Abstract
The rapid advancement in information and communication technology has revolutionized military departments and their operations. This advancement also gave birth to the idea of the Internet of Battlefield Things (IoBT). The IoBT refers to the fusion of the Internet of Things (IoT) with military operations on the battlefield. Various IoBT-based frameworks have been developed for the military. Nonetheless, many of these frameworks fail to maintain a high Quality of Service (QoS) due to the demanding and critical nature of IoBT. This study makes the use of mist computing while leveraging machine learning. Mist computing places computational capabilities on the edge itself (mist nodes), e.g., on end devices, wearables, sensors, and micro-controllers. This way, mist computing not only decreases latency but also saves power consumption and bandwidth as well by eliminating the need to communicate all data acquired, produced, or sensed. A mist-based version of the IoTNetWar framework is also proposed in this study. The mist-based IoTNetWar framework is a four-layer structure that aims at decreasing latency while maintaining QoS. Additionally, to further minimize delays, mist nodes utilize machine learning. Specifically, they use the delay-based K nearest neighbour algorithm for device-to-device communication purposes. The primary research objective of this work is to develop a system that is not only energy, time, and bandwidth-efficient, but it also helps military organizations with time-critical and resources-critical scenarios to monitor troops. By doing so, the system improves the overall decision-making process in a military campaign or battle. The proposed work is evaluated with the help of simulations in the EdgeCloudSim. The obtained results indicate that the proposed framework can achieve decreased network latency of 0.01 s and failure rate of 0.25% on average while maintaining high QoS in comparison to existing solutions.
- Fariha Afsana, Md Asif-Ur-Rahman, Muhammad R. Ahmed, Mufti Mahmud, and M. Shamim Kaiser. 2018. An energy conserving routing scheme for wireless body sensor nanonetwork communication. IEEE Access 6 (2018), 9186–9200.Google ScholarCross Ref
- Bengt Ahlgren, Pedro A. Aranda, Prosper Chemouil, Sara Oueslati, Luis M. Correia, Holger Karl, Michael Söllner, and Annikki Welin. 2011. Content, connectivity, and cloud: Ingredients for the network of the future. IEEE Commun. Mag. 49, 7 (2011), 62–70.Google ScholarCross Ref
- Wajahat Ali, Ikram Ud Din, Ahmad Almogren, Mohsen Guizani, and Mansour Zuair. 2020. A lightweight privacy-aware IoT-based metering scheme for smart industrial ecosystems. IEEE Trans. Industr. Inf. 1, 1 (2020), 1–1.Google Scholar
- Md Asif-Ur-Rahman, Fariha Afsana, Mufti Mahmud, M. Shamim Kaiser, Muhammad R. Ahmed, Omprakash Kaiwartya, and Anne James-Taylor. 2018. Towards a heterogeneous mist, fog, and cloud based framework for the Internet of Healthcare Things. IEEE IoT J. 6, 3 (2018), 4049–4062.Google Scholar
- Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Mohsen Guizani, and Sonia Khan. 2020. StabTrust—A stable and centralized trust-based clustering mechanism for IoT enabled vehicular ad-hoc networks. IEEE Access 8 (2020), 21159–21177.Google ScholarCross Ref
- Rabindra K. Barik, Amaresh Chandra Dubey, Ankita Tripathi, T. Pratik, Sapna Sasane, Rakesh K. Lenka, Harishchandra Dubey, Kunal Mankodiya, and Vinay Kumar. 2018. Mist data: Leveraging mist computing for secure and scalable architecture for smart and connected health. Proc. Comput. Sci. 125 (2018), 647–653.Google ScholarCross Ref
- Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the internet of things. In Proceedings of the 1st MCC Workshop on Mobile Cloud Computing, Vol. 1. ACM, 13–16. Google ScholarDigital Library
- Arne Bröring, Stefan Schmid, Corina-Kim Schindhelm, Abdelmajid Khelil, Sebastian Käbisch, Denis Kramer, Danh Le Phuoc, Jelena Mitic, Darko Anicic, and Ernest Teniente. 2017. Enabling IoT ecosystems through platform interoperability. IEEE Softw. 34, 1 (2017), 54–61. Google ScholarDigital Library
- Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, César A. F. De Rose, and Rajkumar Buyya. 2011. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw.: Pract. Exp. 41, 1 (2011), 23–50. Google ScholarDigital Library
- Louis Columbus. 2016. Roundup of internet of things forecasts and market estimates, 2016. Forbes Magazine. Retrieved fromhttps://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-ofinternet-of-things-forecasts-and-market-estimates-2016/#81d22e292d51.Google Scholar
- Padraig Cunningham and Sarah Jane Delany. 2007. k-Nearest neighbour classifiers. Mult. Classif. Syst. 34, 8 (2007), 1–17.Google Scholar
- Amir Vahid Dastjerdi and Rajkumar Buyya. 2016. Fog computing: Helping the Internet of Things realize its potential. Computer 49, 8 (2016), 112–116. Google ScholarDigital Library
- Flavia C. Delicato, Paulo F. Pires, Thais Batista, Everton Cavalcante, Bruno Costa, and Thomaz Barros. 2013. Towards an IoT ecosystem. In Proceedings of the 1st International Workshop on Software Engineering for Systems-of-Systems, Vol. 34. ACM, 25–28. Google ScholarDigital Library
- Jyoti Deogirikar and Amarsinh Vidhate. 2017. Security attacks in IoT: A survey. In Proceedings of the 2017 International Conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC’17). IEEE, 32–37.Google ScholarCross Ref
- Manuel Díaz, Cristian Martín, and Bartolomé Rubio. 2016. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. J. Netw. Comput. Appl. 67 (2016), 99–117. Google ScholarDigital Library
- Ikram Ud Din, Ahmad Almogren, Mohsen Guizani, and Mansour Zuair. 2019. A decade of Internet of Things: Analysis in the light of healthcare applications. IEEE Access 7 (2019), 89967–89979.Google ScholarCross Ref
- Ikram Ud Din, Mohsen Guizani, Suhaidi Hassan, Byung-Seo Kim, Muhammad Khurram Khan, Mohammed Atiquzzaman, and Syed Hassan Ahmed. 2018. The Internet of Things: A review of enabled technologies and future challenges. IEEE Access 7 (2018), 7606–7640.Google ScholarCross Ref
- Ikram Ud Din, Mohsen Guizani, Joel J. P. C. Rodrigues, Suhaidi Hassan, and Valery V. Korotaev. 2019. Machine learning in the Internet of Things: Designed techniques for smart cities. Fut. Gener. Comput. Syst. 100 (2019), 826–843.Google ScholarDigital Library
- Koustabh Dolui and Soumya Kanti Datta. 2017. Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In Proceedings of the 2017 Global Internet of Things Summit (GIoTS’17). IEEE, , 1–6.Google ScholarCross Ref
- Miroslav Dulík and Miroslav Dulík Junior. 2016. Security in military cloud computing applications. Sci. Mil. J. 11, 1 (2016), 26.Google Scholar
- Dave Evans. 2011. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, Cisco Independent Business Scientific Group White paper, Apr. 2011; 1–11. www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdfGoogle Scholar
- Wei Fan and Albert Bifet. 2013. Mining big data: Current status, and forecast to the future. ACM sIGKDD Explor. Newslett. 14, 2 (2013), 1–5. Google ScholarDigital Library
- Giancarlo Fortino, Mukaddim Pathan, and Giuseppe Di Fatta. 2012. BodyCloud: Integration of cloud computing and body sensor networks. In Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings. IEEE, 851–856. Google ScholarDigital Library
- Paula Fraga-Lamas, Tiago Fernández-Caramés, Manuel Suárez-Albela, Luis Castedo, and Miguel González-López. 2016. A review on internet of things for defense and public safety. Sensors 16, 10 (2016), 1644.Google ScholarCross Ref
- Kerim Goztepe, Ismet Cehreli, and S. Eyup Sensoy. 2013. A decision framework for combat cloud computing strategy. In Proceedings of the 6th International Information Security & Cryptology Conference, Vol. 9. Bildiriler Kitabı, Ankara, Turkey, 28–31.Google Scholar
- Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29, 7 (2013), 1645–1660. Google ScholarDigital Library
- Monika Gupta. 2017. Fog computing pushing intelligence to the edge. Int. J. Sci. Technol. Eng. 3, 8 (2017), 42–46.Google Scholar
- İsmail Güvenç, Ozgur Ozdemir, Yavuz Yapici, Hani Mehrpouyan, and David Matolak. 2017. Detection, localization, and tracking of unauthorized UAS and jammers. In Proceedings of the 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC’17). IEEE, 1–10.Google ScholarCross Ref
- Peter Hart. 1968. The condensed nearest neighbor rule (Corresp.). IEEE Trans. Inf. Theory 14, 3 (1968), 515–516. Google ScholarDigital Library
- Khalid Haseeb, Ahmad Almogren, Ikram Ud Din, Naveed Islam, and Ayman Altameem. 2020. SASC: Secure and authentication-based sensor cloud architecture for intelligent Internet of Things. Sensors 20, 9 (2020), 2468.Google ScholarCross Ref
- Khalid Haseeb, Ikram Ud Din, Ahmad Almogren, and Naveed Islam. 2020. An energy efficient and secure IoT-based WSN framework: An application to smart agriculture. Sensors 20, 7 (2020), 2081.Google ScholarCross Ref
- Cheng Huang, Rongxing Lu, and Kim-Kwang Raymond Choo. 2017. Vehicular fog computing: Architecture, use case, and security and forensic challenges. IEEE Commun. Mag. 55, 11 (2017), 105–111.Google ScholarCross Ref
- Naveed Islam, Yasir Faheem, Ikram Ud Din, Muhammad Talha, Mohsen Guizani, and Mudassir Khalil. 2019. A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services. Fut. Gener. Comput. Syst. 100 (2019), 569–578.Google ScholarDigital Library
- Naveed Islam, Khalid Haseeb, Ahmad Almogren, Ikram Ud Din, Mohsen Guizani, and Ayman Altameem. 2019. A framework for topological based map building: A solution to autonomous robot navigation in smart cities. Fut. Gener. Comput. Syst. 100 (10 2019), 1–24. DOI:https://doi.org/10.1016/j.future.2019.10.036Google Scholar
- Bilal Jan, Haleem Farman, Murad Khan, Muhammad Talha, and Ikram Ud Din. 2019. Designing a smart transportation system: An Internet of Things and big data approach. IEEE Wireless Commun. 26, 4 (2019), 73–79.Google ScholarDigital Library
- Frank T Johnsen, Zbigniew Zieliński, Konrad Wrona, Niranjan Suri, Christoph Fuchs, Manas Pradhan, Janusz Furtak, Bogdan Vasilache, Vincenzo Pellegrini, Michał Dyk, et al. 2018. Application of IoT in military operations in a smart city. In Proceedings of the 2018 International Conference on Military Communications and Information Systems (ICMCIS’18). IEEE, 1–8.Google ScholarCross Ref
- Siddhesh P. Karekar and Sachin M. Vaidya. 2015. Perspective of decoy technique using mobile fog computing with effect to wireless environment. Int. J. Sci. Eng. Technol. Res. 4, 14 (2015), 2620–2626.Google Scholar
- Shah Rukh Khan, Misba Sikandar, Ahmad Almogren, Ikram [Ud Din], Antonio Guerrieri, and Giancarlo Fortino. 2020. IoMT-based computational approach for detecting brain tumor. Fut. Gener. Comput. Syst. 109 (2020), 360–367. DOI:https://doi.org/10.1016/j.future.2020.03.054Google ScholarCross Ref
- Hasan Ali Khattak, Hafsa Arshad, Saif ul Islam, Ghufran Ahmed, Sohail Jabbar, Abdullahi Mohamud Sharif, and Shehzad Khalid. 2019. Utilization and load balancing in fog servers for health applications. EURASIP J. Wireless Commun. Netw. 2019, 1 (2019), 91.Google ScholarCross Ref
- Georgios Kontaxis, Michalis Polychronakis, and Angelos D. Keromytis. 2014. Computational decoys for cloud security. In Secure Cloud Computing. Springer, New York, NY, 261–270.Google Scholar
- Alexander Kott, Ananthram Swami, and Bruce J. West. 2016. The internet of battle things. Computer 49, 12 (2016), 70–75. Google ScholarDigital Library
- Neeraj Kumar, Naveen Chilamkurti, and Subhas C. Misra. 2015. Bayesian coalition game for the internet of things: An ambient intelligence-based evaluation. IEEE Commun. Mag. 53, 1 (2015), 48–55.Google ScholarDigital Library
- Neeraj Kumar, Manoj Kumar, and R. B. Patel. 2011. Capacity and interference aware link scheduling with channel assignment in wireless mesh networks. J. Netw. Comput. Appl. 34, 1 (2011), 30–38. Google ScholarDigital Library
- Neeraj Kumar, Sudip Misra, Joel J. P. C. Rodrigues, and Mohammad S. Obaidat. 2015. Coalition games for spatio-temporal big data in Internet of Vehicles environment: A comparative analysis. IEEE IoT J. 2, 4 (2015), 310–320.Google Scholar
- Neeraj Kumar, Athanasios V. Vasilakos, and Joel J. P. C. Rodrigues. 2017. A multi-tenant cloud-based DC nano grid for self-sustained smart buildings in smart cities. IEEE Commun. Mag. 55, 3 (2017), 14–21. Google ScholarDigital Library
- Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Michele Maasberg, and Kim-Kwang Raymond Choo. 2018. Multimedia big data computing and Internet of Things applications: A taxonomy and process model. J. Netw. Comput. Appl. 124 (2018), 169–195.Google ScholarCross Ref
- Divya Lanka, Ch Lakshmi Veenadhari, and D. Suryanarayana. 2017. Application of fog computing in military operations. Int. J. Comput. Appl. 975 (2017), 8887.Google Scholar
- Chao Lin, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Alexey Vinel, and Xinyi Huang. 2018. Security and privacy for the internet of drones: Challenges and solutions. IEEE Commun. Mag. 56, 1 (2018), 64–69.Google ScholarCross Ref
- Ying-Dar Lin and Yu-Ching Hsu. 2000. Multihop cellular: A new architecture for wireless communications. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’00), Vol. 3. IEEE, 1273–1282.Google Scholar
- Niall J. MacKay. 2006. Lanchester combat models. Bull. Inst. Math. Appl. 42, 170 (2006), 1–8.Google Scholar
- Duncan McFarlane. 2015. The Origin of the Internet of Things. Retrieved from https://www.redbite.com/the-origin-of-the-internet-of-things/.Google Scholar
- Donald Michie, David J. Spiegelhalter, C. C. Taylor, et al. 1994. Machine learning. Neural Stat. Class. 13 (1994), 19–22.Google Scholar
- Manas Pradhan, Filippo Poltronieri, and Mauro Tortonesi. 2019. Generic architecture for edge computing based on SPF for military HADR operations. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT’19). IEEE, 225–230.Google ScholarCross Ref
- Jürgo S. Preden, Kalle Tammemäe, Axel Jantsch, Mairo Leier, Andri Riid, and Emine Calis. 2015. The benefits of self-awareness and attention in fog and mist computing. Computer 48, 7 (2015), 37–45.Google ScholarDigital Library
- Poonam N. Railkar, Sandesh Mahamure, and Parikshit N. Mahalle. 2012. Application security using blockchain in cyber physical system. CSI Commun. 41, 9 (2012), 25–28.Google Scholar
- Partha Pratim Ray. 2015. Towards an internet of things based architectural framework for defence. In Proceedings of the 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT’15). IEEE, 411–416.Google ScholarCross Ref
- J. Mounika Reddy and J. Mary Monika. 2012. Integrate military with distributed cloud computing and secure virtualization. In Proceedings of the 2012 SC Companion: High Performance Computing, Networking Storage and Analysis. IEEE, 1200–1206. Google ScholarDigital Library
- Giulio Riberto, Marco Govoni, Cesare Stefanelli, Niranjan Suri, and Mauro Tortonesi. 2018. Leveraging civilian IoT infrastructures to support warfighting activities in urban environments. In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT’18). IEEE, 118–123.Google ScholarCross Ref
- Daniel Rozas-Vásquez, Christine Fürst, Davide Geneletti, and Osvaldo Almendra. 2018. Integration of ecosystem services in strategic environmental assessment across spatial planning scales. Land Use Policy 71 (2018), 303–310.Google ScholarCross Ref
- Philip Russom et al. 2011. Big data analytics. TDWI Best Pract. Rep. Fourth Quart. 19, 4 (2011), 1–34.Google Scholar
- Miguel Sánchez and Pietro Manzoni. 2001. ANEJOS: A java based simulator for ad hoc networks. Fut. Gener. Comput. Syst. 17, 5 (2001), 573–583. Google ScholarDigital Library
- Ichiro Satoh. 2013. A framework for data processing at the edges of networks. In Proceedings of the International Conference on Database and Expert Systems Applications. Springer, Berlin, 304–318.Google ScholarCross Ref
- Ayesha Siddiqua, Munam Ali Shah, Hasan Ali Khattak, Ikram [Ud Din], and Mohsen Guizani. 2019. iCAFE: Intelligent congestion avoidance and fast emergency services. Fut. Gener. Comput. Syst. 99 (2019), 365–375. DOI:https://doi.org/10.1016/j.future.2019.04.023Google ScholarDigital Library
- Misba Sikarndar, Waqas Anwar, Ahmad Almogren, Ikram Ud Din, and Nadra Guizani. 2020. IoMT-based association rule mining for the prediction of human protein complexes. IEEE Access 8 (2020), 6226–6237.Google ScholarCross Ref
- Dhananjay Singh, Gaurav Tripathi, Antonio M. Alberti, and Antonio Jara. 2017. Semantic edge computing and IoT architecture for military health services in battlefield. In Proceedings of the 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC’17). IEEE, 185–190.Google ScholarDigital Library
- Suresh Singh, Mike Woo, and Cauligi S. Raghavendra. 1998. Power-aware routing in mobile ad hoc networks. In Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking. ACM, 181–190. Google ScholarDigital Library
- Cagatay Sonmez, Atay Ozgovde, and Cem Ersoy. 2017. Performance evaluation of single-tier and two-tier cloudlet assisted applications. In Proceedings of the 2017 IEEE International Conference on Communications Workshops (ICC’17 Workshops). IEEE, 302–307.Google ScholarCross Ref
- Cagatay Sonmez, Atay Ozgovde, and Cem Ersoy. 2018. Edgecloudsim: An environment for performance evaluation of edge computing systems. Trans. Emerg. Telecommun. Technol. 29, 11 (2018), e3493.Google ScholarDigital Library
- Manuel Suárez-Albela, Paula Fraga-Lamas, and Tiago M. Fernández-Caramés. 2018. A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices. Sensors 18, 11 (2018), 3868.Google ScholarCross Ref
- Niranjan Suri, Mauro Tortonesi, James Michaelis, Peter Budulas, Giacomo Benincasa, Stephen Russell, Cesare Stefanelli, and Robert Winkler. 2016. Analyzing the applicability of internet of things to the battlefield environment. In Proceedings of the 2016 International Conference on Military Communications and Information Systems (ICMCIS’16). IEEE, 1–8.Google ScholarCross Ref
- Asfa Toor, Saif ul Islam, Nimra Sohail, Adnan Akhunzada, Jalil Boudjadar, Hasan Ali Khattak, Ikram Ud Din, and Joel J. P. C. Rodrigues. 2019. Energy and performance aware fog computing: A case of DVFS and green renewable energy. Fut. Gener. Comput. Syst. 101 (2019), 1112–1121. DOI:https://doi.org/10.1016/j.future.2019.07.010Google ScholarDigital Library
- Ubaid Ullah, Anwar Khan, Mahdi Zareei, Ihsan Ali, Hasan Ali Khattak, and Ikram Ud Din. 2019. Energy-effective cooperative and reliable delivery routing protocols for underwater wireless sensor networks. Energies 12, 13 (2019), 2630.Google ScholarCross Ref
- Yiming Wang, Zhiyuan Ren, Hailin Zhang, Xiangwang Hou, and Yao Xiao. 2018. “Combat Cloud-Fog” network architecture for Internet of Battlefield Things and load balancing technology. In Proceedings of the 2018 IEEE International Conference on Smart Internet of Things (SmartIoT’18). IEEE, 263–268.Google ScholarCross Ref
- Peter Wittek and Xavier Rubio-Campillo. 2012. Military reconstructive simulation in the cloud to aid battlefield excavations. In Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings. IEEE, 869–874. Google ScholarDigital Library
- Xindong Wu, Xingquan Zhu, Gong-Qing Wu, and Wei Ding. 2013. Data mining with big data. IEEE Trans. Knowl. Data Eng. 26, 1 (2013), 97–107. Google ScholarDigital Library
- Manas Kumar Yogi, K. Chandrasekhar, and G. Vijay Kumar. 2017. Mist computing: Principles, trends and future direction. SSRG Int. J. Comput. Sci. Eng. 4, 7 (2017), 19–21.Google ScholarCross Ref
Index Terms
- Machine Learning-based Mist Computing Enabled Internet of Battlefield Things
Recommendations
Cloud, Fog, or Mist in IoT? That Is the Question
Special Issue on Fog, Edge, and Cloud IntegrationInternet of Things (IoT) has been commercially explored as Platforms as a Services (PaaS). The standard solution for this kind of service is to combine the Cloud computing infrastructure with IoT software, services, and protocols also known as CoT (...
All one needs to know about fog computing and related edge computing paradigms: A complete survey
AbstractWith the Internet of Things (IoT) becoming part of our daily life and our environment, we expect rapid growth in the number of connected devices. IoT is expected to connect billions of devices and humans to bring promising advantages ...
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy
AbstractCloud computing offers Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) to provide compute, network, and storage capabilities to the clients utilizing the pay-per-use model. On the ...
Comments