Computing Reviews

Advanced computing and systems for security :volume nine
Chaki R., Cortesi A., Saeed K., Chaki N., Springer International Publishing,New York, NY,2020. 124 pp.Type:Book
Date Reviewed: 11/19/19

The 2019 Applied Computation and Security Systems (ACSS) symposium discussed using fuzzy logic, geo maps, and other approaches to analyze, forecast, scale, and secure wireless sensor networks (WSNs). This volume includes eight of the 18 papers presented in Kolkata, India, with a focus on security for Internet of Things (IoT) systems. The papers, grouped into three parts, provide unique approaches to improving and scaling WSN-based systems.

Part 1, “WSN and IoT Applications,” uses fuzzy logic to help determine localization for sensors in agriculture. IoT devices help determine where to place sensor networks, while minimizing signal overlaps and maximizing signal range. This common theme of gathering spatial and temporal environment characteristics is first used in a fuzzy logic inference engine. Another paper uses recursive graph algorithms to analyze optimal small base station (SBS) locations in a campus environment. Geospatial tools like Google Earth are also used to manage congestion by analyzing objects on the map (such as buildings) to determine user numbers. ZoBe is a zone-oriented bandwidth estimator that allocates the best resources for more efficient IoT networks in crowded areas.

In Part 2, “Software Engineering and Formal Specification for Secured Software Systems,” a big part of the software engineering focus is service composition and execution through Petri-net–based tools. Running simulators of various service choreography graphs helps analyze the scheduling of services, especially as they interact with cloud resources. These models can be generated into finite-state machines (FSMs) representing and optimizing business models. One paper introduces additional graphic symbols to create what they call enterprise service composition Petri nets (ESCPs). Formal analysis of the service orchestration patterns is achievable using ESCP simulators.

Part 3 is “VLSI and Graph Algorithms.” In the paper on graphs, the authors generate graphs based on non-isomorphic random graphs. They include a worked example of their graph algorithms. Another paper deals with VLSI multilayer channel routing and utilizes graph heuristic algorithms, which help reduce bottleneck crosstalk.

The remaining ten papers from ACSS 2019 are presented in volume ten [1].


1)

Chaki, R.; Cortesi, A.; Saeed, K.; Chaki, N. (Eds.) Advanced computing and systems for security: volume ten. Springer, New York, NY, 2020.

Reviewer:  Scott Moody Review #: CR146783 (2004-0063)

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy