Computing Reviews

Quality of protection in cloud-assisted cognitive machine-to-machine communications for industrial systems
Jiang L., Tian H., Shen J., Maharjan S., Zhang Y. Mobile Networks and Applications21(6):1032-1042,2016.Type:Article
Date Reviewed: 05/05/17

Cloud computing and connected devices are opening new research areas in multiple fields including mobile communications and health sciences, among others. As we connect to the Internet more, there is an increasing chance of our data being hacked or stolen by unknown or undesirable entities. This paper discusses new ways of using the cloud to assist with protection.

Discussing devices such as ZigBee connectivity and single input, single output (SISO) channels, the paper gives a lot of details on how the secure handshakes will work, in order to keep eavesdroppers at bay. The handshake protocols are commonly used with applications to establish secure protocols for communication channels. I found the paper a bit difficult to follow. The algorithm tries to establish an optimal strategy between the two handshakes, to work out the power splitting between the two connections. These are then ranked to choose one solution. The algorithm is presented with a MATLAB simulation and graphs to show how eavesdropping is affected by power and secrecy requirements in the methods. The paper provides some mathematical proofs on how the algorithms were created and justified.

I have a few concerns about the paper: (1) I do not see the importance brought in by using clouds in this algorithm; (2) I found the algorithm hard to follow; and (3) I do not see how power plays a key role in eavesdropping. Although the paper might be very useful for radio frequency and Wi-Fi researchers, I do not think it is very relevant for cloud computing researchers.

Reviewer:  Mariam Kiran Review #: CR145247 (1707-0456)

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy