Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Quality of protection in cloud-assisted cognitive machine-to-machine communications for industrial systems
Jiang L., Tian H., Shen J., Maharjan S., Zhang Y. Mobile Networks and Applications21 (6):1032-1042,2016.Type:Article
Date Reviewed: May 5 2017

Cloud computing and connected devices are opening new research areas in multiple fields including mobile communications and health sciences, among others. As we connect to the Internet more, there is an increasing chance of our data being hacked or stolen by unknown or undesirable entities. This paper discusses new ways of using the cloud to assist with protection.

Discussing devices such as ZigBee connectivity and single input, single output (SISO) channels, the paper gives a lot of details on how the secure handshakes will work, in order to keep eavesdroppers at bay. The handshake protocols are commonly used with applications to establish secure protocols for communication channels. I found the paper a bit difficult to follow. The algorithm tries to establish an optimal strategy between the two handshakes, to work out the power splitting between the two connections. These are then ranked to choose one solution. The algorithm is presented with a MATLAB simulation and graphs to show how eavesdropping is affected by power and secrecy requirements in the methods. The paper provides some mathematical proofs on how the algorithms were created and justified.

I have a few concerns about the paper: (1) I do not see the importance brought in by using clouds in this algorithm; (2) I found the algorithm hard to follow; and (3) I do not see how power plays a key role in eavesdropping. Although the paper might be very useful for radio frequency and Wi-Fi researchers, I do not think it is very relevant for cloud computing researchers.

Reviewer:  Mariam Kiran Review #: CR145247 (1707-0456)
Bookmark and Share
  Featured Reviewer  
 
Computer-Communication Networks (C.2 )
 
 
Cloud Computing (C.2.4 ... )
 
 
Cognitive Simulation (I.2.0 ... )
 
 
Industrial Control (J.7 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Computer-Communication Networks": Date
Asynchronous health care communication
Wilson E. Communications of the ACM 46(6): 79-84, 2003. Type: Article
Jul 25 2003
OSPF: anatomy of an Internet routing protocol
Moy J., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1998.  345, Type: Book (9780201634723)
Aug 25 2003
Pricing multicasting in more practical network models
Adler M., Rubenstein D.  Discrete algorithms (Proceedings of the thirteenth annual ACM-SIAM symposium, San Francisco, California, Jan 6-8, 2002)981-990, 2002. Type: Proceedings
Feb 4 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy