{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:22:37Z","timestamp":1742916157706,"version":"3.40.3"},"publisher-location":"Cham","reference-count":85,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031276217"},{"type":"electronic","value":"9783031276224"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-27622-4_5","type":"book-chapter","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:15:28Z","timestamp":1679879728000},"page":"44-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Systematic Review on Fog Computing Security Algorithms on Current IoT Applications and Solutions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9140-2704","authenticated-orcid":false,"given":"V.","family":"Balaji","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5289-4355","authenticated-orcid":false,"given":"P.","family":"Selvaraj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,19]]},"reference":[{"key":"5_CR1","unstructured":"Cisco: Fog Computing and the Internet of Things: Extend the Cloud to Where the Things are Online (2015). https:\/\/www.cisco.com\/c\/dam\/en_us\/solutions\/trends\/iot\/docs\/computing-solutions.pdf"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Tang, B., Chen, Z., Hefferman, G., Wei, T., He, H., Yang, Q.: A hierarchical distributed fog computing architecture for big data analysis in smart cities. In: Proceedings of the ASE Big Data and Social Informatics, vol. 28. ACM (2015)","DOI":"10.1145\/2818869.2818898"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S Marston","year":"2011","unstructured":"Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing-the business perspective. Decis. Support Syst. 51(1), 176\u2013189 (2011)","journal-title":"Decis. Support Syst."},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"2898","DOI":"10.1109\/TITS.2017.2665968","volume":"18","author":"S Parkinson","year":"2017","unstructured":"Parkinson, S., Ward, P., Wilson, K., Miller, J.: Cyber threats facing autonomous and connected vehicles: future challenges. IEEE Trans. Intell. Transp. Syst. 18, 2898\u20132915 (2017)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 1\u20138. IEEE (2014)","DOI":"10.15439\/2014F503"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Kim, J.Y., Schulzrinne, H.: Cloud support for latency-sensitive telephony applications. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), vol. 1, pp. 421\u2013426. IEEE (2013)","DOI":"10.1109\/CloudCom.2013.61"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13\u201316. ACM (2012)","DOI":"10.1145\/2342509.2342513"},{"key":"5_CR8","first-page":"55","volume":"4","author":"P Sareen","year":"2016","unstructured":"Sareen, P., Kumar, P.: The fog computing paradigm. Int. J. Emerg. Technol. Eng. Res. 4, 55\u201360 (2016)","journal-title":"Int. J. Emerg. Technol. Eng. Res."},{"issue":"5","key":"5_CR9","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2677046.2677052","volume":"44","author":"LM Vaquero","year":"2014","unstructured":"Vaquero, L.M., Rodero-Merino, L.: Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput. Commun. Rev. 44(5), 27\u201332 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"3","key":"5_CR10","first-page":"10","volume":"122","author":"K Saharan","year":"2015","unstructured":"Saharan, K., Kumar, A.: Fog in comparison to cloud: a survey. Int. J. Comput. Appl. 122(3), 10\u201312 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Dastjerdi, A.V., Gupta, H., Calheiros, R.N., Ghosh, S.K., Buyya, R.: Fog computing: principals, architectures, and applications. arXiv preprint arXiv:1601.02752 (2016)","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Mahmud, R., Buyya, R.: Fog computing: a taxonomy, survey and future directions. arXiv preprint arXiv:1611.05539 (2016)","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"5_CR13","unstructured":"Cisco: Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things. (2015). https:\/\/www.cisco.com\/c\/dam\/en_us\/solutions\/trends\/iot\/docs\/computing-solutions.pdf"},{"key":"5_CR14","unstructured":"Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. Wiley (2013)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M.: A brief history of cloud offload: a personal journey from odyssey through cyber foraging to cloudlets. GetMobile: Mob. Comput. Commun. 18(4), 19\u201323 (2015)","DOI":"10.1145\/2721914.2721921"},{"issue":"3","key":"5_CR16","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583\u2013592 (2012)","journal-title":"Future Gener. Comput. Syst."},{"key":"5_CR17","unstructured":"Alliance, C.S.: The Treacherous 12 Cloud Computing Top Threats in 2016 (2016). https:\/\/downloads.cloudsecurityalliance.org\/assets\/research\/topthreats\/Treacherous-12_Cloud-Computing_Top-Threats.pdf"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1002\/cpe.3485","volume":"28","author":"I Stojmenovic","year":"2015","unstructured":"Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurr. Comput. Pract. Exp. 28, 2991\u20133005 (2015)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/978-3-319-21837-3_67","volume-title":"Wireless Algorithms, Systems, and Applications","author":"S Yi","year":"2015","unstructured":"Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. In: Kuai, X., Zhu, H. (eds.) WASA 2015. LNCS, vol. 9204, pp. 685\u2013695. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21837-3_67"},{"key":"5_CR20","unstructured":"Klas, G.I.: Fog computing and mobile edge cloud gain momentum open fog consortium, etsi mec and cloudlets (2015)"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Ahmed, A., Ahmed, E.: A survey on mobile edge computing. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1\u20138. IEEE (2016)","DOI":"10.1109\/ISCO.2016.7727082"},{"key":"5_CR22","unstructured":"Series Q, Safety MQ.: Programmable automation controller"},{"key":"5_CR23","unstructured":"Pierson, R.M.: How Does Fog Computing Differ from Edge Computing? (2016). https:\/\/readwrite.com\/2016\/08\/05\/fog-computing-different-edge-computing-pl1\/"},{"key":"5_CR24","unstructured":"Ha, K., Satyanarayanan, M.: Openstack++ for Cloudlet Deployment. School of Computer Science, Carnegie Mellon University, Pittsburgh (2015)"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, W.: The unheralded power of cloudlet computing in the vicinity of mobile devices. In: 2013 IEEE Globecom Workshops (GC Wkshps), pp. 4994\u20134999. IEEE (2013)","DOI":"10.1109\/GLOCOMW.2013.6855742"},{"key":"5_CR26","unstructured":"Jaiswal, A., Thakare, V., Sherekar, S.: Performance based analysis of cloudlet architectures in mobile cloud computing"},{"key":"5_CR27","unstructured":"Bahl, V.: Emergence of Micro Datacenter (cloudlets\/edges) for Mobile Computing (2015). https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/11\/Micro-Data-Centers-mDCs-for-Mobile-Computing-1.pdf"},{"issue":"1","key":"5_CR28","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MNET.2017.1600027NM","volume":"31","author":"K Liang","year":"2017","unstructured":"Liang, K., Zhao, L., Chu, X., Chen, H.-H.: An integrated architecture for software defined and virtualized radio access networks with fog computing. IEEE Netw. 31(1), 80\u201387 (2017)","journal-title":"IEEE Netw."},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Clinch, S., Harkes, J., Friday, A., Davies, N., Satyanarayanan, M.: How close is close enough? Understanding the role of cloudlets in supporting display appropriation by mobile users. In: 2012 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 122\u2013127. IEEE (2012)","DOI":"10.1109\/PerCom.2012.6199858"},{"key":"5_CR30","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-22577-2_11","volume-title":"High Performance Architecture and Grid Computing","author":"S Sindhu","year":"2011","unstructured":"Sindhu, S., Mukherjee, S.: Efficient task scheduling algorithms for cloud computing environment. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds.) HPAGC 2011. CCIS, vol. 169, pp. 79\u201383. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22577-2_11"},{"issue":"4","key":"5_CR31","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MPRV.2009.82","volume":"8","author":"M Satyanarayanan","year":"2009","unstructured":"Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14\u201323 (2009)","journal-title":"IEEE Pervasive Comput."},{"key":"5_CR32","unstructured":"University CM: Elijah: Cloudlet Infrastructure for Mobile Computing. GitHub (2017)"},{"key":"5_CR33","unstructured":"Almorsy, M., Grundy, J., M\u00fcller, I.: An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107 (2016)"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Younis, Y.A., Kifayat, K., Shi, Q., Askwith, B.: A new prime and probe cache side-channel attack for cloud computing. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), pp. 1718\u20131724. IEEE (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.259"},{"key":"5_CR35","doi-asserted-by":"publisher","first-page":"602","DOI":"10.6029\/smartcr.2015.06.010","volume":"5","author":"MA Shahid","year":"2015","unstructured":"Shahid, M.A., Sharif, M.: Cloud computing security models, architectures, issues and challenges: a survey. Smart Comput. Rev. 5, 602\u2013616 (2015)","journal-title":"Smart Comput. Rev."},{"key":"5_CR36","unstructured":"Zhu, J., Chan, D.S., Prabhu, M.S., Natarajan, P., Hu, H., Bonomi, F.: Improving web sites performance using edge servers in fog computing architecture. In: 2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE), pp. 320\u2013323. IEEE (2013)"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Krishnan, Y.N., Bhagwat, C.N., Utpat, A.P.: Fog computing-network based cloud computing. In: 2015 2nd International Conference on Electronics and Communication Systems (ICECS), pp. 250\u2013251. IEEE (2015)","DOI":"10.1109\/ECS.2015.7124902"},{"key":"5_CR38","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-319-13153-5_32","volume-title":"Computational Intelligence in Information Systems","author":"I Abdullahi","year":"2015","unstructured":"Abdullahi, I., Arif, S., Hassan, S.: Ubiquitous shift with information centric network caching using fog computing. In: Phon-Amnuaisuk, S., Au, T.W. (eds.) Computational Intelligence in Information Systems. AISC, vol. 331, pp. 327\u2013335. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-13153-5_32"},{"issue":"8","key":"5_CR39","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/CC.2015.7224698","volume":"12","author":"J Su","year":"2015","unstructured":"Su, J., Lin, F., Zhou, X., Lu, X.: Steiner tree based optimal resource caching scheme in fog computing. China Commun. 12(8), 161\u2013168 (2015)","journal-title":"China Commun."},{"issue":"1","key":"5_CR40","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MIC.2007.3","volume":"11","author":"S Sivasubramanian","year":"2007","unstructured":"Sivasubramanian, S., Pierre, G., Van Steen, M., Alonso, G.: Analysis of caching and replication strategies for web applications. IEEE Internet Comput. 11(1), 60\u201366 (2007)","journal-title":"IEEE Internet Comput."},{"key":"5_CR41","unstructured":"Halfond, W.G., Viegas, J., Orso, A.: A classification of SQL-injection attacks and countermeasures. In: Proceedings of the IEEE International Symposium on Secure Software Engineering, vol. 1, pp. 13\u201315. IEEE (2006)"},{"key":"5_CR42","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-05437-2_5","volume-title":"iNetSec 2009 \u2013 Open Research Problems in Network Security","author":"M Egele","year":"2009","unstructured":"Egele, M., Kirda, E., Kruegel, C.: Mitigating drive-by download attacks: challenges and open problems. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2009. IAICT, vol. 309, pp. 52\u201362. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-05437-2_5"},{"key":"5_CR43","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/978-3-319-34208-5_21","volume-title":"5G Mobile Communications","author":"L Gao","year":"2017","unstructured":"Gao, L., Luan, T.H., Liu, B., Zhou, W., Yu, S.: Fog computing and its applications in 5G. In: Xiang, W., Zheng, K., Shen, X. (eds.) 5G Mobile Communications, pp. 571\u2013593. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-34208-5_21"},{"key":"5_CR44","unstructured":"Luan, T.H., Gao, L., Li, Z., Xiang, Y., Sun, L.: Fog computing: focusing on mobile users at the edge. arXiv preprint arXiv:1502.01815 (2015)"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Oueis, J., Strinati, E.C., Barbarossa, S.: The fog balancing: load distribution for small cell cloud computing. In: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/VTCSpring.2015.7146129"},{"key":"5_CR46","first-page":"1","volume":"11","author":"YC Hu","year":"2015","unstructured":"Hu, Y.C., Patel, M., Sabella, D., Sprecher, N., Young, V.: Mobile edge computing-a key technology towards 5G. ETSI White Pap. 11, 1\u201316 (2015)","journal-title":"ETSI White Pap."},{"key":"5_CR47","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/978-1-4419-5906-5_324","volume-title":"Encyclopedia of Cryptography and Security","author":"Y Desmedt","year":"2011","unstructured":"Desmedt, Y.: Man-in-the-middle attack. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 759\u2013759. Springer, Boston (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_324"},{"key":"5_CR48","doi-asserted-by":"crossref","unstructured":"Nayak, G.N., Samaddar, S.G.: Different flavours of man-in-the-middle attack, consequences and feasible solutions. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), vol. 5, pp. 491\u2013495. IEEE (2010)","DOI":"10.1109\/ICCSIT.2010.5563900"},{"issue":"4","key":"5_CR49","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1108\/JICES-05-2016-0014","volume":"14","author":"L Prieto Gonz\u00e1lez","year":"2016","unstructured":"Prieto Gonz\u00e1lez, L., et al.: Fog computing architectures for healthcare: wireless performance and semantic opportunities. J. Inf. Commun. Ethics Soc. 14(4), 334\u2013349 (2016)","journal-title":"J. Inf. Commun. Ethics Soc."},{"issue":"2","key":"5_CR50","first-page":"121","volume":"185","author":"V Stantchev","year":"2015","unstructured":"Stantchev, V., Barnawi, A., Ghulam, S., Schubert, J., Tamm, G.: Smart items, fog and cloud computing as enablers of servitization in healthcare. Sens. Transducers 185(2), 121 (2015)","journal-title":"Sens. Transducers"},{"key":"5_CR51","doi-asserted-by":"crossref","unstructured":"Shi, Y., Ding, G., Wang, H., Roman, H.E., Lu, S.: The fog computing service for healthcare. In: 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/Ubi-HealthTech.2015.7203325"},{"key":"5_CR52","doi-asserted-by":"crossref","unstructured":"Gia, T.N., Jiang, M., Rahmani, A.M., Westerlund, T., Liljeberg, P., Tenhunen, H.: Fog computing in healthcare internet of things: a case study on ECG feature extraction. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), pp. 356\u2013363. IEEE (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.51"},{"key":"5_CR53","doi-asserted-by":"crossref","unstructured":"Cao, Y., Hou, P., Brown, D., Wang, J., Chen, S.: Distributed analytics and edge intelligence: pervasive health monitoring at the era of fog computing. In: Proceedings of the 2015 Workshop on Mobile Big Data, pp. 43\u201348. ACM (2015)","DOI":"10.1145\/2757384.2757398"},{"key":"5_CR54","unstructured":"Cao, Y., Chen, S., Hou, P., Brown, D.: Fast: a fog computing assisted distributed analytics system to monitor fall for stroke mitigation. In: 2015 IEEE International Conference on Networking, Architecture and Storage (NAS), pp. 2\u201311. IEEE (2015)"},{"key":"5_CR55","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-16161-2_6","volume-title":"Security and Privacy in Communication Networks","author":"M Li","year":"2010","unstructured":"Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICSSITE, vol. 50, pp. 89\u2013106. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16161-2_6"},{"issue":"5","key":"5_CR56","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/TMC.2007.70753","volume":"7","author":"K Ren","year":"2008","unstructured":"Ren, K., Lou, W., Zhang, Y.: Leds: providing location-aware end-to-end data security in wireless sensor networks. IEEE Trans. Mob. Comput. 7(5), 585\u2013598 (2008)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"5_CR57","doi-asserted-by":"crossref","unstructured":"Chen, N., Chen, Y., You, Y., Ling, H., Liang, P., Zimmermann, R.: Dynamic urban surveillance video stream processing using fog computing. In: 2016 IEEE Second International Conference on Multimedia Big Data (BigMM), pp. 105\u2013112. IEEE (2016)","DOI":"10.1109\/BigMM.2016.53"},{"issue":"5","key":"5_CR58","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MC.2016.145","volume":"49","author":"W Shi","year":"2016","unstructured":"Shi, W., Dustdar, S.: The promise of edge computing. Computer 49(5), 78\u201381 (2016)","journal-title":"Computer"},{"key":"5_CR59","doi-asserted-by":"crossref","unstructured":"Do, C.T., Tran, N.H., Pham, C., Alam, M.G.R., Son, J.H., Hong, C.S.: A proximal algorithm for joint resource allocation and minimizing carbon footprint in geo-distributed fog computing. In: 2015 International Conference on Information Networking (ICOIN), pp. 324\u2013329. IEEE (2015)","DOI":"10.1109\/ICOIN.2015.7057905"},{"issue":"3","key":"5_CR60","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s11235-013-9849-0","volume":"56","author":"LM Varalakshmi","year":"2013","unstructured":"Varalakshmi, L.M., Sudha, G.F., Jaikishan, G.: A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks. Telecommun. Syst. 56(3), 357\u2013365 (2013). https:\/\/doi.org\/10.1007\/s11235-013-9849-0","journal-title":"Telecommun. Syst."},{"key":"5_CR61","doi-asserted-by":"crossref","unstructured":"Truong, N.B., Lee, G.M., Ghamri-Doudane, Y.: Software defined networking-based vehicular adhoc network with fog computing. In: 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 1202\u20131207. IEEE (2015)","DOI":"10.1109\/INM.2015.7140467"},{"key":"5_CR62","doi-asserted-by":"crossref","unstructured":"Datta, S.K., Bonnet, C., Haerri, J.: Fog computing architecture to enable consumer centric internet of things services. In: 2015 International Symposium on Consumer Electronics (ISCE), pp. 1\u20132. IEEE (2015)","DOI":"10.1109\/ISCE.2015.7177778"},{"key":"5_CR63","doi-asserted-by":"publisher","first-page":"23","DOI":"10.14257\/ijast.2015.82.03","volume":"82","author":"S Roy","year":"2015","unstructured":"Roy, S., Bose, R., Sarddar, D.: A fog-based DSS model for driving rule violation monitoring framework on the internet of things. Int. J. Adv. Sci. Technol. 82, 23\u201332 (2015)","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"5_CR64","doi-asserted-by":"crossref","unstructured":"Joshi, B., Singh, N.K.: Mitigating dynamic dos attacks in mobile ad hoc network. In: Symposium on IEEE Colossal Data Analysis and Networking (CDAN), pp. 1\u20137 (2016)","DOI":"10.1109\/CDAN.2016.7570941"},{"issue":"S3","key":"5_CR65","first-page":"59","volume":"17","author":"LC Defta","year":"2016","unstructured":"Defta, L.C., Iacob, N.M.: Aodv-authentication mechanism in manet. Calitatea 17(S3), 59 (2016)","journal-title":"Calitatea"},{"key":"5_CR66","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.foodcont.2016.06.042","volume":"71","author":"RY Chen","year":"2017","unstructured":"Chen, R.Y.: An intelligent value stream-based approach to collaboration of food traceability cyber physical system by fog computing. Food Control 71, 124\u2013136 (2017)","journal-title":"Food Control"},{"issue":"2","key":"5_CR67","first-page":"144","volume":"71","author":"A Saqib","year":"2015","unstructured":"Saqib, A., et al.: Cyber security for cyber physcial systems: a trust-based approach. J. Theor. Appl. Inf. Technol. 71(2), 144\u2013152 (2015)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"5_CR68","doi-asserted-by":"crossref","unstructured":"Monteiro, A., Dubey, H., Mahler, L., Yang, Q., Mankodiya, K.: Fit a fog computing device for speech teletreatments. arXiv preprint arXiv:1605.06236 (2016)","DOI":"10.1109\/SMARTCOMP.2016.7501692"},{"key":"5_CR69","doi-asserted-by":"crossref","unstructured":"Orsini, G., Bade, D., Lamersdorf, W.: Computing at the mobile edge: Designing elastic Android applications for computation offloading. In: 2015 8th IFIP Wireless and Mobile Networking Conference (WMNC), pp. 112\u2013119. IEEE (2015)","DOI":"10.1109\/WMNC.2015.10"},{"key":"5_CR70","doi-asserted-by":"crossref","unstructured":"Heuser, S., Negro, M., Pendyala, P.K., Sadeghi, A.R.: Droidauditor: forensic analysis of application-layer privilege escalation attacks on Android. Technical report, TU Darmstadt (2016)","DOI":"10.1007\/978-3-662-54970-4_15"},{"key":"5_CR71","doi-asserted-by":"crossref","unstructured":"Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: Malicious Android applications in the enterprise: what do they do and how do we fix it? In: 2012 IEEE 28th International Conference on Data Engineering Workshops (ICDEW), pp. 251\u2013254. IEEE (2012)","DOI":"10.1109\/ICDEW.2012.81"},{"key":"5_CR72","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.procs.2016.03.028","volume":"79","author":"P Singh","year":"2016","unstructured":"Singh, P., Tiwari, P., Singh, S.: Analysis of malicious behavior of Android apps. Procedia Comput. Sci. 79, 215\u2013220 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"5_CR73","doi-asserted-by":"crossref","unstructured":"Selvaraj, P., Nagarajan, V.: Migration from conventional networking to software defined networking. In: IEEE-International Conference on IoT and its Applications (ICIOT-2017). E.G.S Pillay Engineering College, Nagapattinam (2017). ISBN 978-93-84893-49-4","DOI":"10.1109\/ICIOTA.2017.8073632"},{"key":"5_CR74","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1007\/s11277-021-08573-2","volume":"127","author":"B Wan","year":"2021","unstructured":"Wan, B., Xu, C., Mahapatra, R.P., Selvaraj, P.: Understanding the cyber-physical system in international stadiums for security in the network from cyber-attacks and adversaries using AI. Wirel. Pers. Commun. 127, 1207\u20131224 (2021). https:\/\/doi.org\/10.1007\/s11277-021-08573-2","journal-title":"Wirel. Pers. Commun."},{"key":"5_CR75","doi-asserted-by":"crossref","unstructured":"Selvaraj, P., Narayanan, L.K.: IoT enhanced smart mirror for personal and commercial applications. Int. J. Adv. Trends Comput. Sci. Eng. (IJATCSE) 9(4) (2020)","DOI":"10.30534\/ijatcse\/2020\/311942020"},{"key":"5_CR76","doi-asserted-by":"publisher","first-page":"2122","DOI":"10.3390\/s19092122","volume":"19","author":"G Li","year":"2019","unstructured":"Li, G., Liu, Y., Wu, J., Lin, D., Zhao, S.: Methods of resource scheduling based on optimized fuzzy clustering in fog computing. Sensors (Basel) 19, 2122 (2019)","journal-title":"Sensors (Basel)"},{"key":"5_CR77","doi-asserted-by":"publisher","first-page":"3469","DOI":"10.1007\/s12652-018-1071-1","volume":"10","author":"HR Boveiri","year":"2019","unstructured":"Boveiri, H.R., Khayami, R., Elhoseny, M., Gunasekaran, M.: An efficient swarm-intelligence approach for task scheduling in cloud based internet of things applications. J. Ambient Intell. Hum. Comput. 10, 3469\u20133479 (2019)","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"5_CR78","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1080\/17517575.2017.1304579","volume":"12","author":"S Bitam","year":"2018","unstructured":"Bitam, S., Zeadally, S., Mellouk, A.: Fog computing job scheduling optimization based on bees swarm. Enterpr. Inform. Syst. 12, 373\u2013397 (2018)","journal-title":"Enterpr. Inform. Syst."},{"key":"5_CR79","doi-asserted-by":"crossref","unstructured":"Hoang, D., Dang, T.D.: FBRC: optimization of task scheduling in fog-based region and cloud. In: Proceedings of the 2017 IEEE Trustcom\/BigDataSE\/ICESS, Sydney, NSW, Australia, pp. 1109\u20131114. IEEE (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.360"},{"issue":"17","key":"5_CR80","doi-asserted-by":"publisher","first-page":"24639","DOI":"10.1007\/s11042-018-7051-9","volume":"78","author":"GL Stavrinides","year":"2018","unstructured":"Stavrinides, G.L., Karatza, H.D.: A hybrid approach to scheduling real-time IoT workflows in fog and cloud environments. Multimed. Tools Appl. 78(17), 24639\u201324655 (2018). https:\/\/doi.org\/10.1007\/s11042-018-7051-9","journal-title":"Multimed. Tools Appl."},{"key":"5_CR81","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1007\/s11277-017-5200-5","volume":"102","author":"Y Sun","year":"2018","unstructured":"Sun, Y., Lin, F., Xu, H.: Multi-objective optimization of resource scheduling in Fog computing using an improved NSGA-II. Wirel. Pers. Commun. 102, 1369\u20131385 (2018)","journal-title":"Wirel. Pers. Commun."},{"key":"5_CR82","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.3390\/s19051023","volume":"19","author":"J Wang","year":"2019","unstructured":"Wang, J., Li, D.: Task scheduling based on a hybrid heuristic algorithm for smart production line with fog computing. Sensors (Basel) 19, 1023 (2019)","journal-title":"Sensors (Basel)"},{"key":"5_CR83","doi-asserted-by":"crossref","unstructured":"Pham, X.Q., Man, N.D., Tri, N.D.T., Thai, N.Q., Huh, E.N.: A cost and performance-effective approach for task scheduling based on collaboration between cloud and fog computing. Int. J. Distrib. Sens. Netw. 13, 1550147717742073 (2017)","DOI":"10.1177\/1550147717742073"},{"key":"5_CR84","doi-asserted-by":"publisher","first-page":"1730","DOI":"10.3390\/app9091730","volume":"9","author":"BM Nguyen","year":"2019","unstructured":"Nguyen, B.M., Binh, H.T.T., Anh, T.T., Son, D.B.: Evolutionary algorithms to optimize task scheduling problem for the IoT based bag-of-tasks application in cloud\u2013fog computing environment. Appl. Sci. 9, 1730 (2019)","journal-title":"Appl. Sci."},{"key":"5_CR85","doi-asserted-by":"publisher","first-page":"116218","DOI":"10.1109\/ACCESS.2019.2936116","volume":"7","author":"J Xu","year":"2019","unstructured":"Xu, J., Hao, Z., Zhang, R., Sun, X.: A method based on the combination of laxity and ant colony system for cloud-fog task scheduling. IEEE Access 7, 116218\u2013116226 (2019)","journal-title":"IEEE Access"}],"container-title":["Communications in Computer and Information Science","Deep Sciences for Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-27622-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T01:59:28Z","timestamp":1729130368000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-27622-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031276217","9783031276224"],"references-count":85,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-27622-4_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IconDeepCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Deep Sciences for Computing and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icondeepcom2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.srmist.edu.in\/icondeepcom-2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}