2021
DOI: 10.1007/s11276-021-02804-x
|View full text |Cite
|
Sign up to set email alerts
|

An energy-aware clustering method in the IoT using a swarm-based algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(22 citation statements)
references
References 65 publications
0
16
0
Order By: Relevance
“…24 Numerous issues have arisen in cloud infrastructures due to the enormous increase in the number of IoT devices. 25 Fog computing may be used to expand cloud computing's storage and processing capabilities by acting as a middle layer between consumer devices and the cloud. 26 It is a useful addition to cloud computing since it allows users to provide services and resources outside of the cloud, close to their end devices.…”
Section: Fog Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…24 Numerous issues have arisen in cloud infrastructures due to the enormous increase in the number of IoT devices. 25 Fog computing may be used to expand cloud computing's storage and processing capabilities by acting as a middle layer between consumer devices and the cloud. 26 It is a useful addition to cloud computing since it allows users to provide services and resources outside of the cloud, close to their end devices.…”
Section: Fog Computingmentioning
confidence: 99%
“…It is employed in a variety of settings, including smart manufacturing and automotive ad hoc networks 24 . Numerous issues have arisen in cloud infrastructures due to the enormous increase in the number of IoT devices 25 . Fog computing may be used to expand cloud computing's storage and processing capabilities by acting as a middle layer between consumer devices and the cloud 26 .…”
Section: Related Workmentioning
confidence: 99%
“…Internet of Things (IoT) is considered a network of networks that connects a variety of devices that can be static or dynamic [1][2] (see Figure 1). These devices also represent the resources of the IoT since they have memories, power sources, connections, etc.…”
Section: Overviewmentioning
confidence: 99%
“…This situation is even worse in the IIoT environment since the main characteristic of IIoT is large equipment (for example, monitors and sensors) [3]. For this reason, several protocols, appliances, and security solutions have been deployed and developed to manage the continuously evolving security threat in IIoT [4]. As we know that this solution is inflexible, complex, hard to manage, and highly proprietary that sequentially makes the network more bloated and ossified.…”
Section: Introductionmentioning
confidence: 99%