AES encryption of resource allocation for ultra-reliable and enhanced mobile broadband IoT applications in fog network

The cloud computing paradigm has evolved toward the edge in recent years in order to give improved Quality of Service (QoS) to Internet of Things (IoT) devices. However, because fog network technology's resource capacity is limited, it's critical to efficiently connect IoT applicatio...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Ahmed Alqourabah, Eissa Abdulsalam
التنسيق: أطروحة
اللغة:English
English
English
منشور في: 2022
الموضوعات:
الوصول للمادة أونلاين:http://eprints.uthm.edu.my/6975/1/24p%20EISSA%20ABDULSALAM%20AHMED%20ALQOURABAH.pdf
http://eprints.uthm.edu.my/6975/2/EISSA%20ABDULSALAM%20AHMED%20ALQOURABAH%20COPYRIGHT%20DECLARATION.pdf
http://eprints.uthm.edu.my/6975/3/EISSA%20ABDULSALAM%20AHMED%20ALQOURABAH%20WATERMARK.pdf
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
الوصف
الملخص:The cloud computing paradigm has evolved toward the edge in recent years in order to give improved Quality of Service (QoS) to Internet of Things (IoT) devices. However, because fog network technology's resource capacity is limited, it's critical to efficiently connect IoT applications with demanding QoS requirements to the available network infrastructure. We design a joint user association and resource allocation problem in the fog network's downlink in aforementioned research, taking into account the ever-increasing demand for QoS standards imposed by Ultra�Reliable Low Latency Communications (URLLC) and Enhanced Mobile BroadBand (EMBB) services. First, we enforce the analytical framework using an Analytic Hierarchy Process (AHP) to assess the priority of different QoS requirements of heterogeneous IoT applications at the fog network. We then create a two-sided matching game using the AHP to establish a solid connection between the fog network architecture and IoT devices. We next encrypt the data using the Advanced Encryption Standard (AES) technique to safeguard it against theft and misuse