Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (267)

Search Parameters:
Keywords = fog node

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 1685 KB  
Article
Small Language Model-Guided Quantile Temporal Difference Learning for Improved IoT Application Placement in Fog Computing
by Bhargavi Krishnamurthy and Sajjan G. Shiva
Mathematics 2025, 13(17), 2768; https://doi.org/10.3390/math13172768 - 28 Aug 2025
Viewed by 319
Abstract
The global market for fog computing is expected to reach USD 6385 million by 2032. Modern enterprises rely on fog computing since it offers computational resources at edge devices through decentralized computation mechanisms. One of the crucial components of fog computing is the [...] Read more.
The global market for fog computing is expected to reach USD 6385 million by 2032. Modern enterprises rely on fog computing since it offers computational resources at edge devices through decentralized computation mechanisms. One of the crucial components of fog computing is the proper placement of applications on fog nodes (edge devices, Internet of Things (IoT)) for servicing. Large-scale, geographically distributed fog networks and heterogeneity of fog nodes make application placement a challenging task. Quantile Temporal Difference Learning (QTDL) is a promising distributed form of a reinforcement learning algorithm. It is superior compared to traditional reinforcement learning as it learns the act of prediction based on the full distribution of returns. QTDL is enriched by a small language model (SLM), which results in low inference latency, reduced costs of operation, and also enhanced rates of learning. The SLM, being a lightweight model, has policy-shaping capability, which makes it an ideal choice for the resource-constrained environment of edge devices. The data-driven quantiles of temporal difference learning are blended with the informed heuristics of the SLM to prevent quantile loss and over- or underestimation of the policies. In this paper, a novel SLM-guided QTDL framework is proposed to perform task scheduling among fog nodes. The proposed framework is implemented using the iFogSim simulator by considering both certain and uncertain fog computing environments. Further, the results obtained are validated using expected value analysis. The performance of the proposed framework is found to be satisfactory with respect of the following performance metrics: energy consumption, makespan time violations, budget violations, and load imbalance ratio. Full article
(This article belongs to the Special Issue Advanced Reinforcement Learning in Internet of Things Networks)
Show Figures

Figure 1

49 pages, 1694 KB  
Review
Analysis of Deep Reinforcement Learning Algorithms for Task Offloading and Resource Allocation in Fog Computing Environments
by Endris Mohammed Ali, Jemal Abawajy, Frezewd Lemma and Samira A. Baho
Sensors 2025, 25(17), 5286; https://doi.org/10.3390/s25175286 - 25 Aug 2025
Viewed by 911
Abstract
Fog computing is increasingly preferred over cloud computing for processing tasks from Internet of Things (IoT) devices with limited resources. However, placing tasks and allocating resources in distributed and dynamic fog environments remains a major challenge, especially when trying to meet strict Quality [...] Read more.
Fog computing is increasingly preferred over cloud computing for processing tasks from Internet of Things (IoT) devices with limited resources. However, placing tasks and allocating resources in distributed and dynamic fog environments remains a major challenge, especially when trying to meet strict Quality of Service (QoS) requirements. Deep reinforcement learning (DRL) has emerged as a promising solution to these challenges, offering adaptive, data-driven decision-making in real-time and uncertain conditions. While several surveys have explored DRL in fog computing, most focus on traditional centralized offloading approaches or emphasize reinforcement learning (RL) with limited integration of deep learning. To address this gap, this paper presents a comprehensive and focused survey on the full-scale application of DRL to the task offloading problem in fog computing environments involving multiple user devices and multiple fog nodes. We systematically analyze and classify the literature based on architecture, resource allocation methods, QoS objectives, offloading topology and control, optimization strategies, DRL techniques used, and application scenarios. We also introduce a taxonomy of DRL-based task offloading models and highlight key challenges, open issues, and future research directions. This survey serves as a valuable resource for researchers by identifying unexplored areas and suggesting new directions for advancing DRL-based solutions in fog computing. For practitioners, it provides insights into selecting suitable DRL techniques and system designs to implement scalable, efficient, and QoS-aware fog computing applications in real-world environments. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

24 pages, 1981 KB  
Article
A Lightweight Batch Authenticated Key Agreement Scheme Based on Fog Computing for VANETs
by Lihui Li, Huacheng Zhang, Song Li, Jianming Liu and Chi Chen
Symmetry 2025, 17(8), 1350; https://doi.org/10.3390/sym17081350 - 18 Aug 2025
Viewed by 313
Abstract
In recent years, fog-based vehicular ad hoc networks (VANETs) have become a hot research topic. Due to the inherent insecurity of open wireless channels between vehicles and fog nodes, establishing session keys through authenticated key agreement (AKA) protocols is critically important for securing [...] Read more.
In recent years, fog-based vehicular ad hoc networks (VANETs) have become a hot research topic. Due to the inherent insecurity of open wireless channels between vehicles and fog nodes, establishing session keys through authenticated key agreement (AKA) protocols is critically important for securing communications. However, existing AKA schemes face several critical challenges: (1) When a large number of vehicles initiate AKA requests within a short time window, existing schemes that process requests one by one individually incur severe signaling congestion, resulting in significant quality of service degradation. (2) Many AKA schemes incur excessive computational and communication overheads due to the adoption of computationally intensive cryptographic primitives (e.g., bilinear pairings and scalar multiplications on elliptic curve groups) and unreasonable design choices, making them unsuitable for the low-latency requirements of VANETs. To address these issues, we propose a lightweight batch AKA scheme based on fog computing. In our scheme, when a group of vehicles requests AKA sessions with the same fog node within the set time interval, the fog node aggregates these requests and, with assistance from the traffic control center, establishes session keys for all vehicles by a round of operations. It has significantly reduced the operational complexity of the entire system. Moreover, our scheme employs Lagrange interpolation and lightweight cryptographic tools, thereby significantly reducing both computational and communication overheads. Additionally, our scheme supports conditional privacy preservation and includes a revocation mechanism for malicious vehicles. Security analysis demonstrates that the proposed scheme meets the security and privacy requirements of VANETs. Performance evaluation indicates that our scheme outperforms existing state-of-the-art solutions in terms of efficiency. Full article
(This article belongs to the Special Issue Applications Based on Symmetry in Applied Cryptography)
Show Figures

Figure 1

19 pages, 1507 KB  
Article
Fog Computing Architecture for Load Balancing in Parallel Production with a Distributed MES
by William Oñate and Ricardo Sanz
Appl. Sci. 2025, 15(13), 7438; https://doi.org/10.3390/app15137438 - 2 Jul 2025
Cited by 1 | Viewed by 278
Abstract
The technological growth in the automation of manufacturing processes, as seen in Industry 4.0, is characterized by a constant revolution and evolution in small- and medium-sized factories. As basic and advanced technologies from the pillars of Industry 4.0 are gradually incorporated into their [...] Read more.
The technological growth in the automation of manufacturing processes, as seen in Industry 4.0, is characterized by a constant revolution and evolution in small- and medium-sized factories. As basic and advanced technologies from the pillars of Industry 4.0 are gradually incorporated into their value chain, these factories can achieve adaptive technological transformation. This article presents a practical solution for companies seeking to evolve their production processes during the expansion phase of their manufacturing, starting from a base architecture with Industry 4.0 features which then integrate and implement specific tools that facilitate the duplication of installed capacity; this creates a situation that allows for the development of manufacturing execution systems (MESs) for each production line and a fog computing node, which is responsible for optimizing the load balance of order requests coming from the cloud and also acts as an intermediary between MESs and the cloud. On the other hand, legacy Machine Learning (ML) inference acceleration modules were integrated into the single-board computers of MESs to improve workflow across the new architecture. These improvements and integrations enabled the value chain of this expanded architecture to have lower latency, greater scalability, optimized resource utilization, and improved resistance to network service failures compared to the initial one. Full article
Show Figures

Figure 1

26 pages, 1608 KB  
Article
Efficient Delay-Sensitive Task Offloading to Fog Computing with Multi-Agent Twin Delayed Deep Deterministic Policy Gradient
by Endris Mohammed Ali, Frezewd Lemma, Ramasamy Srinivasagan and Jemal Abawajy
Electronics 2025, 14(11), 2169; https://doi.org/10.3390/electronics14112169 - 27 May 2025
Viewed by 793
Abstract
Fog computing presents a significant paradigm for extending the computational capabilities of resource-constrained devices executing increasingly complex applications. However, effectively leveraging this potential critically depends on the implementation of efficient task offloading mechanisms to proximal fog nodes, particularly under conditions of high resource [...] Read more.
Fog computing presents a significant paradigm for extending the computational capabilities of resource-constrained devices executing increasingly complex applications. However, effectively leveraging this potential critically depends on the implementation of efficient task offloading mechanisms to proximal fog nodes, particularly under conditions of high resource contention. To address this challenge, we introduce MAFCPTORA (multi-agent fully cooperative partial task offloading and resource allocation), a decentralized multi-agent deep reinforcement learning algorithm for cooperative task offloading and resource allocation. We evaluated the performance of MAFCPTORA and compared it against recent approaches. MAFCPTORA demonstrated superior performance compared to recent methods, achieving a significantly higher average reward (0.36 ± 0.01), substantially lower average latency (0.08 ± 0.01), and reduced energy consumption (0.76 ± 0.14). Full article
Show Figures

Figure 1

26 pages, 5185 KB  
Article
Seamless Integration of UOWC/MMF/FSO Systems Using Orbital Angular Momentum Beams for Enhanced Data Transmission
by Mehtab Singh, Somia A. Abd El-Mottaleb, Hassan Yousif Ahmed, Medien Zeghid and Abu Sufian A. Osman
Photonics 2025, 12(5), 499; https://doi.org/10.3390/photonics12050499 - 16 May 2025
Cited by 1 | Viewed by 499
Abstract
This work presents a high-speed hybrid communication system integrating Underwater Optical Wireless Communication (UOWC), Multimode Fiber (MMF), and Free-Space Optics (FSO) channels, leveraging Orbital Angular Momentum (OAM) beams for enhanced data transmission. A Photodetector, Remodulate, and Forward Relay (PRFR) is employed to enable [...] Read more.
This work presents a high-speed hybrid communication system integrating Underwater Optical Wireless Communication (UOWC), Multimode Fiber (MMF), and Free-Space Optics (FSO) channels, leveraging Orbital Angular Momentum (OAM) beams for enhanced data transmission. A Photodetector, Remodulate, and Forward Relay (PRFR) is employed to enable wavelength conversion from 532 nm for UOWC to 1550 nm for MMF and FSO links. Four distinct OAM beams, each supporting a 5 Gbps data rate, are utilized to evaluate the system’s performance under two scenarios. The first scenario investigates the effects of absorption and scattering in five water types on underwater transmission range, while maintaining fixed MMF length and FSO link. The second scenario examines varying FSO propagation distances under different fog conditions, with a consistent underwater link length. Results demonstrate that water and atmospheric attenuation significantly impact transmission range and received optical power. The proposed hybrid system ensures reliable data transmission with a maximum overall transmission distance of 1125 m (comprising a 25 m UOWC link in Pure Sea (PS) water, a 100 m MMF span, and a 1000 m FSO range in clear weather) in the first scenario. In the second scenario, under Light Fog (LF) conditions, the system achieves a longer reach of up to 2020 m (20 m UOWC link + 100 m MMF span + 1900 m FSO range), maintaining a BER ≤ 10−4 and a Q-factor around 4. This hybrid design is well suited for applications such as oceanographic research, offshore monitoring, and the Internet of Underwater Things (IoUT), enabling efficient data transfer between underwater nodes and surface stations. Full article
(This article belongs to the Special Issue Optical Wireless Communication in 5G and Beyond)
Show Figures

Figure 1

28 pages, 832 KB  
Article
Two-Tier Marketplace with Multi-Resource Bidding and Strategic Pricing for Multi-QoS Services
by Samira Habli, Rachid El-Azouzi, Essaid Sabir, Mandar Datar, Halima Elbiaze and Mohammed Sadik
Games 2025, 16(2), 20; https://doi.org/10.3390/g16020020 - 21 Apr 2025
Viewed by 1082
Abstract
Fog computing introduces a new dimension to the network edge by pooling diverse resources (e.g., processing power, memory, and bandwidth). However, allocating resources from heterogeneous fog nodes often faces limited capacity. To overcome these limitations, integrating fog nodes with cloud resources is crucial, [...] Read more.
Fog computing introduces a new dimension to the network edge by pooling diverse resources (e.g., processing power, memory, and bandwidth). However, allocating resources from heterogeneous fog nodes often faces limited capacity. To overcome these limitations, integrating fog nodes with cloud resources is crucial, ensuring that Service Providers (SPs) have adequate resources to deliver their services efficiently. In this paper, we propose a game-theoretic model to describe the competition among non-cooperative SPs as they bid for resources from both fog and cloud environments, managed by an Infrastructure Provider (InP), to offer paid services to their end-users. In our game model, each SP bids for the resources it requires, determining its willingness to pay based on its specific service demands and quality requirements. Resource allocation prioritizes the fog environment, which offers local access with lower latency but limited capacity. When fog resources are insufficient, the remaining demand is fulfilled by cloud resources, which provide virtually unlimited capacity. However, this approach has a weakness in that some SPs may struggle to fully utilize the resources allocated in the Nash equilibrium-balanced cloud solution. Specifically, under a nondiscriminatory pricing scheme, the Nash equilibrium may enable certain SPs to acquire more resources, granting them a significant advantage in utilizing fog resources. This leads to unfairness among SPs competing for fog resources. To address this issue, we propose a price differentiation mechanism among SPs to ensure a fair allocation of resources at the Nash equilibrium in the fog environment. We establish the existence and uniqueness of the Nash equilibrium and analyze its key properties. The effectiveness of the proposed model is validated through simulations using Amazon EC2 instances, where we investigate the impact of various parameters on market equilibrium. The results show that SPs may experience profit reductions as they invest to attract end-users and enhance their quality of service QoS. Furthermore, unequal access to resources can lead to an imbalance in competition, negatively affecting the fairness of resource distribution. The results demonstrate that the proposed model is coherent and that it offers valuable information on the allocation of resources, pricing strategies, and QoS management in cloud- and fog-based environments. Full article
(This article belongs to the Section Non-Cooperative Game Theory)
Show Figures

Figure 1

22 pages, 2988 KB  
Article
Scalable Resource Provisioning Framework for Fog Computing Using LLM-Guided Q-Learning Approach
by Bhargavi Krishnamurthy and Sajjan G. Shiva
Algorithms 2025, 18(4), 230; https://doi.org/10.3390/a18040230 - 17 Apr 2025
Cited by 1 | Viewed by 729
Abstract
Fog computing is one of the growing distributed computing platforms incorporated by Industries today as it performs real-time data analysis closer to the edge of the IoT network. It offers cloud capabilities at the edge of the fog networks through improved efficiency and [...] Read more.
Fog computing is one of the growing distributed computing platforms incorporated by Industries today as it performs real-time data analysis closer to the edge of the IoT network. It offers cloud capabilities at the edge of the fog networks through improved efficiency and flexibility. As the demands of Internet of Things (IoT) devices keep varying, it is important to rapidly modify the resource allocation policies to satisfy them. Constant fluctuation of the demands leads to over or under provisioning of resources. The computing capability of the fog nodes is small, and hence there is a necessity to develop resource provisioning policies that reduce the delay and bandwidth consumption. In this paper, a novel large language model (LLM)-guided Q-learning framework is designed and developed. The uncertainty in the fog environment in terms of delay incurred, bandwidth usage, and heterogeneity of fog nodes is represented using the LLM model. The reward shaping of a Q-learning agent is enriched by considering the heuristic value of the LLM model. The experimental results ensure that the proposed framework is good with respect to processing delay, energy consumption, load balancing, and service level agreement violation under a finite and infinite fog computing environment. The results are further validated through the expected value analysis statistical methodology. Full article
(This article belongs to the Section Algorithms for Multidisciplinary Applications)
Show Figures

Figure 1

31 pages, 616 KB  
Review
Fog Service Placement Optimization: A Survey of State-of-the-Art Strategies and Techniques
by Hemant Kumar Apat, Veena Goswami, Bibhudatta Sahoo, Rabindra K. Barik and Manob Jyoti Saikia
Computers 2025, 14(3), 99; https://doi.org/10.3390/computers14030099 - 11 Mar 2025
Viewed by 1983
Abstract
The rapid development of Internet of Things (IoT) devices in various smart city-based applications such as healthcare, traffic management systems, environment sensing systems, and public safety systems produce large volumes of data. To process these data, it requires substantial computing and storage resources [...] Read more.
The rapid development of Internet of Things (IoT) devices in various smart city-based applications such as healthcare, traffic management systems, environment sensing systems, and public safety systems produce large volumes of data. To process these data, it requires substantial computing and storage resources for smooth implementation and execution. While centralized cloud computing offers scalability, flexibility, and resource sharing, it faces significant limitations in IoT-based applications, especially in terms of latency, bandwidth, security, and cost. The fog computing paradigm complements the existing cloud computing services at the edge of the network to facilitate the various services without sending the data to a centralized cloud server. By processing the data in fog computing, it satisfies the delay requirement of various time-sensitive services of IoT applications. However, many resource-intensive IoT systems exist that require substantial computing resources for their processing. In such scenarios, finding the optimal computing node for processing and executing the service is a challenge. The optimal placement of various IoT applications services in heterogeneous fog computing environments is a well-known NP-complete problem. To solve this problem, various authors proposed different algorithms like the randomized algorithm, heuristic algorithm, meta heuristic algorithm, machine learning algorithm, and graph-based algorithm for finding the optimal placement. In the present survey, we first describe the fundamental and mathematical aspects of the three-layer IoT–fog–cloud computing model. Then, we classify the IoT application model based on different attributes that help to find the optimal computing node. Furthermore, we discuss the complexity analysis of the service placement problem in detail. Finally, we provide a comprehensive evaluation of both single-objective and multi-objective IoT service placement strategies in fog computing. Additionally, we highlight new challenges and identify promising directions for future research, specifically in the context of multi-objective IoT service optimization. Full article
Show Figures

Figure 1

21 pages, 3993 KB  
Article
Simulation-Based Evaluation of V2X System with Variable Computational Infrastructure
by Andrei Vladyko, Pavel Plotnikov and Gleb Tambovtsev
Network 2025, 5(1), 4; https://doi.org/10.3390/network5010004 - 14 Feb 2025
Cited by 1 | Viewed by 1376
Abstract
The issue of organizing efficient interaction between vehicle-to-everything (V2X) system elements has become increasingly critical in recent years. Utilizing V2X technology enables achieving the necessary balance of safety, reducing system load, and ensuring a high degree of vehicle automation. This study aims to [...] Read more.
The issue of organizing efficient interaction between vehicle-to-everything (V2X) system elements has become increasingly critical in recent years. Utilizing V2X technology enables achieving the necessary balance of safety, reducing system load, and ensuring a high degree of vehicle automation. This study aims to develop a simulation system for V2X applications in various element placement configurations and conduct a numerical analysis of several V2X system interaction schemes. The research analyzes various methods, including clustering, edge computing, and fog computing, aimed at minimizing system losses. The results demonstrate that each proposed model can be effectively implemented on mobile nodes. The results also provide insights into the average expected request processing times, thereby enhancing the organization of the V2X system. The authors propose a model that enables the distribution of system parameters and resources for diverse computational tasks, which is essential for the successful implementation and utilization of V2X technology. Full article
(This article belongs to the Special Issue Emerging Trends and Applications in Vehicular Ad Hoc Networks)
Show Figures

Figure 1

24 pages, 617 KB  
Article
A Secure and Efficient Authentication Scheme for Fog-Based Vehicular Ad Hoc Networks
by Sangjun Lee, Seunghwan Son, DeokKyu Kwon, Yohan Park and Youngho Park
Appl. Sci. 2025, 15(3), 1229; https://doi.org/10.3390/app15031229 - 25 Jan 2025
Cited by 1 | Viewed by 1050
Abstract
Recently, the application of fog-computing technology to vehicular ad hoc networks (VANETs) has rapidly advanced. Despite these advancements, challenges remain in ensuring efficient communication and security. Specifically, there are issues such as the high communication and computation load of authentications and insecure communication [...] Read more.
Recently, the application of fog-computing technology to vehicular ad hoc networks (VANETs) has rapidly advanced. Despite these advancements, challenges remain in ensuring efficient communication and security. Specifically, there are issues such as the high communication and computation load of authentications and insecure communication over public channels between fog nodes and vehicles. To address these problems, a lightweight and secure authenticated key agreement protocol for confidential communication is proposed. However, we found that the protocol does not offer perfect forward secrecy and is vulnerable to several attacks, such as privileged insider, ephemeral secret leakage, and stolen smart card attacks. Furthermore, their protocol excessively uses elliptic curve cryptography (ECC), resulting in delays in VANET environments where authentication occurs frequently. Therefore, this paper proposes a novel authentication protocol that outperforms other related protocols regarding security and performance. The proposed protocol reduced the usage frequency of ECC primarily using hash and exclusive OR operations. We analyzed the proposed protocol using informal and formal methods, including the real-or-random (RoR) model, Burrows–Abadi–Nikoogadam (BAN) logic, and automated validation of internet security protocols and applications (AVISPA) simulation to show that the proposed protocol is correct and secure against various attacks. Moreover, We compared the computational cost, communication cost, and security features of the proposed protocol with other related protocols and show that the proposed methods have better performance and security than other schemes. As a result, the proposed scheme is more secure and efficient for fog-based VANETs. Full article
Show Figures

Figure 1

23 pages, 6742 KB  
Article
Energy-Efficient Distributed Edge Computing to Assist Dense Internet of Things
by Sumaiah Algarni and Fathi E. Abd El-Samie
Future Internet 2025, 17(1), 37; https://doi.org/10.3390/fi17010037 - 15 Jan 2025
Cited by 2 | Viewed by 2097
Abstract
The Internet of Things (IoT) represents a rapidly growing field, where billions of intelligent devices are interconnected through the Internet, enabling the seamless sharing of data and resources. These smart devices are typically employed to sense various environmental characteristics, including temperature, motion of [...] Read more.
The Internet of Things (IoT) represents a rapidly growing field, where billions of intelligent devices are interconnected through the Internet, enabling the seamless sharing of data and resources. These smart devices are typically employed to sense various environmental characteristics, including temperature, motion of objects, and occupancy, and transfer their values to the nearest access points for further analysis. The exponential growth in sensor availability and deployment, powered by recent advances in sensor fabrication, has greatly increased the complexity of IoT network architecture. As the market for these sensors grows, so does the problem of ensuring that IoT networks meet high requirements for network availability, dependability, flexibility, and scalability. Unlike traditional networks, IoT systems must be able to handle massive amounts of data generated by various and frequently-used resource-constrained devices, while ensuring efficient and dependable communication. This puts high constraints on the design of IoT, mainly in terms of the required network availability, reliability, flexibility, and scalability. To this end, this work considers deploying a recent technology of distributed edge computing to enable IoT applications over dense networks with the announced requirements. The proposed network depends on distributed edge computing at two levels: multiple access edge computing and fog computing. The proposed structure increases network scalability, availability, reliability, and scalability. The network model and the energy model of the distributed nodes are introduced. An energy-offloading method is considered to manage IoT data over the network energy, efficiently. The developed network was evaluated using a developed IoT testbed. Heterogeneous evaluation scenarios and metrics were considered. The proposed model achieved a higher energy efficiency by 19%, resource utilization by 54%, latency efficiency by 86%, and reduced network congestion by 92% compared to traditional IoT networks. Full article
Show Figures

Figure 1

23 pages, 2052 KB  
Article
On Edge-Fog-Cloud Collaboration and Reaping Its Benefits: A Heterogeneous Multi-Tier Edge Computing Architecture
by Niroshinie Fernando, Samir Shrestha, Seng W. Loke and Kevin Lee
Future Internet 2025, 17(1), 22; https://doi.org/10.3390/fi17010022 - 7 Jan 2025
Cited by 7 | Viewed by 4175
Abstract
Edge, fog, and cloud computing provide complementary capabilities to enable distributed processing of IoT data. This requires offloading mechanisms, decision-making mechanisms, support for the dynamic availability of resources, and the cooperation of available nodes. This paper proposes a novel 3-tier architecture that integrates [...] Read more.
Edge, fog, and cloud computing provide complementary capabilities to enable distributed processing of IoT data. This requires offloading mechanisms, decision-making mechanisms, support for the dynamic availability of resources, and the cooperation of available nodes. This paper proposes a novel 3-tier architecture that integrates edge, fog, and cloud computing to harness their collective strengths, facilitating optimised data processing across these tiers. Our approach optimises performance, reducing energy consumption, and lowers costs. We evaluate our architecture through a series of experiments conducted on a purpose-built testbed. The results demonstrate significant improvements, with speedups of up to 7.5 times and energy savings reaching 80%, underlining the effectiveness and practical benefits of our cooperative edge-fog-cloud model in supporting the dynamic computational needs of IoT ecosystems. We argue that a multi-tier (e.g., edge-fog-cloud) dynamic task offloading and management of heterogeneous devices will be key to flexible edge computing, and that the advantage of task relocation and offloading is not straightforward but depends on the configuration of devices and relative device capabilities. Full article
(This article belongs to the Special Issue Edge Intelligence: Edge Computing for 5G and the Internet of Things)
Show Figures

Figure 1

33 pages, 4650 KB  
Review
Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning
by Tiansheng Yang, Ruikai Sun, Rajkumar Singh Rathore and Imran Baig
World Electr. Veh. J. 2025, 16(1), 14; https://doi.org/10.3390/wevj16010014 - 28 Dec 2024
Cited by 2 | Viewed by 2562
Abstract
Due to developments in vehicle engineering and communication technologies, vehicular networks have become an attractive and feasible solution for the future of electric, autonomous, and connected vehicles. Electric autonomous vehicles will require more data, computing resources, and communication capabilities to support them. The [...] Read more.
Due to developments in vehicle engineering and communication technologies, vehicular networks have become an attractive and feasible solution for the future of electric, autonomous, and connected vehicles. Electric autonomous vehicles will require more data, computing resources, and communication capabilities to support them. The combination of vehicles, the Internet, and cloud computing together to form vehicular cloud computing (VCC), vehicular edge computing (VEC), and vehicular fog computing (VFC) can facilitate the development of electric autonomous vehicles. However, more connected and engaged nodes also increase the system’s vulnerability to cybersecurity and privacy breaches. Various security and privacy challenges in vehicular cloud computing and its variants (VEC, VFC) can be efficiently tackled using machine learning (ML). In this paper, we adopt a semi-systematic literature review to select 85 articles related to the application of ML for cybersecurity and privacy protection based on VCC. They were categorized into four research themes: intrusion detection system, anomaly vehicle detection, task offloading security and privacy, and privacy protection. A list of suitable ML algorithms and their strengths and weaknesses is summarized according to the characteristics of each research topic. The performance of different ML algorithms in the literature is also collated and compared. Finally, the paper discusses the challenges and future research directions of ML algorithms when applied to vehicular cloud computing. Full article
Show Figures

Figure 1

16 pages, 2199 KB  
Article
Bioinspired Blockchain Framework for Secure and Scalable Wireless Sensor Network Integration in Fog–Cloud Ecosystems
by Abdul Rehman and Omar Alharbi
Computers 2025, 14(1), 3; https://doi.org/10.3390/computers14010003 - 26 Dec 2024
Cited by 1 | Viewed by 1227
Abstract
WSNs are significant components of modern IoT systems, which typically operate in resource-constrained environments integrated with fog and cloud computing to achieve scalability and real-time performance. Integrating these systems brings challenges such as security threats, scalability bottlenecks, and energy constraints. In this work, [...] Read more.
WSNs are significant components of modern IoT systems, which typically operate in resource-constrained environments integrated with fog and cloud computing to achieve scalability and real-time performance. Integrating these systems brings challenges such as security threats, scalability bottlenecks, and energy constraints. In this work, we propose a bioinspired blockchain framework aimed at addressing those challenges through the emulation of biological immune adaptation mechanisms, such as the self-recovery of swarm intelligence. It integrates lightweight blockchain technology with bioinspired algorithms, including an AIS for anomaly detection and a Proof of Adaptive Immunity Consensus mechanism for secure resource-efficient blockchain validation. Experimental evaluations give proof of the superior performance reached within this framework: up to 95.2% of anomaly detection accuracy, average energy efficiency of 91.2% when the traffic flow is normal, and latency as low as 15.2 ms during typical IoT scenarios. Moreover, the framework has very good scalability since it can handle up to 500 nodes with only a latency of about 6.0 ms. Full article
(This article belongs to the Special Issue IoT: Security, Privacy and Best Practices 2024)
Show Figures

Figure 1

Back to TopTop