Show simple item record

dc.contributor.authorSafa, Nader Sohrabi
dc.contributor.authorMaple, Carsten
dc.contributor.authorHaghparast, Mahboobeh
dc.contributor.authorWatson, Tim
dc.contributor.authorDianati, Mehrdad
dc.date.accessioned2021-06-21T11:32:37Z
dc.date.available2021-06-21T11:32:37Z
dc.date.issued2018-09-25
dc.identifier.citationSohrabi Safa, N., Maple, C., Haghparast, M., Watson, T. and Dianati, M. (2018) An opportunistic resource management model to overcome resource-constraint in the Internet of Things. Concurrency and Computation: Practice and Experience, 31 (8). e5014. doi:10.1002/cpe.5014en
dc.identifier.issn1532-0626en
dc.identifier.doi10.1002/cpe.5014en
dc.identifier.urihttp://hdl.handle.net/2436/624134
dc.descriptionThis is an accepted manuscript of an article published by Wiley in Concurrency and Computation: Practice and Experience, available online: https://doi.org/10.1002/cpe.5014 The accepted version of the publication may differ from the final published version.en
dc.description.abstractExperts believe that the Internet of Things (IoT) is a new revolution in technology and has brought many advantages for our society. However, there are serious challenges in terms of information security and privacy protection. Smart objects usually do not have malware detection due to resource limitations and their intrusion detection work on a particular network. Low computation power, low bandwidth, low battery, storage, and memory contribute to a resource-constrained effect on information security and privacy protection in the domain of IoT. The capacity of fog and cloud computing such as efficient computing, data access, network and storage, supporting mobility, location awareness, heterogeneity, scalability, and low latency in secure communication positively influence information security and privacy protection in IoT. This study illustrates the positive effect of fog and cloud computing on the security of IoT systems and presents a decision-making model based on the object's characteristics such as computational power, storage, memory, energy consumption, bandwidth, packet delivery, hop-count, etc. This helps an IoT system choose the best nodes for creating the fog that we need in the IoT system. Our experiment shows that the proposed approach has less computational, communicational cost, and more productivity in compare with the situation that we choose the smart objects randomly to create a fog.en
dc.formatapplication/pdfen
dc.languageen
dc.language.isoenen
dc.publisherWileyen
dc.relation.urlhttps://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.5014en
dc.subjectclouden
dc.subjectfogen
dc.subjectinformation securityen
dc.subjectInternet of Thingsen
dc.subjectprivacyen
dc.subjectresourceen
dc.titleAn opportunistic resource management model to overcome resource‐constraint in the Internet of Thingsen
dc.typeJournal articleen
dc.identifier.eissn1532-0634
dc.identifier.journalConcurrency and Computation: Practice and Experienceen
dc.date.updated2021-06-15T07:10:33Z
dc.date.accepted2018-09-01
rioxxterms.funderEPSRCen
rioxxterms.identifier.projectUOW21062021NSSen
rioxxterms.versionAMen
rioxxterms.licenseref.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/en
rioxxterms.licenseref.startdate2021-06-21en
dc.source.volume31
dc.source.issue8
dc.source.beginpagee5014
dc.source.endpagee5014
dc.description.versionPublished version
refterms.dateFCD2021-06-21T11:32:07Z
refterms.versionFCDAM
refterms.dateFOA2021-06-21T11:32:38Z


Files in this item

Thumbnail
Name:
SohrabiSafa_et_al_Opportunisti ...
Size:
586.0Kb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record

https://creativecommons.org/licenses/by-nc-nd/4.0/
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by-nc-nd/4.0/