IoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT data. Implementation of Blockchain can be a potential solution for the security issues in IoT. This review deeply investigates the security threats and issues in IoT which deteriorates the effectiveness of IoT systems. This paper presents a perceptible description of the security threats, Blockchain based solutions, security characteristics and challenges introduced during the integration of Blockchain with IoT. An analysis of different consensus protocols, existing security techniques and evaluation parameters are discussed in brief. In addition, the paper also outlines the open issues and highlights possible research opportunities which can be beneficial for future research.
{"title":"A review of IoT security and privacy using decentralized blockchain techniques","authors":"Vinay Gugueoth , Sunitha Safavat , Sachin Shetty , Danda Rawat","doi":"10.1016/j.cosrev.2023.100585","DOIUrl":"10.1016/j.cosrev.2023.100585","url":null,"abstract":"<div><p>IoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT data. Implementation of Blockchain can be a potential solution for the security issues in IoT. This review deeply investigates the security threats and issues in IoT which deteriorates the effectiveness of IoT systems. This paper presents a perceptible description of the security threats, Blockchain based solutions, security characteristics and challenges introduced during the integration of Blockchain with IoT. An analysis of different consensus protocols, existing security techniques and evaluation parameters are discussed in brief. In addition, the paper also outlines the open issues and highlights possible research opportunities which can be beneficial for future research.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42243609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.cosrev.2023.100583
Sweta Singh , Rakesh Kumar , Dayashankar Singh
Cloud computing has evolved as a new paradigm in Internet computing, offering services to the end-users and large-organizations, on-demand and pay-per-the-usage basis with high availability, elasticity, scalability and resiliency. In order to improve the performance of the Cloud system, handling multiple heterogeneous tasks concurrently, an appropriate task scheduler is required. To meet the user’s requirements in terms of Quality of Service (QoS) parameters, the task scheduling algorithm should identify the order in which tasks should be executed. Energy efficiency is the significant challenge in today’s task scheduling to meet the prerequisite for green computing. By increasing resource utilization at the data centers, virtual machine (VM) Consolidation is also recognized as the most widely used and promising approach in terms of energy consumption and system performance. However, excessive VM Consolidation could constitute a violation of the Service Level Agreement (SLA). The paper makes a contribution by outlining the numerous approaches that researchers have used thus far to achieve the goals of scheduling and VM Consolidation, assuring energy efficiency, and maintaining system performance. This would give readers a better understanding of the problems and the potential for improvement while assisting them in selecting the ideal scheduling algorithm with Consolidation technique. Additionally, the techniques are divided into three categories: those that primarily focus on task scheduling; those that target Consolidation; and complete computation, integrating task scheduling with VM Consolidation. Further classification for the scheduling algorithms include heuristic, meta-heuristic, greedy, and hybrid task scheduling algorithms. In addition to a summary of the benefits and drawbacks of the suggested algorithms, prospective research directions and recent developments in this area is also covered in this paper.
云计算已经发展成为互联网计算中的一种新范式,为最终用户和大型组织提供服务,按需和按使用付费,具有高可用性、弹性、可伸缩性和弹性。为了提高云系统的性能,并发处理多个异构任务,需要一个合适的任务调度器。为了满足用户对QoS (Quality of Service)参数的要求,任务调度算法需要确定任务执行的顺序。能源效率是当前任务调度面临的重大挑战,是实现绿色计算的前提。通过提高数据中心的资源利用率,虚拟机(VM)整合也被认为是在能耗和系统性能方面使用最广泛和最有前途的方法。但是,过多的VM整合可能会违反服务水平协议(SLA)。本文通过概述研究人员迄今为止使用的许多方法来实现调度和VM整合,确保能源效率和维护系统性能的目标,从而做出贡献。这将使读者更好地理解问题和改进的潜力,同时帮助他们选择理想的调度算法与整合技术。此外,这些技术分为三类:主要关注任务调度的技术;以整合为目标的;完成计算,将任务调度与VM整合在一起。调度算法的进一步分类包括启发式、元启发式、贪心和混合任务调度算法。除了总结所建议算法的优点和缺点外,本文还涵盖了该领域的前瞻性研究方向和最新发展。
{"title":"An empirical investigation of task scheduling and VM consolidation schemes in cloud environment","authors":"Sweta Singh , Rakesh Kumar , Dayashankar Singh","doi":"10.1016/j.cosrev.2023.100583","DOIUrl":"10.1016/j.cosrev.2023.100583","url":null,"abstract":"<div><p><span><span>Cloud computing has evolved as a new paradigm in Internet computing, offering services to the end-users and large-organizations, on-demand and pay-per-the-usage basis with high availability, elasticity, scalability and resiliency. In order to improve the performance of the </span>Cloud system, handling multiple heterogeneous tasks concurrently, an appropriate task scheduler is required. To meet the user’s requirements in terms of Quality of Service (QoS) parameters, the task </span>scheduling algorithm<span><span> should identify the order in which tasks should be executed. Energy efficiency is the significant challenge in today’s task scheduling to meet the prerequisite for green computing. By increasing resource utilization at the </span>data centers, virtual machine (VM) Consolidation is also recognized as the most widely used and promising approach in terms of energy consumption and system performance. However, excessive VM Consolidation could constitute a violation of the Service Level Agreement (SLA). The paper makes a contribution by outlining the numerous approaches that researchers have used thus far to achieve the goals of scheduling and VM Consolidation, assuring energy efficiency, and maintaining system performance. This would give readers a better understanding of the problems and the potential for improvement while assisting them in selecting the ideal scheduling algorithm with Consolidation technique. Additionally, the techniques are divided into three categories: those that primarily focus on task scheduling; those that target Consolidation; and complete computation, integrating task scheduling with VM Consolidation. Further classification for the scheduling algorithms include heuristic, meta-heuristic, greedy, and hybrid task scheduling algorithms. In addition to a summary of the benefits and drawbacks of the suggested algorithms, prospective research directions and recent developments in this area is also covered in this paper.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47118855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyperspectral imaging (HSI) is a powerful tool that can capture and analyze a range of spectral bands, providing unparalleled levels of precision and accuracy in data analysis. Another technology gaining popularity in many industries is Autoencoders (AE). AE uses advanced deep learning algorithms for encoding and decoding data, leading to highly precise and efficient neural network-based models. Within the domain of HSI, AE emerges as a potent approach to tackle the essential hurdles associated with data analysis and feature extraction. Combining both HSI and AE (HSI – AE) can lead to a revolution in various industries, including but not limited to healthcare and environmental monitoring, because of more efficient analysis approaches and decision-making. AE can be used to discover hidden patterns and insights in large-scale datasets, allowing researchers to make more informed decisions based on much better predictions. Similarly, HSI can benefit from the scalability and flexibility AE offers, leading to faster and more efficient data processing. This article aims to provide a comprehensive review of the integration of HSI - AE, covering the history and background knowledge, motivation, and combined benefits of HSI and AE. It examines the applicability of HSI-AE in many use-case domains, such as classification, hyperspectral unmixing, and anomaly detection. It also provides a hyperparameter tuning and an in-depth survey of their use. The article emphasizes crucial areas for future exploration, such as conducting further research to enhance AE’s performance in HSI applications and devising novel algorithms to overcome the distinctive challenges presented by HSI data. Overall, the culmination of the HSI with AE can be seen as offering a promising solution for challenges like data analysis management and pattern recognition, enabling accurate and efficient decision-making across industries.
{"title":"Integration of hyperspectral imaging and autoencoders: Benefits, applications, hyperparameter tunning and challenges","authors":"Garima Jaiswal , Ritu Rani , Harshita Mangotra , Arun Sharma","doi":"10.1016/j.cosrev.2023.100584","DOIUrl":"10.1016/j.cosrev.2023.100584","url":null,"abstract":"<div><p><span>Hyperspectral imaging (HSI) is a powerful tool that can capture and analyze a range of spectral bands, providing unparalleled levels of precision and accuracy in data analysis. Another technology gaining popularity in many industries is </span>Autoencoders<span> (AE). AE uses advanced deep learning algorithms<span><span> for encoding and decoding data, leading to highly precise and efficient neural network-based models. Within the domain of HSI, AE emerges as a potent approach to tackle the essential hurdles associated with data analysis and feature extraction. Combining both HSI and AE (HSI – AE) can lead to a revolution in various industries, including but not limited to healthcare and environmental monitoring, because of more efficient analysis approaches and decision-making. AE can be used to discover hidden patterns and insights in large-scale datasets, allowing researchers to make more informed decisions based on much better predictions. Similarly, HSI can benefit from the scalability and flexibility AE offers, leading to faster and more efficient data processing. This article aims to provide a comprehensive review of the integration of HSI - AE, covering the history and background knowledge, motivation, and combined benefits of HSI and AE. It examines the applicability of HSI-AE in many use-case domains, such as classification, hyperspectral </span>unmixing<span>, and anomaly detection. It also provides a hyperparameter tuning and an in-depth survey of their use. The article emphasizes crucial areas for future exploration, such as conducting further research to enhance AE’s performance in HSI applications and devising novel algorithms to overcome the distinctive challenges presented by HSI data. Overall, the culmination of the HSI with AE can be seen as offering a promising solution for challenges like data analysis management and pattern recognition, enabling accurate and efficient decision-making across industries.</span></span></span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48705588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-25DOI: 10.1016/j.cosrev.2023.100586
Seçkin Yılmaz , Vasif V. Nabiyev
Solving puzzle problems using computer-aided methods is becoming more common with applications in forensic science, restoration, banking system, and multimedia. However, only a few surveys have been published on this topic, the most recent being more than a decade old. The scope of 2D puzzle problems is extensive, and the number of computer-aided methods has increased in recent years. In this paper, we have presented a comprehensive survey to pave a roadmap for researchers dealing with puzzle problems. This study classifies 2D puzzle problems in a novel way, considering many examples such as dissection, combinatorial and double-sided puzzles and reclassifies computer-aided methods to cover the studies carried out in recent years. Various strategies (pre-grouping and global consistency approach) have been investigated to solve the puzzle problem effectively. The computer-aided methods have been examined deeply, including many recent methods related to squared jigsaw puzzles, torn photographs, banknotes, and fragmented documents, and they are compared to each other. In addition, new topics such as combining mosaic pieces and Islamic architectural motif puzzle problems have been proposed to the interest of researchers. In conclusion, our study shows many research opportunities that are not yet solved by any computer-aided method.
{"title":"Comprehensive survey of the solving puzzle problems","authors":"Seçkin Yılmaz , Vasif V. Nabiyev","doi":"10.1016/j.cosrev.2023.100586","DOIUrl":"10.1016/j.cosrev.2023.100586","url":null,"abstract":"<div><p>Solving puzzle problems using computer-aided methods is becoming more common with applications in forensic science, restoration, banking system, and multimedia. However, only a few surveys have been published on this topic, the most recent being more than a decade old. The scope of 2D puzzle problems is extensive, and the number of computer-aided methods has increased in recent years. In this paper, we have presented a comprehensive survey to pave a roadmap for researchers dealing with puzzle problems. This study classifies 2D puzzle problems in a novel way, considering many examples such as dissection, combinatorial and double-sided puzzles and reclassifies computer-aided methods to cover the studies carried out in recent years. Various strategies (pre-grouping and global consistency approach) have been investigated to solve the puzzle problem effectively. The computer-aided methods have been examined deeply, including many recent methods related to squared jigsaw puzzles, torn photographs, banknotes, and fragmented documents, and they are compared to each other. In addition, new topics such as combining mosaic pieces and Islamic architectural motif puzzle problems have been proposed to the interest of researchers. In conclusion, our study shows many research opportunities that are not yet solved by any computer-aided method.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42925912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-16DOI: 10.1016/j.cosrev.2023.100575
Mohammad Hossein Tabatabaei, Roman Vitenberg, Narasimha Raghavan Veeraragavan
The explosive advent of the blockchain technology has led to hundreds of blockchain systems in the industry, thousands of academic papers published over the last few years, and an even larger number of new initiatives and projects. Despite the emerging consolidation efforts, the area remains highly turbulent without systematization, educational materials, or cross-system comparative analysis.
In this paper, we provide a systematic and comprehensive study of four popular yet widely different blockchain systems: Bitcoin, Ethereum, Hyperledger Fabric, and IOTA. The study is presented as a cross-system comparison, which is organized by clearly identified aspects: definitions, roles of the participants, entities, and the characteristics and design of each of the commonly used layers in the cross-system blockchain architecture. Our exploration goes deeper compared to what is currently available in academic surveys and tutorials. For example, we provide the first extensive coverage of the storage layer in Ethereum and the most comprehensive explanation of the consensus protocol in IOTA. The exposition is due to the consolidation of fragmented information gathered from white and yellow papers, academic publications, blogs, developer documentation, communication with the developers, as well as additional analysis gleaned from the source code. We hope that this survey will help the readers gain in-depth understanding of the design principles behind blockchain systems and contribute towards systematization of the area.
{"title":"Understanding blockchain: Definitions, architecture, design, and system comparison","authors":"Mohammad Hossein Tabatabaei, Roman Vitenberg, Narasimha Raghavan Veeraragavan","doi":"10.1016/j.cosrev.2023.100575","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100575","url":null,"abstract":"<div><p>The explosive advent of the blockchain technology has led to hundreds of blockchain systems in the industry, thousands of academic papers published over the last few years, and an even larger number of new initiatives and projects. Despite the emerging consolidation efforts, the area remains highly turbulent without systematization, educational materials, or cross-system comparative analysis.</p><p>In this paper, we provide a systematic and comprehensive study of four popular yet widely different blockchain systems: Bitcoin<span>, Ethereum, Hyperledger Fabric, and IOTA. The study is presented as a cross-system comparison, which is organized by clearly identified aspects: definitions, roles of the participants, entities, and the characteristics and design of each of the commonly used layers in the cross-system blockchain architecture. Our exploration goes deeper compared to what is currently available in academic surveys and tutorials. For example, we provide the first extensive coverage of the storage layer in Ethereum and the most comprehensive explanation of the consensus protocol in IOTA. The exposition is due to the consolidation of fragmented information gathered from white and yellow papers, academic publications, blogs, developer documentation, communication with the developers, as well as additional analysis gleaned from the source code. We hope that this survey will help the readers gain in-depth understanding of the design principles behind blockchain systems and contribute towards systematization of the area.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.1016/j.cosrev.2023.100573
Panagiotis Bountakas, Apostolis Zarras, A. Lekidis, C. Xenakis
{"title":"Defense strategies for Adversarial Machine Learning: A survey","authors":"Panagiotis Bountakas, Apostolis Zarras, A. Lekidis, C. Xenakis","doi":"10.1016/j.cosrev.2023.100573","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100573","url":null,"abstract":"","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54128374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.1016/j.cosrev.2023.100559
Maha Nssibi , Ghaith Manita , Ouajdi Korbaa
The main objective of feature selection is to improve learning performance by selecting concise and informative feature subsets, which presents a challenging task for machine learning or pattern recognition applications due to the large and complex search space involved. This paper provides an in-depth examination of nature-inspired metaheuristic methods for the feature selection problem, with a focus on representation and search algorithms, as they have drawn significant interest from the feature selection community due to their potential for global search and simplicity. An analysis of various advanced approach types, along with their advantages and disadvantages, is presented in this study, with the goal of highlighting important issues and unanswered questions in the literature. The article provides advice for conducting future research more effectively to benefit this field of study, including guidance on identifying appropriate approaches to use in different scenarios.
{"title":"Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey","authors":"Maha Nssibi , Ghaith Manita , Ouajdi Korbaa","doi":"10.1016/j.cosrev.2023.100559","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100559","url":null,"abstract":"<div><p>The main objective of feature selection is to improve learning performance by selecting concise and informative feature subsets, which presents a challenging task for machine learning<span> or pattern recognition applications due to the large and complex search space involved. This paper provides an in-depth examination of nature-inspired metaheuristic methods for the feature selection problem, with a focus on representation and search algorithms, as they have drawn significant interest from the feature selection community due to their potential for global search and simplicity. An analysis of various advanced approach types, along with their advantages and disadvantages, is presented in this study, with the goal of highlighting important issues and unanswered questions in the literature. The article provides advice for conducting future research more effectively to benefit this field of study, including guidance on identifying appropriate approaches to use in different scenarios.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The wealth of unstructured text on the online web portal has made opinion mining the most thrust area for researchers, academicians, and businesses to extract information for gathering, analyzing, and aggregating human emotions. The extraction of public sentiment from the text at an aspect level has contributed exceptionally to various businesses in the marketplace. In recent times, deep learning-based techniques have learned high-level linguistic features without high-level feature engineering. Therefore, this paper focuses on a rigorous survey on two primary subtasks, aspect extraction and aspect category detection of aspect-based sentiment analysis (ABSA) methods based on deep learning. The significant advancement in the ABSA sector is demonstrated by a thorough evaluation of state-of-the-art and latest aspect extraction methodologies.
{"title":"Aspect based sentiment analysis using deep learning approaches: A survey","authors":"Ganpat Singh Chauhan , Ravi Nahta , Yogesh Kumar Meena , Dinesh Gopalani","doi":"10.1016/j.cosrev.2023.100576","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100576","url":null,"abstract":"<div><p>The wealth of unstructured text on the online web portal has made opinion mining<span> the most thrust area for researchers, academicians, and businesses to extract information for gathering, analyzing, and aggregating human emotions. The extraction of public sentiment from the text at an aspect level has contributed exceptionally to various businesses in the marketplace. In recent times, deep learning-based techniques have learned high-level linguistic features without high-level feature engineering. Therefore, this paper focuses on a rigorous survey on two primary subtasks, aspect extraction and aspect category detection of aspect-based sentiment analysis (ABSA) methods based on deep learning. The significant advancement in the ABSA sector is demonstrated by a thorough evaluation of state-of-the-art and latest aspect extraction methodologies.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49737724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.1016/j.cosrev.2023.100569
Vikas Tyagi, Samayveer Singh
Wireless technologies usually have very limited computing, memory, and battery power that require the optimal management of network resources to increase network performance. The optimization of these network resources provides an efficient network topology, traffic control, routing, and data aggregation. This study presents a qualitative and quantitative investigation to evaluate the efficient network resource management mechanisms for software defined wireless sensor networks (SDN-enabled WSNs) from the beginning of network design to reliable data delivery. In this paper, a taxonomy of network resource management research studies is proposed. A detailed analysis of SDN-enabled WSNs architecture, SDN controllers, topology discovery, routing approaches, flow rules installation, and data aggregation is also discussed. Furthermore, the comparative analysis of resource provisioning methods along with various simulation tools is presented. Moreover, this review outlines open research challenges and prospective future directions for network resource management in SDN-enabled WSNs.
{"title":"Network resource management mechanisms in SDN enabled WSNs: A comprehensive review","authors":"Vikas Tyagi, Samayveer Singh","doi":"10.1016/j.cosrev.2023.100569","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100569","url":null,"abstract":"<div><p>Wireless technologies<span> usually have very limited computing, memory, and battery power that require the optimal management of network resources to increase network performance. The optimization of these network resources provides an efficient network topology<span><span>, traffic control, routing, and data aggregation. This study presents a qualitative and quantitative investigation to evaluate the efficient network resource management mechanisms for software defined </span>wireless sensor networks<span><span> (SDN-enabled WSNs) from the beginning of network design to reliable data delivery. In this paper, a taxonomy of network resource management research studies is proposed. A detailed analysis of SDN-enabled WSNs architecture, SDN controllers, topology discovery, routing approaches, flow rules installation, and data aggregation is also discussed. Furthermore, the comparative analysis of </span>resource provisioning methods along with various simulation tools is presented. Moreover, this review outlines open research challenges and prospective future directions for network resource management in SDN-enabled WSNs.</span></span></span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}