Search results
1 – 6 of 6As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive…
Abstract
Purpose
As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls.
Design/methodology/approach
IoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible.
Findings
With the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified.
Originality/value
In light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the security and privacy of the data generated by users. In this work, the EGPKC is paired with adversarial artificial flora, which leads in an increase to the privacy security provided by EGPKC for the IoT (EGPKC-OAFA). The MAC security field that is part of the IEEE 802.15.4 standard is one of the areas that the EGPKC-OAFA protocol places a high focus on. The Authentication Key Generation Protocol Key Agreement, also known as EGPKCA, is used in MAC headers. The abbreviation for this protocol is EGPKCA. The OAFA technique, also known as the combination of OBL and AFA, is the most successful method for selecting EGPKCs. This method is recognized by its acronym, OAFA. It has been shown via a variety of simulations that the EGPKC-OAFA technique is a very useful instrument for carrying out performance analysis.
Details
Keywords
Riddhi Thavi, Rujuta Jhaveri, Vaibhav Narwane, Bhaskar Gardas and Nima Jafari Navimipour
This paper aims to provide a literature review on the cloud-based platforms for the education sectors. The several aspects of cloud computing adoption in education…
Abstract
Purpose
This paper aims to provide a literature review on the cloud-based platforms for the education sectors. The several aspects of cloud computing adoption in education, remote/distance learning and the application of cloud-based design and manufacturing (CBDM) have been studied and theorised.
Design/methodology/approach
A four-step methodology was adopted to analyse and categorise the papers obtained through various search engines. Out of 429 research articles, 72 papers were shortlisted for the detailed analysis.
Findings
Many factors that influence cloud computing technology adoption in the education sector have been identified in this paper. The research findings on several research items have been tabulated and discussed. Based on the theoretical research done on cloud computing for education, cloud computing for remote/distance learning and CBDM, cloud computing could enhance the educational systems in mainly developing countries and improve the scope for remote/distance learning.
Research limitations/implications
This study is limited to papers published only in the past decade from 2011 to 2020. Besides, this review was unable to include journal articles published in different languages. Nevertheless, for the effective teaching and learning process, this paper could help understand the importance and improve the process of adopting cloud computing concepts in educational universities and platforms.
Originality/value
This study is a novel one as a research review constituting cloud computing applications in education and extended for remote/distance learning and CBDM, which have not been studied in the existing knowledge base.
Details
Keywords
Shiyi Wang, Abhijeet Ghadge and Emel Aktas
Digital transformation using Industry 4.0 technologies can address various challenges in food supply chains (FSCs). However, the integration of emerging technologies to achieve…
Abstract
Purpose
Digital transformation using Industry 4.0 technologies can address various challenges in food supply chains (FSCs). However, the integration of emerging technologies to achieve digital transformation in FSCs is unclear. This study aims to establish how the digital transformation of FSCs can be achieved by adopting key technologies such as the Internet of Things (IoTs), cloud computing (CC) and big data analytics (BDA).
Design/methodology/approach
A systematic literature review (SLR) resulted in 57 articles from 2008 to 2022. Following descriptive and thematic analysis, a conceptual framework based on the diffusion of innovation (DOI) theory and the context-intervention-mechanism-outcome (CIMO) logic is established, along with avenues for future research.
Findings
The combination of DOI theory and CIMO logic provides the theoretical foundation for linking the general innovation process to the digital transformation process. A novel conceptual framework for achieving digital transformation in FSCs is developed from the initiation to implementation phases. Objectives and principles for digitally transforming FSCs are identified for the initiation phase. A four-layer technology implementation architecture is developed for the implementation phase, facilitating multiple applications for FSC digital transformation.
Originality/value
The study contributes to the development of theory on digital transformation in FSCs and offers managerial guidelines for accelerating the growth of the food industry using key Industry 4.0 emerging technologies. The proposed framework brings clarity into the “neglected” intermediate stage of data management between data collection and analysis. The study highlights the need for a balanced integration of IoT, CC and BDA as key Industry 4.0 technologies to achieve digital transformation successfully.
Details
Keywords
Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…
Abstract
Purpose
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.
Design/methodology/approach
Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.
Findings
Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.
Research limitations/implications
Other optimization techniques can be applied for WSN to analyze the performance.
Practical implications
Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.
Social implications
Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.
Originality/value
Literature survey is carried out to find the methods which give better performance.
Details
Keywords
Mahdieh Ahmad Amouei, Changiz Valmohammadi and Kiamars Fathi
In the digital age, emerging technologies have affected every industry. Information and communications technology and digital technologies have transformed traditional supply…
Abstract
Purpose
In the digital age, emerging technologies have affected every industry. Information and communications technology and digital technologies have transformed traditional supply chains into smart and more resilient ones, enabling effective management of challenges. Given the importance of the two topics, namely sustainable supply chain management and Industry 4.0 in supply chain management, on the one hand, and the dearth of theoretical research performed in this area on the other, this study aims to propose a conceptual model on a sustainable digital supply chain management in manufacturing companies.
Design/methodology/approach
This study utilized a qualitative approach. First, an in-depth review of the relevant literature was done. Then, following a multi-grounded theory methodology, relevant data were gathered by reviewing 92 papers and conducting nine semi-structured interviews with industry experts. These data were analyzed using the MAXQDA software.
Findings
A total of 41 concepts, ten sub-components and three main components (dimensions) were extracted, and the proposed conceptual model was presented. Finally, based on this conceptual model, three propositions were suggested.
Research limitations/implications
Considering that the present study was performed in the context of Iranian manufacturing companies, caution should be exercised in relation to the generalizability of the obtained results. Also, due to the problems in the digital technology infrastructure and the limited use of these technologies by manufacturing companies (emphasized by the interviewees), this study focused on the theoretical dimension of using digital technologies by these companies.
Practical implications
The proposed comprehensive model can help academicians as well as practitioners to focus better and explore the variables and constructs of the model, paving the way toward successful implementation of digital technologies in the manufacturing supply chain.
Originality/value
To the best knowledge of the authors, this study is among the first of its kind which presents a holistic and comprehensive digital supply chain model aimed at guiding companies to consider sustainability from all the main dimensions and their relevant indicators.
Details
Keywords
Manuel Pedro Rodríguez Bolívar and Laura Alcaide Muñoz
This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging…
Abstract
Purpose
This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging technologies (ETs) in public services delivery.
Design/methodology/approach
VOSviewer and SciMAT techniques were used for clustering and mapping the use of ETs in the public services delivery. Collecting documents from the DGRL v16.6 database, the paper uses text mining analysis for identifying key terms and trends in e-Government research regarding ETs and public services.
Findings
The analysis indicates that all ETs are strongly linked to each other, except for blockchain technologies (due to its disruptive nature), which indicate that ETs can be, therefore, seen as accumulative knowledge. In addition, on the whole, findings identify four stages in the evolution of ETs and their application to public services: the “electronic administration” stage, the “technological baseline” stage, the “managerial” stage and the “disruptive technological” stage.
Practical implications
The output of the present research will help to orient policymakers in the implementation and use of ETs, evaluating the influence of these technologies on public services.
Social implications
The research helps researchers to track research trends and uncover new paths on ETs and its implementation in public services.
Originality/value
Recent research has focused on the need of implementing ETs for improving public services, which could help cities to improve the citizens’ quality of life in urban areas. This paper contributes to expanding the knowledge about ETs and its implementation in public services, identifying trends and networks in the research about these issues.
Details