Skip to main content

Network Architectures, Security, and Applications: An Introduction

  • Conference paper
  • First Online:
Advances in Network Systems (iNetSApp 2015)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 461))

Abstract

Owing to the ever growing communication systems, modern networks currently encompass a wide range of solutions and technologies, including wireless and wired networks and provide basis for network systems from multiple partly overlapping domains such as the Internet of Things (IoT), cloud services, and network applications. This appears in numerous active research areas with particular attention paid to the architecture and security of network systems. In parallel, novel applications are developed, in some cases strongly linked to rapidly developing network-based data acquisition and processing frameworks. This chapter presents a general introduction to the topics of network architectures, security, and applications in addition to short descriptions of the chapters included in this volume.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. King, J., Awad, A.I.: A distributed security mechanism for resource-constrained IoT devices. Informatica (Slovenia) 40(1), 133–143 (2016)

    Google Scholar 

  2. Jain, A.K., Ross, A.A., Nandakumar, K.: Introduction to Biometrics. Springer (2011)

    Google Scholar 

  3. Awad, A.I., Baba, K.: Evaluation of a fingerprint identification algorithm with SIFT features. In: Proceedings of the 3rd 2012 IIAI International Conference on Advanced Applied Informatics, pp. 129–132. IEEE, Fukuoka, Japan (2012)

    Google Scholar 

  4. Egawa, S., Awad, A.I., Baba, K.: Evaluation of acceleration algorithm for biometric identification. In: Benlamri, R. (ed.) Networked Digital Technologies, Communications in Computer and Information Science, vol. 294, pp. 231–242. Springer, Berlin (2012)

    Google Scholar 

  5. Awad, A.I., Hassanien, A.E.: Impact of some biometric modalities on forensic science. In: Muda, A.K., Choo, Y.H., Abraham, A.N., Srihari, S. (eds.) Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, Studies in Computational Intelligence, vol. 555, pp. 47–62. Springer International Publishing (2014)

    Google Scholar 

  6. Rubio-Loyola, J., Sala, D., Ali, A.I.: Maximizing packet loss monitoring accuracy for reliable trace collections. In: 16th IEEE Workshop on Local and Metropolitan Area Networks, LANMAN 2008, pp. 61–66. IEEE (2008)

    Google Scholar 

  7. Rubio-Loyola, J., Sala, D., Ali, A.I.: Accurate real-time monitoring of bottlenecks and performance of packet trace collection. In: 33rd IEEE Conference on Local Computer Networks, LCN 2008, pp. 884–891. IEEE (2008)

    Google Scholar 

  8. Chen, J., Kanj, I.A., Wang, G.: Hypercube network fault tolerance: a probabilistic approach. In: Proceedings of International Conference on Parallel Processing, pp. 65–72 (2002)

    Google Scholar 

  9. Ishikawa, T.: Hypercube multiprocessors with bus connections for improving communication performance. IEEE Trans. Comput. 44(11), 1338–1344 (1995)

    Article  MATH  Google Scholar 

  10. Chmielewski, J.: Device-independent architecture for ubiquitous applications. Pers. Ubiquit. Comput. 18(2), 481–488 (2013)

    Article  Google Scholar 

  11. Kobayashi, N., Tokunaga, E., Kimura, H., Hirakawa, Y., Ayabe, M., Nakajima, T.: An input widget framework for multi-modal and multi-device environments. In: Third IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (SEUS’05), pp. 63–70 (2005)

    Google Scholar 

  12. Moreira, R.S., Torres, J., Sobral, P., Morla, R., Rouncefield, M., Blair, G.S.: Dynamic adaptation of personal ubicomp environments. Pers. Ubiquit. Comput. 20(2), 165–166 (2016)

    Article  Google Scholar 

  13. Shah, P.A., Rehan, M., Chughtai, H.M.O., Qayyum, A.: On reducing throughput degradation of TCP connection after vertical handover. In: IEEE 13th International Multitopic Conference, INMIC 2009, pp. 1–4 (2009)

    Google Scholar 

  14. Gkatzikis, L., Tryfonopoulos, T., Koutsopoulos, I.: An efficient probing mechanism for next generation mobile broadband systems. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1191–1195 (2012)

    Google Scholar 

  15. do Carmo, R., Hollick, M.: Analyzing active probing for practical intrusion detection in wireless multihop networks. In: 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp. 77–80 (2014)

    Google Scholar 

  16. Tyrrell, A., Auer, G., Bettstetter, C.: Fireflies as role models for synchronization in Ad Hoc networks. In: Proceedings of the 1st International Conference on Bio Inspired Models of Network, Information and Computing Systems. BIONETICS ’06, ACM, New York, NY, USA (2006)

    Google Scholar 

  17. Iyengar, S.S., Parameshwaran, N., Phoha, V.V., Balakrishnan, N., Okoye, C.D.: Algorithms for Wireless Sensor Networks, pp. 131–154. Wiley-IEEE Press (2011)

    Google Scholar 

  18. Hall, D.A.: Conventional and radio frequency identification (RFID) tags. In: Cadrin, S.X., Kerr, L.A., Mariani, S. (eds.) Stock Identification Methods, pp. 365–395, 2nd edn. Academic Press, San Diego (2014)

    Google Scholar 

  19. Hautcoeur, J., Talbi, L., Nedil, M.: High gain RFID tag antenna for the underground localization applications at 915 MHz band. In: 2013 IEEE Antennas and Propagation Society International Symposium (APSURSI), pp. 1488–1489 (2013)

    Google Scholar 

  20. Vinolee, R., Bhaskar, V.: Performance analysis of mixed integer linear programming with wavelength division multiplexing. In: 2014 2nd International Conference on Devices, Circuits and Systems (ICDCS), pp. 1–6 (2014)

    Google Scholar 

  21. Altay, C., Deli, H.: Distributed energy management of microgrids with Dantzig-Wolfe decomposition. In: IEEE PES Innovative Smart Grid Technologies, Europe, pp. 1–5 (2014)

    Google Scholar 

  22. Chudzikiewicz, J., Furtak, J., Zielinski, Z.: Secure protocol for wireless communication within internet of military things. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 508–513. IEEE (2015)

    Google Scholar 

  23. Hennebert, C., Dos Santos, J.: Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J. 1(5), 384–398 (2014)

    Article  Google Scholar 

  24. Furtak, J., Chudzikiewicz, J.: Securing transmissions between nodes of WSN using TPM. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, Poland, Sept 13–16, pp. 1059–1068. IEEE (2015)

    Google Scholar 

  25. Johnsen, F.T., Bloebaum, T.H., Schenkels, L., Fiske, R., Van Selm, M., de Sortis, V., van der Zanden, A., Sliwa, J., Caban, P.: SOA over disadvantaged grids experiment and demonstrator. In: 2012 Military Communications and Information Systems Conference (MCC), pp. 1–8. IEEE (2012)

    Google Scholar 

  26. Maule, R.W., Lewis, W.C.: Security for distributed SOA at the tactical edge. In: 2010 Military Communications Conference, (MILCOM 2010), pp. 13–18. IEEE (2010)

    Google Scholar 

  27. Souag, A., Salinesi, C., Comyn-Wattiau, I.: Ontologies for security requirements: a literature survey and classification. In: Advanced Information Systems Engineering Workshops, pp. 61–69. Springer (2012)

    Google Scholar 

  28. Gorla, D., Hennessy, M., Sassone, V.: Inferring dynamic credentials for role-based trust management. In: Proceedings of the 8th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming, pp. 213–224. ACM (2006)

    Google Scholar 

  29. Li, N., Winsborough, W.H., Mitchell, J.C.: Distributed credential chain discovery in trust management. J. Comput. Secur. 11(1), 35–86 (2003)

    Article  Google Scholar 

  30. Felkner, A., Kozakiewicz, A.: More practical application of trust management credentials. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, Poland, Sept 13–16, pp. 1125–1134. IEEE (2015)

    Google Scholar 

  31. Zhang, F., Dojen, R., Coffey, T.: Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node. Int. J. Sens. Netw. 10(4), 192–201 (2011)

    Article  Google Scholar 

  32. Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Comput. Netw. 54(17), 2967–2978 (2010)

    Article  Google Scholar 

  33. Panait, C., Dragomir, D.: Measuring the performance and energy consumption of AES in wireless sensor networks. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, Poland, Sept 13–16, pp. 1261–1266. IEEE (2015)

    Google Scholar 

  34. Bialas, A.: Experimentation tool for critical infrastructures risk management. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, Poland, Sept 13–16, pp. 1099–1106. IEEE (2015)

    Google Scholar 

  35. Gomes, J.L., Jesus, G., Rogeiro, J., Oliveira, A., Tavares da Costa, R., Fortunato, A.B.: Molines-towards a responsive web platform for flood forecasting and risk mitigation. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, Poland, Sept 13–16, pp. 1171–1176. IEEE (2015)

    Google Scholar 

  36. Oliveira, A., Jesus, G., Gomes, J., Rogeiro, J., Azevedo, A., Rodrigues, M., Fortunato, A., Dias, J., Tomas, L., Vaz, L., Oliveira, E., Alves, F., den Boer, S.: An interactive WebGIS observatory platform for enhanced support of integrated coastal management. J. Coastal Res. 70, 507–512 (2014), Special Issue 70— Proceedings of the 13th International Coastal Symposium

    Google Scholar 

  37. Deng, Z., Namwamba, F., Zhang, Z.: Development of decision support system for managing and using recreational beaches. J. Hydroinformatics 16(2), 447–457 (2014)

    Article  Google Scholar 

  38. Elliott, S.: A review of active noise and vibration control in road vehicles. Tech. Rep. 981, University of Southampton. http://eprints.soton.ac.uk/65371/ (2008)

  39. Svaricek, F., Fueger, T., Karkosch, H.J., Marienfeld, P., Bohn, C.: Automotive Applications of Active Vibration Control. INTECH Engineering—Control Engineering, INTECH (2010)

    Google Scholar 

  40. Lefeuvre, E., Badel, A., Richard, C., Petit, L., Guyomar, D.: A comparison between several vibration-powered piezoelectric generators for standalone systems. Sens. Actuators A: Phys. 126(2), 405–416 (2006)

    Article  Google Scholar 

  41. Stockhammer, T.: Dynamic adaptive streaming over HTTP–standards and design principles. In: Proceedings of the Second Annual ACM Conference on Multimedia Systems, pp. 133–144. MMSys’11, ACM, New York, NY, USA (2011)

    Google Scholar 

  42. GPAC: GPAC, multimedia player with MPEG-DASH support. https://gpac.wp.mines-telecom.fr/player/ (2015). Last access 27.4.2016

  43. DASH-IF: DASH-IF, a reference mpeg-dash client. http://dashif.org/reference/players/javascript/1.4.0/samples/dash-if-re ference-player/ (2015). Last access 27.4.2016

  44. NOTTS: Eureka/celtic notts. http://projects.celticplus.eu/notts/ (2015). Last access 27.4.2016

  45. Curry, E.: Message-Oriented Middleware, pp. 1–28. Wiley (2005)

    Google Scholar 

  46. MQTT: Mq telemetry transport (MQTT) documentation. http://mqtt.org/documentation (2015). Last access 30.11.2015

  47. Gutiérrez, J., Villa-Medina, J.F., Nieto-Garibay, A., Porta-Gándara, M.A.: Automated irrigation system using a wireless sensor network and GPRS module. IEEE Trans. Instrum. Meas. 63(1), 166–176 (2014)

    Article  Google Scholar 

  48. Mafuta, M., Zennaro, M., Bagula, A., Ault, G., Gombachika, H., Chadza, T.: Successful deployment of a wireless sensor network for precision agriculture in Malawi. In: IEEE International Conference on Networked Embedded Systems for Enterprise Applications, pp. 1–7. IEEE Computer Society, Los Alamitos, CA, USA (2012)

    Google Scholar 

  49. TOSSIM: Tossim simulator. http://tinyos.stanford.edu/tinyos-wiki/index.php/TOSSIM (2015). Last access 27.4.2016

  50. Ergen, S.C.: Zigbee/ieee 802.15.4 summary. http://home.iitj.ac.in/~ramana/zigbee.pdf (2004). Last access 27.4.2016

  51. Jongerden, M.R., Haverkort, B.R.H.M.: Battery modeling. Technical Report TR-CTIT-08-01, Centre for Telematics and Information Technology University of Twente, Enschede (Jan 2008)

    Google Scholar 

  52. Vullers, R., van Schaijk, R., Doms, I., Hoof, C.V., Mertens, R.: Micropower energy harvesting. Solid-State Electron. 53(7), 684–693 (2009), Papers Selected from the 38th European Solid-State Device Research Conference—ESSDERC’08

    Google Scholar 

  53. Akbari, S.: Energy harvesting for wireless sensor networks review. In: Ganzha, M., Maciaszek, L.A., Paprzycki, M. (eds.) Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), Warsaw, Poland, Sept 7–10, pp. 987–992 (2014)

    Google Scholar 

  54. Somov, A., Baranov, A., Spirjakin, D., Passerone, R.: Circuit design and power consumption analysis of wireless gas sensor nodes: one-sensor versus two-sensor approach. IEEE Sens. J. 14(6), 2056–2063 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Maciej Grzenda , Janusz Furtak , Jarosław Legierski or Ali Ismail Awad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this paper

Cite this paper

Grzenda, M., Furtak, J., Legierski, J., Awad, A.I. (2017). Network Architectures, Security, and Applications: An Introduction. In: Grzenda, M., Awad, A., Furtak, J., Legierski , J. (eds) Advances in Network Systems . iNetSApp 2015. Advances in Intelligent Systems and Computing, vol 461. Springer, Cham. https://doi.org/10.1007/978-3-319-44354-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44354-6_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44352-2

  • Online ISBN: 978-3-319-44354-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics