scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Network and Computer Applications in 2017"


Journal ArticleDOI
TL;DR: This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture.

889 citations


Journal ArticleDOI
TL;DR: A survey of IDS research efforts for IoT is presented to identify leading trends, open issues, and future research possibilities, and classified the IDS proposed in the literature according to the following attributes: detection method, IDS placement strategy, security threat and validation strategy.

675 citations


Journal ArticleDOI
TL;DR: Fog computing extends the cloud services to the edge of network, and makes computation, communication and storage closer to edge devices and end-users, which aims to enhance low-latency, mobility, network bandwidth, security and privacy.

645 citations


Journal ArticleDOI
TL;DR: A review is conducted to map the research landscape of smart home based on Internet of Things into a coherent taxonomy and identifies the basic characteristics of this emerging field in the following aspects: motivation of using IoT in smart home applications, open challenges hindering utilization, and recommendations to improve the acceptance and use of smartHome IoT applications in literature.

413 citations


Journal ArticleDOI
TL;DR: The basic features of the cloud computing, security issues, threats and their solutions are discussed, and several key topics related to the cloud, namely cloud architecture framework, service and deployment model, cloud technologies, cloud security concepts, threats, and attacks are described.

318 citations


Journal ArticleDOI
TL;DR: This survey paper aims at making a picture of QoS-motivated literature in OpenFlow-enabled SDN networks by comprehensively surveying relevant research studies and outlines the potential challenges and open problems that need to be addressed further for better and complete QoS abilities in SDN/OpenFlow networks.

315 citations


Journal ArticleDOI
TL;DR: This paper study the literature on the task scheduling and load-balancing algorithms and present a new classification of such algorithms, for example, Hadoop MapReduce load balancing category, Natural Phenomena-based load balancing categories, Agent-basedLoadBalancing category, General load balancingcategory, application-oriented category, network-aware category, and workflow specific category.

277 citations


Journal ArticleDOI
TL;DR: This work is proposing a smartphone-based mobile gateway acting as a flexible and transparent interface between different IoT devices and the Internet, which supports opportunistic IoT devices discovery, control and management coupled with data processing, collection and diffusion functionalities.

257 citations


Journal ArticleDOI
TL;DR: The main security and privacy challenges in this field which have grown much interest among the academia and research community are presented and corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges.

221 citations


Journal ArticleDOI
TL;DR: Results show that as the number of applications demanding real-time service increases, the MIST fog-based scheme outperforms traditional cloud computing.

200 citations


Journal ArticleDOI
TL;DR: Simulation results demonstrate that the UCNPD protocol can efficiently decrease the speed of the nodes death, prolong the network lifetime, and balance the energy dissipation of all nodes.

Journal ArticleDOI
TL;DR: A detailed survey on device-to-device (D2D) communications has been offered, along with the challenges which exist for D2D (like resource allocation, security, interference management etc.) to become a successful paradigm of wireless networks.

Journal ArticleDOI
TL;DR: The data aggregation mechanisms in the IoT are categorized into three main groups, including tree-based, cluster-based and centralized, and the detailed comparison of the significant techniques in each class brings a recommendation for further studies.

Journal ArticleDOI
TL;DR: A taxonomy for application prediction models is presented that investigates main characteristics and challenges of the different models and discusses open research issues and future trends of the application prediction.

Journal ArticleDOI
TL;DR: This paper develops a novel multi-cloud IoT service composition algorithm called E2C2 that aims at creating an energy-aware composition plan by searching for and integrating the least possible number of IoT services, in order to fulfil user requirements.

Journal ArticleDOI
TL;DR: A threat model and attack taxonomy in cloud environment to elucidate the vulnerabilities in cloud and provide a deep insight into Virtual Machine Introspection and Hypervisor Introspection based techniques in the survey.

Journal ArticleDOI
TL;DR: The benefits of using UAVs for this function include significantly decreasing sensor node energy consumption, lower interference, and offers considerably increased flexibility in controlling the density of the deployed nodes since the need for the multihop approach for sensor-to-sink communication is either eliminated or significantly reduced.

Journal ArticleDOI
TL;DR: The paper summarizes the findings and provides foundation for developing methods and tools for supporting semantic interoperability in the INTER-IoT project (and beyond).

Journal ArticleDOI
TL;DR: This paper revisits the scheme of Amin and Biswas and reveals previously unknown vulnerabilities in the scheme, as well as demonstrating the security of the proposed scheme using Proverif and evaluating the good performance of the scheme using NS-2 simulation.

Journal ArticleDOI
TL;DR: A metric using a fuzzy logic system based on the Sugeno fuzzy inference model for evaluating the quality of the realism of existing intrusion detection system datasets is proposed and a synthetically realistic next generation intrusion detection systems dataset is designed and generated and a preliminary analysis conducted.

Journal ArticleDOI
TL;DR: This work first analyzes the current dummy-location selection (DLS) algorithman efficient location privacy preservation approach and design an attack algorithm for DLS (ADLS) for test emerging IoT security, and proposes a novel dummy location privacy-preserving (DLP) algorithm.

Journal ArticleDOI
TL;DR: This article surveys various fault detection techniques and provides a new taxonomy to integrate new fault Detection techniques, and performs a qualitative comparison of the latest fault detection algorithms.

Journal ArticleDOI
TL;DR: An overview of the Arrowhead Framework together with its core elements is presented and guidelines for the design and deployment of interoperable, Arrowhead-compliant cooperative systems are provided.

Journal ArticleDOI
TL;DR: This work proposes a framework for modeling and assessing the security of the IoT and provides a formal definition of the framework, and uses the analysis results to show the capabilities of the proposed framework for finding potential attack paths and mitigating the impact of attacks.

Journal ArticleDOI
TL;DR: The need for further research for effective utilization of WSN technique and application of new advanced techniques for efficient monitoring of underground coal mines are explored in this paper.

Journal ArticleDOI
TL;DR: The purpose of this paper is to survey the existing techniques and mechanisms which can be addressed in cloud service composition to outline key areas for the improvement of service composition methods in the future research.

Journal ArticleDOI
TL;DR: The proposed approach utilizes the priority-wise dominance and the entropy approaches for providing solutions to the two problems considered in this paper, namely, Macro Base Station (MBS) decision problem and the cooperative UAV allocation problem.

Journal ArticleDOI
TL;DR: A comprehensive review of related studies that deal with detection of malicious accounts on social networking sites focusing on four main categories, which include detection of spam accounts, fake accounts, compromised accounts, and phishing.

Journal ArticleDOI
TL;DR: The proposed system realizes lightweight data encryption, lightweight keyword trapdoor generation and lightweight data recovery, which leaves very few computations to user's terminal, and requires much less communication cost.

Journal ArticleDOI
TL;DR: A cloud storage auditing scheme for group users, which greatly reduces the computation burden on the user side and blind data using simple operations in the phase of data uploading and data auditing to protect the data privacy against the TPM.