Skip to main content
Top
Published in: The Journal of Supercomputing 15/2023

08-05-2023

Mobi-Sense: mobility-aware sensor-fog paradigm for mission-critical applications using network coding and steganography

Authors: Anwesha Mukherjee, Shreya Ghosh, Soumya K. Ghosh, Rajkumar Buyya

Published in: The Journal of Supercomputing | Issue 15/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mission-critical applications refer to the real-time applications, which require fast and secure service provisioning, such as defense sector and disaster management. This paper proposes a delay-aware and secure service provisioning model for such types of applications. As a use-case, we have considered the defense sector, which is a vital sector for a country’s all-round well-being including security, safety, society, and economy. In the conventional sensor-cloud model, the sensor data is stored and processed in the cloud. However, the sensor nodes have small coverage and the use of the long distant cloud servers increases the delay. Therefore, the conventional sensor-cloud model may not be efficient for defense application. Moreover, data hiding for security purposes is another important aspect of this field. To address these challenges, this paper proposes a mobility-aware sensor-fog paradigm for mission-critical applications based on network coding and steganography, referred to as Mobi-Sense. In Mobi-Sense, steganography is used for hiding the data during transmission. The theoretical results demonstrate that Mobi-Sense outperforms the existing frameworks with respect to delay and power consumption by \(\sim (40-80)\)%. The simulation results present that Mobi-Sense reduces the delay by \(\sim (18-40)\)% than the conventional sensor-cloud framework for mission-critical applications. An optimal path finding algorithm based on deep learning has been deployed in the context of disaster scenario. The experimental analysis shows that the proposed optimal path finding method achieves precision and accuracy above 90%. This is observed that our proposed modules have outperformed existing baselines in terms of accuracy, delay, and power consumption.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mishra M, Roy SK, Mukherjee A, De D, Ghosh SK, Buyya R (2019) An energy-aware multi-sensor geo-fog paradigm for mission critical applications. J Amb Intell Human Comput. 1–19 Mishra M, Roy SK, Mukherjee A, De D, Ghosh SK, Buyya R (2019) An energy-aware multi-sensor geo-fog paradigm for mission critical applications. J Amb Intell Human Comput. 1–19
2.
go back to reference Misra S, Singh A, Chatterjee S, Obaidat MS (2014) Mils-cloud: a sensor-cloud-based architecture for the integration of military tri-services operations and decision making. IEEE Syst J 10(2):628–636CrossRef Misra S, Singh A, Chatterjee S, Obaidat MS (2014) Mils-cloud: a sensor-cloud-based architecture for the integration of military tri-services operations and decision making. IEEE Syst J 10(2):628–636CrossRef
3.
go back to reference Ghosh S, Mukherjee A, Ghosh SK, Buyya R (2022) Stoppage: Spatio-temporal data driven cloud-fog-edge computing framework for pandemic monitoring and management. Softw Pract Exper 52(12):2700–2726 Ghosh S, Mukherjee A, Ghosh SK, Buyya R (2022) Stoppage: Spatio-temporal data driven cloud-fog-edge computing framework for pandemic monitoring and management. Softw Pract Exper 52(12):2700–2726
4.
go back to reference Nage T, Yu FR, St-Hilaire M (2010) Adaptive control of packet overhead in xor network coding. In: 2010 IEEE International Conference on Communications 1–5. IEEE Nage T, Yu FR, St-Hilaire M (2010) Adaptive control of packet overhead in xor network coding. In: 2010 IEEE International Conference on Communications 1–5. IEEE
5.
go back to reference Chen J, Lee VCS, Liu K, Ali MGGN, Chan E (2013) Efficient processing of requests with network coding in on-demand data broadcast environments. Inf Sci 232:27–43MathSciNetCrossRefMATH Chen J, Lee VCS, Liu K, Ali MGGN, Chan E (2013) Efficient processing of requests with network coding in on-demand data broadcast environments. Inf Sci 232:27–43MathSciNetCrossRefMATH
6.
go back to reference Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Privacy 1(3):32–44CrossRef Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Privacy 1(3):32–44CrossRef
7.
go back to reference Sarmah DK, Kulkarni AJ (2018) Jpeg based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms. Inf Sci 430:378–396CrossRef Sarmah DK, Kulkarni AJ (2018) Jpeg based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms. Inf Sci 430:378–396CrossRef
9.
go back to reference Mukherjee A, De D, Ghosh SK (2020) Fogioht: a weighted majority game theory based energy-efficient delay-sensitive fog network for internet of health things. Inter Things 100181 Mukherjee A, De D, Ghosh SK (2020) Fogioht: a weighted majority game theory based energy-efficient delay-sensitive fog network for internet of health things. Inter Things 100181
10.
go back to reference Ghosh S, Mukherjee A, Ghosh SK, Buyya R (2019) Mobi-iost: mobility-aware cloud-fog-edge-iot collaborative framework for time-critical applications. IEEE Trans Netw Sci Eng Ghosh S, Mukherjee A, Ghosh SK, Buyya R (2019) Mobi-iost: mobility-aware cloud-fog-edge-iot collaborative framework for time-critical applications. IEEE Trans Netw Sci Eng
11.
go back to reference Das J, Ghosh S, Mukherjee A, Ghosh SK, Buyya R (2022) Rescue: enabling green healthcare services using integrated iot-edge-fog-cloud computing environments. Softw Pract Exp 52(7):1615–1642CrossRef Das J, Ghosh S, Mukherjee A, Ghosh SK, Buyya R (2022) Rescue: enabling green healthcare services using integrated iot-edge-fog-cloud computing environments. Softw Pract Exp 52(7):1615–1642CrossRef
12.
go back to reference Gavrilović N, Mishra A (2021) Software architecture of the internet of things (iot) for smart city, healthcare and agriculture: analysis and improvement directions. J Amb Intell Humaniz Comput 12(1):1315–1336CrossRef Gavrilović N, Mishra A (2021) Software architecture of the internet of things (iot) for smart city, healthcare and agriculture: analysis and improvement directions. J Amb Intell Humaniz Comput 12(1):1315–1336CrossRef
13.
go back to reference Almurisi N, Tadisetty S (2022) Cloud-based virtualization environment for iot-based wsn: solutions, approaches and challenges. J Amb Intell Humaniz Comput 1–23 Almurisi N, Tadisetty S (2022) Cloud-based virtualization environment for iot-based wsn: solutions, approaches and challenges. J Amb Intell Humaniz Comput 1–23
14.
go back to reference Burmaoglu S, Saritas O, Yalcin H (2019) Defense 4.0: internet of things in military. In Emerg Technol Econ Develop 303–320. Springer Burmaoglu S, Saritas O, Yalcin H (2019) Defense 4.0: internet of things in military. In Emerg Technol Econ Develop 303–320. Springer
15.
go back to reference Mukherjee A, Ghosh S, De D, Ghosh SK (2022) Mcg: Mobility-aware computation offloading in edge using weighted majority game. IEEE Trans Netw Sci Eng Mukherjee A, Ghosh S, De D, Ghosh SK (2022) Mcg: Mobility-aware computation offloading in edge using weighted majority game. IEEE Trans Netw Sci Eng
16.
go back to reference Memari P, Mohammadi SS, Jolai F, Tavakkoli-Moghaddam R (2022) A latency-aware task scheduling algorithm for allocating virtual machines in a cost-effective and time-sensitive fog-cloud architecture. J Supercomput 78(1):93–122CrossRef Memari P, Mohammadi SS, Jolai F, Tavakkoli-Moghaddam R (2022) A latency-aware task scheduling algorithm for allocating virtual machines in a cost-effective and time-sensitive fog-cloud architecture. J Supercomput 78(1):93–122CrossRef
17.
go back to reference Ahmad M, Amin MB, Hussain S, Kang BH, Cheong T, Lee S (2016) Health fog: a novel framework for health and wellness applications. J Supercomput 72(10):3677–3695CrossRef Ahmad M, Amin MB, Hussain S, Kang BH, Cheong T, Lee S (2016) Health fog: a novel framework for health and wellness applications. J Supercomput 72(10):3677–3695CrossRef
18.
go back to reference Mukherjee A, Ghosh S, Behere A, Ghosh SK, Buyya R (2020) Internet of health things (ioht) for personalized health care using integrated edge-fog-cloud network. J Amb Intell Humaniz Comput Mukherjee A, Ghosh S, Behere A, Ghosh SK, Buyya R (2020) Internet of health things (ioht) for personalized health care using integrated edge-fog-cloud network. J Amb Intell Humaniz Comput
19.
go back to reference Sulyman AI, Henggeler C (2022) Physical layer security for military iot links using mimo-beamforming at 60 ghz. Information 13(2):100CrossRef Sulyman AI, Henggeler C (2022) Physical layer security for military iot links using mimo-beamforming at 60 ghz. Information 13(2):100CrossRef
20.
go back to reference Campioni L, Poltronieri F, Stefanelli C, Suri N, Tortonesi M, Wrona K (2023) Enabling civil-military collaboration for disaster relief operations in smart city environments. Fut Generat Comput Syst 139:181–195CrossRef Campioni L, Poltronieri F, Stefanelli C, Suri N, Tortonesi M, Wrona K (2023) Enabling civil-military collaboration for disaster relief operations in smart city environments. Fut Generat Comput Syst 139:181–195CrossRef
21.
go back to reference Bichi BY, Islam SU, Kademi AM, Ahmad I (2022) An energy-aware application module for the fog-based internet of military things. Discov Intern Things 2(1):4 Bichi BY, Islam SU, Kademi AM, Ahmad I (2022) An energy-aware application module for the fog-based internet of military things. Discov Intern Things 2(1):4
22.
go back to reference Limkar SV, Jha RK (2019) A novel method for parallel indexing of real time geospatial big data generated by iot devices. Fut Generat Comput Syst 97:433–452CrossRef Limkar SV, Jha RK (2019) A novel method for parallel indexing of real time geospatial big data generated by iot devices. Fut Generat Comput Syst 97:433–452CrossRef
23.
go back to reference MacEachren AM, Robinson A, Hopper S, Gardner S, Murray R, Gahegan M, Hetzler E (2005) Visualizing geospatial information uncertainty: What we know and what we need to know. Cartogr Geogr Inf Sci 32(3):139–160CrossRef MacEachren AM, Robinson A, Hopper S, Gardner S, Murray R, Gahegan M, Hetzler E (2005) Visualizing geospatial information uncertainty: What we know and what we need to know. Cartogr Geogr Inf Sci 32(3):139–160CrossRef
24.
go back to reference Yang C, Yu M, Hu F, Jiang Y, Li Y (2017) Utilizing cloud computing to address big geospatial data challenges. Comput Environ Urban Syst 61:120–128CrossRef Yang C, Yu M, Hu F, Jiang Y, Li Y (2017) Utilizing cloud computing to address big geospatial data challenges. Comput Environ Urban Syst 61:120–128CrossRef
25.
go back to reference Dulík M, Junior MD (2016) Security in military cloud computing applications. Sci Milit J. 11(1):26 Dulík M, Junior MD (2016) Security in military cloud computing applications. Sci Milit J. 11(1):26
26.
go back to reference Chakravarthy M Hemanth, Kannan E, Belinda MJ Carmel Mary (2019) A hybrid routing protocol towards secure and smart military applications in cloud environments. In Novel Practices and Trends in Grid and Cloud Computing, pages 234–248. IGI Global Chakravarthy M Hemanth, Kannan E, Belinda MJ Carmel Mary (2019) A hybrid routing protocol towards secure and smart military applications in cloud environments. In Novel Practices and Trends in Grid and Cloud Computing, pages 234–248. IGI Global
27.
go back to reference Thangadurai K, Devi G Sudha (2014) An analysis of lsb based image steganography techniques. In 2014 International Conference on Computer Communication and Informatics, pages 1–4. IEEE Thangadurai K, Devi G Sudha (2014) An analysis of lsb based image steganography techniques. In 2014 International Conference on Computer Communication and Informatics, pages 1–4. IEEE
28.
go back to reference Hemanth H, Hrutish Ram VS, Raghavendran S Guru, Subhashini N (2022) Modified lsb algorithm using xor for audio steganography. In: Sustainable Advanced Computing: Select Proceedings of ICSAC 2021, pages 369–379. Springer Hemanth H, Hrutish Ram VS, Raghavendran S Guru, Subhashini N (2022) Modified lsb algorithm using xor for audio steganography. In: Sustainable Advanced Computing: Select Proceedings of ICSAC 2021, pages 369–379. Springer
29.
go back to reference Rhoads GB (July 24 2001) Audio or video steganography. US Patent 6,266,430 Rhoads GB (July 24 2001) Audio or video steganography. US Patent 6,266,430
30.
go back to reference Huang CM, Lan KC, Tsai CZ (2008) A survey of opportunistic networks. In :22nd International Conference on Advanced Information Networking and Applications-Workshops (aina workshops 2008), pages 1672–1677. IEEE Huang CM, Lan KC, Tsai CZ (2008) A survey of opportunistic networks. In :22nd International Conference on Advanced Information Networking and Applications-Workshops (aina workshops 2008), pages 1672–1677. IEEE
31.
go back to reference Karatzoglou A, Schnell N, Beigl M (2018) A convolutional neural network approach for modeling semantic trajectories and predicting future locations. In: International Conference on Artificial Neural Networks, 61–72. Springer Karatzoglou A, Schnell N, Beigl M (2018) A convolutional neural network approach for modeling semantic trajectories and predicting future locations. In: International Conference on Artificial Neural Networks, 61–72. Springer
32.
go back to reference Liu W, Wang Z, Liu X, Zeng N, Liu YY, Alsaadi Fuad E (2017) A survey of deep neural network architectures and their applications. Neurocomputing 234:11–26CrossRef Liu W, Wang Z, Liu X, Zeng N, Liu YY, Alsaadi Fuad E (2017) A survey of deep neural network architectures and their applications. Neurocomputing 234:11–26CrossRef
33.
go back to reference Liu Q, Wu S, Wang L, Tan T (2016) Predicting the next location: a recurrent model with spatial and temporal contexts. In: Thirtieth AAAI conference on artificial intelligence Liu Q, Wu S, Wang L, Tan T (2016) Predicting the next location: a recurrent model with spatial and temporal contexts. In: Thirtieth AAAI conference on artificial intelligence
34.
go back to reference Ghosh S, Mukherjee A (2022) Strove: Spatial data infrastructure enabled cloud–fog–edge computing framework for combating covid-19 pandemic. Innov Syst Softw Eng 1–17 Ghosh S, Mukherjee A (2022) Strove: Spatial data infrastructure enabled cloud–fog–edge computing framework for combating covid-19 pandemic. Innov Syst Softw Eng 1–17
35.
go back to reference Gupta H, Vahid DA, Ghosh SK, Buyya R (2017) ifogsim: A toolkit for modeling and simulation of resource management techniques in the internet of things, edge and fog computing environments. Softw Pract Exp 47(9):1275–1296 Gupta H, Vahid DA, Ghosh SK, Buyya R (2017) ifogsim: A toolkit for modeling and simulation of resource management techniques in the internet of things, edge and fog computing environments. Softw Pract Exp 47(9):1275–1296
Metadata
Title
Mobi-Sense: mobility-aware sensor-fog paradigm for mission-critical applications using network coding and steganography
Authors
Anwesha Mukherjee
Shreya Ghosh
Soumya K. Ghosh
Rajkumar Buyya
Publication date
08-05-2023
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 15/2023
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05300-5

Other articles of this Issue 15/2023

The Journal of Supercomputing 15/2023 Go to the issue

Premium Partner