{"title":"A Wireless Sensor Network Model Using Douglas-Peucker Algorithm in The IoT Environment","authors":"Se-Jung Lim","doi":"10.21742/IJITBD.2019.4.1.04","DOIUrl":"https://doi.org/10.21742/IJITBD.2019.4.1.04","url":null,"abstract":"Wireless Sensor Networks (WSNs) which are the major component in the Internet of Things (IoT) mainly use interconnected intelligent wireless sensors. The operation of wireless sensors is typically powered by batteries and recharging batteries is difficult due to the rugged environments where they operate. Therefore, the study for prolonging the network lifetime is one of the most important challenges in WSNs. In this paper, we propose a Wireless Sensor Network Model (WSNM) using Douglas-Peucker algorithm in the IoT environment to prolong the network lifetime. The performance of WSNM is compared with PEGASIS and Enhanced-PEGASIS. In the simulation results, the performance of WSNM outperforms PEGASIS and Enhanced-PEGASIS. 1","PeriodicalId":147823,"journal":{"name":"International Journal of Internet of Things and Big Data","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116533703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Internet-Connected Device Vulnerability Information Management System in IoT Environment","authors":"Kim Taeeun","doi":"10.21742/IJITBD.2019.4.1.03","DOIUrl":"https://doi.org/10.21742/IJITBD.2019.4.1.03","url":null,"abstract":"Recently, the performance of wireless communication and small devices has greatly improved. As these technologies and environments change, there is a growing number of services that utilize various types of IoT devices. Devices such as small sensors and CCTVs that were used offline are being connected to the Internet. However, a large number of IoT devices use an open-source with no security function. In addition, network equipment such as switches and gateways, which have been used for a long time, is also used with many vulnerabilities because users do not have regular updates. Such weak devices are connected to the Internet and operating, making them vulnerable to malicious attackers. In this paper, we propose a system for collecting Internet-connected device information and identifying and managing vulnerability information by utilizing Internet-Wide Scan technology.","PeriodicalId":147823,"journal":{"name":"International Journal of Internet of Things and Big Data","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134564603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicular Networks Based Intelligent Transportation System","authors":"Stephen Neal Joshua Eali","doi":"10.21742/IJITBD.2019.4.1.02","DOIUrl":"https://doi.org/10.21742/IJITBD.2019.4.1.02","url":null,"abstract":"In this paper we tend to propose the instrument for recognizing fast vehicle in transport unintended Network (VANET). Keeping in mind the tip goal to understand the surrounding condition, each vehicle often communicates its position, temporal order knowledge in its correspondence run. The Central Server registers the traditional speed, blockage and street mischances of the vehicle utilizing time and position knowledge gotten from the RSUs. At the purpose once a vehicle is found to own a lot of speed or Road mishap had happened than the specific space, the Central Server communicates this knowledge to any or all RSUs in its vary. At the purpose once the vehicle once more comes into the scope of a RSU, it illuminates the vehicle to drive within as way as doable or to require redirection utilizing a notice message. Keeping in mind the tip goal to assess the execution of our set up, we’ve got utilised Veins 0.5 breed check system that chips away at OMNeT++ as a system check system, Simulation of Urban Movableness (SUMO) as traffic check system.","PeriodicalId":147823,"journal":{"name":"International Journal of Internet of Things and Big Data","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129384265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Blockchain Hybrid Consensus Algorithm Based on Internet of Things","authors":"Zhipeng Fan","doi":"10.21742/ijitbd.2019.4.1.05","DOIUrl":"https://doi.org/10.21742/ijitbd.2019.4.1.05","url":null,"abstract":"This article explains the relevant content and related concepts of the blockchain, and studies the architecture and several core technologies of the blockchain. This article introduces the consensus problem and the distributed consistency problem, and elaborates the principles of several consensus algorithms that are widely used in the blockchain, including the PoW consensus algorithm, the PoS consensus algorithm, and the PBFT consensus algorithm. In view of the shortcomings of a single consensus algorithm, a hybrid consensus algorithm was redesigned. This article proposes that the PBFT consensus algorithm has a high execution efficiency, and is mainly responsible for the processing of transactions and smart contracts to meet the consensus algorithm's demand for high execution efficiency. Open the Byzantine committee node rotation election function in PBFT to PoW nodes. The committee nodes are selected by PoW nodes, and any node can participate and become a PoW node to ensure the degree of decentralization of the consensus algorithm, and thereby ensure the security of the consensus algorithm. Experimental results and data show that compared with the original consensus algorithm, the hybrid consensus algorithm is better in terms of throughput and latency. The hybrid consensus algorithm combines the two-consensus algorithm consensus of PBFT and PoW to solve the problem of decentralization and performance. Contradiction.","PeriodicalId":147823,"journal":{"name":"International Journal of Internet of Things and Big Data","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127731555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"National Cyber Safety and Security: Healthcare using IoT","authors":"Anitha Patil, Rasayani India Tech","doi":"10.21742/IJITBD.2019.4.1.01","DOIUrl":"https://doi.org/10.21742/IJITBD.2019.4.1.01","url":null,"abstract":"Internet of Things (IoT) integration with different domains provides strategic benefits to organizations and people at large. However, when it comes to security, it is linked with national cyber safety and security in one way or other. The rationale behind this is that IoT combines physical and digital worlds and the whole digital infrastructure may be linked with IoT. Thus, it is important to leverage IoT integrations to have cyber safety and security. In this paper we considered healthcare unit as case study for IoT integration and security verification. We proposed a methodology with underlying mechanisms for searching and data sharing with end to end security. We built a prototype application realized with Things Board IoT platform and Jelastic cloud platform integrated with healthcare infrastructure. Our empirical results revealed that the proposed methodology is able to provide secure data sharing and searching in such distributed environment.","PeriodicalId":147823,"journal":{"name":"International Journal of Internet of Things and Big Data","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128544802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}