{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T12:31:50Z","timestamp":1770985910567,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T00:00:00Z","timestamp":1768867200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T00:00:00Z","timestamp":1770940800000},"content-version":"vor","delay-in-days":24,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00280-9","type":"journal-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T08:54:36Z","timestamp":1768899276000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An enhanced meta-heuristic algorithm for multi-objective Internet of Things (IoT) in Fog environment"],"prefix":"10.1007","volume":"6","author":[{"given":"G.","family":"Prabhakar","sequence":"first","affiliation":[]},{"given":"Meeravali","family":"Shaik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,20]]},"reference":[{"issue":"7","key":"280_CR1","first-page":"19","volume":"121","author":"R Bose","year":"2015","unstructured":"Bose R, Saha MK, Sarddar D. FC made easy with the help of Citrix and Billboard manager. Int J Comput Appl. 2015;121(7):19\u201323.","journal-title":"Int J Comput Appl"},{"issue":"8","key":"280_CR2","doi-asserted-by":"publisher","first-page":"1799","DOI":"10.1109\/LCOMM.2020.2992781","volume":"24","author":"M Mukherjee","year":"2020","unstructured":"Mukherjee M, Kumar V, Lloret J, Zhang Q. Revenue maximization in delay-aware computation offloading among service providers with fog federation. IEEE Commun Lett. 2020;24(8):1799\u2013803.","journal-title":"IEEE Commun Lett"},{"key":"280_CR3","volume-title":"FogCrypto: Towards cryptographic protocols for securing fog assisted cloud system","author":"RK Gaur","year":"2022","unstructured":"Gaur RK, Lenka RK, Prakash S, Patra SS, Barik RK. FogCrypto: Towards cryptographic protocols for securing fog assisted cloud system. New York: IEEE; 2022."},{"key":"280_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-019-09491-1","author":"M Ghobaei-Arani","year":"2019","unstructured":"Ghobaei-Arani M, Souri A, Rahmanian AA. Resource management approaches in FC: A comprehensive review. J Grid Computing. 2019. https:\/\/doi.org\/10.1007\/s10723-019-09491-1.","journal-title":"J Grid Computing"},{"key":"280_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02468-8","volume":"5","author":"S Singh","year":"2024","unstructured":"Singh S, Vidyarthi DP. FNSS: a heuristics for Fog Node Site Selection. SN Comput Sci. 2024;5:146. https:\/\/doi.org\/10.1007\/s42979-023-02468-8.","journal-title":"SN Comput Sci"},{"key":"280_CR6","unstructured":"Cisco. Cisco IoT Solutions. 2020. https:\/\/www.cisco.com\/c\/en_in\/solutions\/internet-of-things\/overview.htm"},{"key":"280_CR7","unstructured":"Lamarre, E. Internet of Things. McKinsey. 2020. https:\/\/www.mckinsey.com\/featured-insights\/internet-of-things\/how-we-help-clients"},{"key":"280_CR8","doi-asserted-by":"crossref","unstructured":"Bonomi F., Milito R., Zhu J, & Addepalli S. 2012. FC and its role in the internet of things. In Proc. of the First Edition of the MCC Workshop on Mobile Cloud Computing. 2012. 13\u201316.","DOI":"10.1145\/2342509.2342513"},{"issue":"11","key":"280_CR9","doi-asserted-by":"publisher","first-page":"10733","DOI":"10.1109\/JIOT.2020.2996615","volume":"7","author":"H Ning","year":"2020","unstructured":"Ning H, Farha F, Mohammad ZN, Daneshmand M. A survey and tutorial on \u2018connection exploding meets efficient communication\u2019 in the Internet of Things. IEEE Internet Things J. 2020;7(11):10733\u201344.","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"280_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3818","volume":"31","author":"H Li","year":"2020","unstructured":"Li H, Li X, Wang W. Joint optimization of computation cost and delay for task offloading in vehicular fog networks. Trans Emerging Telecommun Technol. 2020;31(2):e3818.","journal-title":"Trans Emerging Telecommun Technol"},{"key":"280_CR11","unstructured":"Ericsson. Enhancing service mobility in the 5G edge cloud and beyond. 2023. https:\/\/www.ericsson.com\/en\/blog\/2022\/11\/service-mobility-in-theedge-cloud"},{"key":"280_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s43926-025-00157-x","volume":"5","author":"P Kalpana","year":"2025","unstructured":"Kalpana P, Tappari S, Smitha L, et al. A novel end-to-end privacy preserving deep Aquila feed forward networks on healthcare 4.0 environment. Discov Internet Things. 2025;5:65. https:\/\/doi.org\/10.1007\/s43926-025-00157-x.","journal-title":"Discov Internet Things"},{"issue":"1","key":"280_CR13","first-page":"144","volume":"15","author":"P Kalpana","year":"2025","unstructured":"Kalpana P, Narayana P, Smitha L, Madhavi D, Keerthi K, Smerat A, et al. Health-fots: a latency aware fog-based IoT environment and efficient monitoring of body\u2019s vital parameters in smart healthcare. J Intell Syst Internet Things. 2025;15(1):144\u201356.","journal-title":"J Intell Syst Internet Things"},{"key":"280_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/ett.70281","author":"G SaravanaKumar","year":"2025","unstructured":"SaravanaKumar G, et al. \u201cBeetle\u2010optimized hybrid ensemble for multi\u2010attack classification in VANETs,.\u201d Trans Emerging Telecommun Technol. 2025. https:\/\/doi.org\/10.1002\/ett.70281.","journal-title":"Trans Emerging Telecommun Technol"},{"key":"280_CR15","volume-title":"FLEX: A platform for scalable service placement in multi-fog and multi-cloud environments","author":"M Singhal","year":"2022","unstructured":"Singhal M. FLEX: A platform for scalable service placement in multi-fog and multi-cloud environments. New York: Association for Computing Machinery; 2022."},{"issue":"1","key":"280_CR16","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1109\/TCE.2025.3553741","volume":"71","author":"E Aruna","year":"2025","unstructured":"Aruna E, Sahayadhas A, et al. A web 3.0 integrated Blockchain enabled access system augmented by meta-heuristic cognitive learning framework for mitigating threats in IoT enabled consumer electronic devices. IEEE Trans Consum Electron. 2025;71(1):1201\u201310. https:\/\/doi.org\/10.1109\/TCE.2025.3553741.","journal-title":"IEEE Trans Consum Electron"},{"issue":"2","key":"280_CR17","volume":"10","author":"F Alkahtani","year":"2021","unstructured":"Alkahtani F, Nordin H. Deep learning methods for solar fault detection and classification: a review. Inf Sci Lett. 2021;10(2):13.","journal-title":"Inf Sci Lett"},{"issue":"2","key":"280_CR18","volume":"10","author":"A Al-Sammarraee","year":"2021","unstructured":"Al-Sammarraee A, Alshareeda NJ. The role of artificial intelligence by using automatic accounting information system in supporting the quality of financial statement. Inf Sci Lett. 2021;10(2):8.","journal-title":"Inf Sci Lett"},{"issue":"3","key":"280_CR19","first-page":"19","volume":"10","author":"I Atia","year":"2021","unstructured":"Atia I, Salem ML, Elkholy A, Elmashad W, Am Ali GJISL. In-silico analysis of protein receptors contributing to SARS-COV-2 high infectivity. Inf Sci Lett. 2021;10(3):19.","journal-title":"Inf Sci Lett"},{"issue":"3","key":"280_CR20","first-page":"5","volume":"10","author":"YM Al-Rawi","year":"2021","unstructured":"Al-Rawi YM, Al-Dayyeni WS, Reda IJISL. COVID-19 impact on education and work in the Kingdom of Bahrain: Survey study. Inf Sci Lett. 2021;10(3):5.","journal-title":"Inf Sci Lett"},{"issue":"3","key":"280_CR21","first-page":"1","volume":"11","author":"S Sengan","year":"2022","unstructured":"Sengan S, Khalaf OI, Sagar DKV, Sharma DK, Prabhu QAJ, Hamad AA. Secured and privacy-based IDS for healthcare systems on e-medical data using machine learning approach. Int J Reliab Qual E-Healthc. 2022;11(3):1\u201311.","journal-title":"Int J Reliab Qual E-Healthc"},{"key":"280_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3415418","volume":"12","author":"P Karthikeyan","year":"2024","unstructured":"Karthikeyan P, Brindha K. Opti-FOG: optimizing resource allocation with ant-inspired FOG node selection. IEEE Access. 2024;12:3415418. https:\/\/doi.org\/10.1109\/ACCESS.2024.3415418.","journal-title":"IEEE Access"},{"key":"280_CR23","doi-asserted-by":"publisher","first-page":"7351","DOI":"10.1007\/s10586-024-04308-7","volume":"27","author":"HS Hossam","year":"2024","unstructured":"Hossam HS, Abdel-Galil H, Belal M. An energy-aware module placement strategy in fog-based healthcare monitoring systems. Cluster Comput. 2024;27:7351\u201372.","journal-title":"Cluster Comput"},{"issue":"20","key":"280_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8198","volume":"36","author":"D Soni","year":"2024","unstructured":"Soni D, Kumar N. Fuzzy logic-based computation offloading technique in FC. Concurrency Comput Pract Exp. 2024;36(20):e8198.","journal-title":"Concurrency Comput Pract Exp"},{"key":"280_CR25","doi-asserted-by":"publisher","first-page":"34055","DOI":"10.1007\/s11042-023-16899-1","volume":"83","author":"A Ullah","year":"2024","unstructured":"Ullah A, Yasin S, Alam T. Latency aware smart healthcare system using edge and FC. Multimedia Tools Appl. 2024;83:34055\u201381.","journal-title":"Multimedia Tools Appl"},{"key":"280_CR26","doi-asserted-by":"publisher","first-page":"3035","DOI":"10.1007\/s12652-024-04796-w","volume":"15","author":"S Singh","year":"2024","unstructured":"Singh S, Vidyarthi DP. A hybrid model using JAYA-GA metaheuristics for placement of fog nodes in fog-integrated cloud. J Ambient Intell Humaniz Comput. 2024;15:3035\u201352.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"280_CR27","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1016\/j.future.2024.04.010","volume":"157","author":"S Singh","year":"2024","unstructured":"Singh S, Sham EE, Vidyarthi DP. Optimizing fog device deployment for maximal network connectivity and edge coverage using metaheuristic algorithm. Future Gener Comput Syst. 2024;157:529\u201342.","journal-title":"Future Gener Comput Syst"},{"key":"280_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14565-0","author":"R Mehta","year":"2023","unstructured":"Mehta R, Sahni J, Khanna K. Task scheduling for improved response time of latency-sensitive applications in fog integrated cloud environment. Multimedia Tools Appl. 2023. https:\/\/doi.org\/10.1007\/s11042-023-14565-0.","journal-title":"Multimedia Tools Appl"},{"issue":"4","key":"280_CR29","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.3390\/app12042083","volume":"12","author":"AM Farooqi","year":"2022","unstructured":"Farooqi AM, Alam MA, Hassan SI, Idrees SM. A FC model for VANET to reduce latency and delay using 5G network in smart city transportation. Appl Sci. 2022;12(4):2083.","journal-title":"Appl Sci"},{"key":"280_CR30","volume-title":"Design of latency-aware IoT modules in heterogeneous fog-cloud computing networks","author":"S Hassan","year":"2021","unstructured":"Hassan S, Ahmad I, Jamel N, Rehman A, Shafiq M, Choi JG. Design of latency-aware IoT modules in heterogeneous fog-cloud computing networks. Henderson: Tech Science Press; 2021."},{"key":"280_CR31","doi-asserted-by":"publisher","first-page":"4887","DOI":"10.1007\/s11227-020-03476-8","volume":"77","author":"F Jazayeri","year":"2021","unstructured":"Jazayeri F, Shahidinejad A, Ghobaei-Arani M. A latency-aware and energy-efficient computation offloading in mobile FC: a hidden Markov model-based approach. J Supercomput. 2021;77:4887\u2013916.","journal-title":"J Supercomput"},{"key":"280_CR32","doi-asserted-by":"publisher","DOI":"10.1109\/InC460750.2024.10649235","volume-title":"An Improved Henon Map Based Encryption Scheme for Secure Image Transmission","author":"S Agrawal","year":"2024","unstructured":"Agrawal S, M BR. An Improved Henon Map Based Encryption Scheme for Secure Image Transmission. New York: IEEE; 2024."},{"key":"280_CR33","doi-asserted-by":"publisher","first-page":"2531","DOI":"10.1007\/s11831-021-09694-4","volume":"29","author":"AG Gad","year":"2022","unstructured":"Gad AG. Particle swarm optimization algorithm and its applications: a systematic review. Arch Comput Methods Eng. 2022;29:2531\u201361.","journal-title":"Arch Comput Methods Eng"},{"key":"280_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2022.105769","volume":"143","author":"Y Sun","year":"2022","unstructured":"Sun Y, Wang S, Shen Y, Li X, Ernst AT, Kirley M. Boosting ant colony optimization via solution prediction and machine learning. Comput Oper Res. 2022;143:105769.","journal-title":"Comput Oper Res"},{"key":"280_CR35","doi-asserted-by":"publisher","first-page":"512","DOI":"10.4028\/www.scientific.net\/AMM.421.512","volume":"421","author":"N Johari","year":"2013","unstructured":"Johari N, Zain A, Mustaffa N, Udin A. Firefly algorithm for optimization problem. Appl Mech Mater. 2013;421:512.","journal-title":"Appl Mech Mater"},{"key":"280_CR36","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.matcom.2021.08.013","volume":"192","author":"FA Hashim","year":"2022","unstructured":"Hashim FA, Houssein EH, Hussain K, Mabrouk MS, Al-Atabany W. Honey badger algorithm: new metaheuristic algorithm for solving optimization problems. Math Comput Simul. 2022;192:84\u2013110.","journal-title":"Math Comput Simul"},{"issue":"6","key":"280_CR37","doi-asserted-by":"publisher","DOI":"10.3390\/biomimetics8060493","volume":"8","author":"H Mahgoub","year":"2023","unstructured":"Mahgoub H, Aldehim G, Almalki NS, Issaoui I, Mahmud A, Alneil AA. Bio-inspired spotted hyena optimizer with deep convolutional neural network-based automated food image classification. Biomimetics. 2023;8(6):493.","journal-title":"Biomimetics"},{"key":"280_CR38","first-page":"493","volume":"36","author":"A Papasani","year":"2024","unstructured":"Papasani A, Devarakonda N. Hybrid optimized multi-objective honey badger algorithm and NSGA-II for feature selection problems. Indones J Electr Eng Comput Sci. 2024;36:493.","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"280_CR39","doi-asserted-by":"publisher","first-page":"91745","DOI":"10.1109\/ACCESS.2019.2927895","volume":"7","author":"I Lera","year":"2019","unstructured":"Lera I, Guerrero C, Juiz C. YAFS: A simulator for IoT scenarios in FC. IEEE Access. 2019;7:91745\u201358.","journal-title":"IEEE Access"},{"key":"280_CR40","volume-title":"Structure of growing networks: Exact solution of the Barab\u00e1si-Albert model","author":"S Dorogovtsev","year":"2000","unstructured":"Dorogovtsev S, Mendes JF, Samukhin A. Structure of growing networks: Exact solution of the Barab\u00e1si-Albert model. Ithaca: Cornell University Press; 2000."}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00280-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00280-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00280-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T11:57:42Z","timestamp":1770983862000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00280-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,20]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["280"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00280-9","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,20]]},"assertion":[{"value":"29 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"17"}}