2023
DOI: 10.1109/access.2023.3325056
|View full text |Cite
|
Sign up to set email alerts
|

A Decentralized Resource Allocation in Edge Computing for Secure IoT Environments

A. Sasikumar,
Logesh Ravi,
Malathi Devarajan
et al.

Abstract: The expansion of Internet of Things (IoT) devices and their integration into a variety of vital sectors has created serious concerns regarding data protection, privacy, and resource management. As a promising model, edge computing has the ability to overcome these difficulties by putting the computing power closer to IoT devices. This article presents a novel approach for decentralized resource allocation in edge computing settings, with the goal of improving the security and efficiency of IoT systems. Edge no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…The delay required for serving cloud requests without attacks is a critical performance metric in the evaluation of security models for big data environments. In the provided data, we have compared four different models: STFM [5], DLBI [12], PPQCM [18], and the proposed model MAQSPBT. The delay values (D) are measured in milliseconds (ms) for different request loads, ranging from 45,000 to 450,000 requests.…”
Section: Results Analysis and Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…The delay required for serving cloud requests without attacks is a critical performance metric in the evaluation of security models for big data environments. In the provided data, we have compared four different models: STFM [5], DLBI [12], PPQCM [18], and the proposed model MAQSPBT. The delay values (D) are measured in milliseconds (ms) for different request loads, ranging from 45,000 to 450,000 requests.…”
Section: Results Analysis and Comparisonmentioning
confidence: 99%
“…Jitter obtained for serving requests under attacks is a critical metric for assessing the stability and predictability of performance in security models when faced with adversarial conditions. In this analysis, we compare four different models: STFM [5], DLBI [12], PPQCM [18], and the proposed model MAQSPBT. Jitter values (J) are measured in milliseconds (ms) for various request loads, ranging from 45,000 to 450,000 requests, with approximately 10% of these requests simulated as attack requests.…”
Section: Analysis Of the Model Under Attacksmentioning
confidence: 99%
See 1 more Smart Citation