A Hybrid Routing Protocol Towards Secure and Smart Military Applications in Cloud Environments

A Hybrid Routing Protocol Towards Secure and Smart Military Applications in Cloud Environments

M. Hemanth Chakravarthy, E. Kannan, M. J. Carmel Mary Belinda
Copyright: © 2019 |Pages: 15
DOI: 10.4018/978-1-5225-9023-1.ch014
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Having understood the strategic significance of the flourishing cloud idea, enterprises across the globe are keenly strategizing and executing to embark on the cloud journey with all the clarity and confidence. There are product vendors bringing forth additional capabilities to easily and quickly setup and sustain competent cloud environments, which are being positioned as the one-stop IT solution for worldwide business organizations. The business domains such as governments, retail stores, healthcare providers, telecommunication service providers, supply chain and logistics, utilities, homeland security, etc. are keenly embracing the cloud idea to be ahead of their competitors in their operations, outputs, and offerings. However, there are some critical challenges and concerns being associated with the cloud paradigm. The widely quoted non-functional requirements (NFRs) and the quality of service (QoS) attributes such as security, performance, reliability, modifiability, and availability have to be fulfilled by cloud software, platform and infrastructures in order to boost the confidence level of business executives and institutions. There are mission-critical and emergency services, which are finding their residence in cloud environments (private, public, and hybrid). Their requirements are quite unique and hence researchers across the globe are striving hard and stretching further to bring forth innovative, disruptive, and transformation technology solutions to fulfill the various needs. This chapter proposes a cloud-based network architecture that contributes a consistent and ubiquitous internet connection. The mesh topology is recommended here to ensure that the connectivity is available all the time without any fail and slowdown. The security of data when it gets transmitted over channels, persisted in data stores, and used by applications, has to be ensured in order to boost the confidence of data owners and users. Hence, this chapter proposes a secure cloud-based heterogeneous network using a novel routing protocol.
Chapter Preview
Top

Introduction

The IoT era is upon us. Enterprises, governments, institutions and organizations are keen to embrace this paradigm in order to be right and relevant to their constituents, clients, consumers and customers. The newness of the various offerings being produced and supplied by business houses is being accomplished through the smart leverage of the various advancements happening in the IoT space. Product vendors, independent software vendors (ISVs), information technology (IT) companies, enterprising businesses, research labs, academic institutions, individuals and innovators are constantly pumping their contributions in order to boost the confidence of people in using this paradigm, which is sweeping the entire world. Not only businesses but also people are being directly and decisively impacted by the power of this new idea. This chapter is specially prepared and presented in order to tell all about the improvisations and innovations in the IT landscape. The figure below clearly articulates some of the key problems in various industries such as banking insurance, public sector and healthcare.

Figure 1.

­

978-1-5225-9023-1.ch014.f01

The IoT Data Analytics Use Cases

Having realized the significance of the IoT paradigm in solving some of the crucial issues, there are renewed focuses on IoT. Thereby, IoT data, these days, gets consciously collected, cleansed and crunched in order to solve some of the real-world industry problems as articulated below.

Figure 2.

­

978-1-5225-9023-1.ch014.f02
  • Medical Fraud: Discovers fraud during provider, beneficiary and internal employee profiling using IBM's Fraud Asset Management System (FAMS)

  • Insurance Claim Fraud: Enables insurers to detect suspicious activity for claims submitted by vendors, brokers and individuals using IBM’s Loss Analysis and Warning System (LAWS)

  • Public Tax Fraud: Empowers governments to address tax gaps by uncovering tax evasion activities and filing inaccuracies using IBM’s Tax and Audit Compliance System (TACS)

  • Occupational Fraud: Helps organizations discover fraud for accounts payable, travel and expense claims, and other fraud committed by employees

Figure 3.

­

978-1-5225-9023-1.ch014.f03

Thus, several industry verticals are keenly adopting path-breaking technologies in order to be in the limelight. The next section throws some light on the role and responsibility of the IoT idea in surmounting the major challenges of establishing and experiencing smarter cities.

Complete Chapter List

Search this Book:
Reset