Green industrial networking : recent advances, taxonomy, and open research challenges
- Authors: Ahmed, Ejaz , Yaqoob, Ibrar , Ahmed, Ahmed , Gani, Abdullah , Imran, Muhammad , Guizani, Sghaier
- Date: 2016
- Type: Text , Journal article
- Relation: IEEE Communications Magazine Vol. 54, no. 10 (2016), p. 38-45
- Full Text: false
- Reviewed:
- Description: The consciousness of environmental problems has attracted the industry's attention toward the reduction of unnecessary energy emission by enabling green industrial networking. The reduction of unnecessary energy emitted by industrial networks can be a possible solution to many environmental issues. Green industrial networking is in its infancy, and an overview of the domain is still lacking. In this article, we discuss recent advances in industrial and green networking paradigms to investigate the impact on global communities. We also classify the literature by devising a taxonomy based on networking technologies, machines, network types, topologies, field bus types, transmission media, and hierarchical levels. Moreover, we identify and discuss key enablers (adaptive links, resource-based energy conservation, energy-efficient scheduling, energy-aware systems, energy-aware proxying, energy-conservative approaches, and low-power wireless protocols) for green industrial networking. Furthermore, we discuss challenges that remain to be addressed as future research directions. © 2016 IEEE.
Internet-of-things-based smart environments : state of the art, taxonomy, and open research challenges
- Authors: Ahmed, Ejaz , Yaqoob, Ibrar , Gani, Abdullah , Imran, Muhammad , Guizani, Mohsen
- Date: 2016
- Type: Text , Journal article
- Relation: IEEE Wireless Communications Vol. 23, no. 5 (2016), p. 10-16
- Full Text: false
- Reviewed:
- Description: The rapid advancements in communication technologies and the explosive growth of the Internet of Things have enabled the physical world to invisibly interweave with actuators, sensors, and other computational elements while maintaining continuous network connectivity. The continuously connected physical world with computational elements forms a smart environment. A smart environment aims to support and enhance the abilities of its dwellers in executing their tasks, such as navigating through unfamiliar space and moving heavy objects for the elderly, to name a few. Researchers have conducted a number of efforts to use IoT to facilitate our lives and to investigate the effect of IoT-based smart environments on human life. This article surveys the state-of-the-art research efforts to enable IoT-based smart environments. We categorize and classify the literature by devising a taxonomy based on communication enablers, network types, technologies, local area wireless standards, objectives, and characteristics. Moreover, the article highlights the unprecedented opportunities brought about by IoT-based smart environments and their effect on human life. Some reported case studies from different enterprises are also presented. Finally, we discuss open research challenges for enabling IoT-based smart environments. © 2016 IEEE.
Mobile ad hoc cloud : a survey
- Authors: Yaqoob, Ibra , Ahmed, Ejaz , Gani, Abdullah , Mokhtar, Salimah , Imran, Muhammad , Guizani, Sghaier
- Date: 2016
- Type: Text , Journal article
- Relation: Wireless Communications and Mobile Computing Vol. 16, no. 16 (2016), p. 2572-2589
- Full Text: false
- Reviewed:
- Description: The unabated flurry of research activities to augment various mobile devices in terms of compute-intensive task execution by leveraging heterogeneous resources of available devices in the local vicinity has created a new research domain called mobile ad hoc cloud (MAC) or mobile cloud. It is a new type of mobile cloud computing (MCC). MAC is deemed to be a candidate blueprint for future compute-intensive applications with the aim of delivering high functionalities and rich impressive experience to mobile users. However, MAC is yet in its infancy, and a comprehensive survey of the domain is still lacking. In this paper, we survey the state-of-the-art research efforts carried out in the MAC domain. We analyze several problems inhibiting the adoption of MAC and review corresponding solutions by devising a taxonomy. Moreover, MAC roots are analyzed and taxonomized as architectural components, applications, objectives, characteristics, execution model, scheduling type, formation technologies, and node types. The similarities and differences among existing proposed solutions by highlighting the advantages and disadvantages are also investigated. We also compare the literature based on objectives. Furthermore, our study advocates that the problems stem from the intrinsic characteristics of MAC by identifying several new principles. Lastly, several open research challenges such as incentives, heterogeneity-ware task allocation, mobility, minimal data exchange, and security and privacy are presented as future research directions. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.
Security in software-defined networking : threats and countermeasures
- Authors: Shu, Zhaogang , Wan, Jiafu , Li, Di , Lin, Jiaxiang , Vasilakos, Athanasios , Imran, Muhammad
- Date: 2016
- Type: Text , Journal article
- Relation: Mobile Networks and Applications Vol. 21, no. 5 (2016), p. 764-776
- Full Text: false
- Reviewed:
- Description: In recent years, Software-Defined Networking (SDN) has been a focus of research. As a promising network architecture, SDN will possibly replace traditional networking, as it brings promising opportunities for network management in terms of simplicity, programmability, and elasticity. While many efforts are currently being made to standardize this emerging paradigm, careful attention needs to be also paid to security at this early design stage. This paper focuses on the security aspects of SDN. We begin by discussing characteristics and standards of SDN. On the basis of these, we discuss the security features as a whole and then analyze the security threats and countermeasures in detail from three aspects, based on which part of the SDN paradigm they target, i.e., the data forwarding layer, the control layer and the application layer. Countermeasure techniques that could be used to prevent, mitigate, or recover from some of such attacks are also described, while the threats encountered when developing these defensive mechanisms are highlighted. © 2016, Springer Science+Business Media New York.