. A. ; Srivastava, R. K. ; Kumar, R. Hesitant fuzzy sets based symmetrical
model of decision-making for estimating the durability of Web application. Symmetry, 2020, 12,
no. 11, 1770.
Kumar, R. ; Khan, S. A. ; Khan, R. A. Analytical network process for software security: a design
perspective. CSI Trans. ICT, 2016, 4, no. 2, 255–258.
Sahu, K. ; Alzahrani, F. A. ; Srivastava, R. K. ; Kumar, R. Evaluating the impact of prediction
techniques: Software reliability perspective. Comput. Mater. Continua, 2021, 67, no. 2,
1471–1488.
Kumar, R. ; Khan, S. A. ; Khan, R. A. Durable security in software development: Needs and
importance. CSI Commun., 2015, 39(7), 34–36.
Ansari, M. T. J. ; Baz, A. ; Alhakami, H. ; Alhakami, W. ; Kumar, R. ; Khan, R. A. P-STORE:
Extension of STORE methodology to elicit privacy requirements. Arabian J Sci Eng., 2021, 46,
no. 9, 8287–8310.
Kumar, R. ; Khan, S. A. ; Khan, R. A. Software security testing: A pertinent framework. J Global
Res Comput Sci., 2014, 5(3), 23–27.
Attaallah, A. ; Alsuhabi, H. ; Shukla, S. ; Kumar, R. ; Gupta, B. K. ; Khan, R. A. Analyzing the big
data security through a unified decision-making approach. Intell Autom Soft Comput., 2022, 32,
no. 2, 1071–1088.
Almulihi, A. H. ; Alassery, F. ; Khan, A. I. ; Shukla, S. ; Gupta, B. K. ; Kumar, R. Analyzing the
Implications of Healthcare Data Breaches through Computational Technique. Intell Autom Soft
Comput., 2022, 1763–1779.
Pandey, A. K. ; Al-Amri, J. F. ; Subahi, A. F. ; Kumar, R. ; Khan, R. A. Analyzing the implications
of COVID-19 pandemic through an intelligent-computing technique. Comput Syst Sci Eng.,
2022, 959–974.
Kumar, R. ; Khan, A. I. ; Abushark, Y. B. ; Alam, M. M. ; Agrawal, A. ; Khan, R. A. An integrated
approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications.
IEEE Access, 2020, 8, 50944–50957.
Kumar, R. ; Zarour, M. ; Alenezi, M. ; Agrawal, A. ; Khan, R. A. Measuring security durability of
software through fuzzy-based decision-making process. Int J Comput Intell Syst., 2019, 12, no.
2, 627.
Kumar, R. ; Khan, A. I. ; Abushark, Y. B. ; Alam, M. M. ; Agrawal, A. ; Khan, R. A. A knowledge-
based integrated system of hesitant fuzzy set, ahp and topsis for evaluating security-durability
of web applications. IEEE Access, 2020, 8, 48870–48885.
Threats and Countermeasures in Digital Crime and Cyberterrorism
Suryateja, P. S. “Threats and vulnerabilities of cloud computing: A review.” International Journal
of Computer Sciences and Engineering 6.3 (2018): 297–302.
Alkhalifah, A. , Ng, A. , Kayes, A. S. M. , Chowdhury, J. , Alazab, M. , & Watters, P. A. “A
taxonomy of blockchain threats and vulnerabilities.” In Blockchain for Cybersecurity and Privacy
(pp. 3–28). CRC Press, 2020.
Raw, R. S. , Kumar, M. , & Singh, N. “Software-defined vehicular adhoc network: A theoretical
approach.” Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks. IGI Global, 2021.
141–164.
Caesarano, A. R. , & Riadi, I. “Network forensics for detecting SQL injection attacks using NIST
method.” International Journal Cyber-Security Digital Forensics 7.4 (2018): 436–443.
Ambedkar, M. D. , Ambedkar, N. S. , & Raw, R. S. “A comprehensive inspection of cross site
scripting attack.” In 2016 International Conference on Computing, Communication and
Automation (ICCCA). IEEE, 2016.
Al Yahmadi, F. , & Ahmed, M. R. “Taxonomy of threats and vulnerabilities in smart grid
networks.” International Journal of Energy and Power Engineering 15.4 (2021): 168–171.
Homoliak, I. , Venugopalan, S. , Reijsbergen, D. , Hum, Q. , Schumi, R. , & Szalachowski, P.
The security reference architecture for blockchains: Toward a standardized model for studying
vulnerabilities, threats, and defenses. IEEE Communications Surveys & Tutorials 23.1 (2020):
341–390.
Kamal, R. , Raw, R. S. , Saxena, N. G. , & Kaushal, S. K. “Implementation of security &
challenges on vehicular cloud networks.” In Communication and Computing Systems:
Proceedings of the International Conference on Communication and Computing Systems
(ICCCS 2016), Gurgaon, India, 9-11 September, 2016 (p. 379). CRC Press, 2017, February.
Hamza, A. , Gharakheili, H. H. , & Sivaraman, V. IoT Network Security: Requirements, Threats,
and Countermeasures. IEEE, 2020.
Reddy, A. M. , Reddy, K. S. , Prasad, M. , & Obulesh, A. “Internet of things (IoT) security threats
and countermeasures.” Network Security 5.1 (2021): 12–26.
Raw, R. S. “The amalgamation of blockchain with smart and connected vehicles: Requirements,
attacks, and possible solution.” In 2020 2nd International Conference on Advances in
Computing, Communication Control and Networking (ICACCCN), Lucknow. IEEE, 2020.
Maheshwari, S. , & Sharma, N. “Cyber forensic: A new approach to combat cyber crime1, 2.”
International Journal of Computer Network and Information Security 56.3 (2021): 15–29.
Yadav, A. K. , Bharti, R. K. , & Raw, R. S. “Security solution to prevent data leakage over
multitenant cloud infrastructure.” International Journal of Pure and Applied Mathematics 118.7
(2018): 269–276.
Bosamia, M. , & Patel, D. “Wallet payments recent potential threats and vulnerabilities with its
possible security measures.” International Journal of Computer Sciences and Engineering 7
(2019): 810–817.
Srivastava, A. , et al. “Future IoTenabled threats and vulnerabilities: State of the art, challenges,
and future prospects.” International Journal of Communication Systems 33.12 (2020): e4443.
Rocha, M. , Manuel, V. “A systematic review of security threats and countermeasures in SaaS.”
Instituto de Ingeniería y Tecnología 45.6 (2020).
Tsiknas, K. , Taketzis, D. , Demertzis, K. , & Skianis, C. “Cyber threats to industrial IoT: A
survey on attacks and countermeasures.” IoT 2.1 (2021): 163–188.
Ghazal, T. M. , Hasan, M. K. , Hassan, R. , Islam, S. , Abdullah, S. N. H. S. , Afifi, M. A. , &
Kalra, D. (2020). “Security vulnerabilities, attacks, threats and the proposed countermeasures
for the Internet of Things applications.” Solid State Technology 63(1s): 2513–2521.
Choudhary, Y. , Umamaheswari, B. , & Kumawat, V. “A study of threats, vulnerabilities and
countermeasures: An IoT perspective.” Humanities 8.4 (2021): 39–45.
Ahmad, H. , Dharmadasa, I. , Ullah, F. , & Babar, A. (2021). A Review on C3I Systems'
Security: Vulnerabilities, Attacks, and Countermeasures. arXiv preprint arXiv:2104.11906.
Abdelrahman, A. M. , Rodrigues, J. J. , Mahmoud, M. M. , Saleem, K. , Das, A. K. , Korotaev, V.
, & Kozlov, S. A. “Softwaredefined networking security for private data center networks and
clouds: Vulnerabilities, attacks, countermeasures, and solutions.” International Journal of
Communication Systems, 34.4 (2021): e4706.
Khalid, F. , Hanif, M. A. , & Shafique, M. “Exploiting vulnerabilities in deep neural networks:
Adversarial and fault-injection attacks.” arXiv preprint arXiv:2105.03251 (2021).
Ambika, T. , & K. Senthilvel . “Cyber crimes against the state: A study on cyber terrorism in
India.” Webology 17.2 (2020): 15–25.
Antonyan, E. A. , & N. A. Grishko . “New technologies in cyber terrorism countering.” In XVII
International Research-to-Practice Conference Dedicated to the Memory of MI Kovalyov (ICK
2020), Boston. Atlantis Press, 2020.
Sebastian, J. , & P. Sakthivel . “Cyber terrorism: A potential threat to global security.” 2020.
Serebrennikova, A. V. “Cyber terrorism: Modern challenges.” Colloquium-Journal. 19.71 (2020):
178–189.
Valsalan, K. A Critical Analysis on Cyber Crimes and Security Issues in India. IEEE, 2020.
Sebastian, J. , & Sakthivel, P. Cyber Terrorism: A Potential Threat to National Security in India.
IEEE, 2020.
Prakash, N. , & Duhan, R. “Computer forensic investigation process and judicial response to the
digital evidence in India in light of rule of best evidence.” 8.05 Springer, (2020).
Datta, P. , Panda, S. N. , Tanwar, S. , & Kaushal, R. K. “A technical review report on cyber
crimes in India.” in 2020 International Conference on Emerging Smart Computing and
Informatics (ESCI) (pp. 269–275). IEEE, 2020, March.
Ravichandran, K. “Awareness of cyber crime prevention analyzed by the nearest neighbour
analysis in India.” Network Security, 45.6 (2020): 245–256.
Tanwar, S. , Paul, T. , Singh, K. , Joshi, M. , & Rana, A. “Classification and impact of cyber
threats in India: A review.” In 2020 8th International Conference on Reliability, Infocom
Technologies and Optimization (Trends and Future Directions) (ICRITO) (pp. 129–135). IEEE,
2020, June.
Vaishnav, Ms N. T. , & Barde, S. “Study on cyber laws of India.” Journal of Computer, Internet
and Network Security 1.2 (2020): 1–5.
Singh, R. “Counterterrorism in India: An ad hoc response to an enduring and variable threat.” In
Non-Western Responses to Terrorism. Manchester University Press, 2020.
Pawar, S. , Bhusari, C. , & Vaz, S. “Survey on digital forensics investigation and their
evidences.” Journal of Computer, Internet and Network Security 12.6 (2020): 147–156.
Pansari, N. “A comparative study of analysis and investigation using digital forensics.”
International Journal of Linguistics and Computational Applications (IJLCA) 7.2 (2020):
147–162.
Zinge, P. A. , & Chatterjeem,M. “Comprehensive study of digital forensics branches and tools.”
International Journal of Forensic Computer Science (IJoFCS) 14.5 (2018): 556–569.
Sikos, L. F. “Packet analysis for network forensics: A comprehensive survey.”Forensic Science
International: Digital Investigation 32 (2020): 200892.
Singh, N. , Dayal, M. , Raw, R. S. , & Kumar, S. “SQL injection: Types, methodology, attack
queries and prevention.” In 2016 3rd International Conference on Computing for Sustainable
Global Development (INDIACom) (pp. 2872–2876). IEEE, 2016, March.
Aliyu, A. , Abdullah, A. H. , Kaiwartya, O. , Cao, Y. , Usman, M. J. , Kumar, S. , Lobiyal, D. K. , &
Raw, R. S. “Cloud computing in VANETs: Architecture, taxonomy, and challenges.” IETE
Technical Review 35.5 (2018): 523–547.
Cryptography Techniques for Information Security
David. Naccache , Jacques. Stern “A New Public-Key Cryptosystem” W. Fumy (Ed.): Advances
in Cryptology: EUROCRYPT '97, LNCS 1233, pp. 27–36, 1997. Springer-Verlag, Berlin
Heidelberg, 1997.
Ashwak M. AL-Abiachi “A Competitive Study of Cryptography Techniques over Block Cipher”
2011 UKSim 13th International Conference on Modelling and Simulation 978-0-7695-4376-5/11
$26.00 © 2011 IEEE, Boston, 2011. DOI:10.1109/UKSIM.2011.85
Ganesh. Chandra “ECC Public Key Cryptosystem for Security Services in Mobile
Communication: A Study” International Journal of Computational Intelligence and Information
Security, Vol. 3, No. 1, pp. 157–173, January 2012.
Vinod Kumar. Yadav , A. K. Malviya , D. L. Gupta , Satyendra. Singh , and Ganesh. Chandra
“Public Key Cryptosystem Technique Elliptic Curve Cryptography with Generator G for Image
Encryption” International Journal of Computer Applications in Technology, Vol. 3, No. 1, pp.
298–302, 2012.
Sourabh. Chandra , Smita. Paira “A Comparative Survey of Symmetric and Asymmetric Key
Cryptography” International Conference on Electronics, Communication and Computational
Engineering (ICECCE), Lucknow. 978-1-4799-5748-4/14/$31.00 © 2014 IEEE.
Aditi. Verma , Harsha. Singh “A Review on Cryptography and its Various Techniques”
International Journal of Advanced Research in Computer Science, Vol. 5, No. 3, pp.
1445–1462, March–April 2014. ISSN No. 0976-5697.
Bidisha. Mandal , Sourabh. Chandra “A Comparative and Analytical Study on Symmetric Key
Cryptography” International Conference on Electronics, Communication and Computational
Engineering (ICECCE), Paris, 2014. 978-1-4799-5748-4/14/$31.00 © 2014 IEEE.
Laiphrakpam Dolendro. Singh “Image Encryption using Elliptic Curve Cryptography” Eleventh
International Multi-Conference on Information Processing-2015 (IMCIP-2015), New York, 2015.
Priyadarshini. Patila , Prashant. Narayankar “A Comprehensive Evaluation of Cryptographic
Algorithms: DES, 3DES, AES, RSA and Blowfish” International Conference on Information
Security & Privacy (ICISP2015), 11–12 December 2015, Nagpur, India, 2015. Published by
Elsevier BV. This is an open access article under the CC BY-NC-ND license
Payal. Patel , Rajan. Patel “Integrated ECC and Blowfish for Smartphone Security” International
Conference on Information Security & Privacy (ICISP2015), 11–12 December 2015, Nagpur,
India, 2015.
Preeti. Poonia , Praveen. Kantha “Comparative Study of Various Substitution and Transposition
Encryption Techniques” International Journal of Computer Applications, Vol. 145, No. 10, July
2016. (0975 – 8887).
Sarika Y. Bonde Analysis of Encryption Algorithms (RSA, SRNN and 2 Key Pair) for Information
Security. IEEE, 2017. 978-1-5386-4008-1/17/$31.00 ©2017 IEEE.
K. Sahu , F. A. Alzahrani , R. K. Srivastava , and R. Kumar . “Evaluating the impact of prediction
techniques: Software reliability perspective,” Computers Materials and Continua, vol. 67, no. 2,
pp. 1471–1488, 2021.
A Critical Analysis of Cyber Threats and Their Global Impact
Alansari, M. M. , Aljazzaf, Z. M. , & Sarfraz, M. (2019). On Cyber Crimes and Cyber Security. In
M. Sarfraz (Ed.), Developments in Information Security and Cybernetic Wars, pp. 1–41. IGI
Global, Hershey, PA, USA. doi:10.4018/978-1-5225-8304-2.ch001.
J. Jang-Jaccard and S. Nepal , “A Survey of Emerging Threats in Cybersecurity,” J Comput
Syst Sci., vol. 80, no. 5, pp. 973–993, 2014, doi: 10.1016/j.jcss.2014.02.005.
M. Ganesan and P. Mayilvahanan , “Cyber Crime Analysis in Social Media Using Data Mining
Technique,” Int J Pure Appl Math., vol. 116, no. 22, pp. 413–424, 2017.
Ramon, M. C. and Zajac, D. A. “Cybersecurity Literature Review and Efforts Report,” Prep.
NCHRP Proj. pp. 3–127, 2018
Jahankhani, Hamid. , Ameer Al-Nemrat, and Amin Hosseinian-Far . “Chapter 12 - Cybercrime
Classification and Characteristics.” edited by B. Akhgar, A. Staniforth, and F. B. T.-C. C. and C.
T. I. H. vol. 5, pp. 149–164, Syngress, Bosco.
J. Achkoski and M. Dojchinovski , “Cyber Terrorism and Cyber Crime: Threats for Cyber
Security,” Proc. First Annu. Int. Sci. Conf., Global Security and Challenges of the 21st Century -
MIT University – Skopje, 2012,[Online]. Available:
http://eprints.ugd.edu.mk/6502/2/__ugd.edu.mk_private_UserFiles_biljana.kosturanova_Deskto
p_Trudovi_Jugoslav Achkoski_Scientific Papers_elektronska verzija_Cyber Terrorism and
Cyber Crime – Threats for Cyber Security_rev_JA.pdf.
M. Gercke , “Cybercrime Understanding Cybercrime,” Understanding Cybercrime: Phenomena,
Challenges and Legal Response, ITU, p. 366, 2012, doi: 10.1088/1367-2630/11/1/013005.
A. Maqsood and M. Rizwan , “Security, Trust and Privacy In Cyber (Stpc Cyber),” Int J Sci Res
Publ., vol. 9, no. 2, p. p8682, 2019, doi: 10.29322/ijsrp.9.02.2019.p8682.
A. R. P. Tushar and P. Parikh , “Cyber security: Study on Attack, Threat, Vulnerability,” Int J
Res Mod Eng Emerg Technol., vol. 5, no. 6, pp. 1–7, 2017.
R. R. Yadav , “Advances in Cyber Security,” Int J Eng Res., vol. V7, no. 03, pp. 117–120, 2018,
doi: 10.17577/ijertv7is030091.
M. Chaturvedi , “Cyber Security Infrastructure in India: A Study,” Emerg Technol., no. April
2014, pp. 70–84, 2008, [Online]. Available: https://www.csi-sigegov.org/emerging_pdf/9_70-
84.pdf.
C. Academy and C. Studies , “World Internet Development Report 2017,” World Internet Dev
Rep., vol. 2017, pp. 89–117, 2019, doi: 10.1007/978-3-662-57524-6.
H. S. Lallie et al., “Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-
Crime and Cyber-Attacks during the Pandemic,” pp. 1–20, 2020, [Online]. Available:
http://arxiv.org/abs/2006.11929.
R. A. Ramadan , B. W. Aboshosha , J. S. Alshudukhi , A. J. Alzahrani , A. El-Sayed , and M. M.
Dessouky , “Cybersecurity and Countermeasures at the Time of Pandemic,” J Adv Transp., vol.
2021, no. 2003, 2021, doi: 10.1155/2021/6627264.
D. P. Fidler , “Cybersecurity in the Time of COVID-19,” Counc. Foreign Relations, vol. 2020, pp.
7–9, 2020 [Online]. Available: https://www.cfr.org/blog/cybersecurity-time-covid-19.
A Cybersecurity Perspective of Machine Learning Algorithms
K. Sahu , F. A. Alzahrani , R. K. Srivastava , and R. Kumar . “Evaluating the impact of prediction
techniques: Software reliability perspective,” Computers Materials and Continua, vol. 67, no. 2,
pp. 1471–1488, 2021.
M. Haenlein and A. Kaplan , “A brief history of artificial intelligence: On the past, present, and
future of artificial intelligence,” California Management Review, vol. 61, no. 4, pp. 5–14, 2019.
R. Kumar , S. A. Khan , and R. A. Khan . “Durability challenges in software engineering,”
Crosstalk-The Journal of Defense Software Engineering, pp. 29–31, 2016.
T. M. Mitchell , Machine Learning. McGraw-Hill, 1997.
G. Apruzzese , M. Colajanni , L. Ferretti , A. Guido , and M. Marchetti , “On the effectiveness of
machine and deep learning for cyber security,” in 2018 10th International Conference on Cyber
Conflict (CyCon), New Delhi, 2018, pp. 371–390.
A. H. Seh et al., “Healthcare data breaches: Insights and implications,” in Healthcare, 2020, vol.
8, no. 2, p. 133.
E. Alpaydin , Introduction to Machine Learning. MIT Press, 2020.
S. B. Kotsiantis , I. Zaharakis , and P. Pintelas , “Supervised machine learning: A review of
classification techniques,” Emerging Artificial Intelligence Applications in Computer Engineering,
vol. 160, no. 1, pp. 3–24, 2007.
A. Field , “Logistic regression,” Discovering Statistics Using SPSS, vol. 264, p. 315, 2009.
G. I. Webb , “Naïve Bayes.,” Encyclopedia of Machine Learning, vol. 15, pp. 713–714, 2010.
C. Kingsford and S. L. Salzberg , “What are decision trees?,” Nature Biotechnology, vol. 26, no.
9, pp. 1011–1013, 2008.
S. B. Kotsiantis , “Decision trees: a recent overview,” Artificial Intelligence Review, vol. 39, no.
4, pp. 261–283, 2013.
Z. Deng , X. Zhu , D. Cheng , M. Zong , and S. Zhang , “Efficient kNN classification algorithm for
big data,” Neurocomputing, vol. 195, pp. 143–148, 2016.
G. Biau and E. Scornet , “A random forest guided tour,” Test, vol. 25, no. 2, pp. 197–227, 2016.
S. V. M. Vishwanathan and M. N. Murty , “SSVM: A simple SVM algorithm,” in Proceedings of
the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No. 02CH37290),
New Delhi, 2002, vol. 3, pp. 2393–2398.
I. Uysal and H. A. Güvenir , “An overview of regression techniques for knowledge discovery,”
Knowledge Engineering Review, vol. 14, no. 4, pp. 319–340, 1999.
D. C. Montgomery , E. A. Peck , and G. G. Vining , Introduction to Linear Regression Analysis.
John Wiley & Sons, 2021.
E. Ostertagová , “Modelling using polynomial regression,” Procedia Engineering, vol. 48, pp.
500–506, 2012.
G. C. McDonald , “Ridge regression,” Wiley Interdisciplinary Reviews: Computational Statistics,
vol. 1, no. 1, pp. 93–100, 2009.
J. Ranstam and J. A. Cook , “LASSO regression,” Journal of British Surgery, vol. 105, no. 10,
pp. 1348–1348, 2018.
C. Hans , “Elastic net regression modeling with the orthant normal prior,” Journal of the
American Statistical Association, vol. 106, no. 496, pp. 1383–1393, Dec. 2011, doi:
10.1198/jasa.2011.tm09241.
R. Gentleman and V. J. Carey , “Unsupervised machine learning,” in Bioconductor Case
Studies. Springer, 2008, pp. 137–157.
“Data clustering algorithms: Fuzzy c-means clustering algorithm.”
https://sites.google.com/site/dataclusteringalgorithms/fuzzy-c-means-clustering-algorithm
(accessed Jun. 29, 2021).
T. A. Kumbhare and S. V. Chobe , “An overview of association rule mining algorithms,”
International Journal of Computer Science and Information Technologies, vol. 5, no. 1, pp.
927–930, 2014.
X. Yu and H. Wang , “Improvement of eclat algorithm based on support in frequent itemset
mining,” Journal of Computers, vol. 9, no. 9, pp. 2116–2123, 2014.
A. Attaallah Attaallah , H. Alsuhabi , S. Shukla , R. Kumar , B. K. Gupta , and R. A. Khan .
“Analyzing the big data security through a unified decision-making approach,” Intelligent
Automation and Soft Computing, vol. 32, no. 2, pp. 1071–1088, 2022.
T. Thomas , A. P. Vijayaraghavan , and S. Emmanuel , Machine Learning Approaches in Cyber
Security Analytics. Springer, 2020.
A. Handa , A. Sharma , and S. K. Shukla , “Machine learning in cybersecurity: A review,” Wiley
Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol. 9, no. 4, p. e1306, 2019.
A. H. Almulihi , F. Alassery , A. I. Khan , S. Shukla , B. K. Gupta , and R. Kumar “Analyzing the
implications of healthcare data breaches through computational technique,” Intelligent
Automation and Soft Computing, pp. 1763–1779, 2022.
Statistical Trend in Cyber Attacks and Security Measures
Employment Projections, U.S. Bureau of Labor Statistics . 2019. Employment by Major Industry
Sector. Available online at https://www.bls.gov/emp/tables/employment-by-major-industry-
sector.htm
Chung H. , Mayes J. , White A. . 2016. How Smartphone Technology Is Changing Healthcare In
Developing Countries. Newcastle University. Retrieved from https://www.ghjournal.org/how-
smartphone-technology-is-hanging- healthcare-in-developing-countries/.
Statista . 2016. Smartphone Users Worldwide 2014–2019. Retrieved from
http://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/.
Global Report . 2019. Global Spending on Health: A World in Transition. released by WHO.
Bevan, Helderman, Jan-Kees et al. 2010. Changing choices in health care: implications for
equity, efficiency and cost. Health Economics, Policy and Law, 5(3): 251–267.
Hernandez P. et al., 2009. Measuring expenditure on the health workforce: concepts, data
sources and methods. Handbook on Monitoring and Evaluation of Human Resources for Health.
World Health Organization.
Miakotko L. 2017. The impact of smartphones and mobile devices on human health and life.
Retrieved from http://www.nyu.edu/classes/keefer/waoe/miakotkol.pdf.
Nambiar B. , Hargreaves D.S. , Morroni C. et al. 2017. Improving health-care quality in
resource-poor settings. Retrieved from https://www.who.int/bulletin/volumes/95/1/16-
170803/en/#R1.
Horton R. . 2014. The third revolution in global health. Lancet, 383(9929): 1620. Retrieved from
https://doi.org/10.1016/S0140-6736(14)60769-8, (Offline).
Leatherman S. , Ferris T.G. , Berwick D. et al. 2010. The role of quality improvement in
strengthening health systems in developing countries. International Journal Quality Health Care,
22(4):237–243. Retrieved from http://dx.doi.org/10.1093/intqhc/mzq028 pmid: 20543209.
Crisp N. . 2010. Turning the World Upside Down: The Search for Global Health in the 21st
Century. Commonwealth Health Minster's Update. Royal Society of Medicine Press Ltd., 1–210.
Fulop N. , Robert G. , 2015. Context for Successful Quality Improvement. The Health
Foundation, 1–116.
HIPAA Journal . 2020. Healthcare data breach statistics. Retrieved from:
https://www.hipaajournal.com/healthcare-data-breach-statistics.
Health IT Security, Xtelligent Healthcare Media . 2020. The 10 biggest HEalthcare Data
Breaches of 2019, so far. Accessed on https://healthitsecurity.com/news/the-10-biggest-
healthcare-data-breaches-of-2019-so-far (2020).
Ragan, S. . 2016. Ransomware Takes Hollywood Hospital Offline, $3.6M Demanded by
Attackers. CSO. Retrieved from
https://www.csoonline.com/article/3033160/security/ransomware-takes-hollywood-hospital-
offline-36m-demand ed-by-attackers.html.
Donovan, F. . 2018. Healthcare Data Breach Costs Remain Highest Among Industries. Health
IT Security. Retrieved from https://healthitsecurity.com/news/ healthcare-data-breach-costs-
remain-highest-among-industries.
Morgan S. . 2020. Healthcare industry to spend $65 billion on cybersecurity from 2017 to 2021.
Cybercrime Magazine. Retrieved from https://cybersecurityventures.com/healthcare-industry-to-
spend-65-billion-on-cybersecurity-from-2017-to-2021/.
Health IT Security . 2020. 24% of US Health Employees Never Received Cybersecurity
Training. Retrieved from https://healthitsecurity.com/news/24-of-us-health-employees-never-
received-cybersecurity-training (2020/04/23).
HIPAA Journal (Online). 2020. Analysis of 2018 healthcare data breaches. Retrieved from
https://www.hipaajournal.com/analysis-of-healthcare-data-breaches/.
Allor P. , 2017. Cost of Data Breach Study: Global Overview. Ponemon Institute.
The Primary Publication of the Cybersecurity Act of 2015 . 2018. Health Industry Cyber Security
Practices: Managing Threats and Protecting Patients (HICP). Section 405(d) Task Group.
Retrieved from https://www.phe.gov/Preparedness/planning/405d/Documents/HICP-Main-
508.pdf (2018).
Kakarla, S. Dr. . 2019. Securing large datasets involving fast-performing key bunch matrix block
cipher. Healthcare Data Analytics and Management, Advances in Ubiquitous Sensing
Applications for Healthcare. Elsevier Publications, Paperback ISBN: 9780128153680,
https://doi.org/10.1016/C2017-0-03245-7, Vol 2, 111–132.
Suciu D. . 2012. Technical perspective: SQL on an encrypted database. Association for
Computing Machinery. Commun. ACM.
Database Encryption in SQL Server 2008 Enterprise Edition . 2015. Technet.microsoft.com.
Retrieved.
Spooner D.L. , Gudes E. . 1984. A unifying approach to the design of a secure database
operating system. IEEE Transactions on Software Engineering, 10(3): 310–319.
Application Encryption from Thales e-Security . 2015. www.thales-esecurity.com.
SANS Institute InfoSec Whitepaper . 2007. Regulations and Standards: Where Encryption
Applies.
Babu R. . 2019. Transparent Data Encryption with Azure SQL Database. SQL Shack.
Federal Information Processing Standards Publication 197 . 2001. United States National
Institute of Standards and Technology (NIST). Advanced encryption standard (AES).
Diffie W. , Hellman M.E. 1977. Exhaustive cryptanalysis of the NBS data encryption standard.
Computer, 10(6): 74–84.
De Cannière C. 2005. Triple-DES. In: van Tilborg H.C.A. (eds) Encyclopedia of Cryptography
and Security. Springer.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Trendy, Internet of Things (IoT) and Cloud Computing are the most modern issues of Future Internet. The IoT is the most important concept of Upcoming Internet for providing a collective global IT Platform to combine seamless networks and networked things. Cloud Computing provides backend solution for processing huge data streams and computations while facing the challenges of everything will be connected with seamless networks in the future. However, there is a lack of common fabric for integrating IoT and Cloud. We believe that the IMS communication platform is the most suitable fabric for integrating IoT and Cloud. In this study, we will provide th e review about various cloud computing dominating fields in IoT and all discussion of open challenges and possible solutions for Future Internet under cloud computing.
Article
Full-text available
The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and businesses, and they are a source of concern and complication for security professionals. This research examines the many types and categories of big data breaches that companies face. In addition, the study’s main purpose is to investigate and draw conclusions from healthcare big data breaches, with the goal of improving healthcare big data confidentiality. From the beginning of 2020–21, both years, practically our entire world moved online due to the COVID-19 pandemic. The coronavirus pandemic dramatically increased the extent of use of technology. Hacking/IT incidents, followed by unauthorised internal disclosures, are the most typical attacks behind healthcare data breaches, according to the report. This has become a main enticement for healthcare data theft and misuse. The number of healthcare big data breaches, the number of records exposed, and the resulting significant commercial losses are increasing. In the report, they analyze and investigate the number of healthcare big data breaches, the number of records exposed during the COVID-19 pandemic. Also, the study assesses the correctness of the datasets in order to achieve a dynamic digital healthcare data breaches environment using fuzzy based computational technique.
Article
Full-text available
The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits. Early disease detection, increased accessibility, and high diagnostic reach have all been made possible by digital healthcare. Despite this remarkable achievement, healthcare data protection has become a serious issue for all parties involved. According to data breach statistics, the healthcare data industry is one of the major threats to cyber criminals. In reality, healthcare data breaches have increased at an alarming rate in recent years. Practitioners are developing a variety of tools, strategies, and approaches to solve healthcare data security concerns. The author has highlighted the crucial measurements and parameters in relation to enormous organizational circumstances for securing a vast amount of data in this paper. Security measures are those that prevent developers and organizations from achieving their objectives. The goal of this work is to identify and prioritize the security approaches that are used to locate and solve problems using different versions of two approaches that have been used to analyze big data security in the past. The Fuzzy Analytic Hierarchy Process (Fuzzy AHP) approach is being used by authors to examine the priorities and overall data security. In addition, the most important features in terms of weight have been quantitatively analyzed. Experts will discover the findings and conclusions useful in improving big data security.
Article
Full-text available
The outbreak of Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2 virus or COVID-19) disease was declared pandemic by the World Health Organization (WHO) on March 11, 2020. COVID-19 has already affected more than 211 nations. In such a bleak scenario, it becomes imperative to analyze and identify those regions in Saudi Arabia that are at high risk. A preemptive study done in the context of predicting the possible COVID-19 hotspots would facilitate in the implementation of prompt and targeted countermeasures against SARS-CoV-2, thus saving many lives. Working towards this intent, the present study adopts a decision making based methodology of simulation named Analytical Hierarchy Process (AHP), a multi criteria decision making approach, for assessing the risk of COVID-19 in different regions of Saudi Arabia. AHP gives the ability to measure the risks numerically. Moreover, numerical assessments are always effective and easy to understand. Hence, this research endeavour employs Fuzzy based computational method of decision making for its empirical analysis. Findings in the proposed paper suggest that Riyadh and Makkah are the most susceptible regions, implying that if sustained and focused preventive measures are not introduced at the right juncture, the two cities could be the worst afflicted with the infection. The results obtained through Fuzzy based computational method of decision making are highly corroborative and would be very useful for categorizing and assessing the current COVID-19 situation in the Kingdom of Saudi Arabia. More specifically, identifying the cities that are likely to be COVID-19 hotspots would help the country’s health and medical fraternity to reinforce intensive containment strategies to counter the ills of the pandemic in such regions.
Article
Full-text available
Natural disasters like earthquakes and tsunami could destroy the existing infrastructure-based communication system. IoT-based health monitoring is not possible in such scenarios. Therefore, there is a need for other resilient health monitoring frameworks to provide consistent health monitoring without depending on existing communication platforms. Wireless Body Sensor Network (WBSN) based health monitoring utilizing Vehicular Ad-hoc Network (VANET) as a communication medium could be a handy solution for transmitting patients’ health information to the nearest ambulance or hospital in emergencies or disaster-prone areas. Casualty rates can be reduced significantly by providing emergency treatment to injured patients within a stipulated time. VANET’s health monitoring applications are time-critical; therefore, designing a stable and efficient routing algorithm is a significant research challenge. Over the years, the researchers proposed many routing solutions to minimize the delay for critical applications. This paper proposed a Weighted Geographical Routing (W-GeoR) for VANET’s health monitoring applications focusing on next-hop node selection for faster vital signs dissemination to facilitate post-disaster health monitoring in urban traffic environments. The proposed protocol utilized traffic-aware information including traffic mobility, inter-vehicle distances, speed differences, communication link expiration time, channel quality, and proximity factors for optimal next-hop node selection procedure. W-GeoR is tested on a post-disaster scenario created with SUMO-0.32 and NS-3.23 platforms. Simulated results confirm that W-GeoR performs better than the existing state-of-the-art protocols.
Article
Full-text available
The existing approaches of block based recovery of progressive secret sharing paradigm have support for limited \({k}\) value in (k, n). Sian et al.’s as well Quan et al.’s block based visual secret sharing scheme has limited bound; works for a limited \({k}\) value of \(\left( {{k},{~n}} \right)\) threshold scheme. A novel threshold based (any value of \({k~and~~n}\)) block recovery in progressive secret sharing has been introduced and analyzed in this paper. Scheme achieves higher value of threshold than the schemes proposed by Sian et al.’s as well Quan et al.’s. The scheme discusses the sharing ability in progressive block based secret sharing up to any general number of thresholds. The contrast of the recovered block wise secret is reasonably good and the scheme allows for perfect security using at least \({k}\) numbers of participants before revealing any of the blocks of secret image. The work in this paper offering a reference point for developing solutions needed in the area of secure image sharing techniques.
Conference Paper
Full-text available
From tiny pacemaker chips to aircraft collision avoidance systems, the state-of-the-art Cyber-Physical Systems (CPS) have increasingly started to rely on Deep Neural Networks (DNNs). However, as concluded in various studies, DNNs are highly susceptible to security threats, including adversarial attacks. In this paper, we first discuss different vulnerabilities that can be exploited for generating security attacks for neural network-based systems. We then provide an overview of existing adversarial and fault-injection-based attacks on DNNs. We also present a brief analysis to highlight different challenges in the practical implementation of adversarial attacks. Finally, we also discuss various prospective ways to develop robust DNN-based systems that are resilient to adversarial and fault-injection attacks.
Article
Full-text available
IoT or the Internet of things refers to all the physical devices connected to the internet. IoT consists of computing devices that are web-enabled and have the capability of sensing, collecting, and sending data. IoT provides the ability to remote control appliances and has many more applications. Since IoT is becoming a big part of society, it is necessary to ensure that these devices provide adequate security measures. This paper discusses various security issues in IoT systems like threats, vulnerabilities and some countermeasures which can be used to provide some security. Developing a secure device is now more important than ever, as with the increase in digitization, much of a user’s data is available on these devices. Securing data is a primary concern in any system, as internet-enabled devices are easier to hack. The idea of this paper is to spread awareness and improve the security of IoT devices.
Article
Implementing security and privacy requirements at every level of the software development cycle is imperative for ensuring optimum usability as well as the users’ satisfaction. Software development must consider and comply effectively with the risks involved in the privacy and protection of confidential data. This research study endeavors to integrate the standards of data protection along with the Security Threat Oriented Requirements Engineering (STORE) methodology in order to recognize the potential threats to privacy requirements. The proposed extension of the STORE methodology, called the P-STORE, is validated by a case study of the Healthcare Management Software (HMS) system project. Furthermore, we have used the integrated fuzzy AHP with fuzzy TOPSIS technique for the usability assessment of different privacy requirements engineering approaches including the P-STORE methodology. The study demonstrates that the P-STORE approach has the capability to elicit more efficient privacy requirements and that it allows the software engineer to arrange privacy requirements efficaciously.