Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Doctoral Dissertations

2021

IoT

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Data And Resource Management In Wireless Networks Via Data Compression, Gps-Free Dissemination, And Learning, Xiaofei Cao Jan 2021

Data And Resource Management In Wireless Networks Via Data Compression, Gps-Free Dissemination, And Learning, Xiaofei Cao

Doctoral Dissertations

“This research proposes several innovative approaches to collect data efficiently from large scale WSNs. First, a Z-compression algorithm has been proposed which exploits the temporal locality of the multi-dimensional sensing data and adapts the Z-order encoding algorithm to map multi-dimensional data to a one-dimensional data stream. The extended version of Z-compression adapts itself to working in low power WSNs running under low power listening (LPL) mode, and comprehensively analyzes its performance compressing both real-world and synthetic datasets. Second, it proposed an efficient geospatial based data collection scheme for IoTs that reduces redundant rebroadcast of up to 95% by only collecting …


Secure Data Sharing In Cloud And Iot By Leveraging Attribute-Based Encryption And Blockchain, Md Azharul Islam Jan 2021

Secure Data Sharing In Cloud And Iot By Leveraging Attribute-Based Encryption And Blockchain, Md Azharul Islam

Doctoral Dissertations

“Data sharing is very important to enable different types of cloud and IoT-based services. For example, organizations migrate their data to the cloud and share it with employees and customers in order to enjoy better fault-tolerance, high-availability, and scalability offered by the cloud. Wearable devices such as smart watch share user’s activity, location, and health data (e.g., heart rate, ECG) with the service provider for smart analytic. However, data can be sensitive, and the cloud and IoT service providers cannot be fully trusted with maintaining the security, privacy, and confidentiality of the data. Hence, new schemes and protocols are required …