Yazar "Alaidaros, H." seçeneğine göre listele
Listeleniyor 1 - 2 / 2
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Caching Strategies for the Metaverse: Taxonomy, Open Challenges, and Future Research Directions(International Federation of Engineering Education Societies (IFEES), 2024) Mohammed, A.H.; Alaidaros, H.; Salleh, F.; Sajat, M.S.; Ramaha, N.; Habbal, A.The metaverse, which is considered to be the next evolutionary stage of the Internet, has captured the attention of both academia and industry. Its primary goal is to establish a shared 3D virtual space that interconnects all virtual worlds through the Internet. In this shared space, users are represented as digital avatars, enabling them to communicate, interact with each other, and engage with the virtual environment as if they were in the physical world. However, realizing the full potential of the metaverse poses significant challenges, such as the requirement for higher throughput compared to current social VR platforms and the need to minimize latency to just a few milliseconds to uphold a truly immersive user experience. Caching is a critical aspect of optimizing data access on the current Internet, and it is equally crucial for addressing similar challenges in Web 3.0 and the metaverse. This paper explores different caching strategies suggested to address these challenges on the current Internet and assesses their potential relevance to the metaverse. Caching strategies are categorized into three groups: web caching, mobile caching, and Internet of Things (IoT) caching. Recent solu-tions are then examined to determine their relevance to the metaverse. Finally, the paper discusses open research challenges and potential future research directions in this domain. © 2024 by the authors of this article.Öğe Internet of Things: Security, Issues, Threats, and Assessment of Different Cryptographic Technologies(Engineering and Technology Publishing, 2024) Raeisi-Varzaneh, M.; Dakkak, O.; Alaidaros, H.; Avci, I.As a network of objects, data, and the Internet, the Internet of Things can be characterized as a collection of interconnected devices. In the context of the Internet of Things, a thing refers to any object, such as a sensor, that forms a network and can transfer data with other devices. This interconnection of devices leads to the convergence of physical and digital domains, thereby enabling time optimization, cost reduction, and enhanced efficiency in human labor. The Internet of Things enables data exchange to monitor and control interconnected devices, manufacturers and operators. A discernible transition from non-IoT to IoT devices has been evident over the past decade. Projections indicate that by 2030, approximately 75% of all devices will be integrated into the IoT. Consequently, these devices generate a substantial influx of data, commonly called Big Data. Unlike traditional computing systems, IoT devices operate in diverse, often resource-constrained environments, making them susceptible to weak authentication, insecure communication, physical vulnerabilities, data privacy risks, DoS attacks, malware propagation, and interoperability issues. These concerns can lead to data breaches, unauthorized access, and system disruptions. Cryptography offers an efficacious means of bidirectional data transmission that can enhance the security of IoT devices and the data they transmit and store, employing authentication and key management, encryption, message integrity and authentication, and Post-Quantum cryptography. This manuscript comprehensively examines the security predicaments of the Internet of Things and illustrates the effectiveness of cryptographic methodologies in ameliorating these concerns. This research not only contributes to a comprehensive understanding of existing cryptographic techniques in IoT security but also offers a forward-looking perspective that can guide future research efforts and inform practical implementations. © 2024 by the authors.