2019 IEEE International Conference on Pervasive Computing and Communications (PerCom 2019
DOI: 10.1109/percom.2019.8767413
|View full text |Cite
|
Sign up to set email alerts
|

Extreme SDN Framework for IoT and Mobile Applications Flexible Privacy at the Edge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 27 publications
0
12
0
1
Order By: Relevance
“…As mentioned earlier, there are very few works that present a combined architecture including SDIoT [ 78 , 79 , 80 , 81 , 82 ] and SDIoT-Edge frameworks [ 83 , 84 ] suggested for effective management, increased scalability and interoperability. However, we note that (to the best of our knowledge) there are no works that study the heterogeneous service architecture that combines SDIoT-Edge with blockchain.…”
Section: Future Research Directionsmentioning
confidence: 99%
See 1 more Smart Citation
“…As mentioned earlier, there are very few works that present a combined architecture including SDIoT [ 78 , 79 , 80 , 81 , 82 ] and SDIoT-Edge frameworks [ 83 , 84 ] suggested for effective management, increased scalability and interoperability. However, we note that (to the best of our knowledge) there are no works that study the heterogeneous service architecture that combines SDIoT-Edge with blockchain.…”
Section: Future Research Directionsmentioning
confidence: 99%
“…The increased number of connected devices poses several challenges e.g., to effectively handle the enormous amounts of data [ 62 , 63 ], interoperability among various hardware and software platforms [ 64 , 65 ], challenges related to Big data management, privacy and provenance [ 66 ], mobility management and handover [ 67 , 68 , 69 ], and privacy and security challenges [ 70 , 71 ]. We note that there are various efforts from the research community in order to improve the performance and scalability of the IoT netwroks e.g., the use of edge computing to perform resource-intensive tasks [ 72 , 73 , 74 ], the use of SDN for flexible management and programmability [ 75 , 76 ] including flexible network programmability [ 77 , 78 ] that introduced a new combination of Software-Defined Internet of Things (SDIoT) architecture for an effective management [ 78 , 79 , 80 , 81 , 82 ]; similarly, the Software-Defined Internet of Things and Edge (SDIoT-Edge) frameworks [ 83 , 84 ] were suggested for increased scalability and interoperability [ 82 ].…”
Section: Introductionmentioning
confidence: 99%
“…The traffic traces of different activities on a device can have different signatures. For example, based on our prior work, [17], Figure 1.a shows the different signatures for network traffic of different IoT devices. While different IoT devices have unique traffic signatures, the traffic signatures of similar devices are similar despite their different activities, as shown in Figure 1.b.…”
Section: A the Significance Of Iot Classificationmentioning
confidence: 99%
“…PrivacyGuard [66] is a system designed and developed to obfuscate the activities of sensitive IoT and mobile applications from attacks over WiFi network. They have implemented a prototype this systems on Android mobile devices that to apply application level traffic shaping and IP-sec tunneling schemes.…”
Section: B Egde Computing Based Abr Systemsmentioning
confidence: 99%
“…Here they provide evidence of PHY layer metrics are used in assigning resources to the users in the cellular network. ABR Adaptive Bitrate Streaming (ABR) ABR based on ML [58,59] Based on DL [10,11,18,40,47] Based on RL [104] Egde computing based ABR systems [60,62,65] Using SDN [63,66] ABR with different optimization goals Improve QoE for vehicles [45,86,87,93] Optimize for user data-plan [67] Chunk Based Filtering [56] Optimizing video during handovers [45,93,96] Video stream in vehicular networks [85][86][87]105] 4K and 360 • video streaming 4K video streaming [51] 360 • video streaming [78,79,[82][83][84] Cross-layer optimizations for Video streaming [55,97,106,107] Fig. 6.…”
Section: Abr Algorithms With Cross-layer Optimizationsmentioning
confidence: 99%