2017
DOI: 10.1109/access.2017.2739804
|View full text |Cite
|
Sign up to set email alerts
|

Edge Mesh: A New Paradigm to Enable Distributed Intelligence in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
89
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 181 publications
(108 citation statements)
references
References 42 publications
0
89
0
Order By: Relevance
“…A crisp analysis of some of the renowned methods are analyzed here to compare the performance with the proposed method. The existing methods taken for analysis are Aggregated-Proof based Hierarchical Authentication Scheme for the Internet-of-Things (APHA) [8], Edge Mesh: A New Paradigm to Enable Distributed Intelligence in Internet of Thing (DIIOT) [9], Graph Theory Applications in Network Security (GTANS) [10], Secure and Efficient Protocol for Route Optimization in PMIPv6based Smart Home IoT Network (SEPRP-SHIOT) [11], An Ultra-lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet-of-Things (ULASHWSN) [12] and A New Security Authentication Method in the Internet of Things based on PID and Design Impedance Mismatch Physical Unclonable Functions for IoT security (SAMPID) [13].…”
Section: Existing Methodsmentioning
confidence: 99%
“…A crisp analysis of some of the renowned methods are analyzed here to compare the performance with the proposed method. The existing methods taken for analysis are Aggregated-Proof based Hierarchical Authentication Scheme for the Internet-of-Things (APHA) [8], Edge Mesh: A New Paradigm to Enable Distributed Intelligence in Internet of Thing (DIIOT) [9], Graph Theory Applications in Network Security (GTANS) [10], Secure and Efficient Protocol for Route Optimization in PMIPv6based Smart Home IoT Network (SEPRP-SHIOT) [11], An Ultra-lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet-of-Things (ULASHWSN) [12] and A New Security Authentication Method in the Internet of Things based on PID and Design Impedance Mismatch Physical Unclonable Functions for IoT security (SAMPID) [13].…”
Section: Existing Methodsmentioning
confidence: 99%
“…technologies can operate concurrently with less information exchange among different network layers and nodes [6]. Moreover, instead of offloading all tasks to the edge-servers, Device-to-Device (D2D) technology can reduce the burdens on the servers by enabling mobile users to benefit from the available computing resources in nearby devices in a cooperative manner [7]. Also, the existence of SBSs in the vicinity of mobile users provides accurate spatio-temporal information about popular contents, and hence more accurate content caching and better usage of the limited storage capacity.…”
Section: Classification Of Emerging Edge-iot Technologiesmentioning
confidence: 99%
“…Adiono et al proposed a system platform named meshed and internet networked devices system to interconnect the home appliances in a meshed fashion. Sahni et al presented a mesh networking architecture IoTs to ease computing requirements of IoT devices. In the work of Hou et al, a spectrum sharing mechanism is presented for multihop CRMNs.…”
Section: Related Workmentioning
confidence: 99%