期刊文献+
共找到119篇文章
< 1 2 6 >
每页显示 20 50 100
Task Offloading Decision in Fog Computing System 被引量:6
1
作者 Qiliang Zhu Baojiang Si +1 位作者 Feifan Yang You Ma 《China Communications》 SCIE CSCD 2017年第11期59-68,共10页
Fog computing is an emerging paradigm of cloud computing which to meet the growing computation demand of mobile application. It can help mobile devices to overcome resource constraints by offloading the computationall... Fog computing is an emerging paradigm of cloud computing which to meet the growing computation demand of mobile application. It can help mobile devices to overcome resource constraints by offloading the computationally intensive tasks to cloud servers. The challenge of the cloud is to minimize the time of data transfer and task execution to the user, whose location changes owing to mobility, and the energy consumption for the mobile device. To provide satisfactory computation performance is particularly challenging in the fog computing environment. In this paper, we propose a novel fog computing model and offloading policy which can effectively bring the fog computing power closer to the mobile user. The fog computing model consist of remote cloud nodes and local cloud nodes, which is attached to wireless access infrastructure. And we give task offloading policy taking into account executi+on, energy consumption and other expenses. We finally evaluate the performance of our method through experimental simulations. The experimental results show that this method has a significant effect on reducing the execution time of tasks and energy consumption of mobile devices. 展开更多
关键词 fog computing task offioading energy consumption execution time
在线阅读 下载PDF
Multi-Objective Enhanced Cheetah Optimizer for Joint Optimization of Computation Offloading and Task Scheduling in Fog Computing
2
作者 Ahmad Zia Nazia Azim +5 位作者 Bekarystankyzy Akbayan Khalid J.Alzahrani Ateeq Ur Rehman Faheem Ullah Khan Nouf Al-Kahtani Hend Khalid Alkahtani 《Computers, Materials & Continua》 2026年第3期1559-1588,共30页
The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous c... The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous computing networks.Finding an optimal computational resource for task offloading and then executing efficiently is a critical issue to achieve a trade-off between energy consumption and transmission delay.In this network,the task processed at fog nodes reduces transmission delay.Still,it increases energy consumption,while routing tasks to the cloud server saves energy at the cost of higher communication delay.Moreover,the order in which offloaded tasks are executed affects the system’s efficiency.For instance,executing lower-priority tasks before higher-priority jobs can disturb the reliability and stability of the system.Therefore,an efficient strategy of optimal computation offloading and task scheduling is required for operational efficacy.In this paper,we introduced a multi-objective and enhanced version of Cheeta Optimizer(CO),namely(MoECO),to jointly optimize the computation offloading and task scheduling in cloud-fog networks to minimize two competing objectives,i.e.,energy consumption and communication delay.MoECO first assigns tasks to the optimal computational nodes and then the allocated tasks are scheduled for processing based on the task priority.The mathematical modelling of CO needs improvement in computation time and convergence speed.Therefore,MoECO is proposed to increase the search capability of agents by controlling the search strategy based on a leader’s location.The adaptive step length operator is adjusted to diversify the solution and thus improves the exploration phase,i.e.,global search strategy.Consequently,this prevents the algorithm from getting trapped in the local optimal solution.Moreover,the interaction factor during the exploitation phase is also adjusted based on the location of the prey instead of the adjacent Cheetah.This increases the exploitation capability of agents,i.e.,local search capability.Furthermore,MoECO employs a multi-objective Pareto-optimal front to simultaneously minimize designated objectives.Comprehensive simulations in MATLAB demonstrate that the proposed algorithm obtains multiple solutions via a Pareto-optimal front and achieves an efficient trade-off between optimization objectives compared to baseline methods. 展开更多
关键词 Computation offloading task scheduling cheetah optimizer fog computing optimization resource allocation internet of things
在线阅读 下载PDF
A Latency-Aware and Fault-Tolerant Framework for Resource Scheduling and Data Management in Fog-Enabled Smart City Transportation Systems
3
作者 Ibrar Afzal Noor ul Amin +1 位作者 Zulfiqar Ahmad Abdulmohsen Algarni 《Computers, Materials & Continua》 SCIE EI 2025年第1期1377-1399,共23页
Thedeployment of the Internet of Things(IoT)with smart sensors has facilitated the emergence of fog computing as an important technology for delivering services to smart environments such as campuses,smart cities,and ... Thedeployment of the Internet of Things(IoT)with smart sensors has facilitated the emergence of fog computing as an important technology for delivering services to smart environments such as campuses,smart cities,and smart transportation systems.Fog computing tackles a range of challenges,including processing,storage,bandwidth,latency,and reliability,by locally distributing secure information through end nodes.Consisting of endpoints,fog nodes,and back-end cloud infrastructure,it provides advanced capabilities beyond traditional cloud computing.In smart environments,particularly within smart city transportation systems,the abundance of devices and nodes poses significant challenges related to power consumption and system reliability.To address the challenges of latency,energy consumption,and fault tolerance in these environments,this paper proposes a latency-aware,faulttolerant framework for resource scheduling and data management,referred to as the FORD framework,for smart cities in fog environments.This framework is designed to meet the demands of time-sensitive applications,such as those in smart transportation systems.The FORD framework incorporates latency-aware resource scheduling to optimize task execution in smart city environments,leveraging resources from both fog and cloud environments.Through simulation-based executions,tasks are allocated to the nearest available nodes with minimum latency.In the event of execution failure,a fault-tolerantmechanism is employed to ensure the successful completion of tasks.Upon successful execution,data is efficiently stored in the cloud data center,ensuring data integrity and reliability within the smart city ecosystem. 展开更多
关键词 fog computing smart cities smart transportation data management fault tolerance resource scheduling
在线阅读 下载PDF
A Broad Learning-Driven Network Traffic Analysis System Based on Fog Computing Paradigm 被引量:3
4
作者 Xiting Peng Kaoru Ota Mianxiong Dong 《China Communications》 SCIE CSCD 2020年第2期1-13,共13页
The development of communication technologies which support traffic-intensive applications presents new challenges in designing a real-time traffic analysis architecture and an accurate method that suitable for a wide... The development of communication technologies which support traffic-intensive applications presents new challenges in designing a real-time traffic analysis architecture and an accurate method that suitable for a wide variety of traffic types.Current traffic analysis methods are executed on the cloud,which needs to upload the traffic data.Fog computing is a more promising way to save bandwidth resources by offloading these tasks to the fog nodes.However,traffic analysis models based on traditional machine learning need to retrain all traffic data when updating the trained model,which are not suitable for fog computing due to the poor computing power.In this study,we design a novel fog computing based traffic analysis system using broad learning.For one thing,fog computing can provide a distributed architecture for saving the bandwidth resources.For another,we use the broad learning to incrementally train the traffic data,which is more suitable for fog computing because it can support incremental updates of models without retraining all data.We implement our system on the Raspberry Pi,and experimental results show that we have a 98%probability to accurately identify these traffic data.Moreover,our method has a faster training speed compared with Convolutional Neural Network(CNN). 展开更多
关键词 traffic analysis fog computing broad learning radio access networks
在线阅读 下载PDF
Quantum Inspired Adaptive Resource Management Algorithm for Scalable and Energy Efficient Fog Computing in Internet of Things(IoT)
5
作者 Sonia Khan Naqash Younas +3 位作者 Musaed Alhussein Wahib Jamal Khan Muhammad Shahid Anwar Khursheed Aurangzeb 《Computer Modeling in Engineering & Sciences》 2025年第3期2641-2660,共20页
Effective resource management in the Internet of Things and fog computing is essential for efficient and scalable networks.However,existing methods often fail in dynamic and high-demand environments,leading to resourc... Effective resource management in the Internet of Things and fog computing is essential for efficient and scalable networks.However,existing methods often fail in dynamic and high-demand environments,leading to resource bottlenecks and increased energy consumption.This study aims to address these limitations by proposing the Quantum Inspired Adaptive Resource Management(QIARM)model,which introduces novel algorithms inspired by quantum principles for enhanced resource allocation.QIARM employs a quantum superposition-inspired technique for multi-state resource representation and an adaptive learning component to adjust resources in real time dynamically.In addition,an energy-aware scheduling module minimizes power consumption by selecting optimal configurations based on energy metrics.The simulation was carried out in a 360-minute environment with eight distinct scenarios.This study introduces a novel quantum-inspired resource management framework that achieves up to 98%task offload success and reduces energy consumption by 20%,addressing critical challenges of scalability and efficiency in dynamic fog computing environments. 展开更多
关键词 Quantum computing resource management energy efficiency fog computing Internet of Things
在线阅读 下载PDF
A Fog-Based Approach for Theft Detection and Zero-Day Attack Prevention in Smart Grid Systems
6
作者 Remah Younisse Mouhammd AlKasassbeh Amjad Aldweesh 《Computers, Materials & Continua》 2025年第12期4921-4941,共21页
Smart grid systems are advancing electrical services,making them more compatible with Internet of Things(IoT)technologies.The deployment of smart grids is facing many difficulties,requiring immediate solutions to enha... Smart grid systems are advancing electrical services,making them more compatible with Internet of Things(IoT)technologies.The deployment of smart grids is facing many difficulties,requiring immediate solutions to enhance their practicality.Data privacy and security are widely discussed,and many solutions are proposed in this area.Energy theft attacks by greedy customers are another difficulty demanding immediate solutions to decrease the economic losses caused by these attacks.The tremendous amount of data generated in smart grid systems is also considered a struggle in these systems,which is commonly solved via fog computing.This work proposes an energytheft detection method for smart grid systems employed in a fog-based network infrastructure.This work also proposes and analyzes Zero-day energy theft attack detection through a multi-layered approach.The detection process occurs at fog nodes via five machine-learning classification models.The performance of the classifiers is measured,validated,and reported for all models at fog nodes,as well as the required training and testing time.Finally,the measured results are compared to when the detection process occurs at a central processing unit(cloud server)to investigate and compare the performance metrics’goodness.The results show comparable accuracy,precision,recall,and F1-measure performance.Meanwhile,the measured execution time has decreased significantly in the case of the fog-based network infrastructure.The fog-based model achieved an accuracy and recall of 98%,F1 score of 99%,and reduced detection time up to around 85%compared to the cloud-based approach. 展开更多
关键词 Smart grid security fog computing energy theft detection zero-day attack prevention machine learning in IoT
在线阅读 下载PDF
An Adaptive Firefly Algorithm for Dependent Task Scheduling in IoT-Fog Computing
7
作者 Adil Yousif 《Computer Modeling in Engineering & Sciences》 2025年第3期2869-2892,共24页
The Internet of Things(IoT)has emerged as an important future technology.IoT-Fog is a new computing paradigm that processes IoT data on servers close to the source of the data.In IoT-Fog computing,resource allocation ... The Internet of Things(IoT)has emerged as an important future technology.IoT-Fog is a new computing paradigm that processes IoT data on servers close to the source of the data.In IoT-Fog computing,resource allocation and independent task scheduling aim to deliver short response time services demanded by the IoT devices and performed by fog servers.The heterogeneity of the IoT-Fog resources and the huge amount of data that needs to be processed by the IoT-Fog tasks make scheduling fog computing tasks a challenging problem.This study proposes an Adaptive Firefly Algorithm(AFA)for dependent task scheduling in IoT-Fog computing.The proposed AFA is a modified version of the standard Firefly Algorithm(FA),considering the execution times of the submitted tasks,the impact of synchronization requirements,and the communication time between dependent tasks.As IoT-Fog computing depends mainly on distributed fog node servers that receive tasks in a dynamic manner,tackling the communications and synchronization issues between dependent tasks is becoming a challenging problem.The proposed AFA aims to address the dynamic nature of IoT-Fog computing environments.The proposed AFA mechanism considers a dynamic light absorption coefficient to control the decrease in attractiveness over iterations.The proposed AFA mechanism performance was benchmarked against the standard Firefly Algorithm(FA),Puma Optimizer(PO),Genetic Algorithm(GA),and Ant Colony Optimization(ACO)through simulations under light,typical,and heavy workload scenarios.In heavy workloads,the proposed AFA mechanism obtained the shortest average execution time,968.98 ms compared to 970.96,1352.87,1247.28,and 1773.62 of FA,PO,GA,and ACO,respectively.The simulation results demonstrate the proposed AFA’s ability to rapidly converge to optimal solutions,emphasizing its adaptability and efficiency in typical and heavy workloads. 展开更多
关键词 fog computing SCHEDULING resource management firefly algorithm genetic algorithm ant colony optimization
在线阅读 下载PDF
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
8
作者 Zhou Zhou Youliang Tian +3 位作者 Jinbo Xiong Changgen Peng Jing Li Nan Yang 《Digital Communications and Networks》 2025年第2期442-454,共13页
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog computing.However,existing studies focus on centraliz... Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog computing.However,existing studies focus on centralized single-layer aggregation federated learning architecture,which lack the consideration of cross-domain and asynchronous robustness of federated learning,and rarely integrate verification mechanisms from the perspective of incentives.To address the above challenges,we propose a Blockchain and Signcryption enabled Asynchronous Federated Learning(BSAFL)framework based on dual aggregation for cross-domain scenarios.In particular,we first design two types of signcryption schemes to secure the interaction and access control of collaborative learning between domains.Second,we construct a differential privacy approach that adaptively adjusts privacy budgets to ensure data privacy and local models'availability of intra-domain user.Furthermore,we propose an asynchronous aggregation solution that incorporates consensus verification and elastic participation using blockchain.Finally,security analysis demonstrates the security and privacy effectiveness of BSAFL,and the evaluation on real datasets further validates the high model accuracy and performance of BSAFL. 展开更多
关键词 Blockchain SIGNCRYPTION Federated learning ASYNCHRONOUS fog computing
在线阅读 下载PDF
EPRFL:An Efficient Privacy-Preserving and Robust Federated Learning Scheme for Fog Computing
9
作者 Ke Zhijie Xie Yong +1 位作者 Syed Hamad Shirazi Li Haifeng 《China Communications》 2025年第4期202-222,共21页
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple parties.When combined with Fog Computing,FL offers enhanced capabilities for machin... Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple parties.When combined with Fog Computing,FL offers enhanced capabilities for machine learning applications in the Internet of Things(IoT).However,implementing FL across large-scale distributed fog networks presents significant challenges in maintaining privacy,preventing collusion attacks,and ensuring robust data aggregation.To address these challenges,we propose an Efficient Privacy-preserving and Robust Federated Learning(EPRFL)scheme for fog computing scenarios.Specifically,we first propose an efficient secure aggregation strategy based on the improved threshold homomorphic encryption algorithm,which is not only resistant to model inference and collusion attacks,but also robust to fog node dropping.Then,we design a dynamic gradient filtering method based on cosine similarity to further reduce the communication overhead.To minimize training delays,we develop a dynamic task scheduling strategy based on comprehensive score.Theoretical analysis demonstrates that EPRFL offers robust security and low latency.Extensive experimental results indicate that EPRFL outperforms similar strategies in terms of privacy preserving,model performance,and resource efficiency. 展开更多
关键词 federated learning fog computing internet of things PRIVACY-PRESERVING ROBUSTNESS
在线阅读 下载PDF
Physical-layer secure hybrid task scheduling and resource management for fog computing IoT networks
10
作者 ZHANG Shibo GAO Hongyuan +1 位作者 SU Yumeng SUN Rongchen 《Journal of Systems Engineering and Electronics》 2025年第5期1146-1160,共15页
Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems... Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems are susceptible to malicious eavesdropping attacks during the information transmission,and this issue has not been adequately addressed.In this paper,we propose a physical-layer secure fog computing IoT system model,which is able to improve the physical layer security of fog computing IoT networks against the malicious eavesdropping of multiple eavesdroppers.The secrecy rate of the proposed model is analyzed,and the quantum galaxy–based search algorithm(QGSA)is proposed to solve the hybrid task scheduling and resource management problem of the network.The computational complexity and convergence of the proposed algorithm are analyzed.Simulation results validate the efficiency of the proposed model and reveal the influence of various environmental parameters on fog computing IoT networks.Moreover,the simulation results demonstrate that the proposed hybrid task scheduling and resource management scheme can effectively enhance secrecy performance across different communication scenarios. 展开更多
关键词 fog computing Internet-of-Things(IoT) physical layer security hybrid task scheduling and resource management quantum galaxy-based search algorithm(QGSA)
在线阅读 下载PDF
A Lightweight Intrusion Detection System Using Convolutional Neural Network and Long Short-Term Memory in Fog Computing
11
作者 Hawazen Alzahrani Tarek Sheltami +2 位作者 Abdulaziz Barnawi Muhammad Imam Ansar Yaser 《Computers, Materials & Continua》 SCIE EI 2024年第9期4703-4728,共26页
The Internet of Things(IoT)links various devices to digital services and significantly improves the quality of our lives.However,as IoT connectivity is growing rapidly,so do the risks of network vulnerabilities and th... The Internet of Things(IoT)links various devices to digital services and significantly improves the quality of our lives.However,as IoT connectivity is growing rapidly,so do the risks of network vulnerabilities and threats.Many interesting Intrusion Detection Systems(IDSs)are presented based on machine learning(ML)techniques to overcome this problem.Given the resource limitations of fog computing environments,a lightweight IDS is essential.This paper introduces a hybrid deep learning(DL)method that combines convolutional neural networks(CNN)and long short-term memory(LSTM)to build an energy-aware,anomaly-based IDS.We test this system on a recent dataset,focusing on reducing overhead while maintaining high accuracy and a low false alarm rate.We compare CICIoT2023,KDD-99 and NSL-KDD datasets to evaluate the performance of the proposed IDS model based on key metrics,including latency,energy consumption,false alarm rate and detection rate metrics.Our findings show an accuracy rate over 92%and a false alarm rate below 0.38%.These results demonstrate that our system provides strong security without excessive resource use.The practicality of deploying IDS with limited resources is demonstrated by the successful implementation of IDS functionality on a Raspberry Pi acting as a Fog node.The proposed lightweight model,with a maximum power consumption of 6.12 W,demonstrates its potential to operate effectively on energy-limited devices such as low-power fog nodes or edge devices.We prioritize energy efficiency whilemaintaining high accuracy,distinguishing our scheme fromexisting approaches.Extensive experiments demonstrate a significant reduction in false positives,ensuring accurate identification of genuine security threats while minimizing unnecessary alerts. 展开更多
关键词 Intrusion detection fog computing CNN LSTM energy consumption
在线阅读 下载PDF
Energy Aware Task Scheduling of IoT Application Using a Hybrid Metaheuristic Algorithm in Cloud Computing
12
作者 Ahmed Awad Mohamed Eslam Abdelhakim Seyam +4 位作者 Ahmed R.Elsaeed Laith Abualigah Aseel Smerat Ahmed M.AbdelMouty Hosam E.Refaat 《Computers, Materials & Continua》 2026年第3期1786-1803,共18页
In recent years,fog computing has become an important environment for dealing with the Internet of Things.Fog computing was developed to handle large-scale big data by scheduling tasks via cloud computing.Task schedul... In recent years,fog computing has become an important environment for dealing with the Internet of Things.Fog computing was developed to handle large-scale big data by scheduling tasks via cloud computing.Task scheduling is crucial for efficiently handling IoT user requests,thereby improving system performance,cost,and energy consumption across nodes in cloud computing.With the large amount of data and user requests,achieving the optimal solution to the task scheduling problem is challenging,particularly in terms of cost and energy efficiency.In this paper,we develop novel strategies to save energy consumption across nodes in fog computing when users execute tasks through the least-cost paths.Task scheduling is developed using modified artificial ecosystem optimization(AEO),combined with negative swarm operators,Salp Swarm Algorithm(SSA),in order to competitively optimize their capabilities during the exploitation phase of the optimal search process.In addition,the proposed strategy,Enhancement Artificial Ecosystem Optimization Salp Swarm Algorithm(EAEOSSA),attempts to find the most suitable solution.The optimization that combines cost and energy for multi-objective task scheduling optimization problems.The backpack problem is also added to improve both cost and energy in the iFogSim implementation as well.A comparison was made between the proposed strategy and other strategies in terms of time,cost,energy,and productivity.Experimental results showed that the proposed strategy improved energy consumption,cost,and time over other algorithms.Simulation results demonstrate that the proposed algorithm increases the average cost,average energy consumption,and mean service time in most scenarios,with average reductions of up to 21.15%in cost and 25.8%in energy consumption. 展开更多
关键词 Energy-efficient tasks internet of things(IoT) cloud fog computing artificial ecosystem-based optimization salp swarm algorithm cloud computing
在线阅读 下载PDF
AI-Powered Anomaly Detection and Cybersecurity in Healthcare IoT with Fog-Edge
13
作者 Fatima Al-Quayed 《Computer Modeling in Engineering & Sciences》 2026年第1期1339-1372,共34页
The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.Thi... The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.This paper proposes FE-ACS(Fog-Edge Adaptive Cybersecurity System),a novel hierarchical security framework that intelligently distributes AI-powered anomaly detection algorithms across edge,fog,and cloud layers to optimize security efficacy,latency,and privacy.Our comprehensive evaluation demonstrates that FE-ACS achieves superior detection performance with an AUC-ROC of 0.985 and an F1-score of 0.923,while maintaining significantly lower end-to-end latency(18.7 ms)compared to cloud-centric(152.3 ms)and fog-only(34.5 ms)architectures.The system exhibits exceptional scalability,supporting up to 38,000 devices with logarithmic performance degradation—a 67×improvement over conventional cloud-based approaches.By incorporating differential privacy mechanisms with balanced privacy-utility tradeoffs(ε=1.0–1.5),FE-ACS maintains 90%–93%detection accuracy while ensuring strong privacy guarantees for sensitive healthcare data.Computational efficiency analysis reveals that our architecture achieves a detection rate of 12,400 events per second with only 12.3 mJ energy consumption per inference.In healthcare risk assessment,FE-ACS demonstrates robust operational viability with low patient safety risk(14.7%)and high system reliability(94.0%).The proposed framework represents a significant advancement in distributed security architectures,offering a scalable,privacy-preserving,and real-time solution for protecting healthcare IoT ecosystems against evolving cyber threats. 展开更多
关键词 AI-powered anomaly detection healthcare IoT fog computing CYBERSECURITY intrusion detection
在线阅读 下载PDF
Securing Fog Computing For E-Learning System Using Integration of Two Encryption Algorithms
14
作者 Hind A.Alshambri Fawaz Alassery 《Journal of Cyber Security》 2021年第3期149-166,共18页
Currently,the majority of institutions have made use of information technologies to improve and develop their diverse educational methods to attract more learners.Through information technologies,e-learning and learni... Currently,the majority of institutions have made use of information technologies to improve and develop their diverse educational methods to attract more learners.Through information technologies,e-learning and learning-on-the go have been adopted by the institutions to provide affordability and flexibility of educational services.Most of the educational institutes are offering online teaching classes using the technologies like cloud computing,networking,etc.Educational institutes have developed their e-learning platforms for the online learning process,through this way they have paved the way for distance learning.But e-learning platform has to face a lot of security challenges in terms of cyberattacks and data hacking through unauthorized access.Fog computing is one of the new technologies that facilitate control over access to big data,as it acts as a mediator between the cloud and the user to bring services closer and reduce their latency.This report presents the use of fog computing for the development of an e-learning platform.and introduced different algorithms to secure the data and information sharing through e-learning platforms.Moreover,this report provides a comparison among RSA,AES,and ECC algorithms for fog-enabled cybersecurity systems.These Algorithms are compared by developing them using python-based language program,in terms of encryption/decryption time,key generations techniques,and other features offered.In addition,we proposed to use a hybrid cryptography system of two types of encryption algorithms such as RSA with AES to fulfill the security,file size,and latency required for the communication between the fog and the e-learning system.we tested our proposed system and highlight the pros and cons of the Integrated Encryption Schemes by performing a testbed for e-learning website scenario using ASP.net and C#. 展开更多
关键词 fog computing information security integrated encryption RSA AES ECC e-learning system
在线阅读 下载PDF
Intrusion Detection System Using a Distributed Ensemble Design Based Convolutional Neural Network in Fog Computing
15
作者 Aiming Wu Shanshan Tu +3 位作者 Muhammad Wagas Yongjie Yang Yihe Zhang Xuetao Bai 《Journal of Information Hiding and Privacy Protection》 2022年第1期25-39,共15页
With the rapid development of the Internet of Things(IoT),all kinds of data are increasing exponentially.Data storage and computing on cloud servers are increasingly restricted by hardware.This has prompted the develo... With the rapid development of the Internet of Things(IoT),all kinds of data are increasing exponentially.Data storage and computing on cloud servers are increasingly restricted by hardware.This has prompted the development of fog computing.Fog computing is to place the calculation and storage of data at the edge of the network,so that the entire Internet of Things system can run more efficiently.The main function of fog computing is to reduce the burden of cloud servers.By placing fog nodes in the IoT network,the data in the IoT devices can be transferred to the fog nodes for storage and calculation.Many of the information collected by IoT devices are malicious traffic,which contains a large number of malicious attacks.Because IoT devices do not have strong computing power and the ability to detect malicious traffic,we need to deploy a system to detect malicious attacks on the fog node.In response to this situation,we propose an intrusion detection system based on distributed ensemble design.The system mainly uses Convolutional Neural Network(CNN)as the first-level learner.In the second level,the random forest will finally classify the prediction results obtained in the first level.This paper uses the UNSW-NB15 dataset to evaluate the performance of the model.Experimental results show that the model has good detection performance for most attacks. 展开更多
关键词 Intrusion detection system fog computing convolutional neural network feature selection
在线阅读 下载PDF
Secure and Efficient Computing Resource Management in Blockchain-Based Vehicular Fog Computing 被引量:5
16
作者 Ming Kong Junhui Zhao +1 位作者 Xiaoke Sun Yiwen Nie 《China Communications》 SCIE CSCD 2021年第4期115-125,共11页
In vehicular fog computing(VFC),the resource transactions in the Internet of Vehicles(IoV)have become a novel resource management scheme that can improve system resource utilization and the quality of vehicle services... In vehicular fog computing(VFC),the resource transactions in the Internet of Vehicles(IoV)have become a novel resource management scheme that can improve system resource utilization and the quality of vehicle services.In this paper,in order to improve the security and fairness of resource transactions,we design a blockchain-based resource management scheme for VFC.First,we propose the concept of resource coin(RC)and develop a blockchain-based secure computing reource trading mechanism in terms of RC.As a node of the blockchain network,the roadside unit(RSU)participates in verifying the legitimacy of transactions and the creation of new blocks.Next,we propose a resource management scheme based on contract theory,encouraging parked vehicles to contribute computing resource so that RSU could complete proof of work(PoW)quickly,improve the success probability of block creation and get RC rewards.We use the gradient descent method to solve the computing resource utilization that can maximize the RC revenue of RSUs and vehicles during the block creation.Finally,the performance of this model is validated in simulation result and analysis. 展开更多
关键词 blockchain vehicular fog computing resource management contract theory
在线阅读 下载PDF
When Edge Computing Meets IoT Systems: Analysis of Case Studies 被引量:5
17
作者 Fabio Arena Giovanni Pau 《China Communications》 SCIE CSCD 2020年第10期50-63,共14页
On a macroscopic level,an edge computing architecture looks like a distributed and decentralized IT(Information Technology)architecture.More in detail,it could be defined as a mesh network of micro data centers capabl... On a macroscopic level,an edge computing architecture looks like a distributed and decentralized IT(Information Technology)architecture.More in detail,it could be defined as a mesh network of micro data centers capable of processing and storing critical data locally,and to transmit all data received and/or processed to a central data center or a cloud storage repository.This network topology,also taking advantage of the availability on the market of cost-effective small form factor(SFF)electronic components and systems decreasing,brings the essential components of processing,storage,and networking closer to the sources that generate the data.The typical use case is that of Internet of Things(IoT)devices and implementations,which often face latency problems,lack of bandwidth,reliability,which cannot be addressed through the conventional cloud model.In this context,the edge computing architecture can reduce the size of data to be sent to the cloud,processing critical data,sensitive to latency,at the point of origin,via a smart device,or sending it to an intermediate server,located nearby.The aim of this paper is to report some of the main aspects and significant features of edge computing and analyzing several popular case studies. 展开更多
关键词 edge computing fog computing cloud computing ANALYSIS internet of things
在线阅读 下载PDF
Enabling intelligence in fog computing to achieve energy and latency reduction 被引量:7
18
作者 Quang Duy La Mao V.Ngo +2 位作者 Thinh Quang Dinh Tony Q.S.Quek Hyundong Shin 《Digital Communications and Networks》 SCIE 2019年第1期3-9,共7页
Fog computing is an emerging architecture intended for alleviating the network burdens at the cloud and the core network by moving resource-intensive functionalities such as computation,communication,storage,and analy... Fog computing is an emerging architecture intended for alleviating the network burdens at the cloud and the core network by moving resource-intensive functionalities such as computation,communication,storage,and analytics closer to the End Users(EUs).In order to address the issues of energy efficiency and latency requirements for the time-critical Internet-of-Things(IoT)applications,fog computing systems could apply intelligence features in their operations to take advantage of the readily available data and computing resources.In this paper,we propose an approach that involves device-driven and human-driven intelligence as key enablers to reduce energy consumption and latency in fog computing via two case studies.The first one makes use of the machine learning to detect user behaviors and perform adaptive low-latency Medium Access Control(MAC)-layer scheduling among sensor devices.In the second case study on task offloading,we design an algorithm for an intelligent EU device to select its offloading decision in the presence of multiple fog nodes nearby,at the same time,minimize its own energy and latency objectives.Our results show a huge but untapped potential of intelligence in tackling the challenges of fog computing. 展开更多
关键词 fog computing Edge computing Machine learning MAC scheduling Computational offloading Energy efficiency
在线阅读 下载PDF
Securing Parked Vehicle Assisted Fog Computing With Blockchain and Optimal Smart Contract Design 被引量:11
19
作者 Xumin Huang Dongdong Ye +1 位作者 Rong Yu Lei Shu 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2020年第2期426-441,共16页
Vehicular fog computing(VFC)has been envisioned as an important application of fog computing in vehicular networks.Parked vehicles with embedded computation resources could be exploited as a supplement for VFC.They co... Vehicular fog computing(VFC)has been envisioned as an important application of fog computing in vehicular networks.Parked vehicles with embedded computation resources could be exploited as a supplement for VFC.They cooperate with fog servers to process offloading requests at the vehicular network edge,leading to a new paradigm called parked vehicle assisted fog computing(PVFC).However,each coin has two sides.There is a follow-up challenging issue in the distributed and trustless computing environment.The centralized computation offloading without tamper-proof audit causes security threats.It could not guard against false-reporting,free-riding behaviors,spoofing attacks and repudiation attacks.Thus,we leverage the blockchain technology to achieve decentralized PVFC.Request posting,workload undertaking,task evaluation and reward assignment are organized and validated automatically through smart contract executions.Network activities in computation offloading become transparent,verifiable and traceable to eliminate security risks.To this end,we introduce network entities and design interactive smart contract operations across them.The optimal smart contract design problem is formulated and solved within the Stackelberg game framework to minimize the total payments for users.Security analysis and extensive numerical results are provided to demonstrate that our scheme has high security and efficiency guarantee. 展开更多
关键词 Blockchain parked vehicle smart contract Stackelberg game vehicular fog computing(VFC)
在线阅读 下载PDF
A Non-Cooperative Differential Game-Based Security Model in Fog Computing 被引量:4
20
作者 Zhi Li Xianwei Zhou +2 位作者 Yanzhu Liu Haitao Xu Li Miao 《China Communications》 SCIE CSCD 2017年第1期180-189,共10页
Fog computing is a new paradigm providing network services such as computing, storage between the end users and cloud. The distributed and open structure are the characteristics of fog computing, which make it vulnera... Fog computing is a new paradigm providing network services such as computing, storage between the end users and cloud. The distributed and open structure are the characteristics of fog computing, which make it vulnerable and very weak to security threats. In this article, the interaction between vulnerable nodes and malicious nodes in the fog computing is investigated as a non-cooperative differential game. The complex decision making process is reviewed and analyzed. To solve the game, a fictitious play-based algorithm is which the vulnerable node and the malicious nodes reach a feedback Nash equilibrium. We attain optimal strategy of energy consumption with Qo S guarantee for the system, which are conveniently operated and suitable for fog nodes. The system simulation identifies the propagation of malicious nodes. We also determine the effects of various parameters on the optimal strategy. The simulation results support a theoretical foundation to limit malicious nodes in fog computing, which can help fog service providers make the optimal dynamic strategies when different types of nodes dynamically change their strategies. 展开更多
关键词 fog computing differential game fog security feedback nash equilibrium
在线阅读 下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部