skip to main content
research-article

Machine Learning-based Mist Computing Enabled Internet of Battlefield Things

Authors Info & Claims
Published:01 September 2021Publication History
Skip Abstract Section

Abstract

The rapid advancement in information and communication technology has revolutionized military departments and their operations. This advancement also gave birth to the idea of the Internet of Battlefield Things (IoBT). The IoBT refers to the fusion of the Internet of Things (IoT) with military operations on the battlefield. Various IoBT-based frameworks have been developed for the military. Nonetheless, many of these frameworks fail to maintain a high Quality of Service (QoS) due to the demanding and critical nature of IoBT. This study makes the use of mist computing while leveraging machine learning. Mist computing places computational capabilities on the edge itself (mist nodes), e.g., on end devices, wearables, sensors, and micro-controllers. This way, mist computing not only decreases latency but also saves power consumption and bandwidth as well by eliminating the need to communicate all data acquired, produced, or sensed. A mist-based version of the IoTNetWar framework is also proposed in this study. The mist-based IoTNetWar framework is a four-layer structure that aims at decreasing latency while maintaining QoS. Additionally, to further minimize delays, mist nodes utilize machine learning. Specifically, they use the delay-based K nearest neighbour algorithm for device-to-device communication purposes. The primary research objective of this work is to develop a system that is not only energy, time, and bandwidth-efficient, but it also helps military organizations with time-critical and resources-critical scenarios to monitor troops. By doing so, the system improves the overall decision-making process in a military campaign or battle. The proposed work is evaluated with the help of simulations in the EdgeCloudSim. The obtained results indicate that the proposed framework can achieve decreased network latency of 0.01 s and failure rate of 0.25% on average while maintaining high QoS in comparison to existing solutions.

References

  1. Fariha Afsana, Md Asif-Ur-Rahman, Muhammad R. Ahmed, Mufti Mahmud, and M. Shamim Kaiser. 2018. An energy conserving routing scheme for wireless body sensor nanonetwork communication. IEEE Access 6 (2018), 9186–9200.Google ScholarGoogle ScholarCross RefCross Ref
  2. Bengt Ahlgren, Pedro A. Aranda, Prosper Chemouil, Sara Oueslati, Luis M. Correia, Holger Karl, Michael Söllner, and Annikki Welin. 2011. Content, connectivity, and cloud: Ingredients for the network of the future. IEEE Commun. Mag. 49, 7 (2011), 62–70.Google ScholarGoogle ScholarCross RefCross Ref
  3. Wajahat Ali, Ikram Ud Din, Ahmad Almogren, Mohsen Guizani, and Mansour Zuair. 2020. A lightweight privacy-aware IoT-based metering scheme for smart industrial ecosystems. IEEE Trans. Industr. Inf. 1, 1 (2020), 1–1.Google ScholarGoogle Scholar
  4. Md Asif-Ur-Rahman, Fariha Afsana, Mufti Mahmud, M. Shamim Kaiser, Muhammad R. Ahmed, Omprakash Kaiwartya, and Anne James-Taylor. 2018. Towards a heterogeneous mist, fog, and cloud based framework for the Internet of Healthcare Things. IEEE IoT J. 6, 3 (2018), 4049–4062.Google ScholarGoogle Scholar
  5. Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Mohsen Guizani, and Sonia Khan. 2020. StabTrust—A stable and centralized trust-based clustering mechanism for IoT enabled vehicular ad-hoc networks. IEEE Access 8 (2020), 21159–21177.Google ScholarGoogle ScholarCross RefCross Ref
  6. Rabindra K. Barik, Amaresh Chandra Dubey, Ankita Tripathi, T. Pratik, Sapna Sasane, Rakesh K. Lenka, Harishchandra Dubey, Kunal Mankodiya, and Vinay Kumar. 2018. Mist data: Leveraging mist computing for secure and scalable architecture for smart and connected health. Proc. Comput. Sci. 125 (2018), 647–653.Google ScholarGoogle ScholarCross RefCross Ref
  7. Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the internet of things. In Proceedings of the 1st MCC Workshop on Mobile Cloud Computing, Vol. 1. ACM, 13–16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Arne Bröring, Stefan Schmid, Corina-Kim Schindhelm, Abdelmajid Khelil, Sebastian Käbisch, Denis Kramer, Danh Le Phuoc, Jelena Mitic, Darko Anicic, and Ernest Teniente. 2017. Enabling IoT ecosystems through platform interoperability. IEEE Softw. 34, 1 (2017), 54–61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, César A. F. De Rose, and Rajkumar Buyya. 2011. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw.: Pract. Exp. 41, 1 (2011), 23–50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Louis Columbus. 2016. Roundup of internet of things forecasts and market estimates, 2016. Forbes Magazine. Retrieved fromhttps://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-ofinternet-of-things-forecasts-and-market-estimates-2016/#81d22e292d51.Google ScholarGoogle Scholar
  11. Padraig Cunningham and Sarah Jane Delany. 2007. k-Nearest neighbour classifiers. Mult. Classif. Syst. 34, 8 (2007), 1–17.Google ScholarGoogle Scholar
  12. Amir Vahid Dastjerdi and Rajkumar Buyya. 2016. Fog computing: Helping the Internet of Things realize its potential. Computer 49, 8 (2016), 112–116. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Flavia C. Delicato, Paulo F. Pires, Thais Batista, Everton Cavalcante, Bruno Costa, and Thomaz Barros. 2013. Towards an IoT ecosystem. In Proceedings of the 1st International Workshop on Software Engineering for Systems-of-Systems, Vol. 34. ACM, 25–28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jyoti Deogirikar and Amarsinh Vidhate. 2017. Security attacks in IoT: A survey. In Proceedings of the 2017 International Conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC’17). IEEE, 32–37.Google ScholarGoogle ScholarCross RefCross Ref
  15. Manuel Díaz, Cristian Martín, and Bartolomé Rubio. 2016. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. J. Netw. Comput. Appl. 67 (2016), 99–117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ikram Ud Din, Ahmad Almogren, Mohsen Guizani, and Mansour Zuair. 2019. A decade of Internet of Things: Analysis in the light of healthcare applications. IEEE Access 7 (2019), 89967–89979.Google ScholarGoogle ScholarCross RefCross Ref
  17. Ikram Ud Din, Mohsen Guizani, Suhaidi Hassan, Byung-Seo Kim, Muhammad Khurram Khan, Mohammed Atiquzzaman, and Syed Hassan Ahmed. 2018. The Internet of Things: A review of enabled technologies and future challenges. IEEE Access 7 (2018), 7606–7640.Google ScholarGoogle ScholarCross RefCross Ref
  18. Ikram Ud Din, Mohsen Guizani, Joel J. P. C. Rodrigues, Suhaidi Hassan, and Valery V. Korotaev. 2019. Machine learning in the Internet of Things: Designed techniques for smart cities. Fut. Gener. Comput. Syst. 100 (2019), 826–843.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Koustabh Dolui and Soumya Kanti Datta. 2017. Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In Proceedings of the 2017 Global Internet of Things Summit (GIoTS’17). IEEE, , 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  20. Miroslav Dulík and Miroslav Dulík Junior. 2016. Security in military cloud computing applications. Sci. Mil. J. 11, 1 (2016), 26.Google ScholarGoogle Scholar
  21. Dave Evans. 2011. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, Cisco Independent Business Scientific Group White paper, Apr. 2011; 1–11. www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdfGoogle ScholarGoogle Scholar
  22. Wei Fan and Albert Bifet. 2013. Mining big data: Current status, and forecast to the future. ACM sIGKDD Explor. Newslett. 14, 2 (2013), 1–5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Giancarlo Fortino, Mukaddim Pathan, and Giuseppe Di Fatta. 2012. BodyCloud: Integration of cloud computing and body sensor networks. In Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings. IEEE, 851–856. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Paula Fraga-Lamas, Tiago Fernández-Caramés, Manuel Suárez-Albela, Luis Castedo, and Miguel González-López. 2016. A review on internet of things for defense and public safety. Sensors 16, 10 (2016), 1644.Google ScholarGoogle ScholarCross RefCross Ref
  25. Kerim Goztepe, Ismet Cehreli, and S. Eyup Sensoy. 2013. A decision framework for combat cloud computing strategy. In Proceedings of the 6th International Information Security & Cryptology Conference, Vol. 9. Bildiriler Kitabı, Ankara, Turkey, 28–31.Google ScholarGoogle Scholar
  26. Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29, 7 (2013), 1645–1660. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Monika Gupta. 2017. Fog computing pushing intelligence to the edge. Int. J. Sci. Technol. Eng. 3, 8 (2017), 42–46.Google ScholarGoogle Scholar
  28. İsmail Güvenç, Ozgur Ozdemir, Yavuz Yapici, Hani Mehrpouyan, and David Matolak. 2017. Detection, localization, and tracking of unauthorized UAS and jammers. In Proceedings of the 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC’17). IEEE, 1–10.Google ScholarGoogle ScholarCross RefCross Ref
  29. Peter Hart. 1968. The condensed nearest neighbor rule (Corresp.). IEEE Trans. Inf. Theory 14, 3 (1968), 515–516. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Khalid Haseeb, Ahmad Almogren, Ikram Ud Din, Naveed Islam, and Ayman Altameem. 2020. SASC: Secure and authentication-based sensor cloud architecture for intelligent Internet of Things. Sensors 20, 9 (2020), 2468.Google ScholarGoogle ScholarCross RefCross Ref
  31. Khalid Haseeb, Ikram Ud Din, Ahmad Almogren, and Naveed Islam. 2020. An energy efficient and secure IoT-based WSN framework: An application to smart agriculture. Sensors 20, 7 (2020), 2081.Google ScholarGoogle ScholarCross RefCross Ref
  32. Cheng Huang, Rongxing Lu, and Kim-Kwang Raymond Choo. 2017. Vehicular fog computing: Architecture, use case, and security and forensic challenges. IEEE Commun. Mag. 55, 11 (2017), 105–111.Google ScholarGoogle ScholarCross RefCross Ref
  33. Naveed Islam, Yasir Faheem, Ikram Ud Din, Muhammad Talha, Mohsen Guizani, and Mudassir Khalil. 2019. A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services. Fut. Gener. Comput. Syst. 100 (2019), 569–578.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Naveed Islam, Khalid Haseeb, Ahmad Almogren, Ikram Ud Din, Mohsen Guizani, and Ayman Altameem. 2019. A framework for topological based map building: A solution to autonomous robot navigation in smart cities. Fut. Gener. Comput. Syst. 100 (10 2019), 1–24. DOI:https://doi.org/10.1016/j.future.2019.10.036Google ScholarGoogle Scholar
  35. Bilal Jan, Haleem Farman, Murad Khan, Muhammad Talha, and Ikram Ud Din. 2019. Designing a smart transportation system: An Internet of Things and big data approach. IEEE Wireless Commun. 26, 4 (2019), 73–79.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Frank T Johnsen, Zbigniew Zieliński, Konrad Wrona, Niranjan Suri, Christoph Fuchs, Manas Pradhan, Janusz Furtak, Bogdan Vasilache, Vincenzo Pellegrini, Michał Dyk, et al. 2018. Application of IoT in military operations in a smart city. In Proceedings of the 2018 International Conference on Military Communications and Information Systems (ICMCIS’18). IEEE, 1–8.Google ScholarGoogle ScholarCross RefCross Ref
  37. Siddhesh P. Karekar and Sachin M. Vaidya. 2015. Perspective of decoy technique using mobile fog computing with effect to wireless environment. Int. J. Sci. Eng. Technol. Res. 4, 14 (2015), 2620–2626.Google ScholarGoogle Scholar
  38. Shah Rukh Khan, Misba Sikandar, Ahmad Almogren, Ikram [Ud Din], Antonio Guerrieri, and Giancarlo Fortino. 2020. IoMT-based computational approach for detecting brain tumor. Fut. Gener. Comput. Syst. 109 (2020), 360–367. DOI:https://doi.org/10.1016/j.future.2020.03.054Google ScholarGoogle ScholarCross RefCross Ref
  39. Hasan Ali Khattak, Hafsa Arshad, Saif ul Islam, Ghufran Ahmed, Sohail Jabbar, Abdullahi Mohamud Sharif, and Shehzad Khalid. 2019. Utilization and load balancing in fog servers for health applications. EURASIP J. Wireless Commun. Netw. 2019, 1 (2019), 91.Google ScholarGoogle ScholarCross RefCross Ref
  40. Georgios Kontaxis, Michalis Polychronakis, and Angelos D. Keromytis. 2014. Computational decoys for cloud security. In Secure Cloud Computing. Springer, New York, NY, 261–270.Google ScholarGoogle Scholar
  41. Alexander Kott, Ananthram Swami, and Bruce J. West. 2016. The internet of battle things. Computer 49, 12 (2016), 70–75. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Neeraj Kumar, Naveen Chilamkurti, and Subhas C. Misra. 2015. Bayesian coalition game for the internet of things: An ambient intelligence-based evaluation. IEEE Commun. Mag. 53, 1 (2015), 48–55.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Neeraj Kumar, Manoj Kumar, and R. B. Patel. 2011. Capacity and interference aware link scheduling with channel assignment in wireless mesh networks. J. Netw. Comput. Appl. 34, 1 (2011), 30–38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Neeraj Kumar, Sudip Misra, Joel J. P. C. Rodrigues, and Mohammad S. Obaidat. 2015. Coalition games for spatio-temporal big data in Internet of Vehicles environment: A comparative analysis. IEEE IoT J. 2, 4 (2015), 310–320.Google ScholarGoogle Scholar
  45. Neeraj Kumar, Athanasios V. Vasilakos, and Joel J. P. C. Rodrigues. 2017. A multi-tenant cloud-based DC nano grid for self-sustained smart buildings in smart cities. IEEE Commun. Mag. 55, 3 (2017), 14–21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Michele Maasberg, and Kim-Kwang Raymond Choo. 2018. Multimedia big data computing and Internet of Things applications: A taxonomy and process model. J. Netw. Comput. Appl. 124 (2018), 169–195.Google ScholarGoogle ScholarCross RefCross Ref
  47. Divya Lanka, Ch Lakshmi Veenadhari, and D. Suryanarayana. 2017. Application of fog computing in military operations. Int. J. Comput. Appl. 975 (2017), 8887.Google ScholarGoogle Scholar
  48. Chao Lin, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Alexey Vinel, and Xinyi Huang. 2018. Security and privacy for the internet of drones: Challenges and solutions. IEEE Commun. Mag. 56, 1 (2018), 64–69.Google ScholarGoogle ScholarCross RefCross Ref
  49. Ying-Dar Lin and Yu-Ching Hsu. 2000. Multihop cellular: A new architecture for wireless communications. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’00), Vol. 3. IEEE, 1273–1282.Google ScholarGoogle Scholar
  50. Niall J. MacKay. 2006. Lanchester combat models. Bull. Inst. Math. Appl. 42, 170 (2006), 1–8.Google ScholarGoogle Scholar
  51. Duncan McFarlane. 2015. The Origin of the Internet of Things. Retrieved from https://www.redbite.com/the-origin-of-the-internet-of-things/.Google ScholarGoogle Scholar
  52. Donald Michie, David J. Spiegelhalter, C. C. Taylor, et al. 1994. Machine learning. Neural Stat. Class. 13 (1994), 19–22.Google ScholarGoogle Scholar
  53. Manas Pradhan, Filippo Poltronieri, and Mauro Tortonesi. 2019. Generic architecture for edge computing based on SPF for military HADR operations. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT’19). IEEE, 225–230.Google ScholarGoogle ScholarCross RefCross Ref
  54. Jürgo S. Preden, Kalle Tammemäe, Axel Jantsch, Mairo Leier, Andri Riid, and Emine Calis. 2015. The benefits of self-awareness and attention in fog and mist computing. Computer 48, 7 (2015), 37–45.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Poonam N. Railkar, Sandesh Mahamure, and Parikshit N. Mahalle. 2012. Application security using blockchain in cyber physical system. CSI Commun. 41, 9 (2012), 25–28.Google ScholarGoogle Scholar
  56. Partha Pratim Ray. 2015. Towards an internet of things based architectural framework for defence. In Proceedings of the 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT’15). IEEE, 411–416.Google ScholarGoogle ScholarCross RefCross Ref
  57. J. Mounika Reddy and J. Mary Monika. 2012. Integrate military with distributed cloud computing and secure virtualization. In Proceedings of the 2012 SC Companion: High Performance Computing, Networking Storage and Analysis. IEEE, 1200–1206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Giulio Riberto, Marco Govoni, Cesare Stefanelli, Niranjan Suri, and Mauro Tortonesi. 2018. Leveraging civilian IoT infrastructures to support warfighting activities in urban environments. In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT’18). IEEE, 118–123.Google ScholarGoogle ScholarCross RefCross Ref
  59. Daniel Rozas-Vásquez, Christine Fürst, Davide Geneletti, and Osvaldo Almendra. 2018. Integration of ecosystem services in strategic environmental assessment across spatial planning scales. Land Use Policy 71 (2018), 303–310.Google ScholarGoogle ScholarCross RefCross Ref
  60. Philip Russom et al. 2011. Big data analytics. TDWI Best Pract. Rep. Fourth Quart. 19, 4 (2011), 1–34.Google ScholarGoogle Scholar
  61. Miguel Sánchez and Pietro Manzoni. 2001. ANEJOS: A java based simulator for ad hoc networks. Fut. Gener. Comput. Syst. 17, 5 (2001), 573–583. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Ichiro Satoh. 2013. A framework for data processing at the edges of networks. In Proceedings of the International Conference on Database and Expert Systems Applications. Springer, Berlin, 304–318.Google ScholarGoogle ScholarCross RefCross Ref
  63. Ayesha Siddiqua, Munam Ali Shah, Hasan Ali Khattak, Ikram [Ud Din], and Mohsen Guizani. 2019. iCAFE: Intelligent congestion avoidance and fast emergency services. Fut. Gener. Comput. Syst. 99 (2019), 365–375. DOI:https://doi.org/10.1016/j.future.2019.04.023Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Misba Sikarndar, Waqas Anwar, Ahmad Almogren, Ikram Ud Din, and Nadra Guizani. 2020. IoMT-based association rule mining for the prediction of human protein complexes. IEEE Access 8 (2020), 6226–6237.Google ScholarGoogle ScholarCross RefCross Ref
  65. Dhananjay Singh, Gaurav Tripathi, Antonio M. Alberti, and Antonio Jara. 2017. Semantic edge computing and IoT architecture for military health services in battlefield. In Proceedings of the 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC’17). IEEE, 185–190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Suresh Singh, Mike Woo, and Cauligi S. Raghavendra. 1998. Power-aware routing in mobile ad hoc networks. In Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking. ACM, 181–190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Cagatay Sonmez, Atay Ozgovde, and Cem Ersoy. 2017. Performance evaluation of single-tier and two-tier cloudlet assisted applications. In Proceedings of the 2017 IEEE International Conference on Communications Workshops (ICC’17 Workshops). IEEE, 302–307.Google ScholarGoogle ScholarCross RefCross Ref
  68. Cagatay Sonmez, Atay Ozgovde, and Cem Ersoy. 2018. Edgecloudsim: An environment for performance evaluation of edge computing systems. Trans. Emerg. Telecommun. Technol. 29, 11 (2018), e3493.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Manuel Suárez-Albela, Paula Fraga-Lamas, and Tiago M. Fernández-Caramés. 2018. A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices. Sensors 18, 11 (2018), 3868.Google ScholarGoogle ScholarCross RefCross Ref
  70. Niranjan Suri, Mauro Tortonesi, James Michaelis, Peter Budulas, Giacomo Benincasa, Stephen Russell, Cesare Stefanelli, and Robert Winkler. 2016. Analyzing the applicability of internet of things to the battlefield environment. In Proceedings of the 2016 International Conference on Military Communications and Information Systems (ICMCIS’16). IEEE, 1–8.Google ScholarGoogle ScholarCross RefCross Ref
  71. Asfa Toor, Saif ul Islam, Nimra Sohail, Adnan Akhunzada, Jalil Boudjadar, Hasan Ali Khattak, Ikram Ud Din, and Joel J. P. C. Rodrigues. 2019. Energy and performance aware fog computing: A case of DVFS and green renewable energy. Fut. Gener. Comput. Syst. 101 (2019), 1112–1121. DOI:https://doi.org/10.1016/j.future.2019.07.010Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Ubaid Ullah, Anwar Khan, Mahdi Zareei, Ihsan Ali, Hasan Ali Khattak, and Ikram Ud Din. 2019. Energy-effective cooperative and reliable delivery routing protocols for underwater wireless sensor networks. Energies 12, 13 (2019), 2630.Google ScholarGoogle ScholarCross RefCross Ref
  73. Yiming Wang, Zhiyuan Ren, Hailin Zhang, Xiangwang Hou, and Yao Xiao. 2018. “Combat Cloud-Fog” network architecture for Internet of Battlefield Things and load balancing technology. In Proceedings of the 2018 IEEE International Conference on Smart Internet of Things (SmartIoT’18). IEEE, 263–268.Google ScholarGoogle ScholarCross RefCross Ref
  74. Peter Wittek and Xavier Rubio-Campillo. 2012. Military reconstructive simulation in the cloud to aid battlefield excavations. In Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings. IEEE, 869–874. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Xindong Wu, Xingquan Zhu, Gong-Qing Wu, and Wei Ding. 2013. Data mining with big data. IEEE Trans. Knowl. Data Eng. 26, 1 (2013), 97–107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Manas Kumar Yogi, K. Chandrasekhar, and G. Vijay Kumar. 2017. Mist computing: Principles, trends and future direction. SSRG Int. J. Comput. Sci. Eng. 4, 7 (2017), 19–21.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Machine Learning-based Mist Computing Enabled Internet of Battlefield Things

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Internet Technology
            ACM Transactions on Internet Technology  Volume 21, Issue 4
            November 2021
            520 pages
            ISSN:1533-5399
            EISSN:1557-6051
            DOI:10.1145/3472282
            • Editor:
            • Ling Lu
            Issue’s Table of Contents

            Copyright © 2021 Association for Computing Machinery.

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 September 2021
            • Accepted: 1 July 2020
            • Revised: 1 June 2020
            • Received: 1 March 2020
            Published in toit Volume 21, Issue 4

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format