A scalable framework for secure and reliable wireless-based fog cloud communication
—Wireless telecommunication systems are essential in transferring data through fog cloud servers. However, the fog cloud servers suffer from unreliable and non-secure routing and limited power resources when mobile users are mobile. This paper introduces a scalable framework (SFRRDC) for reliable wi...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2025-02-01
|
Series: | Measurement: Sensors |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2665917424003842 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832586197873983488 |
---|---|
author | Kymbat Khairosheva Abdul Razaque Gulnara Bektemyssova Joon Yoo |
author_facet | Kymbat Khairosheva Abdul Razaque Gulnara Bektemyssova Joon Yoo |
author_sort | Kymbat Khairosheva |
collection | DOAJ |
description | —Wireless telecommunication systems are essential in transferring data through fog cloud servers. However, the fog cloud servers suffer from unreliable and non-secure routing and limited power resources when mobile users are mobile. This paper introduces a scalable framework (SFRRDC) for reliable wireless routing and secure data transfer. We aim to address security and reliability issues by combining pheromone termite (PT) characteristics and ant colony optimization (ACO) algorithms for high-performance, more secure, highly reliable data transfer among the fog cloud servers. For that, the proposed SFRRDC supports a user authentication mining (UAM) algorithm to secure the confidentiality of the users. Based on testing results, it is confirmed that the proposed SFRRDC provides a better solution for confidentiality and fast routing for a wireless telecommunication system. The results show that the proposed SFRRDC framework's energy consumption outperforms competing frameworks' energy consumption with a better-achieved latency. For example, the suggested SFRRDC method uses 748.5 J during 72 h of operation, competing frameworks use more energy, and DDFQFR uses 976.22 J. It also shows that the proposed SFRRDC is immune to malicious attacks. The results show that with 3600 Fog cloud users, the proposed HEE protocol reduces the number of attacks to only 48 compared to 58, 72, and 77415 expected malicious attacks when using the ICDRP-F-SDVN, ACO, and DDFQFR frameworks, respectively. |
format | Article |
id | doaj-art-642d8c947b014beeb8a7e9822e88a08e |
institution | Kabale University |
issn | 2665-9174 |
language | English |
publishDate | 2025-02-01 |
publisher | Elsevier |
record_format | Article |
series | Measurement: Sensors |
spelling | doaj-art-642d8c947b014beeb8a7e9822e88a08e2025-01-26T05:04:52ZengElsevierMeasurement: Sensors2665-91742025-02-0137101408A scalable framework for secure and reliable wireless-based fog cloud communicationKymbat Khairosheva0Abdul Razaque1Gulnara Bektemyssova2Joon Yoo3Department of Intelligent Systems and Cybersecurity, Astana IT University, KazakhstanSchool of Computing, Gachon University, South Korea; Corresponding author.Department of Computer Engineering and Information Systems, International Information Technology University, Almaty, KazakhstanSchool of Computing, Gachon University, South Korea—Wireless telecommunication systems are essential in transferring data through fog cloud servers. However, the fog cloud servers suffer from unreliable and non-secure routing and limited power resources when mobile users are mobile. This paper introduces a scalable framework (SFRRDC) for reliable wireless routing and secure data transfer. We aim to address security and reliability issues by combining pheromone termite (PT) characteristics and ant colony optimization (ACO) algorithms for high-performance, more secure, highly reliable data transfer among the fog cloud servers. For that, the proposed SFRRDC supports a user authentication mining (UAM) algorithm to secure the confidentiality of the users. Based on testing results, it is confirmed that the proposed SFRRDC provides a better solution for confidentiality and fast routing for a wireless telecommunication system. The results show that the proposed SFRRDC framework's energy consumption outperforms competing frameworks' energy consumption with a better-achieved latency. For example, the suggested SFRRDC method uses 748.5 J during 72 h of operation, competing frameworks use more energy, and DDFQFR uses 976.22 J. It also shows that the proposed SFRRDC is immune to malicious attacks. The results show that with 3600 Fog cloud users, the proposed HEE protocol reduces the number of attacks to only 48 compared to 58, 72, and 77415 expected malicious attacks when using the ICDRP-F-SDVN, ACO, and DDFQFR frameworks, respectively.http://www.sciencedirect.com/science/article/pii/S2665917424003842Fog cloud computing securityPheromone ter-mite ant colony optimization wireless telecommunication systemEnergy consumptionFog cloud malicious attacksConfidentiality |
spellingShingle | Kymbat Khairosheva Abdul Razaque Gulnara Bektemyssova Joon Yoo A scalable framework for secure and reliable wireless-based fog cloud communication Measurement: Sensors Fog cloud computing security Pheromone ter-mite ant colony optimization wireless telecommunication system Energy consumption Fog cloud malicious attacks Confidentiality |
title | A scalable framework for secure and reliable wireless-based fog cloud communication |
title_full | A scalable framework for secure and reliable wireless-based fog cloud communication |
title_fullStr | A scalable framework for secure and reliable wireless-based fog cloud communication |
title_full_unstemmed | A scalable framework for secure and reliable wireless-based fog cloud communication |
title_short | A scalable framework for secure and reliable wireless-based fog cloud communication |
title_sort | scalable framework for secure and reliable wireless based fog cloud communication |
topic | Fog cloud computing security Pheromone ter-mite ant colony optimization wireless telecommunication system Energy consumption Fog cloud malicious attacks Confidentiality |
url | http://www.sciencedirect.com/science/article/pii/S2665917424003842 |
work_keys_str_mv | AT kymbatkhairosheva ascalableframeworkforsecureandreliablewirelessbasedfogcloudcommunication AT abdulrazaque ascalableframeworkforsecureandreliablewirelessbasedfogcloudcommunication AT gulnarabektemyssova ascalableframeworkforsecureandreliablewirelessbasedfogcloudcommunication AT joonyoo ascalableframeworkforsecureandreliablewirelessbasedfogcloudcommunication AT kymbatkhairosheva scalableframeworkforsecureandreliablewirelessbasedfogcloudcommunication AT abdulrazaque scalableframeworkforsecureandreliablewirelessbasedfogcloudcommunication AT gulnarabektemyssova scalableframeworkforsecureandreliablewirelessbasedfogcloudcommunication AT joonyoo scalableframeworkforsecureandreliablewirelessbasedfogcloudcommunication |