4.6 Article

Dynamic decision support for resource offloading in heterogeneous Internet of Things environments

期刊

出版社

ELSEVIER
DOI: 10.1016/j.simpat.2019.102019

关键词

Internet of things; IoT offloading; Computation offloading; Edge computing; Cloud computing; Decision support; EdgeCloudSim simulator

资金

  1. H2020 project C4IIOT [833828]

向作者/读者索取更多资源

Computation offloading is one of the primary technological enablers of the Internet of Things (IoT), as it helps address individual devices' resource restrictions. In the past, offloading would always utilise remote cloud infrastructures, but the increasing size of IoT data traffic and the real-time response requirements of modern and future IoT applications have led to the adoption of the edge computing paradigm, where the data is processed at the edge of the network. The decision as to whether cloud or edge resources will be utilised is typically taken at the design stage based on the type of the IoT device. Yet, the conditions that determine the optimality of this decision, such as the arrival rate, nature and sizes of the tasks, and crucially the real-time condition of the networks involved, keep changing. At the same time, the energy consumption of IoT devices is usually a key requirement, which is affected primarily by the time it takes to complete tasks, whether for the actual computation or for offloading them through the network. Here, we model the expected time and energy costs for the different options of offloading a task to the edge or the cloud, as well as of carrying out on the device itself. We use this model to allow the device to take the offloading decision dynamically as a new task arrives and based on the available information on the network connections and the states of the edge and the cloud. Having extended EdgeCloudSim to provide support for such dynamic decision making, we are able to compare this approach against IoT-first, edge-first, cloud-only, random and application-oriented probabilistic strategies. Our simulations on four different types of IoT applications show that allowing customisation and dynamic offloading decision support can improve drastically the response time of time-critical and small-size applications, and the energy consumption not only of the individual IoT devices but also of the system as a whole. This paves the way for future IoT devices that optimise their application response times, as well as their own energy autonomy and overall energy efficiency, in a decentralised and autonomous manner.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Chemistry, Analytical

LoRa-Based IoT Network Assessment in Rural and Urban Scenarios

Aikaterini I. Griva, Achilles D. Boursianis, Shaohua Wan, Panagiotis Sarigiannidis, Konstantinos E. Psannis, George Karagiannidis, Sotirios K. Goudos

Summary: The implementation of smart networks has been greatly advanced by the development of IoT, with LoRa being a prominent technology due to its long-distance transmission capabilities with low power consumption. This study simulated various environments to assess network performance based on different factors and parameters. Path loss model, deployment area size, transmission power, spreading factor, number of nodes and gateways, and antenna gain significantly affect the energy consumption and data extraction rate of LoRa networks. The research performed simulations using the FLoRa framework in OMNeT++, investigating rural and urban environments, as well as a parking area model. The results emphasize the importance of optimizing key parameters for the deployment of smart networks.

SENSORS (2023)

Article Computer Science, Interdisciplinary Applications

Introducing a New TCP Variant for UAV networks following comparative simulations

George Amponis, Thomas Lagkas, Konstantinos Tsiknas, Panagiotis Radoglou-Grammatikis, Panagiotis Sarigiannidis

Summary: The Transmission Control Protocol (TCP) is a widely used reliable, connection-oriented, congestion control mechanism in both wired and wireless networks. However, the standard TCP congestion control mechanism performs poorly in high-mobility wireless networking scenarios. To address this issue, this paper compares various TCP variants and introduces a new variant called Swarm HTCP (S-HTCP), specifically designed for Flying Ad hoc Networks (FANETs) consisting of Unmanned Aerial Vehicles (UAVs). The simulation evaluation shows that S-HTCP outperforms other variants in high-mobility network conditions.

SIMULATION MODELLING PRACTICE AND THEORY (2023)

Article Computer Science, Information Systems

Residual Compensation-Based Extreme Learning Machine for MIMO-NOMA Receiver

M. Rezwanul Mahmood, Mohammad Abdul Matin, Panagiotis Sarigiannidis, Sotirios K. K. Goudos, George K. K. Karagiannidis

Summary: This paper investigates the application of residual compensation-based ELM (RC-ELM) in designing a receiver for MIMO-NOMA aided IoT systems. By analyzing the BER and EVM performances, the appropriate number of compensation layers for training error minimization is determined. The results show improved BER and EVM performances with the aid of RC-ELM compared to other receivers.

IEEE ACCESS (2023)

Review Engineering, Multidisciplinary

A Survey of Advancements in Real-Time Sign Language Translators: Integration with IoT Technology

Maria Papatsimouli, Panos Sarigiannidis, George F. Fragulis

Summary: Real-time sign language translation systems play a crucial role in facilitating communication for the deaf and hard-of-hearing. Despite the availability of assistive technologies, there is a significant communication gap between sign language users and non-users. Our research aims to analyze recent advancements in real-time sign language translation, particularly in its integration with IoT technology. We conducted a comprehensive analysis of literature and technical reports, providing insights into the current state of the art in this field and discussing the potential for improving communication and inclusivity through the fusion of sign language translation and IoT technology.

TECHNOLOGIES (2023)

Article Computer Science, Information Systems

CROSS: A framework for cyber risk optimisation in smart homes

Yunxiao Zhang, Pasquale Malacaria, George Loukas, Emmanouil Panaousis

Summary: This work presents a decision support framework called CROSS that provides advice for selecting optimal cyber security controls in smart homes. It considers both traditional cyber attacks and adversarial machine learning attacks and aims to protect both smart home users and service providers.

COMPUTERS & SECURITY (2023)

Article Engineering, Electrical & Electronic

Evolutionary Ensemble Learning Pathloss Prediction for 4G and 5G Flying Base Stations With UAVs

Sotirios P. Sotiroudis, Georgia Athanasiadou, George Tsoulos, Panagiotis Sarigiannidis, Christos G. Christodoulou, Sotirios K. Goudos

Summary: The usage of UAVs as FBSs for expanding coverage and assisting cellular networks in 5G and beyond is a promising technology. Path loss prediction is a crucial parameter in cellular network design, and ML-based predictions using ensemble learning techniques offer a more efficient alternative to deterministic ray-tracing models. Our proposed evolutionary tuned stacked ensemble method optimizes the ensemble as a whole, achieving better performance in path loss modeling in electromagnetics.

IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION (2023)

Article Biochemical Research Methods

Post-Processing Fairness Evaluation of Federated Models: An Unsupervised Approach in Healthcare

Ilias Siniosoglou, Vasileios Argyriou, Panagiotis Sarigiannidis, Thomas Lagkas, Antonios Sarigiannidis, Sotirios K. K. Goudos, Shaohua Wan

Summary: Modern healthcare cyberphysical systems rely on distributed AI and Federated Learning to train ML and DL models for various medical fields while protecting sensitive information. However, the local training of federated models sometimes falls short, affecting their optimization and subsequent performance. This work proposes a post-processing pipeline to improve model fairness and accuracy in the FL environment.

IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS (2023)

Article Computer Science, Information Systems

INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain

Aristeidis Farao, Georgios Paparis, Sakshyam Panda, Emmanouil Panaousis, Apostolis Zarras, Christos Xenakis

Summary: Despite challenges such as lack of data, shortage of automated tasks, fraudulent claims, masquerading attackers, and cyber-security attacks on insurance companies, the article presents INCHAIN, an innovative architecture utilizing Blockchain technology to provide data transparency and traceability. The architecture includes Smart Contracts and Self-Sovereign Identity for automation and robust identification. The research demonstrates a novel and efficient solution to managing cyber insurance, successfully combating fraudulent claims and ensuring proper customer identification and authentication.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2023)

Article Health Care Sciences & Services

Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study

Elina Argyridou, Sokratis Nifakos, Christos Laoudias, Sakshyam Panda, Emmanouil Panaousis, Krishna Chandramouli, Diana Navarro-Llobet, Juan Mora Zamorano, Panagiotis Papachristou, Stefano Bonacina

Summary: Cyber threats are increasing in the health care sector, and health care organizations (HOs) are implementing cybersecurity controls to protect against these threats. However, humans are often the weakest link in cybersecurity, making it important to address the human aspects of cybersecurity. This study introduces a cyber hygiene methodology that uses a survey-based risk assessment approach to raise awareness and recommend human-centric controls tailored to each organization's needs.

JOURNAL OF MEDICAL INTERNET RESEARCH (2023)

Article Chemistry, Multidisciplinary

A Survey on Cyber Risk Management for the Internet of Things

Emily Kate Parsons, Emmanouil Panaousis, George Loukas, Georgia Sakellari

Summary: In this paper, a comprehensive survey of cyber risk management processes in the context of IoT is presented, and recommendations for future work are provided. Through the analysis of 39 collected papers, IoT cyber risk management frameworks are studied against four research questions that focus on cyber risk management concepts and human-orientated vulnerabilities. The importance of this work lies in understanding how individuals can impact risk and how humans can be affected by attacks in different IoT domains.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Information Systems

Proactive Scheduling for Zero-Energy Device Networks With Fast Uplink Grant

Nikos A. A. Mitsiou, Sotiris A. A. Tegos, Panagiotis D. D. Diamantoulakis, Panagiotis G. G. Sarigiannidis, George K. K. Karagiannidis

Summary: To address the inefficiency in terms of resource utilization of grant-free (GF) protocols, the fast uplink (FU) grant medium-access protocol has been proposed. In this letter, we design a proactive wireless power transfer (WPT) framework for FU grant zero-energy massive machine-type communication. Specifically, zero-energy devices (ZEDs) first harvest energy during the WPT phase and then transmit data based on the FU grant protocol. Moreover, a multi-arm bandit traffic prediction scheme is adopted. Simulation results show that the proposed scheme outperforms GF access.

IEEE WIRELESS COMMUNICATIONS LETTERS (2023)

Article Computer Science, Information Systems

Cyber Risk Assessment and Optimization: A Small Business Case Study

Maria Tsiodra, Sakshyam Panda, Michail Chronopoulos, Emmanouil Panaousis

Summary: This paper proposes a cybersecurity decision-support framework called CENSOR for optimal cyber security investment. CENSOR takes into account the continuous nature of cyber attacks, uncertainty in vulnerability exploitation time, and optimization of mitigation measures under a limited budget. It evaluates the cost incurred by an organization due to a cyber security breach and derives an analytical expression for the distribution of present value of the cost. It also compares optimal strategies for investment using Set Covering and Knapsack formulations, validating the effectiveness of CENSOR through a case study.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

Sotirios K. Goudos, Panagiotis D. Diamantoulakis, Achilles D. Boursianis, Panagiotis Sarigiannidis, Konstantinos E. Psannis, Mohammad Abdul Matin, Shaohua Wan, George K. Karagiannidis

Summary: In this work, we address the problem of joint power allocation and user association for non-orthogonal multiple access (NOMA) in downlink networks based on quality-of-service. Due to its non-convex form and the large number of optimization variables, the problem is challenging and we propose two nature-inspired algorithms with low complexity for solving it. We investigate the impact of different network parameters on increasing users and show that evolutionary algorithms are effective in solving this problem, outperforming randomly generated solutions. Furthermore, the advantages of NOMA over OMA become more evident as the number of users increases.

IEEE ACCESS (2023)

Article Engineering, Electrical & Electronic

Localization as a Key Enabler of 6G Wireless Systems: A Comprehensive Survey and an Outlook

Stylianos E. Trevlakis, Alexandros-Apostolos A. Boulogeorgos, Dimitrios Pliatsios, Jorge Querol, Konstantinos Ntontin, Panagiotis Sarigiannidis, Symeon Chatzinotas, Marco Di Renzo

Summary: This survey investigates the envisioned applications and use cases of localization in future 6G wireless systems and analyzes the impact of major technology enablers. System models for millimeter wave, terahertz, and visible light positioning are presented, along with a review of conventional and learning-based localization techniques. The localization problem is formulated, wireless system design is considered, and optimization is investigated. Insights from the analysis highlight important future directions for localization in 6G wireless systems.

IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY (2023)

Review Engineering, Electrical & Electronic

Artificial Intelligence in Visible Light Positioning for Indoor IoT: A Methodological Review

Vasileios P. Rekkas, Lazaros Alexios Iliadis, Sotirios P. Sotiroudis, Achilles D. Boursianis, Panagiotis Sarigiannidis, David Plets, Wout Joseph, Shaohua Wan, Christos G. Christodoulou, George K. Karagiannidis, Sotirios K. Goudos

Summary: Indoor communication and positioning are important applications in the field of indoor Internet of Things. Visible light positioning (VLP) and artificial intelligence (AI) have great potential in indoor location-aware IoT services. This paper reviews the research efforts on the use of AI in VLP, summarizes the current progress, identifies open issues, and proposes future research directions.

IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY (2023)

Article Computer Science, Interdisciplinary Applications

Zone-based stable and secure clustering technique for VANETs

Shivani Sharma, Sateesh Kumar Awasthi

Summary: Vehicular Ad-hoc Network (VANET) is crucial in Intelligent Transportation Systems, and this study proposes a hybrid system utilizing V2V and V2I communications for secure data dissemination in urban scenarios.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

HEPGA: A new effective hybrid algorithm for scientific workflow scheduling in cloud computing environment

Hind Mikram, Said El Kafhali, Youssef Saadi

Summary: Efficient task scheduling in cloud data centers is crucial for optimizing resource utilization and load balance. This paper introduces a hybrid algorithm, HEPGA, that combines particle swarm optimization (PSO) and genetic algorithm (GA) to allocate tasks efficiently and minimize makespan in cloud computing environments. By integrating PSO, GA, and HEFT-based initialization, the algorithm capitalizes on parallel processing capabilities and adapts to varying priorities to enhance resource utilization. Meticulous analysis of the algorithm's performance, considering both makespan and resource utilization, demonstrates its ability to consistently allocate resources and adapt to different optimization goals.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

MC-reduction simulation approach with heuristic rules for reliability estimation in a multi-state flow network

Ping-Chen Chang, Cheng-Fu Huang, Ding-Hsiang Huang

Summary: This paper introduces a novel simulation approach based on minimal cuts to estimate the system reliability of a multistate flow network (MSFN). The approach improves computational efficiency by reducing the number of minimal cuts and preserving saturated minimal cuts. It effectively deals with non-integer demands and demonstrates effectiveness and efficiency in illustrative examples.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

A data-driven agent-based simulation of the public bicycle-sharing system in Sejong city

Jang Won Bae, Chun-Hee Lee, Jeong-Woo Lee, Seon Han Choi

Summary: In this study, a data-driven agent-based model is proposed for simulating the public bicycle-sharing systems (PBSSs) in Sejong City, South Korea. The model captures users' behavioral characteristics and analyzes their convenience through a bottom-up approach. By extracting parameters from actual operational data and demographic information, the model's accuracy is improved. Model simulations evaluate the utilization and user convenience of Eoulling, providing a viable solution for addressing multiple concerns.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

Numerical study on rock fracturing with pulsed pressure in hard rocks with a pipe-domain seepage model

Chong Shi, Junbao Pian, Cong Zhang, Xiao Chen, Yonggang Zhang

Summary: This study presents a novel numerical simulation method for analyzing the mechanisms of pulsed pressure-induced rock fractures. The results show that rock fracturing under impulsive loading is a combined effect of stress waves and high-pressure fluids, with the fluid penetration and splitting action playing important roles in the process.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

Numerical investigation on optimal blasting parameters of tunnel face in granite rock

Junwei Zhang, Zhongwei Chen, Kang Shao

Summary: This study investigated the performance of three constitutive models for rock material in simulation of blast-induced rock cracks, and proposed an optimal blasting parameters design.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

Agent-based modeling and simulation for 5G and beyond networks : A comprehensive survey

Joshua Shakya, Chaima Ghribi, Leila Merghem-Boulahia

Summary: Modeling and simulation of telecommunication networks, especially 5G+ networks, have become increasingly important and challenging. Traditional simulation techniques may not be sufficient to capture the dynamic changes in 5G+ networks, leading researchers to adopt an Agent-based modeling and simulation approach from the perspective of Complex System Science. This study provides insights into the advantages, potential, and challenges of Agent-based simulation in the context of 5G+ networks, and proposes a prospective architecture for a simulator and its evolution into a Digital Twin.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

A fine discrete floor field cellular automaton model with natural step length for pedestrian dynamics

Sensen Xing, Cheng Wang, Wei Wang, Rui Feng Cao, Anthony Chun Yin Yuen, Eric Wai Ming Lee, Guan Heng Yeoh, Qing Nian Chan

Summary: This paper proposes an extended FFCA model that integrates the natural step length into pedestrian movement, allowing pedestrians to occupy multiple grids and expanding the interaction area. Through simulation of evacuation scenarios, the model accurately reproduces density-velocity relations and matches experimental results. Compared to traditional models, this model generates more reasonable velocity variations and evacuation paths.

SIMULATION MODELLING PRACTICE AND THEORY (2024)