DDoS Attacks: Trends, Mitigation Strategies, and Future Directions
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.221-230, Nov-2023
Abstract
Distributed Denial of Service (DDoS) attacks pose significant threats to online services and networks by overwhelming targeted systems with malicious traffic. This paper provides a comprehensive review of DDoS attacks and explores various mitigation strategies employed by organizations to defend against these attacks. The study focuses on recent developments in attack techniques and discusses the effectiveness of different mitigation approaches. By understanding the evolving landscape of DDoS attacks and the corresponding countermeasures, organizations can enhance their resilience and minimize the impact of such attacks.
Key-Words / Index Term
DDOS, mitigation strategies, characteristics, traffic, attacks, countermeasures
References
[1]. Aamir, M., & Ali Zaidi, S. M. (2021). Clustering based semi-supervised machine learning for DDoS attack classification. Journal of King Saud University - Computer and Information Sciences, 33(4), pp.436–446, 2021. https://doi.org/10.1016/J.JKSUCI.2019.02.003
[2]. Alipour, H., Hariri, S., & Al-Nashif, Y. (2020). Anomaly-based Behavior Analysis of DNS traffic. The University of Arizona. 2020.
[3]. Bell, A. J. C., Rogers, M. B., & Pearce, J. M. (2019). The insider threat: Behavioral indicators and factors influencing likelihood of intervention. International Journal of Critical Infrastructure Protection, 24, pp.166–176, 2019. https://doi.org/10.1016/J.IJCIP.2018.12.001
[4]. Cao, Y., Gao, Y., Tan, R., Han, Q., & Liu, Z. (2018a). Understanding internet DDoS Mitigation from academic and industrial perspectives. IEEE Access, 6, pp.66641–66648, 2018. https://doi.org/10.1109/ACCESS.2018.2877710
[5]. Cao, Y., Gao, Y., Tan, R., Han, Q., & Liu, Z. (2018b). Understanding Internet DDoS Mitigation from Academic and Industrial Perspectives. IEEE Access, 6, pp.66641–66648, 2018. https://doi.org/10.1109/ACCESS.2018.2877710
[6]. Behal, S., & Kumar, K. (2016). Trends in Validation of DDoS Research. Procedia Computer Science, 85, pp.7–15, 2016. https://doi.org/10.1016/J.PROCS.2016.05.170
[7]. Beitollahi, H., &Deconinck, G. (2014). ConnectionScore: A statistical technique to resist application-layer DDoS attacks. Journal of Ambient Intelligence and Humanized Computing, 5(3), pp.425–442, 2014. https://doi.org/10.1007/s12652-013-0196-5
[8]. Chinazzi, M., Davis, J. T., Ajelli, M., Gioannini, C., Litvinova, M., Merler, S., Pastore y Piontti, A., Mu, K., Rossi, L., Sun, K., Viboud, C., Xiong, X., Yu, H., Elizabeth Halloran, M., Longini, I. M., &Vespignani, A. (2020). The effect of travel restrictions on the spread of the 2019 novel coronavirus (COVID-19) outbreak. Science, 368(6489), pp.395–400, 2020. https://doi.org/10.1126/science.aba9757
[9]. Dipert, R. R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9(4), pp.384–410, 2010. https://doi.org/10.1080/15027570.2010.536404
[10]. Dong, S., &Sarem, M. (2020). DDoS Attack Detection Method Based on Improved KNN with the Degree of DDoS Attack in Software-Defined Networks. IEEE Access, 8, pp.5039–5048, 2020. https://doi.org/10.1109/ACCESS.2019.2963077
[11]. Esposito, S., &Principi, N. (2020). To mask or not to mask children to overcome COVID-19. European Journal of Pediatrics, 179(8), 1267–1270. https://doi.org/10.1007/s00431-020-03674-9
[12]. Fan, C., Kaliyamurthy, N. M., Chen, S., Jiang, H., Zhou, Y., & Campbell, C. (2022a). Detection of DDoS Attacks in Software Defined Networking Using Entropy. Applied Sciences (Switzerland), 12(1). https://doi.org/10.3390/app12010370
[13]. Fan, C., Kaliyamurthy, N. M., Chen, S., Jiang, H., Zhou, Y., & Campbell, C. (2022b). Detection of DDoS Attacks in Software Defined Networking Using Entropy. Applied Sciences (Switzerland), 12(1). https://doi.org/10.3390/app12010370
[14]. Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., &Laplante, P. (2011). Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine, 30(1), 28–38. https://doi.org/10.1109/MTS.2011.940293
[15]. Gaurav, A., & Singh, A. K. (2017). Entropy-score: A Method to Detect DDoS Attack and Flash Crowd. 2017 2Nd Ieee International Conference on Recent Trends in Electronics, Information & Communication Technology (Rteict), pp.1427–1431, 2017.
[16]. Geeksfor geeks. (2021). Slowloris DDOS Attack Tool in Kali Linux - GeeksforGeeks. Website. https://www.geeksforgeeks.org/slowloris-ddos-attack-tool-in-kali-linux/
[17]. Gunduz, M. Z., & Das, R. (2020). Cyber-security on smart grid: threats and potential solutions. Comput. Netw., 169. https://doi.org/10.1016/j.comnet.2019.107094
[18]. Gururaj, H. L., Swathi, B. H., Trupti, R., Darshan, U. R., Rajendra, A. B., &Paramesha, K. (2023). Analysis of Preventive Measures Against DDoS Attacks in Smart Grid. Journal of The Institution of Engineers (India): Series B, 104(1), 297–303. https://doi.org/10.1007/S40031-022-00844-1
[19]. Halloran, A., Roos, N., Hanboonsong, Y., Islind, A. S., Norström, L., ValloHult, H., Olsson, S. R., Vinod Kumar, T. M., & Dahiya, B. (2017). Socio-Technical Interplay in a Two-Sided Market: The Case of Learning Platforms BT - Digital Transformation and Human Behavior. Geographical Journal, 183(1), pp.33–53, 2017.
[20]. Hilbert, E. J. (2013). Living with cybercrime. Network Security, 2013(11), 15–17. https://doi.org/10.1016/S1353-4858(13)70126-0
[21]. Huang, C., Wang, J., Wu, G., & Chen, J. (2020). Mining Web User Behaviors to Detect Application Layer DDoS Attacks. Journal of Software, 9(4). https://doi.org/10.4304/jsw.9.4.985-990
[22]. Huang, X., Du, X., & Song, B. (2020). An effective DDoS defense scheme for SDN. IEEE International Conference on Communications. https://doi.org/10.1109/ICC.2017.7997187
[23]. Irfan Shakeel. (2016). Detection and prevention of DNS anomalies - Infosec Resources. Website. https://resources.infosecinstitute.com/topic/detection-prevention-dns-anomalies/
[24]. Josh Fruhlinger. (2018). The Mirai botnet explained: How IoT devices almost brought down the internet | CSO Online. Cso. https://www.csoonline.com/article/3258748/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html
[25]. Kashyap, B., & K. Jena, S. (2012). DDoS Attack Detection and Attacker Identification. International Journal of Computer Applications, 42(1), 27–33. https://doi.org/10.5120/5657-7549
[26]. Kaur, A. (2017). DDOS Attack Detection on Wireless Sensor Network using DSR Algorithm with Cryptography. Ijca, 175(3), pp.16–23, 2017.
[27]. Kaushal, K., &Sahni, V. (2016). Early Detection of DDoS Attack in WSN. International Journal of Computer Applications, 134(13), pp.14–18, 2016.
[28]. Lee, S., Kim, G., & Kim, S. (2021). Sequence-order-independent network profiling for detecting application layer DDoS attacks. Eurasip Journal on Wireless Communications and Networking, 2021(1). https://doi.org/10.1186/1687-1499-2011-50
[29]. Li, Z., Liu, Y., & Jing, Y. (2019). Design of adaptive backstepping congestion controller for TCP networks with UDP flows based on minimax. ISA Trans, 95, 27–34. https://doi.org/10.1016/j.isatra.2019.05.005
[30]. Liu, S., Ba?ar, T., & Srikant, R. (2005). Exponential-RED: a stabilizing AQM scheme for low- and high-speed TCP protocols. IEEE/ACM Trans Netw, 13(5), 1068–1081. https://doi.org/10.1109/tnet.2005.857110
[31]. Mansfield-Devine, S. (2016). DDoS goes mainstream: how headline-grabbing attacks could make this threat an organisation’s biggest nightmare. Network Security, 2016(11), 7–13. https://doi.org/10.1016/S1353-4858(16)30104-0
[32]. Mašeti?, Z., Ke?o, D., Do?ru, N., &Hajdarevi?, K. (2017). SYN flood attack detection in cloud computing using support vector machine. TEM Journal, 6(4), 752–759. https://doi.org/10.18421/TEM64-15
[33]. McAfee. (2017). Meet IoT_reaper: The New Malware Building a Massive Botnet Army | McAfee Blog. Website. https://www.mcafee.com/blogs/internet-security/iot_reaper/
[34]. Metallo, C., Ferrara, M. A., Lazazzara, A., & Za, S. (n.d.). Digital transformation and human behavior innovation for people and organisations.
[35]. Mirkovic, J., &Reiher, P. (2021). A taxonomy of DDoS attack and DDoS defense mechanisms. In Computer Communication Review (Vol. 34, Issue 2, pp. 39–53). https://doi.org/10.1145/997150.997156
[36]. Mohammed, A. H. K., Jebamikyous, H. H., Nawara, D., &Kashef, R. (2021). IoT cyber-attack detection: A comparative analysis. ACM International Conference Proceeding Series, 117–123. https://doi.org/10.1145/3460620.3460742
[37]. Newman, S. (2019a). Under the radar: the danger of stealthy DDoS attacks. Network Security, 2019(2), 18–19. https://doi.org/10.1016/S1353-4858(19)30025-X
[38]. Newman, S. (2019b). Under the radar: the danger of stealthy DDoS attacks. Network Security, 2019(2), 18–19. https://doi.org/10.1016/S1353-4858(19)30025-X
[39]. Nguyen, T. T., Shieh, C. S., Chen, C. H., &Miu, D. (2021). Detection of unknown DDoS attacks with deep learning and Gaussian mixture model. Proceedings - 2021 4th International Conference on Information and Computer Technologies, ICICT, pp.27–32, 2021.
Citation
Amit Dogra, Taqdir, "DDoS Attacks: Trends, Mitigation Strategies, and Future Directions," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.221-230, 2023.
Improving Attendance Management in Educational Institutions: A Model View Controller Approach
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.231-235, Nov-2023
Abstract
T Efficient attendance management plays a crucial role in the success of educational institutions. This paper proposes a novel approach to enhance attendance management through the utilization of the Model-View-Controller (MVC) architecture. Traditional manual methods for attendance calculation are prone to errors and time-consuming. To address these challenges, an effective web application is designed to electronically monitor student activity in the classroom and store attendance records in a database. The application leverages the power of the Laravel Framework and incorporates JavaScript for improved usability. By implementing the MVC architecture, the system enables easy manipulation of attendance data through a user-friendly graphical user interface (GUI). Moreover, the system takes into account the distinction between theoretical and practical teaching hours, facilitating accurate calculation of student absences. The successful implementation and testing of the system demonstrate its readiness to manage student attendance in any department of a university. This paper provides valuable insights into leveraging MVC architecture for attendance management and offers a practical solution to enhance efficiency and accuracy in educational institutions.
Key-Words / Index Term
Attendance management, Model-View-Controller (MVC), Web application, Electronic monitoring, Attendance records, Laravel Framework.
References
[1] Patel UA, Swaminarayan Priya R. Development of a student attendance management system using RFID and face recognition: a review. Int J Adv Res Comput Sci Manag Stud. 2014;2(8):109–19.
[2] Anitha V Pai, Krishna A, Kshama PM, Correa M. Web service for student attendance management system. www.ijarse.com. 2016 Mar;5(3).
[3] Srinidhi M, Roy R. A web-enabled secured system for attendance monitoring and real-time location tracking using Biometric and Radio Frequency Identification (RFID) technology. In IEEE; 2015. p.1–5.
[4] F. Alhaidari, A. Rahman, and R. Zagrouba, "The Cloud of Things: Architecture, Applications and Challenges". J Ambient Intell Human Comput (2020).
[5] A. Rahman, S. Dash and A.K. Luhach, "Dynamic MODCOD and power allocation in DVB-S2: a hybrid intelligent approach." Telecommun Syst, Vol. 76, pp. 49–61, 2021.
[6] M.T. Naseem, I.M. Qureshi, A. Rahman, M.Z. Muzaffar, "Robust and fragile watermarking for medical images using redundant residue number system and chaos," Neural Network World, vol. 30, No. 3, pp. 177-192, 2020.
[7] M. Ahmad, M. A. Qadir, A. Rahman, et al., "Improved query processing over semantic caches for cloud-based relational databases." J Ambient Intell Human Computer, 2020.
[8] D.A. Almubayedh, G. Alazman, M. Alkhalis et al., "Quantum bit commitment on IBM QX". Quantum Inf Process Vol. 19, No. 55 (2020).
[9] A. Rehman, A. Athar, M. A. Khan, S. Abbas, A. Rahman, A. Saeed, "Modeling, Simulation, and Optimization of Diabetes Type II Prediction using Deep Extreme Learning Machine", Journal of Ambient Intelligence and Smart Environments, Vol. 12, No. 2, pp. 125-138, 2020.
[10] M. Mahmud, A. Rahman, M. Lee, J. Choi, "Evolutionary-based image encryption using RNA codons true table", Optics & Laser Technology , St. 121:1-8, 2020.
[11] G. Zaman, H. Mahdin, K. Hussain, A. Rahman, N. Ibrahim, N.Z.M. Safar, "PDF Digital Library of Online Resources: An ETL Approach", IJCSNS, Vol. 20 (11), pp. 172–181, 2020.
[12] The Future of Machine Learning. Medium (2020). [Online]. Available: https://towardsdatascience.com/the-future-of-machine-learning-ce0a9dc18cb
[13] M. Mahmud, A. Rahman, M. Lee, J. Choi, "Evolutionary-based image encryption using RNA codons truth table", Optics & Laser Technology, vol. 121:1-8, 2020.
[14] G. Zaman, H. Mahdin, K. Hussain, A. Rahman, N. Ibrahim, N.Z.M. Safar, "Digital Library of Online PDF Sources: An ETL Approach," IJCSNS, vol. 20 (11), pp. 172-181, 2020.
[15] F. Alhaidari, A. Rahman, and R. Zagrouba, "Cloud of Things: architecture, applications and challenges." J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02448-3.
[16] A. Rahman, S. Dash, and A.K. Luhach, "Dynamic MODCOD and power allocation in DVB-S2: a hybrid intelligent approach." Telecommun Syst, vol. 76, pp. 49–61, 2021. https://doi.org/10.1007/s11235-020-00700-x.
[17] K. Zhang, L. Tan, Z. Li, Y. Qiao, Gender and smile classification using deep convolutional neural networks, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops (2016), pp. 34–38.
[18] de Azevedo, Yves César Amorim, Laís Reis de Jesus, Wilson Fogaça de Araújo, Fernando Filipe da Silva Costa, Eliton Smith, and Alexandra Amaro de Lima. "School attendance management system for students through facial recognition." ITEGAM-JETIA 8, no. 38 (2022): 15-23.
[19] Najaf, Abdul Rezha Efrat, Jeremy David Alexander, Khoirul Tarmidzi, and Fajar Kurnia. "Designing a Web-Based Elementary School Attendance System Using the Laravel Framework." Journal of Artificial Intelligence and Digital Business (RIGGS) 1, no. 2 (2023): 64-68.
[20] Vinay, Mallela David, Mandavyapuram Hemanth Kumar, Banoth Hemanth, and Deepak Singh Tomar. "Smart Attendance System Using Biometric and GPS." In 2023 IEEE International Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1-6. IEEE, 2023.
Citation
Rudra Pratap Singh, Madhav Arora, Gurwinder Singh, "Improving Attendance Management in Educational Institutions: A Model View Controller Approach," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.231-235, 2023.
Sun Trailing Solar Panel System for Improving Energy Efficiency
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.236-242, Nov-2023
Abstract
This study delves further into the design and analysis of an Automatic Sun Tracking Solar Panel based on the open loop concept. The primary goal of this project is to maximise solar energy utilisation by effectively capturing sunlight and converting it into electrical energy for a variety of purposes. The method increases power output by putting the solar panel perpendicular to the sun`s rays, which maximises sunlight absorption. Moreover, this tracking system operates independently of the intensity of the sunrays, accurately determining the sun`s coordinates and automatically adjusting its position accordingly. This method ensures the solar panel`s excellent efficiency and dependability. This project`s main advantage is its capacity to provide access to a sustainable and ecologically favourable source of energy. This solar tracking system can be integrated into local communities and, when connected to large-scale battery banks, can cater to their energy requirements independently. Overall, this research advances renewable energy technologies, allowing for the broad deployment of solar power systems.
Key-Words / Index Term
Sun tracking, Solar panel, Solar energy, Electricity generation, Environment friendly, Battery, Open loop, Everlasting, Decentralized
References
[1] R. Dhanabal, V. Bharathi, R. Ranjitha, A. Ponni, S. Deepthi, and P. Mageshkannan, "Comparison of Efficiencies of Solar Tracker Systems with Static Panel Single Axis Tracking System and Dual Axis Tracking System with Fixed Mount," International Journal of Engineering and Technology (IJET), vol. 5, no. 2, pp. 1925-1933, 2013.
[2] K. Anusha, S. Chandra, and Mohan Reddy, "Design and Development of Real Time Clock Based Efficient Solar Tracking System," International Journal of Engineering Research and Applications (IJERA), vol. 3, no. 3, pp. 1219-1223, 2013.
[3] B. O. Anyaka, D. C. Ahiabuike, and M. J. Mbunwe, "Improvement of PV Systems Power Output Using Sun-Tracking Techniques," International Journal of Computational Engineering Research, vol. 3, no. 9, pp. 80-98, 2013.
[4] N. Jeya Ganesh, S. Maniprakash, L. Chandrasekaran, S. M. Srinivasan, and A. R. Srinivasa, "Design and Development of a Sun Tracking Mechanism Using the Direct SMA Actuation," Journal of Mechanical Design, vol. 133, no. 1, pp. 1-14, 2011.
[5] W. Batayneh, A. Owais, and M. Nairoukh, "An Intelligent Fuzzy Based Tracking Controller for a Dual-axis Solar PV System," Automation in Construction, vol. 29, pp. 201-211, 2013.
[6] A. Jay Robert, C. G. Del Rosario, and P. Elmer Dadios, "Optimization of a Small Scale Dual-axis Solar Tracking System Using Nanowatt Technology," Journal of Automation and Control Engineering, vol. 2, no. 2, pp. 134-137, 2014.
[7] B. Gupta, N. Sonkar, B. S. Bhalavi, and J. Pankaj Edla, "Design, Construction and Effectiveness Analysis of Hybrid Automatic Solar Tracking System for Amorphous and Crystalline Solar Cells," American Journal of Engineering Research, vol. 2, no. 10, pp. 221-228, 2013.
[8] T. -S. Zhan, W. -M. Lin, M. -H. Tsai, and G. -S. Wang, "Design and Implementation of the Dual-Axis Solar Tracking System," in Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference (COMPSAC), Kyoto, Japan, 2013, pp. 276-277, doi: 10.1109/COMPSAC.2013.46.
[9] K. Anusha, S. Chandra, and Mohan Reddy, "Design and Development of Real Time Clock Based Efficient Solar Tracking System," International Journal of Engineering Research and Applications (IJERA), vol. 3, no. 3, pp. 1219-1223, 2013.
[10] B. O. Anyaka, D. C. Ahiabuike, and M. J. Mbunwe, "Improvement of PV Systems Power Output Using Sun-Tracking Techniques," International Journal of Computational Engineering Research, vol. 3, no. 9, pp. 80-98, 2013.
Citation
P Roy, A Das, A Simlai, I Mondol, T Nag, J Ghosh, S Bhowmik, A Bhowmik, P Sarkar, S Majumdar, "Sun Trailing Solar Panel System for Improving Energy Efficiency," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.236-242, 2023.
A Comprehensive Study of Various Challenges and Constraints in Wireless Sensor Networks (WSNs)
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.243-248, Nov-2023
Abstract
Numerous applications are possible for Wireless Sensor Networks (WSNs). However, there are a number of implementations where the sensor data is useless and may lead to an false analysis of the provided information, especially if the coordinates information is unknown. Because of this, localization is crucial to many WSN operations. The problems and difficulties preventing the position of the sensor nodes in WSNs are thoroughly examined in this research. The fundamental concept behind a sensor network is to disperse tiny sensing devices which is capable of detecting changes in incidents or parameters and interacting with other devices over a defined geographic area for a variety of objectives, such as target tracking, vigilance, and environmental tracking. It is profitable to be utilized in great abundance in the future by integrating sensor technologies with computing power and wireless connectivity. A variety of security risks are also brought on by the use of wireless communication technology. In this essay, issues and difficulties with wireless sensor networks are surveyed.
Key-Words / Index Term
Wireless Sensor Network, Localization, Sensor node, Network, Sensing devices, Environment monitoring
References
[1]. Marcelloni, F., & Vecchio, M. “Exploiting Multi–Objective Evolutionary Algorithms for Designing Energy–Efficient Solutions to Data Compression and Node Localization in Wireless Sensor Networks”. In Evolutionary Based Solutions for Green Computing, Springer, Berlin Heidelberg, pp. 227-255,2013.
[2]. Tiwari P, Saxena VP, Mishra RG, Bhavsar D, “Wireless sensor networks: Introduction, advantages, applications and research challenges”, HCTL Open International Journal of Technology Innovations and Research.,vol.14, pp.1-11,2015.
[3]. Di, Ma, and ErMeng Joo. "A survey of machine learning in wireless sensor networks from networking and application perspectives." In Information, Communications & Signal Processing, 6th International Conference on. IEEE, pp. 1-5, 2007.
[4]. Akyildiz, Ian F., et al. "A survey on sensor networks." IEEE communications magazine, Vol. 40, Issue 8, pp.102-114,2002.
[5]. B. Charan Patel, G. R Sinha and Naveen Goel, “Introduction to sensors”, Advances in Modern Sensors, IOP publishing, pp. 1-21, 2020.
[6]. S. Manish Kumar; Amin, Syed Intekhab; Imam, Syed Akhtar; Sachan, Vibhav Kumar; Choudhary, Amit “A Survey of Wireless Sensor Network and its types”, International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) ,IEEE, Noida, pp. 326–330,2018.
[7]. A. Abdelhakim , B. Bouhorma, M. B. Mohamed, “New Technique of Wireless Sensor Networks Localization based on Energy Consumption”, International Journal of Computer Applications (0975 – 8887), Volume 9, Issue 12, pp.25-28 , 2010. doi:10.5120/1436-1935.
[8]. R. Ahmad, R. Wajirali, T. Abu-Ain,” Machine Learning For Wireless Sensor Networks Security: An Overview Of Challenges And Issues“, Vol 22, Issue 13, pp.1-35 ,2022, https://doi.org/10.3390/s22134730.
[9]. Bouaziz, M., & Rachedi, A. (2016). A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology. Computer Communications, Vol 74, pp. 3–15. doi:10.1016/j.comcom.2014.10.004
[10]. Wood AD,L.Fang,R.Stoleru,”Context-aware wireless sensor networks for assisted living and residential monitoring”, IEEE Network, Vol 22,Issue 4,pp. 26-33,2008.
[11]. Ahmad Abed ,Alhameed Alkhatib, Gurvinder Singh Baicher,”Wireless Sensor Network Architecture”, International Conference on Computer Networks and Communication Systems(CNCS 2012),IPCSIT IACSIT Press, Singapore, pp. 1-6,2011.
[12]. Buratti C, Conti A, Dardari D, Verdone R. “An overview on wireless sensor networks technology and evolution”. Sensors, Vol. 9, Issue 9, pp. 6869-6896, 2009, https://doi.org/10.3390/s90906869.
[13]. L., Liu, Q., Shao, J., & Cheng, Y. ”Distributed Localization in Wireless Sensor Networks Under Denial-of-Service Attacks”. IEEE Control Systems Letters. Vol. 5, Issue 2, pp. 493-498, 2021, doi: 10.1109/lcsys.2020.3003789.
[14]. K. Sharma, M K Ghose. Wireless Sensor Networks: “An Overview on its Security Threats”. IJCA Special Issue on “Mobile Ad-hoc Networks ,pp. 42-45, 2010, doi:10.5120/1008-44.
[15]. Newsome, J., E. Shi, D. Song, and A. Perrig. “The Sybil Attack in Sensor Networks: Analysis and Defenses.” In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, India, pp. 1259-1268,2004.
[16]. Douceur, J. “The Sybil Attack.” In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’02), Cambridge Massachusetts, USA, Springer LNCS, pp. 251-260,2002.
[17]. Michael Healy, Thomas Newe, Elfed Lewis Optical Fibre Sensors Research Centre, “Security for Wireless Sensor Networks: A Review”, SAS 2009 IEEE Sensors Applications Symposium New Orleans, pp. 1-7 , 2009.
[18]. Hassan Ali, Abdullah Al Mamun, Sultan Anwar, “All Possible Security Concern and Solutions of WSN: A Comprehensive Study”, Vol.6, Issue 4, pp. 64-74, 2015.
[19]. Al-Sakib Khan Pathan , Hyung-Woo Lee, Choong Seon Hong, “Security in Wireless Sensor Networks: Issues and Challenges”, Proc. ICACT 2006, Vol. 1, pp. 1043-1048,2006.
[20]. Anitha S.Sastry, Shazia Sulthana and Dr.S Vagdevi, “Security Threats in Wireless Sensor Networks in Each Layer”, International Journal of Advanced Networking and Applications, Vol. 04 ,Issue 04, pp. 1657-1661, 2013.
[21]. D.L., Nguyen, T.K., Nguyen, T.V., Nguyen, T.N., Massacci, F. and Phung, P.H., “A convolutional transformation network for malware classification”. 6th NAFOSTED conference on information and computer science (NICS) ,IEEE, pp. 234-239,2019.
[22]. Deng, J., R. Han, and S. Mishra. “Counter measures against Traffic Analysis in Wireless Sensor Networks.” Security and Privacy for Emerging Areas in Communications Networks, IEEEExplore,pp.1-13,2005,doi:10.1109/securecomm.2005.16.
[23]. Chris Karlof and David Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks Journal, Vol.1, Issue 2-3, pp. 293-315, 2003, doi:10.1016/s1570-8705(03)00008-8.
[24]. Yan Sun, Zhu Han, and K. J. Ray Liu, “Defense of Trust Management Vulnerabilities in Distributed Networks,” IEEE Communications Magazine, Vol 46, Issue 2, pp.112-119, 2008,doi: 10.1109/mcom.2008.4473092.
[25]. Puccinelli D, Haenggi M. “Wireless sensor networks: Applications and challenges of ubiquitous sensing”, IEEE Circuits and Systems Magazine. Vol 5, Issue 6, pp.19-29,2005.
[26]. V. Thiruppathy Kesavan and S. Radhakrishnan, “Secret Key Cryptography Based Security Approach for Wireless Sensor Networks”, International Conference on Recent Advances in Computing and Software Systems, IEEE, pp. 185-191,2012.
[27]. K. Sharma, M.K. Ghose, D. Kumar, R. P. Kumar Singh, V.K Pandey. “A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks”. In IJAST, Vol. 7, pp. 31-44, 2010.
[28]. Hamid, M. A., Rashid, M-O., and Hong, C. S., “Routing Security in Sensor Network: Hello Flood Attack and Defense”, IEEE ICNEWS ,Vol 2, pp. 2-4,2006.
[29]. Nath MP, Priyadarshini SB, Mishra D, “A comprehensive study on security in IoT and resolving security threats using machine learning (ML)”, In Advances in Intelligent Computing and Communication, Proceedings of ICAC ,pp. 545-553,2021
[30]. Priyadarshini SB, Bagjadab AB, Mishra BK, ”Digital signature and its pivotal role in affording security services”, In Handbook of e-Business Security,1st edition, Auerbach Publications,India,pp.365-384,2018,ISBN:9780429468254.
[31]. Priyadarshini SB, Bagjadab AB, Mishra BK. “Security in distributed operating system: A comprehensive study”, Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies,Wiley-Scrivener publisher, pp. 221-30, 2019, ISBN: 9781119488057.
[32]. Priyadarshini SB.,”A Comprehensive Study of Security in Electronic Commerce Frameworks in the Modern Era of Technology”, In Artificial Intelligence and Cybersecurity,1st edition, CRC press, India, pp. 121-140, 2022, ISBN9781003097518.
[33]. Dasmohapatra S, Priyadarshini SB,” A Comprehensive Study on SQL Injection Attacks, Their Mode, Detection and Prevention”,In Proceedings of Second Doctoral Symposium on Computational Intelligence: DoSCI ,pp. 617-632,2022.
Citation
Sucheta Panda, Sushree Bibhuprada B. Priyadarshini, "A Comprehensive Study of Various Challenges and Constraints in Wireless Sensor Networks (WSNs)," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.243-248, 2023.
Detecting Density Changes of Mangrove Forest in India using Remotely Sensed Images
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.249-256, Nov-2023
Abstract
The use of deep learning technology in the domain of biodiversity has been expanding over the past few years, with applications in wildlife and vegetation monitoring. The Convolutional (CNN) is a powerful tool that has enabled new feature extraction methods in computer vision. Remote sensing techniques, such as satellite and drone-assisted images, have also contributed to the development of vegetation cover assessment. This study focuses on detecting changes in vegetation cover in the Sundarbans mangrove forest, which is the world`s largest mangrove and a heritage site that supports over 4.37 million people and reduces 45 million tons of CO2. The study Neural Network used a deep learning model to analyze time-series data and achieved an accuracy score of 99.85% and a value of 1 for the other three metrics - precision, recall, and F1-Score. The study also includes a review of previous work in the field and proposes a novel model for vegetation cover assessment. This study emphasizes the importance of sustaining the ecology of the Sundarbans and provides valuable insights for future research in this field.
Key-Words / Index Term
Mangrove Forest; Deep Learning; Convolutional Neural Network; Remote Sensing Images.
References
[1] October 2021. [Online]. Available: http://www.wildbengal.com/sundarban.php.
[2] R. S. DeFries, R. A. Houghton, M. C. Hansen, C. B. Field, D. Skole and J. Townshend, “Carbon emissions from tropical deforestation and regrowth based on satellite observations for the 1980s and 1990s,” in Proceedings of the National Academy of Sciences, 2002.
[3] M. Emch and M. Peterson, “Mangrove forest cover change in the Bangladesh Sundarbans from 1989-2000: A remote sensing approach.,” Geocarto International, vol. 21, no. 1, pp. 5-12, 2006.
[4] M. I. Brown, T. Pearce, J. Leon, R. Sidle and R. Wilson, “Using remote sensing and traditional ecological knowledge (TEK) to understand mangrove change on the Maroochy River, Queensland, Australia.,” Applied Geography, vol. 94, pp. 71-83, 2018.
[5] P. Kumar, M. Rani, P. C. Pandey, A. Majumdar and M. S. Nathawat, “Monitoring of deforestation and forest degradation using remote sensing and GIS: A case study of Ranchi in Jharkhand (India),” Report and opinion, vol. 2, no. 4, pp. 14-20, 2010.
[6] S. N. M. Hoque, M. M. M. Ahmed and M. I. 5. 9.-1. Bhuiyan, “Investigating rapid deforestation and carbon dioxide release in Bangladesh using geospatial information from remote sensing data.,” Ecocycles, vol. 5, no. 2, pp. 97-105, 2019.
[7] P. P. De Bem, O. A. de Carvalho Junior, R. Fontes Guimarães and R. A. Trancoso Gomes, “Change detection of deforestation in the Brazilian Amazon using landsat data and convolutional neural networks,” Remote Sensing, vol. 12, no. 6, p. 901, 2020.
[8] D. Chamberlain, S. Phinn and H. Possingham, “Remote sensing of mangroves and estuarine communities in central Queensland, Australia.,” Remote Sensing, vol. 12, no. 1, p. 197, 2020.
[9] J. V. d. Oliveira, “Differences in precipitation and evapotranspiration between forested and deforested areas in the Amazon rainforest using remote sensing data.,” Environmental earth sciences, vol. 77, no. 6, pp. 1-14, 2018.
[10] M. Mortoja and T. Yigitcanlar, “Local drivers of anthropogenic climate change: Quantifying the impact through a remote sensing approach in Brisbane.,” Remote Sensing, vol. 12, no. 14, p. 2271, 2020.
[11] H. He, M. Chen, T. Chen and D. Li, “Matching of remote sensing images with complex background variations via Siamese convolutional neural network.,” Remote Sensing, vol. 10, no. 2, p. 355, 2018.
[12] J. S. Babu and T. Sudha, “Analysis and Detection of Deforestation Using Novel Remote-Sensing Technologies with Satellite Images,” in 2018 IDAS International Conference on Computing, Communications & Data Engineering (CCODE), 2018.
[13] M. D. Behera, P. Tripathi, P. Das, S. K. Srivastava, P. S. Roy, C. Joshi and Y. V. N. Krishnamurthy, “Remote sensing based deforestation analysis in Mahanadi and Brahmaputra river basin in India since 1985.,” Journal of environmental management, vol. 206, pp. 1192-1203, 2018.
[14] M. Salvaris, D. Dean and W. H. Tok, “Generative adversarial networks.,” in In Deep Learning with Azure, Berkeley, CA., 2018.
[15] J. Feng, H. Yu, L. Wang, X. Cao, X. Zhang and L. Jiao, “Classification of hyperspectral images based on multiclass spatial–spectral generative adversarial networks.,” IEEE Transactions on Geoscience and Remote Sensing, vol. 57, no. 8, pp. 5329-5343, 2019.
[16] P. Yan, F. He, Y. Yang and F. Hu, “Semi-supervised representation learning for remote sensing image classification based on generative adversarial networks.,” in IEEE Access, 2020.
[17] J. M. Haut, M. E. Paoletti, J. Plaza, A. Plaza and J. Li, “Hyperspectral image classification using random occlusion data augmentation.,” in IEEE Geoscience and Remote Sensing Letters, 2019.
[18] Y. Bazi, L. Bashmal, M. M. A. Rahhal, R. A. Dayil and N. A. Ajlan, “Vision transformers for remote sensing image classification,” in Remote Sensing, 2021.
[19] J. Song, S. Gao, Y. Zhu and C. Ma, “A survey of remote sensing image classification based on CNNs.,” Big earth data, vol. 3, no. 3, pp. 232-254, 2019.
[20] C. Wang, L. Zhang, W. Wei and Y. Zhang, “Hyperspectral image classification with data augmentation and classifier fusion.,” in IEEE Geoscience and Remote Sensing Letters, 17(8), 1420-1424, 2019.
[21] R. Stivaktakis, G. Tsagkatakis and P. Tsakalides, “Deep learning for multilabel land cover scene categorization using data augmentation.,” in IEEE Geoscience and Remote Sensing Letters, 2019.
[22] A. N. Abbasi and M. He, “Convolutional neural network with PCA and batch normalization for hyperspectral image classification,” in IEEE International Geoscience and Remote Sensing Symposium, 2019.
[23] R. Vaddi and P. Manoharan, “Hyperspectral image classification using CNN with spectral and spatial features integration.,” Infrared Physics & Technology, vol. 107, no. 103296, 2020.
[24] J. Li and B. Y. Liang, “A hybrid neural network for hyperspectral image classification.,” in Remote Sensing Letters, 2020.
Citation
S. Chakraborty, S. Nandi, S. Ahmed, N. Adhikari, M. Sultana, S. Bhattacharya, "Detecting Density Changes of Mangrove Forest in India using Remotely Sensed Images," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.249-256, 2023.
IoT in Healthcare: Benefits, Challenges and Future Scope of Research
Review Paper | Journal Paper
Vol.11 , Issue.01 , pp.257-265, Nov-2023
Abstract
The rapid advancement of the Internet of Things (IoT) has sparked a paradigm shift across industries, revolutionizing traditional approaches to data collection, analysis, and utilization. In particular, the integration of IoT technologies within the healthcare domain has ushered in transformative possibilities that hold the potential to enhance patient care, improve clinical outcomes, and optimize healthcare operations. This research paper aims to comprehensively explore the multifaceted landscape of IoT in healthcare, delving into the benefits, challenges, and untapped avenues of future research. The primary objective of this research is to provide a thorough examination of the advantages offered by IoT applications in healthcare, ranging from empowering real-time patient monitoring to enabling predictive analytics for disease management. IoT`s seamless amalgamation with healthcare has paved the way for remote patient monitoring, where wearable devices and sensors continuously collect and transmit vital signs, fostering proactive interventions and personalized healthcare. This real-time health tracking not only empowers patients to actively engage in their well-being but also equips healthcare providers with timely data for informed decision-making. Predictive analytics powered by IoT further elevates disease management by utilizing data-driven insights to anticipate outbreaks, detect anomalies, and enhance preventive strategies. The interconnectedness of IoT devices ensures that patient care is finely tuned and tailored, ultimately contributing to improved patient outcomes and an elevated quality of care. Additionally, the marriage of IoT with healthcare operations manifests in optimized hospital efficiency, streamlining inventory management, resource allocation, and energy consumption. However, alongside these transformative benefits, the assimilation of IoT into healthcare presents a spectrum of challenges that necessitate careful consideration. Data security and privacy concerns loom large, as the constant stream of sensitive health data creates vulnerabilities that must be fortified through robust encryption mechanisms and access controls. The interoperability puzzle also emerges as a critical challenge, demanding standardized protocols to seamlessly integrate diverse IoT devices and systems within complex healthcare ecosystems. Ethical dilemmas entwined with patient consent and the responsible use of data surface prominently, requiring a balance between innovation and safeguarding patient autonomy. Moreover, the regulatory landscape introduces its own complexities, where adherence to frameworks such as the Health Insurance Portability and Accountability Act (HIPAA) and the General Data Protection Regulation (GDPR) is paramount. The integration of IoT with established healthcare infrastructure poses integration challenges, necessitating thoughtful strategies to harmonize new technologies with legacy systems. Looking ahead, the future scope of research in IoT-driven healthcare holds immense promise and potential. The paper underscores several avenues for further exploration. Advanced data analytics emerges as a fertile ground, where the synergy of machine learning and AI algorithms can extract intricate insights from the deluge of IoT-generated healthcare data, facilitating early disease detection and personalized treatment pathways. The application of blockchain technology surfaces as a means to bolster data security, privacy, and interoperability, providing a decentralized and tamper-proof framework for health data exchange. Integrating AI and machine learning with IoT extends the boundaries of predictive analytics, enabling more accurate prognostications and informed clinical decisions. The development of standardized protocols specifically tailored for healthcare IoT is essential to ensure harmonious coexistence of devices and systems while upholding data integrity and security. Addressing the ethical and legal conundrums intrinsic to IoT in healthcare warrants interdisciplinary research efforts to devise frameworks that strike a balance between innovation and ethical imperatives. This research paper navigates the dynamic realm of IoT in healthcare, charting its benefits, confronting its challenges, and illuminating the path for future research. IoT`s integration with healthcare is a cornerstone of innovation that has the potential to revolutionize patient care, redefine healthcare operations, and drive data-driven insights. By addressing the challenges and exploring the promising future avenues, this research contributes to the growing body of knowledge that shapes the future of healthcare, where IoT emerges as a beacon of transformative potential.
Key-Words / Index Term
IoT, healthcare system, IoT security, data security, data privacy, security challenges
References
[1]. Aghdam, Z.N.; Rahmani, A.M.; Hosseinzadeh, M. The Role of the Internet of Things in Healthcare: Future Trends and Challenges. Comput. Methods Programs Biomed. 199, 105903, 2020.
[2]. Bangal, S. P., Akshay, N., Shubham, S., & Sameer, M. “Multipurpose Smart Health Care Monitoring System using IoT”, International Journal of Information and Computing Science, Vol. 6, Issue 5, pp.60-66, 2019.
[3]. Banka, S., Madan, I., & Saranya, S. S. “Smart healthcare monitoring using IoT”, International Journal of Applied Engineering Research, Vol. 13, Issue 15, pp.11984-11989, 2018.
[4]. Bokefode, J. D., & Komarasamy, G. “A Remote Patient Monitoring System: Need, Trends, Challenges and Opportunities”, International Journal of Scientific & Technology Research, Vol. 8, Issue 09, pp.830 – 835, 2019.
[5]. Guan, K., Shao, M., & Wu, S. “A Remote Health Monitoring System for The Elderly Based on Smart Home Gateway”, Journal of Healthcare Engineering, 2017.
[6]. Hassan, R., Qamar, F., Hasan, M. K., Aman, A. H. M., & Ahmed, A. S. “Internet of Things and Its Applications: A Comprehensive Survey”, Symmetry, Vol. 12, Issue 10, pp.1674, 2020.
[7]. Iqbal, N., Ahmad, S., & Kim, D. H. “Health Monitoring System for Elderly Patients Using Intelligent Task Mapping Mechanism in Closed Loop Healthcare Environment”, Symmetry, Vol. 13, Issue 2, pp.357, 2021.
[8]. Iranpak, S., Shahbahrami, A., & Shakeri, H. “Remote Patient Monitoring and classifying Using the Internet of Things Platform Combined with Cloud Computing”, 2021.
[9]. Islam, M., & Rahaman, A. “Development of Smart Healthcare Monitoring System in IoT Environment”, SN Computer Science, Vol. 1, Issue 3, pp.1-11, 2020.
[10]. Karthi, A., Rajendran, R., & Mathiarasan, P. “Smart Health Surveillance with Automated Database using Android Mobile Device”, Brazilian Archives of Biology and Technology, pp.60, 2017.
[11]. Kolay, S., Hiwarkar, T. Evaluation of the Privacy-Protecting Effects of Learning Based IoT Ecosystem Behavior. Journal of Data Acquisition and Processing Vol. 37 (5), pp.1873-1883, 2022.
[12]. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125-1142, 2017.
[13]. Lv, Z., Xia, F., Wu, G., Yao, L., & Chen, Z. “iCare: A Mobile Health Monitoring System for the Elderly”, In 2010 IEEE/ACM Int`l Conference on Green Computing and Communications & Int`l Conference on Cyber, Physical and Social Computing, pp.699-705, 2010, IEEE.
[14]. Moinuddin, K., Srikantha, N., Lokesh, K. S., & Narayana, A. (2017). A Survey on Secure Communication Protocols for IoT Systems. International Journal Of Engineering And Computer Science, 6(6), 2017.
[15]. Sritha, P. & Valarmathi R.S. “A Reliable Remote Health Monitoring System for Elderly People”, International Journal of Scientific & Technology Research, Vol. 9, Issue 01, pp.1562-1565, 2020.
[16]. Surantha, N.; Atmaja, P.; Wicaksono, M. A review of wearable internet-of-things device for healthcare. Procedia Comput. Sci., 179, pp.936–943, 2021.
[17]. Weber RH. Internet of things-new security and privacy challenges. Comput Law Secur Rev.;26(1): pp.23–30, 2010.
[18]. Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal, 4(5), 1250-1258.
[19]. Zhou J, Cap Z, Dong X, Vasilakos AV. Security and privacy for cloud-based IoT: challenges. IEEE Commun Mag.;55(1): pp.26–33, 2017.
Citation
Srikanta Kolay, Tryambak Hiwarkar, "IoT in Healthcare: Benefits, Challenges and Future Scope of Research," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.257-265, 2023.
WhatsApp Analyzer: A Tool to Measure the User Performance in Social Platform
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.266-269, Nov-2023
Abstract
An application called WhatsApp has emerged as the most popular and effective means of communication in recent years. The heroku web application called WhatsApp Chat analyzer provides analysis of WhatsApp groups. In this paper authors applied matplotlib, streamlit, seaborn, re, pandas, and certain NLP concepts for analyzing WhatsApp chart. Here authors combine machine learning with NLP. This WhatsApp conversation analyzer imports a user`s WhatsApp chat file, analyses it, and produces various visualizations as a consequence.
Key-Words / Index Term
WhatsApp chat analyzer, NumPy , Pandas , NLP, Matplotlib
References
[1]. Li, Diya, Harshita Chaudhary, and Zhe Zhang. "Modeling spatiotemporal pattern of depressive symptoms caused by COVID-19 using social media data mining." International Journal of Environmental Research and Public Health 17.14, 4988, 2020.
[2]. Python for Everybody: Exploring Data in Python 3 by Dr. Charles Russell Severance.
[3]. Neupane, S. Developing a static website and deploying it to Heroku. 2020.
[4]. Watson, Hugh J. "Preparing for the cognitive generation of decision support." MIS Quarterly Executive 16.3, 2017.
[5]. Kanala, S., Cheng, C. F., Gherasoiu, I., & Tekeoglu, A. NYS Fair Events Mobile Application With Client-Side Caching (Doctoral dissertation). 2017.
[6]. Karabatak, S., & Alano?lu, M. The Relationship between Teacher Candidates` Technology Addictions and Their Social Connectedness: A Data-Mining Approach. Malaysian Online Journal of Educational Technology, 10(4), 265-275, 2022.
[7]. Bhati, V. S., Bansal, J., & Villa, S. Social media and Indian youth. International Journal of Computer Sciences and Engineering, 7(1), 818-821, 2019.
[8]. Chen, H., Harinen, T., Lee, J. Y., Yung, M., & Zhao, Z. Causalml: Python package for causal machine learning. arXiv preprint arXiv:2002.11631, 2020.
[9]. Bloice, M. D., & Holzinger, A. A tutorial on machine learning and data science tools with python. Machine Learning for Health Informatics: State-of-the-Art and Future Challenges, 435-480, 2016.
[10]. Bach, P., Chernozhukov, V., Kurz, M. S., & Spindler, M. DoubleML-An Object-Oriented Implementation of Double Machine Learning in Python. J. Mach. Learn. Res., 23, 53-1, 2022.
[11]. Ahuja, Ravinder, et al. "The impact of features extraction on the sentiment analysis." Procedia Computer Science 152, 341-348, 2019.
Citation
Amrut Ranjan Jena, Pratyush Kumar, Rafiqul Islam, "WhatsApp Analyzer: A Tool to Measure the User Performance in Social Platform," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.266-269, 2023.
A Review on Big Data Architecture and It`s Application for Future Aspect
Review Paper | Journal Paper
Vol.11 , Issue.01 , pp.270-276, Nov-2023
Abstract
This increase in data is not going to slow down anytime soon. Data too large or complex for traditional database systems can be ingested, processed, and analyzed using a big data architecture. Depending on the capabilities of a company`s users and tools, the threshold for entering into the big data realm may differ. This paper is mainly focuses on essential questions for Big Data Architecture – What is Big Data Architecture, Big Data Architecture Layers, Types of Big Data Architecture, Big Data Architecture Application, Benefits of Big Data Architecture and Big Data Architecture Challenges.
Key-Words / Index Term
Big Data Architecture, Data Lake, Lambda Architecture, Kappa Architecture, Data Ingestion, Data Visualization.
References
[1]. Barton, D., & Court, D. (2012). Making Advanced Analytics Work For You. Harvard Business Review, 90(10), pp.79–83, 2012.
[2]. McAfee, A., & Brynjolfsson, E. (2012). Big Data: The Management Revolution. Harvard Business Review, 90(10), pp.60–68, 2012.
[3]. Wu, X., Wu, G., & Ding, W. (2014). Data Mining with Big Data. IEEE Transactions on Knowledge and Data Engineering, 28, pp.97–106, 2014.
[4]. Tien, J. M. (Year). Big Data: Unleashing Information. Journal of Systems Science and Systems Engineering, Volume, Issue, Pages. Springer.
[5]. Chen, C. L. P., & Zhang, C. (2014). Data-Intensive Applications, Challenges, Techniques, and Technologies: A Survey on Big Data. Information Sciences, 275, pp.314–347, 2014.
[6]. Davenport, T. H. (2006). Competing on Analytics. Harvest Business Review, January 2006.
[7]. Lin, J., & Ryaboy, D. (2013). Scaling Big Data Mining Infrastructure: The Twitter Experience. ACM SIGKDD Explorations Newsletter, 14, pp.6–19, 2013.
[8]. Gartner. (2016). Analytics. Gartner IT Glossary. Available via Gartner: http://www.gartner.com/it-glossary/analytics/.
[9]. Assuncao, M. D., Calheiros, R. N., Bianchi, S. C., Netto, M. A. S., & Buyya, R. (2015). Big Data Computing and Clouds: Trends and Future Directions. Journal of Parallel and Distributed Computing, 79–80, pp.3–15, 2015.
[10]. Zachman, J. A. (1987). A Framework for Information Systems Architecture. IBM Systems Journal, 26(3).
[11]. Angelov, A., Grefen, P., & Greefhorst, D. (2012). A Framework for Analysis and Design of Software Reference Architectures. Information and Software Technology, 54, pp.417–431, (2012.
[12]. Boulon, J., et al. (2008). Chukwa: A Large-Scale Monitoring System. In Cloud Computing and its Applications, Chicago, Illinois, USA, pp.22–23, 2008.
Citation
Srinjoy Saha, Sneha Nej, Rupa Saha, Debmitra Ghosh, Anal Rauth, "A Review on Big Data Architecture and It`s Application for Future Aspect," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.270-276, 2023.
A Review on Localization Strategies in Wireless Sensor Networks using Beacon nodes
Review Paper | Journal Paper
Vol.11 , Issue.01 , pp.277-283, Nov-2023
Abstract
An abstract is a short summary of your research paper, usually about a paragraph (150-300 words) long. A well-written abstract can let readers get the essence of your paper, prepare readers to follow the detailed information, analyses, and arguments in your full paper, and help readers remember the key points. Note: -Special symbols, mathematical formulas, and equations are not allowed in the "Abstract" section. References should not be cited in the abstract
Key-Words / Index Term
The authors must provide up to 6-8 keywords for indexing purposes (vital words of the article)
References
[1] Aspnes, J., Eren, T., Goldenberg, D. K., Morse, A. S., Whiteley, W., Yang, “A theory of network localization”,IEEE Transactions on Mobile Computing, Vol.5, Issue.12, pp.1663–1678, 2006, doi:10.1109/tmc.2006.174.
[2] Akyildiz, I. F., Su, W., Sankarasubramaniam,Y., & Cayirci, E,”A Survey on Sensor Networks.” IEEE Communications Magazine, Vol.40, Issue.8, pp.102-114, 2002, doi: 10.1109/mcom.2002.1024422
[3] Amundson, I., &Koutsoukos, X. D.,” A survey on localization for mobile wireless sensor networks”. In Proceedings of 2nd international conference on mobile entity localization and tracking in GPS-less environments, LNCS-5801, pp.235–254, 2009.
[4] Larsson, E. G., “Cramer-Rao Bound Analysis of Distributed Positioning in Sensor Networks” IEEE Signal Processing Letters, Vol.11, Issue.3, pp.334-337, 2004, doi: 10.1109/LSP.2003.822899.
[5] Mao, G., Fidan, B., & Anderson, Biran D. O,” Wireless sensor network localization techniques”, Computer Networks, Vol.51, Issue.10, pp.2529–2553, 2007, doi: https://doi.org/10.1016/j.comnet.2006.11.018.
[6] Halder, S., Ghosal, A. “A survey on mobile anchor assisted localization techniques in wireless sensor networks”.Wireless.Networks 22, pp. 2317–2336, 2016.
[7] N. Bulusu, J. Heidemann, and D. Estrin. GPS-less low-cost outdoor localization for very small devices. IEEE Personal Communications Magazine, Vol.7, Issue.5, pp.28–34, 2000. doi: 10.1109/98.878533.
[8] De Oliveira, H. A. B. F., Nakamura, F. E., Loureiro, A. A. & Boukerche, “Directed Position Estimation: A Recursive Localization Approach for Wireless Sensor Networks”, In Proceedings of the 14th International Conference on Computer Communications and Networks, ICCCN ’05, USA, pp.557–562, 2005.
[9] Mao, G., &Fidan,” Localization Algorithms and Strategies for Wireless Sensor Networks”, New York, Information Science Reference: IGI Global, 2009, ISBN:978-1-60566-397-5.
[10] P.K Singh, B. Tripathi, Narendra P. Singh ”Node localization in wireless sensor networks ”International Journal of Computer Science and Information Technologies, Vol.2, Issue.6, pp.2568-2572, 2011.
[11] Pal. A. “ Localization Algorithms in Wireless Sensor Networks: Current Approaches and Future Challenges”, Network Protocols and Algorithms, Vol.2, Issue.1, pp.1-30, 2010.
[12] Zhao, W., Liu, D., & Jiang, Y, ”Positioning Algorithm of Wireless Sensor Network Nodes” In Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIS-MSP’06, pp.271-273, 2006.
[13] Qi, Y., Suda, H., &Kobayashi, H, “On Time-of-Arrival Positioning in a Multipath Environment”. In Proceedings of IEEE 60th Vehicular Technology Conference, pp. 3540-3544.,2004.
[14] Yoneki E, Bacon J. “A survey of Wireless Sensor Network technologies”, UCAM-CL-TR-646. pp. 1-46, 2005.
[15] Priyadarshini SB, Panigrahi S, “A quadrigeminal scheme based on event reporting scalar premier selection for camera actuation in wireless multimedia sensor networks”, Journal of King Saud University-Engineering Sciences Vol.31, Issue.1, pp.52-60, 2019. doi:10.1016/j.jksues.2017.04.002.
[16] Bagjadab AB, Priyadarshini SB, “A Novel Nature Instilled Moving Sink Architecture for Data Gathering in Wireless Sensor Networks”, International Journal of Synthetic Emotions ,Vol.11, Issue 1, pp.36-48, 2020, doi: 10.4018/ijse.2020010101.
[17] Priyadarshini SB, Mishra D, Borah S, “A Hybrid Strategy Based on Monitored Region Segregation for Redundant Data Minimization (HS-MRS) in Sensor Networks”, In Soft Computing Techniques and Applications: Proceeding of the International Conference on Computing and Communication, pp.635-642, 2021.
[18] Panigrahi A, Sahu B, Priyadarshini SB, “Hetero Leach: Leach Protocol with Heterogeneous Energy Constraint”, In Intelligent and Cloud Computing: Proceedings of ICICC 2019, India, pp.21-29, 2021.
[19] Prusty AR, Sethi S, Nayak AK.,” Energy aware optimized routing protocols for wireless ad hoc sensor network”, Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, And Architectures, In Sensor technology: concepts, methodologies, tools, and applications, India, pp.1494-1521, 2020.
[20] Tripathy A, Pradhan SK, Nayak AK, Tripathy AR, “Hybrid Cryptography for Data Security in Wireless Sensor Network.”, In Data Engineering and Intelligent Computing, Springer, Singapore, pp.597-606, 2021.
Citation
Sucheta Panda, Sushree Bibhuprada B. Priyadarshini, "A Review on Localization Strategies in Wireless Sensor Networks using Beacon nodes," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.277-283, 2023.
Blockchain-Based Mailing Service for Securing Email Communication and Preventing Spam through Machine Learning Approach
Research Paper | Journal Paper
Vol.11 , Issue.01 , pp.284-289, Nov-2023
Abstract
This paper presents a blockchain-based mailing service designed to enhance email communication security, privacy, and accountability while effectively preventing spam through the application of machine learning techniques. By leveraging blockchain technology, the proposed system ensures verification and authentication of user identities, granting access to messages solely to authorized parties. A robust anti-spam system is established by utilizing blockchain`s capabilities, effectively filtering out unwanted emails and reducing the risk of phishing attacks. The integration of machine learning algorithms and natural language processing enables the analysis of email content for identification of potential spam mails. Furthermore, the blockchain serves as a transparent and auditable record of all sent and received emails, promoting greater accountability. Nevertheless, challenges related to maintaining user anonymity, achieving verification and authentication, and addressing scalability concerns require careful consideration. The proposed system incorporates a spam mail detection mechanism, integrating blockchain technology to secure email communication and prevent spam while utilizing machine learning-based algorithms to filter unwanted emails. Experimental results demonstrate the effectiveness of the system in spam detection, highlighting its ability to provide a secure and reliable mailing service.
Key-Words / Index Term
Blockchain-based mailing service, Email communication, Spam prevention, Machine learning.
References
[1] M. Rahim, M. H. Rahmani, and M. T. Azam, "A Blockchain-Based Smart Contract Approach to Spam Email Detection," in Proc. of the 4th International Conference on Internet of Things, Big Data and Security (IoTBDS), Prague, Czech Republic, Apr. 2019.
[2] M. Dianati, F. V. Cipolla-Ficarra, and M. P. T. Cipolla-Ficarra, "A Blockchain-Based System for Email Authentication," in Proc. of the 12th International Conference on Advances in Computer-Human Interaction (ACHI), Barcelona, Spain, Mar. 2019.
[3] Y. Chen, J. Liao, and W. Zhang, "A Blockchain-Based System for Supply Chain Management," in Proc. of the 17th International Conference on Service-Oriented Computing (ICSOC), Hangzhou, China, Nov. 2019.
[4] C. C. Ng, H. Lu, and J. L. Hu, "Blockchain-Based Identity Management System," in Proc. of the 16th International Conference on Mobile and Ubiquitous Multimedia (MUM), Cairo
[5] Chen, J., Li, H., & Li, X. (2021). A smart contract-based spam mail detection system. Journal of Ambient Intelligence and Humanized Computing, 12(2), pp.2083-2093, 2021.
[6] Wang, X., Li, J., & Li, Y. (2021). A smart contract-based spam mail detection system using reputation-based consensus. IEEE Access, 9, pp.42421-42431, 2021.
[7] Das, Suman Kumar. (2021). Spam E-mail Identification Using Blockchain Technology, 2021.
[8] X. Bao, "A Decentralized Secure Mailbox System based on Blockchain," 2020 International Conference on Computer Communication and Network Security (CCNS), Xi’an, China, pp.136-141, 2020.
[9] X. Bao, "A Decentralized Secure Mailbox System based on Blockchain," 2020 International Conference on Computer Communication and Network Security (CCNS), Xi’an, China, pp.136-141, 2020.
[10] SEC S. (2000). 2: Recommended elliptic curve domain parameters. Mississauga: Standards for efficient cryptography group, Certicom Corp.
[11] N. Ahmed, R. Amin, H. Aldabbas, D. Koundal, B. Alouffi, and T. Shah, “Machine learning techniques for spam detection in email and iot platforms: analysis and research challenges,” Security and Communication Networks, vol. 2022, pp. 1–19, 2022.
[12] L. Sherin Beevi, R. Vijayalakshmi, P. Ilampiray, and K. Hema Priya, “Blockchain based email communication with sha-256 algorithm,” in Ubiquitous Intelligent Systems: Proceedings of Second ICUIS 2022. Springer, pp.455–466, 2022.
[13] W. Li, L. Ke, W. Meng, and J. Han, “An empirical study of supervised email classification in internet of things: practical performance and key influencing factors,” International Journal of Intelligent Systems, vol. 37, no. 1, pp. 287–304, 2022.
[14] A. Karim, S. Azam, B. Shanmugam, K. Kannoorpatti, and M. Alazab, “A comprehensive survey for intelligent spam email detection,” IEEE Access, vol. 7, pp. 168 261–168 295, 2019.
[15] D. Xu, F. Wu, L. Zhu, R. Li, J. Gao, and Y. She, “Bues: A blockchainbased upgraded email system,” China Communications, vol. 19, no. 10, pp. 250–264, 2022.
[16] C.-M. Chiu, F.-M. Hsu, M.-H. Shen, and C.-M. Lin, “An architecture for electronic exchange of official document based on email and blockchain,” Journal of Internet Technology, vol. 24, no. 2, pp. 333–344, 2023.
[17] S. Suresh, M. Mohan, C. Thyagarajan, and R. Kedar, “Detection of ransomware in emails through anomaly based detection,” in Emerging Trends in Computing and Expert Technology. Springer, 2020, pp. 604– 613.
[18] F. J´a˜nez-Martino, R. Alaiz-Rodr´?guez, V. Gonz´alez-Castro, E. Fidalgo, and E. Alegre, “A review of spam email detection: analysis of spammer strategies and the dataset shift problem,” Artificial Intelligence Review, vol. 56, no. 2, pp. 1145–1173, 2023.
[19] Elmaghraby, Karim, and Tassos Dimitriou. "Blockchain-Based Fair and Secure Certified Electronic Mail Without a TTP." IEEE Access 9 (2021): 100708-100724.
[20] Piedrahita, Diego, Javier Bermejo, and Francisco Machío. "A Secure Email Solution Based on Blockchain." In Blockchain and Applications: 3rd International Congress, pp. 355-358. Springer International Publishing, 2022.
[21] Liu, Jun, Lei Zhang, Chunlin Li, Jingpan Bai, Haibin Lv, and Zhihan Lv. "Blockchain-based secure communication of intelligent transportation digital twins system." IEEE Transactions on Intelligent Transportation Systems 23, no. 11 : pp.22630-22640, 2022.
[22] Nguyen, Lam Duc, Israel Leyva-Mayorga, Amari N. Lewis, and Petar Popovski. "Modeling and analysis of data trading on blockchain-based market in IoT networks." IEEE Internet of Things Journal 8, no. 8 : pp.6487-6497, 2021.
Citation
Sarthak Sharma, Abhinav Kaushik, Aayush Angirous, Nikhil Singh, Gurwinder Singh, "Blockchain-Based Mailing Service for Securing Email Communication and Preventing Spam through Machine Learning Approach," International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.284-289, 2023.