Interconnected Computer Networks Security and Internet of Things: Wireless Sensor Networks

Inam Ullah Khan, Nazia Azim, Syed Bilal Hussain Shah, Yin Fuliang, Muhammad Sameen

Abstract


A slowly and gradually technological change has resulted in many aspects of our lives being connected and affected by modern communication. Millions and Billions of people connected to global system of interconnected computer networks today. According to a survey the number of connected devices will exceeds 50 billion by the year 2020. The internet of things I would say a major transformation in a modern day to day world that haveaffected everyone and business as well. The internet of things was defined by ITU (International Telecommunication Union). Internet of things has moved from being a futuristic vision from last year. Nowadays smart homes automation, smart water networks that connects our world. Normally a wireless sensor network is formed by large sensor workstations where each workstation or node having sensors that would detect heat, light etc. This paper will briefly explain the network security, cyber security, internet of things and wireless sensor networks.


References


. InamUllah khan and Muhammad abulhassan Network layer attacks mechanisms in MANETS-A Survey IJRCCT VOl 5 ,ISSUE-6 June 2016

. Engr. Alamgir Safi , InamUllah Khan , Muhammad Abul Hassan , Engr. Muhammad Asghar Mobile Ad hoc networks in the Global system of Interconnected Computer Networks IJSEAT, Vol. 4, Issue 9 ISSN 2321-6905September -2016

. InamUllah Khan, Faheem Numan, Shaheen Ahmad Mobile Ad Hoc Networks Challenges IJSEAT, Vol. 4, Issue 9 ISSN 2321-6905 September -2016

. InamUllah Khan , Muhammad Abul Hassan Transport Layer Protocols And Services IJRCCT, Vol 5, Issue- 9, September- 2016 ISSN (Online) 2278- 5841ISSN (Print) 2320- 515

. Fida, N., Khan, F., Jan, M. A., & Khan, Z., (2017). Performance Analysis of Vehicular Adhoc Network using different Highway Traffic Scenarios in Cloud Computing. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press.

. Khan, F., Khan, M., Iqbal. Z., Rahman, I., & Alam, M. (2017). Secure and Safe Surveillance System using Sensors Networks - Internet of Things. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press.

. M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, “A robust authentication scheme for observing resources in the internet of things environment” in 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 205-211, 2014, IEEE.

. M. A. Jan, P. Nanda and X. He, “Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN,” in Wired/Wireless Internet Communication, Lecture Notes in Computer Science, pp. 154–167, Springer, Berlin, Germany, 2013.

. Khan, F., Rahman, I., Khan, M., Iqbal, N., & Alam, M., (2017). CoAP-based Request-Response Interaction Model for the Internet of Things. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press.

. Younas, N., Asghar, Z., Qayyum, M., & Khan. F., (2017). Education and Socio Economic Factors Impact on Earning for Pakistan- A Bigdata Analysis. Future5v Conference, Lecture Notes in Computer Science, Springer. In Press.

. Khan, F., & Nakagawa, K. (2013). Comparative study of spectrum sensing techniques in cognitive radio networks. In Computer and Information Technology (WCCIT), 2013 World Congress on (pp. 1-8). IEEE.

. Khan, F., Bashir, F., & Nakagawa, K. (2012). Dual head clustering scheme in wireless sensor networks. In Emerging Technologies (ICET), 2012 International Conference on (pp. 1-5). IEEE.

. Khan, F., Kamal, S. A., & Arif, F. (2013). Fairness improvement in long chain multihop wireless ad hoc networks. In 2013 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 556-561). IEEE.

. Khan, F. (2014). Secure communication and routing architecture in wireless sensor networks. In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE) (pp. 647-650). IEEE.

. Khan, S., & Khan, F. (2015). Delay and Throughput Improvement in Wireless Sensor and Actor Networks. In 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW) (pp. 1-8).

. Khan, F., Jan, S. R., Tahir, M., Khan, S., & Ullah, F. (2016). Survey: Dealing Non-Functional Requirements at Architecture Level. VFAST Transactions on Software Engineering, 9(2), 7-13.

. Khan, F., Khan, S., & Khan, S. A. (2015, October). Performance improvement in wireless sensor and actor networks based on actor repositioning. In 2015 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 134-139). IEEE.

. Jabeen, Q., Khan, F., Khan, S., & Jan, M. A. (2016). Performance Improvement in Multihop Wireless Mobile Adhoc Networks. the Journal Applied, Environmental, and Biological Sciences (JAEBS), 6(4S), 82-92.

. Khan, F. (2014, May). Fairness and throughput improvement in multihop wireless ad hoc networks. In Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference on (pp. 1-6). IEEE.

. Khan, S., Khan, F., Arif, F., Q., Jan, M. A., & Khan, S. A. (2016). Performance Improvement in Wireless Sensor and Actor Networks. Journal of Applied Environmental and Biological Sciences, 6(4S), 191-200.

. Khan, F., Jan, S. R., Tahir, M., & Khan, S. (2015, October). Applications, limitations, and improvements in visible light communication systems. In2015 International Conference on Connected Vehicles and Expo (ICCVE)(pp. 259-262). IEEE.

. Younas. N, Asghar, Z, Qayyum. M, & Khan. F. Education and Socio Economic Factors Impact on Earning for Pakistan- A Bigdata Analysis

. Jabeen, Q., Khan, F., Hayat, M. N., Khan, H., Jan, S. R., & Ullah, F. (2016). A Survey: Embedded Systems Supporting By Different Operating Systems. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN, 2395-1990.

. Tahir, M., Khan, F., Babar, M., Arif, F., Khan, F., (2016) Framework for Better Reusability in Component Based Software Engineering.In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 77-81.

. Khan, S., Babar, M., Khan, F., Arif, F., Tahir, M. (2016). Collaboration Methodology for Integrating Non-Functional Requirements in Architecture. In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 63-67

. Shabana, K., Fida, N., Khan, F., Jan, S. R., & Rehman, M. U. (2016). Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 5(7), pp-81.

. Zeeshan, M., Khan, F., & Jan, S. R. (2016). Congestion Detection and Mitigation Protocols for Wireless Sensor Networks. International Journal of Scientific Research in Computer Science, Engineering and Information Technology

. M. A. Jan, P. Nanda, X. He and R. P. Liu, “Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network”, 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC & EUC), pp. 1400-1407, 2013.

. M. A. Jan, P. Nanda, X. He and R. P. Liu, “PASCCC: Priority-based application-specific congestion control clustering protocol” Computer Networks, Vol. 74, PP-92-102, 2014.

. M. A. Jan, P. Nanda, X. He and R. P. Liu, “A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network” in Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015, IEEE.

. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015, August). DPBSV--An Efficient and Secure Scheme for Big Sensing Data Stream. InTrustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 246-253). IEEE.

. Hayat, M. N., Khan, F., Khan, H., Khan, M. Y., & Shah, M. (2016). Review of Cluster-based Energy Routing Protocols for WSNs. International Journal of Interdisciplinary Research Centre

. Zeeshan, M., Khan, F., & Jan, S. R. (2016). Review of various Congestion Detection and Routing Protocols in Wireless Sensor Networks. International Journal of Interdisciplinary Research Centre

. Khan, H., Hayat, F., Khan, M. N., Khan, M. Y., & Shah, M. (2016). A Systematic Overview of Routing Protocols in WSNs. International Journal of Advanced Research in Computer Engineering & Technology, 5(7), pp-2088.

. Khan.W., Javeed. D., Khan. M.T., Jan. S.R., Khan, F. (2016). Applications of Wireless Sensor Networks in Food and Agriculture Sectors. International Journal of Advanced Research in Computer Engineering & Technology, 5(6), pp-2048.

. Khan. M.Y, Shah. M, Khan. H, Hayat. M.N, Khan. F. (2016). Amplified Forms of LEACH based Clustering Protocols for WSNs- A Survey, International Journal of Advanced Research in Computer Engineering & Technology, 5(6), pp.2053.

. Alam, M., Yang, D., Huq, K., Saghezchi, F., Mumtaz, S., & Rodriguez, J. (2015). Towards 5G: Context Aware Resource Allocation for Energy Saving. Journal of Signal Processing Systems, 83(2), 279–291. doi:10.1007/s11265-015-1061-x

. Alam, M., Trapps, P., Mumtaz, S., & Rodriguez, J. (2016). Context-aware cooperative testbed for energy analysis in beyond 4G networks. Telecommunication Systems. doi:10.1007/s11235-016-0171-5

. Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2013). CANDi: context-aware node discovery for short-range cooperation. Transactions on Emerging Telecommunications Technologies, 26(5), 861–875. doi:10.1002/ett.2763

. Alam, M., Mumtaz, S., Saghezchi, F. B., Radwan, A., Rodriguez, J. (2013). Energy and Throughput Analysis of Reservation Protocols of Wi Media MAC. Journal of Green Engineering, 3(4), 363–382. doi:10.13052/jge1904-4720.341

. M. Usman, M. A. Jan, and X. He, “Cryptography-based Secure Data Storage and Sharing Using HEVC and Public Clouds,” Elsevier Information sciences, “accepted”, 2016.

. Jan, M., Nanda, P., Usman, M. and He, X., 2016. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience.

. M. Usman, M. A. Jan, X. He and P. Nanda, “Data Sharing in Secure Multimedia Wireless Sensor

Networks,” in 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), “accepted”, 2016.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.



Copyright © 2012, All rights reserved.| ijmca.org

Creative Commons License
International Journal of Mechanical Engineering and Computer Applications by chief editor is licensed under a Creative Commons Attribution 3.0 Unported License.Permissions beyond the scope of this license may be available at www.ijmca.org.