CFP last date
22 April 2024
Reseach Article

Application of Fog Computing in Military Operations

by Divya Lanka, Ch. Lakshmi Veenadhari, D. Suryanarayana
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 6
Year of Publication: 2017
Authors: Divya Lanka, Ch. Lakshmi Veenadhari, D. Suryanarayana
10.5120/ijca2017913653

Divya Lanka, Ch. Lakshmi Veenadhari, D. Suryanarayana . Application of Fog Computing in Military Operations. International Journal of Computer Applications. 164, 6 ( Apr 2017), 10-15. DOI=10.5120/ijca2017913653

@article{ 10.5120/ijca2017913653,
author = { Divya Lanka, Ch. Lakshmi Veenadhari, D. Suryanarayana },
title = { Application of Fog Computing in Military Operations },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 6 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number6/27486-2017913653/ },
doi = { 10.5120/ijca2017913653 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:33.278326+05:30
%A Divya Lanka
%A Ch. Lakshmi Veenadhari
%A D. Suryanarayana
%T Application of Fog Computing in Military Operations
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 6
%P 10-15
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper clearly explains about the integration of fog computing in cloud environment to implement in military operation based applications. It explains the working model with fog computing. This approach is purely an outcome of the advantages of fog computing over the breaches with cloud computing. Thus, this will be a solution in most of the applications by including this technology in wireless sensor networks. This architecture was developed for providing high end secure applications. This approach has been applied to overcome the vulnerabilities in the real time applications using wireless sensor networks. This approach is performed in military applications to take spontaneous decision making by the military officials. Therefore this paper presents the reliable model in many smart wireless sensor networks.

References
  1. Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611.
  2. Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012, August). Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing (pp. 13-16). ACM.
  3. Bonomi, F. (2011, September). Connected vehicles, the internet of things, and fog computing. In The Eighth ACM International Workshop on Vehicular Inter-Networking (VANET), Las Vegas, USA (pp. 13-15).
  4. Zafar, F., Khan, A., Malik, S. U. R., Ahmed, M., Anjum, A., Khan, M. I., ... & Jamil, F. (2017). A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Computers & Security, 65, 29-49.
  5. Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security issues in cloud environments: a survey. International Journal of Information Security, 13(2), 113-170.
  6. White Paper. Mobile Cloud Computing Solution Brief.AEPONA, 2010.
  7. Yi, S., Li, C., & Li, Q. (2015, June). A survey of fog computing: concepts, applications and issues. In Proceedings of the 2015 Workshop on Mobile Big Data (pp. 37-42). ACM.
  8. Elastic Compute Cloud (EC2) – Cloud Server & Hosting – AWS. (2017). Amazon Web Services, Inc.. Retrieved 6 February 2017, from https://aws.amazon.com/ec2/
  9. Stojmenovic, I., Wen, S., Huang, X., & Luan, H. (2015). An overview of Fog computing and its security issues. Concurrency and Computation: Practice and Experience.
  10. Al-Karaki, J. N., & Kamal, A. E. (2004). Routing techniques in wireless sensor networks: a survey. IEEE wireless communications, 11(6), 6-28.
  11. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer networks, 38(4), 393-422.
  12. Kanakam, P., Hussain, S. M., & Chakravarthy, A. S. N. (2015, December). Electronic noses: Forestalling fire disasters: A technique to prevent false fire alarms and fatal casualties. In Computational Intelligence and Computing Research (ICCIC), 2015 IEEE International Conference on (pp. 1-6). IEEE.
  13. Potdar, V., Sharif, A., & Chang, E. (2009, May). Wireless sensor networks: A survey. In Advanced Information Networking and Applications Workshops, 2009. WAINA'09. International Conference on (pp. 636-641). IEEE.
  14. Flammini, A., & Sisinni, E. (2014). Wireless sensor networking in the Internet of Things and cloud computing era. Procedia Engineering, 87, 672-679.
  15. Benefits of Cloud computing To Wireless Sensor Networks – Wireless Sensor Networks Magazine. (2017). Wsnmagazine.com. Retrieved 16 March 2017, from https://www.wsnmagazine.com/cloud-computing-wsn/
  16. Kurschl, W., & Beer, W. (2009, December). Combining cloud computing and wireless sensor networks. In Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services (pp. 512-518). ACM.
  17. Le Vinh, T., Bouzefrane, S., Farinone, J. M., Attar, A., & Kennedy, B. P. (2015). Middleware to integrate mobile devices, sensors and cloud computing. Procedia Computer Science, 52, 234-243.
  18. DAI, H. Y., TANG, H., & HU, X. P. (2010). Wireless Sensor Networks in Military Application. Computer Knowledge and Technology, 16, 034.
  19. Prabhu, B., Pradeep, M., & Gajendran, E. (2017). Military Applications of Wireless Sensor Network System.
  20. Vishwanath, A., Peruri, R., & He, J. S. (2016). Security in fog computing through encryption. International Journal of Information Technology and Computer Science (IJITCS), 8(5), 28.
  21. KAREKAR, S. P., & VAIDYA, S. M. (2015). Perspective of Decoy Technique using Mobile Fog Computing with Effect to Wireless Environment.
  22. Stolfo, S. J., Salem, M. B., & Keromytis, A. D. (2012, May). Fog computing: Mitigating insider data theft attacks in the cloud. In Security and Privacy Workshops (SPW), 2012 IEEE Symposium on (pp. 125-128). IEEE.
  23. Powell Jr, D. A. (2013). The Military Applications of Cloud Computing Technologies. ARMY COMMAND AND GENERAL STAFF COLLEGE FORT LEAVENWORTH KS SCHOOL OF ADVANCED MILITARY STUDIES.
  24. Chouikhi, S., El Korbi, I., Ghamri-Doudane, Y., & Saidane, L. A. (2015). A survey on fault tolerance in small and large scale wireless sensor networks. Computer Communications, 69, 22-37.
  25. Đurišić, M. P., Tafa, Z., Dimić, G., & Milutinović, V. (2012, June). A survey of military applications of wireless sensor networks. In Embedded Computing (MECO), 2012 Mediterranean Conference on (pp. 196-199). IEEE
  26. K. Prathyusha, S. M. Hussain and A. S. N. Chakravarthy, "A cognitive perceptive framework with gait recognition technology," 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, India, 2016, pp. 665-669.
Index Terms

Computer Science
Information Sciences

Keywords

Fog Computing Cloud Computing Military Applications Smart Wireless Sensor Networks.