Optimal Security in Routing Aware of Energy and Quality of Services in Internet of Things-Fog Computing based on Whale Optimization Algorithm

Publish Year: 1403
نوع سند: مقاله کنفرانسی
زبان: English
View: 53

This Paper With 13 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

STCONF07_297

تاریخ نمایه سازی: 20 مرداد 1403

Abstract:

The Internet of Things (IoT) as a new network is evolving every day for various applications. Of course, there are issues and challenges that are no exception to the IoT with the growth of these networks. Combining IoT with other networks can be interesting. On the other hand, cloud computing as a promising technology in today's world of communications with online communication and data processing have chain of mechanisms including fog and edge computing. Fog-based processing is an intelligent computing system in which nodes in fog can independently respond to computing and processing requests of existing end devices. This intelligence as well as low delays in response requires the technologies to provide them. This research tries to solve the security in routing challenge in IoT-fog computing deployment platform, so that it can reduce energy consumption as much as possible and improve quality of services including throughput, network usage, latency and cost. The proposed approach is to use cryptographic principles called homomorphic cryptography and optimize it with the Whale Optimization Algorithm (WOA). Obtained results represented some improvement in the proposed approach.

Keywords:

Internet of Things (IoT) , Fog Computing , Secuity , Routing , Quality of Services , Energy Consumption , Whale Optimization Algorithm (WOA)

Authors

Amirhossein Ghasemi

Department of Engineering, Bozorgmehr University of Qaenat, Iran