{"title":"Energy-Efficient Clustering Scheme in Wireless Sensor Network","authors":"J. Lee","doi":"10.14257/IJGDC.2018.11.10.09","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.10.09","url":null,"abstract":"Hierarchical clustering algorithms have been proposed to minimize energy consumption by sensor nodes under power constraints in a wireless sensor network. However, previously reported methods such as backbone construction algorithms consume energy quickly at the cluster head nodes. A cluster head node must therefore be changed periodically by election among the available sensor nodes, to transfer aggregated data from one cluster head node to another for as long as possible. This study investigates the clustering algorithm and cluster head election methodology among sensors to efficiently control energy consumption. This paper presents comparison results between the conventional and proposed schemes of clustering algorithms.","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47524585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Congestion Aware Routing Protocol for Low Power and Lossy Networks","authors":"Abheyjeet Singh Chahal, D. Gupta, Ravreet Kaur","doi":"10.14257/IJGDC.2018.11.10.05","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.10.05","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47603461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services","authors":"Hyun-Jong Cha, Ho-Kyung Yang, You-Jin Song","doi":"10.14257/ijgdc.2018.11.10.03","DOIUrl":"https://doi.org/10.14257/ijgdc.2018.11.10.03","url":null,"abstract":"Intelligent customized services are required to meet the needs of users. Data concerning the user’s environment is needed more so the situation of the user can be determined for providing a highly reliable service. In order to collect a large amount of data, the Internet of Things (IoT), which connects numerous devices through the Internet, has been developed. Cloud computing is widely used for managing data efficiently, but can delay data transmission. Therefore, fog computing has been proposed. However, the method used to manage data securely in the cloud computing environment is not efficient in the fog computing environment. Moreover, data may contain personally sensitive information. Additionally, various stakeholders may exist in relation to the access authority of the information. In this respect, there can be many vulnerabilities and threats. In response, this study proposed a re-encryption technique for managing data securely in the fog computing environment. This technique allows a user to delegate the decryption authority to decrypt encrypted data using the re-encryption method in the proxy server for efficient communication.","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41866380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Authentication Technique using Hash Code in Wireless RFID Environments","authors":"Cheol-seung Lee","doi":"10.14257/IJGDC.2018.11.10.08","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.10.08","url":null,"abstract":"The development of computing technology and networking has developed into a fundamental technology of the Fourth Industrial Revolution, which provides a ubiquitous environment. In the ubiquitous environment, the IoT environment has become an issue so that various devices and the things can be actively accessed and connected. Also, the RFID system using the wireless identification code attaches an RFID tag to the object, such as the production and distribution of products. It is applied to the management very efficiently. EPCglobal is conducting a research on RFID system standardization and various security studies. Since RFID systems use wireless environment technology, there are more security threats than wire problems. In particular, failure to provide confidentiality, indistinguishability, and forward safety could expose them to various threats in the Fourth Industrial Revolution. Therefore, this study analyzes the standard method of EPCgolbal and proposes RFID security method using hash code that can consider the amount of computation.","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41874186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Tolerant and optimal Barrier Coverage for Critical Area Monitoring","authors":"Tariq Benahmed, Khelifa Benahmed, Zeyneb Mokeddem","doi":"10.14257/IJGDC.2018.11.10.02","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.10.02","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46714164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Certificateless Dynamic Data Integrity Verification using Lattices in Cloud Storage","authors":"Sasikala Chinthakunta, Shoba Bindu Chigarepalli","doi":"10.14257/ijgdc.2018.11.10.06","DOIUrl":"https://doi.org/10.14257/ijgdc.2018.11.10.06","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44184788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Priority Aware MAC Protocol for Delay-Bounded Applications in Wireless Sensor Networks","authors":"H. Kim, Seong-cheol Kim, H. Park","doi":"10.14257/IJGDC.2018.11.10.04","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.10.04","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJGDC.2018.11.10.04","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47107607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting High Data Rate Sensing Applications in Internet of Things (IoT)","authors":"Raees Khan, A. Mian","doi":"10.14257/IJGDC.2018.11.10.07","DOIUrl":"https://doi.org/10.14257/IJGDC.2018.11.10.07","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46008707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Krill Herd Algorithm for Optimal Sizing and Placing of DG in Radial Distribution System","authors":"P. Niveditha, M. Sujatha, M. Kumar","doi":"10.14257/ijgdc.2018.11.9.05","DOIUrl":"https://doi.org/10.14257/ijgdc.2018.11.9.05","url":null,"abstract":"","PeriodicalId":46000,"journal":{"name":"International Journal of Grid and Distributed Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43873867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}