Edge-Fog-Cloud Computing Hierarchy for Improving Performance and Security of NB-IoT-Based Health Monitoring Systems

Archive ouverte : Article de revue

Daraghmi, Yousef-Awwad | Daraghmi, Eman Yaser | Daraghma, Raed | Fouchal, Hacene | Ayaida, Marwane

Edité par HAL CCSD ; MDPI

International audience. This paper proposes a three-computing-layer architecture consisting of Edge, Fog, and Cloud for remote health vital signs monitoring. The novelty of this architecture is in using the Narrow-Band IoT (NB-IoT) for communicating with a large number of devices and covering large areas with minimum power consumption. Additionally, the architecture reduces the communication delay as the edge layer serves the health terminal devices with initial decisions and prioritizes data transmission for minimizing congestion on base stations. The paper also investigates different authentication protocols for improving security while maintaining low computation and transmission time. For data analysis, different machine learning algorithms, such as decision tree, support vector machines, and logistic regression, are used on the three layers. The proposed architecture is evaluated using CloudSim, iFogSim, and ns3-NB-IoT on real data consisting of medical vital signs. The results show that the proposed architecture reduces the NB-IoT delay by 59.9%, the execution time by an average of 38.5%, and authentication time by 35.1% for a large number of devices. This paper concludes that the NB-IoT combined with edge, fog, and cloud computing can support efficient remote health monitoring for large devices and large areas.

Consulter en ligne

Suggestions

Du même auteur

False Data Injection Attack Against Cyber-Physical Systems Protected by a W...

Archive ouverte: Communication dans un congrès

Guibene, Khalil | 2022

International audience

Du même sujet

Jours de sable / Aimée de Jongh

Livre | Jongh, Aimée de (1988-....). Auteur. Illustrateur | 2021

Washington, 1937. John Clark, journaliste photoreporter de 22 ans, est engagé par la Farm Security Administration, l'organisme gouvernemental chargé d'aider les fermiers victimes de la Grande Dépression. Sa mission : témoigner de ...

Politics of catastrophe : genealogies of the unknown / Claudia Aradau and R...

Livre | Aradau, Claudia (1976-....). Auteur | 2011

La politique internationale de la Chine : entre intégration et volonté de p...

Livre | Cabestan, Jean-Pierre (1955-....). Auteur | 2014 - 2e édition mise à jour et enrichie

Deuxième puissance mondiale depuis 2010, la Chine est pétrie d'ambitions. Forte de son économie désormais mondialisée, elle n'entend pas seulement ravir aux Etats-Unis la première place mais aussi bouleverser l'ordre international...

US foreign policy and defense strategy : the evolution of an incidental sup...

Livre | Reveron, Derek S. (19..-....). Auteur | 2015

This work analyzes the strategic underpinnings of US defense strategy and foreign policy since 1945. Primarily intended to be a supplemental textbook, it explains how the United States became a superpower, examines the formation o...

Distributed Artificial Intelligence Integrated Circuits For Ultra-Low-Power...

Archive ouverte: Communication dans un congrès

Chêne, Mathieu | 2022-06-27

International audience. Wireless sensor networks (WSN) could be defined as networks of autonomous devices that can sense and/or act on a physical or environmental conditions cooperatively. .To make these sensors sma...

Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine...

Archive ouverte: Communication dans un congrès

Alouani, Ihsen | 2022-08-31

International audience. Several systems and application domains are under-going disruptive transformations due to the recent breakthroughs in computing paradigms such us Machine Learning and commu-nication technolog...

Chargement des enrichissements...