Skip to main content
Log in

Mobi-Sense: mobility-aware sensor-fog paradigm for mission-critical applications using network coding and steganography

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Mission-critical applications refer to the real-time applications, which require fast and secure service provisioning, such as defense sector and disaster management. This paper proposes a delay-aware and secure service provisioning model for such types of applications. As a use-case, we have considered the defense sector, which is a vital sector for a country’s all-round well-being including security, safety, society, and economy. In the conventional sensor-cloud model, the sensor data is stored and processed in the cloud. However, the sensor nodes have small coverage and the use of the long distant cloud servers increases the delay. Therefore, the conventional sensor-cloud model may not be efficient for defense application. Moreover, data hiding for security purposes is another important aspect of this field. To address these challenges, this paper proposes a mobility-aware sensor-fog paradigm for mission-critical applications based on network coding and steganography, referred to as Mobi-Sense. In Mobi-Sense, steganography is used for hiding the data during transmission. The theoretical results demonstrate that Mobi-Sense outperforms the existing frameworks with respect to delay and power consumption by \(\sim (40-80)\)%. The simulation results present that Mobi-Sense reduces the delay by \(\sim (18-40)\)% than the conventional sensor-cloud framework for mission-critical applications. An optimal path finding algorithm based on deep learning has been deployed in the context of disaster scenario. The experimental analysis shows that the proposed optimal path finding method achieves precision and accuracy above 90%. This is observed that our proposed modules have outperformed existing baselines in terms of accuracy, delay, and power consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Mishra M, Roy SK, Mukherjee A, De D, Ghosh SK, Buyya R (2019) An energy-aware multi-sensor geo-fog paradigm for mission critical applications. J Amb Intell Human Comput. 1–19

  2. Misra S, Singh A, Chatterjee S, Obaidat MS (2014) Mils-cloud: a sensor-cloud-based architecture for the integration of military tri-services operations and decision making. IEEE Syst J 10(2):628–636

    Article  Google Scholar 

  3. Ghosh S, Mukherjee A, Ghosh SK, Buyya R (2022) Stoppage: Spatio-temporal data driven cloud-fog-edge computing framework for pandemic monitoring and management. Softw Pract Exper 52(12):2700–2726

  4. Nage T, Yu FR, St-Hilaire M (2010) Adaptive control of packet overhead in xor network coding. In: 2010 IEEE International Conference on Communications 1–5. IEEE

  5. Chen J, Lee VCS, Liu K, Ali MGGN, Chan E (2013) Efficient processing of requests with network coding in on-demand data broadcast environments. Inf Sci 232:27–43

    Article  MathSciNet  MATH  Google Scholar 

  6. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Privacy 1(3):32–44

    Article  Google Scholar 

  7. Sarmah DK, Kulkarni AJ (2018) Jpeg based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms. Inf Sci 430:378–396

    Article  Google Scholar 

  8. Yuan HD (2014) Secret sharing with multi-cover adaptive steganography. Inf Sci 254:197–212

    Article  MathSciNet  MATH  Google Scholar 

  9. Mukherjee A, De D, Ghosh SK (2020) Fogioht: a weighted majority game theory based energy-efficient delay-sensitive fog network for internet of health things. Inter Things 100181

  10. Ghosh S, Mukherjee A, Ghosh SK, Buyya R (2019) Mobi-iost: mobility-aware cloud-fog-edge-iot collaborative framework for time-critical applications. IEEE Trans Netw Sci Eng

  11. Das J, Ghosh S, Mukherjee A, Ghosh SK, Buyya R (2022) Rescue: enabling green healthcare services using integrated iot-edge-fog-cloud computing environments. Softw Pract Exp 52(7):1615–1642

    Article  Google Scholar 

  12. Gavrilović N, Mishra A (2021) Software architecture of the internet of things (iot) for smart city, healthcare and agriculture: analysis and improvement directions. J Amb Intell Humaniz Comput 12(1):1315–1336

    Article  Google Scholar 

  13. Almurisi N, Tadisetty S (2022) Cloud-based virtualization environment for iot-based wsn: solutions, approaches and challenges. J Amb Intell Humaniz Comput 1–23

  14. Burmaoglu S, Saritas O, Yalcin H (2019) Defense 4.0: internet of things in military. In Emerg Technol Econ Develop 303–320. Springer

  15. Mukherjee A, Ghosh S, De D, Ghosh SK (2022) Mcg: Mobility-aware computation offloading in edge using weighted majority game. IEEE Trans Netw Sci Eng

  16. Memari P, Mohammadi SS, Jolai F, Tavakkoli-Moghaddam R (2022) A latency-aware task scheduling algorithm for allocating virtual machines in a cost-effective and time-sensitive fog-cloud architecture. J Supercomput 78(1):93–122

    Article  Google Scholar 

  17. Ahmad M, Amin MB, Hussain S, Kang BH, Cheong T, Lee S (2016) Health fog: a novel framework for health and wellness applications. J Supercomput 72(10):3677–3695

    Article  Google Scholar 

  18. Mukherjee A, Ghosh S, Behere A, Ghosh SK, Buyya R (2020) Internet of health things (ioht) for personalized health care using integrated edge-fog-cloud network. J Amb Intell Humaniz Comput

  19. Sulyman AI, Henggeler C (2022) Physical layer security for military iot links using mimo-beamforming at 60 ghz. Information 13(2):100

    Article  Google Scholar 

  20. Campioni L, Poltronieri F, Stefanelli C, Suri N, Tortonesi M, Wrona K (2023) Enabling civil-military collaboration for disaster relief operations in smart city environments. Fut Generat Comput Syst 139:181–195

    Article  Google Scholar 

  21. Bichi BY, Islam SU, Kademi AM, Ahmad I (2022) An energy-aware application module for the fog-based internet of military things. Discov Intern Things 2(1):4

  22. Limkar SV, Jha RK (2019) A novel method for parallel indexing of real time geospatial big data generated by iot devices. Fut Generat Comput Syst 97:433–452

    Article  Google Scholar 

  23. MacEachren AM, Robinson A, Hopper S, Gardner S, Murray R, Gahegan M, Hetzler E (2005) Visualizing geospatial information uncertainty: What we know and what we need to know. Cartogr Geogr Inf Sci 32(3):139–160

    Article  Google Scholar 

  24. Yang C, Yu M, Hu F, Jiang Y, Li Y (2017) Utilizing cloud computing to address big geospatial data challenges. Comput Environ Urban Syst 61:120–128

    Article  Google Scholar 

  25. Dulík M, Junior MD (2016) Security in military cloud computing applications. Sci Milit J. 11(1):26

  26. Chakravarthy M Hemanth, Kannan E, Belinda MJ Carmel Mary (2019) A hybrid routing protocol towards secure and smart military applications in cloud environments. In Novel Practices and Trends in Grid and Cloud Computing, pages 234–248. IGI Global

  27. Thangadurai K, Devi G Sudha (2014) An analysis of lsb based image steganography techniques. In 2014 International Conference on Computer Communication and Informatics, pages 1–4. IEEE

  28. Hemanth H, Hrutish Ram VS, Raghavendran S Guru, Subhashini N (2022) Modified lsb algorithm using xor for audio steganography. In: Sustainable Advanced Computing: Select Proceedings of ICSAC 2021, pages 369–379. Springer

  29. Rhoads GB (July 24 2001) Audio or video steganography. US Patent 6,266,430

  30. Huang CM, Lan KC, Tsai CZ (2008) A survey of opportunistic networks. In :22nd International Conference on Advanced Information Networking and Applications-Workshops (aina workshops 2008), pages 1672–1677. IEEE

  31. Karatzoglou A, Schnell N, Beigl M (2018) A convolutional neural network approach for modeling semantic trajectories and predicting future locations. In: International Conference on Artificial Neural Networks, 61–72. Springer

  32. Liu W, Wang Z, Liu X, Zeng N, Liu YY, Alsaadi Fuad E (2017) A survey of deep neural network architectures and their applications. Neurocomputing 234:11–26

    Article  Google Scholar 

  33. Liu Q, Wu S, Wang L, Tan T (2016) Predicting the next location: a recurrent model with spatial and temporal contexts. In: Thirtieth AAAI conference on artificial intelligence

  34. Ghosh S, Mukherjee A (2022) Strove: Spatial data infrastructure enabled cloud–fog–edge computing framework for combating covid-19 pandemic. Innov Syst Softw Eng 1–17

  35. Gupta H, Vahid DA, Ghosh SK, Buyya R (2017) ifogsim: A toolkit for modeling and simulation of resource management techniques in the internet of things, edge and fog computing environments. Softw Pract Exp 47(9):1275–1296

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Contributions

AM: Conceptualization, Formal Analysis, Methodology, Writing original draft. SG: Conceptualization, Methodology, Data curation, Writing original draft. SKG: Resources, Supervision, Writing review & editing. RB: Investigation, Supervision, Writing review & editing.

Corresponding author

Correspondence to Shreya Ghosh.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

Not applicable.

Availability of data and materials

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mukherjee, A., Ghosh, S., Ghosh, S.K. et al. Mobi-Sense: mobility-aware sensor-fog paradigm for mission-critical applications using network coding and steganography. J Supercomput 79, 17495–17518 (2023). https://doi.org/10.1007/s11227-023-05300-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05300-5

Keywords

Navigation