Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of things
Trustworthiness possesses numerous design challenges for the researchers and scientists in the global era of internet of things. The solution to deal with these challenges lies in trust management mechanisms (TMM). The integration of TMM on the ...
Optimizing the performance of OpenFlow Protocol over QUIC
In the last decade, Software-defined networking (SDN) has been an eye-catching network architecture. As the essential protocol of SDN, OpenFlow provides the ability to control switches forwarding plane by the remote controller. Currently, ...
BRIP: Towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and IPFS
This paper introduces a decentralized ride-sharing system called BRIP that utilizes blockchain technology. BRIP addresses various issues commonly associated with centralized ride-sharing such as single points of failure, privacy violations, lack ...
Highlights
- An enhanced decentralized ride-sharing system, called BRIP, is proposed and a prototype of it is implemented as a decentralized application (DApp) on the top of Ethereum, a real-world public blockchain platform. This enables users to ...
Blockchain based crowdsourcing framework for Vehicle-to-Vehicle charging
Electric Vehicles (EVs) have become a promising solution to entirely replace traditional internal combustion engine vehicles. EV owners face the “Range Anxiety” problem which is the fear that their remaining charge would not be enough to reach ...
An ensemble maximal feature subset selection for smartphone based human activity recognition
Smartphone-based Human Activity Recognition (HAR) uses spatiotemporal time series data collected from a smartphone’s in-built accelerometer, gyroscope, and magnetometer sensor. Real-time HAR datasets such as UCI-HAR and UCI-HAPT extract time and ...
An energy-efficient asynchronous neighbor discovery algorithm based on cyclic difference set in duty-cycle wireless sensor networks
In duty-cycle wireless sensor networks(WSNs), as nodes are not necessarily synchronized, many asynchronous neighbor discovery algorithms have been proposed over the past several years. However, existing algorithms are not strong enough to support ...
Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications
IoT systems are widely used in various applications, including healthcare, agriculture, manufacturing, and smart cities. However, these systems still have limitations, such as lack of security, high latency, energy inefficiency, the inefficiency ...
Highlights
- A detailed exploration of the architectural nuances and deployments of the blockchain-based edge IoT.
- An exhaustive analysis of security necessities, complemented with potential solutions for prevalent security concerns.
- ...
Efficient cloud data center: An adaptive framework for dynamic Virtual Machine Consolidation
Cloud computing is a thriving and ever-expanding sector in the industry world. This growth has sparked increased interest from organizations seeking to harness its potential. However, the sheer volume of services and offerings in this field has ...
An efficient mechanism for function scheduling and placement in function as a service edge environment
With the advancement of Internet of Things (IoT) applications and the substantial surge in associated traffic, coupled with the rise in demand for low-latency mobile applications, the utilization of remote cloud computing infrastructure has ...
Highlights
- We investigate resource provisioning and allocation for Function-as-a-Service model in Mobile Edge Computing.
- We propose a many-to-one assignment mechanism inspired by the school choice problem to minimize the completion time of users’ ...
Edge caching and computing of video chunks in multi-tier wireless networks
This paper proposes a video caching and transcoding strategy for delay-constrained content delivery in multi-tier wireless networks. Particularly for multimedia services whose content can be encoded into multiple quality versions and consists of ...
Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues
- Ehzaz Mustafa,
- Junaid Shuja,
- Faisal Rehman,
- Ahsan Riaz,
- Mohammed Maray,
- Muhammad Bilal,
- Muhammad Khurram Khan
Mobile Edge Computing (MEC) is a modern paradigm that involves moving computing and storage resources closer to the network edge, reducing latency, and enabling innovative, delay-sensitive applications. Within MEC, computation offloading refers ...
A comprehensive survey of smart contract security: State of the art and research directions
Future protocols in the digital society will be built on the foundation of smart contracts, which are code and algorithmic contracts. Smart contracts enable all phases of the contracting process without the need for outside parties by using ...
Highlights
- We introduce the background of Ethereum.
- Then, the security challenges faced by blockchain smart contracts are proposed.
- We summarize several types of smart contract security solutions related to the topic of smart contract ...
Flow optimization strategies in data center networks: A survey
In the era of digitization, Data Center Networks (DCN) have emerged as a critical component supporting infrastructure for cloud computing, big data analytics, online services, and more. With the exponential growth in data transmission and ...
Highlights
- Conducting an extensive literature review to create a cohesive research framework.
- Thoroughly analyzing the strengths and weaknesses of flow optimization strategies.
- Suggesting forthcoming trends and expectations to guide research ...
Digital twin-driven secured edge-private cloud Industrial Internet of Things (IIoT) framework
With the growing popularity of Industrial Internet of Things (IIoT) technologies and the recent development of edge private cloud systems to fulfill the demands of industrial environments for high data rates, low latency, and powerful computing ...