PDF Fog, edge, and pervasive computing in intelligent iot driven applications deepak gupta download

Page 1


Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications

Deepak Gupta

Visit to download the full and correct content document: https://ebookmass.com/product/fog-edge-and-pervasive-computing-in-intelligent-iot-dr iven-applications-deepak-gupta/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

Intelligent Data Analysis: From Data Gathering to Data Comprehension Deepak Gupta

https://ebookmass.com/product/intelligent-data-analysis-fromdata-gathering-to-data-comprehension-deepak-gupta/

The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and Edge Computing 1st ed. Edition Theo Lynn

https://ebookmass.com/product/the-cloud-to-thing-continuumopportunities-and-challenges-in-cloud-fog-and-edge-computing-1sted-edition-theo-lynn/

Building Enterprise IoT Solutions with Eclipse IoT Technologies: An Open Source Approach to Edge Computing 1st Edition Frédéric Desbiens

https://ebookmass.com/product/building-enterprise-iot-solutionswith-eclipse-iot-technologies-an-open-source-approach-to-edgecomputing-1st-edition-frederic-desbiens/

Building Enterprise IoT Solutions with Eclipse IoT Technologies: An Open Source Approach to Edge Computing 1st Edition Frédéric Desbiens

https://ebookmass.com/product/building-enterprise-iot-solutionswith-eclipse-iot-technologies-an-open-source-approach-to-edgecomputing-1st-edition-frederic-desbiens-2/

AI and IoT-Based Intelligent Automation in Robotics

Ashutosh Kumar Dubey

https://ebookmass.com/product/ai-and-iot-based-intelligentautomation-in-robotics-ashutosh-kumar-dubey/

Edge Computing Patterns for Solution Architects

Anonymous https://ebookmass.com/product/edge-computing-patterns-forsolution-architects-anonymous/

Artificial Intelligence and Machine Learning for EDGE Computing 1st Edition Rajiv Pandey

https://ebookmass.com/product/artificial-intelligence-andmachine-learning-for-edge-computing-1st-edition-rajiv-pandey/

AWS IoT With Edge ML and Cybersecurity: A Hands-On Approach 1st Edition Syed Rehan

https://ebookmass.com/product/aws-iot-with-edge-ml-andcybersecurity-a-hands-on-approach-1st-edition-syed-rehan/

AWS IoT With Edge ML and Cybersecurity: A Hands-On Approach 1st Edition Syed Rehan

https://ebookmass.com/product/aws-iot-with-edge-ml-andcybersecurity-a-hands-on-approach-1st-edition-syed-rehan-2/

Fog,Edge,andPervasiveComputinginIntelligentIoTDriven Applications

IEEEPress

445HoesLane

Piscataway,NJ08854

IEEEPressEditorialBoard

EkramHossain, EditorinChief

JónAtliBenediktssonDavidAlanGrierElyaB.Joffe

XiaoouLiPeterLianAndreasMolisch

SaeidNahavandiJeffreyReedDiomidisSpinellis

SarahSpurgeonAhmetMuratTekalp

Fog,Edge,andPervasiveComputingin

IntelligentIoTDrivenApplications

Copyright©2021byTheInstituteofElectricalandElectronicsEngineers,Inc.Allrights reserved.

PublishedbyJohnWiley&Sons,Inc.,Hoboken,NewJersey. PublishedsimultaneouslyinCanada.

Nopartofthispublicationmaybereproduced,storedinaretrievalsystem,ortransmittedinany formorbyanymeans,electronic,mechanical,photocopying,recording,scanning,orotherwise, exceptaspermittedunderSection107or108ofthe1976UnitedStatesCopyrightAct,without eitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentofthe appropriateper-copyfeetotheCopyrightClearanceCenter,Inc.,222RosewoodDrive,Danvers, MA01923,(978)750-8400,fax(978)750-4470,oronthewebatwww.copyright.com.Requeststo thePublisherforpermissionshouldbeaddressedtothePermissionsDepartment,JohnWiley& Sons,Inc.,111RiverStreet,Hoboken,NJ07030,(201)748-6011,fax(201)748-6008,oronlineat http://www.wiley.com/go/permission.

LimitofLiability/DisclaimerofWarranty:Whilethepublisherandauthorhaveusedtheirbest effortsinpreparingthisbook,theymakenorepresentationsorwarrantieswithrespecttothe accuracyorcompletenessofthecontentsofthisbookandspecificallydisclaimanyimplied warrantiesofmerchantabilityorfitnessforaparticularpurpose.Nowarrantymaybecreatedor extendedbysalesrepresentativesorwrittensalesmaterials.Theadviceandstrategiescontained hereinmaynotbesuitableforyoursituation.Youshouldconsultwithaprofessionalwhere appropriate.Neitherthepublishernorauthorshallbeliableforanylossofprofitoranyother commercialdamages,includingbutnotlimitedtospecial,incidental,consequential,orother damages.

Forgeneralinformationonourotherproductsandservicesorfortechnicalsupport,please contactourCustomerCareDepartmentwithintheUnitedStatesat(800)762-2974,outsidethe UnitedStatesat(317)572-3993orfax(317)572-4002.

Wileyalsopublishesitsbooksinavarietyofelectronicformats.Somecontentthatappearsin printmaynotbeavailableinelectronicformats.FormoreinformationaboutWileyproducts, visitourwebsiteatwww.wiley.com.

LibraryofCongressCataloging-in-PublicationData

Names:Gupta,Deepak,editor.|Khamparia,Aditya,1988-editor.

Title:Fog,edge,andpervasivecomputinginintelligentIoTdriven applications/editedbyDeepakGupta,AdityaKhamparia.

Description:Hoboken,NewJersey:Wiley-IEEEPress,2020.|Includes bibliographicalreferencesandindex.|Descriptionbasedonprintversion recordandCIPdataprovidedbypublisher;resourcenotviewed.

Identifiers:LCCN2020025436(print)|LCCN2020025437(ebook)|ISBN 9781119670100(epub)|ISBN9781119670094(adobepdf)|ISBN9781119670070 (hardback)|ISBN9781119670070q(hardback)|ISBN9781119670094q(adobe pdf)|ISBN9781119670100q(epub)

Subjects:LCSH:Internetofthings.|Cloudcomputing.|Distributed databases.|UbIquitouscomputing.

Classification:LCCTK5105.8857(ebook)|LCCTK5105.8857.F642020(print)| DDC004.67/8–dc23

LCrecordavailableathttps://lccn.loc.gov/2020025436LCrecordavailableathttps://lccn.loc .gov/2020025437

CoverDesign:Wiley

CoverImage:©AndriyOnufriyenko/GettyImages

Setin9.5/12.5ptSTIXTwoTextbySPiGlobal,Chennai,India

PrintedintheUnitedStatesofAmerica 10987654321

Contents

AbouttheEditors xvii

ListofContributors xix

Preface xxv Acknowledgments xxxiii

1Fog,EdgeandPervasiveComputinginIntelligentInternetof ThingsDrivenApplicationsinHealthcare:Challenges, LimitationsandFutureUse 1

AfrojAlam,SaharQazi,NaiyarIqbal,andKhalidRaza

1.1Introduction 1

1.2WhyFog,Edge,andPervasiveComputing? 3

1.3TechnologiesRelatedtoFogandEdgeComputing 6

1.4ConceptofIntelligentIoTApplicationinSmart(Fog)Computing Era 9

1.5TheHierarchicalArchitectureofFog/EdgeComputing 12

1.6ApplicationsofFog,EdgeandPervasiveComputinginIoT-based Healthcare 15

1.7Issues,Challenges,andOpportunity 17

1.7.1SecurityandPrivacyIssues 18

1.7.2ResourceManagement 19

1.7.3ProgrammingPlatform 19

1.8Conclusion 20 Bibliography 20

2FutureOpportunisticFog/EdgeComputationalModelsand theirLimitations 27 SoniaSingla,NaveenKumarBhati,andS.Aswath

2.1Introduction 28

2.2WhataretheBenefitsofEdgeandFogComputingfortheMechanical WebofThings(IoT)? 32

2.3Disadvantages 34

2.4Challenges 34

2.5RoleinHealthCare 35

2.6BlockchainandFog,EdgeComputing 38

2.7HowBlockchainwillIlluminateHumanServicesIssues 40

2.8UsesofBlockchainintheFuture 41

2.9UsesofBlockchaininHealthCare 42

2.10EdgeComputingSegmentalAnalysis 42

2.11UsesofFogComputing 43

2.12AnalyticsinFogComputing 44

2.13Conclusion 44

Bibliography 44

3AutomatingElicitationTechniqueSelectionusingMachine Learning 47

HatimM.ElhassanIbrahimDafallaa,NazirAhmad,MohammedBurhanur Rehman,IqrarAhmad,andRizwankhan

3.1Introduction 47

3.2RelatedWork 48

3.3Model:RequirementElicitationTechniqueSelectionModel 52

3.3.1DeterminingKeyAttributes 54

3.3.2SelectionAttributes 54

3.3.2.1AnalystExperience 55

3.3.2.2NumberofStakeholders 55

3.3.2.3TechniqueTime 56

3.3.2.4LevelofInformation 56

3.3.3SelectionAttributesDataset 56

3.3.3.1MappingtheSelectionAttributes 57

3.3.4 k-nearestNeighborAlgorithmApplication 57

3.4AnalysisandResults 60

3.5TheErrorRate 61

3.6Validation 61

3.6.1DiscussionoftheResultsoftheExperiment 62

3.7Conclusion 62

Bibliography 65

4MachineLearningFrameworksandAlgorithmsforFogand EdgeComputing 67

MuraliMallikarjunaRaoPerumalla,SanjayKumarSingh,Aditya Khamparia,AnjaliGoyal,andAshishMishra

4.1Introduction 68

4.1.1FogComputingandEdgeComputing 68

4.1.2PervasiveComputing 68

4.2OverviewofMachineLearningFrameworksforFogandEdge Computing 69

4.2.1TensorFlow 69

4.2.2Keras 70

4.2.3PyTorch 70

4.2.4TensorFlowLite 70

4.2.4.1UsePre-trainModels 70

4.2.4.2ConverttheModel 70

4.2.4.3On-deviceInference 71

4.2.4.4ModelOptimization 71

4.2.5MachineLearningandDeepLearningTechniques 71

4.2.5.1Supervised,UnsupervisedandReinforcementLearning 71

4.2.5.2MachineLearning,DeepLearningTechniques 72

4.2.5.3DeepLearningTechniques 75

4.2.5.4EfficientDeepLearningAlgorithmsforInference 77

4.2.6ProsandConsofMLAlgorithmsforFogandEdgeComputing 78

4.2.6.1AdvantagesusingMLAlgorithms 78

4.2.6.2DisadvantagesofusingMLAlgorithms 79

4.2.7HybridMLModelforSmartIoTApplications 79

4.2.7.1Multi-TaskLearning 79

4.2.7.2EnsembleLearning 80

4.2.8PossibleApplicationsinFogErausingMachineLearning 81

4.2.8.1ComputerVision 81

4.2.8.2ML-AssistedHealthcareMonitoringSystem 81

4.2.8.3SmartHomes 81

4.2.8.4BehaviorAnalyses 82

4.2.8.5MonitoringinRemoteAreasandIndustries 82

4.2.8.6Self-DrivingCars 82 Bibliography 82

5IntegratedCloudBasedLibraryManagementinIntelligent IoTdrivenApplications 85 MdRobiulAlamRobel,SubratoBharati,PrajoyPodder,andM.Rubaiyat HossainMondal

5.1Introduction 86

5.1.1ExecutionPlanfortheMobileApplication 86

5.1.2MainContribution 86

5.2UnderstandingLibraryManagement 87

5.3IntegrationofMobilePlatformwiththePhysicalLibrary-Brief Concept 88

5.4Database(CloudBased)-AMusthaveComponentforLibrary Automation 88

5.5IoTDrivenMobileBasedLibraryManagement-GeneralConcept 89

5.6IoTInvolvedRealTimeGUI(CrossPlatform)AvailabletoUser 93

5.7IoTChallenges 98

5.7.1InfrastructureChallenges 99

5.7.2SecurityChallenges 99

5.7.3SocietalChallenges 100

5.7.4CommercialChallenges 101

5.8Conclusion 102 Bibliography 104

6ASystematicandStructuredReviewofIntelligentSystems forDiagnosisofRenalCancer 105 Nikita,HarshSadawarti,BalwinderKaur,andJimmySingla

6.1Introduction 106

6.2RelatedWorks 107

6.3Conclusion 119 Bibliography 119

7LocationDrivenEdgeAssistedDeviceandSolutionsfor IntelligentTransportation 123 SaravjeetSinghandJaitegSingh

7.1IntroductiontoFogandEdgeComputing 124

7.1.1NeedforFogandEdgeComputing 124

7.1.2FogComputing 125

7.1.2.1ApplicationAreasofFogComputing 125

7.1.3EdgeComputing 126

7.1.3.1AdvantagesofEdgeComputing 127

7.1.3.2ApplicationAreasofFogComputing 129

7.2IntroductiontoTransportationSystem 129

7.3RouteFindingProcess 131

7.3.1ChallengesAssociatedwithLandNavigationandRouting Process 132

7.4EdgeArchitectureforRouteFinding 133

7.5TechniqueUsed 135

7.6AlgorithmsUsedfortheLocationIdentificationandRouteFinding Process 137

7.6.1LocationIdentification 137

7.6.2PathGenerationTechnique 138

7.7ResultsandDiscussions 140

7.7.1Output 140

7.7.2BenefitsofEdge-basedRouting 143

7.8Conclusion 145 Bibliography 146

8DesignandSimulationofMEMSforAutomobileCondition MonitoringUsingCOMSOLMultiphysicsSimulator 149 NatashaTiwari,AnilKumar,PallaviAsthana,SumitaMishra,andBramah Hazela

8.1Introduction 149

8.2RelatedWork 151

8.3VehicleConditionMonitoringthroughAcousticEmission 151

8.4Piezo-resistiveMicroElectromechanicalSensorsforMonitoringthe FaultsThroughAE 152

8.5DesigningofMEMSensor 153

8.6ExperimentalSetup 153

8.6.1FFTAnalysisofAutomotiveDieselEngineSoundRecordingusing MATLAB 155

8.6.2DesignofMEMSSensorusingCOMSOLMultiphysics 155

8.6.3ElectrostaticStudyStepsfortheOptimizedTri-plateComb Structure 156

8.7ResultandDiscussions 157

8.8Conclusion 158 Bibliography 158

9IoTDrivenHealthcareMonitoringSystem 161 MdRobiulAlamRobel,SubratoBharati,PrajoyPodder,andM.Rubaiyat HossainMondal

9.1Introduction 161

9.1.1ComplementaryAspectsofCloudIoTinHealthcareApplications 162

9.1.2MainContribution 164

9.2GeneralConceptforIoTBasedHealthcareSystem 164

9.3ViewoftheOverallIoTHealthcareSystem-TiersExplained 165

9.4ABriefDesignoftheIoTHealthcareArchitecture-individualBlock Explanation 166

9.5Models/FrameworksforIoTuseinHealthcare 168

9.6IoTe-HealthSystemModel 171

9.7ProcessFlowfortheOverallModel 172

9.8Conclusion 173 Bibliography 175

x Contents

10FogComputingasFuturePerspectiveinVehicularAdhoc Networks 177 HarjitSingh,Dr.VijayLaxmi,Dr.ArunMalik,andDr.Isha

10.1Introduction 178

10.2FutureVANET:PrimaryIssuesandSpecifications 180

10.3FogComputing 181

10.3.1FogComputingConcept 183

10.3.2FogTechnologyCharacterization 183

10.4RelatedWorksinCloudandFogComputing 185

10.5FogandCloudComputing-basedTechnologyApplicationsin VANET 186

10.6ChallengesofFogComputinginVANET 188

10.7IssuesofFogComputinginVANET 189

10.8Conclusion 190 Bibliography 191

11AnOverviewtoDesignanEfficientandSecureFog-assisted DataCollectionMethodintheInternetofThings 193 Sofia,ArunMalik,Isha,andAdityaKhamparia

11.1Introduction 193

11.2RelatedWorks 194

11.3OverviewoftheChapter 196

11.4DataCollectionintheIoT 197

11.5FogComputing 197

11.5.1WhyfogComputingforDataCollectioninIoT? 197

11.5.2ArchitectureofFogComputing 200

11.5.3FeaturesofFogComputing 200

11.5.4ThreatsofFogComputing 202

11.5.5ApplicationsofFogComputingwiththeIoT 203

11.6RequirementsforDesigningaDataCollectionMethod 204

11.7Conclusion 206 Bibliography 206

12RoleofFogComputingPlatforminAnalyticsofInternetof Things-Issues,ChallengesandOpportunities 209 MamoonRashidandUmerIqbalWani

12.1IntroductiontoFogComputing 209

12.1.1HierarchicalFogComputingArchitecture 210

12.1.2LayeredFogComputingArchitecture 212

12.1.3ComparisonofFogandCloudComputing 213

12.2IntroductiontoInternetofThings 214

12.2.1OverviewofInternetofThings 214

12.3ConceptualArchitectureofInternetofThings 216

12.4RelationshipbetweenInternetofThingsandFogComputing 217

12.5UseofFogAnalyticsinInternetofThings 218

12.6Conclusion 218

Bibliography 218

13AMedicalDiagnosisofUrethralStrictureUsingIntuitionistic FuzzySets 221

PrabjotKaurandMariaJamal

13.1Introduction 221

13.2Preliminaries 223

13.2.1Introduction 223

13.2.2FuzzySets 223

13.2.3IntuitionisticFuzzySets 224

13.2.4IntuitionisticFuzzyRelation 224

13.2.5Max-Min-MaxComposition 224

13.2.6LinguisticVariable 224

13.2.7DistanceMeasureInIntuitionisticFuzzySets 224

13.2.7.1TheHammingDistance 224

13.2.7.2NormalizedHammingDistance 224

13.2.7.3ComplimentofanIntuitionisticFuzzySetMatrix 225

13.2.7.4RevisedMax-MinAverageCompositionofAandB(A Φ B) 225

13.3Max-Min-MaxAlgorithmforDiseaseDiagnosis 225

13.4CaseStudy 226

13.5IntuitionisticFuzzyMax-MinAverageAlgorithmforDisease Diagnosis 227

13.6Result 228

13.7CodeforCalculation 229

13.8Conclusion 233

13.9Acknowledgement 234 Bibliography 234

14SecurityAttacksinInternetofThings 237 RajitNair,PreetiSharma,andDileepKumarSingh

14.1Introduction 238

14.2ReferenceModelofInternetofThings(IoT) 238

14.3IoTCommunicationProtocol 246

14.4IoTSecurity 247

14.4.1PhysicalAttack 248

14.4.2NetworkAttack 252

14.4.3SoftwareAttack 254

14.4.4EncryptionAttack 255

14.5SecurityChallengesinIoT 256

14.5.1CryptographicStrategies 256

14.5.2KeyAdministration 256

14.5.3DenialofService 256

14.5.4AuthenticationandAccessControl 257

14.6Conclusion 257 Bibliography 257

15FogIntegratedNovelArchitectureforTelehealthServices withSwiftMedicalDelivery 263

InderpreetKaur,KamaljitSinghSaini,andJaitegSinghKhaira

15.1Introduction 264

15.2AssociatedWorkandDimensions 266

15.3NeedofSecurityinTelemedicineDomainandInternetofThings (IoT) 267

15.3.1AnalyticsReports 268

15.4FogIntegratedArchitectureforTelehealthDelivery 268

15.5ResearchDimensions 269

15.5.1BenchmarkDatasets 269

15.6ResearchMethodologyandImplementationonSoftwareDefined Networking 270

15.6.1KeyToolsandFrameworksforIoT,FogComputingandEdge Computing 274

15.6.2SimulationAnalysis 276

15.7Conclusion 282 Bibliography 282

16FruitFlyOptimizationAlgorithmforIntelligentIoT Applications 287

SatinderSinghMohar,SoniaGoyal,andRanjitKaur

16.1AnIntroductiontotheInternetofThings 287

16.2BackgroundoftheIoT 288

16.2.1EvolutionoftheIoT 288

16.2.2ElementsInvolvedinIoTCommunication 288

16.3ApplicationsoftheIoT 289

16.3.1Industrial 290

16.3.2SmartParking 290

16.3.3HealthCare 290

16.3.4SmartOfficesandHomes 290

16.3.5AugmentMaps 291

16.3.6EnvironmentMonitoring 291

16.3.7Agriculture 291

16.4ChallengesintheIoT 291

16.4.1AddressingSchemes 291

16.4.2EnergyConsumption 292

16.4.3TransmissionMedia 292

16.4.4Security 292

16.4.5QualityofService(QoS) 292

16.5IntroductiontoOptimization 293

16.6ClassificationofOptimizationAlgorithms 293

16.6.1ParticleSwarmOptimization(PSO)Algorithm 293

16.6.2GeneticAlgorithms 294

16.6.3HeuristicAlgorithms 294

16.6.4Bio-inspiredAlgorithms 294

16.6.5EvolutionaryAlgorithms(EA) 294

16.7NetworkOptimizationandIoT 295

16.8NetworkParametersoptimizedbyDifferentOptimization Algorithms 295

16.8.1LoadBalancing 295

16.8.2MaximizingNetworkLifetime 295

16.8.3LinkFailureManagement 296

16.8.4QualityoftheLink 296

16.8.5EnergyEfficiency 296

16.8.6NodeDeployment 296

16.9FruitFlyOptimizationAlgorithm 297

16.9.1StepsInvolvedinFOA 297

16.9.2FlowChartofFruitFlyOptimizationAlgorithm 298

16.10ApplicabilityofFOAinIoTApplications 300

16.10.1CloudServiceDistributioninFogComputing 300

16.10.2ClusterHeadSelectioninIoT 300

16.10.3LoadBalancinginIoT 300

16.10.4QualityofServiceinWebServices 300

16.10.5ElectronicsHealthRecordsinCloudComputing 301

16.10.6IntrusionDetectionSysteminNetwork 301

16.10.7NodeCaptureAttackinWSN 301

16.10.8NodeDeploymentinWSN 302

16.11NodeDeploymentUsingFruitFlyOptimizationAlgorithm 302

16.12Conclusion 304 Bibliography 304

17OptimizationTechniquesforIntelligentIoT

Applications 311

PriyankaPattnaik,SubhashreeMishra,andBhabaniShankarPrasad Mishra

17.1CuckooSearch 312

17.1.1IntroductiontoCuckoo 312

17.1.2NaturalCuckoo 312

17.1.3ArtificialCuckooSearch 313

17.1.4CuckooSearchAlgorithm 313

17.1.5CuckooSearchVariants 314

17.1.6DiscreteCuckooSearch 314

17.1.7BinaryCuckooSearch 314

17.1.8ChaoticCuckooSearch 316

17.1.9ParallelCuckooSearch 317

17.1.10ApplicationofCuckooSearch 317

17.2GlowWormAlgorithm 317

17.2.1IntroductiontoGlowWorm 317

17.2.2GlowWormSwarmOptimizationAlgorithm(GSO) 317

17.3WaspSwarmOptimization 321

17.3.1IntroductiontoWaspSwarmandWaspSwarmAlgorithm(WSO) 321

17.3.2FishSwarmOptimization(FSO) 322

17.3.3FruitFlyOptimization(FLO) 322

17.3.4CockroachSwarmOptimization 324

17.3.5BumblebeeAlgorithm 324

17.3.6DolphinEcholocation 325

17.3.7ShuffledFrog-leapingAlgorithm 326

17.3.8PaddyFieldAlgorithm 327

17.4RealWorldApplicationsArea 328

Summary 329 Bibliography 329

18OptimizationTechniquesforIntelligentIoTApplicationsin TransportProcesses 333 MuzaferSaraˇcevi ´ c,ZoranLonˇcarevi ´ c,andAdnanHasanovi ´ c

18.1Introduction 333

18.2RelatedWorks 335

18.3TSPOptimizationTechniques 336

18.4ImplementationandTestingofProposedSolution 338

18.5ExperimentalResults 342

18.5.1ExampleTestwith50Cities 343

18.5.2ExampleTestwith100Cities 344

18.6ConclusionandFurtherWorks 346 Bibliography 347

19RoleofIntelligentIOTApplicationsinFogparadigm:Issues, ChallengesandFutureOpportunities 351

PriyankaRajanKumarandSoniaGoel

19.1FogComputing 352

19.1.1NeedofFogcomputing 352

19.1.2ArchitectureofFogComputing 353

19.1.3FogComputingReferenceArchitecture 354

19.1.4ProcessingonFog 355

19.2ConceptofIntelligentIoTApplicationsinSmartComputingEra 355

19.3ComponentsofEdgeandFogDrivenAlgorithm 356

19.4WorkingofEdgeandFogDrivenAlgorithms 357

19.5FutureOpportunisticFog/EdgeComputationalModels 360

19.5.1FutureOpportunisticTechniques 361

19.6ChallengesofFogComputingforIntelligentIoTApplications 361

19.7ApplicationsofCloudBasedComputingforSmartDevices 363 Bibliography 364

20SecurityandPrivacyIssuesinFog/Edge/Pervasive Computing 369

ShwetaKaushikandCharuGandhi

20.1IntroductiontoDataSecurityandPrivacyinFogComputing 370

20.2DataProtection/Security 375

20.3GreatSecurityPracticesInFogProcessingCondition 377

20.4DevelopingPatternsinSecurityandPrivacy 381

20.5Conclusion 385 Bibliography 385

21FogandEdgeDrivenSecurity&PrivacyIssuesinIoT Devices 389

DeepakKumarSharma,AartiGoel,andPragunMangla

21.1IntroductiontoFogComputing 390

21.1.1ArchitectureofFog 390

21.1.2BenefitsofFogComputing 392

21.1.3ApplicationsofFogwithIoT 393

21.1.4MajorChallengesforFogwithIoT 394

21.1.5SecurityandPrivacyIssuesinFogComputing 395

21.2IntroductiontoEdgeComputing 399

21.2.1ArchitectureandWorking 400

21.2.2ApplicationsanduseCases 400

21.2.3CharacteristicsofEdgeComputing 403

21.2.4ChallengesofEdgeComputing 404

21.2.5HowtoProtectDevices“OntheEdge”? 405

21.2.6ComparisonwithFogComputing 405 Bibliography 406

Index 409

AbouttheEditors

DeepakGuptaisaneminentacademician;hehas variousrolesandresponsibilitiesjugglinghistime betweenlectures,research,publications,consultancy,communityservice,PhDandpost-doctorate supervisionetc.With12yearsofrichexpertise inteachingandtwoyearsinindustry;hefocuses onrationalandpracticallearning.Hehascontributedsubstantialliteratureinthefieldsof Human–ComputerInteraction,IntelligentData Analysis,Nature-InspiredComputing,Machine LearningandSoftComputing.Heisworkingas anAssistantProfessoratMaharajaAgrasenInstituteofTechnology(GGSIPU), Delhi,India.HehasservedasEditor-in-Chief,GuestEditor,AssociateEditorin SCIandvariousotherreputedjournals(Elsevier,Springer,Wiley&MDPI).Hehas activelybeeninvolvedintheorganizationofvariouswellreputedInternational conferences.Heisnotonlybackedwithastrongreputationbuthisinnovative ideas,end-resultsofhisresearchandimplementationoftechnologyinthe medicalfieldissignificantlycontributingtosociety.HeiscurrentlyaPost-Doc researcheratUniversityofValladolid,Spain.HehascompletedhisPost-Docfrom Inatel,Brazil,andPh.D.fromDr.APJAbdulKalamTechnicalUniversity.Hehas authored/edited33bookspublishedinternationally(Elsevier,Springer,Wiley, Katson).Hehaspublished103scientificresearchworksinreputedInternational JournalsandConferencesincluding50SCIIndexedJournalsoftheIEEE, Elsevier,Springer,Wileyandmanymore.Hehasalsopublishedonepatent.He isEditor-in-ChiefoftheOAjournal ComputersandQuantumComputingand Applications (QCAA),AssociateEditorof ExpertSystems (Wiley),Intelligent DecisionTechnologies(IOSPress), JournalofComputationalandTheoretical Nenoscience,HonoraryEditorofICSES TransactionsonImageProcessingand PatternRecognition.HeisalsoaserieseditorofIntelligent BiomedicalData

Analysis DeGruyter(Germany),serieseditorof SmartSensorTechnologiesfor BiomedicalEngineering withElsevier.HeisalsoassociatedwithvariousprofessionalbodiessuchasISTE,IAENG,IACSIT,SCIEI,ICSES,UACEE,Internet Society,SMEI,IAOP,andIAOIP.InvitedasaFacultyResourcePerson/Session Chair/Reviewer/TPCmemberindifferentFDP,conferencesandjournals.Heis theconvenerofthe‘ICICC’and‘ICDAM’springerconferenceseries.

AdityaKhampariaisaneminentacademician;he hasvariousrolesandresponsibilitiesincludinglectures,research,publications,consultancy,communityserviceandPhDsupervisionetc.Withseven yearsofrichexpertiseinteachingandtwoyearsin industry;hefocusesonindividualcentricandpracticallearning.Currently,heisworkingasAssociate ProfessorofComputerScienceandEngineeringat LovelyProfessionalUniversity,Punjab,India.His researchareasareMachineLearning,SoftComputing,EducationalTechnologies,IoT,SemanticWeb andOntologies.Hehaspublishedmorethan50scientificresearchpublicationsinreputedInternational/NationalJournalsandConferences,whichare indexedinvariousinternationaldatabases.InvitedasaFacultyResourcePerson/SessionChair/Reviewer/TPCmemberindifferentFDP,conferencesandjournals.Dr.Adityareceivedresearchexcellenceawardin2016,2017,2018and 2019atLovelyProfessionalUniversityforhisresearchcontributionduringthe academicyear.HeismemberofCSI,IET,ISTE,IAENG,ACMandIACSIT. Heisalsoactingasreviewerandmemberofvariousrenownednationaland internationalconferences/journals.InvitedasaFacultyResourcePerson/Session Chair/Reviewer/TPCmemberindifferentFDP,conferencesandjournals.

ListofContributors

IqrarAhmad Departmentofinformationsystem CommunityCollege

KingKhalidUniversityMuhayel KingdomofSaudiArabia

NazirAhmad Departmentofinformationsystem CommunityCollege KingKhalidUniversityMuhayel KingdomofSaudiArabia

AfrojAlam DepartmentofComputerScience IntegralUniversity Lucknow India

PallaviAsthana AmityUniversity UttarPradesh

India

S.Aswath DepartmentofComputerScience PESUniversity Bangalore,560008

India

SubratoBharati DepartmentofEEE RanadaPrasadShahaUniversity Narayanganj-1400 Bangladesh

NaveenKumarBhati SunderDeepCollegeofEngineering andTechnology UttarPradeshTechnicalUniversity

India

HatimM.ElhassanIbrahimDafallaa Departmentofinformationsystem CommunityCollege KingKhalidUniversityMuhayel KingdomofSaudiArabia

CharuGandhi DepartmentofComputerScience

JIIT

Noida India

xx ListofContributors

AartiGoel DepartmentofInformation Technology

NetajiSubhasUniversityof Technology

NewDelhi

India

SoniaGoel PunjabiUniversityPatiala

AnjaliGoyal DepartmentofComputerApplications

GNIMT

Ludhiana

Punjab India

SoniaGoyal DepartmentofElectronicsand CommunicationEngineering

PunjabiUniversityPatiala

AdnanHasanovi ´ c UniversityofNoviPazar 36300NoviPazar

DimitrijaTucovicabb

Serbia

BramahHazela AmityUniversity

UttarPradesh

India

NaiyarIqbal DepartmentofComputerScience andIT MaulanaAzadNationalUrdu University

Hyderabad

Isha AssociateProfessor LovelyProfessionalUniversity

Punjab

India

MariaJamal DepartmentofMathematics

BirlaInstituteofTechnology

India

BalwinderKaur SchoolofComputerScienceand Engineering LovelyProfessionalUniversity

Phagwara

India

InderpreetKaur ReseachScholar CUGharaun Dept.ofComputerApplications CGClandran

PrabjotKaur DepartmentofMathematics

BirlaInstituteofTechnology

India

RanjitKaur DepartmentofElectronicsand CommunicationEngineering PunjabiUniversityPatiala

ShwetaKaushik DepartmentofComputerScience Engineering

ABESInstituteofTechnology

NewDelhi

India

JaitegSinghKhaira Dept.ofComputerApplications ChitkaraUniversity PunjabCampus

AdityaKhamparia SchoolofComputerScienceand Engineering

LovelyProfessionalUniversity Phagwara Punjab and SchoolofComputerScienceand Engineering

LovelyProfessionalUniversity Punjab India

Rizwankhan Al-BarkaatCollegeofGraduate Studies

Aligarh India

AnilKumar AmityUniversity UttarPradesh India

PriyankaRajanKumar PunjabiUniversityPatiala

VijayLaxmi Professor GuruKashiUniversity Punjab India

ListofContributors

ZoranLonˇcarevi ´ c ITS-StudiesforInformation Technologies 11000Belgrade Savskinasip7

Serbia

ArunMalik AssociateProfessor

LovelyProfessionalUniversity Punjab India

PragunMangla DepartmentofElectronicsand Communication

NetajiSubhasInstituteofTechnology NewDelhi India

AshishMishra GyanGangaInstituteofTechnology Jabalpur

MadhyaPradesh

India

BhabaniShankarPrasadMishra SchoolofComputerEngineering KIITUniversity Bhubaneswar Odisha

SubhashreeMishra SchoolofElectronicsEngineering KIITUniversity Bhubaneswar Odisha

xxii ListofContributors

SumitaMishra AmityUniversity

UttarPradesh

India

SatinderSinghMohar DepartmentofElectronicsand CommunicationEngineering PunjabiUniversityPatiala

M.RubaiyatHossainMondal InstituteofICT

BangladeshUniversityofEngineering andTechnology Dhaka

Bangladesh RajitNair JagranLakecityUniversity

Nikita SchoolofEngineering&Technology CTUniversity

Ludhiana

India

PriyankaPattnaik SchoolofComputerEngineering KIITUniversity Bhubaneswar

Odisha

MuraliMallikarjunaRaoPerumalla SchoolofComputerScienceand Engineering

LovelyProfessionalUniversity Phagwara

Punjab

PrajoyPodder InstituteofICT

BangladeshUniversityofEngineering andTechnology

Dhaka

Bangladesh SaharQazi DepartmentofComputerScience

JamiaMilliaIslamia NewDelhi

MamoonRashid AssistantProfessor SchoolofComputerScienceand Engineering

LovelyProfessionalUniversity Jalandhar

India

KhalidRaza DepartmentofComputerScience JamiaMilliaIslamia

NewDelhi

MohammedBurhanurRehman Departmentofinformationsystem CommunityCollege

KingKhalidUniversityMuhayel KingdomofSaudiArabia

MdRobiulAlamRobel DepartmentofCSE CumillaUniversity Cumilla

Bangladesh

HarshSadawarti SchoolofEngineering&Technology CTUniversity

Ludhiana

India

KamaljitSinghSaini Dept.ofComputerApplications ChandigarhUniversity Gharuan

MuzaferSaraˇcevi ´ c UniversityofNoviPazar 36300NoviPazar

DimitrijaTucovicabb

Serbia

DeepakKumarSharma DepartmentofInformation Technology NetajiSubhasUniversityof Technology

NewDelhi

India

PreetiSharma BansalCollegeofEngineering

DileepKumarSingh

JagranLakecityUniversity

HarjitSingh ResearchScholar GuruKashiUniversity

Punjab

India

JaitegSingh ChitkaraUniversityInstituteof EngineeringandTechnology

ChitkaraUniversity 140401Punjab

Rajpura

India

ListofContributors

SanjayKumarSingh SchoolofComputerScienceand Engineering LovelyProfessionalUniversity Phagwara

Punjab

SaravjeetSingh ChitkaraUniversityInstituteof EngineeringandTechnology ChitkaraUniversity 140401Punjab

Rajpura

India

JimmySingla SchoolofComputerScienceand Engineering LovelyProfessionalUniversity Phagwara

India

SoniaSingla UniversityofLeicester U.K.

Sofia ResearchScholar LovelyProfessionalUniversity

Punjab

India

NatashaTiwari UniversityofOxford

UK

UmerIqbalWani AssistantProfessor SchoolofComputerScienceand Engineering LovelyProfessionalUniversity Jalandhar

India

Preface

Thisbookfocusesonrecentadvances,rolesandbenefitsoffog,edge,andpervasivecomputingforintelligentandsmartInternetofThings(IoT)enabledapplications,aimedatnarrowingtheincreasinggap.Thisbookaimstodescribethe differenttechniquesofintelligentsystemsfromapracticalpointofview:solvingcommonlifeproblems.Butthisbookalsobringsavaluablepointofview toengineersandbusinessmen,tryingtosolvepractical,economical,ortechnical problemsinthefieldoftheircompanyactivitiesorexpertise.Thepurelypractical approachhelpstotransmittheideaandtheaimoftheauthoristocommunicate thewaytoapproachandtocopewithproblemsthatwouldbeintractableinany otherway.Thisbooksolicitscontributionswhichincludetheory,applications,and designmethodsofintelligentsystems,Ubiquitoustechniques,trendsoffog,edge, andcloudapplicationsasembeddedinthefieldsofengineering,computerscience, mathematics,andlifesciences,aswellasthemethodologiesbehindthem.

BookObjectives

Withtherapidgrowthandemergingdevelopmentinartificialtechnology,novel hybridandintelligentIoT,edge,fogdriven,andpervasivecomputingtechniques areanimportantpartofourdailylives.Thesetechnologiesareutilizedinvarious engineering,industrial,smartfarming,videosecuritysurveillance,VANETs andvisionaugmenteddrivenapplications.Theseapplicationsrequiredrealtime processingofassociateddataandworkontheprincipleofcomputationalresource orientedmetaheuristicandmachinelearningalgorithms.Duetophysicalsize limitations,smallcomputingIoTandmobiledevicesarehavingresourcelimited constraintswithlowcomputingpowerandareunabletomanagegoodqualityof serviceandrelatedparametersfordistinguishedapplications.Toovercomethe limitationsofsuchmobiledevicesedge/fogandpervasivecomputinghavebeen proposedasapromisingresearchareatocarryouthighendinfrastructureusage andprovidecomputation,storageandtaskexecutioneffectivelyforenddevice

users.Asedge/fogcomputingisimplementedatnetworkedges,itpromiseslow latencyaswellasagilecomputationaugmentingservicesfordeviceusers.To successfullysupportintelligentIoTapplications,therefore,thereisasignificant needfor(1)exploringtheefficientdeploymentofedge/fog/pervasivecomputing servicesatthenetworknodeslevel,(2)identifyingthenovelalgorithmrelated tofog/edge/pervasivecomputingforresourceallocationwithlowconstraint andpowerusage,and(3)designingcollaborativeanddistributedarchitectures specializedforedge/fog/pervasivecomputing.

TargetAudience

Thetargetaudienceofbookisprofessionalsandpractitionersinthefieldofintelligentsystem,edgecomputingandcloudenabledapplicationsandubiquitouscomputingscienceparadigmmaybenefitdirectlyfromothers’experiences.Graduate andmasterstudentsoffinalprojectsandparticularcoursesinintelligentsystem, edgeandfogbasedreal-lifeapplicationsormedicaldomaincantakeadvantage, makingthebookinterestingforengineeringandmedicaluniversityteachingpurposes.Theresearchcommunityofintelligentsystems,sensorapplicationsand intelligentsensor-basedapplications,consistingofmanyconferences,workshops, journalsandotherbooks,willtakethisasareferencebook.

Organization

Chapter1describestheInternetofThings,fog,edgeandpervasivecomputingare emergingtechnologies,havingseveralpromisingapplicationsincludinghealthcare.Thesetechnologiesarewitnessingaparadigmshiftinthehealthcaresector movingoutfromtraditionalwaysofvisitinghospitals.Itconnectsthedoctors, patients,andnursesthroughsmartintelligentsensordevicesatlowcostwithhigh bandwidthnetwork.Inthischapter,authorsdiscussednewcomputingparadigms preciselyandpresenttheirapplicationsinubiquitoushealthcare.Thischapteralso coversvariousproblemsandchallengesthathavebeenfacedbythepractitioners inthelastfewyearsinthefieldofcloudcomputingandIoTthathasbeensolved byfog,edgeandpervasivecomputing.

Chapter2discussesdifficultiesandfutureheadingstoinvestigatetherole offog,edgeandpervasivecomputing.Studieshaverevealedthatfog/edge computing(FEC)basedorganizationscanexpectanessentialactivityinexpandingthecloudbymeansoffinishinggo-betweenorganizationsattheedgeof theframework.Dimness/edgecomputing-basedIoT’s(FECIoT)appropriated configurationoverhaulsorganizationprovisioningalongthecloud-to-things

continuum,thusmakingitsensibleforkeyapplications.Edgeandfogregistering arefirmlyrelated–bothalludetothecapacitytoprocessinformationcloserto therequester/buyertolessenidlenesscostandincrementclientexperience.Both canchannelinformationbeforeit εhitsε amajorinformationlakeforfurther utilization,lesseningthemeasureofinformationthatshouldbehandled.

Chapter3addressesthetechniqueselectionissueencounteredduringthe requirementselicitationstage,throughaproposedmachinelearningmodelto transfertheexperts’knowledgeofelicitationtechniqueselectiontothelessexperienced.Basedonthesystemanalysts,stakeholdersautomatevarioustechniques toprovidethebestoptimizationtechniquenomination.

Chapter4coverstheadvantagesanddisadvantagesofusingmachinelearning inedge/fog/pervasivecomputing.Thevariousstudiescarriedoutbyresearchersis alsocovered.Everyfieldhasnumerousapplications,andinthischapterwediscuss afewpossibleapplicationsinthisfogerausingmachinelearningtechniques.By theendofthechapteryoushouldknowaboutMLframeworksandthevarious machinelearningalgorithmsusedforfog/edgecomputing.

Chapter5providesadescriptionofthesoftwarewhichhasthreemodules:student,librarianandadmin.Thesemoduleshaveuniquefeaturesforsearchingfor librarybookswiththetitle,author’sname,subject,ISBN/ISSN,etc.Withinthe chaptertheinterfacesofthesoftwareareshownasimageswhichisanabstraction thatmaybedevelopedonavailablemobileoperatingsystemlikeiOS,Android,etc. Theinterfacesaredesignedbearinginmindthatitwillbeusedoncrossplatform environmentsfulfillingminimumrequirementsusingtheIoTavailableinthemarket.Furthermore,overallinformationispreservedwiththehelpofcloudstoragewhilekeepingparalleloptionsforphysicalstorageonthedestinationmaster computer.Thecloud-basedsystemhasgivenlibrarymanagementanewdimensionwhilegivinganewfeaturereferredas εmanagementonthegoε asawebor abstractGUI.

Chapter6describesasystematicreviewthatwasconductedtodetermine workdonebyvariouspublishersonkidneycancerandtospottheresearchgaps betweenthestudiessofar.Theoutcomeofthisstudypermittedtheeffective diagnoseofkidneycancerorrenalcancercarriedoutusinganadaptiveneuro fuzzymethodwith94%accuracy.Although,manydataminingtechniqueswere appliedbyresearchers,theaccuracyofthesemethodswaslessthantheadaptive neurofuzzymethod.Thismethodisworthwhiletoidentifythediagnosisofrenal cancerbetterandmorerigorously.

Chapter7explainsaproposedapproachtouseedgecomputinginatransportationandroute-findingprocessinordertohandleperformanceissues. Hugedemandforcentralizedcloudcomputingposesseverechallengessuchas degradedspectralefficiency,highlatency,poorconnection,andsecurityissues.To handletheseissues,fogcomputingandedgecomputinghascomeintoexistence.

Oneapplicationofcloudcomputingislocationbasedservices(LBS).Intelligent transportsystemsbeingtheimportantapplicationofLBSrelyonGPS,sensors, andspatialdatabasesforconvenienttransportfacilities.Theselocation-based applicationsarehighlydependentonexternalsystemslikeGPSdevicesand mapAPI’s(cloudsupport)forthespatialdataandlocationinformation.These applicationsacquirespatialdatausingAPI’sfromdifferentproprietaryservice providers.ThedependencyontheAPI’sandGPSdevices,createchallengesfor effectivefleetmanagementandroutingprocessindeadzones.Deadzonesare areaswherenocellularcoverageexists.

Chapter8describesthesimulationanddesignofanoptimizedlow-costcomb drivebasedacousticMEMSsensor.Thesesensorswouldbeusefulforcondition monitoringofautomobilesonthebasisofchangesinsoundwavesemergingfrom malfunctioningordefectivepartsofautomobiles.Thesesensorscanbedeveloped fromsiliconsubstrates.SimulationisdoneusingCOMSOLMultiphysicssimulationsoftwarebasedonfiniteelementanalysis.Thisoptimizedsensorissensitive forthefrequencyrangeof30–300Hz.Thisfrequencyrangewasobtainedafterthe FFTanalysisofvarioussignalsreceivedfromenginesusingMATLABsoftware.

Chapter9offersanoutlineofdevelopingtheInternetofThings(IoT)technology intheareaofhealthcareasaflourishingresearchandexperimentaltrendatthe presenttime.Themainadvantagesandbenefitsareconsideredinthischapter. Inrecenttimes,severalstudiesinthehealthcareinformationsystemproposed thatthedisintegrationofhealthinformationisoneofthemostsignificantchallengesinthearrangementofpatientmedicalrecords.Asaresult,inthischapter, weprovideandetaileddesignandoverviewofIoThealthcaresystemsalongwith itsarchitecture.

Chapter10presentsthecombinationofVANETandfogcomputingofferinga rangeofoptionsforcloudcomputingapplicationsandfacilities.Fogcomputing dealswithhigh-virtualizedVANETsoftwareandcommunicationsystems,where dynamic-speedvehiclestravel.MobileAdhocNetoworksmayalsorequire low-latencyfogcomputinginVANETandlocalconnectionswithinshortdistances.ThemodernstateoftheworkandupcomingviewpointsofVANETfog computingareexploredinthischapter.Inaddition,thischapteroutlinesthe featuresoffogcomputingandfog-basedservicesforVANETs.Inadditionto this,fogandcloudcomputing-basedtechnologyapplicationsinVANETare discussed.Somepossibilitiesforchallengesandissuesassociatedconnectedwith fogcomputingarealsodiscussedinthischapter.

Chapter11outlinesanideatodesignanefficientdatacollectionmethodin theIoTnetwork.IoTtechnologydealswithsmartdevicestocollectdataaswell astoprovideusefulandaccuratedatatousers.Manydatacollectionmethods alreadyexist,buttheystillhavesomedrawbacksandneedmoreenhancements.

ThischapteroutlinesdetailedinformationaboutthedesignofanoveldatacollectionmethodusingfogcomputingintheIoTnetwork.Themainreasonforusing fogcomputingoverthecloudcomputingistoprovidesecuritytodatawhichis completelylackingincloudcomputing.Now-a-days,securityofdataisoneofthe mostimportantrequirements.

Chapter12providesanoverviewofusingafogcomputingplatformforanalyzingdatageneratedbyIoTdevices.Afogcomputingplatformwillbecompared withstate-of-the-arttodifferentiateitsimpactintermsofanalytics.Lotsofdatais beinggeneratedinIoTbaseddevicesusedinsmarthomes,trafficsensors,smart cities,andvariousconnectedappliances.Fogcomputingisoneareawhichisquite popularinprocessingthishugeamountofIoTdata.However,therearechallenges inthesemodelsforperformingrealtimeanalyticsinsuchdataforquickanalytics andinsights.Afoganalyticspipelineisonesuchareawhichcouldbeapossible solutiontoaddressthesechallenges.

Chapter13proposesamethodofdiagnosisbasedontherelationshipbetween patientsandsymptoms,andbetweensymptomsanddiagnosisusinglinguistic variablesbyintuitionisticfuzzysets.Itthendescribesthestateofsomepatients afterknowingtheresultsoftheirmedicaltestsbydegreeofmembershipand degreeofnon-membershipbasedontherelationshipbetweenpatientsand symptoms,andsymptomsanddiagnosis.Lateramax-min-max compositionandformulaisappliedtocalculatetheHammingdistancetoidentifythediseasewiththeleastHammingdistanceforvariouspatients.Arevised max-minaveragecompositionisappliedtoidentifythediseasewiththemaximum score.Finally,itshowshowurethralstrictureinvariouspatientsismathematically diagnosed.

Chapter14discussesthetypesofattacksinvolvedintheIoTnetworkwiththeir countermeasures,alsocoveringthedifferentlayers,protocols,andthesecurity challengesrelatedtotheIoT.ItisthecapabilityofthedevicethatmakestheIoT brilliantandthishasbeenachievedbyplacingtheintelligenceintothedevices. Theintelligenceinthesensorsisdevelopedbyaddingsensorsandactuatorswhich cancollectinformationandpassittothecloudthroughWi-Fi,Bluetooth,ZigBee, andsoon.ButtheseIoTnetworkarevulnerabletodifferenttypesofattack:physical,network,software,andencryption,andtheseattacksactuallystoptheIoT devicesperformingtheirnormaloperations.So,itrequiredthatwemustovercome theseattacks.

Chapter15discussesthedomainofIoTintegratedtelehealthortelemedical serviceswithvarioussegmentswherethereisaneedtoworkonadvancedtechnologiestoachieveahigherdegreeofaccuracyandperformance.Asshownbythe researchreportsandanalyticsfromAlliedMarketResearch,theglobalvalueand marketoftheIoTintelehealthandmedicalserviceswillexceed13billiondollars. FromtheextractsofStatista,theStatisticalResearchPortalthehugeusageofIoT

baseddeploymentsisquiteprominentandisincreasingveryfrequentlybecauseof theusagepatternsinvariousdomains.Inanotherresearchreport,theusagepatternsoftabletsinvariouslocationsfrom2014to2019showsthatthefiguresare growing.Becauseofthesedata,itisnecessarytoenforcethesecuritymechanisms fortheIoTandwirelessbasedenvironment.

Chapter16exploresoptimizationintheIoTwhichisusedtoimprovethe performanceofnetworkbyenhancingtheefficiencyofthenetwork,reducing theoverheadsandenergyconsumption,andincreasingtherateofdeployment ofvariousdevicesintheIoT.TheapplicationsofIoTaresmartcities,augmented maps,IoTinhealthcareetc.andvariousissuesinIoTsuchassecurity,addressing schemesetc.arediscussed.Variousoptimizationtechniquessuchasheuristic andbio-inspiredalgorithms,evolutionaryalgorithms,andtheirapplicabilityin IoTaredescribed.Furtherthefruitflyoptimizationalgorithm(FOA)andflow chartofFOAisexploredindetail.FinallytheapplicationsofFOAinIoTand nodedeploymentusingFOAareexplained.OnthebasisofobservationFOAcan beusedtoincreasethecoveragerateofsensornodes.

Chapter17chapterpresentsanoverallandin-depthstudyofdifferentoptimizationalgorithmsinspiredfromnature’sbehaviour.Todayoptimizationisapowerful toolfortheengineerinvirtuallyeverydiscipline.Itprovidesarigorous,systematicmethodforrapidlyzeroinginonthemostinnovative,cost-effectivesolutions tosomeoftoday’smostchallengingengineeringdesignproblems.TheIoTisthe conceptofconnectingeverydaydevicestotheinternetallowingthedevicesto sendandreceivedata.WiththeIoT,devicescanconstantlyreporttheirstatus toareceivingcomputerthatusesinformationtooptimizedecisionmaking.IoT networkoptimizationmanybenefitsforimprovingtrafficmanagement,operatingefficiency,energyconservation,reductioninlatency,higherthroughput,and fasterratesinscalingupordeployingIoTservicesanddevicesinthenetwork.

Chapter18outlinestheoptimizationtechniquesforintelligentIoTapplications intransportprocesses.Thetravellingsalesmanproblem(TSP)hasanimportant roleinoperationalresearchandinthiscase,itwasimplementedinthedesign oftheIoTapplication.Thechapterdescribessomespecificmethodsofsolving, analysingandimplementingapossiblesolutionwithanemphasisonatechnique basedongeneticalgorithms.InthischapterweconnecttheTSPoptimization problemintransportandtrafficwithIoT-enabledapplicationsforasmartcity.In theexperimentalpartofthechapterwepresentspecificdevelopmentandimplementationoftheapplicationforTSPwithtestingandexperimentalresults.

Chapter19describestheimpactoftheInternetofeverythingsolutionswhichare connectingeveryobject.Thishasgeneratedalargeamountofdata.Thisamount ofdatacannotbeprocessedbyacentralizedcloudenvironment.Thereareapplicationswheredataneedsrealtimeresponseandlowlatency.Thedatabeingsentto thecloudforprocessingandthencomingbacktotheapplicationgeneratingdata

canseriouslyimpacttheperformance.Thisdelaycancausedelayindecisionmakingandthisisnotacceptableinrealtimeapplications.Tohandlesuchscenarios, fogcomputinghasemergedasasolution.Fogcomputingextendsthecloudnear totheedgeofthenetworktodecreaselatencyaswellasbandwidthrequirements. Itactsasanintermediatelayerbetweenthecloudanddevicesgeneratingdata.

Chapter20isconcernedwithsecurityandprivacyhandlingissuesoccurredin pervasiveandedgeboundarysystemforrecognizingvoice,soundusingintelligent IoTminingtechniques.Fogcomputingisapromisingregisteringworldviewthat extendsdistributedcomputingtotheedgeofsystems.Likedistributedcomputing yetwithuniquequalities,fogcomputingfacesnewsecuritychallengesotherthan thoseacquiredfromdistributedcomputing.Thischapterstudiesexistingwriting onfogfiguringapplicationstorecognizebasicsecurityholes.Comparableinnovationslikeedgefiguring,cloudlets,andmicro-serverfarmshaveadditionallybeen incorporatedtogiveanall-encompassingsurveyprocess.

Chapter21focusesonfogcomputingandthesecondsectiondealswithedge computing.Inthistheauthorfirstintroducesthebasicsoffogandedgecomputing, itsarchitecture,working,advantagesandusecases,andthenprimarilyfocuses ontheirsecurityandprivacyissuesseparately.Intheendsolutionsandresearch opportunitiesinbothfieldsarediscussed.

ClosingRemarks

Inconclusion,wewouldliketosumupherewithfewlines.Thisbookisasmall steptowardstheenhancementofacademicresearchthroughmotivatingthe researchcommunityandresearchorganizationstothinkabouttheimpactoffog, edgeandIoTcomputingframeworks,networkingprinciplesanditsapplications foraugmentingtheacademicresearch.Thisbookisgivinginsightonthevarious aspectsofacademiccomputingresearchandtheneedforknowledgesharing andpredictionofrelationshipsthroughseverallinksandtheirusages.This includesresearchstudies,experiments,andliteraturereviewsaboutpervasive, fogcomputationalactivitiesandtodisseminatecutting-edgeresearchresults, highlightresearchchallengesandopenissues,andpromotefurtherresearch interestandactivitiesinidentifyingmissinglinksincloudcomputing.Wehope thatresearchscholars,educationalistsandstudentsalikewillfindsignificancein thisbookandcontinuetouseittoexpandtheirperspectivesinthefieldofedge, fogandpervasivecomputinganditsfuturechallenges.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.