Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Advanced computing and systems for security : volume nine
Chaki R., Cortesi A., Saeed K., Chaki N., Springer International Publishing, New York, NY, 2020. 124 pp. Type: Book
Date Reviewed: Nov 19 2019

The 2019 Applied Computation and Security Systems (ACSS) symposium discussed using fuzzy logic, geo maps, and other approaches to analyze, forecast, scale, and secure wireless sensor networks (WSNs). This volume includes eight of the 18 papers presented in Kolkata, India, with a focus on security for Internet of Things (IoT) systems. The papers, grouped into three parts, provide unique approaches to improving and scaling WSN-based systems.

Part 1, “WSN and IoT Applications,” uses fuzzy logic to help determine localization for sensors in agriculture. IoT devices help determine where to place sensor networks, while minimizing signal overlaps and maximizing signal range. This common theme of gathering spatial and temporal environment characteristics is first used in a fuzzy logic inference engine. Another paper uses recursive graph algorithms to analyze optimal small base station (SBS) locations in a campus environment. Geospatial tools like Google Earth are also used to manage congestion by analyzing objects on the map (such as buildings) to determine user numbers. ZoBe is a zone-oriented bandwidth estimator that allocates the best resources for more efficient IoT networks in crowded areas.

In Part 2, “Software Engineering and Formal Specification for Secured Software Systems,” a big part of the software engineering focus is service composition and execution through Petri-net–based tools. Running simulators of various service choreography graphs helps analyze the scheduling of services, especially as they interact with cloud resources. These models can be generated into finite-state machines (FSMs) representing and optimizing business models. One paper introduces additional graphic symbols to create what they call enterprise service composition Petri nets (ESCPs). Formal analysis of the service orchestration patterns is achievable using ESCP simulators.

Part 3 is “VLSI and Graph Algorithms.” In the paper on graphs, the authors generate graphs based on non-isomorphic random graphs. They include a worked example of their graph algorithms. Another paper deals with VLSI multilayer channel routing and utilizes graph heuristic algorithms, which help reduce bottleneck crosstalk.

The remaining ten papers from ACSS 2019 are presented in volume ten [1].

Reviewer:  Scott Moody Review #: CR146783 (2004-0063)
1) Chaki, R.; Cortesi, A.; Saeed, K.; Chaki, N. (Eds.) Advanced computing and systems for security: volume ten. Springer, New York, NY, 2020.
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (D.4.6 )
 
 
Privacy (K.4.1 ... )
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy