Search results
1 – 5 of 5C. Bharanidharan, S. Malathi and Hariprasath Manoharan
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…
Abstract
Purpose
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.
Design/methodology/approach
The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.
Findings
Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.
Originality/value
All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.
Details
Keywords
Chien-Wen Shen and Phung Phi Tran
This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news…
Abstract
Purpose
This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news articles. This study displays the developmental status of each subject based on the interrelationships of each topic cluster by analyzing high-frequency keywords extracted from the collected data. Moreover, applying above methodologies will help understanding top research topics, authors, venues, institutes and countries. The differences of blockchain research and new are identified.
Design/methodology/approach
To identify and find blockchain development linkages, researchers have used search terms such as co-occurrence, bibliographic coupling, co-citation and co-authorship to help us understand the top research topics, authors, venues, institutes and countries. This study also used text mining analysis to identify blockchain articles' primary concepts and semantic structures.
Findings
The findings show the fundamental topics based on each topic cluster's links. While “technology”, “transaction”, “privacy and security”, “environment” and “consensus” were most strongly associated with blockchain in research, “platform”, “big data and cloud”, “network”, “healthcare and business” and “authentication” were closely tied to blockchain news. This article classifies blockchain principles into five patterns: hardware and infrastructure, data, networking, applications and consensus. These statistics helped the authors comprehend the top research topics, authors, venues, publication institutes and countries.
Research limitations/implications
Since Web of Science (WoS) and LexisNexis Academic data are used, the study has few sources. Others advise merging foreign datasets. WoS is one of the world's largest and most-used databases for assessing scientific papers.
Originality/value
This study has several uses and benefits. First, key concept discoveries can help academics understand blockchain research trends so they can prioritize research initiatives. Second, bibliographic coupling links academic papers on blockchain. It helps information seekers search and classify the material. Co-citation analysis results can help researchers identify potential partners and leaders in their field. The network's key organizations or countries should be proactive in discovering, proposing and creating new relationships with other organizations or countries, especially those from the journal network's border, to make the overall network more integrated and linked. Prominent members help recruit new authors to organizations or countries and link them to the co-authorship network. This study also used concept-linking analysis to identify blockchain articles' primary concepts and semantic structures. This may lead to new authors developing research ideas or subjects in primary disciplines of inquiry.
Details
Keywords
Supratika Samir Banerjee and Arti Chandani
The novel blockchain technology can be leveraged, owing to the growth in computing power and its widespread applications. This study aims to understand the challenges of adopting…
Abstract
Purpose
The novel blockchain technology can be leveraged, owing to the growth in computing power and its widespread applications. This study aims to understand the challenges of adopting blockchain technology in the financial sector, organise them into a model and classify them for systematic address.
Design/methodology/approach
Interpretive Structural Modeling (ISM) has been carried out along with MICMAC (Matrice d’impacts croisés multiplication appliquée á un classment) analysis to hierarchically structure blockchain adoption problems and categorise the challenges into four classes-autonomous, dependent, linkage and independent for better addressing. The study also uses content analysis using NVivo software.
Findings
The digraph depicts the hierarchical challenge model. Vulnerability to financial crimes and glitches, privacy issues and geopolitical tensions due to cross-border transactions are the dependent variables. Complex architecture to comprehend, code and fix, the need for new financial intermediaries, complexity in auditing and the lack of unified governance and coordination among institutions and regulators are the independent variables. The digraph, which is also justified by the qualitative content analysis, is beneficial for stakeholders to systematically address the interdependent challenges associated with blockchain implementations in finance to foster its favourable adoption.
Practical implications
The challenges in the adoption of blockchain should be resolved to allow the implementation of this technology in various finance domains. This study enables organisations to carry out resource planning and systematically address these challenges to leverage the advantages of blockchain.
Social implications
The results of the present study can help in promoting the proliferation of blockchain for faster, cost-effective, transparent and secure financial transactions and foster innovative and new business models for economic growth.
Originality/value
The development of technology has brought about significant changes in the financial sector. Blockchain is a technological advancement that aims to bring security and transparency to transactions. There has been no research leveraging ISM-MICMAC to hierarchically organise and classify the blockchain challenges in the financial sector, a critical one. The research also uses content analysis which is seldom found along with ISM-MICMAC.
Details
Keywords
Alexander O. Smith, Jeff Hemsley and Zhasmina Y. Tacheva
Our purpose is to reconnect memetics to information, a persistent and unclear association. Information can contribute across a span of memetic research. Its obscurity restricts…
Abstract
Purpose
Our purpose is to reconnect memetics to information, a persistent and unclear association. Information can contribute across a span of memetic research. Its obscurity restricts conversations about “information flow,” the connections between “form” and “content,” as well as many other topics. As information is involved in cultural activity, its clarification could focus memetic theories and applications.
Design/methodology/approach
Our design captures theoretical nuance in memetics by considering a long standing conceptual issue in memetics: information. A systematic review of memetics is provided by making use of the term information across literature. We additionally provide a citation analysis and close readings of what “information” means within the corpus.
Findings
Our initial corpus is narrowed to 128 pivotal memetic publications. From these publications, we provide a citation analysis of memetic studies. Theoretical directions of memetics in the informational context are outlined and developed. We outline two main discussion spaces, survey theoretical interests and describe where and when information is important to memetic discussion. We also find that there are continuities in goals which connect Dawkins’s meme with internet meme studies.
Originality/value
To our knowledge, this is the broadest, most inclusive review of memetics conducted, making use of a unique approach to studying information-oriented discourse across a corpus. In doing so, we provide information researchers areas in which they might contribute theoretical clarity in diverse memetic approaches. Additionally, we borrow the notion of “conceptual troublemakers” to contribute a corpus collection strategy which might be valuable for future literature reviews with conceptual difficulties arising from interdisciplinary study.
Details
Keywords
Ajay Jha, R.R.K. Sharma and Vimal Kumar
The study aims to add to the body of knowledge of open source tangible product management (also called open design). The objective is also to develop a guideline for efficient…
Abstract
Purpose
The study aims to add to the body of knowledge of open source tangible product management (also called open design). The objective is also to develop a guideline for efficient open source tangible product development and adoption.
Design/methodology/approach
The exploratory research design using secondary data (like newspapers, magazines, research articles, bogs, papers, etc.) is used to analyze open source tangible product design challenges and enablers. The success stories of Open Source Software projects (OSS) were studied for identification of critical success factors and further their relevancy was tested in the two popular cases of open source drug discovery (malaria and tuberculosis)
Findings
Open innovation has become a part of competitive strategy of current businesses. It requires an efficient intellectual property protection regime for its implementation. However, in a market dominated by proprietary benefits, the open source technology development can serve as remedy for innovation needs of neglected sectors. The OSS literature revealed managing two classes of factors, namely technology sponsor level factors and environmental factors for efficiency and effectiveness. The case study analysis in the context of applicability of these OSS critical factors showed their limitations in open source tangible products, and highlighted understanding additional challenges and remedies.
Research limitations/implications
Open source innovation is a collaborative effort involving inputs from various/diverse players, hence monitoring the effort and motivation level of the contributors is a cumbersome task. Only the information that is available online and in print media is taken as research inputs in this work. Also the data taken were from two case studies; a lot more case studies in the open design domain can progress the theory. The implications of this study are far-reaching in the areas where profit motivated proprietary efforts lack in addressing societal need. It provides guidelines for addressing those unmet needs by developing products in a collaborative way without intellectual property hurdles.
Originality/value
The essence of open design is becoming more vital, and there is a pressing need to build theory to support it, which still is elusive and dispersed. The study fills the gap using secondary data and case study approach.
Details