Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

I want you to Read intensively at least 10 papers and give me a summary for ever

ID: 666830 • Letter: I

Question

I want you to Read intensively at least 10 papers and give me a summary for every paper and the linghth for each paper is 2 pages or more. In the summary, you need to provide some of your own ideas.

Research Interests, Privacy-Aware Computing,Wireless and Mobile Security, Fog Computing, Mobile Health and Safety,Cognitive Radio Networking,Algorithm Design and Analysis.


You should select papers from the following conferences:

IEEE INFOCOM, IEEE Symposium on security and privacy, ACM CCS, USENIX Security.

Explanation / Answer

1. Fog Computing :

Fog computing or fog networking, also known as Fogging, is an architecture that uses one or a collaborative multitude of end-user clients or near-user edge devices to carry out a substantial amount of storage (rather than stored primarily in cloud data centers), communication (rather than routed over the internet backbone), and control, configuration, measurement and management (rather than controlled primarily by network gateways such as those in LTE(Telecommunicayion core).

Fog Networking supports the Internet of Everything (IoE), in which most of the devices that we use on a daily basis will be connected to each other. Examples include our phones, wearable health monitoring devices, connected vehicle and augmented reality using devices such as the Google Glass.

ISO/IEC 20248 provides a method whereby the data of objects identified by Edge computing using Automated Identification Data Carriers [AIDC], a barcode and/or RFID tag, can be read, interpreted, verified and made available into the "Fog" and on the "Edge" even when the AIDC tag has moved on.

2. Privacy - aware Computing:

PASA (Privacy-Aware Security Algorithm) for cloud environment which includes the three different security schemes to achieve the objective of maximizing the data owners control in managing the privacy mechanisms or aspects that are followed during storage, Processing and accessing of different Privacy categorized data. The Performance analysis shows that the proposed algorithm is highly Efficient, Secure and Privacy aware for cloud environment.

Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits. However, wireless networking is prone to some security issues.[1] Hackers have found wireless networks relatively easy to break into, and even use wireless technology to hack into wired networks.As a result, it is very important that enterprises define effective wireless security policies that guard against unauthorized access to important resources.Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion Detection Systems (WIDS) are commonly used to enforce wireless security policies.

3. Mobile and Wireless Security:

Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is a notoriously weak security standard. The password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP is an old IEEE 802.11 standard from 1999, which was outdated in 2003 by WPA, or Wi-Fi Protected Access. WPA was a quick alternative to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP.

4. Cognitive Radio Networking:

A cognitive radio is an intelligent radio that can be programmed and configured dynamically. Its transceiver is designed to use the best wireless channels in its vicinity. Such a radio automatically detects available channels in wireless spectrum, then accordingly changes its transmission or reception parameters to allow more concurrent wireless communications in a given spectrum band at one location. This process is a form of dynamic spectrum management.

n response to the operator's commands, the cognitive engine is capable of configuring radio-system parameters. These parameters include "waveform, protocol, operating frequency, and networking". This functions as an autonomous unit in the communications environment, exchanging information about the environment with the networks it accesses and other cognitive radios (CRs). A CR "monitors its own performance continuously", in addition to "reading the radio's outputs"; it then uses this information to "determine the RF environment, channel conditions, link performance, etc.", and adjusts the "radio's settings to deliver the required quality of service subject to an appropriate combination of user requirements, operational limitations, and regulatory constraints".

Some "smart radio" proposals combine wireless mesh network—dynamically changing the path messages take between two given nodes using cooperative diversity; cognitive radio—dynamically changing the frequency band used by messages between two consecutive nodes on the path; and software-defined radio—dynamically changing the protocol used by message between two consecutive nodes.

5. Mobile Health and Safety:

he effect of mobile phone radiation on human health is a subject of interest and study worldwide, as a result of the enormous increase in mobile phone usage throughout the world. As of November 2011, there were more than 6 billion subscriptions worldwide. Mobile phones use electromagnetic radiation in the microwave range. Other digital wireless systems, such as data communication networks, produce similar radiation.

In 2011, International Agency for Research on Cancer (IARC) classified mobile phone radiation as Group 2B - possibly carcinogenic (not Group 2A - probably carcinogenic - nor the dangerous Group 1). That means that there "could be some risk" of carcinogenicity, so additional research into the long-term, heavy use of mobile phones needs to be conducted.The WHO added in June 2011 that "to date, no adverse health effects have been established as being caused by mobile phone use",a point they reiterated in October 2014. Some national radiation advisory authorities have recommended measures to minimize exposure to their citizens as a precautionary approach.

This is all from my side.

Thanks.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote