Open Access Open Access  Restricted Access Subscription Access

Security Agents for Information Retrieval in an IOT World

Meena Sachdeva

Abstract


As we see that very large no of applications are spread for the distribution of information with networks. With the help of network there are number of problems arises which are already well known by the users of those information systems. Information can be distributed with networks include data consistency, security and network management-problems which are all removed by the new features of network traffic and growth of workloads. Information can also be distributed by multimedia communication. It includes send information by distributed systems in search of information. Now that the internet is accessible on such a big scale, there is an issue with looking for information: massive amounts of data in many formats are potentially available, but it is sometimes difficult. In this paper we describe the current status of automatic information retrieval, in an IoT and for security purposes also describe the software agents dedicated to security aspects.


Keywords


Security agents, Security, Information retrieval, Distributed system, IoT, Information retrieval agent.

Full Text:

PDF

References


Chen S.J., Hwang C.L. (1992): Fuzzy Multiple Attribute Decision Making: Methods and Applications. Springer-Verlag, Berlin.

Chiang K.F., Cheng S.W. (2009): Using Analytic Hierarchy Process Method and Technique for Order Preference by Similarity to Ideal Solution to Evaluate Curriculum in Department of Risk Management and Insurance. “Journal of Social Sciences”, 19(1), pp. 1-8.

Deng J.L. (1982): Control Problems of Grey System. Systems and Control Letters, Vol. 1, No. 5, pp. 288-294.

Deng J.L. (1988): Introduction to Grey System Theory. “Journal of Grey Theory”, Vol. 1, Iss. 1, pp. 1- 24.

Hellwig Z. (1968): ROZWÓJ METOD TAKSONOMICZNYCH I ICH ZASTOSOWAŃ W BADANIACH SPOŁECZNO-EKONOMICZNYCH [Online] Available from https://stat.gov.pl/cps/rde/xbcr/gus/POZ_Rozwoj_metod_taksonomicznych.pdf

Jadidi O., Hong T.S., Firouzi F., Yusuff R.M., Zulkifli N. (2008): TOPSIS and Fuzzy Multi-Objective Model Integration for Supplier Selection Problem. “Journal of Achievements in Materials and Manufacturing Engineering of Achievements in Materials and Manufacturing Engineering”, 31(2), pp.762-769.

Jadidi O., Hong T.S., Firouzi F., Yusuff R.M. (2008): An Optimal Grey Based Approach Based on TOPSIS Concept for Supplier Selection Problem. “International Journal of Management Science and Engineering Management”, Vol. 4, No. 2, pp. 104-117.

Kahraman C. (2008): Fuzzy Multi-Criteria Decision Making. Theory and Application with Recent Development. Optimization and its Applications, Vol. 16, Springer, New York.

Kahraman C., Buyukozkan G., Ates N.Y. (2007): A Two-Phase Multi-Attribute Decision Making Approach for New Products Introduction. “Information Sciences”, 177, pp. 1567-1582. Liu S., Lin Y. (2006): Grey Information. Theory and Practical Applications.

“PrzeglądStatystyczny”, z. 4, pp. 307-327. Hung C.C., Chen L.H. (2009): A Fuzzy TOPSIS Decision Making Model with Entropy Weight under Intuitionistic Fuzzy Environment. Proceedings of the International Multi-Conference of Engineers and Computer Scientists IMECS, Hong Kong.

Jahanshahloo G.R., Lofti F.H., Izadikhah M. (2006a): An Algorithmic Method to Extend TOPSIS for Decision Making Problems with Interval Data. “Applied Mathematics and Computation”, 175, pp. 1375- 1384.

Jahanshahloo G.R., Lofti F.H., Izadikhah M. (2006b): Extension of the TOPSIS Method for Decision-Making Problems with Fuzzy Data. “Applied Mathematics and Computation”, 181, pp. 1544- 1551.

F. Bergadano, A. Puliafito, G. Ruffo and L. Vita, Intelligent agents: A tool for managing and retrieving information in distributed systems, in: proc. oj’AfCA’96 (Associazione Italiana per I’lnformatica ed il Calcolo Automatico, Roma, Italy,1996).

L. Console and M. Fossa, C-Prolog 1.5 plus, interprete C-Prolog esteso coninter process communication, Dipartimento di Informatica, Universita di Torino. 0. Etzioni and D. Weld, Intelligent agents on the intemet: Fact, fiction, and forecast, IEEE Expert lO(4) (1995) 4449.

Finin et al., DRAFT specification of the KQML agent-communication language, The DARPA knowledge Sharing Initiative External Interfaces Working Group, 1993.

L. Hughes, Actdly Use fillnternet Security Techniques (New Riders Publishing, 1995). McGuire, Kuokka, Weber, Tenenbaum, Gruber and Olsen, SHADE: Technology for knowledge-based collaborative engineering, Concurrent Engineering: Research and Applications (1993).

F. Pereira, C-Prolog user’s manual, Version 1.5, University of Edinburgh, Department of Architecture. 1984. Proceedings oj IJCAI-95 Workshop on Agent Architectures (Montreal, Canada,199.5).

W. Stallings, Network and Internetwork Security Principles and Pructice (Prentice Hall, 1995).

C. Toomey and W. Mark, Satellite image dissemination via software agents, IEEE Expert 10(S) (1995) u-50. H. Vaccaro and G. Liepins, Detection of anomalous computer session activity, in: Proc. of thr IEEE Symposium on Research in Security and Priuucy (I 989).

P. Wayner, Agents Unleashed: A Public Domain Look at Agent Technology (AP Professional, 1995).

Hui, H., Zhou, C., Xu, S., & Lin, F. (2020). A novel secure data transmission scheme in industrial Internet of Things[J]. China Communications, 17(1),73-88.

Lin, F., Zhou, Y., An, X., You, I., & Choo, K. K. R. Fair resource allocation in an intrusion-detection system for edge computing: Ensuring the security of Internet of Things devices[C]. IEEE Consumer Electronics Magazine, 2018,7(6),45-50.

Su, J., Lin, F., Zhou, X., & Lu, X. Steiner tree based optimal resource caching scheme in fog computing[J]. China Communications, 2015,12(8),161-168.

Kavitha, V., Vimaladevi, M., & Manavalasundaram, V. K. Intelligent Pest Control Using Internet of Things Design and Future Directions[C]. In Edge Computing and Computational Intelligence Paradigms for the IoT,2019:196-207.




DOI: https://doi.org/10.37591/jons.v9i3.884

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517