Please use this identifier to cite or link to this item: http://ir.mu.ac.ke:8080/jspui/handle/123456789/8649
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNtambara, Boniface-
dc.contributor.authorNiyomugaba, Alexandre-
dc.date.accessioned2024-01-17T06:36:28Z-
dc.date.available2024-01-17T06:36:28Z-
dc.date.issued2023-
dc.identifier.urihttp://ir.mu.ac.ke:8080/jspui/handle/123456789/8649-
dc.description.abstractThe fog-assisted Internet-of-Things (IoT) is gaining interest due to its large number of devices, which can lead to more duplicate data transmission over the internet. This paper proposes task distribution and secure deduplication over Cluster-based IoT, implementing four layers: IoT Devices Layer, Fog Layer, Cloud Layer, and Service Layer. In the IoT devices layer, devices sense air pollutants and are authenticated to the cloud server using Edwards Curve-based Elliptic Curve Cryptography (EC-ECC). Adaptive Rewards Optimized Deep Reinforcement Learning (ARO-DRL) is used for cluster-head selection at the first layer. In the fog layer, SHA-3 is proposed for duplicate verification, and the Emperor Penguin Optimization Algorithm is used to choose the best fog node. Packet Scrutinization Algorithm is used in the fog node to analyze packet features, including DDoS attack packets. A proxy server is deployed between the cloud server and fog node for queue modeling. In the cloud layer, a hybrid cloud environment is used to protect organizations' data in a highly secure manner. IoT devices are divided into sensitive and nonsensitive devices, with sensitive data encrypted using RC6, AES, and Fiestel encryption schemes. The overall environment is assumed to be decentralized, with security invoked to IoT devices to provision Quality of Service (QoS) by avoiding attackers. Experiments were conducted and analyzed using NS3 with Java programming, and simulation results showed improvements in average latency, user satisfaction, network lifetime, energy consumption, and security strength.en_US
dc.language.isoenen_US
dc.publisherORCIDen_US
dc.subjectFog assisted Internet of Thingsen_US
dc.subjectTask allocationen_US
dc.titleBlockchain reinforced task distribution and secure deduplication using adaptive deep reinforcement learning in cluster based fog IoTen_US
dc.typeBook chapteren_US
Appears in Collections:School of Engineering

Files in This Item:
File Description SizeFormat 
Ntambara Bonny.pdf1.35 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.