Revolutionary Applications of Blockchain Enabled Privacy and Access Control 1st Edition Surjit Singh 2024 Scribd Download
Revolutionary Applications of Blockchain Enabled Privacy and Access Control 1st Edition Surjit Singh 2024 Scribd Download
Revolutionary Applications of Blockchain Enabled Privacy and Access Control 1st Edition Surjit Singh 2024 Scribd Download
com
https://ebookname.com/product/revolutionary-applications-of-
blockchain-enabled-privacy-and-access-control-1st-edition-
surjit-singh/
OR CLICK BUTTON
DOWNLOAD EBOOK
https://ebookname.com/product/take-control-of-your-online-privacy-
second-edition-kissell/
ebookname.com
https://ebookname.com/product/blockchain-applications-in-healthcare-
innovations-and-practices-volume-1-1st-edition-tanupriya-choudhury/
ebookname.com
https://ebookname.com/product/role-based-access-control-second-
edition-david-f-ferraiolo/
ebookname.com
https://ebookname.com/product/media-literacy-keys-to-interpreting-
media-messages-4th-edition-art-silverblatt/
ebookname.com
Empire of Ancient Greece Jean Kinney Williams
https://ebookname.com/product/empire-of-ancient-greece-jean-kinney-
williams/
ebookname.com
https://ebookname.com/product/holistic-nursing-a-handbook-for-
practice-4th-edition-barbara-montgomery-dossey/
ebookname.com
https://ebookname.com/product/essential-reproduction-7th-edition-m-h-
johnson/
ebookname.com
https://ebookname.com/product/handbook-of-energy-audits-sixth-edition-
albert-thumann/
ebookname.com
https://ebookname.com/product/radar-systems-analysis-and-design-using-
matlab-3ed-edition-bassem-r-mahafza/
ebookname.com
Don t Waste Your Life Study Guide John Piper
https://ebookname.com/product/don-t-waste-your-life-study-guide-john-
piper/
ebookname.com
Revolutionary
Applications of
Blockchain-Enabled
Privacy and Access
Control
Surjit Singh
Thapar Institute of Engineering and Technology, India
Copyright © 2021 by IGI Global. All rights reserved. No part of this publication may be
reproduced, stored or distributed in any form or by any means, electronic or mechanical, including
photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the
names of the products or companies does not indicate a claim of ownership by IGI Global of the
trademark or registered trademark.
This book is published in the IGI Global book series Advances in Information Security, Privacy,
and Ethics (AISPE) (ISSN: 1948-9730; eISSN: 1948-9749)
Coverage
• Technoethics IGI Global is currently accepting
• Telecommunications Regulations manuscripts for publication within this
• Risk Management series. To submit a proposal for a volume in
• Information Security Standards this series, please contact our Acquisition
• Cookies Editors at [email protected] or
• Security Classifications visit: http://www.igi-global.com/publish/.
• Network Security Services
• Electronic Mail Security
• Computer ethics
• Security Information Management
The Advances in Information Security, Privacy, and Ethics (AISPE) Book Series (ISSN 1948-9730) is published by IGI
Global, 701 E. Chocolate Avenue, Hershey, PA 17033-1240, USA, www.igi-global.com. This series is composed of titles
available for purchase individually; each title is edited to be contextually exclusive from any other title within the series.
For pricing and ordering information please visit http://www.igi-global.com/book-series/advances-information-security-
privacy-ethics/37157. Postmaster: Send all address changes to above address. Copyright © 2021 IGI Global. All rights,
including translation in other languages reserved by the publisher. No part of this series may be reproduced or used in any
form or by any means – graphics, electronic, or mechanical, including photocopying, recording, taping, or information and
retrieval systems – without written permission from the publisher, except for non commercial, educational use, including
classroom teaching purposes. The views expressed in this series are those of the authors, but not necessarily of IGI Global.
Titles in this Series
For a list of additional titles in this series, please visit:
http://www.igi-global.com/book-series/advances-information-security-privacy-ethics/37157
Preface.................................................................................................................. xv
Acknowledgment............................................................................................... xxii
Chapter 1
Blockchain Advances and Security Practices in WSN, CRN, SDN,
Opportunistic Mobile Networks, Delay Tolerant Networks ..................................1
Eranda Harshanath Jayatunga, Faculty of Engineering, University of
Ruhuna, Sri Lanka
Pasika Sashmal Ranaweera, Faculty of Engineering, University of
Ruhuna, Sri Lanka
Indika Anuradha Mendis Balapuwaduge, Faculty of Engineering,
University of Ruhuna, Sri Lanka
Chapter 2
Towards Utilizing Blockchain for Countering Distributed Denial-of-Service
(DDoS) .................................................................................................................35
Rochak Swami, National Institute of Technology, Kurukshetra, India
Mayank Dave, National Institute of Technology, Kurukshetra, India
Virender Ranga, National Institute of Technology, Kurukshetra, India
Nikhil Tripathi, Technical University of Darmstadt, Germany
Abhijith Kalayil Shaji, Otto von Guericke University Magdeburg,
Germany
Avani Sharma, Malaviya National Institute of Technology, Jaipur, India
Chapter 3
BLOFF: A Blockchain-Based Forensic Model in IoT .........................................59
Promise Agbedanu, University College Dublin, Ireland
Anca Delia Jurcut, University College Dublin, Ireland
Chapter 4
Forensic Investigation-Based Framework for SDN Using Blockchain ................74
Sonam Bhardwaj, National Institute of Technology, Kurukshetra, India
Rochak Swami, National Institute of Technology, Kurukshetra, India
Mayank Dave, National Institute of Technology, Kurukshetra, India
Chapter 5
The Mobility Open Blockchain Initiative: Identity, Members, Technologies,
and Future Trends ................................................................................................99
Loreen M. Powell, Bloomsburg University of Pennsylvania, USA
Jessica Schwartz, University of the Cumberlands, USA
Michalina Hendon, University of the Cumberlands, USA
Chapter 6
Revolutionizing the Stock Market With Blockchain ..........................................119
Namrata Dhanda, Amity University, Noida, India
Anushka Garg, Amity University, Noida, India
Chapter 7
Blockchain-Based Food Supply Chain Management.........................................134
Dhana Srinithi Srinivasan, PSG College of Technology, India
Karpagam Manavalan, PSG College of Technology, India
Soundarya R., PSG College of Technology, India
Thamizhi S. I., PSG College of Technology, India
Chapter 8
Blockchain and PUF-Based Secure Transaction Procedure for Bitcoin ............172
Sivasankari Narasimhan, Mepco Schlenk Engineering College, India
Chapter 9
Blockchain Revolution: Adaptability in Business World and Challenges in
Implementation ..................................................................................................189
Archana Sharma, Institute of Management Studies, Noida, India
Purnima Gupta, Institute of Management Studies, Noida, India
Chapter 10
A Reliable Hybrid Blockchain-Based Authentication System for IoT Network 219
Ambika N., Department of Computer Applications, Sivananda Sarma
Memorial RV College, Bangalore, India
Chapter 11
The Detection of SQL Injection on Blockchain-Based Database ......................234
Keshav Sinha, Birla Institute of Technology, India
Madhav Verma, B.I.T Sindri, Dhanbad, India
Index ..................................................................................................................295
Detailed Table of Contents
Preface.................................................................................................................. xv
Acknowledgment............................................................................................... xxii
Chapter 1
Blockchain Advances and Security Practices in WSN, CRN, SDN,
Opportunistic Mobile Networks, Delay Tolerant Networks ..................................1
Eranda Harshanath Jayatunga, Faculty of Engineering, University of
Ruhuna, Sri Lanka
Pasika Sashmal Ranaweera, Faculty of Engineering, University of
Ruhuna, Sri Lanka
Indika Anuradha Mendis Balapuwaduge, Faculty of Engineering,
University of Ruhuna, Sri Lanka
The internet of things (IoT) is paving a path for connecting a plethora of smart
devices together that emerges from the novel 5G-based applications. This evident
heterogeneity invites the integration of diverse technologies such as wireless sensor
networks (WSNs), software-defined networks (SDNs), cognitive radio networks
(CRNs), delay tolerant networks (DTNs), and opportunistic networks (oppnets).
However, the security and privacy are prominent conundrums due to featured
compatibility and interoperability aspects of evolving directives. Blockchain is the
most nascent paradigm instituted to resolve the issues of security and privacy while
retaining performance standards. In this chapter, advances of blockchain technology
in aforesaid networks are investigated and presented as means to be followed as
security practices for pragmatically realizing the concepts.
Chapter 2
Towards Utilizing Blockchain for Countering Distributed Denial-of-Service
(DDoS) .................................................................................................................35
Rochak Swami, National Institute of Technology, Kurukshetra, India
Mayank Dave, National Institute of Technology, Kurukshetra, India
Virender Ranga, National Institute of Technology, Kurukshetra, India
Nikhil Tripathi, Technical University of Darmstadt, Germany
Abhijith Kalayil Shaji, Otto von Guericke University Magdeburg,
Germany
Avani Sharma, Malaviya National Institute of Technology, Jaipur, India
Distributed denial of service (DDoS) attacks have been a matter of serious concern
for network administrators in the last two decades. These attacks target the resources
such as memory, CPU cycles, and network bandwidth in order to make them
unavailable for the benign users, thereby violating availability, one of the components
of cyber security. With the existence of DDoS-as-a-service on internet, DDoS
attacks have now become more lucrative for the adversaries to target a potential
victim. In this work, the authors focus on countering DDoS attacks using one of
the latest technologies called blockchain. In inception phase, utilizing blockchain
for countering DDoS attacks has proved to be quite promising. The authors also
compare existing blockchain-based defense mechanisms to counter DDoS attacks
and analyze them. Towards the end of the work, they also discuss possible future
research directions in this domain.
Chapter 3
BLOFF: A Blockchain-Based Forensic Model in IoT .........................................59
Promise Agbedanu, University College Dublin, Ireland
Anca Delia Jurcut, University College Dublin, Ireland
In this era of explosive growth in technology, the internet of things (IoT) has become
the game changer when we consider technologies like smart homes and cities, smart
energy, security and surveillance, and healthcare. The numerous benefits provided by
IoT have become attractive technologies for users and cybercriminals. Cybercriminals
of today have the tools and the technology to deploy millions of sophisticated attacks.
These attacks need to be investigated; this is where digital forensics comes into play.
However, it is not easy to conduct a forensic investigation in IoT systems because of
the heterogeneous nature of the IoT environment. Additionally, forensic investigators
mostly rely on evidence from service providers, a situation that can lead to evidence
contamination. To solve this problem, the authors proposed a blockchain-based
IoT forensic model that prevents the admissibility of tampered logs into evidence.
Chapter 4
Forensic Investigation-Based Framework for SDN Using Blockchain ................74
Sonam Bhardwaj, National Institute of Technology, Kurukshetra, India
Rochak Swami, National Institute of Technology, Kurukshetra, India
Mayank Dave, National Institute of Technology, Kurukshetra, India
Chapter 5
The Mobility Open Blockchain Initiative: Identity, Members, Technologies,
and Future Trends ................................................................................................99
Loreen M. Powell, Bloomsburg University of Pennsylvania, USA
Jessica Schwartz, University of the Cumberlands, USA
Michalina Hendon, University of the Cumberlands, USA
Chapter 6
Revolutionizing the Stock Market With Blockchain ..........................................119
Namrata Dhanda, Amity University, Noida, India
Anushka Garg, Amity University, Noida, India
Chapter 7
Blockchain-Based Food Supply Chain Management.........................................134
Dhana Srinithi Srinivasan, PSG College of Technology, India
Karpagam Manavalan, PSG College of Technology, India
Soundarya R., PSG College of Technology, India
Thamizhi S. I., PSG College of Technology, India
Chapter 8
Blockchain and PUF-Based Secure Transaction Procedure for Bitcoin ............172
Sivasankari Narasimhan, Mepco Schlenk Engineering College, India
another solution. There is a possibility of digital prototyping which leads to the loss
of more accounts. This chapter provides the device-specific fingerprint technology
known as physical unclonable function (PUF) to be employed for authentication in
a blockchain-based bitcoin environment. The random unique response from PUF
ensures correct transaction. In this chapter, a new tetrahedral oscillator PUF has
been introduced intrinsically. All the blockchain operations are carried out and
verified with PUF response.
Chapter 9
Blockchain Revolution: Adaptability in Business World and Challenges in
Implementation ..................................................................................................189
Archana Sharma, Institute of Management Studies, Noida, India
Purnima Gupta, Institute of Management Studies, Noida, India
Chapter 10
A Reliable Hybrid Blockchain-Based Authentication System for IoT Network 219
Ambika N., Department of Computer Applications, Sivananda Sarma
Memorial RV College, Bangalore, India
Chapter 11
The Detection of SQL Injection on Blockchain-Based Database ......................234
Keshav Sinha, Birla Institute of Technology, India
Madhav Verma, B.I.T Sindri, Dhanbad, India
In today’s world, the storage of data needs a huge amount of space. Meanwhile,
cloud and distributed environments provide sufficient storage space for the data. One
of the challenging tasks is the privacy prevention of storage data. To overcome the
problem of privacy, the blockchain-based database is used to store the data. There
are various attacks like denial of service attacks (DoS) and insider attacks that are
performed by the adversary to compromise the security of the system. In this chapter,
the authors discussed a blockchain-based database, where data are encrypted and
stored. The Web API is used as an interface for the storage and sharing of data.
Here, they are mainly focused on the SQL injection attack, which is performed by
the adversary on Web API. To cope with this problem, they present the case study
based on the Snort and Moloch for automated detection of SQL attack, network
analysis, and testing of the system.
Index ..................................................................................................................295
xv
Preface
terms of smart contract can be introduced by users and the smart contract will only
be executed if these terms/ conditions are fulfilled. Hence, this hands over control
to the owner of the data. Furthermore, no malware can infect the system through a
node because others in the ledger will detect the attack and deny the unauthorized
access. The blockchain can incorporate various classes of transactions or records,
so its usability can extend beyond the initial financial scope drafted with Bitcoin
cryptocurrency, to digital communications, product identification, to even customer
claims.
Although research and innovation can enable businesses to use blockchain in a
broad range of applications, the use of blockchain technology for information security
and privacy appears to be the most obvious application area. Security and privacy
are the main concern in the network and communications-based areas including IoT,
5G, Edge and Cloud Computing, Software Defined Networking, Wireless Networks
and any application that is using these paradigms such as banking systems, retail,
logistics and public sectors. The issues related to security include confidentiality,
privacy, access control, integrity, and availability. For example, in the cloud, the data
of users is stored away from their site and the users do not have direct control over
it. Strong cryptographic techniques are thus needed. The controlled disclosure of
personal information of the users comes under the privacy requirements. Only the
authorized entities should be provided information about the cloud users. Access
control is used in computer security to regulate the access to critical or valuable
resources such as data, services, computational systems, storage space, and so
on. The rights of users to access resources are typically expressed through access
control policies, which are evaluated at access request time against the current access
context. If there is any change in the stored data, the owner of data should be able
to identify this change. Also, if there is any loss or corruption of stored data, there
should be a way to retrieve this.
To promote the development and research of blockchain applications, to guarantee
the security of these applications, and further to facilitate the research for the access
control and privacy techniques, Revolutionary Applications of Blockchain-Enabled
Privacy and Access Control (1) explains several concepts of blockchain related
to WSN, CRN, SDN, Opportunistic Mobile Networks, Delay Tolerant Networks,
Internet of Things (IoT), Forensic investigation; (2) provides complete coverage
of the various tools, platforms and techniques used in blockchain; and (3) covers
a variety of applications with real world case studies in areas such as supply chain
management, stock market, banking, and attack prevention and detection techniques.
Revolutionary Applications of Blockchain-Enabled Privacy and Access Control
includes 11 chapters that presents contributions from around the globe on recent
advances and findings in the domain of blockchain technology, Internet of Things,
networks and communication, forensic, attack detection and prevention. Chapters
xvi
Preface
CHAPTER DESCRIPTION
Chapter 1
The Internet of Things (IoT) is paving a path for connecting a plethora of smart
devices together that emerges from the novel 5G based applications. This evident
heterogeneity invites the integration of diverse technologies such as Wireless Sensor
Networks (WSNs), Software Defined Networks (SDNs), Cognitive Radio Networks
(CRNs), Delay Tolerant Networks (DTNs), and Opportunistic Networks (oppnets).
However, the security and privacy are prominent conundrums seemed due to featured
compatibility and interoperability aspects of evolving directives. Blockchain is the
most nascent paradigm instituted to resolve the issues of security and privacy while
retaining performance standards. In this chapter, advances of blockchain technology
in aforesaid networks are investigated and presented as means to be followed as
security practices for pragmatically realizing the concepts.
Chapter 2
Distributed Denial of Service (DDoS) attacks have been a matter of serious concern
for network administrators since last two decades. These attacks target the resources
such as memory, CPU cycles and network bandwidth in order to make them unavailable
for the benign users, thereby, violating Availability, one of the components of cyber
security. With the existence of DDoS-as-a-service on Internet, DDoS attacks have
now become more lucrative for the adversaries to target a potential victim. This
chapter focuses on countering DDoS attacks using one of the latest technologies
called blockchain. Though in inception phase, utilizing blockchain for countering
DDoS attacks has proved to be quite promising. This chapter also compares existing
blockchain-based defense mechanisms to counter DDoS attacks and analyze them.
Towards the end of the work, the possible future research directions in this domain
are presented.
Chapter 3
In this era of explosive growth in technology, the Internet of Things (IoT) has
become the game changer when we consider technologies like smart homes and
xvii
Preface
cities; smart energy, security and surveillance and healthcare. The numerous
benefits provided by IoT, it has become an attractive technology for users and
cybercriminals. Cybercriminals of today have the tools and the technology to
deploy millions of sophisticated attacks. These attacks need to be investigated;
this is where digital forensics comes into play. However, it is not easy to conduct
a forensic investigation in IoT systems because of the heterogeneous nature of the
IoT environment. Additionally, forensic investigators mostly rely on evidence from
service providers. A situation that can lead to evidence contamination. To solve this
problem, this chapter proposes a blockchain-based IoT forensic model that prevents
the admissibility of tampered logs into evidence.
Chapter 4
Chapter 5
xviii
Preface
Chapter 6
Chapter 7
Chapter 8
xix
Preface
another solution. There is a possibility of digital prototyping which leads to the loss
of more accounts. This chapter provides the device-specific fingerprint technology
known as Physical Unclonable Function (PUF) to be employed for authentication
in a blockchain-based bitcoin environment. The random unique response from
PUF ensures correct transaction. In this chapter, a new tetrahedral oscillator PUF
has been introduced intrinsically. All the blockchain operations are carried out and
verified with PUF response.
Chapter 9
As the base of bitcoin, the blockchain has received widespread consideration recently.
Blockchain stands for an immutable ledger which permits transactions to occur in
a decentralized way. Applications based on blockchain are numerous for instance
financial services, industrial and supply chain services, legal and healthcare services,
IoT and blockchain integration, Bigdata analytics, and so on. Nevertheless, there are
still numerous confronts of blockchain technology like security and fork problems
have to be resolved. This chapter highlights an inclusive indication on blockchain
technology with blockchain architecture in first phase. And in second phase, the
security challenges and problems associated with blockchain. Further proposes and
measure up to various typical consensus algorithms used in different blockchains.
Research has been concluded with potential prospects of blockchain as future trends.
Chapter 10
xx
Preface
Chapter 11
In Today’s world, the storage of data needs a huge amount of space. In meanwhile
cloud and distributed environments provide sufficient storage space for the data.
One of the challenging tasks is the privacy prevention of storage data. To overcome
the problem of privacy the Blockchain-based database is used to store the data.
There are various attacks like denial of service attacks (DoS), Insider attacks that
are performed by the adversary to compromised the security of the system. This
chapter discusses a blockchain-based database, where data are encrypted and stored.
The Web API is used as an interface for the storage and sharing of data. Here, this
mainly focused on the SQL injection attack which is performed by the adversary
on Web API. To cope with this problem this chapter presents the case study based
on the Snort and Moloch for automated detection of SQL attack, network analysis,
and testing of the system.
This book will be of interest to graduate students, researchers, academicians,
institutions, and professionals that are interested in exploring the diverse applications
of the Blockchain technology, especially in the security and privacy area.
xxi
xxii
Acknowledgment
Firstly, our sincere gratitude goes to the people who contributed their time and
expertise to this book. We highly appreciate their efforts in achieving this project.
The editors would like to acknowledge the help of all the people involved in this
project and, more specifically, the editors would like to thank each one of the
authors for their contributions and the editorial advisory board/reviewers regarding
the improvement of quality, coherence and the content presentation of this book.
Secondly, the editors would like to thank to Mr. Eric Whalen and Ms. Morgan
Brajkovich, Assistant Development Editors; and Ms. Lindsay Wertman, Managing
Director of IGI Global, USA for their continuous support and giving us an opportunity
to edit this book.
Finally, we are thankful to our family members for their support during completion
of this book.
Surjit Singh
Thapar Institute of Engineering and Technology, India
Chapter 1
Blockchain Advances and
Security Practices in WSN,
CRN, SDN, Opportunistic
Mobile Networks, Delay
Tolerant Networks
Eranda Harshanath Jayatunga
Faculty of Engineering, University of Ruhuna, Sri Lanka
ABSTRACT
The internet of things (IoT) is paving a path for connecting a plethora of smart
devices together that emerges from the novel 5G-based applications. This evident
heterogeneity invites the integration of diverse technologies such as wireless sensor
networks (WSNs), software-defined networks (SDNs), cognitive radio networks
(CRNs), delay tolerant networks (DTNs), and opportunistic networks (oppnets).
However, the security and privacy are prominent conundrums due to featured
compatibility and interoperability aspects of evolving directives. Blockchain is the
most nascent paradigm instituted to resolve the issues of security and privacy while
retaining performance standards. In this chapter, advances of blockchain technology
in aforesaid networks are investigated and presented as means to be followed as
security practices for pragmatically realizing the concepts.
DOI: 10.4018/978-1-7998-7589-5.ch001
Copyright © 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Blockchain Advances and Security Practices in WSN, CRN, SDN
INTRODUCTION
All the discussed variants of this chapter are the pioneer technologies that govern the
emerging communication based services and their applications. These directives were
formed to address lacking aspects of different existing technologies with an improved
perspective for elevating performance standards. Though, each distinct directive has
limitations in security, where application of cumbersome but tamper-proof security
mechanisms would obviously degrade the performance of them. Thus, there is a
clear trade-off between latency and applicable security level. In addition, similar to
most existing communication technologies or protocols, verifiable security is only
credible with Trusted Third Parties (TTPs), or certificate authorities. Blockchain,
in contrast, offers a decentralized approach that eliminates the TTP dependency.
Moreover, the transparent yet tamper-proof mechanism in blockchain is enabling it to
be adopted for diverse applications to secure their transactions. Thus, this chapter is
focusing on the technologies of WSN, oppnets, SDN, CRN, and DTNs for adopting
blockchain to their security limitations. The chapter is mainly categorized into the
sections of WSN, SDN, CRN, DTN and oppnets, where various prevailing blockchain
adaptations are discussed summarizing the best security practices.
BACKGROUND
Wireless Sensor Networks (WSNs) are basically ad hoc networks, amalgamating small
devices embedded with sensing capabilities deployed to monitor physical activities in
the surrounding area of interest. These sensor nodes should have the characteristics
of large coverage area, monitoring with high precision, self-organization, random
deployment and fault-tolerance, etc. Due to the possibility of providing low cost
solutions, nowadays Wireless Sensor Networks (WSNs) are getting more and
more attention in many real-world applications. However, the dense deployment
of many sensor nodes cause unique security challenges in its management. In the
meantime, adaptation of many security protocols to overcome those challenges are
not straightforward because of inherent limits for energy consumption at sensor
nodes as well as availability of lower memory and storage space. Therefore, it is
timely important researchers to discuss the trade-off between resource consumption
minimization and security maximization in WSNs.
Flexibility is the key feature of Software Defined Networks (SDNs) that elevate
its standards beyond the conventional networking infrastructures (Kreutz, Ramos, &
Verissimo, 2013). This concept offers advanced network management capabilities
to the network administrator by enabling configuration of networking instances
independent of the hardware layer. Infact, diversification exhibited in networking
2
Blockchain Advances and Security Practices in WSN, CRN, SDN
devices and their plethoric aggregate are contriving compatibility and interoperability
debacles. In SDN, homogeneity of the both core and access networks are improved
with standardizing the hardware specifications; and higher reliance on hardware based
processing is transformed into an autonomous processing approach with software
integration (Kumar et al., 2017). In fact, SDN envisages solutions for complex issues
in traditional networking topologies and routing algorithms by integrating intelligence
to the control plane. In addition, this is a paradigm shift for network operators that
eases their issues with hardware layer and the ability to advance networking features
with novel requirements to broadened avenues. Apart from flexibility, main benefits
of SDN can be specified as: cost effectiveness (monetary), centralization, higher
throughput, dynamic nature that support higher mobility, low communication latency,
optimum network utilization, rapid and efficient load-balancing, fault tolerance, and
adaptable/ context-aware security (Tomovic, Pejanovic-Djurisic, & Radusinovic,
2014; Jaballah, Conti, & Lal, 2019; Scott-Hayward, O’Callaghan, & Sezer, 2013).
Recently, research in the field of wireless communications has been focusing on
the Fifth Generation (5G) cellular systems. Meanwhile, the 5G and beyond wireless
network designers face challenging demands such as more capacity, higher data rates,
lower latency, better connectivity for a massive number of users, lesser cost and
energy, and more importantly improved quality of experience (QoE) (Munsub Ali,
Liu, & Ejaz, 2020). Moreover, with the increase in the number of communication
devices, the requirement for higher bandwidth is essential. However, with the limited
and expensive radio spectrum resources, allocation of new frequency bands is an
extremely difficult task. Therefore, efficient management of the spectrum under
dynamic policies has recently become a prospective research topic.
Although Internet access has evolved as one of basic primary needs of humans,
still there are many rural areas that do not have any network connectivity or sometimes
intermittent. These scenarios demand the development of distributed networking
techniques in an opportunistic manner to provide atleast some level of service with
ad-hoc networks. Consequently, these Opportunistic Networks (oppnets) integrate
diverse communication, computation, sensing, storage and other devices and
resources in the surrounding. The initial set of nodes associated with an oppnet are
called seed nodes. Once other nodes are invited to become potential helpers for the
original oppnet, this seed oppnet nurtures into an expanded oppnet while persisting
various security concerns.
The integration of blockchain with IoT provides many benefits to build a secure,
trusted and robust communication prospects. But the challenge is to identify the
most suitable location in placing blockchain for current IoT settings. With the
amalgamation as third party to keep data in centralized data centers and later a fog
layer to offload the traffic burden from the data centers, the current IoT is a three
tier architecture namely IoT devices layer, Fog layer and the cloud layer. Generally,
3
Random documents with unrelated
content Scribd suggests to you:
Chapter XX.
THE ORDER OF THE LESSER SANCTIFICATION
OF WATER.
After the priest hath said the prayer behind the ambo, we all go to
the baptismal font, the taper-bearers going in front, and after them
the deacons and priests with the gospel and with incense, while the
brethren sing the present troparia.
Tone viii.
The voice of the Lord crieth upon the waters, saying, O come ye,
and all receive the spirit of wisdom, the spirit of understanding, the
spirit of the fear of God, even Christ, who is made manifest.
Thrice.
To-day the nature of the waters is sanctified, and the Jordan is
divided, and turneth back the flowing of its waters, beholding the
baptism of the Master.
Twice.
As a man thou didst come to the river, O Christ the King, desiring
to receive the baptism of a servant, O thou good one, at the hand of
the Forerunner, because of our sins, O lover of mankind.
Twice.
Glory. Both now. The same tone.
To the voice crying in the wilderness, Prepare ye the way of the
Lord, thou didst come, O Lord, taking the form of a servant, asking
for baptism, thou who knowest not sin. The waters beheld thee, and
were afraid. The Forerunner became trembling, and cried, saying,
How shall the lamp of light be lighted? how shall the servant lay
hands upon the Master? Sanctify thou me and the waters, O
Saviour, thou that takest away the sins of the world.
And straightway, standing by the baptismal font, the deacon saith,
Wisdom.
And the reader, the reading from the prophesy of
Esaias.
Chap. xxxv.
Thus saith the Lord, Let the thirsty desert be glad, let the wilderness
rejoice, and blossom as a rose, and let them bud forth and be
exceedingly glad. And let the desert of Jordan rejoice, and the glory
of Libanus shall be given unto it, and the honour of Carmel, and my
people shall behold the glory of the Lord, and the exaltedness of
God. Strengthen ye the weak hands, and comfort ye the feeble
knees; and say unto them that are faint-hearted in intention, Be ye
strong, and fear not, behold our God will render judgment, he will
come and save us. Then shall the eyes of the blind be opened, and
the ears of the deaf shall hear. Then shall the lame man leap as an
hart, and the tongue of the deaf be distinct; for in the wilderness shall
water break out, and a ravine in a thirsty land. And waterless places
shall become pools, and in a thirsty land shall be a spring of water:
there shall be joy of birds, abodes of syrens, and reeds and pools.
And there shall be a pure way, and it shall be called a holy way; and
the impure shall not pass there, neither shall an impure way be
there, and the dispersed shall walk therein, and shall not wander.
And no lion shall be there, nor of evil beasts shall one enter there,
nor be found there; but the redeemed and chosen of the Lord shall
walk therein. And they shall return and come to Sion with joy and
gladness, and everlasting joy shall be upon their heads: praise, and
gladness, and joy shall penetrate them, and pain, grief, and sighing
shall flee away.
The reading from the prophecy of Esaias.
Chap. lv.
Thus saith the Lord, O every one that thirsteth, come ye to the water,
and as many as have no money, come ye, buy, and eat and drink,
wine and fat, without money and without price. Wherefore do ye
spend money for that which is not bread, and labour for that which
satisfieth not? hearken ye to me, and eat that which is good, and let
your soul delight itself in good things. Incline your ears, and follow in
my ways; hearken unto me, and your soul shall live in good things;
and I will promise unto you an everlasting testament, even faithful
things befitting unto David. Behold, I have given him to be a
testimony among the nations, a prince and a commander among the
nations. Behold, nations that have not known thee shall call upon
thee, and people that have not recognised thee shall have recourse
unto thee, because of the Lord thy God and the holy one of Israel,
for I have glorified thee. Seek ye God, and, when ye have found him,
call upon him, if haply he may draw nigh unto you. Let the impious
forsake his ways, and the transgressing man his counsels; and turn
ye unto the Lord your God, and ye shall be pitied; for in much wise
he forgiveth your sins. For my counsels are not as your counsels,
neither as your ways are my ways, saith the Lord. For as the heaven
standeth far from the earth, so standeth my way from your ways, and
your contemplations from my thoughts. For as the rain or the snow
cometh down from heaven, and returneth not thither, until it soaketh
the earth, and generateth, and increaseth, and giveth seed to the
sower, and bread to the eater, so shall my word be which goeth out
of my lips, and returneth not unto me void, until it accomplisheth all
that I have wished, and furthereth my ways and my commandments.
For ye shall go forth with joy, and be taught with gladness: for the
mountains and the hills shall leap, expecting you with joy, and all the
trees of the field shall clap their hands. And instead of the thorn shall
come up the cypress, and instead of the nettle shall come up the
myrtle; and it shall be to the Lord for a name and for an everlasting
sign, and it shall not be cut off.
The reading from the prophecy of Esaias.
Chap. xii.
Thus saith the Lord, Ye shall draw water with joy out of wells of
salvation. And thou shalt say in that day, Confess ye unto the Lord,
and call upon his name, declare his glory unto the nations, make
mention that his name is exalted. Sing ye the name of the Lord, for
he hath wrought excellent things: declare ye these throughout all
lands. Rejoice and be glad, ye that dwell in Sion, for the holy one of
Israel is exalted in the midst thereof.
Deacon. Wisdom.
Reader, prokimenon, tone iii.
The Lord is mine illumination, and my Saviour, whom shall I fear?
Verse. The Lord is the defence of my life, of whom shall I be
afraid?
The epistle to the Corinthians, section cxliii, from
the paragraph, Chap. x.
Brethren, I would not that ye should be ignorant how that all our
fathers were under the cloud, and all passed through the sea; and
were all baptized unto Moses in the cloud and in the sea; and did all
eat the same spiritual meat, and did all drink the same spiritual drink;
for they drank of the spiritual rock that followed them, and the rock
was Christ.
Alleluia, tone iv.
Verse. The voice of the Lord is upon the waters, the God of glory
thundereth, the Lord is upon many waters.
The gospel from Mark, section ii. Chap. i.
At that time Jesus came from Nazareth of Galilee, and was baptized
of John in Jordan. And straightway coming up out of the water, he
saw the heavens opened, and the Spirit like a dove descending upon
him. And there was a voice from heaven, saying, Thou art my
beloved Son, in whom I am well pleased.
And the deacon saith the ectenia.
In peace let us pray to the Lord.
For the peace that is from above....
For the peace of the whole world....
For this holy temple....
For the Most Holy Governing Synod....
For our Most Pious, Autocratic Great Lord, THE EMPEROR
ALEXANDER ALEXANDROVITCH of all Russia; and for His
Consort, the Most Pious Lady, THE EMPRESS MARIA
THEODOROVNA.
For His Heir, the Right-believing Lord, the Cesarevitch and Grand
Duke NICOLAUS ALEXANDROVITCH; and for all the Reigning
House.
That he would assist Them, and subdue....
For this city, (if it is a monastery, For this holy habitation)....
For healthiness of weather....
For them that voyage, that journey....
That this water may be hallowed by the might, and operation, and
descent of the Holy Ghost, let us pray to the Lord.
That there may come down into these waters the cleansing
operation of the supersubstantial Trinity, let us pray to the Lord.
That there may be bestowed upon them the grace of redemption,
the blessing of Jordan, through the might, and operation, and
descent of the holy Ghost, let us pray to the Lord.
That he would quickly beat down satan under our feet, and destroy
every evil counsel that he conceiveth against us, let us pray to the
Lord.
That the Lord our God may deliver us from every evil device, and
from the essay of the adversary, and may count us worthy of
promised blessings, let us pray to the Lord.
That we may be illuminated with the illumination of understanding
and piety through the descent of the Holy Ghost, let us pray to the
Lord.
That the Lord God would send down the blessing of Jordan, and
hallow these waters, let us pray to the Lord.
That this water may be a gift of sanctification, a loosing of sins, for
the healing of soul and body, and for every befitting need, let us pray
to the Lord.
That this water may well up unto eternal life, let us pray to the
Lord.
That it may be manifested to the destruction of every counsel of
visible and invisible enemies, let us pray to the Lord.
For them that laid and draw thereof for the sanctification of
houses, let us pray to the Lord.
That it may be to the cleansing of soul and body of all that with
faith draw and partake of it, let us pray to the Lord.
That we may be counted worthy to be filled with sanctification
through the partaking of these waters, by the invisible manifestation
of the Holy Ghost, let us pray to the Lord.
That the Lord God may hearken unto the voice of the prayer of us
sinners, and have mercy upon us, let us pray to the Lord.
For our deliverance from every affliction....
Help us, save us, have mercy....
Commemorating our most holy, most pure, most blessed....
While these are being said, the priest saith this
prayer secretly.
Lord Jesus Christ, the only-begotten Son, that art in the bosom of
the Father, O thou true God, fountain of life and immortality, thou
light of light, that camest into the world to enlighten it; do thou dawn
upon our mind by thy Holy Ghost, and accept us offering magnifying
and thanksgiving unto thee for thy wonderful mighty works from
eternity, and for thy saving providence in these last ages, in which
thou hast assumed our impotent and poor substance, and,
condescending to the estate of a servant, who art King of all things,
didst furthermore endure to be baptized in Jordan by the hand of a
servant, that thou, the sinless one, having sanctified the nature of
water, mightest lead us unto regeneration by water and the spirit,
and stablish us in the aforetime liberty. And, celebrating the memory
of this divine mystery, we beseech thee, O man-loving Master,
Sprinkle thou also upon us, thine unworthy servants, according to thy
divine promise, pure water, the gift of thy tenderness, that the prayer
of us sinners over this water may be acceptable through thy grace,
and that thereby thy blessing may be bestowed upon us and upon all
thy faithful people, to the glory of thy holy and adorable name. For to
thee is due all glory, honour, and worship, with thine unbeginning
Father, and with thy most holy, and good, and life-creating Spirit,
now and ever, and to ages of ages.
And he saith to himself, Amen.
And when the deacon hath finished the ectenia, the priest
beginneth this prayer with a loud voice.
Great art thou, O Lord, and wonderful are thy works, and no word
shall be sufficient for the praise of thy wonders.
Thrice.
For thou by thy will hast from, nothingness brought all things into
being, and, by thy power, thou sustainest creation, and, by thy
foreknowledge, directest the world. Thou from four elements hast
formed creation, and hast crowned the circle of the year with four
seasons. All the spiritual powers tremble before thee, the sun
praiseth thee, the moon glorifieth thee, the stars make intercession
with thee, the light hearkeneth unto thee, the depths shudder at thy
presence, the springs of water serve thee. Thou hast stretched out
the heavens as a curtain, thou hast founded the earth upon the
waters, thou hast bounded the sea with sand, thou hast diffused the
air for breathing. The angelic powers minister unto thee, the choirs of
archangels worship thee, the many-eyed cherubim, and the six-
winged seraphim, standing and flying around, cover themselves with
fear of thine unapproachable glory. For thou, being the uninscribable,
unbeginning and unspeakable God, didst come down upon earth,
taking the form of a servant, being made in the likeness of men; for
thou, O Master, through the tenderness of thy mercy, didst not
endure to behold the race of men tormented by the devil, but thou
didst come and save us. We confess thy grace, we proclaim thy