Abstract:The Internet of Things (IoT) will not only connect computers and mobile devices but also interconnect smart buildings, homes, and cities, as well as electrical grids, gas, and water networks, automobiles, airplanes, etc. IoT will lead to the development of a wide range of advanced information services that need to be processed in real time and require large storage and computational power. The integration of IoT with fog and cloud computing not only brings the computational requirements but also enables IoT se… Show more
“…The issues of security and privacy in fog and mobile edge computing are also a concern that many researchers are considering in their work. The authors of related works– have briefly presented these issues and considered some counter measurements. A selective forwarding model that provides monitoring capabilities for detecting malicious nodes and tracing nodes' movements has been presented in the work of Yaseen et al The model has shown huge improvements in terms of detecting malicious nodes by leveraging the fog computing infrastructure.…”
Section: Related Workmentioning
confidence: 99%
“…Integration of IoT devices with fog computing has enabled richer IoT services that are cost effective and allow for accessibility from anywhere at any time . However, there are some major security challenges that need to be considered.…”
Section: Related Workmentioning
confidence: 99%
“…However, there are some major security challenges that need to be considered. Pacheco and Hariri developed an intrusion detection system model for fog computing to detect when an IoT sensor is under attack or is being compromised. Experimental results have shown that the proposed model accurately identifies known and unknown sensor attacks.…”
Mobile edge computing (MEC) is an emergent technology that has revolutionized traditional cloud service solutions. Mobile edge computing extends cloud computing by providing processing, storage, and networking capabilities at the edge of the mobile network. Delay‐sensitive and context‐aware applications are able to execute within close proximity of mobile users. Additionally, today's cloud services are not tailored to user specifications, but rather diversified toward a group of users. To guarantee delivery of user‐specific services in 5G networks, service composition techniques should be incorporated. This article envisions a real‐time, context‐aware, service‐composition collaborative framework that lies at the edge of the network, comprising MEC and user devices for fast composite service delivery. The proposed solution decomposes cloud data into a set of files and services, which are then replicated to MEC nodes. Frequently requested files and services are further cached onto user mobile devices for faster access. Both MEC nodes and mobile users advertise their services onto the collaborative edge/user space, where services are delivered either composite or unrendered according to users' requests. Service composition is achieved through a learning‐based workflow‐net approach that relies on previous composition results to build service composition models to be used for new compositions. The presented solution provides guaranteed and fast delivery of the requested cloud composite services to end users while sustaining QoS requirements and load balancing among edge and mobile nodes.
“…The issues of security and privacy in fog and mobile edge computing are also a concern that many researchers are considering in their work. The authors of related works– have briefly presented these issues and considered some counter measurements. A selective forwarding model that provides monitoring capabilities for detecting malicious nodes and tracing nodes' movements has been presented in the work of Yaseen et al The model has shown huge improvements in terms of detecting malicious nodes by leveraging the fog computing infrastructure.…”
Section: Related Workmentioning
confidence: 99%
“…Integration of IoT devices with fog computing has enabled richer IoT services that are cost effective and allow for accessibility from anywhere at any time . However, there are some major security challenges that need to be considered.…”
Section: Related Workmentioning
confidence: 99%
“…However, there are some major security challenges that need to be considered. Pacheco and Hariri developed an intrusion detection system model for fog computing to detect when an IoT sensor is under attack or is being compromised. Experimental results have shown that the proposed model accurately identifies known and unknown sensor attacks.…”
Mobile edge computing (MEC) is an emergent technology that has revolutionized traditional cloud service solutions. Mobile edge computing extends cloud computing by providing processing, storage, and networking capabilities at the edge of the mobile network. Delay‐sensitive and context‐aware applications are able to execute within close proximity of mobile users. Additionally, today's cloud services are not tailored to user specifications, but rather diversified toward a group of users. To guarantee delivery of user‐specific services in 5G networks, service composition techniques should be incorporated. This article envisions a real‐time, context‐aware, service‐composition collaborative framework that lies at the edge of the network, comprising MEC and user devices for fast composite service delivery. The proposed solution decomposes cloud data into a set of files and services, which are then replicated to MEC nodes. Frequently requested files and services are further cached onto user mobile devices for faster access. Both MEC nodes and mobile users advertise their services onto the collaborative edge/user space, where services are delivered either composite or unrendered according to users' requests. Service composition is achieved through a learning‐based workflow‐net approach that relies on previous composition results to build service composition models to be used for new compositions. The presented solution provides guaranteed and fast delivery of the requested cloud composite services to end users while sustaining QoS requirements and load balancing among edge and mobile nodes.
“…A crucial challenge in proposing a new edge computing solution is to realistically assess the performance of the envisioned system while considering the relevant engineering parameters. The researchers can use the real cloud environments, experimental test beds, or simulators to evaluate their approaches. There are pros and cons in selection of these options.…”
Edge computing is a fast growing field of research that covers a spectrum of technologies bringing the cloud computing services closer to the end user. Growing interest in this area yields many edge computing approaches that need to be evaluated and optimized. Experimenting on the real cloud environments is not always feasible due to the operational cost and the scalability. Despite increasing research activity, this field lacks a simulation tool that supports the modeling of both computational and networking resources to handle the edge computing scenarios. Existing network simulators can model the network behavior at different levels of granularity. The cloud computing simulators support the modeling and simulation of the computational infrastructures and services efficiently. Starting from the available simulators, a significant programming effort is required to obtain a simulation tool meeting the actual needs. On the other hand, designing a new edge computing tool has many challenges such as the scalability, extensibility, and modeling the mobility, network, and virtualized resources. To decrease the barriers, a new simulator tool called EdgeCloudSim streamlined for the edge computing scenarios is proposed in this work. EdgeCloudSim builds upon CloudSim to address the specific demands of edge computing research and support the necessary functionalities. To demonstrate the capabilities of EdgeCloudSim, an experiment setup based on different edge architectures is simulated. In addition, the effect of the edge server capacity and the mobility on the overall system performance are investigated.
“…One critical requirement in enabling efficient CRIoT networking with time‐critical traffic is operating under the unavailability security threat . In CRIoT networks, the unavailability threat is defined by the denial of a CRIoT device from successfully delivering data packets within a given delay requirements by disrupting/jamming the communications over the selected channel(s) .…”
Cognitive radio (CR) is considered as a key enabling communication technology that offers efficient wireless connectivity to Internet of Things (IoT) devices. Its integration with the future 5G architecture is expected to advance the IoT paradigm. Security attacks can severely degrade the performance of such CR‐based IoT (CRIoT) networks. The effect of security attacks can be reduced by implementing defensive approaches. However, such solutions come at the expense of degrading spectrum efficiency and consuming more network resources. In this paper, we investigate the spectrum sharing and access problem in a multidevice single‐transceiver CRIoT network with time‐critical applications under jamming attacks. Our main goal is to maximize the number of simultaneously served IoT devices over all available idle channels while ensuring delay requirement, hardware, link quality, security attacks, and spectrum utilization constraints. This problem is formulated as a total unimodular binary linear programming, which is shown to be solvable in polynomial time. Unlike most of previous security‐aware channel assignment solutions that conduct the channel assignment sequentially, our solution simultaneously provides secured distributed channel‐assignment decisions for multiple CRIoT links (batching method). Batching can be realized through an admission control stage for CR IoT devices to announce their control packets. Simulation results reveal that our solution significantly improves network performance compared to previous security‐aware schemes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.