GET THE APP

Human Computer Interaction |
..

Open Access

Human Computer Interaction

Research Article

Pages: 1 - 4

Security Issues with IoT for Smart Homes: Blockchain as a Solution

Mohammed I Al-Ghamdi*

DOI:

DOI: 10.37421/2090-4886.2021.10.137

With the increasing use of smart technologies like the Internet of Things, home automation has become the hottest trend these days. It provides all the modern features and convenience that a homeowner can expect. Home appliances can be automated via wireless connectivity and they can be accessible on the go. However, there are so many security concerns with the significant rise of smart home appliances like light bulbs, power switches, door locks, home security, etc., especially because of limited processing power and storage. They are highly vulnerable to security threats. Hence, security has become the primary concern and matter of discussion among researchers in this area. This way, a decentralized database blockchain is gaining a lot of popularity to assure security in this field. This article is aimed to explore the security of smart homes and investigate the adoption of blockchain. This research paper is aimed to explore security measures that manufacturers should consider for IoT systems and the way Blockchain can help solve this problem.

Review Article

Pages: 1 - 5

A Compiler-Aware Framework of Network Pruning and Architecture Search for Mobile Acceleration

Zhengang Li*

DOI:

DOI: 10.37421/2090-4886.2021.10.138

With the increasing demand to efficiently deploy DNNs on mobile edge devices, it becomes much more important to reduce unnecessary computation and increase the execution speed. Prior methods towards this goal, including model compression and network architecture search (NAS), are largely performed independently and do not fully consider compiler-level optimization which is a must-do for mobile acceleration. In this work, we propose NPAS, a compiler-aware unified network pruning and architecture search and the corresponding comprehensive compiler optimizations supporting different DNNs and different pruning schemes, which bridge the gap of weight pruning and NAS. Our framework achieves 6.7 ms, 5.9 ms, and 3.9 ms ImageNet inference times with 78%, 75% (MobileNet-V3 level), and 71% (MobileNet-V2 level) Top-1 accuracy respectively on an off-the-shelf mobile phone, consistently outperforming prior work.

Commentary

Pages: 1 - 1

Advanced Homomorphic Encryption Schemes

Anitha Kumari Kumarasamy* and M. Ananyaa

DOI:

DOI: 10.37421/2090-4886.2021.s2.003

In recent days most of the industrial firms have been searching for ways to keep their data as secured and protected as possible. They have indulged in research works to find a mechanism that can be simple, convenient and guarantees high level security to large amount of data that is being manipulated every now and then. Among such mechanisms, one mechanism that satisfies all these requirements is Homomorphic Encryption (HE). Homomorphic Encryption schemes facilitate computation on the encrypted data, yielding different output every time is considered as an edge over traditional encryption algorithms. HE schemes ensures integrity and security of data, against threats and violations. Researchers expanded the dimensionality of the homomorphic encryption to another level through Carmichael’s Theorem-Based Homomorphic Encryption (CTHE) scheme and Modified Enhanced Homomorphic Encryption (MEHE) scheme. CTHE and MEHE schemes are reviewed in this article to show its robustness against invasive attacks.

Google Scholar citation report
Citations: 343

International Journal of Sensor Networks and Data Communications received 343 citations as per Google Scholar report

International Journal of Sensor Networks and Data Communications peer review process verified at publons

Indexed In

arrow_upward arrow_upward