Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Bulletin of Electrical Engineering and Informatics

The scheduling techniques in the Hadoop and Spark of smart cities environment: a systematic review Mirza, Nada Massed; Ali, Adnan; Ishak, Mohamad Khairi
Bulletin of Electrical Engineering and Informatics Vol 13, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i1.5841

Abstract

Processing extensive and diverse data in real-time is a significant challenge in the context of smart cities. Timely access to information and efficient analytics is essential for smart city services to make data-driven decisions and enhance urban living. Scheduling algorithms play a crucial role in ensuring the prompt delivery of services and efficient task completion. This paper explores various scheduling techniques, including static, dynamic, and hybrid schedulers, and compares their objectives and performance. Additionally, the study examines two prominent data processing frameworks, Hadoop and Spark, and compares their capabilities in handling big data in smart cities. With its ability to process large amounts of data quickly and efficiently, Spark has shown superiority over Hadoop in real-time data processing and performance optimization. The paper concludes by highlighting the strengths and limitations of each framework. It discusses the need for further research in optimizing scheduling techniques and exploring hybrid artificial intelligence scheduling for Spark. Overall, the findings contribute to a better understanding of data processing in real-time and provide insights for researchers and practitioners in smart cities.
Securing IoT edge device communication with efficient ECC middleware for resource-constrained systems Mohamed Yusoff, Zainatul Yushaniza; Ishak, Mohamad Khairi; AB Rahim, Lukman
Bulletin of Electrical Engineering and Informatics Vol 13, No 6: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i6.7602

Abstract

The internet of things (IoT) rapidly grows into various parts of life. However, it has significant obstacles during setup and deployment, particularly in terms of network segmentation, administration, and security at all tiers, from physical to application. While IoT provides several advanced features and benefits, it is also vulnerable to security threats and flaws that must be thoroughly investigated to avoid misuse. Cryptographic approaches are routinely used to address these security concerns. Message queuing telemetry transport (MQTT), an application layer protocol, is vulnerable to various known and undisclosed security flaws. Integrating encryption techniques within the MQTT protocol to provide secure data flow is a potential strategy for increasing security. This study provides a middleware broker that improves authentication processes, securing connections between cloud servers and resource-constrained devices. Using a Java Servlet and the elliptic curve cryptography (ECC) technique, the study creates a system for creating encrypted identification keys within a web-based transaction framework. This system intends to provide asymmetric authentication that is energy and resource-efficient, with a focus on cost minimization. It also includes a security feature to protect users from common internet threats. The system's efficacy, including its low energy usage of only 4 mJ per device, is thoroughly tested, proving it meets the original protocol criteria.