2022
DOI: 10.1007/s10586-022-03751-8
|View full text |Cite
|
Sign up to set email alerts
|

An energy-aware service placement strategy using hybrid meta-heuristic algorithm in iot environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 37 publications
0
5
0
Order By: Relevance
“…The depletion of energy from a single IoT node can have a significant impact on the overall monitoring operation. Therefore, the key challenge in this context is to ensure energy-efficient and fault-tolerant communication, given the difficulty of managing and restoring defective IoT devices scattered across the extensive pipeline, either through recharging or replacing batteries, as needed ( Hu et al, 2023 ). Furthermore, the data collected by these IoT devices can be categorized as normal or critical.…”
Section: Introductionmentioning
confidence: 99%
“…The depletion of energy from a single IoT node can have a significant impact on the overall monitoring operation. Therefore, the key challenge in this context is to ensure energy-efficient and fault-tolerant communication, given the difficulty of managing and restoring defective IoT devices scattered across the extensive pipeline, either through recharging or replacing batteries, as needed ( Hu et al, 2023 ). Furthermore, the data collected by these IoT devices can be categorized as normal or critical.…”
Section: Introductionmentioning
confidence: 99%
“…Addressing energy consumption, delay, throughput, network performance, packet loss, and attack detection rate are additional requirements of the applications beyond security. Issues including transmission delay, detection ratio, and energy consumption may be handled by current algorithms [9][10]. By integrating EBOA with LBO optimization techniques, this hybrid approach aims to enhance the authentication process's efficiency and scalability while minimizing energy consumption overhead.…”
Section: Introductionmentioning
confidence: 99%
“…Especially, these algorithms can be compartmentalized different categories using different descriptions. Common names are evolutionary algorithm (EA) [1], nature-inspired algorithm (NIA) [2], meta-heuristic algorithm (MA) [3], and swarm intelligence (SI) algorithm [4], however, some of the algorithms included are the same. Thus, a challenge of the algorithm is that searching for the optima in the search space with higher convergence speed.…”
Section: Introductionmentioning
confidence: 99%