References
- A. A. N. Patwary et al., “Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control,” Electron., vol. 10, no. 10, pp. 1–52, doi:https://doi.org/10.3390/electronics10101171, (2021).
- A. M Rahmani, T. N Gia, B. Negash, A. Anzanpour, I. Azimi, M. Jiang, P. Liljeberg, Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach, Future Generation Computer Systems, Volume 78, Part 2, Pages 641-658, ISSN 0167-739X, https://doi.org/https://doi.org/10.1016/j.future.2017.02.014 (2018).
- A. Kishor, C. Chakraborty, W. Jeberson, A Novel Fog Computing Approach for Minimization of Latency in Healthcare using Machine Learning. International Journal of Interactive Multimedia and Artificial Intelligence. In Press. 1. https://doi.org/https://doi.org/10.9781/ijimai.2020.12.004, (2020).
- B. Negash, T.N Gia, A. Anzanpour, I. Azimi, M. Jiang, T. Westerlund, A. M. Rahmani, P. Liljeberg, and H. Tenhunen, Leveraging Fog Computing for Healthcare IoT. In: Rahmani A., Liljeberg P., Preden JS., Jantsch A. (eds) Fog Computing in the Internet of Things. Springer, Cham. https://doi.org/https://doi.org/10.1007/978-3-319-57639-8_8, (2018)
- F. M Talaat, M. S Saraya, A. I Saleh, A. Ali, A load balancing and optimization strategy (LBOS) using reinforcement learning in fog computing environment. J Ambient Intell Human Comput 11, 4951– 4966. https://doi.org/https://doi.org/10.1007/s12652-020-01768-8, (2020).
- G. Rahman and C. Wen, “Fog Computing, Applications , Security and Challenges, Review,” International Journal of Engineering & Technology, 7 (3), 1615-1621, (2018). doi: https://doi.org/10.14419/ijet.v7i3.12612
- H. Gupta, A. Vahid Dastjerdi, S.K. Ghosh, R. Buyya, Ifogsim: a toolkit for modeling and simulation of resource management techniques in the internet of things, edge and fog computing environments, J. Softw. 47 (9) 1275–1296, https://doi.org/https://doi.org/10.1002/spe.2509, (2017).
- I. Lera, C. Guerrero, C. Juiz, YAFS: yet Another Fog Simulator - GitHub Repositor, (https://github.com/acsicuib/YAFS). Accessed: 2019-03-13, (2019).
- J. Kharel, H. T Reda Haftu, S.Y Shin, Fog Computing Based Smart Health Monitoring System Deploying LoRa Wireless Communication, IETE TechnicalReview, doi: https://doi.org/10.1080/02564602.2017.1406828, (2018).
- Jyotsna and P. Nand, “Enhancing Quality of service in IoT Healthcare services using Fog Computing,” 2021 2nd International Conference for Emerging Technology (INCET), pp. 1-5, doi: https://doi.org/10.1109/INCET51464.2021.9456341, (2021).
- M. Aazam and E. Huh, “Fog Computing Micro Datacenter Based Dynamic Resource Estimation and Pricing Model for IoT,” 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 2015, pp. 687-694, doi: https://doi.org/10.1109/AINA.2015.254, (2015).
- M. Pourkiani, M. Abedi and M. A. Tahavori, “Improving the Quality of Service in WBSN Based Healthcare Applications by Using Fog Computing,” 2019 International Conference on Information and Communications Technology (ICOIACT), pp. 266-270, doi: https://doi.org/10.1109/ICOIACT46704.2019.8938448, (2019).
- M. R Belgaum, S. Soomro, Z. Alansari, S. Musa, M. Alam, M.M Su’ud, Challenges: Bridge between cloud and IoT; Proceedings of the 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS); Salmabad, Bahrain. pp. 1–5, (2017).
- N. Peter, FOG Computing and Its Real Time Applications. Int. J. Emerg. Technol. Adv. Eng, 5, pp. 266–269, (2015).
- P. Wette, M. Draxler, A. Schwabe, F. Wallaschek, M. Zahraee, H. Karl, MaxiNet: distributed emulation of software-defined networks, Networking Conference, 2014 IFIP, IEEE, Trondheim, Norway, pp. 1–9, https://doi.org/https://doi.org/10.1109/IFIPNetworking.2014.6857078, (2014)
- P.H. Vilela, J.J.P.C. Rodrigues, P. Solic et al., Performance evaluation of aFog-assisted IoT solution for e-Health applications, Future Generation Computer Systems, https://doi.org/https://doi.org/10.1016/j.future.2019.02.055, (2019).
- R. Mahmud, F. L Koch, and R. Buyya, Cloud-Fog Interoperability in IoT-enabled Healthcare Solutions. In Proceedings of the 19th International Conference on Distributed Computing and Networking (ICDCN ‘18). Association for Computing Machinery, New York, NY, USA, 2018. Article 32, 1–10. https://doi.org/https://doi.org/10.1145/3154273.3154347, (2018).
- R. Mayer, L. Graser, H. Gupta, E. Saurez, U. Ramachandran, Emufog: extensible and scalable emulation of large-scale fog computing infrastructures, 2017 IEEE Fog World Congress (FWC), IEEE, Santa Clara, CA, USA, pp. 1–6, https://doi.org/https://doi.org/10.1109/FWC.2017.8368525, (2017).
- R. R and R. A. Kumar, “Possible Solutions on Security and Privacy Issues in Fog Computing,” SSRN Electron. J., no. May, pp. 234–240, doi: https://doi.org/10.2139/ssrn.3507922, (2019).
- S. B Akintoye, A. Bagula. Improving Quality-of-Service in Cloud/Fog Computing through Efficient Resource Allocation. Sensors (Basel, Switzerland), 19(6), 1267. https://doi.org/https://doi.org/10.3390/s19061267, (2019).
- S. R Hassan, I. Ahmad, S. Ahmad, A. Alfaify, M. Shafiq, Remote Pain Monitoring Using Fog Computing for eHealthcare: An Efficient Architecture. Sensors, 20(22):6574. https://doi.org/https://doi.org/10.3390/s20226574, (2020).
- S. Shukla, M.F Hassan, L. T Jung, A. Awang A, Architecture for Latency Reduction in Healthcare Internet-of Things Using Reinforcement Learning and Fuzzy Based Fog Computing. Advances in Intelligent Systems and Computing, vol 843. Springer, Cham, https://doi.org/https://doi.org/10.1007/978-3-319-99007-1_36, (2019).
- S. Shukla, M.F Hassan, M. K Khan, L. T Jung, A. Awang, An analytical model to minimize the latency in healthcare internet-of-things in fog computing environment. PLoS ONE 14(11):e0224934. https://doi.org/https://doi.org/10.1371/journal.pone.0224934, (2019).
- S. Tuli, N. Basumatary, S.S. Gill et al., HealthFog: An ensemble deeplearning based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in integratedIoT and fog computing environments, Future Generation Computer Systems, https://doi.org/https://doi.org/10.1016/j.future.2019.10.043, (2019).
- S. Yi, Z. Qin, and Q. Li, “Security and privacy issues of fog computing: A survey,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 9204, pp. 685–695, doi: https://doi.org/10.1007/978-3-319-21837-3_67, (2015).
- T. N. Gia, M. Jiang, A. Rahmani, T. Westerlund, P. Liljeberg and H. Tenhunen, “Fog Computing in Healthcare Internet of Things: A Case Study on ECG Feature Extraction,” IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; pp. 356-363, doi: https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.51, (2015).
- V. Kumar, G. Sakya, C. Shankar, “WSN and IoT based smart city model using the MQTT protocol”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 22, pp. 1423-1434, https://doi.org/https://doi.org/10.1080/09720529.2019.1692449, (2020).
- V. Malik and S. Singh, “Security risk management in IoT environment”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 24, pp. 697-709 https://doi.org/https://doi.org/10.1080/09720529.2019.1642628, (2019).
- V. Pathak, K. Singh, S. Aggarwal, A. Dhoot. “Ensuring security framework for WBANs” Journal of Discrete Mathematical Sciences and Cryptography, vol. 24,pp. 697-710 https://doi.org/https://doi.org/10.1080/09720529.2020.1822542, (2021).
- Yask and B. Kumar, “A review of model on malware detection and protection for the distributed control systems (Industrial control systems) in oil & gas sectors”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 22, pp 531-540, https://doi.org/https://doi.org/10.1080/09720529.2019.1642623, (2019).
- Y. Li, Y. Shi, Y. Liu, Q. Zhang, D. Qiu, J. Li. “An algorithm of the rank of a dependent fuzzy set”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 20, Issue 8 pp 1775-1791, https://doi.org/https://doi.org/10.1080/09720529.2017.1338601, (2017).
- Z. Ashi, M. Al-Fawa’reh, and M. Al-Fayoumi, “Fog Computing: Security Challenges and Countermeasures,” Int. J. Comput. Appl., vol. 175, no. 15, pp. 30–36, doi: https://doi.org/10.5120/ijca2020920648, (2020).