Fog-cloud computing is a promising distributed model for hosting ever-increasing Internet of Things (IoT) applications. IoT applications should meet different characteristics such as deadline, frequency rate, and input file size. Fog nodes are heterogeneous, resource-limited devices and cannot accommodate all the IoT applications. Due to these difficulties, designing an efficient algorithm to deploy a set of IoT applications in a fog-cloud environment is very important. In this paper, a fuzzy approach is developed to classify applications based on their characteristics then an efficient heuristic algorithm is proposed to place applications on the virtualized computing resources. The proposed policy aims to provide a high quality of service for IoT users while the profit of fog service providers is maximized by minimizing resource wastage. Extensive simulation experiments are conducted to evaluate the performance of the proposed policy. Results show that the proposed policy outperforms other approaches by improving the average response time up to 13%, the percentage of deadline satisfied requests up to 12%, and the resource wastage up to 26%.
相似文献Attribute-based encryption (ABE) is an access control mechanism that ensures efficient data sharing among dynamic groups of users by setting up access structures indicating who can access what. However, ABE suffers from expensive computation and privacy issues in resource-constrained environments such as IoT devices. In this paper, we present SHARE-ABE, a novel collaborative approach for preserving privacy that is built on top of Ciphertext-Policy Attribute-Based Encryption (CP-ABE). Our approach uses Fog computing to outsource the most laborious decryption operations to Fog nodes. The latter collaborate to partially decrypt the data using an original and efficient chained architecture. Additionally, our approach preserves the privacy of the access policy by introducing false attributes. Furthermore, we introduce a new construction of a collaboration attribute that allows users within the same group to combine their attributes while satisfying the access policy. Experiments and analyses of the security properties demonstrate that the proposed scheme is secure and efficient especially for resource-constrained IoT devices.
相似文献Background
Computer Networks have a tendency to grow at an unprecedented scale. Modern networks involve not only computers but also a wide variety of other interconnected devices ranging from mobile phones to other household items fitted with sensors. This vision of the "Internet of Things" (IoT) implies an inherent difficulty in modeling problems.Purpose
It is practically impossible to implement and test all scenarios for large-scale and complex adaptive communication networks as part of Complex Adaptive Communication Networks and Environments (CACOONS). The goal of this study is to explore the use of Agent-based Modeling as part of the Cognitive Agent-based Computing (CABC) framework to model a Complex communication network problem.Method
We use Exploratory Agent-based Modeling (EABM), as part of the CABC framework, to develop an autonomous multi-agent architecture for managing carbon footprint in a corporate network. To evaluate the application of complexity in practical scenarios, we have also introduced a company-defined computer usage policy.Results
The conducted experiments demonstrated two important results: Primarily CABC-based modeling approach such as using Agent-based Modeling can be an effective approach to modeling complex problems in the domain of IoT. Secondly, the specific problem of managing the Carbon footprint can be solved using a multiagent system approach. 相似文献The radical shift in the technology with the advent of connected things has led to the significant proliferation in demand for IoT devices, commonly called ‘smart devices’. These devices are capable of data collection, which can help in umpteen applications, particularly in healthcare. With the tremendous growth in these resource-constrained end devices, there has been a substantial increase in the number of attack varieties. Since these end devices deal with the sensitive data that might cause severe damage if not handled properly. Hence, defending its integrity, preserving its privacy, and maintaining its confidentiality as well as availability is of utmost importance. However, there are many protocols, models, architecture tools, etc. proposed to provide security. Nevertheless, almost every solution propound so far is not fully resilient and lacks in giving full protection to the system in some way or the other. So here, we have proposed a lightweight anonymous mutual authentication scheme for end devices and fog nodes.
相似文献Many consumers participate in the smart city via smart portable gadgets such as wearables, personal gadgets, mobile devices, or sensor systems. In the edge computation systems of IoT in the smart city, the fundamental difficulty of the sensor is to pick reliable participants. Since not all smart IoT gadgets are dedicated, certain intelligent IoT gadgets might destroy the networks or services deliberately and degrade the customer experience. A trust-based internet of things (TM-IoT) cloud computing method is proposed in this research. The problem is solved by choosing trustworthy partners to enhance the quality services of the IoT edging network in the Smart architectures. A smart device choice recommendation method based on the changing networks was developed. It applied the evolutionary concept of games to examine the reliability and durability of the technique of trust management presented in this article. The reliability and durability of the trustworthiness-managing system, the Lyapunov concept was applied.A real scenario for personal-health-control systems and air-qualitymonitoring and assessment in a smart city setting confirmed the efficiency of the confidence-management mechanism. Experiments have demonstrated that the methodology for trust administration suggested in this research plays a major part in promoting multi-intelligent gadget collaboration in the IoT edge computer system with an efficiency of 97%. It resists harmful threads against service suppliers more consistently and is ideal for the smart world's massive IoT edge computer system.
相似文献Transmitting electronic medical records (EMR) and other communication in modern Internet of Things (IoT) healthcare ecosystem is both delay and integrity-sensitive. Transmitting and computing volumes of EMR data on traditional clouds away from healthcare facilities is a main source of trust-deficit using IoT-enabled applications. Reliable IoT-enabled healthcare (IoTH) applications demand careful deployment of computing and communication infrastructure (CnCI). This paper presents a FOG-assisted CnCI model for reliable healthcare facilities. Planning a secure and reliable CnCI for IoTH networks is a challenging optimization task. We proposed a novel mathematical model (i.e., integer programming) to plan FOG-assisted CnCI for IoTH networks. It considers wireless link interfacing gateways as a virtual machine (VM). An IoTH network contains three wirelessly communicating nodes: VMs, reduced computing power gateways (RCPG), and full computing power gateways (FCPG). The objective is to minimize the weighted sum of infrastructure and operational costs of the IoTH network planning. Swarm intelligence-based evolutionary approach is used to solve IoTH networks planning for superior quality solutions in a reasonable time. The discrete fireworks algorithm with three local search methods (DFWA-3-LSM) outperformed other experimented algorithms in terms of average planning cost for all experimented problem instances. The DFWA-3-LSM lowered the average planning cost by 17.31%, 17.23%, and 18.28% when compared against discrete artificial bee colony with 3 LSM (DABC-3-LSM), low-complexity biogeography-based optimization (LC-BBO), and genetic algorithm, respectively. Statistical analysis demonstrates that the performance of DFWA-3-LSM is better than other experimented algorithms. The proposed mathematical model is envisioned for secure, reliable and cost-effective EMR data manipulation and other communication in healthcare.
相似文献Real-time accurate traffic congestion prediction can enable Intelligent traffic management systems (ITMSs) that replace traditional systems to improve the efficiency of traffic and reduce traffic congestion. The ITMS consists of three main layers, which are: Internet of Things (IoT), edge, and cloud layers. Edge can collect real-time data from different routes through IoT devices such as wireless sensors, and then it can compute and store this collected data before transmitting them to the cloud for further processing. Thus, an edge is an intermediate layer between IoT and cloud layers that can receive the transmitted data through IoT to overcome cloud challenges such as high latency. In this paper, a novel real-time traffic congestion prediction strategy (TCPS) is proposed based on the collected data in the edge’s cache server at the edge layer. The proposed TCPS contains three stages, which are: (i) real-time congestion prediction (RCP) stage, (ii) congestion direction detection (CD2) stage, and (iii) width change decision (WCD) stage. The RCP aims to predict traffic congestion based on the causes of congestion in the hotspot using a fuzzy inference system. If there is congestion, the CD2 stage is used to detect the congestion direction based on the predictions from the RCP by using the Optimal Weighted Naïve Bayes (OWNB) method. The WCD stage aims to prevent the congestion occurrence in which it is used to change the width of changeable routes (CR) after detecting the direction of congestion in CD2. The experimental results have shown that the proposed TCPS outperforms other recent methodologies. TCPS provides the highest accuracy, precision, and recall. Besides, it provides the lowest error, with values equal to 95%, 74%, 75%, and 5% respectively.
相似文献The use of cloud-edge technology creates significant potential for cost reduction, efficiency and resource management. These features have encouraged users and organizations to use intelligence federated cloud-edge paradigm in Internet of Things (IoT). Human Resource Management (HRM) is one of the important challenges in federated cloud-edge computing. Since hardware and software resources in the edge environment are allocated for responding human requests, selecting optimal resources based on Quality of Service (QoS) factors is a critical and important issue in the IoT environments. The HRM can be considered as an NP-problem in a way that with proper selection, allocation and monitoring resource, system efficiency increases and response time decreases. In this study, an optimization model is presented for the HRM problem using Whale Optimization Algorithm (WOA) in cloud-edge computing. Experimental results show that the proposed model was able to improve minimum response time, cost of allocation and increasing number of allocated human resources in two different scenarios compared to the other meta-heuristic algorithms.
相似文献The life-cycle assessment (LCA) method is typically applied to products, but the potential and demand for extending its use also to other applications are high. In this respect, this paper proposes an LCA concept to be used for the assessment of human beings as new study objects, namely Life-LCA. Key challenges of such a new approach and potential solutions for those are identified and discussed.
MethodsThe Life-LCA concept was developed based on a detailed desktop research. Several Life-LCA-specific challenges were identified and categorized under three research questions. One of these questions focusses on the conceptual design of a Life-LCA method while the others are addressing operational issues, which are the definition of the new study system and the practical assessment of complex human consumption behaviors. Methodological solutions are proposed, e.g., based on suggestions provided in the existing methods product LCA and organizational LCA (O-LCA).
Results and discussionConceptual challenges arise from the general diversity, complexity, and temporal development of human lives and consumption behaviors. We introduce Life-LCA as a two-dimensional method that covers both, the new human life cycle (dimension 1) and the life cycle of the consumed products (dimension 2). Furthermore, the two types Individual Life-LCA and Lifestyle-LCA are differentiated. Especially, the definition of a general system boundary for Life-LCA and data collection and evaluation face many operational challenges. For example, the social behavior of human beings is a new factor to be considered which causes new allocation problems in LCA. Moreover, the high demand for aggregated LCA data requires specific rules for data collection and evaluation as well as a new bottom-up product clustering scheme.
ConclusionsLife-LCA, either used for the assessment of individual lives or lifestyles, has the potential to raise environmental awareness of people by making their specific environmental impacts comprehensively measurable and thus, tangible. However, many challenges need to be solved in future interdisciplinary research to develop a robust and applicable method. This paper conceptualizes such an approach and proposes solutions that can serve as a framework for ongoing method development.
相似文献Non-orthogonal multiple access (NOMA) along with cognitive radio (CR) have been recently configured as potential solutions to fulfill the extraordinary demands of the fifth generation (5G) and beyond (B5G) networks and support the Internet of Thing (IoT) applications. Multiple users can be served within the same orthogonal domains in NOMA via power-domain multiplexing, whilst CR allows secondary users (SUs) to access the licensed spectrum frequency. This work investigates the possibility of combining orthogonal frequency division multiple access (OFDMA), NOMA, and CR, referred to as hybrid OFDMA-NOMA CR network. With this hybrid technology, the licensed frequency is divided into several channels, such as a group SUs is served in each channel based on NOMA technology. In particular, a rate-maximization framework is developed, at which user pairing at each channel, power allocations for each user, and secondary users activities are jointly considered to maximize the sum-rate of the hybrid OFDMA-NOMA CR network, while maintaining a set of relevant NOMA and CR constraints. The developed sum-rate maximization framework is NP-hard problem, and cannot be solved through classical approaches. Accordingly, we propose a two-stage approach; in the first stage, we propose a novel user pairing algorithm. With this, an iterative algorithm based on the sequential convex approximation is proposed to evaluate the solution of the non-convex rate-maximization problem, in the second stage. Results show that our proposed algorithm outperforms the existing schemes, and CR network features play a major role in deciding the overall network’s performance.
相似文献This paper aims to demonstrate how LCA can be improved by the use of linear programming (LP) (i) to determine the optimal choice between new technologies, (ii) to identify the optimal region for supplying the feedstock, and (iii) to deal with multifunctional processes without specifying a certain main product. Furthermore, the contribution of LP in the context of consequential LCA and LCC is illustrated.
MethodsWe create a mixed integer linear program (MILP) for the environmental and economic assessment of new technologies. The model is applied in order to analyze two residual beech wood-based biorefinery concepts in Germany. In terms of the optimal consequences for the system under study, the principle of the program is to find a scaling vector that minimizes the life cycle impact indicator results of the system. We further transform the original linear program to extend the assessment by life cycle costing (LCC). Thereby, two multi-objective programming methods are used, weighted goal programming and epsilon constraint method.
Results and discussionThe consequential case studies demonstrate the possibility to determine optimal locations of newly developed technologies. A high number of potential system modifications can be studied simultaneously without matrix inversion. The criteria for optimal choices are represented by the objective functions and the additional constraints such as the available feedstock in a region. By combining LCA and LCC targets within a multi-objective programming approach, it is possible to address environmental and economic trade-offs in consequential decision-making.
ConclusionsThis article shows that linear programming can be used to extend standard LCA in the field of technological choices. Additional consequential research questions can be addressed such as the determination of the optimal number of new production plants and the optimal regions for supplying the resources. The modifications of the program by additional profit requirements (LCC) into a goal program and Pareto optimization problem have been identified as promising steps toward a comprehensive multi-objective LCSA.
相似文献Life Cycle Assessment (LCA) is the process of systematically assessing impacts when there is an interaction between the environment and human activity. Machine learning (ML) with LCA methods can help contribute greatly to reducing impacts. The sheer number of input parameters and their uncertainties that contribute to the full life cycle make a broader application of ML complex and difficult to achieve. Hence a systems engineering approach should be taken to apply ML in isolation to aspects of the LCA. This study addresses the challenge of leveraging ML methods to deliver LCA solutions. The overarching hypothesis is that: LCA underpinned by ML methods and informed by dynamic data paves the way to more accurate LCA while supporting life cycle decision making.
MethodsIn this study, previous research on ML for LCA were considered, and a literature review was undertaken.
ResultsThe results showed that ML can be a useful tool in certain aspects of the LCA. ML methods were shown to be applied efficiently in optimization scenarios in LCA. Finally, ML methods were integrated as part of existing inventory databases to streamline the LCA across many use cases.
ConclusionsThe conclusions of this article summarise the characteristics of existing literature and provide suggestions for future work in limitations and gaps which were found in the literature.
相似文献The main purpose of this review is to describe the state of the art of social impact assessment with a focus on mobility services. Whereas the use phase plays an important role for the assessment of services in general, the evaluation of the use phase has been underrepresented in previous social life cycle assessment studies. For that reason, particular attention has been paid to indicators, which allow the assessment of social impacts during the use phase of mobility services.
MethodsContinuous efforts to mitigate climate change and to improve quality of life in cities result in new mobility solutions based on collective use. This will have a huge impact on our society transforming the use of vehicles. In order to better understand the implications for cities, society and the automotive industry, it is essential to evaluate the social impact generated along a product life cycle with particular attention to the use phase. To reach the goal, a systematic literature review was carried out with a focus on social indicators that allow assessing use phase impacts of mobility services. The indicators were analysed and allocated to stakeholder groups. Based on the analysis, a core set of indicators is proposed under consideration of data availability.
Results and discussionBased on the selected search strings, 51 publications were selected for the literature review, including 579 social indicators. The analysis revealed a wide variety and diversity of indicators that are trying to measure the same aspect. The allocation to the respective stakeholder groups showed that most of the indicators (36%) evaluate impacts regarding the stakeholder group local community. The majority of analysed indicators are of quantitative nature (63%). Nevertheless, a clear assessment method was often missing in the respective publications. Therefore, for the core set of indicators, an assessment method is proposed for every indicator.
ConclusionsThe results from this study can help practitioners as well as researchers in the field of urban mobility assessment as it systematically analyses social sustainability aspects. The presented data gives an overview of various indicators that are suggested in other publications, and the proposed core set of indicators can be used to evaluate different mobility services in further research.
相似文献