Abstract
Owing to the ever growing communication systems, modern networks currently encompass a wide range of solutions and technologies, including wireless and wired networks and provide basis for network systems from multiple partly overlapping domains such as the Internet of Things (IoT), cloud services, and network applications. This appears in numerous active research areas with particular attention paid to the architecture and security of network systems. In parallel, novel applications are developed, in some cases strongly linked to rapidly developing network-based data acquisition and processing frameworks. This chapter presents a general introduction to the topics of network architectures, security, and applications in addition to short descriptions of the chapters included in this volume.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
King, J., Awad, A.I.: A distributed security mechanism for resource-constrained IoT devices. Informatica (Slovenia) 40(1), 133–143 (2016)
Jain, A.K., Ross, A.A., Nandakumar, K.: Introduction to Biometrics. Springer (2011)
Awad, A.I., Baba, K.: Evaluation of a fingerprint identification algorithm with SIFT features. In: Proceedings of the 3rd 2012 IIAI International Conference on Advanced Applied Informatics, pp. 129–132. IEEE, Fukuoka, Japan (2012)
Egawa, S., Awad, A.I., Baba, K.: Evaluation of acceleration algorithm for biometric identification. In: Benlamri, R. (ed.) Networked Digital Technologies, Communications in Computer and Information Science, vol. 294, pp. 231–242. Springer, Berlin (2012)
Awad, A.I., Hassanien, A.E.: Impact of some biometric modalities on forensic science. In: Muda, A.K., Choo, Y.H., Abraham, A.N., Srihari, S. (eds.) Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, Studies in Computational Intelligence, vol. 555, pp. 47–62. Springer International Publishing (2014)
Rubio-Loyola, J., Sala, D., Ali, A.I.: Maximizing packet loss monitoring accuracy for reliable trace collections. In: 16th IEEE Workshop on Local and Metropolitan Area Networks, LANMAN 2008, pp. 61–66. IEEE (2008)
Rubio-Loyola, J., Sala, D., Ali, A.I.: Accurate real-time monitoring of bottlenecks and performance of packet trace collection. In: 33rd IEEE Conference on Local Computer Networks, LCN 2008, pp. 884–891. IEEE (2008)
Chen, J., Kanj, I.A., Wang, G.: Hypercube network fault tolerance: a probabilistic approach. In: Proceedings of International Conference on Parallel Processing, pp. 65–72 (2002)
Ishikawa, T.: Hypercube multiprocessors with bus connections for improving communication performance. IEEE Trans. Comput. 44(11), 1338–1344 (1995)
Chmielewski, J.: Device-independent architecture for ubiquitous applications. Pers. Ubiquit. Comput. 18(2), 481–488 (2013)
Kobayashi, N., Tokunaga, E., Kimura, H., Hirakawa, Y., Ayabe, M., Nakajima, T.: An input widget framework for multi-modal and multi-device environments. In: Third IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (SEUS’05), pp. 63–70 (2005)
Moreira, R.S., Torres, J., Sobral, P., Morla, R., Rouncefield, M., Blair, G.S.: Dynamic adaptation of personal ubicomp environments. Pers. Ubiquit. Comput. 20(2), 165–166 (2016)
Shah, P.A., Rehan, M., Chughtai, H.M.O., Qayyum, A.: On reducing throughput degradation of TCP connection after vertical handover. In: IEEE 13th International Multitopic Conference, INMIC 2009, pp. 1–4 (2009)
Gkatzikis, L., Tryfonopoulos, T., Koutsopoulos, I.: An efficient probing mechanism for next generation mobile broadband systems. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1191–1195 (2012)
do Carmo, R., Hollick, M.: Analyzing active probing for practical intrusion detection in wireless multihop networks. In: 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp. 77–80 (2014)
Tyrrell, A., Auer, G., Bettstetter, C.: Fireflies as role models for synchronization in Ad Hoc networks. In: Proceedings of the 1st International Conference on Bio Inspired Models of Network, Information and Computing Systems. BIONETICS ’06, ACM, New York, NY, USA (2006)
Iyengar, S.S., Parameshwaran, N., Phoha, V.V., Balakrishnan, N., Okoye, C.D.: Algorithms for Wireless Sensor Networks, pp. 131–154. Wiley-IEEE Press (2011)
Hall, D.A.: Conventional and radio frequency identification (RFID) tags. In: Cadrin, S.X., Kerr, L.A., Mariani, S. (eds.) Stock Identification Methods, pp. 365–395, 2nd edn. Academic Press, San Diego (2014)
Hautcoeur, J., Talbi, L., Nedil, M.: High gain RFID tag antenna for the underground localization applications at 915 MHz band. In: 2013 IEEE Antennas and Propagation Society International Symposium (APSURSI), pp. 1488–1489 (2013)
Vinolee, R., Bhaskar, V.: Performance analysis of mixed integer linear programming with wavelength division multiplexing. In: 2014 2nd International Conference on Devices, Circuits and Systems (ICDCS), pp. 1–6 (2014)
Altay, C., Deli, H.: Distributed energy management of microgrids with Dantzig-Wolfe decomposition. In: IEEE PES Innovative Smart Grid Technologies, Europe, pp. 1–5 (2014)
Chudzikiewicz, J., Furtak, J., Zielinski, Z.: Secure protocol for wireless communication within internet of military things. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 508–513. IEEE (2015)
Hennebert, C., Dos Santos, J.: Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J. 1(5), 384–398 (2014)
Furtak, J., Chudzikiewicz, J.: Securing transmissions between nodes of WSN using TPM. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, Poland, Sept 13–16, pp. 1059–1068. IEEE (2015)
Johnsen, F.T., Bloebaum, T.H., Schenkels, L., Fiske, R., Van Selm, M., de Sortis, V., van der Zanden, A., Sliwa, J., Caban, P.: SOA over disadvantaged grids experiment and demonstrator. In: 2012 Military Communications and Information Systems Conference (MCC), pp. 1–8. IEEE (2012)
Maule, R.W., Lewis, W.C.: Security for distributed SOA at the tactical edge. In: 2010 Military Communications Conference, (MILCOM 2010), pp. 13–18. IEEE (2010)
Souag, A., Salinesi, C., Comyn-Wattiau, I.: Ontologies for security requirements: a literature survey and classification. In: Advanced Information Systems Engineering Workshops, pp. 61–69. Springer (2012)
Gorla, D., Hennessy, M., Sassone, V.: Inferring dynamic credentials for role-based trust management. In: Proceedings of the 8th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming, pp. 213–224. ACM (2006)
Li, N., Winsborough, W.H., Mitchell, J.C.: Distributed credential chain discovery in trust management. J. Comput. Secur. 11(1), 35–86 (2003)
Felkner, A., Kozakiewicz, A.: More practical application of trust management credentials. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, Poland, Sept 13–16, pp. 1125–1134. IEEE (2015)
Zhang, F., Dojen, R., Coffey, T.: Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node. Int. J. Sens. Netw. 10(4), 192–201 (2011)
Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Comput. Netw. 54(17), 2967–2978 (2010)
Panait, C., Dragomir, D.: Measuring the performance and energy consumption of AES in wireless sensor networks. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, Poland, Sept 13–16, pp. 1261–1266. IEEE (2015)
Bialas, A.: Experimentation tool for critical infrastructures risk management. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, Poland, Sept 13–16, pp. 1099–1106. IEEE (2015)
Gomes, J.L., Jesus, G., Rogeiro, J., Oliveira, A., Tavares da Costa, R., Fortunato, A.B.: Molines-towards a responsive web platform for flood forecasting and risk mitigation. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, Poland, Sept 13–16, pp. 1171–1176. IEEE (2015)
Oliveira, A., Jesus, G., Gomes, J., Rogeiro, J., Azevedo, A., Rodrigues, M., Fortunato, A., Dias, J., Tomas, L., Vaz, L., Oliveira, E., Alves, F., den Boer, S.: An interactive WebGIS observatory platform for enhanced support of integrated coastal management. J. Coastal Res. 70, 507–512 (2014), Special Issue 70— Proceedings of the 13th International Coastal Symposium
Deng, Z., Namwamba, F., Zhang, Z.: Development of decision support system for managing and using recreational beaches. J. Hydroinformatics 16(2), 447–457 (2014)
Elliott, S.: A review of active noise and vibration control in road vehicles. Tech. Rep. 981, University of Southampton. http://eprints.soton.ac.uk/65371/ (2008)
Svaricek, F., Fueger, T., Karkosch, H.J., Marienfeld, P., Bohn, C.: Automotive Applications of Active Vibration Control. INTECH Engineering—Control Engineering, INTECH (2010)
Lefeuvre, E., Badel, A., Richard, C., Petit, L., Guyomar, D.: A comparison between several vibration-powered piezoelectric generators for standalone systems. Sens. Actuators A: Phys. 126(2), 405–416 (2006)
Stockhammer, T.: Dynamic adaptive streaming over HTTP–standards and design principles. In: Proceedings of the Second Annual ACM Conference on Multimedia Systems, pp. 133–144. MMSys’11, ACM, New York, NY, USA (2011)
GPAC: GPAC, multimedia player with MPEG-DASH support. https://gpac.wp.mines-telecom.fr/player/ (2015). Last access 27.4.2016
DASH-IF: DASH-IF, a reference mpeg-dash client. http://dashif.org/reference/players/javascript/1.4.0/samples/dash-if-re ference-player/ (2015). Last access 27.4.2016
NOTTS: Eureka/celtic notts. http://projects.celticplus.eu/notts/ (2015). Last access 27.4.2016
Curry, E.: Message-Oriented Middleware, pp. 1–28. Wiley (2005)
MQTT: Mq telemetry transport (MQTT) documentation. http://mqtt.org/documentation (2015). Last access 30.11.2015
Gutiérrez, J., Villa-Medina, J.F., Nieto-Garibay, A., Porta-Gándara, M.A.: Automated irrigation system using a wireless sensor network and GPRS module. IEEE Trans. Instrum. Meas. 63(1), 166–176 (2014)
Mafuta, M., Zennaro, M., Bagula, A., Ault, G., Gombachika, H., Chadza, T.: Successful deployment of a wireless sensor network for precision agriculture in Malawi. In: IEEE International Conference on Networked Embedded Systems for Enterprise Applications, pp. 1–7. IEEE Computer Society, Los Alamitos, CA, USA (2012)
TOSSIM: Tossim simulator. http://tinyos.stanford.edu/tinyos-wiki/index.php/TOSSIM (2015). Last access 27.4.2016
Ergen, S.C.: Zigbee/ieee 802.15.4 summary. http://home.iitj.ac.in/~ramana/zigbee.pdf (2004). Last access 27.4.2016
Jongerden, M.R., Haverkort, B.R.H.M.: Battery modeling. Technical Report TR-CTIT-08-01, Centre for Telematics and Information Technology University of Twente, Enschede (Jan 2008)
Vullers, R., van Schaijk, R., Doms, I., Hoof, C.V., Mertens, R.: Micropower energy harvesting. Solid-State Electron. 53(7), 684–693 (2009), Papers Selected from the 38th European Solid-State Device Research Conference—ESSDERC’08
Akbari, S.: Energy harvesting for wireless sensor networks review. In: Ganzha, M., Maciaszek, L.A., Paprzycki, M. (eds.) Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), Warsaw, Poland, Sept 7–10, pp. 987–992 (2014)
Somov, A., Baranov, A., Spirjakin, D., Passerone, R.: Circuit design and power consumption analysis of wireless gas sensor nodes: one-sensor versus two-sensor approach. IEEE Sens. J. 14(6), 2056–2063 (2014)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this paper
Cite this paper
Grzenda, M., Furtak, J., Legierski, J., Awad, A.I. (2017). Network Architectures, Security, and Applications: An Introduction. In: Grzenda, M., Awad, A., Furtak, J., Legierski , J. (eds) Advances in Network Systems . iNetSApp 2015. Advances in Intelligent Systems and Computing, vol 461. Springer, Cham. https://doi.org/10.1007/978-3-319-44354-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-44354-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44352-2
Online ISBN: 978-3-319-44354-6
eBook Packages: EngineeringEngineering (R0)