2019
DOI: 10.1016/j.future.2018.12.063
|View full text |Cite
|
Sign up to set email alerts
|

Container-based fog computing architecture and energy-balancing scheduling algorithm for energy IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
56
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 115 publications
(57 citation statements)
references
References 11 publications
0
56
0
1
Order By: Relevance
“…It is suitable for energy managing in the fog because it helps to preserve more energy. In this regard, Luo et al have presented a task scheduling algorithm for energy balancing. The algorithm is based on the transmission energy consumption of terminal devices and uses a dynamic threshold strategy to schedule requests in real time, thereby assuring the energy balancing of terminal devices without increasing the transmission delay.…”
Section: Discussionmentioning
confidence: 99%
“…It is suitable for energy managing in the fog because it helps to preserve more energy. In this regard, Luo et al have presented a task scheduling algorithm for energy balancing. The algorithm is based on the transmission energy consumption of terminal devices and uses a dynamic threshold strategy to schedule requests in real time, thereby assuring the energy balancing of terminal devices without increasing the transmission delay.…”
Section: Discussionmentioning
confidence: 99%
“…The fog network provides optimized resources to the involved local participants and, therefore, it should offer dynamic resource allocation, scheduling and offloading functionalities [57]. The fog network would also utilize the virtualization technologies to provide efficient allocation, provisioning and sharing of resources/services [58]. Furthermore, mobility management and local awareness at the fog network is essential because of delivery of the required services/resources to the moving users and to the resource constrained local nodes/devices.…”
Section: B Requirements For Fog Networkmentioning
confidence: 99%
“…Docker is a well‐known container that is widely used in recent years. This technology is used in Usamentiaga et al 84 and Luo et al 109 However, it should be noted that containers have security vulnerabilities such as container manipulation, misuse of virtualized resources, information sniffing, and privacy leakage 129 . Some of security vulnerabilities can be solved through cluster management and container orchestration tools 124 such as Kubernetes.…”
Section: Classification Of Challengesmentioning
confidence: 99%