Adebusola Balogun | Carleton University (original) (raw)

Uploads

Papers by Adebusola Balogun

Research paper thumbnail of Efficient Spectrum Utilization in Cellular Networks Mobile Computing Systems Project Report

Bookmarks Related papers MentionsView impact

Drafts by Adebusola Balogun

Research paper thumbnail of SECURITY IN SURVIVABLE EPON SURVIVABLE OPTICAL NETWORKS PROJECT REPORT by BALOGUN ADEBUSOLA

Abstract - Today, EPON is recognized as one of the best candidates for future next generation (NG... more Abstract - Today, EPON is recognized as one of the best candidates for future next generation (NG) access network technologies, as a result of its cost-effectiveness in fiber optic network architecture and ethernet technology. The survivability and security mechanisms of the Ethernet Passive Optical Network (EPON) are extensively discussed in this research. Security techniques in EPON combat attacks by improving MAC protocols and encryption methods. This paper entails illustrations of different security attacks and threats, as well as prevention techniques for eavesdropping and other potential issues faced in EPON.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Cloud and Fog Computing for IoT

– Over the past few years, the pervasive deployment of Cloud computing has tremendously impacted ... more – Over the past few years, the pervasive deployment of Cloud computing has tremendously impacted the IT industry, due to its compute, storage, and processing power. However, the integration of the Internet of Things (IoT) and Cloud Computing has been a hot topic for many researchers (also known as CloudIoT), in relation to their complementarity. IoT, known as one of the major sources of Big data has limitations like insufficient storage, computational power, and security, which are partially resolved by the Cloud. Although, the emergence of an extension of the Cloud computing paradigm to the edge of the network, called Fog/Edge Computing, has been touted to be a better option as it is said to bring the cloud closer to the ground and efficiently tackle the limitations of Cloud Computing. In this paper, both Cloud and Fog computing techniques are explored, their comparisons, advantages, limitations, and extensive review of the current state-of-the-art in both cases are discussed. Implementation of the transfer of big data from an IoT device to the cloud, using the Fog Computing technique is demonstrated.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Security in Distributed Systems

– Ever since the emergence of computers, technology and the Internet, security has been a major l... more – Ever since the emergence of computers, technology and the Internet, security has been a major limitation faced in various paradigms. Hadoop, which was created by Doug Cutting for Google is now widely used in different platforms like Facebook, Yahoo!, and other applications, which require a high level of information security. Authentication, being one of the major goals of information security, would be implemented in this project using Security Assertion Markup Language (SAML) tokens. SAML increases security by eliminating additional credentials that will terminate opportunities for identity theft, and guarantee authentication (verifying identity). This survey will discuss an extensive review of the current state-of-the-art and the use cases of SAML tokens for authentication and other applications in which it is useful, its challenges, as well as its proven efficiency in past and recent works.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Efficient Spectrum Utilization in Cellular Networks Mobile Computing Systems Project Report

Bookmarks Related papers MentionsView impact

Research paper thumbnail of SECURITY IN SURVIVABLE EPON SURVIVABLE OPTICAL NETWORKS PROJECT REPORT by BALOGUN ADEBUSOLA

Abstract - Today, EPON is recognized as one of the best candidates for future next generation (NG... more Abstract - Today, EPON is recognized as one of the best candidates for future next generation (NG) access network technologies, as a result of its cost-effectiveness in fiber optic network architecture and ethernet technology. The survivability and security mechanisms of the Ethernet Passive Optical Network (EPON) are extensively discussed in this research. Security techniques in EPON combat attacks by improving MAC protocols and encryption methods. This paper entails illustrations of different security attacks and threats, as well as prevention techniques for eavesdropping and other potential issues faced in EPON.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Cloud and Fog Computing for IoT

– Over the past few years, the pervasive deployment of Cloud computing has tremendously impacted ... more – Over the past few years, the pervasive deployment of Cloud computing has tremendously impacted the IT industry, due to its compute, storage, and processing power. However, the integration of the Internet of Things (IoT) and Cloud Computing has been a hot topic for many researchers (also known as CloudIoT), in relation to their complementarity. IoT, known as one of the major sources of Big data has limitations like insufficient storage, computational power, and security, which are partially resolved by the Cloud. Although, the emergence of an extension of the Cloud computing paradigm to the edge of the network, called Fog/Edge Computing, has been touted to be a better option as it is said to bring the cloud closer to the ground and efficiently tackle the limitations of Cloud Computing. In this paper, both Cloud and Fog computing techniques are explored, their comparisons, advantages, limitations, and extensive review of the current state-of-the-art in both cases are discussed. Implementation of the transfer of big data from an IoT device to the cloud, using the Fog Computing technique is demonstrated.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Security in Distributed Systems

– Ever since the emergence of computers, technology and the Internet, security has been a major l... more – Ever since the emergence of computers, technology and the Internet, security has been a major limitation faced in various paradigms. Hadoop, which was created by Doug Cutting for Google is now widely used in different platforms like Facebook, Yahoo!, and other applications, which require a high level of information security. Authentication, being one of the major goals of information security, would be implemented in this project using Security Assertion Markup Language (SAML) tokens. SAML increases security by eliminating additional credentials that will terminate opportunities for identity theft, and guarantee authentication (verifying identity). This survey will discuss an extensive review of the current state-of-the-art and the use cases of SAML tokens for authentication and other applications in which it is useful, its challenges, as well as its proven efficiency in past and recent works.

Bookmarks Related papers MentionsView impact