2018
DOI: 10.1177/0165551518787699
|View full text |Cite
|
Sign up to set email alerts
|

Request-based, secured and energy-efficient (RBSEE) architecture for handling IoT big data

Abstract: The technological advancements in the field of computing are giving rise to the generation of gigantic volumes of data which are beyond the handling capabilities of the conventionally available tools, techniques and systems. These types of data are known as big data. Moreover with the emergence of Internet of Things (IoT), these types of data have increased in multiple folds in 7Vs (volume, variety, veracity, value, variability, velocity and visualisation). There are several techniques prevalent in today’s tim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 29 publications
(21 citation statements)
references
References 30 publications
0
21
0
Order By: Relevance
“…When constructing public key cryptosystems, most of them are based on some complicated mathematical problems. Based on the ideas of RSA and MH algorithms, more public key cryptosystems have been proposed [22], for example, the Rabin algorithm based on the quadratic residual problem, the ElGamal algorithm based on the discrete logarithm, and the ECC algorithm based on the discrete logarithm problem on the elliptic curve. In order to give full play to the respective advantages of symmetric key algorithms and public key algorithms, scholars pointed out that the plaintext is encrypted with triple DES first, and then the keys are transmitted using public key algorithms such as RSA [23].…”
Section: Related Workmentioning
confidence: 99%
“…When constructing public key cryptosystems, most of them are based on some complicated mathematical problems. Based on the ideas of RSA and MH algorithms, more public key cryptosystems have been proposed [22], for example, the Rabin algorithm based on the quadratic residual problem, the ElGamal algorithm based on the discrete logarithm, and the ECC algorithm based on the discrete logarithm problem on the elliptic curve. In order to give full play to the respective advantages of symmetric key algorithms and public key algorithms, scholars pointed out that the plaintext is encrypted with triple DES first, and then the keys are transmitted using public key algorithms such as RSA [23].…”
Section: Related Workmentioning
confidence: 99%
“…Few challenges of big data include: heterogeneity, scalability, variety, exponential rate of data generation, veracity etc. The smart devices management systems must have provisions to handle such challenges only then it can be successful (Ahad & Biswas, 2017;Ahad & Biswas, 2019). Data Clustering and classification are other challenges that needs to be resolved for providing effective and personalized services to the end users (Casalino, Castellano & Mencar, 2018;Casalino, Castellano & Mencar, 2019).…”
Section: • Data Ownershipmentioning
confidence: 99%
“…Abdul Ahad and Biswas 120 focused on energy efficiency and proposed an approach to reduce the energy consumption of transferring data from sensors. A multi‐hop communication model and relay nodes are applied to reduce the distance.…”
Section: Classification Of Challengesmentioning
confidence: 99%