Article
Computer Science, Information Systems
L. Sujihelen, Rajasekhar Boddu, S. Murugaveni, Ms Arnika, Anandakumar Haldorai, Pundru Chandra Shaker Reddy, Suili Feng, Jiayin Qin
Summary: Wireless sensor networks face security challenges due to the lack of power and storage in sensor nodes. Node replication attack is a prominent threat which can be detected using a proposed system called Strategic Security System (SSS).
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Hongyu Yang, Xugao Zhang, Fang Cheng
Summary: This paper proposed a malicious node detection model based on reputation, utilizing the Enhanced LEACH routing protocol. The model efficiently identifies malicious nodes in wireless sensor networks through evaluating and comparing information in data packets, ultimately achieving a lower false alarm rate.
MOBILE NETWORKS & APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Mohammed Abdulaziz Al-Naeem
Summary: This study focuses on distributed denial of service (DDOS), particularly DDoS-PSH-ACK (ACK & PUSH ACK Flood) in Wireless Sensor Networks. Experimental analysis showed that timing the transmission of ACK packets is crucial to ensuring the security of target nodes.
Article
Computer Science, Information Systems
Lakshmana Kumar Ramasamy, Firoz K. P. Khan, Agbotiname Lucky Imoize, Joshua O. Ogbebor, Seifedine Kadry, Seungmin Rho
Summary: Wireless Sensor Networks (WSNs) are widely used for tracking and surveillance applications, with security becoming a critical issue. This paper discusses a blockchain-based approach for malicious node detection, covering architecture, applications, and smart contract aspects. Blockchain technology has significant impacts on WSN data and security management.
Article
Engineering, Electrical & Electronic
Xintao Huan, Kyeong Soo Kim, Junqing Zhang
Summary: The study proposes a new node identification scheme called NISA, which utilizes reverse time synchronization framework and radio link information to achieve simultaneous node identification and attack detection. Experimental results demonstrate that NISA can accurately identify nodes and detect Spoofing attacks.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2021)
Article
Computer Science, Software Engineering
S. Murugaveni, B. Priyalakshmi
Summary: This article proposes a novel strategy and optimization method to eliminate disturbance in a sensor network and save node power consumption. By using edge nodes, sub-edge nodes, and cluster heads for jamming attack detection, hyperbolic optimization is implemented in the cluster to eliminate data transmission failures and the node's round trip time is considered to detect jamming attacks. The proposed method has improved the detection accuracy by 11.1% compared to existing techniques, as demonstrated in MATLAB platform implementation and analysis.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2023)
Article
Telecommunications
P. J. Beslin Pajila, E. Golden Julie, Y. Harold Robinson
Summary: This paper presents a method based on fuzzy inference system and adaptive neuro-fuzzy inference system (ANFIS) for detecting flooding attacks in wireless sensor networks. By using parameters such as energy consumption of node and packet transfer rate, and by calculating metrics like mobility factor, residual energy, and trust factor to elect cluster head, this method can detect flooding attacks more efficiently.
WIRELESS PERSONAL COMMUNICATIONS
(2023)
Review
Computer Science, Information Systems
Attique Ur Rehman, Muhammad Sajid Mahmood, Muhammad Ahsan Raza, Fahad Qaswar, Sumayh S. Aljameel, Irfan Ullah Khan, Nida Aslam
Summary: Physical layer security for wireless sensor networks is a critical issue. Challenges include data security in wireless transmission and threats to the physical security of networks. The paper surveys parameters of a security design model and discusses attacks and mitigation techniques at different layers. Additionally, it introduces applications of WSNs in various fields and proposes a solution to enhance WSN security.
Article
Engineering, Electrical & Electronic
Zhijun Teng, Chunqiu Du, Meng Li, Hengjia Zhang, Weihua Zhu
Summary: This paper proposes a detection algorithm integrated with the node trust optimization model (NTOM-DA) against wormholes in WSNs. It effectively resists wormhole attacks and improves network performance by marking and testing the paths of suspicious nodes.
IEEE SENSORS JOURNAL
(2022)
Article
Computer Science, Information Systems
Reham Almesaeed, Eman Al-Salem
Summary: The detection of sybil attack is a major security challenge in wireless sensor networks (WSNs). This study proposes a novel sybil attack detection method called CPPR, which utilizes wireless channel profile and transmission power regulation. The proposed mechanism can prevent various attacks and maintain a high detection ratio, while providing low operational overhead and energy consumption.
Article
Computer Science, Information Systems
Anastassia Gharib, Mohamed Ibnkahla
Summary: This article proposes a node embedding with security resource allocation (NESRA) clustering algorithm for mobile ICWSNs, allocating security resources to sensor nodes in three steps to achieve efficient ICWSN operation, data security, and timely data access to mobile users.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Hsin-Hsiu Chen, Cooper Cheng-Yuan Ku, David C. Yen
Summary: In this paper, a fault-tolerant method for replica detection based on SPRT in WSNs is proposed. By using the residual energy and slope of energy consumption of the node as appendices, the detection rate is dynamically adjusted, leading to improved efficiency and reliability in detection.
INTERNATIONAL JOURNAL OF SENSOR NETWORKS
(2022)
Article
Computer Science, Information Systems
Jung Sub Ahn, Tae Ho Cho
Summary: With the increasing popularity of wireless sensor networks (WSNs) and intelligent systems in various fields, data security has become more important. This study introduces a detection method using historical data to recognize abnormal correlations and prevent false data inflow. Furthermore, a new strategy is proposed to maximize the network's lifetime.
Article
Computer Science, Information Systems
Arnab Kumar Biswas, Navonil Chatterjee, Hemanta Kumar Mondal, Guy Gogniat, Jean-Philippe Diguet
Summary: WiNoC systems face security vulnerabilities like MTC and DTP attacks, but can be enhanced through countermeasures to improve system performance and safeguard network security.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
(2021)
Article
Computer Science, Information Systems
R. Isaac Sajan, V. Bibin Christopher, M. Joselin Kavitha, T. S. Akhila
Summary: In this study, a Three-Level Weighted Trust evaluation-based Grey Wolf Optimization (3LWT-GWO) approach is proposed for the effective detection of misbehaving nodes and optimal secure routing in wireless sensor networks. The method achieves better results in terms of energy consumption, throughput, network lifetime, accuracy, detection rate, and delay compared to existing techniques.
Article
Computer Science, Hardware & Architecture
Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng
Summary: To reduce costs and improve collaboration in healthcare research and commercial activities, electronic medical records (EMRs) are proposed to shift to shareable electronic records. However, the trustworthiness of cloud service providers poses a challenge. In this paper, a secure and efficient EMR sharing system is proposed, featuring a novel cryptosystem and blockchain technology, which allows fine-grained sharing and detection of unauthorized manipulation.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Theory & Methods
Jianfei Sun, Guowen Xu, Tianwei Zhang, Xuehuan Yang, Mamoun Alazab, Robert H. Deng
Summary: The cloud-based data sharing technology with cryptographic primitives allows data owners to outsource data and share information privately with arbitrary recipients regardless of geographical barriers. However, existing efforts in outsourced data sharing are inefficient, inflexible, or insecure due to issues such as dynamic target ciphertext designation, identity hiding of recipients, and verification of outsourced ciphertext transformation. Motivated by this, we design VF-PPBA, the first Verifiable, Fair and Privacy-preserving Broadcast Authorization framework for flexible data sharing in clouds. Using a new primitive called privacy-preserving multi-recipient broadcast proxy re-encryption (PPMR-BPRE), we ensure efficient ciphertext transformation, identity protection, and verify the correctness of outsourced conversion tasks.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Article
Computer Science, Theory & Methods
Shengmin Xu, Xinyi Huang, Jiaming Yuan, Yingjiu Li, Robert H. Deng
Summary: Most blockchains are immutable, which poses challenges for blockchain development due to storage abuse and legal obligations. To address this, Derler et al. proposed a redactable blockchain with fine-grained controllable rewriting using policy-based chameleon hash (PCH). However, their solution lacked accountability, allowing trapdoor holders to potentially abuse their privileges. In this paper, a design for a PCH with blackbox accountability (PCHA) is introduced, offering linkability and traceability to identify responsible trapdoor holders. The PCHA construction is proven to have rigorous security and is implemented with minimal overhead compared to existing solutions.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Article
Computer Science, Hardware & Architecture
Hua Deng, Zheng Qin, Qianhong Wu, Robert H. Deng, Zhenyu Guan, Yupeng Hu, Fangmin Li
Summary: Cloud computing is popular for data storage and sharing. Encryption is important for data security, but can hinder data sharing. This article proposes a hierarchical data sharing scheme that allows the data owner to selectively share encrypted data with users in a hierarchy, providing control over access.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Automation & Control Systems
Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng
Summary: Voiceprint authentication provides convenience but is vulnerable to spoofing attacks. Liveness detection is an effective way to resist these attacks, but current methods have drawbacks such as high costs and complexity. This article proposes a novel liveness detection method called LiVoAuth, which uses a randomly generated vector sequence as the liveness detection mode. User studies show that LiVoAuth outperforms cutting-edge methods in terms of accuracy, stability, efficiency, security, and user acceptance.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Bowen Zhao, Ximeng Liu, Wei-Neng Chen, Robert H. Deng
Summary: In this paper, a privacy-preserving mobile crowdsensing system called CROWDFL is proposed by integrating federated learning (FL) into MCS. Participants in CROWDFL locally process sensing data and only upload encrypted training models to the server to protect their privacy. The system also includes a secure aggregation algorithm and a hybrid incentive mechanism to improve efficiency and stimulate participation.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Theory & Methods
Yuxian Li, Jian Weng, Wei Wu, Ming Li, Yingjiu Li, Haoxin Tu, Yongdong Wu, Robert H. Deng
Summary: Blockchain systems are widely used in various scenarios, but traditional systems face scalability issues. Payment Channel Hubs (PCHs) are proposed to address this issue, with recent efforts enhancing privacy, reusability, and interoperability properties. However, current solutions have limitations such as reliance on trusted hardware or deposit lock-in problem. We propose a novel PCH solution called PRI that guarantees privacy, reusability, and interoperability while mitigating these problems.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2023)
Article
Computer Science, Theory & Methods
Bowen Zhao, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Yingjiu Li, Robert H. Deng
Summary: This paper presents CROWD FA, a novel paradigm for privacy-preserving mobile crowdsensing (MCS) through federated analytics (FA), which achieves a well-rounded solution encompassing data aggregation, incentive design, and privacy protection. CROWD FA enables participants to perform aggregation operations on their local data, while preserving privacy through efficient cryptographic techniques. Experimental evaluations demonstrate that CROWD FA outperforms state-of-the-art approaches by achieving up to 22 times faster computation time.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Article
Computer Science, Information Systems
Jianfei Sun, Guowen Xu, Tianwei Zhang, Hu Xiong, Hongwei Li, Robert H. Deng
Summary: Benefiting from the powerful computing and storage capabilities of cloud services, data sharing in the cloud has been widely used in various applications. However, concerns about data privacy breaches have arisen due to outsourcing data to untrusted cloud. To address this issue, this article proposes an Efficient, Scalable and Privacy-preserving Data sharing framework over encrypted cloud dataset (ESPD). Unlike previous works, ESPD supports sharing target data to multiple users with distinct secret keys and maintains a constant ciphertext length. Security analysis and real-world experiments demonstrate the desirable performance of ESPD compared to other similar schemes.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Information Systems
Feng Li, Jianfeng Ma, Yinbin Miao, Zhiquan Liu, Kim-Kwang Raymond Choo, Ximeng Liu, Robert H. Deng
Summary: Symmetric Searchable Encryption (SSE) schemes have been extensively explored for improved function, efficiency, and security. However, in real-world settings, additional functions such as forward and backward privacy and support for boolean search are needed. In this article, we propose the construction of Verifiable Boolean Search (VBS) over encrypted data and enhance it to achieve Forward and Backward privacy (VBS-FB). We also provide a formal proof of security and evaluate the performance using real-world datasets.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Information Systems
Yang Yang, Robert H. Deng, Wenzhong Guo, Hongju Cheng, Xiangyang Luo, Xianghan Zheng, Chunming Rong
Summary: In this article, a dual traceable distributed attribute based encryption system (DTDABE-SKS) is proposed to achieve secure provenance and traitor trace, as well as flexible subset keyword search. The system ensures privacy protection for data providers and users using non-interactive zero-knowledge proof technology, while allowing disclosure of real identities in certain circumstances. Additionally, a new concept of updatable and transferable message-lock encryption (UT-MLE) is introduced for block-level dynamic encrypted file updates and efficient ownership transfer.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Bowen Zhao, Yingjiu Li, Ximeng Liu, Xiaoguo Li, Hwee Hwa Pang, Robert H. H. Deng
Summary: This article explores the first solution for building a privacy-preserving person Re-ID system, by formulating privacy-preserving person Re-ID as similarity metrics of encrypted feature vectors.
IEEE TRANSACTIONS ON RELIABILITY
(2023)
Article
Computer Science, Theory & Methods
Lanxiang Chen, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng
Summary: In this paper, a novel approach is proposed to achieve privacy-preserving statistical analysis on an encrypted database. A privacy-preserving calculator is constructed to calculate attributes' count values for later statistical analysis, and an authenticable additive homomorphic encryption scheme is adopted to authenticate these encrypted count values. Furthermore, a cryptosystem based on binary vectors is proposed to achieve complex logic expressions for statistical analysis on encrypted data. Several protocols for statistical analysis, including conjunctive, disjunctive, and complex logic expressions, are designed with the aid of the proposed cryptographic calculator to achieve more complicated statistical functionalities. Experimental results show the feasibility and practicality of the proposed scheme.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Proceedings Paper
Computer Science, Hardware & Architecture
Yinbin Miao, Chao Xu, Yifeng Zheng, Ximeng Liu, Xiangdong Meng, Robert H. Deng
Summary: Spatial range query is widely used in various applications due to the advancement of geo-positioning technology. To address the efficiency and security challenges in large-scale encrypted spatial data, a novel efficient Privacy-preserving Spatial Range Query (ePSRQ) scheme in dual-cloud architecture is proposed. The scheme utilizes a novel index structure, Geohash algorithm, Circular Shift and Coalesce Zero-Sum Garbled Bloom Filter (CSC-ZGBF), and Symmetric Homomorphic Encryption (SHE) to achieve computational complexity independent of dataset size. Formal security analysis demonstrates its robustness against chosen-plaintext attack, and extensive experiments confirm its feasibility in real-world applications.
2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS
(2023)
Article
Automation & Control Systems
Yifan Zhang, Yinbin Miao, Xinghua Li, Linfeng Wei, Zhiquan Liu, Kim-Kwang Raymond Choo, Robert H. Deng
Summary: Researchers propose a secure and communication-efficient federated learning scheme using improved compressed sensing and CKKS homomorphic encryption to solve the issue of data silos and privacy leakage in distributed machine learning.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Hardware & Architecture
Zihang Zhen, Xiaoding Wang, Hui Lin, Sahil Garg, Prabhat Kumar, M. Shamim Hossain
Summary: In this paper, a blockchain architecture based on dynamic state sharding (DSSBD) is proposed to solve the problems caused by cross-shard transactions and reconfiguration. By utilizing deep reinforcement learning, the number of shards, block spacing, and block size can be dynamically adjusted to improve the performance of the blockchain. The experimental results show that the crowdsourcing system with DSSBD has better performance in terms of throughput, latency, balancing, cross-shard transaction proportion, and node reconfiguration proportion, while ensuring security.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Gabriel F. C. de Queiroz, Jose F. de Rezende, Valmir C. Barbosa
Summary: Multi-access Edge Computing (MEC) is a technology that enables faster task processing at the network edge by deploying servers closer to end users. This paper proposes the FlexDO algorithm to solve the DAG application partitioning and offloading problem, and compares it with other solutions to demonstrate its superior performance in various test scenarios.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Shahid Latif, Wadii Boulila, Anis Koubaa, Zhuo Zou, Jawad Ahmad
Summary: In the field of Industrial Internet of Things (IIoT), networks are increasingly vulnerable to cyberattacks. This research introduces an optimized Intrusion Detection System based on Deep Transfer Learning (DTL) for heterogeneous IIoT networks, combining Convolutional Neural Networks (CNNs), Genetic Algorithms (GA), and ensemble techniques. Through rigorous evaluation, the framework achieves exceptional performance and accurate detection of various cyberattacks.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Rongji Liao, Yuan Zhang, Jinyao Yan, Yang Cai, Narisu Tao
Summary: This paper proposes a joint control approach called STOP to guarantee user-perceived deadline using curriculum-guided deep reinforcement learning. Experimental results show that the STOP scheme achieves a significantly higher average arrival ratio in NS-3.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Miguel Rodriguez-Perez, Sergio Herreria-Alonso, J. Carlos Lopez-Ardao, Raul F. Rodriguez-Rubio
Summary: This paper presents an implementation of an active queue management (AQM) algorithm for the Named-Data Networking (NDN) architecture and its application in congestion control protocols. By utilizing the congestion mark field in NDN packets, information about each transmission queue is encoded to achieve a scalable AQM solution.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Angel Canete, Mercedes Amor, Lidia Fuentes
Summary: This paper proposes an energy-aware placement of service function chains of Virtual Network Functions (VNFs) and a resource-allocation solution for heterogeneous edge infrastructures. The solution has been integrated with an open source management and orchestration project and has been successfully applied to augmented reality services, achieving significant reduction in power consumption and ensuring quality of service compliance.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Sachin Kadam, Kaustubh S. Bhargao, Gaurav S. Kasbekar
Summary: This paper discusses the problem of estimating the node cardinality of each node type in a heterogeneous wireless network. Two schemes, HSRC-M1 and HSRC-M2, are proposed to rapidly estimate the number of nodes of each type. The accuracy and efficiency of these schemes are proven through mathematical analysis and simulation experiments.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Jean Nestor M. Dahj, Kingsley A. Ogudo, Leandro Boonzaaier
Summary: The launch of commercial 5G networks has opened up opportunities for heavy data users and highspeed applications, but traditional monitoring and evaluation techniques have limitations in the 5G networks. This paper presents a cost-effective hybrid analytical approach for detecting and evaluating user experience in real-time 5G networks, using statistical methods to calculate the user quality index.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Ali Nauman, Haya Mesfer Alshahrani, Nadhem Nemri, Kamal M. Othman, Nojood O. Aljehane, Mashael Maashi, Ashit Kumar Dutta, Mohammed Assiri, Wali Ullah Khan
Summary: The integration of terrestrial and satellite wireless communication networks offers a practical solution to enhance network coverage, connectivity, and cost-effectiveness. This study introduces a resource allocation framework that leverages local cache pool deployments and non-orthogonal multiple access (NOMA) to improve energy efficiency. Through the use of a multi-agent enabled deep deterministic policy gradient algorithm (MADDPG), the proposed approach optimizes user association, cache design, and transmission power control, resulting in enhanced energy efficiency and reduced time delays compared to existing methods.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Wu Chen, Jiayi Zhu, Jiajia Liu, Hongzhi Guo
Summary: With advancements in technology, large-scale drone swarms will be widely used in commercial and military fields. Current application methods are mainly divided into autonomous methods and controlled methods. This paper proposes a new framework for global coordination through local interaction.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Peiying Zhang, Zhihu Luo, Neeraj Kumar, Mohsen Guizani, Hongxia Zhang, Jian Wang
Summary: With the development of Industry 5.0, the demand for network access devices is increasing, especially in areas such as financial transactions, drone control, and telemedicine where low latency is crucial. However, traditional network architectures limit the construction of low-latency networks due to the tight coupling of control and data forwarding functions. To overcome this problem, researchers propose a constraint escalation virtual network embedding algorithm assisted by Graph Convolutional Networks (GCN), which automatically extracts network features and accelerates the learning process to improve network performance.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Review
Computer Science, Hardware & Architecture
P. Anitha, H. S. Vimala, J. Shreyas
Summary: Congestion control is crucial for maintaining network stability, reliability, and performance in IoT. It ensures that critical applications can operate seamlessly and that IoT devices can communicate efficiently without overwhelming the network. Congestion control algorithms ensure that the network operates within its capacity, preventing network overload and maintaining network performance.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Shunmugapriya Ramanathan, Abhishek Bhattacharyya, Koteswararao Kondepu, Andrea Fumagalli
Summary: This article presents an experiment that achieves live migration of a containerized 5G Central Unit module using modified open-source migration software. By comparing different migration techniques, it is found that the hybrid migration technique can reduce end-user service recovery time by 36% compared to the traditional cold migration technique.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Fatma Foad Ashrif, Elankovan A. Sundararajan, Rami Ahmad, Mohammad Kamrul Hasan, Elaheh Yadegaridehkordi
Summary: This article introduces the development and current status of authentication protocols in 6LoWPAN, and proposes an innovative perspective to fill the research gap. The article comprehensively surveys and evaluates AKA protocols, analyzing their suitability in wireless sensor networks and the Internet of Things, and proposes future research directions and issues.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Pranjal Kumar Nandi, Md. Rejaul Islam Reaj, Sujan Sarker, Md. Abdur Razzaque, Md. Mamun-or-Rashid, Palash Roy
Summary: This paper proposes a task offloading policy for IoT devices to a mobile edge computing system, aiming to balance device utility and execution cost. A meta heuristic approach is developed to solve the offloading problem, and the results show its potential in terms of task execution latency, energy consumption, utility per unit cost, and task drop rate.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)