Optimal Security in Routing Aware of Energy and Quality of Services in Internet of Things-Fog Computing based on Whale Optimization Algorithm
Publish place: The 7th National Conference on New Technologies in Electrical, Computer and Mechanical Engineering of Iran
Publish Year: 1403
Type: Conference paper
Language: English
View: 115
This Paper With 13 Page And PDF Format Ready To Download
- Certificate
- I'm the author of the paper
Export:
Document National Code:
STCONF07_297
Index date: 10 August 2024
Optimal Security in Routing Aware of Energy and Quality of Services in Internet of Things-Fog Computing based on Whale Optimization Algorithm abstract
The Internet of Things (IoT) as a new network is evolving every day for various applications. Of course, there are issues and challenges that are no exception to the IoT with the growth of these networks. Combining IoT with other networks can be interesting. On the other hand, cloud computing as a promising technology in today's world of communications with online communication and data processing have chain of mechanisms including fog and edge computing. Fog-based processing is an intelligent computing system in which nodes in fog can independently respond to computing and processing requests of existing end devices. This intelligence as well as low delays in response requires the technologies to provide them. This research tries to solve the security in routing challenge in IoT-fog computing deployment platform, so that it can reduce energy consumption as much as possible and improve quality of services including throughput, network usage, latency and cost. The proposed approach is to use cryptographic principles called homomorphic cryptography and optimize it with the Whale Optimization Algorithm (WOA). Obtained results represented some improvement in the proposed approach.
Optimal Security in Routing Aware of Energy and Quality of Services in Internet of Things-Fog Computing based on Whale Optimization Algorithm Keywords:
Internet of Things (IoT) , Fog Computing , Secuity , Routing , Quality of Services , Energy Consumption , Whale Optimization Algorithm (WOA)
Optimal Security in Routing Aware of Energy and Quality of Services in Internet of Things-Fog Computing based on Whale Optimization Algorithm authors
Amirhossein Ghasemi
Department of Engineering, Bozorgmehr University of Qaenat, Iran