The Library
An opportunistic resource management model to overcome resource-constraint in the Internet of Things
Tools
Sohrabi Safa, Nader , Maple, Carsten, Haghparast, Mahboobeh, Watson, Tim and Dianati, Mehrdad (2019) An opportunistic resource management model to overcome resource-constraint in the Internet of Things. Concurrency and Computation: Practice and Experience, 31 (8). e5014. doi:10.1002/cpe.5014 ISSN 1532-0626.
|
PDF
WRAP-opportunistic-resource-model-constraint-IOT-Sohrabi-2018.pdf - Accepted Version - Requires a PDF viewer. Download (915Kb) | Preview |
Official URL: https://doi.org/10.1002/cpe.5014
Abstract
Experts believe that the Internet of Things (IoT) is a new revolution in technology and has brought many advantages for our society. However, there are serious challenges in terms of information security and privacy protection. Smart objects usually do not have malware detection due to resource limitations and their intrusion detection work on a particular network. Low computation power, low bandwidth, low battery, storage, and memory contribute to a resource‐constrained effect on information security and privacy protection in the domain of IoT. The capacity of fog and cloud computing such as efficient computing, data access, network and storage, supporting mobility, location awareness, heterogeneity, scalability, and low latency in secure communication positively influence information security and privacy protection in IoT. This study illustrates the positive effect of fog and cloud computing on the security of IoT systems and presents a decision‐making model based on the object's characteristics such as computational power, storage, memory, energy consumption, bandwidth, packet delivery, hop‐count, etc. This helps an IoT system choose the best nodes for creating the fog that we need in the IoT system. Our experiment shows that the proposed approach has less computational, communicational cost, and more productivity in compare with the situation that we choose the smart objects randomly to create a fog.
Item Type: | Journal Article | ||||||||
---|---|---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software T Technology > TK Electrical engineering. Electronics Nuclear engineering |
||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > WMG (Formerly the Warwick Manufacturing Group) | ||||||||
SWORD Depositor: | Library Publications Router | ||||||||
Library of Congress Subject Headings (LCSH): | Internet of things, Data protection, Web services, Cloud computing | ||||||||
Journal or Publication Title: | Concurrency and Computation: Practice and Experience | ||||||||
Publisher: | John Wiley & Sons Ltd. | ||||||||
ISSN: | 1532-0626 | ||||||||
Official Date: | 25 April 2019 | ||||||||
Dates: |
|
||||||||
Volume: | 31 | ||||||||
Number: | 8 | ||||||||
Article Number: | e5014 | ||||||||
DOI: | 10.1002/cpe.5014 | ||||||||
Status: | Peer Reviewed | ||||||||
Publication Status: | Published | ||||||||
Reuse Statement (publisher, data, author rights): | "This is the peer reviewed version of the following article: Safa NS, Maple C, Haghparast M, Watson T, Dianati M. An opportunistic resource management model to overcome resource‐constraint in the Internet of Things. Concurrency Computat Pract Exper. 2018;e5014. which has been published in final form at https://doi.org/10.1002/cpe.5014. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions." | ||||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||||
Date of first compliant deposit: | 5 October 2018 | ||||||||
Date of first compliant Open Access: | 25 September 2019 | ||||||||
RIOXX Funder/Project Grant: |
|
||||||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year