Sign up
Forgot password?
FAQ: Login

Vats S., Sharma V., Singh K., Gupta A. (eds.) Automation and Computation

  • pdf file
  • size 19,26 MB
  • added by
Vats S., Sharma V., Singh K., Gupta A. (eds.) Automation and Computation
CRC Press, 2023. — 509 p.
Wireless sensor networks (WSNs) are made up of spatially dispersed autonomous sensors that monitor environmental or physical elements like temperature, sound, and pressure. These sensors’ data is collectively transmitted to a destination via network infrastructure. Because sensor nodes are energy-constrained devices, energy-efficient routing techniques have become more important. Regardless of how far wireless sensor networks (WSN) have progressed, efficient energy utilization is still required to extend the lifetime of the network. The network lifetime depreciates in real-time applications due to sensor node battery limits. Different routing techniques exist, and we have examined and interpreted the results of two hierarchical algorithms, Low Energy Adaptive Clustering Hierarchy (LEACH) and Power Efficient Gathering in Sensor Information Systems (PEGASIS). The comparison is based on the amount of energy used in each transmission and the WSN’s overall lifetime, with simulations performed in MatLAB.
Anomaly detection is a crucial concept across numerous research areas. Over the years, multiple efforts have been adopted to the arduous challenge of appropriately detecting and labeling anything unseen as unusual. Recently, this task has been solved with outstanding results utilizing the adversarial training method and generative adversarial networks (GANs). This article reviews the various GAN-based anomaly detection methods and discusses their advantages and disadvantages.
The Internet of Things is an emerging innovative technology that increases the efficiency, potential, and smooth operation of devices regardless of physical barriers and connects them to the Internet. Presently, IoT technology is being applied to home appliances, monitoring our health easily and accurately, and in the field of power, and energy distribution using Smart grid systems easily and effectively. Areas that present the predominant application of IoT technology are home and office appliances, transportation, healthcare, telecommunications, and agriculture, The rapid expansion of IoT devices presents some security-related new challenges. Heightening uses of IoT devices lead to a huge accumulation of data on clouds increasing its loads. Most importantly, this decline in the capacity of IoT devices poses some grievous security threats. The goal of this paper is to present a detailed review of the security-related challenges and solutions in Fog-based IoT.
One crypto-heavy technology, blockchain, has been getting much attention lately. Even though blockchain security and privacy have been the subject of many studies in the recent past, the cryptographic building blocks used in blockchain have not been fully explored. Hopefully, it will help cryptographers studying blockchain and financial engineers and managers looking for cryptographic-based solutions for blockchain-assisted and blockchain-based work. This paper primarily focuses on different consensus algorithms and how cryptographic and other evaluation parameters can affect and change blockchain performance.
  • Sign up or login using form at top of the page to download this file.
  • Sign up
Up