Claim Missing Document
Check
Articles

Found 2 Documents
Search

Low-Latency Edge Computing for Real-Time Applications in Wireless Sensor Networks Mishra, Awakash; Rathour, Abhinav; Raju, Dheeravath; Patil, Shashikant; Muthiah, M.A.; Patra, Bichitrananda; Kalidhas, Aravindan Munusamy
International Journal of Engineering, Science and Information Technology Vol 5, No 1 (2025)
Publisher : Malikussaleh University, Aceh, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52088/ijesty.v5i1.1490

Abstract

Real-time data processing with Edge Computing, such as Low Latency Edge Computing (LLEC), allows for functioning at the network boundary or edge, which enhances responsiveness and reduces latency in WSNs. This approach is helpful for most time-critical needs in innovative city applications, healthcare, industrial automation, and other areas where prompt actions are crucial. In contrast to conventional cloud models, LLEC processes data at the collection site to reduce the transmission time, improving bandwidth efficiency. Moreover, LLEC increases the height of scalable walls and energy efficiency by shifting the computational burden to the edge nodes. This document focuses on the most critical problems in WSNs, such as restricted resources, limited scalability, and security issues. We offer a distributed edge framework with real-time processing features and minimal security protocols to address these gaps. Localized computation at cluster heads diminishes network congestion while prolonging sensor life. This paper presents multiple case studies demonstrating LLEC's effectiveness in practical applications. Finally, the paper discusses the widening scope of research and the importance of LLEC in future distributed systems.
Security Challenges and Countermeasures in Next-Generation Wireless Networks Manjunath, Honganur Raju; Yadav, Aditya; Sarpal, Sumeet Singh; Mounika, Nagireddy; Patil, Shashikant; Nandhitha, N.M.; Behera, Santosh Ku.
International Journal of Engineering, Science and Information Technology Vol 5, No 2 (2025)
Publisher : Malikussaleh University, Aceh, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52088/ijesty.v5i2.1492

Abstract

The prospects of new-age wireless networks, such as 5G and 6G technologies, include unrivalled speed, connectivity, and integration of multifarious devices. However, their sophisticated architecture— which encompasses network slicing, edge computing, massive IoT, and software-defined networking—creates even greater challenges in network security. These vulnerabilities could be exploited to launch advanced attacks such as Distributed Denial of Service (DDoS) attacks, eavesdropping, spoofing, or data manipulation. This study aims to explore the evolving threat landscape for next-generation wireless networks while reviewing both existing and emerging strategic solutions. Some of the counter-surveillance technologies incorporated include AI-based Intrusion Detection Systems, Trust Frameworks on Blockchain, strong cryptography, and credential-less authentication. Addressing the challenge of dynamic threat capabilities paired with innovative defences allows this research to propose concepts for the next resilient and secure wireless communication systems.