The usage of Internet of Things (IoT)/ Bring Your Own Devices (BYOD) has grown up exponentially, as expected 50 Billion IoT devices by the end of 2020 in the world in smart city environment. Advancement of Human Driven Edge Computing (HEC) with 5 th Generation Internet services also makes this more feasible. Use of IoT and increased demand of IoT/BYOD becomes one of the fundamental needs to increase the organization employee productivity and business agility. But it increased the significant risk of the cyber-attack which is leading a major reason for business disruption and becomes a leading question about getting a cyber secured citizenship in the smart city environment. In order to conduct forensic investigation post incident detection of malicious activities from IoT/BYOD end point is most challenging task. Secured on boarding of untrusted IoT/BYOD end points in the corporate network and detection of threats from this area and security control mechanism required a continuous new abstraction to battle with new threat landscape. A strategic practical approach in this research is presented to detect malicious activities so that organization can adopt to protect the critical and smart city infrastructure. In order to achieve the goal of detecting of malicious activities in IoT/BYOD environment, simulation performed in 3 phases. The 1st phase of the sample performed while BYOD endpoint was outside the organization over the internet without VPN. The 2 nd phase of the simulation was performed where BYOD endpoint was securely onboarded using a corporate wireless network with a secured onboarding process. The 3 rd phase of the test done where IoT/BYOD was outside the organization with a VPN. A unique robust scalable model puts forward with significant result in conclusion for creating a cyber forensic ecosystem in IoT/BYOD environment to enable cyber secured citizenship in era of HEC with 5G and IoT.
Abstract-Increased demand of Wireless Sensor Networks (WSN) in various applications has made it a hot research area. Several challenges imposed which include energy conservation, scalability, limited network resources etc. with energy conservation being the most important. Clustering improves the energy efficiency by making high power nodes as cluster heads (CHs) which reduces the chance of energy depletion of nodes. Scalability, fault tolerance, data aggregation, energy efficiency are some of the main objectives of clustering. This paper discusses various challenges associated with clustering and different methods or techniques developed to overcome these challenges. Various clustering approaches have been summarized and few prominent Quality of service (QoS) based clustering routing protocols for WSN have been identified. Comparison of these approaches and protocols is discussed based on some parameters.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.