{"id":"https://openalex.org/W2896252239","doi":"https://doi.org/10.1109/mce.2018.2851723","title":"Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices","display_name":"Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices","publication_year":2018,"publication_date":"2018-10-08","ids":{"openalex":"https://openalex.org/W2896252239","doi":"https://doi.org/10.1109/mce.2018.2851723","mag":"2896252239"},"language":"en","primary_location":{"id":"doi:10.1109/mce.2018.2851723","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mce.2018.2851723","pdf_url":null,"source":{"id":"https://openalex.org/S2483040032","display_name":"IEEE Consumer Electronics Magazine","issn_l":"2162-2248","issn":["2162-2248","2162-2256"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Consumer Electronics Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5105335899","display_name":"Fuhong Lin","orcid":"https://orcid.org/0000-0002-5287-5226"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fuhong Lin","raw_affiliation_strings":["School of Computer and Communication Engineering, University of Science and Technology, Beijing"],"affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, University of Science and Technology, Beijing","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046106295","display_name":"Yutong Zhou","orcid":"https://orcid.org/0000-0002-9047-9873"},"institutions":[{"id":"https://openalex.org/I146563203","display_name":"University of International Business and Economics","ror":"https://ror.org/05khqpb71","country_code":"CN","type":"education","lineage":["https://openalex.org/I146563203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yutong Zhou","raw_affiliation_strings":["Institute of Education and Economy Research, University of International Business and Economics, China"],"affiliations":[{"raw_affiliation_string":"Institute of Education and Economy Research, University of International Business and Economics, China","institution_ids":["https://openalex.org/I146563203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009923748","display_name":"Xingsuo An","orcid":null},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingsuo An","raw_affiliation_strings":["Department of Computer and Communication Engineering, University of Science and Technology, Beijing"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Communication Engineering, University of Science and Technology, Beijing","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017792460","display_name":"Ilsun You","orcid":"https://orcid.org/0000-0002-0604-3445"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ilsun You","raw_affiliation_strings":["Department of Information Security Engineering, Soonchunhyang University, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information Security Engineering, Soonchunhyang University, South Korea","institution_ids":["https://openalex.org/I24541011"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Cloud Technology Endowed, University of Texas, San Antonio"],"affiliations":[{"raw_affiliation_string":"Cloud Technology Endowed, University of Texas, San Antonio","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5105335899"],"corresponding_institution_ids":["https://openalex.org/I92403157"],"apc_list":null,"apc_paid":null,"fwci":22.2772,"has_fulltext":false,"cited_by_count":169,"citation_normalized_percentile":{"value":0.99583199,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"7","issue":"6","first_page":"45","last_page":"50"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8323503136634827},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.779720664024353},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.7442114353179932},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.671358585357666},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6391052007675171},{"id":"https://openalex.org/keywords/shared-resource","display_name":"Shared resource","score":0.537550687789917},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5300495624542236},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5057785511016846},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.48268675804138184},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.45475661754608154},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4313586950302124},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4277489483356476},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.42600560188293457},{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource management (computing)","score":0.42426663637161255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3427455425262451},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11970725655555725},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07380545139312744}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8323503136634827},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.779720664024353},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.7442114353179932},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.671358585357666},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6391052007675171},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.537550687789917},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5300495624542236},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5057785511016846},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.48268675804138184},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.45475661754608154},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4313586950302124},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4277489483356476},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.42600560188293457},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.42426663637161255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3427455425262451},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11970725655555725},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07380545139312744},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mce.2018.2851723","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mce.2018.2851723","pdf_url":null,"source":{"id":"https://openalex.org/S2483040032","display_name":"IEEE Consumer Electronics Magazine","issn_l":"2162-2248","issn":["2162-2248","2162-2256"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Consumer Electronics Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1890643295","https://openalex.org/W1987354455","https://openalex.org/W2022905828","https://openalex.org/W2028242525","https://openalex.org/W2032723264","https://openalex.org/W2055748525","https://openalex.org/W2083197020","https://openalex.org/W2102751293","https://openalex.org/W2104276806","https://openalex.org/W2113272969","https://openalex.org/W2113551315","https://openalex.org/W2117366456","https://openalex.org/W2158876528","https://openalex.org/W2262390119","https://openalex.org/W2474414057","https://openalex.org/W2507351359","https://openalex.org/W2521112295","https://openalex.org/W2521876175","https://openalex.org/W2548601994","https://openalex.org/W2562574863","https://openalex.org/W2606297994","https://openalex.org/W2609109743","https://openalex.org/W2625253400","https://openalex.org/W2753614855","https://openalex.org/W2760087655","https://openalex.org/W2950007716","https://openalex.org/W4253800079","https://openalex.org/W4294621851","https://openalex.org/W6639249596","https://openalex.org/W6658772113","https://openalex.org/W6676992443","https://openalex.org/W6692700498","https://openalex.org/W6744057454","https://openalex.org/W6764821831"],"related_works":["https://openalex.org/W4322761281","https://openalex.org/W4238233472","https://openalex.org/W4313463218","https://openalex.org/W4312996489","https://openalex.org/W3111395152","https://openalex.org/W4313526662","https://openalex.org/W3106131444","https://openalex.org/W3216099748","https://openalex.org/W4205963435","https://openalex.org/W4319161913"],"abstract_inverted_index":{"The":[0],"recent":[1],"trend":[2],"of":[3,12,18,49],"edge":[4,17,37,44,73,92],"computing":[5,8,93],"extends":[6],"cloud":[7],"and":[9,51,55,69,86,98,115,134,146],"the":[10,16,19,41,76,103,143,156],"Internet":[11],"Things":[13],"(IoT)":[14],"to":[15,22,32,40,81,127,153],"network.":[20],"Similar":[21],"most":[23],"systems,":[24],"an":[25,60],"intrusion-detection":[26],"system":[27,78],"(IDS)":[28],"is":[29,62,79,96,120,151],"commonly":[30],"used":[31,152],"mitigate":[33],"cybersecurity":[34],"threats":[35],"in":[36,43,47,72,161],"computing.":[38,74],"Due":[39],"limitations":[42],"nodes":[45],"(e.g.,":[46],"terms":[48],"computational":[50],"storage":[52],"capabilities),":[53],"efficient":[54],"fair":[56,117,148,159],"resource":[57,70,131,137],"allocation":[58,71,119,132,138,160],"within":[59],"IDS":[61,67,94],"challenging.":[63],"This":[64],"article":[65],"studies":[66],"architecture":[68,95],"Specifically,":[75],"proposed":[77],"designed":[80],"facilitate":[82],"multiple":[83,157,162],"resources":[84,158],"sharing":[85],"heterogeneous":[87],"resource-demanding":[88],"allocation.":[89],"A":[90],"general":[91],"presented,":[97],"we":[99],"use":[100],"this":[101],"as":[102],"basis":[104],"for":[105,108],"our":[106,141],"model":[107],"allocating":[109],"resources.":[110],"Then,":[111],"a":[112,135],"single-layer":[113],"dominant":[114,145],"max-min":[116,147],"(SDMMF)":[118],"used,":[121],"which":[122],"has":[123],"been":[124],"theoretically":[125],"proven":[126],"satisfy":[128],"all":[129],"hierarchical":[130],"properties,":[133],"multilayer":[136,144],"scheme":[139],"[in":[140],"system,":[142],"(MDMMF)":[149],"allocation]":[150],"cope":[154],"with":[155],"layers.":[163]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":20},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":72},{"year":2019,"cited_by_count":21},{"year":2018,"cited_by_count":6}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
