2021
DOI: 10.7717/peerj-cs.431
|View full text |Cite
|
Sign up to set email alerts
|

FoBSim: an extensible open-source simulation tool for integrated fog-blockchain systems

Abstract: A lot of hard work and years of research are still needed for developing successful Blockchain (BC) applications. Although it is not yet standardized, BC technology was proven as to be an enhancement factor for security, decentralization, and reliability, leading to be successfully implemented in cryptocurrency industries. Fog computing (FC) is one of the recently emerged paradigms that needs to be improved to serve Internet of Things (IoT) environments of the future. As hundreds of projects, ideas, and system… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 63 publications
0
6
0
Order By: Relevance
“…We used FobSim [74] to analyze the behavior of our fog-based identity management solution with DLT deployment at the fog layer and at the edge/user device layer. The simulation was run in an Intel (R) Core (™) i5-6200U CPU @ 2.30 GHz 2.40 GHz with 16.0 GB internal memory (RAM) and Windows 10 Professional operating system.…”
Section: Fobsim Simulation Resultsmentioning
confidence: 99%
“…We used FobSim [74] to analyze the behavior of our fog-based identity management solution with DLT deployment at the fog layer and at the edge/user device layer. The simulation was run in an Intel (R) Core (™) i5-6200U CPU @ 2.30 GHz 2.40 GHz with 16.0 GB internal memory (RAM) and Windows 10 Professional operating system.…”
Section: Fobsim Simulation Resultsmentioning
confidence: 99%
“…An earlier work developed a BC simulation tool, FoBSim. 15 It can be used to investigate the behavior of a BC system by employing different parameters and consensus algorithms; hence, it will be employed for this evaluation.…”
Section: Validationmentioning
confidence: 99%
“…FoBSim facilitates investigating BC systems through three default consensus algorithms: proof of authority (PoA), proof of stake (PoS), and proof of work (PoW) (see Baniata and Kertesz 15 for definitions and implementation details). In a nationwide scenario, every BC miner in the fog can serve one or more end user nodes that handle requests from certain bodies (concerning vaccination certificate issuing, updates, health changes, and information requests).…”
Section: Validationmentioning
confidence: 99%
See 1 more Smart Citation
“…A full discussion of FoBSim constraints and their mitigation methods, including Merkle Trees, mining pools, and digital signatures, is available in [185].…”
Section: Strategies In Fobsimmentioning
confidence: 99%