{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:34:12Z","timestamp":1762508052736},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T00:00:00Z","timestamp":1584144000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T00:00:00Z","timestamp":1584144000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11277-020-07215-3","type":"journal-article","created":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T15:02:30Z","timestamp":1584198150000},"page":"1217-1229","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Stream-Based Authentication Strategy Using IoT Sensor Data in Multi-homing Sub-aqueous Big Data Network"],"prefix":"10.1007","volume":"116","author":[{"given":"Nawab Muhammad Faseeh","family":"Qureshi","sequence":"first","affiliation":[]},{"given":"Isma Farah","family":"Siddiqui","sequence":"additional","affiliation":[]},{"given":"Asad","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Ali Kashif","family":"Bashir","sequence":"additional","affiliation":[]},{"given":"Choon Sung","family":"Nam","sequence":"additional","affiliation":[]},{"given":"Bhawani Shankar","family":"Chowdhry","sequence":"additional","affiliation":[]},{"given":"Muhammad Aslam","family":"Uqaili","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,14]]},"reference":[{"issue":"2","key":"7215_CR1","first-page":"21","volume":"52","author":"S LaValle","year":"2011","unstructured":"LaValle, S., et al. (2011). Big data, analytics and the path from insights to value. MIT Sloan Management Review, 52(2), 21.","journal-title":"MIT Sloan Management Review"},{"key":"7215_CR2","unstructured":"Cloudera. (2016). The modern platform for data management and analytics, Cloudera. Retrieved June 05, 2018,from http:\/\/www.cloudera.com\/."},{"key":"7215_CR3","unstructured":"M. Technologies. (2016). Featured customers. Retrieved June 05, 2018, from https:\/\/www.mapr.com\/."},{"key":"7215_CR4","unstructured":"Welcome to Apache$$^{{\\rm TM}}$$ Hadoop$${\\textregistered }$$!. (2014). Retrieved June 05, 2018, from http:\/\/hadoop.apache.org\/."},{"key":"7215_CR5","unstructured":"Apache Hadoop 2.7.2 \u2013 Apache Hadoop YARN. (2016). Retrieved June 05, 2018, from https:\/\/hadoop.apache.org\/docs\/r2.7.2\/hadoop-yarn\/hadoop-yarn-site\/YARN.html."},{"key":"7215_CR6","unstructured":"Apache Hadoop 2.7.2 \u2013 MapReduce Tutorial. (2016). Retrieved June 05, 2018, from https:\/\/hadoop.apache.org\/docs\/stable\/hadoop-mapreduce-client\/hadoop-mapreduce-client-core\/MapReduceTutorial.html."},{"key":"7215_CR7","unstructured":"Apache Hadoop 2.7.2 \u2013 HDFS users guide. (2016). Retrieved June 05, 2018, from https:\/\/hadoop.apache.org\/docs\/stable\/hadoop-project-dist\/hadoop-hdfs\/HdfsUserGuide.html."},{"issue":"9","key":"7215_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"BC Neuman","year":"1994","unstructured":"Neuman, B. C., & Ts\u2019o, T. (1994). Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9), 33\u201338.","journal-title":"IEEE Communications Magazine"},{"key":"7215_CR9","doi-asserted-by":"crossref","unstructured":"Wang, G., Ng, T. S., & Shaikh, A. (2012). Programming your network at run-time for big data applications. In Proceedings of the first workshop on hot topics in software defined networks. ACM.","DOI":"10.1145\/2342441.2342462"},{"key":"7215_CR10","unstructured":"Apache Hadoop 2.7.2 - HDFS NFS gateway. (2016). Retrieved June 05, 2018, from https:\/\/hadoop.apache.org\/docs\/r2.7.2\/hadoop-project-dist\/hadoop-hdfs\/HdfsNfsGateway.html."},{"issue":"7","key":"7215_CR11","first-page":"1353","volume":"95","author":"NMF Qureshi","year":"2017","unstructured":"Qureshi, N. M. F.,  Shin, D. R., Siddiqui, I. F. (2017). Key exchange authentication protocol for NFS enabled HDFS client. Journal of Theoretical & Applied Information Technology, 95(7), 1353.","journal-title":"Journal of Theoretical & Applied Information Technology"},{"key":"7215_CR12","doi-asserted-by":"crossref","unstructured":"Alharbi, A., Ammar, R., Alhumyani, H., Rajasekaran, S., & Jun-Hong. (2014). Efficient pipeline architectures for underwater big data analytic. In 2014 IEEE international symposium on signal processing and information technology (ISSPIT) (pp. 000161\u2013000166). Noida.","DOI":"10.1109\/ISSPIT.2014.7300581"},{"key":"7215_CR13","first-page":"735","volume-title":"Towards a more secure Apache Hadoop HDFS infrastructure. Lecture notes in computer science","author":"J Cohen","year":"2013","unstructured":"Cohen, J., & Acharya, S. (2013). Towards a more secure Apache Hadoop HDFS infrastructure. Lecture notes in computer science (pp. 735\u2013741). Berlin: Springer."},{"key":"7215_CR14","unstructured":"Boldyreva, A. (2003). Threshold signatures, multisignatures and blind signatures based on the Gap\u2013Diffie\u2013Hellman-Group signature scheme. In Public key cryptography\u2014PKC (Vol. 2002, pp. 31\u201346). Berlin: Springer."},{"issue":"213","key":"7215_CR15","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1090\/S0025-5718-96-00670-9","volume":"65","author":"H Dubner","year":"1996","unstructured":"Dubner, H. (1996). Large Sophie Germain primes. Mathematics of Computation of the American Mathematical Society, 65(213), 393\u2013396.","journal-title":"Mathematics of Computation of the American Mathematical Society"},{"issue":"10","key":"7215_CR16","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1090\/S0002-9904-1932-05521-5","volume":"38","author":"DH Lehmer","year":"1932","unstructured":"Lehmer, D. H. (1932). On Euler\u2019s totient function. Bulletin of the American Mathematical Society, 38(10), 745\u2013751.","journal-title":"Bulletin of the American Mathematical Society"},{"key":"7215_CR17","unstructured":"Bellare, M., & Miner, S. K. (1999). A forward-secure digital signature scheme. In Annual international cryptology conference. Berlin: Springer."},{"issue":"9","key":"7215_CR18","first-page":"4063","volume":"10","author":"NMF Qureshi","year":"2016","unstructured":"Qureshi, N. M. F., & Shin, D. R. (2016). RDP: A storage-tier-aware robust data placement strategy for Hadoop in a cloud-based heterogeneous environment. KSII Transactions on Internet and Information Systems, 10(9), 4063\u20134086.","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"7215_CR19","unstructured":"Sub-aqueous IoT Dataset. (2018). Retrieved June 05, 2018, from https:\/\/data.world\/datasets\/sensors."},{"key":"7215_CR20","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-19294-4_9","volume-title":"New frontiers in information and software as services","author":"S Huang","year":"2011","unstructured":"Huang, S., et al. (2011). The HiBench benchmark suite: Characterization of the MapReduce-based data analysis. In D. Agrawal, K. S. Candan, & W. S. Li (Eds.), New frontiers in information and software as services (pp. 209\u2013228). Berlin: Springer."},{"key":"7215_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-319-27763-9_2","volume-title":"Big data concepts, theories, and applications","author":"S Mazumder","year":"2016","unstructured":"Mazumder, S. (2016). Big data tools and platforms. In S. Yu & S. Guo (Eds.), Big data concepts, theories, and applications (pp. 29\u2013128). Berlin: Springer."},{"key":"7215_CR22","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cageo.2016.05.012","volume":"94","author":"S Magana-zook","year":"2016","unstructured":"Magana-zook, S., et al. (2016). Large-scale seismic waveform quality metric calculation using Hadoop. Computers & Geosciences, 94, 18\u201330.","journal-title":"Computers & Geosciences"},{"issue":"1","key":"7215_CR23","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s11277-019-06264-7","volume":"106","author":"IF Siddiqui","year":"2019","unstructured":"Siddiqui, I. F., Qureshi, N. M. F., Chowdhry, B. S., & Uqaili, M. A. (2019). Edge-node-aware adaptive data processing framework for smart grid. Wireless Personal Communications, 106(1), 179\u2013189.","journal-title":"Wireless Personal Communications"},{"key":"7215_CR24","doi-asserted-by":"crossref","unstructured":"Qureshi, N. M. F., Siddiqui, I. F., Abbas, A., Bashir, A. K., Choi, K., Kim, J., et al. (2019). Dynamic container-based resource management framework of spark ecosystem. In 2019 21st international conference on advanced communication technology (ICACT) (pp. 522\u2013526). IEEE.","DOI":"10.23919\/ICACT.2019.8701970"},{"key":"7215_CR25","doi-asserted-by":"crossref","unstructured":"Qureshi, N. M. F., Bashir, A. K., Siddiqui, I. F., Abbas, A., Choi, K., & Shin, D. R. (2018). A knowledge-based path optimization technique for cognitive nodes in smart grid. In 2018 IEEE global communications conference (GLOBECOM) (pp. 1\u20136). IEEE.","DOI":"10.1109\/GLOCOM.2018.8648016"},{"key":"7215_CR26","doi-asserted-by":"publisher","first-page":"2225","DOI":"10.1007\/s11277-018-5936-6","volume":"106","author":"NMF Qureshi","year":"2019","unstructured":"Qureshi, N. M. F., Siddiqui, I. F., Unar, M. A., Uqaili, M. A., Nam, C. S., Shin, D. R., et al. (2019). An aggregate mapreduce data block placement strategy for wireless IoT edge nodes in smart grid. Wireless Personal Communications, 106(4), 2225\u20132236.","journal-title":"Wireless Personal Communications"},{"key":"7215_CR27","doi-asserted-by":"publisher","first-page":"13742","DOI":"10.1109\/ACCESS.2017.2725318","volume":"5","author":"NMF Qureshi","year":"2017","unstructured":"Qureshi, N. M. F., Shin, D. R., Siddiqui, I. F., & Chowdhry, B. S. (2017). Storage-tag-aware scheduler for hadoop cluster. IEEE Access, 5, 13742\u201313755.","journal-title":"IEEE Access"},{"issue":"4","key":"7215_CR28","doi-asserted-by":"publisher","first-page":"1969","DOI":"10.1007\/s11277-018-5739-9","volume":"106","author":"IF Siddiqui","year":"2019","unstructured":"Siddiqui, I. F., Qureshi, N. M. F., Shaikh, M. A., Chowdhry, B. S., Abbas, A., Bashir, A. K., et al. (2019). Stuck-at fault analytics of IoT devices using knowledge-based data processing strategy in smart grid. Wireless Personal Communications, 106(4), 1969\u20131983.","journal-title":"Wireless Personal Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07215-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07215-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07215-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,14]],"date-time":"2021-03-14T00:27:28Z","timestamp":1615681648000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07215-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,14]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["7215"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07215-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,14]]},"assertion":[{"value":"14 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}