An opportunistic resource management model to overcome resource-constraint in the Internet of Things

Nader Sohrabi Safa, Carsten Maple, Mahboobeh Haghparast, Tim Watson, Mehrdad Dianati

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Experts believe that the Internet of Things (IoT) is a new revolution in technology and has brought many advantages for our society. However, there are serious challenges in terms of information security and privacy protection. Smart objects usually do not have malware detection due to resource limitations and their intrusion detection work on a particular network. Low computation power, low bandwidth, low battery, storage, and memory contribute to a resource-constrained effect on information security and privacy protection in the domain of IoT. The capacity of fog and cloud computing such as efficient computing, data access, network and storage, supporting mobility, location awareness, heterogeneity, scalability, and low latency in secure communication positively influence information security and privacy protection in IoT. This study illustrates the positive effect of fog and cloud computing on the security of IoT systems and presents a decision-making model based on the object's characteristics such as computational power, storage, memory, energy consumption, bandwidth, packet delivery, hop-count, etc. This helps an IoT system choose the best nodes for creating the fog that we need in the IoT system. Our experiment shows that the proposed approach has less computational, communicational cost, and more productivity in compare with the situation that we choose the smart objects randomly to create a fog.

LanguageEnglish
Article numbere5014
JournalConcurrency Computation
Volume31
Issue number8
Early online date25 Sep 2018
DOIs
Publication statusPublished - 25 Apr 2019
Externally publishedYes

Fingerprint

Internet of Things
Resource Constraints
Resource Management
Fog
Privacy Protection
Information Security
Security of data
Smart Objects
Cloud computing
Cloud Computing
Choose
Bandwidth
Location Awareness
Model
Data storage equipment
Malware
Resources
Secure Communication
Intrusion detection
Intrusion Detection

Keywords

  • cloud
  • Fog
  • information security
  • Internet of Things
  • privacy
  • resource

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Computer Science Applications
  • Computer Networks and Communications
  • Computational Theory and Mathematics

Cite this

An opportunistic resource management model to overcome resource-constraint in the Internet of Things. / Safa, Nader Sohrabi; Maple, Carsten; Haghparast, Mahboobeh; Watson, Tim; Dianati, Mehrdad.

In: Concurrency Computation, Vol. 31, No. 8, e5014, 25.04.2019.

Research output: Contribution to journalArticle

Safa, Nader Sohrabi ; Maple, Carsten ; Haghparast, Mahboobeh ; Watson, Tim ; Dianati, Mehrdad. / An opportunistic resource management model to overcome resource-constraint in the Internet of Things. In: Concurrency Computation. 2019 ; Vol. 31, No. 8.
@article{550365c102ed44cd8546c81a211ddbde,
title = "An opportunistic resource management model to overcome resource-constraint in the Internet of Things",
abstract = "Experts believe that the Internet of Things (IoT) is a new revolution in technology and has brought many advantages for our society. However, there are serious challenges in terms of information security and privacy protection. Smart objects usually do not have malware detection due to resource limitations and their intrusion detection work on a particular network. Low computation power, low bandwidth, low battery, storage, and memory contribute to a resource-constrained effect on information security and privacy protection in the domain of IoT. The capacity of fog and cloud computing such as efficient computing, data access, network and storage, supporting mobility, location awareness, heterogeneity, scalability, and low latency in secure communication positively influence information security and privacy protection in IoT. This study illustrates the positive effect of fog and cloud computing on the security of IoT systems and presents a decision-making model based on the object's characteristics such as computational power, storage, memory, energy consumption, bandwidth, packet delivery, hop-count, etc. This helps an IoT system choose the best nodes for creating the fog that we need in the IoT system. Our experiment shows that the proposed approach has less computational, communicational cost, and more productivity in compare with the situation that we choose the smart objects randomly to create a fog.",
keywords = "cloud, Fog, information security, Internet of Things, privacy, resource",
author = "Safa, {Nader Sohrabi} and Carsten Maple and Mahboobeh Haghparast and Tim Watson and Mehrdad Dianati",
year = "2019",
month = "4",
day = "25",
doi = "10.1002/cpe.5014",
language = "English",
volume = "31",
journal = "Concurrency Computation Practice and Experience",
issn = "1532-0626",
publisher = "Wiley",
number = "8",

}

TY - JOUR

T1 - An opportunistic resource management model to overcome resource-constraint in the Internet of Things

AU - Safa, Nader Sohrabi

AU - Maple, Carsten

AU - Haghparast, Mahboobeh

AU - Watson, Tim

AU - Dianati, Mehrdad

PY - 2019/4/25

Y1 - 2019/4/25

N2 - Experts believe that the Internet of Things (IoT) is a new revolution in technology and has brought many advantages for our society. However, there are serious challenges in terms of information security and privacy protection. Smart objects usually do not have malware detection due to resource limitations and their intrusion detection work on a particular network. Low computation power, low bandwidth, low battery, storage, and memory contribute to a resource-constrained effect on information security and privacy protection in the domain of IoT. The capacity of fog and cloud computing such as efficient computing, data access, network and storage, supporting mobility, location awareness, heterogeneity, scalability, and low latency in secure communication positively influence information security and privacy protection in IoT. This study illustrates the positive effect of fog and cloud computing on the security of IoT systems and presents a decision-making model based on the object's characteristics such as computational power, storage, memory, energy consumption, bandwidth, packet delivery, hop-count, etc. This helps an IoT system choose the best nodes for creating the fog that we need in the IoT system. Our experiment shows that the proposed approach has less computational, communicational cost, and more productivity in compare with the situation that we choose the smart objects randomly to create a fog.

AB - Experts believe that the Internet of Things (IoT) is a new revolution in technology and has brought many advantages for our society. However, there are serious challenges in terms of information security and privacy protection. Smart objects usually do not have malware detection due to resource limitations and their intrusion detection work on a particular network. Low computation power, low bandwidth, low battery, storage, and memory contribute to a resource-constrained effect on information security and privacy protection in the domain of IoT. The capacity of fog and cloud computing such as efficient computing, data access, network and storage, supporting mobility, location awareness, heterogeneity, scalability, and low latency in secure communication positively influence information security and privacy protection in IoT. This study illustrates the positive effect of fog and cloud computing on the security of IoT systems and presents a decision-making model based on the object's characteristics such as computational power, storage, memory, energy consumption, bandwidth, packet delivery, hop-count, etc. This helps an IoT system choose the best nodes for creating the fog that we need in the IoT system. Our experiment shows that the proposed approach has less computational, communicational cost, and more productivity in compare with the situation that we choose the smart objects randomly to create a fog.

KW - cloud

KW - Fog

KW - information security

KW - Internet of Things

KW - privacy

KW - resource

UR - http://www.scopus.com/inward/record.url?scp=85053814874&partnerID=8YFLogxK

U2 - 10.1002/cpe.5014

DO - 10.1002/cpe.5014

M3 - Article

VL - 31

JO - Concurrency Computation Practice and Experience

T2 - Concurrency Computation Practice and Experience

JF - Concurrency Computation Practice and Experience

SN - 1532-0626

IS - 8

M1 - e5014

ER -