Knowledge Computing and Its Applications

Wireless sensor networks (WSNs) have a worldwide attraction because of its increasing popularity. The key enablers for the Internet of Things (IoT) are WSN, which plays an important role in future by collecting information through the cloud. Fog Computing, the latest innovations, connects sensor-based IoT devices to the cloud. Fog Computing is a decentralized computing infrastructure in which the data, compute, storage, and applications are distributed efficiently between the data source and the cloud. The main aim of Fog Computing is to reduce the amount of data transported to the cloud and hence increase the efficiency. The knowledge-upgraded IoT devices will be embedded with a piece of software into it, which can able to understand the Distributed Denial of Service (DDoS). Such attacks are not forwarded to the cloud and thus the cloud server down problem is avoided. The IoT devices enabled with such knowledge is connected together to form a Connected Dominating Set (CDS). The data routed through only such IoT devices will be directly connected to the cloud. The CDS-based approach reduces the search for a minimum group of IoT devices called nodes, thus forming the backbone network. Various CDS algorithms have been developed for constructing CDSs with minimum number of nodes. However, most of the research work does not focus on developing a CDS based on application and requirement. In this chapter, a Gateway-based Strategic CDS (GWS-CDS) is constructed based on strategy and communication range. Here, any node in the network assigned a critical communication range, which is in a strong neighbourhood and which is within the communication range of more than one network, will be selected as the starting node, instead of the node with maximum connectivity. If a node is not within a critical communication range, then the following factors will be increased: V. Ceronmani Sharmila (&) Department of Information Technology, Hindustan Institute of Technology and Science, Chennai, Tamilnadu, India e-mail: ceronvlsi@gmail.com A. George Department of Mathematics, Periyar Maniammai University, Thanjavur, Tamilnadu, India e-mail: amalanathangeorge@gmail.com © Springer Nature Singapore Pte Ltd. 2018 S. Margret Anouncia and U. K. Wiil (eds.), Knowledge Computing and Its Applications, https://doi.org/10.1007/978-981-10-6680-1_1 3 the number of nodes that locally compete over a shared channel, access delay, network throughput and network partitioning. The other nodes for CDS construction are selected based on density and velocity. The focus of this research work was to construct a CDS in heterogeneous networks. The algorithm was tested with respect to three metrics—average CDS node size, average CDS Edge Size and average hop count per path. Simulation results showed that the proposed algorithm was better when compared to the existing algorithms.

[1]  Hamid Reza Arkian,et al.  MIST: Fog-based data analytics scheme with cost-efficient resource provisioning for IoT crowdsensing applications , 2017, J. Netw. Comput. Appl..

[2]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[3]  S. Borgatti,et al.  On Social Network Analysis in a Supply Chain Context , 2009 .

[4]  A. Barabasi,et al.  Evolution of the social network of scientific collaborations , 2001, cond-mat/0104162.

[5]  Paolo Santi The critical transmitting range for connectivity in mobile ad hoc networks , 2005, IEEE Transactions on Mobile Computing.

[6]  Jean Vanderdonckt Knowledge-Based Systems for Automated User Inter- face Generation : the TRIDENT Experience , 1995 .

[7]  Yanlin Wang,et al.  A Heuristic Algorithm for Minimum Connected Dominating Set with Maximal Weight in Ad Hoc Networks , 2003, GCC.

[8]  Akash Singh,et al.  Evaluation criteria for assessing the usability of ERP systems , 2009, SAICSIT '09.

[9]  Sergiu-Dan Stan,et al.  Platform as a service gateway for the Fog of Things , 2017, Adv. Eng. Informatics.

[10]  Aliya Ahmad,et al.  Instruction Detection System based on Support Vector Machine using BAT Algorithm , 2017 .

[11]  Charles J. Colbourn,et al.  Unit disk graphs , 1991, Discret. Math..

[12]  Vaduvur Bharghavan,et al.  Routing in ad hoc networks using a spine , 1997, Proceedings of Sixth International Conference on Computer Communications and Networks.

[13]  Ahmed Patel,et al.  A survey of intrusion detection and prevention systems , 2010, Inf. Manag. Comput. Secur..

[14]  Jianjun Shi,et al.  Simultaneous signal separation and prognostics of multi-component systems: the case of identical components , 2015 .

[16]  V. Ceronmani Sharmila,et al.  Strategic Location-based Connected Dominating Set for Mobile Ad Hoc Networks , 2014 .

[17]  Li Hao,et al.  Controlling the Residual Life Distribution of Parallel Unit Systems Through Workload Adjustment , 2017, IEEE Transactions on Automation Science and Engineering.

[18]  N. Sengupta,et al.  Logarithmic Formula Generated Seed Based Cryptographic Technique using proposed Alphanumeric Number System and Rubik Rotation Algorithm , 2012, 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS).

[19]  R. Chowdhury,et al.  String graphixification based asymmetric key cryptographic algorithm using proposed concepts of GDC and S-loop matrix , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).

[20]  Christian Schindelhauer,et al.  The wake up dominating set problem , 2015, Theor. Comput. Sci..

[21]  Matteo Golfarelli,et al.  The Dimensional Fact Model: A Conceptual Model for Data Warehouses , 1998, Int. J. Cooperative Inf. Syst..

[22]  Yunghsiang Sam Han,et al.  Optimal Transmission Range for Wireless Ad Hoc Networks Based on Energy Efficiency , 2007, IEEE Transactions on Communications.

[23]  Goran D. Putnik,et al.  Industrial Plant Layout Analyzing Based on SNA , 2016, ISDA.

[24]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[25]  Brad A. Myers,et al.  Automatic, look-and-feel independent dialog creation for graphical user interfaces , 1990, CHI '90.

[26]  Charles Wiecha,et al.  ITS: a tool for rapidly developing interactive applications , 1990, TOIS.

[27]  Walid G. Aref,et al.  LocationSpark: In-memory Distributed Spatial Query Processing and Optimization , 2020, Frontiers in Big Data.

[28]  Matthias Scheutz,et al.  Sensing cognitive multitasking for a brain-based adaptive user interface , 2011, CHI.

[29]  Natarajan Meghanathan,et al.  Predicted Link Expiration Time Based Connected Dominating Sets for Mobile Ad hoc Networks , 2010 .

[30]  Ping Luo,et al.  Facilitating the exploration of interface design alternatives: the HUMANOID model of interface design , 1992, CHI.

[31]  V. Manupati,et al.  SOCIAL NETWORK ANALYSIS BASED EVOLUTIONARY ALGORITHIMIC APPROACH TO IDENTIFY THE INFLUENCE OF HUBS ON FLEXIBLE SCHEDULING PROBLEMS , 2015 .

[32]  Qi Zhang,et al.  Indra: a peer-to-peer approach to network intrusion detection and prevention , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..

[33]  Ding-Zhu Du,et al.  Connected Dominating Sets in Wireless Networks with Different Transmission Ranges , 2007, IEEE Transactions on Mobile Computing.

[34]  Rajiv Gandhi,et al.  Distributed algorithms for connected domination in wireless networks , 2007, J. Parallel Distributed Comput..

[35]  Hari Om,et al.  Comparative Analysis of Classification Techniques in Network Based Intrusion Detection Systems , 2017 .

[36]  Pablo Castells,et al.  Declarative interface models for user interface construction tools: the MASTERMIND approach , 1995, EHCI.

[37]  David A. Wilson,et al.  C++ Programming With Macapp , 1990 .

[38]  Lisa K. Wells,et al.  LabVIEW for Everyone : Graphical Programming Made Even Easier , 1996 .

[39]  Oludele Awodele,et al.  A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS) , 2009 .

[40]  Pietro Manzoni,et al.  Determination of Critical Transmission Range in Ad-Hoc Networks , 1999 .

[41]  Natarajan Meghanathan,et al.  Applications of Graph Theory Algorithms in Mobile Ad hoc Networks , 2012 .

[42]  Phillip Bonacich,et al.  Some unique properties of eigenvector centrality , 2007, Soc. Networks.

[43]  Maja Pantic,et al.  ${\rm HCI}^{\wedge}2$ Framework: A Software Framework for Multimodal Human-Computer Interaction Systems , 2013, IEEE Transactions on Cybernetics.

[44]  Zhang Hengxi,et al.  A Methodological Framework for Data Warehouse Design , 2003 .

[45]  Mohammad Reza Meybodi,et al.  An intelligent backbone formation algorithm for wireless ad hoc networks based on distributed learning automata , 2010, Comput. Networks.

[46]  Niva Das Survey on Host and Network Based Intrusion Detection System , 2014 .

[47]  Xavier Masip-Bruin,et al.  Do we all really know what a fog node is? Current trends towards an open definition , 2017, Comput. Commun..

[48]  Carlos Maziero,et al.  Protecting host-based intrusion detectors through virtual machines , 2007, Comput. Networks.

[49]  Mario Guimaraes,et al.  Overview of intrusion detection and intrusion prevention , 2008, InfoSecCD2008 2008.

[50]  Tamara Babaian,et al.  Identifying Usability Issues with an ERP Implementation , 2005, ICEIS.

[51]  Chittaranjan A. Mandal,et al.  Minimum Connected Dominating Set Using a Collaborative Cover Heuristic for Ad Hoc Sensor Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[52]  Mark A. Linton,et al.  Unidraw: a framework for building domain-specific graphical editors , 1990, TOIS.

[53]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[54]  Rajdeep Chowdhury,et al.  Towards Design, Analysis and Performance Enhancement of Data Warehouse By Implementation And Simulation Of P2p Technology On Proposed Pseudo Mesh Architecture , 2014 .

[55]  Natarajan Meghanathan,et al.  An Algorithm to Determine Stable Connected Dominating Sets for Mobile Ad hoc Networks using Strong Neighborhoods , 2012, Int. J. Comb. Optim. Probl. Informatics.

[56]  Karan Bajaj,et al.  A Survey on Various Malware Detection Techniques on Mobile Platform , 2016 .

[57]  Thomas Weigert,et al.  An adaptive automatically tuning intrusion detection system , 2008, TAAS.

[58]  Silvia Lindtner,et al.  Being senior and ICT: a study of seniors using ICT in China , 2014, CHI.

[59]  Huan Qi,et al.  A Extended TOPSIS Method for the Stochastic Multi-Criteria Decision Making Problem through Interval Estimation , 2010, 2010 2nd International Workshop on Intelligent Systems and Applications.

[60]  Donghyun Kim,et al.  Constructing Minimum Connected Dominating Sets with Bounded Diameters in Wireless Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[61]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[62]  Pedro A. Szekely User Interface Prototyping: Tools and Techniques , 1994, ICSE Workshop on SE-HCI.

[63]  Samir Khuller,et al.  Approximation Algorithms for Connected Dominating Sets , 1996, Algorithmica.

[64]  Yehia K. Helmy,et al.  An Integrated Conceptual Model for Temporal Data Warehouse Security , 2011, Comput. Inf. Sci..

[65]  Jie Wu,et al.  Extended multipoint relays to determine connected dominating sets in MANETs , 2006, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[66]  Matt Carlson,et al.  INTRUSION DETECTION AND PREVENTION SYSTEMS , 2006 .

[67]  Rajeev Agrawal,et al.  Investigation of reconfiguration effect on makespan with social network method for flexible job shop scheduling problem , 2017, Comput. Ind. Eng..