Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

An opportunistic resource management model to overcome resource-constraint in the Internet of Things

Tools
- Tools
+ Tools

Sohrabi Safa, Nader , Maple, Carsten, Haghparast, Mahboobeh, Watson, Tim and Dianati, Mehrdad (2018) An opportunistic resource management model to overcome resource-constraint in the Internet of Things. Concurrency and Computation: Practice and Experience . e5014. doi:10.1002/cpe.5014 (In Press)

[img]
Preview
PDF
WRAP-opportunistic-resource-model-constraint-IOT-Sohrabi-2018.pdf - Accepted Version - Requires a PDF viewer.

Download (915Kb) | Preview
Official URL: https://doi.org/10.1002/cpe.5014

Request Changes to record.

Abstract

Experts believe that the Internet of Things (IoT) is a new revolution in technology and has brought many advantages for our society. However, there are serious challenges in terms of information security and privacy protection. Smart objects usually do not have malware detection due to resource limitations and their intrusion detection work on a particular network. Low computation power, low bandwidth, low battery, storage, and memory contribute to a resource‐constrained effect on information security and privacy protection in the domain of IoT. The capacity of fog and cloud computing such as efficient computing, data access, network and storage, supporting mobility, location awareness, heterogeneity, scalability, and low latency in secure communication positively influence information security and privacy protection in IoT. This study illustrates the positive effect of fog and cloud computing on the security of IoT systems and presents a decision‐making model based on the object's characteristics such as computational power, storage, memory, energy consumption, bandwidth, packet delivery, hop‐count, etc. This helps an IoT system choose the best nodes for creating the fog that we need in the IoT system. Our experiment shows that the proposed approach has less computational, communicational cost, and more productivity in compare with the situation that we choose the smart objects randomly to create a fog.

Item Type: Journal Article
Subjects: Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Faculty of Science > WMG (Formerly the Warwick Manufacturing Group)
SWORD Depositor: Library Publications Router
Library of Congress Subject Headings (LCSH): Internet of things, Data protection, Web services, Cloud computing
Journal or Publication Title: Concurrency and Computation: Practice and Experience
Publisher: John Wiley & Sons Ltd.
ISSN: 1532-0626
Official Date: 25 September 2018
Dates:
DateEvent
25 September 2018Available
1 September 2018Accepted
Date of first compliant deposit: 5 October 2018
Article Number: e5014
DOI: 10.1002/cpe.5014
Status: Peer Reviewed
Publication Status: In Press
Publisher Statement: "This is the peer reviewed version of the following article: Safa NS, Maple C, Haghparast M, Watson T, Dianati M. An opportunistic resource management model to overcome resource‐constraint in the Internet of Things. Concurrency Computat Pract Exper. 2018;e5014. which has been published in final form at https://doi.org/10.1002/cpe.5014. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions."
Access rights to Published version: Restricted or Subscription Access
RIOXX Funder/Project Grant:
Project/Grant IDRIOXX Funder NameFunder ID
PETRAS IoT Research Hub[EPSRC] Engineering and Physical Sciences Research Councilhttp://dx.doi.org/10.13039/501100000266
Related URLs:
  • Publisher

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us