721 research outputs found

    Opportunities of IoT in Fog Computing for High Fault Tolerance and Sustainable Energy Optimization

    Get PDF
    Today, the importance of enhanced quality of service and energy optimization has promoted research into sensor applications such as pervasive health monitoring, distributed computing, etc. In general, the resulting sensor data are stored on the cloud server for future processing. For this purpose, recently, the use of fog computing from a real-world perspective has emerged, utilizing end-user nodes and neighboring edge devices to perform computation and communication. This paper aims to develop a quality-of-service-based energy optimization (QoS-EO) scheme for the wireless sensor environments deployed in fog computing. The fog nodes deployed in specific geographical areas cover the sensor activity performed in those areas. The logical situation of the entire system is informed by the fog nodes, as portrayed. The implemented techniques enable services in a fog-collaborated WSN environment. Thus, the proposed scheme performs quality-of-service placement and optimizes the network energy. The results show a maximum turnaround time of 8 ms, a minimum turnaround time of 1 ms, and an average turnaround time of 3 ms. The costs that were calculated indicate that as the number of iterations increases, the path cost value decreases, demonstrating the efficacy of the proposed technique. The CPU execution delay was reduced to a minimum of 0.06 s. In comparison, the proposed QoS-EO scheme has a lower network usage of 611,643.3 and a lower execution cost of 83,142.2. Thus, the results show the best cost estimation, reliability, and performance of data transfer in a short time, showing a high level of network availability, throughput, and performance guarantee

    Towards Trustworthy, Efficient and Scalable Distributed Wireless Systems

    Get PDF
    Advances in wireless technologies have enabled distributed mobile devices to connect with each other to form distributed wireless systems. Due to the absence of infrastructure, distributed wireless systems require node cooperation in multi-hop routing. However, the openness and decentralized nature of distributed wireless systems where each node labors under a resource constraint introduces three challenges: (1) cooperation incentives that effectively encourage nodes to offer services and thwart the intentions of selfish and malicious nodes, (2) cooperation incentives that are efficient to deploy, use and maintain, and (3) routing to efficiently deliver messages with less overhead and lower delay. While most previous cooperation incentive mechanisms rely on either a reputation system or a price system, neither provides sufficiently effective cooperation incentives nor efficient resource consumption. Also, previous routing algorithms are not sufficiently efficient in terms of routing overhead or delay. In this research, we propose mechanisms to improve the trustworthiness, scalability, and efficiency of the distributed wireless systems. Regarding trustworthiness, we study previous cooperation incentives based on game theory models. We then propose an integrated system that combines a reputation system and a price system to leverage the advantages of both methods to provide trustworthy services. Analytical and simulation results show higher performance for the integrated system compared to the other two systems in terms of the effectiveness of the cooperation incentives and detection of selfish nodes. Regarding scalability in a large-scale system, we propose a hierarchical Account-aided Reputation Management system (ARM) to efficiently and effectively provide cooperation incentives with small overhead. To globally collect all node reputation information to accurately calculate node reputation information and detect abnormal reputation information with low overhead, ARM builds a hierarchical locality-aware Distributed Hash Table (DHT) infrastructure for the efficient and integrated operation of both reputation systems and price systems. Based on the DHT infrastructure, ARM can reduce the reputation management overhead in reputation and price systems. We also design a distributed reputation manager auditing protocol to detect a malicious reputation manager. The experimental results show that ARM can detect the uncooperative nodes that gain fraudulent benefits while still being considered as trustworthy in previous reputation and price systems. Also, it can effectively identify misreported, falsified, and conspiratorial information, providing accurate node reputations that truly reflect node behaviors. Regarding an efficient distributed system, we propose a social network and duration utility-based distributed multi-copy routing protocol for delay tolerant networks based on the ARM system. The routing protocol fully exploits node movement patterns in the social network to increase delivery throughput and decrease delivery delay while generating low overhead. The simulation results show that the proposed routing protocol outperforms the epidemic routing and spray and wait routing in terms of higher message delivery throughput, lower message delivery delay, lower message delivery overhead, and higher packet delivery success rate. The three components proposed in this dissertation research improve the trustworthiness, scalability, and efficiency of distributed wireless systems to meet the requirements of diversified distributed wireless applications

    Proximity as a Service via Cellular Network-Assisted Mobile Device-to-Device

    Get PDF
    PhD ThesisThe research progress of communication has brought a lot of novel technologies to meet the multi-dimensional demands such as pervasive connection, low delay and high bandwidth. Device-to-Device (D2D) communication is a way to no longer treat the User Equipment (UEs) as a terminal, but rather as a part of the network for service provisioning. This thesis decouples UEs into service providers (helpers) and service requesters. By collaboration among proximal devices, with the coordination of cellular networks, some local tasks can be achieved, such as coverage extension, computation o oading, mobile crowdsourcing and mobile crowdsensing. This thesis proposes a generic framework Proximity as a Service (PaaS) for increasing the coverage with demands of service continuity. As one of the use cases, the optimal helper selection algorithm of PaaS for increasing the service coverage with demands of service continuity is called ContAct based Proximity (CAP). Mainly, fruitful contact information (e.g., contact duration, frequency, and interval) is captured, and is used to handle ubiquitous proximal services through the optimal selection of helpers. The nature of PaaS is evaluated under the Helsinki city scenario, with movement model of Points Of Interest (POI) and with critical factors in uencing the service demands (e.g., success ratio, disruption duration and frequency). Simulation results show the advantage of CAP, in both success ratio and continuity of the service (outputs). Based on this perspective, metrics such as service success ratio and continuity as a service evaluation of the PaaS are evaluated using the statistical theory of the Design Of Experiments (DOE). DOE is used as there are many dimensions to the state space (access tolerance, selected helper number, helper access limit, and transmit range) that can in uence the results. A key contribution of this work is that it brings rigorous statistical experiment design methods into the research into mobile computing. Results further reveal the influence of four factors (inputs), e.g., service tolerance, number of helpers allocated, the number of concurrent devices supported by each helper and transmit range. Based on this perspective, metrics such as service success ratio and continuity are evaluated using DOE. The results show that transmit range is the most dominant factor. The number of selected helpers is the second most dominant factor. Since di erent factors have di erent regression levels, a uni ed 4 level full factorial experiment and a cubic multiple regression analysis have been carried out. All the interactions and the corresponding coe cients have been found. This work is the rst one to evaluate LTE-Direct and WiFi-Direct in an opportunistic proximity service. The contribution of the results for industry is to guide how many users need to cooperate to enable mobile computing and for academia. This reveals the facts that: 1, in some cases, the improvement of spectrum e ciency brought by D2D is not important; 2, nodal density and the resources used in D2D air-interfaces are important in the eld of mobile computing. This work built a methodology to study the D2D networks with a di erent perspective (PaaS)

    Enhanced Interest Aware PeopleRank for Opportunistic Mobile Social Networks

    Get PDF
    Network infrastructures are being continuously challenged by increased demand, resource-hungry applications, and at times of crisis when people need to work from homes such as the current Covid-19 epidemic situation, where most of the countries applied partial or complete lockdown and most of the people worked from home. Opportunistic Mobile Social Networks (OMSN) prove to be a great candidate to support existing network infrastructures. However, OMSNs have copious challenges comprising frequent disconnections and long delays. we aim to enhance the performance of OMSNs including delivery ratio and delay. We build upon an interest-aware social forwarding algorithm, namely Interest Aware PeopleRank (IPeR). We explored three pillars for our contribution, which encompass (1) inspect more than one hop (multiple hops) based on IPeR (MIPeR), (2) by embracing directional forwarding (Directional-IPeR), and (3) by utilizing a combination of Directional forwarding and multi-hop forwarding (DMIPeR). For Directional-IPeR, different values of the tolerance factor of IPeR, such as 25% and 75%, are explored to inspect variations of Directional-IPeR. Different interest distributions and users’ densities are simulated using the Social-Aware Opportunistic Forwarding Simulator (SAROS). The results show that (1) adding multiple hops to IPeR enhanced the delivery ratio, number of reached interested forwarders, and delay slightly. However, it increased the cost and decreased F-measure hugely. Consequently, there is no significant gain in these algorithms. (2) Directional-IPeR-75 performed generally better than IPeR in delivery ratio, and the number of reached interested forwarders. Besides, when some of the uninterested forwarders did not participate in messages delivery, which is a realistic behavior, the performance is enhanced and performed better generally in all metrics compared to IPeR. (3) Adding multiple hops to directional guided IPeR did not gain any enhancement. (4) Directional-IPeR-75 performs better in high densities in all metrics except delay. Even though, it enhances delay in sparse environments. Consequently, it can be utilized in disastrous areas, in which few people are with low connectivity and spread over a big area. In addition, it can be used in rural areas as well where there is no existing networks

    Deterrence and constrained enforcement: Alternative regimes to deal with bribery

    Get PDF
    This study embeds transaction cost analysis into a Law and Economics model to produce general recommendations on how to deter bribery. Governments may deter bribery either by high penalties and risks of detection, potentially supported by leniency given to those who report their infraction (deterrence regime). Another local optimum is achieved if the government amplifies the risk of opportunism, aggravating the difficulties of enforcing a bribe transaction. This involves a low probability of detection and allowing offenders to keep their ill-gotten gains. If bribes are paid upfront bribe taking will face only mild punishment (constrained enforcement regime). --Bribery,Corruption,Leniency,Enforcement,Deterrence,Opportunism,Reporting,Whistle-blowing,Nullity
    • 

    corecore