Resource management in fog/edge computing: a survey on architectures, infrastructure, and algorithms
CH Hong, B Varghese - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Contrary to using distant and centralized cloud data center resources, employing
decentralized resources at the edge of a network for processing data closer to user devices …
decentralized resources at the edge of a network for processing data closer to user devices …
Quality of information in mobile crowdsensing: Survey and research challenges
Smartphones have become the most pervasive devices in people's lives and are clearly
transforming the way we live and perceive technology. Today's smartphones benefit from …
transforming the way we live and perceive technology. Today's smartphones benefit from …
ENORM: A framework for edge node resource management
Current computing techniques using the cloud as a centralised server will become
untenable as billions of devices get connected to the Internet. This raises the need for fog …
untenable as billions of devices get connected to the Internet. This raises the need for fog …
Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications
As the rapid development of 5G and Internet of Things (IoT) techniques, more and more
mobile devices with specific sensing capabilities access to the network and large amounts of …
mobile devices with specific sensing capabilities access to the network and large amounts of …
A taxonomy of blockchain-enabled softwarization for secure UAV network
The recent advancements in unmanned aerial vehicles (UAVs) upsurges its usages in
commercial and civilian applications such as surveillance, rescue, and crowdsensing. UAVs …
commercial and civilian applications such as surveillance, rescue, and crowdsensing. UAVs …
On securing underwater acoustic networks: A survey
S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …
untransparent or even hostile environments and face many security threats, while many …
Data aggregation algorithms for wireless sensor network: A review
M Kaur, A Munjal - Ad hoc networks, 2020 - Elsevier
In recent years, wireless sensor network (WSN) is one of the rapidly growing area in various
domains such as disaster relief operation, military applications, health applications, etc. In …
domains such as disaster relief operation, military applications, health applications, etc. In …
Software-defined networking for unmanned aerial vehicular networking and security: A survey
Despite the immense benefits offered by the utilization of unmanned aerial vehicles (UAVs)
in civilian and military applications, significant work needs to be done to ensure that these …
in civilian and military applications, significant work needs to be done to ensure that these …
A method for routing and data aggregating in cluster‐based wireless sensor networks
SS Sharifi, H Barati - International Journal of Communication …, 2021 - Wiley Online Library
Wireless sensor networks (WSNs) consist of a large number of small nodes, containing
sensors; these sensors serve as powerful devices to gather data in different environments …
sensors; these sensors serve as powerful devices to gather data in different environments …
Privacy-preserving data aggregation in mobile phone sensing
Mobile phone sensing provides a promising paradigm for collecting sensing data and has
been receiving increasing attention in recent years. Different from most existing works, which …
been receiving increasing attention in recent years. Different from most existing works, which …