AES encryption of resource allocation for ultra-reliable and enhanced mobile broadband IoT applications in fog network
The cloud computing paradigm has evolved toward the edge in recent years in order to give improved Quality of Service (QoS) to Internet of Things (IoT) devices. However, because fog network technology's resource capacity is limited, it's critical to efficiently connect IoT applicatio...
محفوظ في:
المؤلف الرئيسي: | |
---|---|
التنسيق: | أطروحة |
اللغة: | English English English |
منشور في: |
2022
|
الموضوعات: | |
الوصول للمادة أونلاين: | http://eprints.uthm.edu.my/6975/1/24p%20EISSA%20ABDULSALAM%20AHMED%20ALQOURABAH.pdf http://eprints.uthm.edu.my/6975/2/EISSA%20ABDULSALAM%20AHMED%20ALQOURABAH%20COPYRIGHT%20DECLARATION.pdf http://eprints.uthm.edu.my/6975/3/EISSA%20ABDULSALAM%20AHMED%20ALQOURABAH%20WATERMARK.pdf |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
الملخص: | The cloud computing paradigm has evolved toward the edge in recent years in order
to give improved Quality of Service (QoS) to Internet of Things (IoT) devices.
However, because fog network technology's resource capacity is limited, it's critical
to efficiently connect IoT applications with demanding QoS requirements to the
available network infrastructure. We design a joint user association and resource
allocation problem in the fog network's downlink in aforementioned research, taking
into account the ever-increasing demand for QoS standards imposed by Ultra�Reliable Low Latency Communications (URLLC) and Enhanced Mobile BroadBand
(EMBB) services. First, we enforce the analytical framework using an Analytic
Hierarchy Process (AHP) to assess the priority of different QoS requirements of
heterogeneous IoT applications at the fog network. We then create a two-sided
matching game using the AHP to establish a solid connection between the fog
network architecture and IoT devices. We next encrypt the data using the Advanced
Encryption Standard (AES) technique to safeguard it against theft and misuse |
---|