AES encryption of resource allocation for ultra-reliable and enhanced mobile broadband IoT applications in fog network

The cloud computing paradigm has evolved toward the edge in recent years in order to give improved Quality of Service (QoS) to Internet of Things (IoT) devices. However, because fog network technology's resource capacity is limited, it's critical to efficiently connect IoT applicatio...

Full description

Saved in:
Bibliographic Details
Main Author: Ahmed Alqourabah, Eissa Abdulsalam
Format: Thesis
Language:English
English
English
Published: 2022
Subjects:
Online Access:http://eprints.uthm.edu.my/6975/1/24p%20EISSA%20ABDULSALAM%20AHMED%20ALQOURABAH.pdf
http://eprints.uthm.edu.my/6975/2/EISSA%20ABDULSALAM%20AHMED%20ALQOURABAH%20COPYRIGHT%20DECLARATION.pdf
http://eprints.uthm.edu.my/6975/3/EISSA%20ABDULSALAM%20AHMED%20ALQOURABAH%20WATERMARK.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The cloud computing paradigm has evolved toward the edge in recent years in order to give improved Quality of Service (QoS) to Internet of Things (IoT) devices. However, because fog network technology's resource capacity is limited, it's critical to efficiently connect IoT applications with demanding QoS requirements to the available network infrastructure. We design a joint user association and resource allocation problem in the fog network's downlink in aforementioned research, taking into account the ever-increasing demand for QoS standards imposed by Ultra�Reliable Low Latency Communications (URLLC) and Enhanced Mobile BroadBand (EMBB) services. First, we enforce the analytical framework using an Analytic Hierarchy Process (AHP) to assess the priority of different QoS requirements of heterogeneous IoT applications at the fog network. We then create a two-sided matching game using the AHP to establish a solid connection between the fog network architecture and IoT devices. We next encrypt the data using the Advanced Encryption Standard (AES) technique to safeguard it against theft and misuse