2019
DOI: 10.1049/iet-net.2018.5187
|View full text |Cite
|
Sign up to set email alerts
|

Verification and validation techniques for streaming big data analytics in internet of things environment

Abstract: With an exponential growth of raw data generated from different sensors, actuators, and mobile devices, data analytics is becoming a challenging issue keeping in view of the heterogeneity of the data generated. The traditional database systems are not able to handle this huge amount of data. Current research and development are mainly focused on the analytics of this big data generated from different devices and overlook the difficulty of its secure streaming. In this study, the authors analyse and provide an … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
1

Relationship

5
3

Authors

Journals

citations
Cited by 82 publications
(44 citation statements)
references
References 45 publications
0
32
0
Order By: Relevance
“…Blockchains are decentralized, and they are prone to security issues [68]. The most common concern is that due to attacks, the consensus protocol may be compromised, such that the mining power of a few farms will control which blocks are added to the network.…”
Section: F Securitymentioning
confidence: 99%
“…Blockchains are decentralized, and they are prone to security issues [68]. The most common concern is that due to attacks, the consensus protocol may be compromised, such that the mining power of a few farms will control which blocks are added to the network.…”
Section: F Securitymentioning
confidence: 99%
“…In such cases, peer nodes through edge computing networks can inform other nodes of less congested routes. However, the trust needs to be established before communication with anonymous peer nodes to address privacy and security of location data of a vehicular node in VANET [53], [54]. Consensus algorithms can achieve this trust through transparent operations and allow private data of vehicular node to be shared with only authentic peer nodes in the network.…”
Section: A Overview Of Itmentioning
confidence: 99%
“…AI is used to make systems intelligent that can imitate as humans or even better than humans [122]. The amalgamation of AI (offers big data processing [123]) and BC (offers security) technologies is quite powerful and is improving industrial automation and analysis [124], [125]. It can ameliorate everything in almost all types of industries, such as agriculture, healthcare, media, and financial industries [126].…”
Section: Artificial Intelligence In Smart Contractmentioning
confidence: 99%