Rezanov B. Models and methods for optimizing task distribution in the Fog environment of the Internet of Things

Українська версія

Thesis for the degree of Doctor of Philosophy (PhD)

State registration number

0823U101637

Applicant for

Specialization

  • 123 - Комп’ютерна інженерія

02-02-2024

Specialized Academic Board

ДФ 64.050.111-3589

National Technical University "Kharkiv Polytechnic Institute"

Essay

The dissertation work is devoted to solving an urgent scientific and technical problem related to the development of new and improvement of existing methods for distributing tasks that need to be performed in near real time in foggy environments of the Internet of Things. Object of research is the process of task distribution in the foggy environment of the Internet of Things. The subject of research is models and methods of task distribution in the foggy environment of the Internet of Things. The purpose of the dissertation is to increase the efficiency of using the computing resources of the foggy environments of the Internet of Things by developing new and improving existing methods for distributing tasks that need to be performed in near real time. The following scientific results were obtained as a result of the study: the method of clustering the fog environment supporting the Internet of Things was further developed by using a mathematical model of the initial distribution of the integrated cluster of computing resources, which improved the quality of grouping tasks and resources and contributed to the performance of the fog platform; for the first time, a model of elementary task flows of the Internet of Things using a fog platform was developed, which takes into account the features of distributed computing and allows decomposition of a coherent continuous sequence of input data; an improved set of methods for allocating resources of the fog environment supporting the Internet of Things, which differs from the known ones by the joint use of the developed model of elementary task flows and the clustering method, which made it possible to speed up the process of adaptive redistribution of resources and carry it out without suspending the transaction processing in cases of variable load and increased resource requirements, as well as significantly reduce processing time and balance the use of cloud resources when large data flows are received; the method of fast two-factor authentication between IoT devices was further developed by integrating the second factor into the authentication service with a centralized user database, which significantly reduced the time required to verify access authorization and ensure data confidentiality. The practical significance of the results is as follows: – increase the performance of the fog IoT platform by up to 9%. One of the key benefits is improved system performance due to optimized task distribution. This allows for faster and more efficient processing of data coming from IoT sensors and performing data processing tasks;– reduction of response time by up to 10%: the developed methods allow for more rational use of resources, such as computing power and network bandwidth. This leads to a reduction in the average response time of the system; – improving the method of fast two-factor authentication in foggy IoT environments. As a result of these improvements, the authentication speed has increased by 2.65 times when using this method for the considered fog platform; – development of modern applications: the results obtained make more scenarios for using IoT systems on the fog platform available. This expands the possibilities for applications in industries such as city management, industry, healthcare, and many others; – ensuring resilience and reliability by up to 3% on average: optimized methods make IoT systems more resilient to challenges and ensure reliable operation under load and change. Based on the study results, the practical and theoretical value of the developed methods was confirmed, practical recommendations were given on applying the developed methods, and prospects for their further development were considered.

Research papers

Резанов Б. М., Кучук Г. А. Модель розподілу елементарних потоків даних у туманній платформі підтримки інтернету речей. Сучасний стан наукових досліджень та технологій в промисловості. Харків: Харківський національний університет радіоелектроніки, 2023. № 3 (25). С. 109-120. (Б)

Резанов Б. М. Aналіз шляхів зменшення затримки мікропотоків в комп’ютерних системах підтримки iot на туманній платформі. Системи управління, навігації та зв’язку. Полтава: Національний університет «Полтавська політехніка», 2022. № 3 (69). С. 88-92. (Б)

Rezanov B., Kuchuk H. Modeling the process of two-factor authentication. Сучасні інформаційні системи. Харків : НТУ «ХПІ», 2022. Том 6, № 2. C. 10-15. (Б)

Семенов С. Г., Резанов Б. М., Босько В.В. Процедури двохфакторної аутентифікації для забезпечення захисту електронного цифрового підпису. Системи управління, навігації та зв’язку. Полтава: Національний університет «Полтавська політехніка», 2016. № 2 (43). С. 107-111. (Б)

Резанов Б. М., Бульба С. С., Шокотько Д. В. Фактори аутентифікації системи контролю та управління доступом. Системи управління, навігації та зв’язку. Полтава: Національний університет «Полтавська політехніка», 2017. № 3 (43). С. 63-65. (Б)

Rezanov B., Kuchuk H. Fast Two-Factor Authentication Method in Systems With a Centralized User's Database. 2022 IEEE 3rd KhPI Week on Advanced Technology Conference (3-7 жовтня 2022 р., Харків). 2022.

Rezanov B., Semenova A., Petrovska I., Fesenko T. Model for Providing the 7 Second Factor of Authentication Into Authentication Services with Centralized Account Databases. Proceedings of the 5th International Scientific and Technical Conference "Computer and Information Systems and Technologies". Харків : ХНУРЕ, 2021. С. 46- 47.

Резанов Б. М., Риженкова В. О. Система аналізу відбитків пристроїв користувачів для протидії електронному шахрайству. Інформатика, управління та штучний інтелект : Тези VI Міжнародної науково-технічної конференції. Харків: ХПІ, 2019. С. 102.

Резанов Б. М., Анциферова О. О, Камчатна-Степанова К. В. Двохфакторна аутентифікація для забезпечення захисту електронного цифрового підпису. Проблеми науково-технічного та провового забезпечення кібербезпеки у сучасному світі: Тези доповідей II Mіжнародної науково-практичної конференції. Харків – Київ – Дніпро – Баку – Бельско-Бяла, 2017. C. 80.

Резанов Б. М., Шкотько Д. В. Синтез архітектури хмарних сервісів на основі аналізу моделі контексту користувача. Проблеми інформатизації: Тези V Mіжнародної науково-технічної конференції. Секція 5. Черкаси – Баку – БельськоБяла – Харків, 2017. С. 27.

Rezanov B., Cherneva G., Bartosh M. Method for providing two-factor authentication in operating systems working with authentication services with centralized account databases in telecommunication networks. Mechanics Transport Communications: academic journal. Bulgaria, 2021. Vol. 19, Issue 1. Article No 2065.

Files

Similar theses