International Journal of Electrical and Electronics Engineering,
Год журнала:
2024,
Номер
11(12), С. 229 - 234
Опубликована: Дек. 31, 2024
This
paper
presents
a
Trust
Management
System
(TMS)
designed
to
counteract
cyber-attacks
in
fog
computing
environments.
The
system
integrates
fuzzy
AHP,
hierarchical
PROMETHEE
methods,
and
ranking
evaluate
trust
based
on
Quality
of
Service
(QoS),
Security
(QoSec),
economic
factors.
Tested
against
Replay,
On-Off,
Bad-mouthing,
Ransomware
attacks,
the
demonstrates
high
detection
accuracy,
with
error
rates
between
3.50%
4.15%.
results
show
that
proposed
TMS
effectively
enhances
security
evaluation
networks.
Transactions on Emerging Telecommunications Technologies,
Год журнала:
2024,
Номер
35(7)
Опубликована: Июнь 25, 2024
Abstract
Recent
advancements
in
distributed
computing
systems
have
shown
promising
prospects
enabling
the
effective
usage
of
many
next‐generation
applications.
These
applications
include
a
wide
range
fields,
such
as
healthcare,
interactive
gaming,
video
streaming,
and
other
related
technologies.
Among
solutions
are
evolving
vehicular
fog
(VFC)
frameworks
that
make
use
IEEE
3GPP
protocols
advanced
optimization
algorithms.
However,
these
approaches
often
rely
on
outdated
or
computationally
intensive
mathematical
techniques
for
solving
representing
their
models.
Additionally,
some
not
thoroughly
considered
type
application
during
evaluation
validation
phases.
In
response
to
challenges,
we
developed
“predictive
analytics
modules”
(PAM)
framework,
which
operates
time
event‐driven
basis.
It
utilizes
up‐to‐date
address
inherent
unpredictability
VFC‐enabled
required
smart
healthcare
systems.
Through
combination
greedy
heuristic
approach
offloading
architecture,
PAM
efficiently
optimizes
decisions
task
computation
allocation.
This
is
achieved
through
specialized
algorithms
provide
support
weaker
devices,
all
within
frame
under
100
ms.
To
assess
performance
comparison
three
benchmark
methodologies,
pathways
employed
average
time,
probability
density
function,
pareto‐analysis,
algorithmic
run
complexity.
Research Square (Research Square),
Год журнала:
2024,
Номер
unknown
Опубликована: Янв. 31, 2024
Abstract
Maintaining
data
confidentiality
and
integrity
during
the
large
VM
migration
is
quite
challenging.
Simultaneously,
use
of
complex
encryption
or
steganography
for
managing
them
increases
time
overheads.
These
may
cause
loss.
The
transportation
VMs
further
consumes
significant
bandwidth
causes
page
faults.
However,
these
issues
aren't
dealt
with
in
modern
literature,
despite
many
research
attempts.
Moreover,
unlawful
intrusions
various
transmission
errors
make
matters
worse.
Hence,
this
work
proposes
an
efficient
technique
that
addresses
such
outstanding
a
unified
way.
suggested
solution
has
special
compression
method
reduces
big
sizes
to
53.9%,
new
enhance
integrity,
smart
split
stop
faults
as
well
lower
loss
0.0009%.
results
show
it
cuts
down
on
downtime
by
10%
more
than
existing
methods.
obtained
justify
its
efficiencies
over
other
ones
distinct
dimensions.
IEEE Access,
Год журнала:
2021,
Номер
9, С. 167715 - 167735
Опубликована: Янв. 1, 2021
Fog
computing
(FC)
models
the
cloud
paradigm
expedient
by
bridging
breach
between
centralized
data
servers
and
diverse
terrestrially
distributed
applications.
It
wields
various
wireless
sensor
networks
(WSNs)
that
sprawl
in
core
of
any
IoT
Consequently,
operation
fog
network
turns
on
efficiency
WSNs
operation,
while
all-inclusive
energy
consumption
depends
both
FC
operation.
This
paper
addresses
how
dissimilar
organizations
a
can
influence
its
effectiveness
savings.
Chiefly,
it
appraises
whether
deploying
multi-sink
nodes
close
enough
vicinity
to
give
savings
foster
coherent
communication
networks.
To
assess
assignment
problem
following
four
criteria
are
used:
(i)
Distance
from
nodes;
(ii)
Nodes
degree;
(iii)
Sink
energy;
(iv)
processing
capabilities.
suggests
novel
solutions
connectivity
for
some
challenges
deeming:
Window
Nondominant
Set
(WNS);
Evaluation
Based
Approach
(EBA);
Harris
Hawks
Optimizer
(HHO);
Modified
HHO
(MHHO).
Distinct
sets
experiments
conducted
check
out
algorithmic
performance.
The
performance
all
algorithms
is
measured
then
compared
each
other
terms
power
consumption,
runtime,
packet
loss,
localization
error.
One
key
supremacies
our
approaches
utilization
processing,
principally
with
large-scale
Yet,
could
need
further
study
due
limited
range
sensors.