The Internet of Vehicles(IoV)has been widely researched in recent years,and cloud computing has been one of the key technologies in the IoV.Although cloud computing provides high performance compute,storage and networ...The Internet of Vehicles(IoV)has been widely researched in recent years,and cloud computing has been one of the key technologies in the IoV.Although cloud computing provides high performance compute,storage and networking services,the IoV still suffers with high processing latency,less mobility support and location awareness.In this paper,we integrate fog computing and software defined networking(SDN) to address those problems.Fog computing extends computing and storing to the edge of the network,which could decrease latency remarkably in addition to enable mobility support and location awareness.Meanwhile,SDN provides flexible centralized control and global knowledge to the network.In order to apply the software defined cloud/fog networking(SDCFN) architecture in the IoV effectively,we propose a novel SDN-based modified constrained optimization particle swarm optimization(MPSO-CO) algorithm which uses the reverse of the flight of mutation particles and linear decrease inertia weight to enhance the performance of constrained optimization particle swarm optimization(PSO-CO).The simulation results indicate that the SDN-based MPSO-CO algorithm could effectively decrease the latency and improve the quality of service(QoS) in the SDCFN architecture.展开更多
Following the progression in Internet of Things(IoT) and 5G communication networks, the traditional cloud computing model have shifted to fog computing. Fog computing provides mobile computing, network control and sto...Following the progression in Internet of Things(IoT) and 5G communication networks, the traditional cloud computing model have shifted to fog computing. Fog computing provides mobile computing, network control and storage to the network edges to assist latency critical and computation-intensive applications. Moreover, security features are improved in fog paradigm by processing critical data on edge devices instead of data centres outside the control plane of users. However, fog network deployment imposes many challenges including resource allocation, privacy of users, non-availability of programming model and testing software and support for the heterogenous networks. This article highlights these challenges and their potential solutions in detail. This article also discusses threetier fog network architecture, its standardization and benefits in detail. The proposed resource allocation mechanism for three tier fog networks based on swap matching is described. Results show that by practicing the proposed resource allocation mechanism, maximum throughput with reduced latency is achieved.展开更多
The industry of cellular networks is evaluating the new architectures to ensure an enhanced performance. Fog communication is the new paradigm that presented to unleash edge computing. In this paper, we introduced a m...The industry of cellular networks is evaluating the new architectures to ensure an enhanced performance. Fog communication is the new paradigm that presented to unleash edge computing. In this paper, we introduced a mathematical framework to evaluate the trade-offs of Fog proposal. Specifically, testing the power consumption, delay and energy efficiency in comparison with traditional cloud radio access networks. Although the literature has showed that fog radio access networks provides an enhanced delay performance, this paper shows that an enlarged amount of power is consumed, which degrades the energy efficiency in comparison with traditional cloud counterpart. However, the level of such devolution depends on the number of deployed fog devices that directly influences the power consumption. This paper also shows that enhancing the delay by using fog architecture is not a straight forward process, but requires a particular caring in terms of choosing the appropriate mode while placing/installing fog functions within fog devices.展开更多
A Distributed Denial of Service Attack (DDoS) is an attack in which multiple systems compromised by a Trojan are maliciously used to target a single system. The attack leads to the denial of a certain service on the t...A Distributed Denial of Service Attack (DDoS) is an attack in which multiple systems compromised by a Trojan are maliciously used to target a single system. The attack leads to the denial of a certain service on the target system. In a DDoS attack, both the target system and the systems used to perform the attack are all victims of the attack. The compromised systems are also called Botnets. These attacks occur on networked systems, among them the cloud computing facet. Scholars have tried coming up with separate mechanisms for detecting and preventing such attacks long before they occur. However, as technology progresses in advancement so do the attack mechanisms. In cloud computing, security issues affect various stakeholders who plan on cloud adoption. DDoS attacks are such serious concerns that require mitigation in the cloud. This paper presents a survey of the various mechanisms, both traditional and modern, that are applied in detecting cloud-based DDoS attacks.展开更多
Health care visualization through Internet of Things(IoT)over wireless sensor network(WSN)becomes a current research attention due to medical sensor evolution of devices.The digital technology-based communication syst...Health care visualization through Internet of Things(IoT)over wireless sensor network(WSN)becomes a current research attention due to medical sensor evolution of devices.The digital technology-based communication system is widely used in all application.Internet of medical thing(IoMT)assisted health-care application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human participation.These smart medical devices may consume with limited resources and also the data generated by these devices are large in size.These IoMT based applications suffer from the issues such as security,anonymity,privacy,and interoper-ability.To overcome these issues,data aggregation methods are the solution that can concatenate the data generated by the sensors and forward it into the base station through fog node with efficient encryption and decryption.This article proposed a well-organized data aggregation and secured transmission approach.The data generated by the sensor are collected and compressed.Aggregator nodes(AN)received the compressed data and concatenate it.The concatenated and encrypted data is forward to fog node using the enhanced Paillier cryptogra-phy-based encryption with Message Authentication code(MAC).Fog node extracts the forwarded data from AN using Fog message extractor method(FME)with decryption.The proposed system ensures data integrity,security and also protects from security threats.This proposed model is simulated in Net-work Simulator 2.35 and the evaluated simulation results proves that the aggregation with MAC code will ensures the security,privacy and also reduces the communication cost.Fog node usages in between Aggregator and base station,will reduce the cloud server/base station computational overhead and storage cost.The proposed ideology is compared with existing data aggregation schemes in terms of computational cost,storage cost,communication cost and energy cost.Cost of communication takes 18.7 ms which is much lesser than existing schemes.展开更多
基金supported in part by National Natural Science Foundation of China (No.61401331,No.61401328)111 Project in Xidian University of China(B08038)+2 种基金Hong Kong,Macao and Taiwan Science and Technology Cooperation Special Project (2014DFT10320,2015DFT10160)The National Science and Technology Major Project of the Ministry of Science and Technology of China(2015zx03002006-003)FundamentalResearch Funds for the Central Universities (20101155739)
文摘The Internet of Vehicles(IoV)has been widely researched in recent years,and cloud computing has been one of the key technologies in the IoV.Although cloud computing provides high performance compute,storage and networking services,the IoV still suffers with high processing latency,less mobility support and location awareness.In this paper,we integrate fog computing and software defined networking(SDN) to address those problems.Fog computing extends computing and storing to the edge of the network,which could decrease latency remarkably in addition to enable mobility support and location awareness.Meanwhile,SDN provides flexible centralized control and global knowledge to the network.In order to apply the software defined cloud/fog networking(SDCFN) architecture in the IoV effectively,we propose a novel SDN-based modified constrained optimization particle swarm optimization(MPSO-CO) algorithm which uses the reverse of the flight of mutation particles and linear decrease inertia weight to enhance the performance of constrained optimization particle swarm optimization(PSO-CO).The simulation results indicate that the SDN-based MPSO-CO algorithm could effectively decrease the latency and improve the quality of service(QoS) in the SDCFN architecture.
文摘Following the progression in Internet of Things(IoT) and 5G communication networks, the traditional cloud computing model have shifted to fog computing. Fog computing provides mobile computing, network control and storage to the network edges to assist latency critical and computation-intensive applications. Moreover, security features are improved in fog paradigm by processing critical data on edge devices instead of data centres outside the control plane of users. However, fog network deployment imposes many challenges including resource allocation, privacy of users, non-availability of programming model and testing software and support for the heterogenous networks. This article highlights these challenges and their potential solutions in detail. This article also discusses threetier fog network architecture, its standardization and benefits in detail. The proposed resource allocation mechanism for three tier fog networks based on swap matching is described. Results show that by practicing the proposed resource allocation mechanism, maximum throughput with reduced latency is achieved.
基金supported by University of Diyala,college of Engineering,department of communications,Diyala,Iraq.
文摘The industry of cellular networks is evaluating the new architectures to ensure an enhanced performance. Fog communication is the new paradigm that presented to unleash edge computing. In this paper, we introduced a mathematical framework to evaluate the trade-offs of Fog proposal. Specifically, testing the power consumption, delay and energy efficiency in comparison with traditional cloud radio access networks. Although the literature has showed that fog radio access networks provides an enhanced delay performance, this paper shows that an enlarged amount of power is consumed, which degrades the energy efficiency in comparison with traditional cloud counterpart. However, the level of such devolution depends on the number of deployed fog devices that directly influences the power consumption. This paper also shows that enhancing the delay by using fog architecture is not a straight forward process, but requires a particular caring in terms of choosing the appropriate mode while placing/installing fog functions within fog devices.
文摘A Distributed Denial of Service Attack (DDoS) is an attack in which multiple systems compromised by a Trojan are maliciously used to target a single system. The attack leads to the denial of a certain service on the target system. In a DDoS attack, both the target system and the systems used to perform the attack are all victims of the attack. The compromised systems are also called Botnets. These attacks occur on networked systems, among them the cloud computing facet. Scholars have tried coming up with separate mechanisms for detecting and preventing such attacks long before they occur. However, as technology progresses in advancement so do the attack mechanisms. In cloud computing, security issues affect various stakeholders who plan on cloud adoption. DDoS attacks are such serious concerns that require mitigation in the cloud. This paper presents a survey of the various mechanisms, both traditional and modern, that are applied in detecting cloud-based DDoS attacks.
基金This research was supported by Korea Institute for Advancement of Technology(KIAT)grant funded by the Korea Government(MOTIE)(P0012724,The Competency Development Program for Industry Specialist)the Soonchunhyang University Research Fund+2 种基金This research was supported by a grant of the Korea Health Technology R&D Project through the Korea Health Industry Development Institute(KHIDI)funded by the Ministry of Health&Welfare,Republic of Korea(grant number:HI21C1831)the Soonchunhyang University Research Fund.
文摘Health care visualization through Internet of Things(IoT)over wireless sensor network(WSN)becomes a current research attention due to medical sensor evolution of devices.The digital technology-based communication system is widely used in all application.Internet of medical thing(IoMT)assisted health-care application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human participation.These smart medical devices may consume with limited resources and also the data generated by these devices are large in size.These IoMT based applications suffer from the issues such as security,anonymity,privacy,and interoper-ability.To overcome these issues,data aggregation methods are the solution that can concatenate the data generated by the sensors and forward it into the base station through fog node with efficient encryption and decryption.This article proposed a well-organized data aggregation and secured transmission approach.The data generated by the sensor are collected and compressed.Aggregator nodes(AN)received the compressed data and concatenate it.The concatenated and encrypted data is forward to fog node using the enhanced Paillier cryptogra-phy-based encryption with Message Authentication code(MAC).Fog node extracts the forwarded data from AN using Fog message extractor method(FME)with decryption.The proposed system ensures data integrity,security and also protects from security threats.This proposed model is simulated in Net-work Simulator 2.35 and the evaluated simulation results proves that the aggregation with MAC code will ensures the security,privacy and also reduces the communication cost.Fog node usages in between Aggregator and base station,will reduce the cloud server/base station computational overhead and storage cost.The proposed ideology is compared with existing data aggregation schemes in terms of computational cost,storage cost,communication cost and energy cost.Cost of communication takes 18.7 ms which is much lesser than existing schemes.