Distributed computational model for shared processing on Cyber-Physical System environments

被引:25
作者
Mora, Higinio [1 ]
Colom, Jose Francisco [1 ]
Gil, David [2 ]
Jimeno-Morenilla, Antonio [3 ]
机构
[1] Univ Alicante, Specialized Processor Architecture Lab, Dept Comp Sci Technol & Computat, Alicante 03690, Spain
[2] Univ Alicante, Dept Comp Sci Technol & Computat, Lucentia Res Grp, Alicante 03690, Spain
[3] Univ Alicante, Dept Comp Sci Technol & Computat, UniCAD Res Grp, Alicante 03690, Spain
关键词
Cyber-physical systems; Internet of things; Mobile computing; Modeling; Distributed computation; INTRUSION DETECTION SYSTEM; FUTURE; ALGORITHMS; IOT;
D O I
10.1016/j.comcom.2017.07.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-Physical Systems typically consist of a combination of mobile devices, embedded systems and computers to monitor, sense, and actuate with the surrounding real world. These computing elements are usually wireless, interconnected to share data and interact with each other, with the server part and also with cloud computing services. In such a heterogeneous environment, new applications arise to meet ever-increasing needs and these are an important challenge to the processing capabilities of devices. For example, automatic driving systems, manufacturing environments, smart city management, etc. To meet the requirements of said application contexts, the system can create computing processes to distribute the workload over the network and/or a cloud computing server. Multiple options arise in relation to what network nodes should support the execution of the processes. This paper focuses on this problem by introducing a distributed computational model to dynamically share these tasks among the computing nodes and considering the inherent variability of the context in these environments. Our novel approach promotes the integration of the computing resources, with externally supplied cloud services, to fulfill modern application requirements. A prototype implementation for the proposed model has been built and an application example has been designed to validate the proposal in a real working environment. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:68 / 83
页数:16
相关论文
共 69 条
[1]   Deployment strategies in the wireless sensor network: A comprehensive review [J].
Abdollahzadeh, Sanay ;
Navimipour, Nima Jafari .
COMPUTER COMMUNICATIONS, 2016, 91-92 :1-16
[2]  
Abowd G. D., 2000, ACM Transactions on Computer-Human Interaction, V7, P29, DOI 10.1145/344949.344988
[3]   Beyond Weiser: From Ubiquitous to Collective Computing [J].
Abowd, Gregory D. .
COMPUTER, 2016, 49 (01) :16-22
[4]  
Akherfi Khadija, 2018, Applied Computing and Informatics, V14, P1, DOI 10.1016/j.aci.2016.11.002
[5]   A security framework for cloud-based video surveillance system [J].
Alsmirat, Mohammad A. ;
Obaidat, Islam ;
Jararweh, Yaser ;
Al-Saleh, Mohammed .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (21) :22787-22802
[6]   Real-time scheduling with resource sharing on heterogeneous multiprocessors [J].
Andersson, Bjoern ;
Raravi, Gurulingesh .
REAL-TIME SYSTEMS, 2014, 50 (02) :270-314
[7]  
[Anonymous], 16 EUR C POW EL APPL
[8]  
[Anonymous], INT GREEN SUST COMP
[9]  
[Anonymous], 2016, INT J CRITICAL COMPU, DOI DOI 10.1504/IJCCBS.2016.081808
[10]  
[Anonymous], P WIR DAYS PORT PORT