Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Secure and failure hybrid delay enabled a lightweight RPC and SHDS schemes in Industry 4.0 aware IIoHT enabled fog computing

  • These days, the Industrial Internet of Healthcare Things (IIT) enabled applications have been growing progressively in practice. These applications are ubiquitous and run onto the different computing nodes for healthcare goals. The applications have these tasks such as online healthcare monitoring, live heartbeat streaming, and blood pressure monitoring and need a lot of resources for execution. In IIoHT, remote procedure call (RPC) mechanism-based applications have been widely designed with the network and computational delay constraints to run healthcare applications. However, there are many requirements of IIoHT applications such as security, network and computation, and failure efficient RPC with optimizing the quality of services of applications. In this study, the work devised the lightweight RPC mechanism for IIoHT applications and considered the hybrid constraints in the system. The study suggests the secure hybrid delay scheme (SHDS), which schedules all healthcare workloads under their deadlines. For the scheduling problem, the study formulated this problem based on linear integer programming, where all constraints are integer, as shown in the mathematical model. Simulation results show that the proposed SHDS scheme and lightweight RPC outperformed the hybrid for IIoHT applications and minimized 50% delays compared to existing RPC and their schemes.

    Citation: Mazhar Ali Dootio, Abdullah Lakhan, Ali Hassan Sodhro, Tor Morten Groenli, Narmeen Zakaria Bawany, Samrat Kumar. Secure and failure hybrid delay enabled a lightweight RPC and SHDS schemes in Industry 4.0 aware IIoHT enabled fog computing[J]. Mathematical Biosciences and Engineering, 2022, 19(1): 513-536. doi: 10.3934/mbe.2022024

    Related Papers:

    [1] Abdullah Lakhan, Mazhar Ali Dootio, Ali Hassan Sodhro, Sandeep Pirbhulal, Tor Morten Groenli, Muhammad Saddam Khokhar, Lei Wang . Cost-efficient service selection and execution and blockchain-enabled serverless network for internet of medical things. Mathematical Biosciences and Engineering, 2021, 18(6): 7344-7362. doi: 10.3934/mbe.2021363
    [2] Zhongxue Yang, Yiqin Bao, Yuan Liu, Qiang Zhao, Hao Zheng, Wenbin Xu . Lightweight blockchain fuzzy decision scheme through MQTT and Fibonacci for sustainable transport. Mathematical Biosciences and Engineering, 2022, 19(12): 11935-11956. doi: 10.3934/mbe.2022556
    [3] Fawza A. Al-Zumia, Yuan Tian, Mznah Al-Rodhaan . A novel fault-tolerant privacy-preserving cloud-based data aggregation scheme for lightweight health data. Mathematical Biosciences and Engineering, 2021, 18(6): 7539-7560. doi: 10.3934/mbe.2021373
    [4] Abhishek Savaliya, Rutvij H. Jhaveri, Qin Xin, Saad Alqithami, Sagar Ramani, Tariq Ahamed Ahanger . Securing industrial communication with software-defined networking. Mathematical Biosciences and Engineering, 2021, 18(6): 8298-8313. doi: 10.3934/mbe.2021411
    [5] Yuanfei Tu, Jing Wang, Geng Yang, Ben Liu . An efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control system. Mathematical Biosciences and Engineering, 2021, 18(4): 3559-3577. doi: 10.3934/mbe.2021179
    [6] Sabina Szymoniak . Security protocols analysis including various time parameters. Mathematical Biosciences and Engineering, 2021, 18(2): 1136-1153. doi: 10.3934/mbe.2021061
    [7] Xiao-Dong Yang, Ze-Fan Liao, Bin Shu, Ai-Jia Chen . Blockchain-based multi-authority revocable data sharing scheme in smart grid. Mathematical Biosciences and Engineering, 2023, 20(7): 11957-11977. doi: 10.3934/mbe.2023531
    [8] Yanfeng Shi, Shuo Qiu, Jiqiang Liu, Tinghuai Ma . Novel efficient lattice-based IBE schemes with CPK for fog computing. Mathematical Biosciences and Engineering, 2020, 17(6): 8105-8122. doi: 10.3934/mbe.2020411
    [9] Yifeng Yin, Zhaobo Wang, Wanyi Zhou, Yong Gan, Yanhua Zhang . Group key agreement protocol for edge computing in industrial internet. Mathematical Biosciences and Engineering, 2022, 19(12): 12730-12743. doi: 10.3934/mbe.2022594
    [10] Kittur Philemon Kibiwott , Yanan Zhao , Julius Kogo, Fengli Zhang . Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing. Mathematical Biosciences and Engineering, 2019, 16(5): 3561-3594. doi: 10.3934/mbe.2019178
  • These days, the Industrial Internet of Healthcare Things (IIT) enabled applications have been growing progressively in practice. These applications are ubiquitous and run onto the different computing nodes for healthcare goals. The applications have these tasks such as online healthcare monitoring, live heartbeat streaming, and blood pressure monitoring and need a lot of resources for execution. In IIoHT, remote procedure call (RPC) mechanism-based applications have been widely designed with the network and computational delay constraints to run healthcare applications. However, there are many requirements of IIoHT applications such as security, network and computation, and failure efficient RPC with optimizing the quality of services of applications. In this study, the work devised the lightweight RPC mechanism for IIoHT applications and considered the hybrid constraints in the system. The study suggests the secure hybrid delay scheme (SHDS), which schedules all healthcare workloads under their deadlines. For the scheduling problem, the study formulated this problem based on linear integer programming, where all constraints are integer, as shown in the mathematical model. Simulation results show that the proposed SHDS scheme and lightweight RPC outperformed the hybrid for IIoHT applications and minimized 50% delays compared to existing RPC and their schemes.



    These days, industry 4.0 is the new trend of the digital healthcare sector, where many traditional manual healthcare systems have been converting into digital healthcare systems [1]. For instance, many patients directly receive the services of doctors without any physical visit to the hospital system [2]. Industry 4.0 offers cyber-physical transformation of construction to promote networked manufacturing, and the digital convergence of industry, enterprises, and other processes such as physical hospitals, have been converted into digital hospitals [3,4]. The digital healthcare applications in industry 4. 0 consist of healthcare sensors, edge computing data centers, and wireless network technologies. The industrial internet of healthcare things (IIoHT) supports these applications via different services [5]. The essential infrastructure of Industry 4.0 is based on distributed computing principles, with many nodes geographically distributed and connected in networks [6,7]. In distributed computing, all the IIoHT applications have been assumed as thin clients where their workloads are offloaded to the thick heavyweight cloud servers for execution [8,9]. However, due to the offloading of data to edge computing, there is a significant risk of data security and delay in the IIoHT network. Generally, the data offload in plaintext and face malware attacks or anomaly attacks on the data by different sources. Therefore, data security for IIoHT applications in cloud computing poses a significant challenge in the network [10]. Generally, IIoHT applications are delay-sensitive and consist of sensitive tasks such as high heartbeat emergency, high blood-pressure strain, and many [11]. Therefore, delay enabled task scheduling problem with many types of delays (e.g., computational delay, security delay, and network delay) has gained a lot of attention for each IIoHT application [12].

    Many studies investigated delay optimal scheduling problems for IIoHT applications in the edge computing network [1,7,12,13,14,15,16]. Computational delay, network delay, and failure aware delay are some of the constraints that have been applied to optimal delay issues. Fine-grained, coarse-grained, and workflow workloads are all evaluated, and they are divided into heterogeneous and homogeneous edge nodes. The considered workloads are fine-grained, coarse-grained, and workflows and edge them into heterogeneous and homogeneous edge nodes. These applications designed the runtime for IIoHT based on the remote procedure call (RPC) mechanism. The RPC offers different socket classes to allow thin-client (mobile devices and bio-sensors) to connect to the edge nodes to execute applications. In RPC, the Javascript Object Notation (JSON) is a protocol that is implemented to offload data from mobile devices to the edge node for the computation. Many encryption and decryption based on RSA, MD5, SHA-256, and homoeomorphic techniques introduced in RPC for IIoHT applications. Furthermore, based on checkpointing and primary backup techniques, the failure-aware approaches were introduced in RPC for IIoHT applications in edge computing [17,18,19,20]. However, these studies only focused on computational delay and network delay constraints and widely ignored the security delay and failure delay of IIoHT applications in edge computing.

    The hybrid delay scheduling problem for IIoHT applications at heterogeneous edge nodes is formulated in this work. Different restrictions, such as computing delay, network delay, security delay, and fault-tolerant delay, make up the hybrid delay. The goal is to reduce the total number of hybrid delays for all IIoHT applications that have deadlines. The study develops the unique RPC system and its schemes, as well as contributes to state-of-the-art research. (Ⅰ) The paper presents a realistic simulation runtime RPC environment for IIoHT applications based on socket programming. Many Arudino bio-sensors are connected to mobile devices in the system. Their workload is offloaded to the JSON protocol, which edge computing uses to process them within their deadlines. (Ⅱ) The study devises the secure hybrid delay scheme (SHDS) to optimize each delay, which schedules all healthcare workloads within their deadlines. To deal with the challenge, the researchers devised a mathematical model based on linear integer programming, in which all constraints are integer. The research proposes a four-phase architecture for securing fault-tolerant delay workload assignment. (Ⅲ) The research creates a mathematical model for the topic at hand and simulates IIoHT applications using the system's constraints.

    Summary, the study formulates the hybrid delay enabled scheduling problem for IIoHT applications in heterogeneous edge computing. The considered problem is closely related to existing studies [1,7,11,15,19,20] where these studies considered the network delay and computational delay for IIoHT in heterogeneous edge nodes. Based on computational delay and network delay, these studies designed the RPC based on socket programming and JSON protocols. However, our work is different from existing studies in which we consider more delay constraints such as computational delay, network delay, security delay, and fault-tolerant delay in heterogeneous edge computing. This study designed the lightweight and hybrid delay enabled RPC system and its schemes for IIoHT applications and simulated with the mathematical model in the considered problem.

    The manuscript has the subsequent sections. Section 2 investigated the prevailing coarse-grained and fine-grained workload execution within the distributed network. Section 3 shows the problem-solution based on the proposed architecture and Section 4 shows algorithm implementation based on heuristics steps. After the algorithm framework devised. Section 5 determined the performances of the proposed schemes with the considered problem. The Section 6 summaries the effort of the proposed work with the achievement of the results.

    In this part, the study discusses the efforts of existing studies for delay-optimal task scheduling for IIoHT in edge computing. The studies [1,2,3,4] investigated computational enabled offloading based on RPC mechanism inhomogeneous edge nodes for coarse-grained IIoHT applications. The goal was to minimize computational delay for all applications. The workload is coarse-grained in which virtual machine-based RPC runtime executes them with minimum delay. However, these studies only focused on the computational delay for IIoHT applications. The studies [5,6,7,8,9,10] investigated hybrid constraints such as network delay and computational delay for IIoHT applications in homogeneous edge nodes. The objective is to minimize offloading network delay and assignment computational delay of all applications. The applications are bio-sensors that enable fine-grained and offload the proximity edge node for computation. Whereas network delay and the computational delay were the constraints during the minimization of the objective function in the study. The studies [11,12,13,14,15] suggested hybrid delay-optimal workload assignment in heterogeneous edge cloud. Where proximity cloudlets are placed near user applications and remote cloud-deployed away from the user applications. The resource constraint and computational delay were assumed to be the constraint of applications and minimized the overall delay. However, the wait delay, network delay, and failure delay were ignored in the study. These studies [16,17,18,19,20] formulated the network delay and resource delay in the edge computing for IIoHT applications. The goal was to minimize resource and network offloading delays of applications in the distributed heterogeneous edge nodes in the network. These studies implemented the coarse-grained healthcare workload of applications and full offloading schemed designed in the RPC system.

    These studies [21,22,23,24,25,26,27] formulated the hybrid delays (resource renting delay and computational delay) and suggested scheduling schemes in heterogenous mobile edge cloud paradigms for fine-grained healthcare applications. The goal is to minimize the renting and computational delays of resources of healthcare applications. The dynamic task offloading, and scheduling schemes were suggested to deal with mobility and intermittent changes in resources for the applications. The studies [28,29,30,31,32] suggested the microservices-based lightweight computational delay enabled resources for the IIoHT applications. These studies devised the lightweight microservices-based RPC to run the IIoHT applications with minimum boot-up delay and execution delay in edge computing. These studies [33,34,35,36,37] suggested container enabled RPC to minimize services delay, boot up delay and computational delay of IIoHT applications in edge computing. The goal was to minimize the hybrid delay of applications in distributed edge nodes in the network.

    To the best of our knowledge, the hybrid delay with failure, security, network, and computational delays for IIoHT in distributed heterogeneous edge nodes has not been studied yet. The existing RPC considered the boot-up delay, network delay, service delay, and network delay of IIoHT applications. However, failure, network, secure and computational delay of IIoHT applications are still to be improved further in this study.

    The study devises the hybrid delays optimal RPC enabled edge computing for IIoHT system that consists of client and management components as shown in Figure 1. The IIoHT client component comprises biomedical sensors, network status, servers status, and results interfaces. Each biomedical sensor generates data for the fine-grained healthcare tasks, and the workload offloader engine decides when to offload them to IIoHT management for execution. The workload offloader engine is a method that is located at think client and makes the offload decision and displays the results in the mobile interfaces. How do tasks works with the edge nodes in the system? The proposed approach has been designed based on RPC runtime where stub classes of client tasks communicate with edge node skeleton classes for the execution. The biomedical tasks are represented by t=1,N. IIoHT management component consists of computing infrastructure where RPC skeleton runtime is implemented to run the tasks stub client tasks. IIoHT management handles all requested generated from the client-side and process them according to their attributes. IIoHT management has two layers such as SHDS runtime layer and the SHDS framework layer. The SHDS runtime is an infrastructure where IIoHT clients communicate with edge nodes for applications execution based on the RPC mechanism. The runtime denotes fog-1 and fog-2. These two edge computing nodes are used for processing client socket to the server socket. The client socket is mobile devices, and the server socket is edge nodes designed based on the RPC mechanism and communicate via JSON protocol to process data between them. Each edge node is represented by k=1,,K, and has different speeds and resources for executing tasks t=1N. In order to satisfy the requirements of all tasks on heterogeneous edge nodes, the study devises the secure hybrid delay scheduling (SHDS) framework, which consists of network delay, security delay, computational delay, and network delay heuristics. These fours heuristics optimize the four constraints of IIoHT tasks in the heterogeneous nodes in the system.

    Figure 1.  Hybrid delay optimal bio-sensors connected RPC enabled edge computing IIoHT system.

    The consider architecture as shown in Figure 1 consists of N number of biomedical fine-grained tasks, e.g., N{t=1,,N}. Each task has deadline dt and workload wt. The edge computing consists of homogeneous K node, e.g., K={k=1,,K}. Each edge node k has limited space, e.g., ϵk. All nodes have homogeneous computing speed ζk in distributed computing. The study considers the base stations {b=1,B}, which are communication channel for application to offload their tasks to the edge computing.

    Table 1.  Mathematical notation.
    Notation Description
    N It represents the total number of tasks
    t Particular task of N
    wt Workload of task t
    dt Deadline of task t
    K Number of homogeneous edge nodes
    k The node k of K
    ϵk The resources of node k
    B Number of base stations
    b Particular base station of B
    bC The channel capacity
    Bbw The bandwidth of the channel in hertz
    bS Signal power over the bandwidth
    Ns Interference over the bandwidth
    SNs The signal-to-noise ratio

     | Show Table
    DownLoad: CSV

    The study exploits binary assignment variables for workload assignment on edge computing. For instance xt,k={0,1}. If the xt,k=1, the workload is assigned to the computing node k; otherwise, it becomes 0. The study calculates the computational delay in the following way.

    Com=Nt=1Kk=1wtζk×xt,k. (3.1)

    Equation (3.1) shows the computational delay of all tasks on all computing nodes.

    The study considers the network delay between IoV applications and edge computing. The study exploits binary assignment variable for workload offload via available base stations. For instance yt,b={0,1}. If the xt,b=1, the workload is offloaded to available base station b, otherwise it becomes 0. The study determines the computational delay in the following way.

    Net=Nt=1Bb=1wtbw×yt,b. (3.2)

    Equation (3.2) shows the network delay of all tasks offload to base-stations. Whereas, bw is the bandwidth of wireless channel in the edge computing network.

    The study implements the RSA asymmetric scheme based on 256 bits to perform encryption and decryption in edge computing. The study determines the security delay of all tasks in the following way.

    Sec=Nt=1Kk=1enc(t,k,pk)+dec(t,k,pv)(×xt,k. (3.3)

    Equation (3.3) shows the security delay of all tasks on all computing nodes. Whereas, pk and pv variables are 256 bits primary key and private key are keys in asymmetric RSA scheme which is implemented in our model.

    Each task has binary status such as zt,k,s={0,1}. The notation zt,k,s=1 shows the task finished successfully in the system, otherwise failure task will gain zero status. Furthermore, the fault-tolerant delay of tasks delimits in the following way.

    FT=Nt=1Kk=1×zt,k,s=0¬1. (3.4)

    Equation (3.4) determines the fault-tolerant delay of tasks in the system.

    The objective function of the study is to minimize the delay of all tasks and determine in the following way.

    Z=Com+Net+Sec+FT. (3.5)

    The workload assignment problem mathematically based on linear integer programming is formulated in the following way.

    minZ,t=1,N. (3.6)

    Equation (3.6) represents the objective function which minimize the total delays of all tasks in edge computing environment based on linear integer programming.

    Nt=1Kk=1wtζk×xt,k=1ϵk. (3.7)

    Equation (3.7) determines that all tasks must be executed under the available nodes resource and not exceed their limits.

    Zdt,t=1,,N. (3.8)

    Equation (3.8) determines that, all tasks must be executed under the their deadlines.

    Nt=1xt,k=1,k=1,K. (3.9)

    Equation (3.9) determines that, each task is assigned to one computing node at a time.

    Kk=1xt,k=1,t=1,1. (3.10)

    Equation (3.10) determines that each node execute one task at a time.

    The study implies the secure hybrid delay scheme (SHDS), which schedules all healthcare workloads below their deadlines. To determine the optimal assignment problem, the study formulated this problem based on linear integer programming, where all constraints are integer, as shown in the mathematical model. In the proposed work, the study makes the optimal assignment with fault-tolerant and security features, and the study devises a secure fault-tolerant delay workload assignment algorithm framework that consists of four different phases. The phase-1 of Algorithm 1 acknowledges the offloading tasks of IIoHT applications to edge computing for computation, where each base station channel has sufficient bandwidth for the offloading. Suppose there is no bandwidth available in the wireless channel of bandwidth or weak signal with high inference. In that case, the IoV application can not offload tasks to the edge node for the computation. After the successful offloading to the edge node, phase-2 of Algorithm 1 performs encryption and decryption on fully homomorphic encryption based on RSA asymmetric technique with 256 bits key length such as primary key and private key in any computing node. The main goal is to encrypt and decrypt data to the only node, and others can execute the workload on encrypted form and send it back to the original computing node. At the same time, phase-3 of Algorithm 1 searches the optimal edge node for the computation on the offloaded workload under their deadlines. In phase-4 of Algorithm 1 monitors the running tasks is they failed during execution, then Algorithm 1 will call all phases and search another node until and unless the workload has a deadline. If the fault-tolerant is timeless than the remaining deadline of the task, Algorithm 1 will successfully recover the failure task by using the primary backup strategy of fault-tolerant in edge computing nodes. In this way, the overall delays can handle in the optimal in the proposed Algorithm 1.

    Algorithm 1: SHDS Framework
      Input: B,N,K
    1 begin

    29 End Main;

     | Show Table
    DownLoad: CSV

    After the successful offloading phase, edge computing takes the input of tasks data, e.g., tw. The input of the IoV application will be encrypted first at the initial edge computing node by applying fully homomorphic encryption based RSA 256-bits length. The security is asymmetric where the primary key is exploited for the encryption, and the private key is exploited for the decryption at the same edge computing node. The study devises the fully homomorphic encryption enabled technique in phase as defined in Algorithm 2. The study generating the public key length and private key length keys based on RSA key generator class [32]. The list[t, k] is the encrypted list of all tasks based on Algorithm 2. The security rules are designed based on the homomorphic scheme, which is more time-efficient and has more minor security delays than existing all traditional security schemes for IIoHT tasks. The conventional security schemes are MD5, SHA-256, CRC-32, and others, and dual processes such as encrypt and decrypt each data on every node and cant apply computation on the ciphertext. This is a time-consuming process as well as consumes much more resources of nodes. Figure 2 shows the mechanism of encryption and decryption in the system. The study introduces lightweight encryption and decryption-enabled cryptography asymmetric approach. All tasks encrypt and decrypt on at any node and storge their encrypted data on the system storage. In our process, initially, the system will select the node for encryption and decryption with public and private keys to avoid security delay in the system. To ensure security and delay, the study encrypts the data only once on one node, and another node can apply computation on encrypted data instead of plaintext. After the execution, all results can be decrypted by a particular node in which tasks first encrypted their data during processing.

    Algorithm 2: Phase-2 Security Delay Scheme
      Input: (ce=(t1,t2,tN) mod n)
      Output: (m=cd mod n)
    1 begin

    16 End loop;

     | Show Table
    DownLoad: CSV
    Figure 2.  Encryption and decryption in system.

    In the first phase, the study calculates the network delay before offloading workload to edge computing. Generally, network delay is a complex task due to many factors such as available channel capacity of base stations bC, bandwidth Bbw, signal strength S, inference noise N between IoV device and edge computing. We determine the channel capacity of base stations in the following way.

    bC=bbwlog2(1+SN)×Net. (4.1)

    Equation (4.1) determines the capacity of all base stations in edge computing network.

    Net=Nt=1Wtbbw×List[t,k]. (4.2)

    Equation (4.2) determined the network delay for each task during offloading the data to the servers for execution. Whereas, due to results, still downloading data incurs some delay as determined in Eq (4.2). The threshold and condition matched in the following way.

    ThresholdbbC. (4.3)

    Equation (4.3) determines the threshold quality of service of offloading in the network. The offloader engine in devices offload data and download results with the minimum amount of delay whenever data required for the processing in the system.

    Algorithm 3 is a scheduler based on linear integer programming-based scheduling greedy where all tasks have priority and deadline constraints. The priority and deadline are assigned to each task during design time by users. Therefore, the scheduler does only workload assignments of tasks to the available computing nodes with their resources. Algorithm 3 sorts all tasks by priority, such as high priority tasks must schedule first, then low priority tasks. However still, high-priority tasks have critical deadlines too. Therefore, Algorithm 3 sort all tasks by their deadlines based on the earliest deadline first (EDF) [26]. To ensure scheduling, Algorithm 3 sort all edge computing nodes by their resource capacity. Algorithm 3 takes encrypted tasks as an input and performs their computation based on their deadlines.

    Algorithm 3: Computational delay scheme
      Input: (list[t,k]=enc(t,k,pk×ϕ)
    1 begin

    15 End loop;

     | Show Table
    DownLoad: CSV

    The output of Algorithm 3 shown in Table 2. All tasks are scheduled according to their deadlines without missing any deadline as shown in Table 2.

    Table 2.  Computational delay and task priority.
    N Priority K Com(ms) dt(ms) ϵk(GB)
    t1 high k1 100 110 10GB
    t2 high k2 400 490 15GB
    t3 low k3 500 1100 20GB
    t4 low k4 1000 1200 30GB
    t5 high k1 1500 2000 7GB
    t6 high k3 50 60 15GB
    t7 high k2 30 60 8GB
    t8 high k4 25 50 5GB
    t9 high k1 88 110 6GB

     | Show Table
    DownLoad: CSV

    The fault-tolerant scheme in the paper works like the process helper in which failure of tasks can reschedule from the point of failure as shown in Algorithm 4. Many existing fault-aware frameworks include checkpointing, primary backup files technique, migration, and masking techniques. The fundamental goal of these techniques is to offer a robust and seamless environment to run applications without degradation their performances. In this work, the study modified the checkpointing and primary backup techniques [38,39] to handle the failure delay in the system. The primary goal is to minimize failure delay of tasks whenever they have failed during scheduling in the system. Figure 3 shows the scheduling process of tasks onto the heterogeneous fog nodes under the deadline and assignment constraints. The blue node shows that a task t is assigned to the fog node k for the execution. All the tasks are assigned based on the deadline of tasks onto the available nodes. The purple color shows that the assigned tasks on nodes met their deadlines during scheduling in the system. If the two tasks have arrived at the same node, then according to their deadline, they are scheduled on to the node; if a task is already executing on the node, then the next task will wait until the completion of the first task execution. For instance, t3,k4 is already running as shown in the green-covered area, and then task t6,k4 will wait until finish time t6 during scheduling. If the task failed as shown in Figure 3 with yellow node, and its status changed from status 1 to 0. The scheduler will call Algorithm 4 to recover tasks with the checkpointing technique on the primary backup scheme in the network. For instance, a task t2 failed on node k2, but it has a deadline. It recovers under its deadline on the same or another node as shown in Figure 3. The failure task can be scheduled on the same node or reschedule another node from the point of failure. In this way, the scheduler can dynamically handle the tasks' execution and failure in the heterogeneous fog networks. In our problem, all edge nodes are homogenous. Therefore, scheduling from one node to another based on available resources is convenient in our model. We implemented two well-known techniques of fault-tolerant such as primary backup [27] and checkpointing [28] in edge nodes.

    Algorithm 4: Fault-Tolerant Delay Scheme
      Input: (Listf[t,k,s])
    1 begin

    7 End loop;

     | Show Table
    DownLoad: CSV
    Figure 3.  Scheduling under deadlines.

    Figure 3 shows the scheduling process of tasks on to the heterogeneous fog nodes under the deadline and assignment constraints. The blue node shows that a task t is assigned to the fog node k for the execution. All the tasks are assigned based on the deadline of tasks on to the available nodes. The purple color shows that the assigned tasks on nodes met their deadlines during scheduling in the system. If two jobs (e.g., tasks) have arrived at the same node, they will schedule based on their deadlines. Furthermore, the next task will wait until the completion of the first task execution. For instance, t3,k4 is already running as shown in the green-covered area, and then task t6,k4 will wait until finish time t6 during scheduling. If the task failed as shown in Figure 3 with yellow node, and its status changed from status 1 to 0. The scheduler will call Algorithm 4 to recover tasks with the checkpointing technique on the primary backup scheme in the network. For instance, a task t2 failed on node k2, but it has a deadline. It recovers under its deadline on the same or another node as shown in Figure 3. The failure task can be scheduled on the same node or reschedule another node from the point of failure. In this way, the scheduler can dynamically handle the tasks' execution and failure in the heterogeneous fog networks.

    This section manifests the performance evaluation, system implementation, baseline approaches, and results from the discussion from work. Initially, the study designed the RPC system as shown in Figure 4 based on different parameters and values. For instance, the parameters discussed and demonstrated in Table 3 are considered in the simulation environment where other types of resources are deemed as shown in Table 4. The study designed the new RPC environment as shown in Figure 4 for IIoHT applications based on the edge foundry platform for simulation purposes. The study created a practical RPC system consisting of an add services module. Many healthcare services can install on Android devices that are deployed at fog nodes in different hospitals. The services are healthcare tasks with various tasks contents such as text, video, images, and audio, and these tasks are encrypted and decrypted at the client device and fog node with the public key and private key. The RPC consists of two sockets classes, such as client-socket and server socket. Whereas add services and encryption and decryption modules connected and write and read components in the system. The server socket class has different elements such as connection bind, accept and listen, which ensure the connection between the local device socket and server socket for further processing. The data offload in Javascript Object Notation (JSON) between client socket and server socket in the system. The server socket implemented the edge foundry SDK library in RPC. The edge foundry is an open Industrial Internet of Healthcare Things (IIoHT) edge cloud platform which can create fog nodes based on the container's docker images at the repository. The container is the resources on the fog node and processes the tasks based on their size in the inside socket and managed by the docker Kubernetes manager. The framework is a modified version of RPC and edge foundry tested at Android devices and edge cloud networks for all IIoHT bio-sensors applications. The RPC is designed based on JAVA programming, which can offload and run applications at different layers such as clients and servers with the same runtime Java virtual machine environment. All the bio-sensors are healthcare and can connect with various sensors; we only generate sensors' data in the proposed RPC system in work. Table 4 shows the implemented fog nodes in the edgex foundry SDK. Each fog node is heterogeneous and has different storage and processing speed in the system. The higher fog node has less processing delay as compared to low processing fog node, therefore, due to a lot of traffic high processing fog nodes are not available for the execution of requests in the system. The study managed the workload among different fog nodes under their deadline and delay.

    Figure 4.  Implementation of hybrid delay optimal bio-sensors connected RPC enabled edge computing IIoHT system.
    Table 3.  Simulation RPC enabled edge computing IIoHT system parameters.
    Parameters Values
    Programming Socket
    N 1000
    Nt=1Wt 1000GB
    K 4
    k1 i5th Core
    k2 i7th Core
    k3 i9th Core
    k4 Highth Core

     | Show Table
    DownLoad: CSV
    Table 4.  EdgeX foundry fog nodes.
    N ϵk ζkMPS
    k1 1000GB Dual Core i5
    k2 5000GB Dual Core i7
    k3 10000GB Dual Core i9
    k4 20000GB Dual Core High

     | Show Table
    DownLoad: CSV

    The study implements the existing RPC schemes as the baseline approaches in the simulation environment. These studies [3,6,8,19,21,22] have been assumed the baseline (B1) delay optimal suggested schemes in which only network delay and computational delay considered in the RPC for the healthcare applications. Furthermore, these studies [2,4,7,15,20,26] have been assumed the baseline (B2) delay optimal suggested schemes in which only failure delay and computational delay considered in the RPC for the healthcare applications. These studies are closely related to our work, and they assumed jobs to the healthcare tasks in the RPC system during the simulation environment in their works. Therefore, we considered the tasks as the jobs of IIoHT applications in the simulation environment with the given parameters.

    In the existing studies, the security delay is widely ignored for the applications. At the same time, the security delay is time-consuming and requires a lot of resources for encrypting the healthcare data. The study devises the lightweight homomorphic SHA-256 encryption and decryption schemes based on the asymmetric mechanism for the applications. Initially, the offloader engine checks if the local devices, e.g., Android nodes, have enough resources to encrypt and decrypt data on the healthcare workload; it calls SHA-256 security schemes and encrypts workload based on the given key, which is generated based on RSA [4]. However, if the local devices have limited resources and can't do encryption offloader engine offload all data to the fog node in RPC for the processing in the system. It means the proposed security method in SHDS is more dynamic and efficient, making decisions at the runtime to avoid delay in the applications. Figure 5 shows the Z performances of all tasks (e.g., jobs) with the baseline approaches such as existing secure offloading schemes as compared to the SHDS proposed method. Figure 5 shows that SHDS outperformed all existing secure offloading procedures in terms of objective Z, which consists of network delay and computation delay. During the simulation, 600 and 800 tasks are encrypted and decrypted, and their security delay time is calculated at different nodes in the simulated RPC system. It is assumed from the obtained results in Figure 5, the existing studies failed to optimize the security, which has a direct impact on the objective function of the healthcare applications. Figure 6 shows the objective function performances of IIoHT applications with different numbers of jobs that have a direct impact due to security delay. It is, therefore, is very important, the security delay is calculated in RPC for IIoHT applications. Otherwise, it is hard to satisfy the security and deadline requirements of applications together in RPC. In the security mechanism, we have chosen the two security offloading schemes with the MD5-256 bits and SHA-256 in RPC for healthcare applications. These studies make encryption and decryption locally on mobile due to security validation. However, due to resource constraints of mobile devices, sometimes encryption and decryption cannot be performed locally in the system. Due to this reason, many failures occurred at the local machines. Therefore, the offloader engine in our work decides the runtime offloading decision where to encrypt and decrypt tasks data based on available resources in different nodes. In this way, we can optimize the security constraint delay for IIoHT applications with varying numbers of tasks (850 and 1000) in the RPC. Figure 6 (a) and (b) showed the objective function with the SHDS is more optimal than existing schemes where decisions made at the design time and occur at the devices and incurred with the failure and a lot of processing delay in the RPC.

    Figure 5.  Performances of security delay of IIoHT applications at different nodes.
    Figure 6.  Optimal performance of secure offloading schemes B1 (SHA-256) and B2 (MD5) for IIoHT applications.

    The network delay directly impacts the objective function when it offloads and downloads healthcare data for the processing and results. Generally, wireless technologies have a different offloading and downloading delay on IIoHT data in RPC. However, we are comparing only schemes of network delay implemented in RPC. Figure 7 shows the objective function performances of network delay with the different number of tasks (600 and 1200) based on existing baseline approaches in RPC. Figure 7 shows the SHDS outperformed all existing schemes in terms of network delay in RPC for the IIoHT applications. The main reason is that SHDS determined the network delay before offloading the encrypted tasks to the system based on the given deadline. If the network delay has a longer delay and tasks still miss their deadline based on obtained network delay, the offloader engine in the study makes the tasks fail and resubmit from scratch in the RPC. However, in the proposed RPC, the user still offloads their tasks without losing their deadlines in the worst case of the network in RPC. However, existing network delay offloading schemes only offloaded tasks without considering the deadline of tasks of applications in RPC. These approaches have much more failure or an extended network delay with the possibility that many more jobs missed their deadlines. Therefore, SHDS is more efficient and optimal than existing offloading network delay schemes in RPC in terms of the objective function in the system as shown in Figure 8 (a), (b). The computational delay belongs to the scheduling of tasks to the available nodes based on resources in the RPC. Most of the existing RPC exploited the virtual machine fog nodes with different speeds and storage to run IIoHT healthcare tasks under their deadlines. However, many factors can degrade the performances of computational delay in RPC, such as resource boot-up time, wait time, and execution time. Therefore, lightweight boot-up-time and stay and execution must be optimal for IIoHT applications in RPC based on the mobile edge cloud system. In the simulation environment, we executed 1200 healthcare jobs in the RPC and analyzed their performances in the RPC based on their deadlines. Figure 9 (a), (b) shows that, with different boot-up-time, wait time and execution has a direct impact on the objective function of the healthcare application with the different number of tasks. Figure 9 (a), (b) shows that the objective function is improved with the proposed RPC scheme as compared to baseline RPC schemes in terms of computational delay for the IIoHT applications. The main reason is that the study modified and improved the performance of RPC with the boot-up-time delay and wait for delay execution delay compared to the existing RPC. The main reason is that the current studies implemented virtual machines with 55 boot-up-time and longer wait times when executing tasks on the devices. However, the proposed schemes implemented docker containers in edgex foundry with only 11 seconds of boot-up time and zero wait time in the RPC. Why boot-up-time is more important in the computational delay, the main reason is that the resource cannot always be in "ON" status because in "ON" situation consumes much more resources in the system. Therefore, they need to restart and incur with higher boot-up time in the RPC. Therefore, existing studies ignored the boot-up-time delay and waited for the delay in RPC for the IIoHT applications.

    Figure 7.  Network delay optimal offloading over objective function for IIoHT applications.
    Figure 8.  Network delay of IIoHT applications based on their deadlines.
    Figure 9.  Computational delay of IIoHT applications based on their deadlines.

    Besides security delay, network delay, offloading delay, and fault-tolerant delay are most significant in RPC when it offers the seamless and robust JAVA runtime for IIoHT applications. The existing fault-tolerant techniques such as checkpointing and primary backup are widely implemented in the RPC with the proposed offloading and resource-allocations schemes. Figure 10 (a), (b) shows that checkpointing and primary backup always incurred with additional delay and still meet the deadline requirements with the proposed scheme SHDS. However, existing schemes widely ignored the fault-tolerant delay in RPC for the IIoHT applications.

    Figure 10.  Fault delay of IIoHT applications based on their deadlines.

    The main finding of this study devised the lightweight RPC runtime framework for IIoHT applications where many types of delay are considered the constraints in the system. The delays are security, network, computational, and fault-tolerant delays for IIoHT applications under their deadlines. Whereas existing studies only considered the computational delay and network constraints for IIoHT applications in RPC systems. Therefore, this RPC framework still missed a huge of applications deadlines. The proposed SHDS schemes and lightweight RPC optimized the objective function of IIoHT applications with the hybrid delays, as shown in the performances in the result discussion part. However, this study has limitations that are to be investigated further in future work of the study. For instance, mobility delay, migrations delay, and many delays are still to be investigated further in the current model of RPC for the IIoHT applications.

    In this study, the work devised the lightweight RPC mechanism for IIoHT applications and considered the hybrid constraints in the system. The study suggests the secure hybrid delay scheme (SHDS), which schedules all healthcare workloads under their deadlines. For the scheduling problem, the study formulated this problem based on linear integer programming, where all constraints are integer, as shown in the mathematical model. The results-discussion showed that the proposed RPC and its scheme SHDS minimized hybrid delays such as security delay, network delay, computational delay, and fault-tolerant delay compared to existing RPC schemes. The study showed that the hybrid delay performances of IIoHT applications could be minimized by 50% and proved in the result discussion part. The study will consider the mobility delay and roaming delay of applications in the current version of RPC in the future. RPC has many room delays that can be improved, such as wait delays, migration delays, services delays, etc. Therefore, we will solve the IIoHT combinatorial problem with both concave and convex functions with many convex sets in the RPC system in our future work.

    This work is financially supported by the Research grant of PIFI 2020 (2020VBC0002), Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences (SIAT,CAS), Shenzhen, China.

    The authors declare that there is no conflict of interest.



    [1] L. A. Mastoi, Q. Mastoi, M. Elhoseny, M. S. Memon, M. A. Mohammed, Deep neural network-based application partitioning and scheduling for hospitals and medical enterprises using iot assisted mobile fog cloud, Enterp. Inf. Syst., (2021), 1–23. doi: 10.1080/17517575.2021.1883122. doi: 10.1080/17517575.2021.1883122
    [2] H. Zhu, P. Tiwari, A. Ghoneim, M. S. Hossain, A collaborative ai-enabled pretrained language model for aiot domain question answering, IEEE Trans. Ind. Inf., (2021). doi: 10.1109/TII.2021.3097183. doi: 10.1109/TII.2021.3097183
    [3] A. Lakhan, M. Ahmad, M. Bilal, A. Jolfaei, R. M. Mehmood, Mobility aware blockchain enabled offloading and scheduling in vehicular fog cloud computing, IEEE Trans. Intell. Transp. Syst., (2021), doi: 10.1109/TITS.2021.3056461. doi: 10.1109/TITS.2021.3056461
    [4] S. Mishra, H. Thakkar, P. K. Mallick, P. Tiwari, A. Alamri, A sustainable ioht based computationally intelligent healthcare monitoring system for lung cancer risk detection, Sustainable Cities Soc., 103079, (2021). doi: 10.1016/j.scs.2021.103079. doi: 10.1016/j.scs.2021.103079
    [5] A. Lakhan, M. S. Memon, M. Elhoseny, M. A. Mohammed, M. Qabulio, M. Abdel-Basset, et al., Cost-efficient mobility offloading and task scheduling for microservices iovt applications in container-based fog cloud network, Cluster Comput., (2021), 1–23. doi: 10.1007/s10586-021-03333-0. doi: 10.1007/s10586-021-03333-0
    [6] A. Lakhan, M. A. Mohammed, A. N. Rashid, S. Kadry, T. Panityakul, K. H. Abdulkareem, et al., Smart-contract aware ethereum and client-fog-cloud healthcare system, Sensors, 21 (2021), 4093. doi: 10.3390/s21124093. doi: 10.3390/s21124093
    [7] A. Lakhan, M. A. Dootio, T. M. Groenli, A. H. Sodhro, M. S. Khokhar, Multi-layer latency aware workload assignment of e-transport iot applications in mobile sensors cloudlet cloud networks, Electronics, 10 (2021), 1719. doi: 10.3390/electronics10141719. doi: 10.3390/electronics10141719
    [8] M. Hussain, L. F. Wei, A. Lakhan, S. Wali, S. Ali, A. Hussain, Energy and performance-efficient task scheduling in heterogeneous virtualized cloud computing, Sustainable Comput. Inf. Syst., 30 (2021), 100517. doi: 10.1016/j.suscom.2021.100517. doi: 10.1016/j.suscom.2021.100517
    [9] A. Lakhan, X. Li, Transient fault aware application partitioning computational offloading algorithm in microservices based mobile cloudlet networks, Computing, 102 (2020), 105–139. doi: 10.1007/s00607-019-00733-4. doi: 10.1007/s00607-019-00733-4
    [10] A. Lakhan, L. Xiaoping, Energy aware dynamic workflow application partitioning and task scheduling in heterogeneous mobile cloud network, in 2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB), IEEE, (2018), 1–8. doi: 10.1109/ICCBB.2018.8756442.
    [11] A. Lakhan, X. Li, Content aware task scheduling framework for mobile workflow applications in heterogeneous mobile-edge-cloud paradigms: Catsa framework, in 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), IEEE, (2019), 242–249. doi: 10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00044.
    [12] A. Lakhan, X. Li, Mobility and fault aware adaptive task offloading in heterogeneous mobile cloud environments, EAI Endorsed Trans. Mobile Commun. Appl., 5 (2019). doi: 10.4108/eai.3-9-2019.159947. doi: 10.4108/eai.3-9-2019.159947
    [13] J. Qian, P. Tiwari, S. P. Gochhayat, H. M. Pandey, A noble double-dictionary-based ecg compression technique for ioth, IEEE Internet Things J., 7 (2020), 10160–10170. doi: 10.1109/JIOT.2020.2974678. doi: 10.1109/JIOT.2020.2974678
    [14] F. Zhang, M. M. Wang, Stochastic congestion game for load balancing in mobile edge computing, IEEE Internet Things J., (2020). doi: 10.1109/JIOT.2020.3008009. doi: 10.1109/JIOT.2020.3008009
    [15] A. Lakhan, Q. Mastoi, M. A. Dootio, F. Alqahtani, I. R. Alzahrani, F. Baothman, et al., Hybrid workload enabled and secure healthcare monitoring sensing framework in distributed fog-cloud network, electronics, 10 (2021), 1974. doi: 10.3390/electronics10161974. doi: 10.3390/electronics10161974
    [16] F. H. Khoso, A. Lakhan, A. A. Arain, M. A. Soomro, S. Z. Nizamani, K. Kanwar, A microservice-based system for industrial internet of things in fog-cloud assisted network, Eng., Technol. Appl. Sci. Res., 11 (2021), 7029–7032. doi: 10.48084/etasr.4077. doi: 10.48084/etasr.4077
    [17] F. H. Khoso, A. A. Arain, A. Lakhan, A. Kehar, S. Z. Nizamani, Proposing a novel iot framework by identifying security and privacy issues in fog cloud services network, Int. J, 9 (2021), 592–596. doi: 10.30534/ijeter/2021/10952021. doi: 10.30534/ijeter/2021/10952021
    [18] A. Lakhan, R. Singh, Implementation of etl tool for data warehousing for non-hodgkin lymphoma (nhl) cancer in public sector, pakistan, Int. J., 9 (2021). doi: 10.30534/ijeter/2021/27972021. doi: 10.30534/ijeter/2021/27972021
    [19] A. Lakhan, F. H. Khoso, A. A. Arain, K. Kanwar, Serverless based functions aware framework for healthcare application, Int. J., 9 (2021). doi: 10.30534/ijeter/2021/19942021. doi: 10.30534/ijeter/2021/19942021
    [20] U. Rehman, M. A. S. A. Lakhan, A review on state of the art in flipped classroom technology a blended e-learning, Int. J., 9 (2021). doi: 10.30534/ijeter/2021/22972021. doi: 10.30534/ijeter/2021/22972021
    [21] I. A. Jamali, A. Lakhan, D. Kumar, A. R. Mahessar, R. lodhi, Energy efficient task assignment algorithm framework in mo-bile cloud computing, GSJ, 6 (2018), 171.
    [22] A. L. Mujeeb-ur Rehman, Z. Hussain, F. H. Khoso, A. A. Arain, Cyber security intelligence and ethereum blockchain technology for e-commerce, Int. J., 9 (2021).
    [23] A. Lakhan, D. K. Sajnani, M. Tahir, M. Aamir, R. Lodhi, Delay sensitive application partitioning and task scheduling in mobile edge cloud prototyping, in International Conference on 5G for Ubiquitous Connectivity, Springer, (2018), 59–80.
    [24] D. K. Sajnani, A. R. Mahesar, A. Lakhan, I. A. Jamali, R. Lodhi, M. Aamir, Latency aware optimal workload assignment in mobile edge cloud offloading network, in 2018 IEEE 4th International Conference on Computer and Communications (ICCC), IEEE, (2018), 658–662. doi: 10.1109/CompComm.2018.8780954.
    [25] D. K. Sajnani, A. R. Mahesar, A. Lakhan, I. A. Jamali, et al., Latency aware and service delay with task scheduling in mobile edge computing, Commun. Network, 10 (2018), 127. doi: 10.4236/cn.2018.104011. doi: 10.4236/cn.2018.104011
    [26] A. H. Sodhro, Z. Luo, A. K. Sangaiah, S. W. Baik, Mobile edge computing based qos optimization in medical healthcare applications, Int. J. Inf. Manage., 45 (2019), 308–318. doi: 10.4236/cn.2018.104011. doi: 10.4236/cn.2018.104011
    [27] A. H. Sodhro, S. Pirbhulal, V. H. C. De Albuquerque, Artificial intelligence-driven mechanism for edge computing-based industrial applications, IEEE Trans. Ind. Inf., 15 (2019), 4235–4243. doi: 10.1109/TII.2018.2889692
    [28] M. Muzammal, R. Talat, A. H. Sodhro, S. Pirbhulal, A multi-sensor data fusion enabled ensemble approach for medical data from body sensor networks, Inf. Fusion, 53 (2020), 155–164. doi: 10.1109/TII.2019.2902878. doi: 10.1109/TII.2019.2902878
    [29] H. Magsi, A. H. Sodhro, F. A. Chachar, S. A. K. Abro, G. H. Sodhro, S. Pirbhulal, Evolution of 5g in internet of medical things, in 2018 international conference on computing, mathematics and engineering technologies (iCoMET), IEEE, (2018), 1–7. doi: 10.1109/ICOMET.2018.8346428.
    [30] T. Zhang, A. H. Sodhro, Z. Luo, N. Zahid, M. W. Nawaz, S. Pirbhulal, et al., A joint deep learning and internet of medical things driven framework for elderly patients, IEEE Access, 8 (2020), 75822–75832. doi: 10.1109/ACCESS.2020.2989143. doi: 10.1109/ACCESS.2020.2989143
    [31] T. Li, Z. Wang, Y. Chen, C. Li, Y. Jia, Y. Yang, Is semi-selfish mining available without being detected? Int. J. Intell. Syst., 2021. doi: 10.1002/int.22656. doi: 10.1002/int.22656
    [32] A. A. Mutlag, M. K. A. Ghani, M. A. Mohammed, A. Lakhan, O. Mohd, K. H. Abdulkareem, et al., Multi-agent systems in fog-cloud computing for critical healthcare task management model (chtm) used for ecg monitoring, Sensors, 21 (2021), 6923. doi: 10.3390/s21206923. doi: 10.3390/s21206923
    [33] X. Yu, Z. Wang, Y. Wang, F. Li, T. Li, Y. Chen, et al., Impsuic: A quality updating rule in mixing coins with maximum utilities, Int. J. Intell. Syst., 36 (2020), 1182–1198.
    [34] T. Li, Y. Chen, Y. Wang, Y. Wang, M. Zhao, H. Zhu, et al., Rational protocols and attacks in blockchain system, Secur. Commun. Networks, 2020 (2020), 1–11. doi: 10.1155/2020/8839047. doi: 10.1155/2020/8839047
    [35] G. Yang, Y. Wang, Z. Wang, Y. Tian, X. Yu, S. Li, Ipbsm: An optimal bribery selfish mining in the presence of intelligent and pure attackers, Int. J. Intell. Syst., 35 (2020), 1735–1748. doi: 10.1002/int.22270. doi: 10.1002/int.22270
    [36] Y. Wang, G. Yang, T. Li, L. Zhang, Y. Wang, L. Ke, et al., Optimal mixed block withholding attacks based on reinforcement learning, Int. J. Intell. Syst., 35 (2020), 2032–2048. doi: 10.1002/int.22282. doi: 10.1002/int.22282
    [37] X. Liu, X. Yu, H. Zhu, G. Yang, Y. Wang, X. Yu, et al., A game-theoretic approach of mixing different qualities of coins, Int. J. Intell. Syst., 35 (2020), 1899–1911. doi: 10.1002/int.22277. doi: 10.1002/int.22277
    [38] Ö. Çelikel, T. Ovatman, Distributed application checkpointing for replicated state machines, Scalable Comput.: Pract. Exper., 22 (2021), 67–79. doi: 10.12694/scpe.v22i1.1840. doi: 10.12694/scpe.v22i1.1840
    [39] R. Wang, N. Chen, X. Yao, L. Hu, Fasdq: Fault-tolerant adaptive scheduling with dynamic qos-awareness in edge containers for delay-sensitive tasks, Sensors, 21 (2021), 2973. doi: 10.3390/s21092973. doi: 10.3390/s21092973
  • This article has been cited by:

    1. Saleem Ahmed, Abdullah Lakhan, Orawit Thinnukool, Pattaraporn Khuwuthyakorn, Blockchain Socket Factories with RMI-Enabled Framework for Fine-Grained Healthcare Applications, 2022, 22, 1424-8220, 5833, 10.3390/s22155833
    2. Abdullah Lakhan, Tor Morten Groenli, Arnab Majumdar, Pattaraporn Khuwuthyakorn, Fida Hussain Khoso, Orawit Thinnukool, Potent Blockchain-Enabled Socket RPC Internet of Healthcare Things (IoHT) Framework for Medical Enterprises, 2022, 22, 1424-8220, 4346, 10.3390/s22124346
    3. A Tina Victoria, M. Kowsigan, 2022, Secure Management of Healthcare Data in Fog and IoT Networks: A Short Survey on Existing Security Protocols, 978-1-6654-9764-0, 512, 10.1109/ICOSEC54921.2022.9952038
    4. Md Manjurul Ahsan, Zahed Siddique, Industry 4.0 in Healthcare: A systematic review, 2022, 2, 26670968, 100079, 10.1016/j.jjimei.2022.100079
    5. Ali Hassan Sodhro, Charlotte Sennersten, Awais Ahmad, Towards Cognitive Authentication for Smart Healthcare Applications, 2022, 22, 1424-8220, 2101, 10.3390/s22062101
    6. Shuyuan Qiu, Dechang Pi, Yanxue Wang, Yufei Liu, Novel trajectory privacy protection method against prediction attacks, 2023, 213, 09574174, 118870, 10.1016/j.eswa.2022.118870
    7. Yu Wang, Wenfang Zhang, Xiaomin Wang, Muhammad Khurram Khan, Pingzhi Fan, Security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks, 2024, 25, 1524-9050, 370, 10.1109/TITS.2023.3307453
    8. Abdullah Lakhan, Orawit Thinnukool, Tor Morten Groenli, Pattaraporn Khuwuthyakorn, RBEF: Ransomware Efficient Public Blockchain Framework for Digital Healthcare Application, 2023, 23, 1424-8220, 5256, 10.3390/s23115256
    9. Shuhan Chen, Chunming Wu, Congqi Shen, 2023, SDSSE: A Self-Driven RPC Load Balancing Method in Datacenter, 979-8-3503-3001-4, 1, 10.1109/HPCC-DSS-SmartCity-DependSys60770.2023.00010
    10. Jiazhen Zhang, Chunbo Luo, Marcus Carpenter, Geyong Min, Federated Learning for Distributed IIoT Intrusion Detection Using Transfer Approaches, 2023, 19, 1551-3203, 8159, 10.1109/TII.2022.3216575
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(3461) PDF downloads(85) Cited by(10)

Figures and Tables

Figures(10)  /  Tables(4)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog