An Effective and Secure Routing System Using Intelligent Water Drop Approach
An Effective and Secure Routing System Using Intelligent Water Drop Approach
An Effective and Secure Routing System Using Intelligent Water Drop Approach
SRUTHI
Abstract
• Edge computing is emerged as a promising solution to cope with huge volumes of data generated by smart devices and low
• Data processing and estimation are shifted to the edge computing side. Nevertheless, the wireless communication network
between field devices and edge computing side is exposed to malicious attackers because of its openness.
• Therefore, in this project, the transmission path selection strategy design to guarantee the secure state estimation on the edge
• Firstly, A novel Intelligent Water Drop (IWD) to learn the attack rule and predict the attacker’s next conduct with the use of
• With lower computational complexity, the proposed IWD algorithm could track the attack rule in real time whenever new data
comes.
• Meanwhile, the analytical relationship between the probabilities of upper bound error is derived. Based on the predicted
attacker’s behavior obtained by the IWD algorithm, the flexibly select the secure routing path to avoid being attacked and thus
improve successful transmission probability. Furthermore, this secure routing path selection method improves the performance
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Colour.
Mouse : Logitech.
Ram : 256 Mb.
Software Requirements:
Operating system :- Windows XP Professional
• Cloud services are becoming an elemental part of many computing systems. In turn, the performance of these systems is
• Thus, it is crucial to choose Cloud services whose performance match the user requirements. Such a choice requires a
• However, evaluation of Cloud services is challenging due to several reasons including unavailability of standards for
performance of Cloud services, different features of Cloud services provided by service providers, differences in underlying
technologies, etc.
• To this end, this article provides a comprehensive framework for Cloud service evaluation using a unied Cloud service
measurement index.
• The proposed index covers different aspects of the performance of Cloud services in terms of 8 top-level attributes and 65
detailed KPIs. The comprehensive nature of the framework addresses the needs of different Cloud models.
• The overall performance of Cloud services is evaluated and ranked using the MAGIQ method, which considers user
[1] J. D. McCaffrey, ``Using the multi-attribute global inference of quality (MAGIQ) technique for software
testing,'' in Proc. 6th Int. Conf. Inf. Technol., New Generat., 2009, pp. 738742.
[2] J. Siegel and J. Perdue, ``Cloud services measures for global use: The service measurement index (SMI),''
in Proc. Annu. SRII Global Conf., 2012, pp. 411415.
[3] B. Stanton, M. Theofanos, and K. P. Joshi, ``Framework for cloud usability,'' in Proc. Int. Conf. Hum.
Aspects Inf. Secur., Privacy, Trust. Cham, Switzerland: Springer, 2015, pp. 664671.
[4] (2018). Microsoft Technet: Builidng IaaS Cloud Platforms. Accessed: Feb. 6, 2018. [Online]. Available:
https://blogs.technet.microsoft. com/privateCloud/2012/04/04/what-is-infrastructure-as-a-service-iaas/
[5] D. Hilley, ``Cloud computing: A taxonomy of platform and infrastructure-level offerings,'' Georgia Inst.
Technol., Atlanta, GA, USA, Tech. Rep. GIT-CERCS-09-13, 2009.
[6] B. P. Rimal, A. Jukan, D. Katsaros, and Y. Goeleven, ``Architectural requirements for cloud computing
systems: An enterprise cloud approach,'' J. Grid Comput., vol. 9, no. 1, pp. 326, Mar. 2011.
[7] S. K. Garg, S. Versteeg, and R. Buyya, ``A framework for ranking of cloud computing services,'' Future
Gener. Comput. Syst., vol. 29, no. 4, pp. 10121023, Jun. 2013.
[8] P. Costa, J. P. Santos, and M. M. Da Silva, ``Evaluation criteria for cloud services,'' in Proc. IEEE 6th Int.