Secure Computing for Fog-Enabled Industrial IoT.

Sensors (Basel)

Information Systems Department, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia.

Published: March 2024

Smart cities are powered by several new technologies to enhance connectivity between devices and develop a network of connected objects which can lead to many smart industrial applications. This network known as the Industrial Internet of Things (IIoT) consists of sensor nodes that have limited computing capacity and are sometimes not able to execute intricate industrial tasks within their stipulated time frame. For faster execution, these tasks are offloaded to nearby fog nodes. Internet access and the diverse nature of network types make IIoT nodes vulnerable and are under serious malicious attacks. Malicious attacks can cause anomalies in the IIoT network by overloading complex tasks, which can compromise the fog processing capabilities. This results in an increased delay of task computation for trustworthy nodes. To improve the task execution capability of the fog computing node, it is important to avoid complex offloaded tasks due to malicious attacks. However, even after avoiding the malicious tasks, if the offloaded tasks are too complex for the fog node to execute, then the fog nodes may struggle to process all legitimate tasks within their stipulated time frame. To address these challenges, the Trust-based Efficient Execution of Offloaded IIoT Trusted tasks (EEOIT) is proposed for fog nodes. EEOIT proposes a mechanism to detect malicious nodes as well as manage the allocation of computing resources so that IIoT tasks can be completed in the specified time frame. Simulation results demonstrate that EEOIT outperforms other techniques in the literature in an IIoT setting with different task densities. Another significant feature of the proposed EEOIT technique is that it enhances the computation of trustable tasks in the network. The results show that EEOIT entertains more legitimate nodes in executing their offloaded tasks with more executed data, with reduced time and with increased mean trust values as compared to other schemes.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11014071PMC
http://dx.doi.org/10.3390/s24072098DOI Listing

Publication Analysis

Top Keywords

time frame
12
fog nodes
12
malicious attacks
12
offloaded tasks
12
tasks
11
nodes
8
tasks stipulated
8
stipulated time
8
tasks offloaded
8
iiot
6

Similar Publications

Effect of intramuscular treatment with different iron dextran dosages and non-inferiority study to gleptoferron.

Acta Vet Scand

January 2025

Department of Veterinary and Animal Sciences, Faculty of Health and Medical Sciences, University of Copenhagen, Grønnegårdsvej 2, 1870, Frederiksberg C, Denmark.

Background: Prevention of iron deficiency in suckling piglets by intramuscular injection of a standardized amount of iron dextran or gleptoferron in the first days of life can lead to over- or underdosage with respective health risks. Currently, combined iron products containing an active substance against coccidia are also used on farms. When using a combination product targeting two diseases, an adjustment of the necessary amount of iron to prevent anaemia in the frame of a farm-specific treatment protocol is not possible.

View Article and Find Full Text PDF

This study used Raman and near-infrared (NIR) spectroscopy to monitor small real-time changes in powder blends and tablets in low-dose pharmaceutical formulations. The research aims to enhance process analytical technology (PAT) in pharmaceutical manufacturing, ensuring high-quality and uniform products with applications to produce drugs with narrow therapeutic indices (NTI). The study utilizes Raman and NIR spatially resolved spectroscopy (SRS) techniques to monitor a moderate cohesive material's active pharmaceutical ingredient (API) concentrations during manufacturing.

View Article and Find Full Text PDF

Background: Respiratory motion during radiotherapy (RT) may reduce the therapeutic effect and increase the dose received by organs at risk. This can be addressed by real-time tracking, where respiration motion prediction is currently required to compensate for system latency in RT systems. Notably, for the prediction of future images in image-guided adaptive RT systems, the use of deep learning has been considered.

View Article and Find Full Text PDF

Simulating success: Applying EPA assessments to simulation in surgical education.

Surgery

January 2025

Department of Surgery, Heersink School of Medicine, University of Alabama at Birmingham, Birmingham, AL. Electronic address:

Entrustable professional activities are a competency-based evaluation framework which was deployed by the American Board of Surgery in 2023 to evaluate general surgical residents and provide a path to independent practice. Entrustable professional activity microassessments are based on 18 conditions which are core to being a practicing general surgeon, and most include multiple phases of care, such as preoperative care, intraoperative care, and postoperative care. These evaluations are an amalgam of all the clinical competencies, including medical knowledge and patient care skills.

View Article and Find Full Text PDF

The tedious synthesis and limited throughput biological evaluation remain a great challenge for discovering new proteolysis targeting chimera (PROTAC). To rapidly identify potential PROTAC lead compounds, we report a platform named Auto-RapTAC. Based on the modular characteristic of the PROTAC molecule, a streamlined workflow that integrates lab automation with "click chemistry" joint building-block libraries was constructed.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!