2019
DOI: 10.1109/access.2019.2892508
|View full text |Cite
|
Sign up to set email alerts
|

Profiling Performance of Application Partitioning for Wearable Devices in Mobile Cloud and Fog Computing

Abstract: Wearable devices have become essential in our daily activities. Due to battery constraints, the use of computing, communication, and storage resources is limited. Mobile cloud computing (MCC) and the recently emerged fog computing (FC) paradigms unleash unprecedented opportunities to augment the capabilities of wearable devices. Partitioning mobile applications and offloading computationally heavy tasks for execution to the cloud or edge of the network is the key. Offloading prolongs the lifetime of the batter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(26 citation statements)
references
References 29 publications
0
26
0
Order By: Relevance
“…This section includes challenges in wearable technologies and some future study suggestions. When wearable device technology is combined with fog computing, this integrated structure can be a solution for applications requiring low latency (Fiandrino et al, 2019). However, today there are a lot of challenges with wearable technologies.…”
Section: Challenges In Wearable Technologies and Future Workmentioning
confidence: 99%
“…This section includes challenges in wearable technologies and some future study suggestions. When wearable device technology is combined with fog computing, this integrated structure can be a solution for applications requiring low latency (Fiandrino et al, 2019). However, today there are a lot of challenges with wearable technologies.…”
Section: Challenges In Wearable Technologies and Future Workmentioning
confidence: 99%
“…A, N, SW [46], [111] Energy awareness regarding neighboring nodes to select the optimal route [50] Multi parameter cost function for the next hop selection [60] Selective data routing based on the data priority Securityrelated aspects HW, DP, SW [110] Content agnostic privacy and encryption protocol eliminating the need for asymmetric encryption [180], [181] Integration of lightweight cryptography solutions including more appropriate elliptic curve types or algorithm implementations [186] More efficient utilization of manufacturer-provide SoCs accelerated for cryptographic primitives execution [187] Finding trade-offs between the primitive and required level of the provided security Processing limitations HW, DP, SW [54] The use of heterogeneous multicore processor gateway as compared to little cores gateway working as a router [64], [86], [104], [105] Task offloading to leverage high computing resources of nearby devices for improved performance [106] Edge/fog/cloud computing techniques for optimal performance [107] Seamless resource sharing between heterogeneous mobile devices Storage limitations HW [47], [55] Data compression to reduce the size of the dataset for efficient data processing and storage [106] Edge/Fog/Cloud computing techniques for better performance [173] Data summarization and aggregation Lack of hardware acceleration HW, SW [47], [55] Data compression to reduce the size of the data set for more efficient data processing and storage [64], [86], [104], [105] Task offloading to leverage high computing resources of the nearby devices for the improved performance [186] Identifying and use of present hardware acceleration, which may not be accessible by the default Inefficient use of energy consuming modules HW, SW [62] Configurable data acquisition modules [88] Replacing high power consumption modules with low power alternates, e.g., using two accelerometers instead of a gyroscope as...…”
Section: Inefficient Routingmentioning
confidence: 99%
“…In [14], it proposed a service placement policy in IoT networks based on graph partitions to increase the service availability and QoS satisfaction. In [15], the authors discussed the application partitioning rationale of wearable devices in mobile cloud and fog computing for computation offloading. In order to solve the user association and resource allocation problem for broadband IoT applications in fog computing, a two-side matching game was formulated based on the determination of QoS requirements priorities in [16].…”
Section: A Related Workmentioning
confidence: 99%
“…5. Please note that all the OAS m and RA n will exchange according to formula (15) in the mutation stage.…”
Section: ) Mutationmentioning
confidence: 99%