2019
DOI: 10.1109/access.2019.2944858
|View full text |Cite
|
Sign up to set email alerts
|

An Energy-Efficient Cross-Layer-Sensing Clustering Method Based on Intelligent Fog Computing in WSNs

Abstract: The conventional data-based routing protocols are usually vulnerable to a large number of energy voids or hotspots in Wireless Sensor Networks (WSNs). In order to address this problem, we propose Mobile Intelligent Fog Computing: An Energy-efficient Cross-layer-sensing Clustering Method (ECCM). The first, according to the cross-layer projection principle, the proposed algorithm employs the sensingevent-driven mechanism to project the fog nodes onto the sensing layer, and constructs a powerful virtual control n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 38 publications
(30 citation statements)
references
References 48 publications
0
28
0
Order By: Relevance
“…According to formula (21), if the distance between any node and the sink node is set as d, the received power is:…”
Section: Reliability Data Reconsruction a Data Retransmission Mementioning
confidence: 99%
“…According to formula (21), if the distance between any node and the sink node is set as d, the received power is:…”
Section: Reliability Data Reconsruction a Data Retransmission Mementioning
confidence: 99%
“…The Source Worker Node Choosing (SWNC) algorithm uses the prefetch load factor to select the source data node: first, query the node location and network load information of the copy of the migration task input data block; then, calculate the prefetch load factor of each replica node of the prefetched data block according to formula (15); finally, select the appropriate prefetch source data node according to the prefetch load factor of each replica node.…”
Section: B Heterogeneous Sensing Data Placement Algorithmmentioning
confidence: 99%
“…The associate editor coordinating the review of this manuscript and approving it for publication was Lu Liu . located, that is, local execution of the task, thereby avoiding the transmission of task input data across the network and improving System network resource utilization [12]- [15]. The Internet of Things, as a typical example of big data processing systems, is mainly used to perform data-intensive tasks.…”
Section: Introductionmentioning
confidence: 99%
“…In summary, the merits of fog computing mainly involve (a) quick response to delay-sensitive requirements, (b) data aggregation from heterogeneous devices, (c) data protection and security for sensitive data applications due to avoiding to send data to the cloud, and (d) avoiding unnecessary communication, see [1] for more details. Recently, some preliminary results on fog computing for sensor networks are published in the literature, such as edge node reconfiguration [51,60], the choice of the sensing routing [70], as well as network architecture managements [54,62]. It should be stressed that fog computing, being in its infancy stage, exposes several challenges that need to be further addressed, such as fog-cloud collaboration, service scalability, fog scalability, storage security and communication security, tradeoff between energy consumption and communication efficiency and so forth.…”
Section: ) Applications In Cyber-physical Systemsmentioning
confidence: 99%