{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T09:22:37Z","timestamp":1777108957819,"version":"3.51.4"},"reference-count":19,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2016R1D1A1B03931689"],"award-info":[{"award-number":["2016R1D1A1B03931689"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>It is expected that the number of devices connecting to the Internet-of-Things (IoT) will increase geometrically in the future, with improvement of their functions. Such devices may create a huge amount of data to be processed in a limited time. Under the IoT environment, data management should play the role of an intermediate level between objects and devices that generate data and applications that access to the data for analysis and the provision of services. IoT interactively connects all communication devices and allows global access to the data generated by a device. Fog computing manages data and computation at the edge of the network near an end user and provides new types of applications and services, with low latency, high frequency bandwidth and geographical distribution. In this paper, we propose a fog computing architecture for efficiently and reliably delivering IoT data to the corresponding IoT applications while ensuring time sensitivity. Based on fog computing, the proposed architecture provides efficient power management in IoT device communication between sensors and secure management of data to be decrypted based on user attributes. The functional effectiveness and the safe data management of the method proposed are compared through experiments.<\/jats:p>","DOI":"10.3390\/s18113633","type":"journal-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T10:51:01Z","timestamp":1540551061000},"page":"3633","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["A Study on the Design of Fog Computing Architecture Using Sensor Networks"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0451-3271","authenticated-orcid":false,"given":"Hyun-Jong","family":"Cha","sequence":"first","affiliation":[{"name":"Division of Information Technology Education, Sunmoon University, Asan-si 31460, Korea"}]},{"given":"Ho-Kyung","family":"Yang","sequence":"additional","affiliation":[{"name":"Division of Information Technology Education, Sunmoon University, Asan-si 31460, Korea"}]},{"given":"You-Jin","family":"Song","sequence":"additional","affiliation":[{"name":"Department of Management, Dongguk University, Gyeongju-si 38066, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Doukas, C., and Maglogiannis, I. (2012, January 4\u20136). Bringing IoT and cloud computing towards pervasivehealthcare. Proceedings of the 2012 Sixth International Conference Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Palermo, Italy.","DOI":"10.1109\/IMIS.2012.26"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"389","DOI":"10.6029\/smartcr.2014.05.005","article-title":"Study of Cloud Computing and its Issues: A Review","volume":"4","author":"Verma","year":"2014","journal-title":"Smart Comput. Rev."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Stojmenovic, I., and Wen, S. (2014, January 7\u201310). The Fog computing paradigm: Scenarios and security issues. Proceedings of the 2014 Federated Conference Computer Scienceand Information Systems (FedCSIS), Warsaw, Poland.","DOI":"10.15439\/2014F503"},{"key":"ref_4","unstructured":"Krishnamachari, L., Estrin, D., and Wicker, S. (2002, January 2\u20135). The impact of data aggregation in wireless sensor networks. Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops, Vienna, Austria."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Lindsay, S., Raghavendra, C.S., and Sivalingam, K.M. (2001, January 23\u201327). Data gathering in sensor networks using the energy delay metric. Proceedings of the 15th International Parallel & Distributed Processing.","DOI":"10.1109\/IPDPS.2001.925196"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/959060.959072","article-title":"Power efficient data gathering and aggregation in wireless sensor networks","volume":"32","author":"Tan","year":"2003","journal-title":"ACM Sigmod Record"},{"key":"ref_7","unstructured":"Gartner (2014, August 06). Gartner Hype Cycle Special Report for 2014. Available online: http:\/\/www.gartner.com\/."},{"key":"ref_8","unstructured":"CISCO (2014). IoT Reference Model White Paper, CISCO."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.jnca.2017.01.012","article-title":"MIST: Fog-based data analytics scheme with cost-efficient resource provisioning for IoT crowdsensing applications","volume":"82","author":"Arkin","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. (2012, January 17). Fog Computing and Its Role in the Internet of Things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland.","DOI":"10.1145\/2342509.2342513"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Stojmenovic, I. (2014, January 26\u201328). Fog computing: A cloud to the ground support for smart things and machine-to-machine networks. Proceedings of the Telecommunication Networks and Applications Conference (ATNAC), Southbank, VIC, Australia.","DOI":"10.1109\/ATNAC.2014.7020884"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Mohan, N., and Kangashaju, J. (2016, January 23\u201325). Edge-Fog Cloud: A Distributed Cloud for Internet of Things Computation. Proceedings of the International Conference Cloudification of the Internet of Things (CIoT), Paris, France.","DOI":"10.1109\/CIOT.2016.7872914"},{"key":"ref_13","first-page":"1","article-title":"Zigbee based home automation wireless sensor network","volume":"7","author":"Varchola","year":"2007","journal-title":"Acta Electrotech. Inf."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Cipher Text-Policy Attribute-Based Encryption. Proceedings of the IEEE Symposium on Security and Privacy (SP\u201907), Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_15","unstructured":"Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., and Jonker, W. (2009). Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes, University of Twente. Centre for Telematics and Information Technology, Internal Report."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Shai, A., and Waters, B. (2007, January 28). Attrobute-Based Encryption with Non-Monotonic Access Structures. Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, VA, USA.","DOI":"10.1145\/1315245.1315270"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Attrapadung, N., and Imai, H. (2009, January 12\u201314). Conjunctive Broadcast and Attribute-Based Encryption. Proceedings of the International Conference on Pairing-Based Cryptography, Palo Alto, CA, USA.","DOI":"10.1007\/978-3-642-03298-1_16"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Attrapadung, N., and Imai, H. (2009, January 15\u201317). Attribute-Based Encryption Supporting Direct\/Indirect Revocation Modes. Proceedings of the IMA International Conferrence on Cryptography and Coding, Cirencester, UK.","DOI":"10.1007\/978-3-642-10868-6_17"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Goyal, V., and Kumar, V. (2008, January 27\u201331). Identity-based encryption with efficient revocation. Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS\u201908), Alexandria, VA, USA.","DOI":"10.1145\/1455770.1455823"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/11\/3633\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T21:59:50Z","timestamp":1775253590000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/11\/3633"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":19,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2018,11]]}},"alternative-id":["s18113633"],"URL":"https:\/\/doi.org\/10.3390\/s18113633","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,26]]}}}