Research Methodology and Design Science

Verified

Added on  2021/04/17

|26
|6517
|161
AI Summary
This assignment requires students to analyze various research methodologies used in engineering and science fields. The provided papers cover topics such as design science research, single case research, and qualitative methods. Students are expected to understand the application of these methodologies in real-world scenarios and critically evaluate their effectiveness. By examining different research approaches, students can develop a deeper understanding of the complexities involved in scientific inquiry and improve their critical thinking skills.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: RESEARCH METHODS FOR COMPUTING
Analyzing the authentication and security maintenance in Wireless Sensor Network
Name of the Student:
Name of the University:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
RESEARCH METHODS FOR COMPUTING
Table of Contents
Part 1: Literature Review.................................................................................................................3
1.0 Introduction............................................................................................................................3
2.0 Research Questions................................................................................................................4
3.0 Relevance of the research topic.............................................................................................4
3.1 Security and authentication issues in wireless networks...................................................5
3.2 Authentication and security maintenance into the wireless networks...............................6
3.3 Limitation of authentication and security maintenance into wireless networks................8
4.0 Conclusion.................................................................................................................................8
Part 2: Project Proposal.................................................................................................................10
1.0 Research purpose.................................................................................................................10
2.0 Background context.............................................................................................................10
3.0 Research methodology.........................................................................................................12
3.1 Research philosophy........................................................................................................12
3.2 Research approach...........................................................................................................12
3.3 Research design...............................................................................................................13
3.4 Data sources.....................................................................................................................13
3.5 Data analysis techniques..................................................................................................14
Document Page
2
RESEARCH METHODS FOR COMPUTING
4.0 Evaluation methodology......................................................................................................14
5.0 Schedule and publishing......................................................................................................16
6.0 Professional, legal and ethical issues...................................................................................19
References......................................................................................................................................21
Document Page
3
RESEARCH METHODS FOR COMPUTING
Part 1: Literature Review
1.0 Introduction
The paper is based on “Analyzing the authentication and security maintenance in
Wireless Sensor Network (WSN)”. It is technology from progress of the dissimilar fields to
diminish the false data attacks. Into the WSN, the sensor nodes are introduced the false data
throughout data aggregation as well as data forwarding. The application of WSN is dependent on
the data about the positions of the sensor nodes. Rajeswari and Seenivasagam (2016) stated that
WSN is used into the environment where there is energy replacement which is complex. As there
are limited resources, WSN requires pleasing the application to detailed QoS required reducing
consumption to outspread the lifetime of system as well as maintenance of system. Kumari and
Om (2016) argued that WSN is such a network which consists of sensor nodes to cultivate the
security level.
Authentication is basic security services into open as well as vulnerable communication
network. Security maintenance is required into WSN to secure the data and information of
customers (He et al. 2013). Authentication is core security into the computing which requires of
mutual trust among the parties. The tools which are used for authentication of the wireless
networks are cryptographic algorithms. Biometric is also used to maintain security of network by
which the human acquires of token which is presented for authentication mechanisms. WSN is
showing of security attacks with dishonest injection of data. The sensor nodes are collaborated
and conveyed nodes altered by inserting of false data (Han et al. 2014). The false data are being
injected by the sensor nodes with aggregation of data. The confidentiality of data chooses the
data to encrypt at the source nodes and it is decrypted at destination. Xu et al. (2014)

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
RESEARCH METHODS FOR COMPUTING
investigated that each of the sensor nodes are able to accumulate and promote of data but it is not
improving the network security.
2.0 Research Questions
WSN consists of some properties as well as features. The sensor nodes are configured
into the network. The nodes are being deployed thickly. Various nodes are being collaborated to
sense the data which lead to data redundancy. The nodes into the sensor network are smaller in
size which is suitable for various environments. Into the network sensor, there is lack of storage
of data along with power. The sensor nodes are being damaged easily when it is used under
uncontrollable conditions of the environment. According to Tajeddine, Kayssi and Chehab
(2012), ESN is followed of some traffic patterns. Data from various sensor nodes are being
communicated to the central nodes. It is consisted of sensor nodes which are vary into size along
with computing power. Following are the research questions based on selected research topic:
1. What are the security issues in wireless sensor network?
2. How to maintain security and authentication in wireless sensor network?
Based on selected two of the research questions, the researcher performs the study and
identifies the security issues into wireless networks. The selected research articles for this study
are mainly summarizing the secured authentication furthermore integrity techniques for
randomized secured routing in WSN.
3.0 Relevance of the research topic
This research topic is selected for this study as authentication and security maintenance
process into WSN aims to achieve of higher technique of bandwidth on dropping the attacker on
injecting the false data attack. It provides the authentication pattern on the sensor network to
Document Page
5
RESEARCH METHODS FOR COMPUTING
overcome the false data injections. This research study summarizes the authentication along with
maintenance of the security into the wireless network (Marin, Pawlowski and Jara, 2015). It also
provides limitation of authentication and security maintenance into wireless networks. This
paper discusses about the challenges into the security areas and taking of security mechanisms
schemes. The security attacks are resulted into false data into the wireless sensor network. It is
detected intelligences which is injected by cooperated the nodes into this research study. In order
to secure the wireless sensor networks, there is designed of authentication system (Gope and
Hwang, 2016). Into this particular system, the security maintenance level is being increased by
clarification of the false data. The aim of this particular research work increases of security along
with prevention level into the wireless network. Security becomes a main issue into
confidentiality of data based on different threats. In this particular paper, the researcher studied
the security threats into WSN.
3.1 Security and authentication issues in wireless networks
Zhang, Tang and Luo (2016) discussed that network is being attacked along with the
nodes are tampered. The nodes are being deployed with close interaction with environment.
Kumaresan and Macriga (2017) argued that the attackers can easily access to the nodes and able
to extract the confidential and sensitive information. They discard those data and modified it.
According to Sang and Arora (2012), the attackers are targeting routing information which
misguides the traffic of the network. They are also targeting the transmission of data without any
kind of network disturbances. It is caused due to unreliable wireless mechanisms. WSN is
proposed to process along with provide sensed data to the network users on demands. The sensor
nodes are being generated with redundant data. It leads to loss of the efficiency of energy. The
Document Page
6
RESEARCH METHODS FOR COMPUTING
nodes within the sensor network are varied by size, consumption of power along with efficiency
of energy.
Tajeddine et al. (2015) analyzed that any attempt to steal, modify and gain of
unauthorized access is termed as attack. Rajeswari and Seenivasagam (2016) observed that
sensor nodes are unprotected when WSN is vulnerable to the attacks. There are two types of
attack such as passive and active attack. Into the passive attack, the attacker can able to monitor
the communicational channels. Into the active attack, the attacker can modify the data stream.
Based on the security attacks, there are security goals the organization should maintain to
achieve of security of information along with the network. The network also ensures of security
of data to maintain authentication of information. Unauthorized person cannot get sensitive
information without prior permission of the users (Tajeddine, Kayssi and Chehab, 2012).
Confidentiality of data ensures for encryption and use of shared key. Origin of data is being
identified to make sure about reliability. The sensor nodes are not disclosed the data to its
neighboring nodes. Then, it will become a security issues for the wireless network to share of
confidential and sensitive data via internet.
3.2 Authentication and security maintenance into the wireless networks
Tajeddine et al. (2015) stated that authentication is the process in which the credentials
are provided in comparison to those on which the file into the database of the authorized users
information on the computer network. Senthil Kumaran (2015) argued that when the credentials
are matched, then there is completion of process plus the user is granted for access to
authorization of information. Into the computing system, authentication provides effective
security. WSN is collection of autonomous nodes to cooperate of wireless over the restricted
areas with higher authentication and maintenance of security. Gódor et al. (2015) discussed that

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
RESEARCH METHODS FOR COMPUTING
WSN is permissible in gathering of data from geographical areas to trace and monitor the
security application to secure the wireless network.
In order to secure WSN, data analysis is performed where the output of sensor
authentication is ensured to valid groups. Senthil Kumaran (2015) cited that the nodes are
comprised of actual groups of network which face drastic transitions responsible to perform the
key services. The organizations are required of strong and secured protocols to secure the
wireless network. It is considered as solution which is time efficient. Kumari and Om (2016)
defined that nature of WSN is susceptibility to various types of intrusions. Fine sensing as well
as dense nodes are characteristics of the WSN. In order to overcome the security threats into the
network, the research study provides of robust solutions to understand the threat models. Sahoo
(2012) concluded that there is strong need of secured protocol to secure the data and network
from any type of unauthorized access. The sensed values are aggregated to avoid huge amounts
of traffic at base stations.
WSN is resource constrained along with reliability as well as security of the data which
becomes a major issue into the wireless network. Tajeddine, Kayssi and Chehab (2012) proposed
that for overcoming with the security issues, there is secured authentication which is to be
proposed. In this particular technique, shared keys are being used to provide authentication to
wireless networks. Mutual authentication techniques permit the sender as well as recipient to
share of the authentication keys. Both of senders along with recipient are chosen to random noise
plus verification is to be done. In order to increase authentication and maintain security, online
signcryption technique is used as cryptographic method to satisfy the functions of digital
signature (Zhang, Tang and Luo, 2016). Public key encryption is also done as the security
solutions to secure the wireless network.
Document Page
8
RESEARCH METHODS FOR COMPUTING
3.3 Limitation of authentication and security maintenance into wireless networks
Into the probabilistic approaches, he malicious’ nodes corresponded to optimal strategy
which is not proved. This particular approach is failed to increase the framework for handling of
various malicious nodes. Ilango (2015) discussed that extra security measures are not carried out
into this approach. Into “Data Aggregation and Authentication Protocol”, the process is
susceptible to node cooperation attacks. Tajeddine, Kayssi and Chehab (2012) argued that the
false data detection along with data confidentiality enhances communication overhead. Each of
the sensor nodes are aggregated along with forward the data but also improves network security
plus efficiency. Sahoo (2012) investigated that virtual ring architecture failed to support privacy
protection mechanism with the computing environments. Each types of security mechanisms
requires to amount of resources for the mechanism to function. The sensor nodes are hold of data
and program that face some sort of limitations. There is energy depletion that comprises of
varied aspects like energy consumption into security of encryption (Gope and Hwang, 2016).
There are other limitations into WSN such as memory limitation. The crux of solutions is
revolved to maintain security mechanism with an optimized memory.
4.0 Conclusion
It is concluded that authentication and maintenance of security into the wireless sensor
networks are achieved of effective techniques to reduce the injections false data attack. It
improves the authentication scheme on the network by preventing from the false data injections.
The organizations are maintained of higher authentication scheme without the false data
injections. Privacy of the customers reduces performance of cryptographic computations. It is
also summarized that authentication protocols combine the false data detection with aggregation
Document Page
9
RESEARCH METHODS FOR COMPUTING
of data as well as confidentiality. It supports confidential transmission of data among the data
aggregator for verification of data integrity on encrypted data. Inspection is increased
authentication as well as security of the maintenance level into the WSN. It detects malicious
users for accessing the user’s data. Therefore, security of the data is required for providing the
users with secured network so that all the data as well as information is to be secured properly.
The result is that security maintenance as well as authentication into WSN increases the
privacy of the user’s data over the wide range of various security parameters. Most of the
security attacks into WSN are caused by insertion of the false information. It is also seen that
there are security algorithms which are available for protecting the data. Based on the security
algorithms along with the cloud data storage, the literature reviews the security and also
authentication issues. The security counter measures are not to be carried out the research
process. From the research study, it is seen that the WSN is such a group of independent nodes
which are communicated over the restricted areas with higher authentication. There is an
increase into level of maintenance of security. Mutual authentication techniques consent the
sender as well as recipient to share of the authentication keys. Into the system, authentication
offers of an effective security. WSN is compilation of autonomous nodes to help of wireless over
the restricted areas with senior authentication in addition to continuance of security.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
RESEARCH METHODS FOR COMPUTING
Part 2: Project Proposal
1.0 Research purpose
The purpose of this research study is to study authentication and security maintenance
into Wireless Sensor Network (Oates, 2006). The networks are used to monitor the environment
with larger applications those are sensitive in nature such as monitoring, controlling, tracking of
areas and others. Most of the WSN applications are collecting and maintaining the secured data.
The selected research question of this research study is to analyze the security issues in wireless
sensor network with maintaining of security and authentication in WSN (Holambe, Shinde and
Biradar, 2015). This research shows that there are lot of works are done on developing the WSN
for the application purposes to provide a greater security mechanisms. The researcher also
observed that the security mechanisms are not efficient into all WSN. The radio links are to be
accessed easily. Among all the security mechanism, the researcher analyzed that authentication is
the best solution to secure the data and information into WSN (Campbell et al. 2017). After the
researcher makes an observation, it is seen that some of the attacks can manipulate nodes into the
sensor network for introducing of malicious nodes. The new nodes are being accepted by normal
nodes. In this particular case, authentication protocols are required to prevent the false nodes.
Each packet is entered into the WSN which is secured before it is being applied for high level of
applications.
2.0 Background context
The research study also faces some of the limitations when applying of security
mechanisms such as there are resource constraints into the sensor node. Insecure radio links
enabled and caused injection of the information (Tajeddine et al. 2015). There is also
Document Page
11
RESEARCH METHODS FOR COMPUTING
deployment of sensor network which becomes difficult into the physical attacks. The wireless
medium is not allowed any traditional mechanisms for the wired medium. Attacks into WSN are
categorized into different categories based on some criteria. The classification of attack into
WSN is insider and outsider attack. Into the insider attack, the attacker can access to node that
have secret keys and capable to participate into the communications. Marin, Pawlowski and Jara
(2015) stated that into the outsider attack, the attacker can have no such access to WSN. It is
done by unauthorized node which can eavesdrop into the packets exchanged among the sensor
nodes throughout the communication.
The research context requires of security concerns into WSN such as confidentiality of
data, integrity of data, authentication of data and freshness of the data. The security requirements
are analyzed in this study so that the data which are transmitted into the network should remain
confidential (Zhang, Tang and Luo, 2016). The intended receiver should read the message.
Encryption is used to secure the communication where the data are to be encrypted into secret
words. Whicher, Philbin and Aronson (2018) defined that data integrity means the data reaches
destination without changed by attacker. It makes sure that the data are not changed throughout
the transmission process. Tajeddine, Kayssi and Chehab (2012) argued that data authentication is
key significant requirement of security within WSN. While authentication of message, the
receiver is required to make sure that identity of sender changes the entire data. The receiver is
required to assure that the data are used into decision making process from authorized sources.
Gast and Ledford (2014) stated that data freshness makes sure about the data and old messages
are replayed. It is required that when there is sharing of key strategies.
Document Page
12
RESEARCH METHODS FOR COMPUTING
3.0 Research methodology
The research methodology helps to define the research approaches which are needed to
adopt and attain complete research details to analyze the authentication and security maintenance
in WSN. This study summarizes the theories along with different concepts of security adopted to
complete the research in critical manner. This section provides an overview of various security
challenges, storing of data and ability to access the data for mitigation with use of research
approaches (Flick, 2015). The researcher has performs an in-depth analysis on the selected
research topic.
3.1 Research philosophy
In the research methodology, the researcher used of concept of Positivism to better
analyzes the research topic. This research philosophy is time limited with limitation of role of the
researcher to manipulate the evaluation of data (Silverman, 2016). The research approach is used
to conduct an error free research so that a proper research is to be done.
3.2 Research approach
There are two types of research approach such as deductive as well as inductive
approach. Among this two research approach, deductive approach is to be used to demonstrate
the practical application of research theories to get proper access to the selected research topic
(Smith, 2015). After the researcher considers the deductive approach, a detailed research study is
done. In order to critically analyze the security and authentication maintenance in WSN, the
researcher has selected deductive approach to get better analytical results.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
RESEARCH METHODS FOR COMPUTING
3.3 Research design
The research design is developed to explain the selected research topic so that proper
research design methods are being selected. This design approach helps to select, collect along
with analyze the prototype (Gast and Ledford, 2014). There are three types of research design are
selected such as exploratory, explanatory and descriptive to collect data on analyzing security
and authentication maintenance within WSN. In order to get thoughts to complete the research
topic, there is selection of descriptive design. It describes the events which occur into field of
security applications which influence on wireless networks (Panneerselvam, 2014). The
researcher selects this descriptive design as it gains of extended results of security and
authentication. It helps to define detailed application on the security issues.
3.4 Data sources
Collection of data is required which helps the researcher to design the selected research
topic. Proper data are collected to critically analyze the selected topic. Storck (2013) discussed
that the researcher conducts various fields of study in various research methodologies but the
research is based on data that are analyzed as well as interpreted to get the required information.
There are two types of research sources such as primary and secondary data. For getting of
proper information related to research topic, the data sources are provided results to researcher to
design and outline the security and authentication maintenance procedures (Mundhenk et al.
2017). In this research study, secondary sources are used using both the offline and online
sources in terms of journals, article, books websites, blog etc. The secondary data are those
which are already collected and available from other sources. The data are collected from the
peer reviewed journal articles from the Teeside University library. The keywords are used to
search for the articles into the online library database. This data collection is conducted by
Document Page
14
RESEARCH METHODS FOR COMPUTING
collection of information from various sources of documents and electronically stored
information (Saxena, Choi and Lu, 2016). The research work is mainly aimed to increase
security as well as maintenance level into the wireless network.
3.5 Data analysis techniques
Taylor, Bogdan and DeVault (2015) stated that data analysis is such a process which
inspect, transform and model of data with a goal to get useful information and support of
decision-making. Assis et al. (2012) argued that data analysis has various facts as well as
approaches to encompass the diverse techniques into various business and social science
domains. It is the process to evaluate data by use of analytical techniques to examine the
components of provided data. This is the form of data analysis to complete and conduct the
research experiments. The data from different sources are gathered, reviewed plus analyzed to
some sort of the research findings. There are two types of data analysis techniques such as
qualitative along with quantitative research. For recording of data to provide a better description
of the selected research topic, qualitative data analysis is the best method for the reader to
understand the topic (Short, 2014). In this method, theoretical concepts are to be added into
practical application fields as it leads to the research topic. While, on the other hand, quantitative
data are applied in the statistical field. In this particular research study, qualitative data analysis
is forms of the information which are gathered into non-numeric form. The data are to be
collected in form of explanation, understanding and interpretation of people as well as situations
that are to be invested.
4.0 Evaluation methodology
Mainly, secondary data analysis is used to collect information on various security
methods to secure wireless network. The data are taken from journal articles where it is analyzed
Document Page
15
RESEARCH METHODS FOR COMPUTING
that various cryptographic methods are taken to secure WSN. Public key cryptography is used to
secure the network. There are various defending methods such as DoS attacks, secure
broadcasting and others (Félix, Dias and Clemente, 2017). Selection of cryptographic methods is
vital within WSN as the security services are to be ensured by the cryptography. The methods
which are used within WSN meet with the constraints of sensor nodes which are evaluated by
size of code and data, time to process and consumption of power. Cryptography is an important
field into the security in WSN. It is the method to transfer of private information as well as data
throughout the open network communications such that the receiver can able to read the
encrypted messages those has secret keys (Genemo, 2016). The researcher stated that
authentication is such a service which is used to provide of identity of an entity. This method is
done by identification as well as processes of authentication.
The research is being commenced with the literature survey of symmetric cryptosystem
and the problems which are into the system. The current cryptographic algorithms are advanced
encryption standard, data encryption standard, RSA algorithms which need keys to random for
higher security (Whicher, Philbin and Aronson, 2018). The memory of sensor node is
insufficient to hold of variables. The challenges within security into the sensor networks lie to
conflict interest among reducing the consumption of resources and maximizing the security.
There are security and authentication solutions to the issues of WSN such as hybrid key based
protocols. It provides single key protocols which are not optimal the sensor network technology.
The techniques to solve of secured communication system are constrained environment ( Taylor,
Bogdan and DeVault, 2015). A detailed literature survey is to be done which is followed by
algorithmic approach to protect the confidential data as well as information. Various steps are to
be done for authentication maintenance of WSN such as initial, connection, authenticated and

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
RESEARCH METHODS FOR COMPUTING
disconnection steps. There are different authentication methods and each have different usages.
The research is mainly done on analyzing various security issues into the wireless networks
along with the security solutions to identified issues (Mundhenk et al. 2017). There is need of
secured protocols as well as threat models to secure the data and network from the unauthorized
access. WSN is planned to development along with give sensed data to the network users on
demands. The sensor nodes are being produced with unneeded data. Therefore, the selected
research methodologies are used to evaluate the selected research topic efficiently as well as
properly.
5.0 Schedule and publishing
Following table shows the Gantt chart schedule and timetable for the entire research
study which is carried out for 13 weeks from start to hand up of the work.
Wee
k-1
Wee
k-2
Wee
k-3
Wee
k-4
Wee
k-5
Wee
k-6
Wee
k-7
Wee
k-8
Wee
k-9
Wee
k-10
Wee
k-11
Wee
k-12
Wee
k-13
Selecting
the
research
topic

Creating
a
research
layout

Defining
the
research
questions

Selecting
the
journal
articles
based on
research
Document Page
17
RESEARCH METHODS FOR COMPUTING
topic
Conclusi
on of the
research
results

Prepare
a
research
proposal

Purpose
of the
research

Backgro
und
context

Justificat
ion of
intended
research
methodol
ogy

Evaluati
on of the
research
methodol
ogy

Collectio
n of data
from the
secondar
y sources

Analyzin
g the
collected
data

Findings
of the
Document Page
18
RESEARCH METHODS FOR COMPUTING
data
Conclusi
on of
entire
research
study

Conclusi
on of
entire
research
study

Submissi
on of the
final
work

The selected academic journals are taken from the online library of the university based
on selected research topic. There is selection of proper publication outlet to select journals for the
research study. The goal of this study is to develop comprehensive model of considerations that
the author ought’s to select journal for submission of research document. The academics are
conducting the study and publishing the results (Taylor, Bogdan and DeVault, 2015). Despite
searching for wider range of academic disciplines, it is found that there are two prior research
papers which aimed at selection of journal articles. Both are appeared into the computing
journals. The researcher are not developed any framework and model for the selection of
journals. The article on selecting of journal advised the researcher to consider whether the
journals are considered as peer reviewed and they are published. The related articles address the
process of journal selection based on selected topic (Short, 2014). Most of the journal articles are
based on authentication for wireless sensor networks, implementation for secure communication,
and cryptography-based authentication with identity protection for the wireless networks (Gast

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19
RESEARCH METHODS FOR COMPUTING
and Ledford, 2014). From the articles, the researcher gets data on various authentication methods
which are suitable to secure the security of confidential data. Most of the articles are from
computing publications.
6.0 Professional, legal and ethical issues
While conducting work into the research study, the researcher faces some of the ethical,
legal and professional issues mainly at the time of collecting and gathering of data for the
research. The researcher is required to follow some code of conduct which helps to identify the
right sets of behaviors needed to adopt of the research process. The researcher is tried to analyze
the ai=authentication and security maintenance of WSN and followed the ethical considerations
which help them to add some standards to the study (Saxena, Choi and Lu,, 2016). There are
professional issues which are related to the fact that the data findings are not limited to only
academic purposes. It may be possible that the data are shared with others and it is not used for
professional work such as for the research work. The legal as well as ethical issues form
important component for the modern research which is related to the subject (Genemo, 2016).
The researcher should review international guidelines as well as regulations to exist issues
related to informed content, data confidentiality and research misconduct.
The ethical along with legal issues are related to conduct of research which involves the
human participants that raise concerns for the policy makers. The purpose of this research study
is to collect as well as analyze of data from the conclusions which are drawn to improve the
security issues in wireless networks (Whicher, Philbin and Aronson, 2018). The local regulatory
policy makers ensure that the research is to be conducted ethically along with legally. The
researcher is upload code of ethics which is regulated by strict guidelines. Duty of confidentiality
is the main concern of public interest as well as individual interest assessments due to hacking
Document Page
20
RESEARCH METHODS FOR COMPUTING
and stealing of confidential information (Félix, Dias and Clemente, 2017). The ethical guidelines
are not subjective, and it regulates of code of ethics that enforce disciplinary processes for the
researcher.
Document Page
21
RESEARCH METHODS FOR COMPUTING
References
Part 1: Literature Review
Gódor, G., Jako, Z., Knapp, A. and Imre, S., (2015). A survey of handover management in
LTE-based multi-tier femtocell networks: Requirements, challenges and solutions. Computer
Networks, 76, pp.17-41.
Gope, P. and Hwang, T., (2016). A realistic lightweight anonymous authentication protocol for
securing real-time application data access in wireless sensor networks. IEEE Transactions on
industrial electronics, 63(11), pp.7124-7132.
Han, Q., Zhang, Y., Chen, X., Li, H. and Quan, J., (2014). Efficient and robust identity based
handoff authentication for EAPbased wireless networks. Concurrency and Computation:
Practice and Experience, 26(8), pp.1561-1573.
He, D., Chan, S., Tang, S. and Guizani, M., (2013). Secure data discovery and dissemination
based on hash tree for wireless sensor networks. IEEE transactions on wireless
communications, 12(9), pp.4638-4646.
Ilango, P., (2015). Secure authentication and integrity techniques for randomized secured
routing in WSN. Wireless Networks, 21(2), pp.443-451.
Kumaresan, G. and Macriga, T.A., (2017). Group key authentication scheme for vanet intrusion
detection (GKAVIN). Wireless Networks, 23(3), pp.935-945.
Kumari, S. and Om, H., 2016. Authentication protocol for wireless sensor networks applications
like safety monitoring in coal mines. Computer Networks, 104, pp.137-154.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22
RESEARCH METHODS FOR COMPUTING
Marin, L., Pawlowski, M.P. and Jara, A., (2015). Optimized ECC implementation for secure
communication between heterogeneous IoT devices. Sensors, 15(9), pp.21478-21499.
Rajeswari, S.R. and Seenivasagam, V., (2016). Comparative study on various authentication
protocols in wireless sensor networks. The Scientific World Journal, 2016.
Sahoo, P.K., (2012). Efficient security mechanisms for mHealth applications using wireless
body sensor networks. Sensors, 12(9), pp.12606-12633.
Sang, L. and Arora, A., (2012). A shared-secret free security infrastructure for wireless
networks. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 7(2), p.23.
Senthil Kumaran, U., (2015). Key pre distribution for authentic in randomized secure routing
for wireless sensor networks.
Tajeddine, A., Kayssi, A. and Chehab, A., (2012), July. CENTER: A Centralized Trust-Based
Efficient Routing protocol for wireless sensor networks. In Privacy, Security and Trust (PST),
(2012) Tenth Annual International Conference on(pp. 195-202). IEEE.
Tajeddine, A., Kayssi, A., Chehab, A., Elhajj, I. and Itani, W., (2015). CENTERA: a centralized
trust-based efficient routing protocol with authentication for wireless sensor
networks. Sensors, 15(2), pp.3299-3333.
Xu, L., He, Y., Chen, X. and Huang, X., (2014). Ticket-based handoff authentication for
wireless mesh networks. Computer Networks, 73, pp.185-194.
Zhang, L., Tang, S. and Luo, H., (2016). Elliptic curve cryptography-based authentication with
identity protection for smart grids. PloS one, 11(3), p.e0151253.
Document Page
23
RESEARCH METHODS FOR COMPUTING
Part 2: Project Proposal
Assis, F.M., Stojanovic, A., Mateus, P. and Omar, Y., (2012). Improving classical authentication
over a quantum channel. Entropy, 14(12), pp.2531-2549.
Campbell, C., Pollock, K., Briscoe, P., Carr-Harris, S. and Tuters, S., (2017). Developing a
knowledge network for applied education research to mobilise evidence in and for educational
practice. Educational Research, 59(2), pp.209-227.
Felix, S., Dias, N. and Clemente, V., (2017). Designing for additive manufacturing technologies:
a design research methodology. The Design Journal, 20(sup1), pp.S4754-S4757.
Flick, U., (2015). Introducing research methodology: A beginner's guide to doing a research
project. Sage.
Gast, D.L. and Ledford, J.R. eds., (2014). Single case research methodology: Applications in
special education and behavioral sciences. Routledge.
Genemo, H., (2016). A Design Science Research Methodology for Expert Systems
Development. Australasian Journal of Information Systems, 20.
Holambe, S.N., Shinde, U.B. and Biradar, S.S., (2015). Maintenance of Topology in
Publish/Subscribe Systems. International Journal of Computer Applications, 121(12).
Marin, L., Pawlowski, M.P. and Jara, A., (2015). Optimized ECC implementation for secure
communication between heterogeneous IoT devices. Sensors, 15(9), pp.21478-21499.
Document Page
24
RESEARCH METHODS FOR COMPUTING
Mundhenk, P., Paverd, A., Mrowca, A., Steinhorst, S., Lukasiewycz, M., Fahmy, S.A. and
Chakraborty, S., (2017). System Level Design Approaches to Security in Automotive
Networks. arXiv preprint arXiv:1703.03652.
Oates, B.J. (2006) “Researching Information Systems and Computing”, Sage: London
Panneerselvam, R., (2014). Research methodology. PHI Learning Pvt. Ltd..
Saxena, N., Choi, B.J. and Lu, R., (2016). Authentication and authorization scheme for various
user roles and devices in smart grid. IEEE transactions on information forensics and
security, 11(5), pp.907-921.
Short, T., (2014). Research methodology: A step-bystep guide for beginners [Book
Review]. International Journal of Training Research, The, 12(2), p.158.
Silverman, D. ed., (2016). Qualitative research. Sage.
Smith, J.A. ed., (2015). Qualitative psychology: A practical guide to research methods. Sage.
Storck, P.E., (2013), April. Benefits of commercial data link security. In Integrated
Communications, Navigation and Surveillance Conference (ICNS), 2013 (pp. 1-6). IEEE.
Tajeddine, A., Kayssi, A. and Chehab, A., (2012), July. CENTER: A Centralized Trust-Based
Efficient Routing protocol for wireless sensor networks. In Privacy, Security and Trust (PST),
(2012) Tenth Annual International Conference on(pp. 195-202). IEEE.
Tajeddine, A., Kayssi, A., Chehab, A., Elhajj, I. and Itani, W., (2015). CENTERA: a centralized
trust-based efficient routing protocol with authentication for wireless sensor
networks. Sensors, 15(2), pp.3299-3333.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
25
RESEARCH METHODS FOR COMPUTING
Taylor, S.J., Bogdan, R. and DeVault, M., (2015). Introduction to qualitative research methods:
A guidebook and resource. John Wiley & Sons.
Whicher, D., Philbin, S. and Aronson, N., (2018). An overview of the impact of rare disease
characteristics on research methodology. Orphanet journal of rare diseases, 13(1), p.14.
Zhang, L., Tang, S. and Luo, H., (2016). Elliptic curve cryptography-based authentication with
identity protection for smart grids. PloS one, 11(3), p.e0151253.
1 out of 26
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]