Edge Computing through Virtual Force for Detecting Trustworthy Values
PDF
PDF

How to Cite

R.Dhaya, and R.Kanthavel. 2020. “Edge Computing through Virtual Force for Detecting Trustworthy Values”. IRO Journal on Sustainable Wireless Systems 2 (2): 84-91. https://doi.org/10.36548/jsws.2020.2.004.

Keywords

— Internet of Things
— Edge Computing
— Quantified trust values
— Sensor Nodes
Published: 26-05-2020

Abstract

As the advancement of IoT (Internet of Things) and other emerging mobile application continues, it is an accepted fact that Edge Computing paradigm is considered to be the best fit in terms of fulfilling the resource requirements. Moreover, it is a fact that the data collected by the sensor networks serves as the base for the IoT applications as well as the systems. However, due to advancement in cybercrimes, there is a possibility that the data collected through the sensor networks are vulnerable to attacks which may result in serious consequences. The proposed work focuses on a new model which is used to gather trustworthy data using edge computing in IoT. In order to get the accurately quantified trust values, the sensor nodes are analyzed and found from different dimensions. Moreover, with the help of trust value obtained, it is possible to find the best mobility path which carries the highest value of trust. This data is gathered from the sensors with the help of mobile edge data collector. This analysis shows that for a trustworthy data collection model of IoT, there is noticeable improvement in terms of energy conservation and system security, thereby improving the performance of the system.

References

  1. B. Huang, W. Liu, T. Wang, X. Li, H. Song, and A. Liu, “Deployment optimization of data centers in vehicular networks,” IEEE Access, vol. 7, pp. 20 644–20 663, 2019.
  2. Y. Chen, W. Xu, J. Zuo, and K. Yang, “The fire recognition algorithm using dynamic feature fusion and iv-svm classifier,” Cluster Computing, 2018.[Online]. Available: https://doi.org/10.1007/s10586-018-2368-8
  3. T. Wang, L. Qiu, G. Xu, A. K. Sangaiah, and A. Liu, “Energy-e_cient and trustworthy data collection protocol based on mobile fog computing in internet of things,” IEEE Transactions on Industrial Informatics, 2019.[Online]. Available: https://doi.org/10.1109/TII.2019.2920277
  4. T. Wang, Y. Liang, W. Jia, M. Arif, A. Liu, and M. Xie, “Coupling resource management based on fog computing in smart city systems,” Journal of Network and Computer Applications, vol. 135, pp. 11–19, 2019.
  5. G. Zhang, T. Wang, G. Wang, A. Liu, and W. Jia, “Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system,” Concurrency and Computation: Practice and Experience, 2018.[Online]. Available: https://doi.org/10.1002/cpe.5109
  6. Muneera Begum H, D. A. Janeera, and AG, Aneesh Kumar. "Internet of Things based Wild Animal Infringement Identification, Diversion and Alert System" In Fifth International Conference on Inventive Computation Technologies (ICICT-2020), pp. 672-676. IEEE, 2020.
  7. J. Qi, P. Yang, L. Newcombe, X. Peng, Y. Yang, and Z. Zhao, “An overview of data fusion techniques for internet of things enabled physical activity recognition and measure,” Information Fusion, vol. 55, pp. 269– 280, 2019.
  8. Y. Ren,W. Liu, T.Wang, X. Li, N. N. Xiong, and A. Liu, “A collaboration platform for e_ective task and data reporter selection in crowdsourcing network,” IEEE Access, vol. 7, pp. 19 238–19 257, 2019.
  9. A. A. Adewuyi, H. Cheng, Q. Shi, J. Cao, A´ . MacDermott, and X. Wang, “Ctrust: A dynamic trust model for collaborative applications in the internet of things,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5432–5445, 2019.
  10. A. Sharma, E. S. Pilli, and A. P. Mazumdar, “Rrar: Robust recommendation aggregation using retraining in internet of things,” in 2019 IEEE 5th World Forum on Internet of Things (WF-IoT). IEEE, 2019, pp. 76–80.
  11. R. W. Anwar, A. Zainal, F. Outay, A. Yasar, and S. Iqbal, “Btem: Belief based trust evaluation mechanism for wireless sensor networks,” Future Generation Computer Systems, vol. 96, pp. 605–616, 2019.
  12. Bashar, A. AGRICULTURAL MACHINE AUTOMATION USING IOT THROUGH ANDROID.
  13. Kumar, T. Senthil. "Efficient resource allocation and QOS enhancements of IoT with FOG network." J ISMAC 1 (2019): 101-110.