Volume 4, Issue 1, June 2024
Cyber-Edge Computing Applications and Challenges: A Review
Muhammad Ali Paracha, Syed Noman Jamil, Abdul Rasheed, Nadia Jamil
AbstractThis research paper investigates the realm of Cyber-Edge computing, further reviewing its fundamental concepts, challenges, and applications. In a rapidly evolving landscape of interconnected devices and data-driven paradigms, the convergence of edge computing and cybersecurity takes centre stage. The paper commences by explaining the core components of Cyber-Edge architecture, encompassing policies, management, and protocols. Furthermore, it explores the Cyber-Edge applications, showcasing its transfor- mative potential in domains such as smart agriculture, smart homes, and enhanced healthcare systems. In navigating the landscape of Cyber-Edge, inherent challenges surface, ranging from cyber threats to privacy concerns, thereby prompting an analysis of future directions. Additionally, the paper formulates pivotal research questions that pave the way for further exploration in this dynamic field. The manuscript is structured on Cyber-Edge fundamentals, examines challenges, highlights practical IoT applications within the Edge paradigm and finally, presents research questions, followed by comprehensive conclusions. As the digital landscape continues to evolve, the interdependent relationship between Cyber-Edge computing and security emerges as a cornerstone in shaping the landscape of the Internet of Things (IoT) and edge networking.
Read More on Global Digital LibraryEfficient Data Aggregation Scheme in Secure Tree based Wireless Sensor Networks (EDAS)
Khalid Khan
AbstractWireless sensor networks (WSNs) have emerged as an important area of research from the last two decades. In WSNs, sensors have limited memory, computational capability and battery power. One of the solutions to these issues is to reduce the data transmission and today, various data aggregation protocols have been proposed to reduce network traffic. But they created security issues like authentication, data integrity and freshness. Hop-by-hop secure data aggregation protocols were proposed to provide security along with data aggregation function. But, data on the aggregators still need to be secured because aggregators are exposed to node compromises. End-to-end secure data aggregation protocols are proposed. They provide end-to-end security and privacy of data. One of these protocols is Secure End-to-End Data Aggregation (SEEDA), which ensured end-to-end privacy of data. However, the protocol has higher communication cost and computational overheads because it sends extra bits/data regarding non-responding nodes and performs unnecessary computations for non-responding nodes. I proposed new protocol, EDAS which reduces 12% to 25% communication and computational overheads as compared to SEEDA and it is also efficient in energy consumption.
Read More on Global Digital LibraryEvaluation of Energy Efficiency of Popular Mobile Payment Protocols
Munir Hussain, Syed Usman Jamil
AbstractOver the last few years, the popularity of both electronic and mobile commerce (M-Commerce) has increased due to advancement in the Information Technology (IT). Evaluation of E-commerce and M-commerce protocols has always remained a subject of sustained effort to find an optimal solution. Mobile devices are resource constrained in terms of memory, processing and battery power. There have been efforts in the past for evaluation of such protocols based on the issues like privacy, security and efficiency. In this paper special consideration however is given to the battery power and thus evaluates few well-known M-commerce payment protocols for their battery requirements in terms of energy cost and compares energy cost of these protocols to find the most optimal solution for mobile payment. Initial objective of this paper finds out energy consumption for every individual entity involved in the most popular mobile payments protocols. After the earlier has been achieved, the second and the most fundamental objective of this work is to calculate the overall energy consumption and to analyze these selected protocols to find out the most energy efficient protocol.
Read More on Global Digital LibraryComparative Analysis of the Emerging Wireless Network Technologies
Hamza Abid
AbstractThis paper provides a comprehensive comparative analysis of emerging wireless network technologies, focusing on 5G, Wi-Fi 6, and Wi-Fi 7. The study evaluates these technologies based on key performance metrics such as speed, latency, and capacity, as well as their real-world applications. By examining the technical specifications and practical implementations of each technology, this paper aims to offer insights into their implications for the future of wireless communication. The analysis highlights the advancements brought by each technology, their potential to meet the growing demand for high-speed connectivity, and their suitability for various applications ranging from consumer electronics to industrial automation. The findings of this study are intended to guide stakeholders in making informed decisions about adopting and integrating these technologies into their networks.
Read More on Global Digital LibraryWireless Body Area Network (WBAN): Security and Authentication Methods
Munir Hussain
AbstractThe demand for WBAN has increased for last few years because it is useful network to monitor and improve various health conditions of human being. Information’s exchanges among different entities are very sensitive, so it is vital to keep this information’s secure from unauthorized access in order to avoid unpleasant incidents. Security and privacy are the most critical issues. Security is the important issue for any network and especially in WBANs its proper management is very crucial otherwise biomedical data collected by sensor nodes should be mixed with other user’s data. Also, patients do not want their personal data to be misused and WBAN should provide the privacy to prevent eavesdropping. Mutual authentication is also a key challenge in WBAN, and patients’ data originality and integrity are important for their treatment diagnosis etc. Development of the new mutual authentication schemes in healthcare applications without considering security makes patient privacy vulnerable. In this paper, we discuss communication technologies, possible attacks and recently most used popular authentication methods in WBANs.
Read More on Global Digital Library