Faculty of Computing

Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4202

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    PublicationEmbargo
    Operational Performance and Security Improvement Approach for Integrated BigData and Industrial IoT in Cyber-Physical Communication Systems
    (IEEE, 2019-05-09) Jayawardena, C; Sen, S
    Well-performed secure computing and communication are at the forefront for Internet of Things (IoT) and Cyber-Physical Systems (CPS). By using these innovative technologies, Industrial-IoT (IIoT) has revolutionized the smart industrial processes while this evolution imposes mandatory requirements of reliable, cybersecure and well performed network. This implants adopting effective approaches of improving performance and cybersecurity in IIoT networks towards building a trusted cyber-physical communication. IIoT generates huge data of which some are real-time and rest are big data which needs assurance of delivery without loss. This report has modeled the performance and security issues of intelligent physical systems. While demonstrating the performance and security strategies of improving them, this paper addresses issues for consideration to overcome the security and performance improvement bottlenecks.
  • Thumbnail Image
    PublicationEmbargo
    Reliability and Cybersecurity Improvement Strategies in Wireless Sensor Networks for IoT-enabled Smart Infrastructures
    (IEEE, 2019-10-18) Sen, S; Jayawardena, C
    IoT-enabled smart applications and infrastructures use low power wireless sensor networks widely. But due to low energy and lack of computing capabilities, the comprehensive use of such devices result in reliability and security vulnerabilities. Therefore, the lower capability of sensor devices need to operate wisely with careful technical considerations to maximize their capabilities. This paper proposes a new technique to improve reliability and cybersecurity by balanced use of sensor energy while maintaining the quality of communication. The simulation result shows that the strategy proposed is effective. A hacking strategy has also been detailed so that the security experts can consider those while designing a security suite for IoT-enabled infrastructures.