Effective and Secure vWSN Applications in a Virtualized Cloud Computing Environment

Main Article Content

Mohammad Equebal Hussain
Mohammed Qayyum
Mohammad Rashid Hussain
Rashid Hussain


Security is one of the key concerns in cloud computing. We are proposing Virtual Wireless Sensor Network (vWSN) which is one of the key features of cloud computing in the area of agriculture. Our main focuses are effective and secure vWSN in virtualized cloud computing environment with enhanced security to detect environmental monitoring, humidity monitoring, soil moisture, air quality (pollution) monitoring, insect monitoring, pest and disease control, which is based on virtualization and cloud computing technology, centrally managed device having flexible and configurable parameter with less maintenance and operational cost. To the best of our knowledge, vWSN is the first approach to agriculture based on extensional WSN information. WSN contains both control plane (signaling) and data plane (forwarding) coupled together.WSN is a specific purpose computer containing hardware whose main components are memory, CPU, IO, registers, Data and address bus, timer, sensor, computing logic and decision making logic. WSN is a physical device which needs to be placed in the field in certain topology (Ring, mesh, tree, star) which may need to be protected for damage and erosion due to various parameter including but not limited to physical theft, damage due to weather, animal and various other reason. In this paper our approach is to propose virtualized model to replace physical wireless sensor network (WSN) to virtual machine (VM) based vWSN which can be deployed on the cloud. Since security is one of the major concern for VM in cloud computing therefore we also proposed the enhanced 3-tier security model for vWSN.

Article Details

How to Cite
Hussain, M. E., Qayyum, M., Hussain, M. R., & Hussain, R. (2022). Effective and Secure vWSN Applications in a Virtualized Cloud Computing Environment. International Journal of Communication Networks and Information Security (IJCNIS), 11(2). https://doi.org/10.17762/ijcnis.v11i2.3920 (Original work published August 17, 2019)
Research Articles