You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

20 August 2023

Enhancing Energy Efficiency and Fast Decision Making for Medical Sensors in Healthcare Systems: An Overview and Novel Proposal

,
and
1
Department of Computer Science and Information Technology, School of Computing, Engineering and Mathematical Sciences, La Trobe University, Bundoora, VIC 3086, Australia
2
La Trobe Business School, La Trobe University, Bundoora, VIC 3086, Australia
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Internet of Health Things

Abstract

In the realm of the Internet of Things (IoT), a network of sensors and actuators collaborates to fulfill specific tasks. As the demand for IoT networks continues to rise, it becomes crucial to ensure the stability of this technology and adapt it for further expansion. Through an analysis of related works, including the feedback-based optimized fuzzy scheduling approach (FOFSA) algorithm, the adaptive task allocation technique (ATAT), and the osmosis load balancing algorithm (OLB), we identify their limitations in achieving optimal energy efficiency and fast decision making. To address these limitations, this research introduces a novel approach to enhance the processing time and energy efficiency of IoT networks. The proposed approach achieves this by efficiently allocating IoT data resources in the Mist layer during the early stages. We apply the approach to our proposed system known as the Mist-based fuzzy healthcare system (MFHS) that demonstrates promising potential to overcome the existing challenges and pave the way for the efficient industrial Internet of healthcare things (IIoHT) of the future.

1. Introduction

The Internet of Things (IoT) facilitates seamless communication between sensors and actors within a network, serving specific tasks across various work environments, including healthcare systems. The fundamental objective of IoT networks is to streamline workflows and enhance overall convenience.
The primary objective of IoT networks is to streamline workflows and enhance overall convenience by facilitating real-time data sharing, analysis, and decision making. As a result, the demand for IoT networks is anticipated to undergo a remarkable surge in the upcoming years, with forecasts projecting an astonishing 55.7 billion connected devices by the year 2025 [1]. This exponential growth underscores the importance of ensuring the stability, security, and adaptability of IoT technology to effectively cater to the evolving demands of modern industries.
Within the healthcare sector, the reliance on IoT network services is poised to become even more pronounced. Such services hold the potential to revolutionize patient care by empowering doctors, nurses, and medical practitioners to closely monitor and manage patients’ health conditions in real time. Through the continuous collection and analysis of patient data from various IoT-enabled devices, healthcare professionals can make informed decisions promptly, leading to quicker responses to critical situations and more effective treatment strategies. Moreover, IoT networks offer the capability to automate administrative tasks, such as scheduling appointments and managing medical records, which not only saves time but also reduces the risk of errors.
To that end, this paper introduces a pioneering solution known as the Mist-based fuzzy healthcare system (MFHS), which addresses the crucial aspects of processing time and energy efficiency within IoT networks. MFHS leverages the concept of the Mist layer, an intermediate layer that strategically manages the allocation of IoT data resources in the initial stages of data processing. By efficiently distributing computational tasks and data-processing activities, MFHS optimizes the utilization of resources, leading to reduced processing times and enhanced energy efficiency. This innovative approach has the potential to significantly improve the overall performance of IoT networks, ensuring that healthcare systems and other industries can leverage the full benefits of IoT technology.
The paper comprises six sections, where the first section critically examines and analyses recent studies relevant to MFHS. The second section provides a comprehensive review of previous studies that leveraged fuzzy logic systems to address IoT network challenges. Section 3 offers an overview of the motivation and contributions of MFHS, while Section 4 presents the detailed methodology employed in MFHS. Section 5 showcases the results obtained from the implementation of MFHS, including a comparative analysis with existing approaches. Finally, the concluding section summarizes the key findings and highlights the implications of MFHS in advancing IoT network efficiency within healthcare systems.

3. Motivation and Aims: Proposed Model

Previous research in IoT systems, specifically in the areas of fog computing and cloud computing, has focused on task distribution and load balancing among computing layers. The primary goal has been to reduce power consumption and processing time by offloading tasks from one layer to another. However, the offloading process itself requires power, time, storage, and computing capacity. Therefore, it is crucial to minimize the offloading process in order to save energy, time, storage, and computing resources in the IoT system. However, this reduction must be achieved without negatively impacting the system, such as causing delays.
The proposed approach aims to reduce the offloading process by distributing tasks among computing layers in the early stages and leveraging this reduction. By prioritizing tasks and allocating resources to them at an early stage, we can achieve our objective, as tasks will be sent directly to their designated resources unless exceptional cases arise, such as when the resources are full. To achieve this, we allocate resources for tasks processed at the Mist layer. The Mist layer, located close to the Edge layer (medical sensors), plays a crucial role in assisting patients with critical conditions and facilitating real-time monitoring for quick decision making.
When allocating resources, we consider two main factors that help us make better decisions and minimize task offloading. The first factor relates to the health condition of the patients, while the second factor pertains to the capacity of the resources. In this context, we only consider the Mist nodes and the Fog nodes, and we do not take into account the capacity of the Cloud since it is centralized. By leveraging fuzzy logic systems, which are powerful tools for decision making and delivering accurate results, we can estimate and predict the optimal resource allocation for healthcare tasks. To study and analyse the proposed system, we will adopt healthcare systems as a model, focusing on the MFHS (Mist-based fuzzy healthcare system).

3.1. Our Proposed MFHS Aims to Achieve the Following

  • Decision making at the extreme edge of the network, facilitated by the Mist broker, to enable fast decision making and reduce processing time.
  • Estimating patients’ healthcare conditions and allocating resources based on their conditions.
  • Prioritizing data packets for patients with critical conditions, ensuring they are served first.
  • Minimizing transfer time by allocating resources at the Mist broker, located at the extreme edge of the network.
  • Reducing power consumption by eliminating the need for data offloading at all layers except the Mist layer.

3.2. The Proposed Approach

The MFHS (Mist-based fuzzy healthcare system) operates across four layers: the Edge layer, the Mist layer, the Fog layer, and the Cloud layer, each playing a crucial role in processing data for healthcare systems. In the following section, we provide a detailed description of these layers and outline their functionalities within our approach. Additionally, Figure 1 provides a concise overview of the system design, illustrating all the components utilized in our proposed approach.
Figure 1. Proposal design.
(1)
Edge layer: It collects medical data such as body temperature using sensor devices. The Edge layer sends the sensed data to the Mist layer, which categorizes data based on the patient’s condition. The Edge layer only sends the sensed data that a Mist layer requires for categorization, which means some medical sensor devices can be removed without affecting the system.
(2)
Mist layer: The Mist layer receives the sensed data from the Edge layer. It categorizes data based on the patient’s health condition and the computing capacity of Mist using two fuzzy logic systems, namely MFHS1 and MFHS2. MFHS1 focuses on data categorization, where the Mist broker employs fuzzy rules to classify the data based on the patient’s health condition and its priority. On the other hand, MFHS2 is responsible for estimating the computing capacity of the Mist nodes, enabling the system to determine whether the data should be processed in the Fog, Cloud, or within the Mist layer itself.
(3)
Fog layer: The Fog layer via the Fog broker is responsible for exceptional cases, such as when the Mist layer is unable to process data due to storage or capacity limitations. The Fog broker takes charge of distributing these data among the Fog nodes based on the clustering of these nodes.
(4)
Cloud layer: The Cloud layer receives high-priority cases directly from the Mist layer for processing. Additionally, it acts as a recipient of data when the computing capacity of both the Mist and Fog nodes is insufficient to handle the workload.

4. Phases of the Proposed Approach

Before we go further into the design, it is essential to define the fuzzy logic system. Fuzzy logic is a predicting system to make accurate decisions based on fuzzy rules. Figure 2 shows how a fuzzy system works. The fuzzy logic system consists of two main phases: fuzzification and defuzzification.
Figure 2. Fuzzy logic system structure.
Fuzzification converts crisp values to fuzzy set values; in this stage, it is essential to draw the membership function and fuzzy sets and use the established fuzzy rules to generate fuzzy set outputs [22]. Many types of membership functions convert crisp data to fuzzy sets; however, in this design, the triangular membership function is selected as it provides accurate results and suits the design.
The triangular function is given below:
μ A X = 0                                                 x a x a m a                                   a < x m b x b m                                   m < x < b 0                                                       x b
where X is the new input that requires decision making; and a, m, and b are the points to determine the interval of each triangle in the membership function, with μ A X as the output of Equation (1).
Defuzzification converts the output values of the fuzzy set into crisp values by using some linguistic rules of if-then and logical operators [23]; in this design, we will use the AND operator. There are many equations to calculate defuzzification, and the centroid of area (CoA) is used in this design. The defuzzification equation is as follows:
x * = i = 1 n x i × μ ( x i ) i = 1 n μ ( x i )
Our proposed approach consists of two phases. Phase 1 assists in data categorization. Phase 2 assists in allocating resources depending on the categorized data in phase 1 and Mist node capacity.

4.1. Phase 1

The first phase of our proposed system occurs within the Mist broker, where data categorization takes place using a fuzzy system (FS). This process aims to effectively handle patient data across various health conditions and determine the appropriate server resource from the Mist, Fog, and Cloud layers. The Edge layer focuses on three medical sensors, namely the body temperature (BT) sensor, glucose level (GL) sensor, and heart rate (HR) sensor, which record the patients’ health data. These recorded data are initially transmitted to the Mist layer, specifically the Mist broker, where they undergo categorization using the FS. The Mist broker classifies the patients’ health data into three priority levels: high priority (critical cases), medium priority (susceptible to disease), and low priority (healthy), based on the patients’ health conditions.
The FS can accomplish that by converting the actual data (crisp inputs) into linguistic values (fuzzy input set) using the fuzzification method to determine and estimate patients’ health conditions based on fuzzy rules to generate fuzzy output sets. Then these outputs are defuzzified to convert linguistic values to crisp values and count them as the results of the FS. The results of this defuzzification could be of one of the three priorities: high priority, medium priority, and low priority. Table 1 represents how we estimate the health condition of patients.
Table 1. The reading of the medical sensors.
The membership function for inputs BT, HR, and GL is designed using the MATLAB Fuzzy Toolbox in Figure 3, Figure 4 and Figure 5, respectively.
Figure 3. Membership function of BT.
Figure 4. Membership function of HR.
Figure 5. Membership function of GL.
In Phase 1, the number of rules in the fuzzy logic system depends on the number of sensors in the experiment and how many readings each sensor can sense, as follows.
The number of rules = (number of readings BT) × (Number of readings HR) × (number of readings GL).
Here, the number of rules = 3 × 3 × 3 = 27 rules by using “if-then” and “and” linguistic rules as logical operators to take the minimum membership value. The rules are represented in Table 2. In the health score calculation, each normal health condition is counted as 30 points, with medium 10 points and low 5 points. Figure 6 shows the design of the fuzzy logic system to generate the health score to assist in data categorization, and Figure 7 shows the membership function of the health score.
Table 2. The fuzzy rules for data categorization.
Figure 6. FLS for health score.
Figure 7. Membership function of health score.

4.2. Phase 2

In the second phase, the Mist broker (MB) focuses on the Mist’s computational capacity (see Equation (3) below) and data priority to allocate resources for healthcare services. MB selects one of the three resources: Mist, Fog, and Cloud, to provide services for the healthcare system as follows.
First, MB directly transfers high-priority data to the Cloud and allows healthcare providers to access these critical data. In addition, MB helps patients with urgent conditions in real-time processing to make quick decisions as the MB is very close to the sensing devices.
Second, MB sends the medium-priority data to the Mist nodes of available capacity. The data are transferred to the next available Mist node if a Mist node is overloaded. If all Mist nodes have insufficient computing space for the medium-priority data, the data are transferred to the Fog broker.
Third, MB sends the low-priority data to the Mist nodes of available capacity. The data are transferred to the next available Mist node if a Mist node is overloaded. However, if all Mist nodes lack adequate computing space (i.e., low and medium computing capacity) for low-priority data, they are then directed to the Fog broker for further processing, as indicated in Table 3.
Table 3. The fuzzy rules for server allocation.
Moving to the subsequent layer, the Fog broker is equipped with a load balancer responsible for distributing the medium- and low-priority data received from the Mist broker among the available Fog nodes. This distribution is based on two factors: the remaining computing capacity of each Fog node and a clustering technique. The calculation of the remaining capacity of a Mist node, as described by Equation (3), plays a crucial role in determining whether the healthcare services should be computed within the Mist node itself or whether the healthcare data should be redirected to another Mist node or the Fog broker in the event of an overloaded Mist node:
Remaining   capacity = C i = 1 n Pi × S i Remaining   capacity   percentage = C i = 1 n P i × S i C × 100
The equation consists of four factors to determine the computing capacity of a Mist node:
  • C is the capacity of a Mist node.
  • Pi is the packet arrival rate for i as a data packet.
  • Si is the size of the data packet i.
  • n is the number of data packets.
In Phase 2, the number of rules in the fuzzy logic system depends on the number of sensors in the experiment and how many readings each sensor can sense as follows:
The number of rules = (number of data priority levels) × (number of computational
capacities of Mist node)
Here, the number of rules = 3 × 3 = 9 rules by using linguistic rules of “if-then” and “and” as logical operators to take the minimum membership value. The rules are represented in Table 3.
Figure 8, Figure 9, Figure 10 and Figure 11 in MATLAB depict the design of the fuzzy logic system responsible for server allocation. This system takes two inputs, namely data priority and Mist capacity, and generates an output that determines the server allocation.
Figure 8. Fuzzy logic system for server allocation.
Figure 9. Membership function for data priority.
Figure 10. Membership function for Mist capacity.
Figure 11. Membership function for server allocation.

4.3. Fog Broker

The Fog broker receives only two types of data: low-priority and medium-priority, which are passed on by the Mist broker. To address this distinction in data types, we have designed a clustering scheme within the Fog layer. The Fog nodes are divided into two clusters, with the Fog broker overseeing their operation. Figure 12 provides an overview of the workflow within the Fog layer. Cluster1 is responsible for computing the medium-priority data, while Cluster2 handles the low-priority data. This categorization aims to minimize execution time and the offloading process by assigning appropriate resources to each data type based on priority. To achieve this, the Fog nodes are divided into clusters based on their remaining computing capacity. The first cluster comprises the Fog nodes with higher remaining capacity, while the second cluster consists of nodes with lower remaining capacity. The decision-making process for medium-priority data prioritizes Fog nodes with higher remaining capacity, ensuring real-time processing without the need for task offloading or delays. The choice of remaining computing capacity as the main factor enables medium-priority data to make fast decisions for real-time processing. On the other hand, low-priority data are assigned to Fog nodes with lower remaining computing capacity since their real-time processing requirements are less critical compared to medium-priority data.
Figure 12. Fog node clusters.
When the remaining energy or computing capacity of a selected Fog node falls below a threshold value of 25%, the data are rerouted from one Fog node to another or to the Cloud. The computation of a Fog node’s remaining computing capacity is determined by Equation (3).

5. Experimental Setup

Eclipse and MATLAB are used to validate MFHS.
MATLAB generates the fuzzy outputs to determine the data priority and the resource allocation based on fuzzy rules.
Eclipse simulates the process environment (Edge, Mist, Fog, and Cloud) and calculates the power consumption, allocation time, and processing time.
In the experiment, six sensors are used at the Edge layer: two for the body temperature, two for the heart rate, and two for the glucose level. Two Mist nodes and one Mist broker are used at the Mist layer. Six Fog nodes and one Fog broker are used at the Fog layer, and three central Clouds are utilized at the Cloud layer. Table 4 summarizes the tools employed in the experiments and Figure 13 shows the process sequencing, with the node notation specified in Table 5.
Table 4. System configuration.
Figure 13. Work sequence.
Table 5. Nodes’ description.
In Figure 13, six Fog nodes are formed into two clusters based on the computational capacity (CC). Each cluster consists of several Fog nodes. Cluster one (C1) represents Fog nodes with a higher CC, and cluster two (C2) represents Fog nodes with a lower CC.
For an illustration, let us assume in Table 6 that we have six Fog nodes, namely F1, F2, F3, F4, F5, and F6, with their respective CC. Based on our clustering principle, C1 will consist of F1, F4, and F6, while C2 will contain F2, F3, and F5. Accordingly, C1 is responsible for receiving the medium-priority data from the Fog broker, and C2 is responsible for receiving the low-priority data from the Fog broker.
Table 6. Fog nodes’ computational capacity.
The Fog clusters continue to process data until the CC of any Fog node goes below a threshold value of 25% of its capacity; when that happens, the data will be offloaded to the Cloud to avoid damaging the node.

6. Evaluation

Our experimentation involves two metrics: the total energy consumption and the processing time.
The total energy consumption (Etotal) consists of three different types of energy: the transmission of the packets (Etr); the classification of the packets (Ec) into high, medium, and low priority; and the resource allocation of the categorized packets (Ea) as follows:
E t o t a l = E t r + E c + E a
Etr is calculated based on the size of the packets as in Equation (5):
E t r = i = 1 n S n × E o b
where Eob is the energy cost of transmitting one byte for a single hop, n is the total of transmitted packets, and Sn is the size of the n packet. In this experiment, the energy cost of transmitting one byte of packets for a single hop is assumed to be 0.5 mJ.
In a similar manner, the total processing time (Ttotal) is determined by considering the same factors as the total energy cost. It can be calculated using the following equation:
T t o t a l = T t r + T c + T a
where Ttr represents the packet transmission time, Tc denotes the packet classification time, and Ta represents the packet allocation time.

7. Results

In our experimentation, we initially derive the total energy consumption and processing time metrics for our proposed MFHS model. Subsequently, we conduct a comparative analysis between the outcomes of MFHS and those of the feedback-based optimized fuzzy scheduling approach (FOFSA) algorithm, along with the adaptive task allocation technique (ATAT) and the osmosis load balancing (OLB) algorithm as documented in [15].

7.1. Energy Consumption

The energy consumption calculations are based on the addition of three parameters defined in Section 6: Etr, Ec, and Ea.

7.1.1. Etr Calculations

As a hardware implementation is absent in this context, the energy consumption calculations are derived through initialization with predefined values. This fixed value is determined by considering the energy consumption for transferring one bit of data at the data centre level, estimated to be approximately 0.2 mJ, as referenced in [24]. Consequently, the energy consumption for transferring a single byte of data amounts to 0.2 × 8 mJ, equalling 1.6 mJ.
The data transfer takes place across three tiers: Mist, Fog, and Cloud. Consequently, the total energy consumption for transmitting a byte of data aggregates to 1.6 × 3 mJ, which is equivalent to 4.8 mJ or approximately 0.0048 joule, and can be approximated as 0.005 joule. With the data packet size fixed at 1500 bytes, a value that optimizes TCP connection performance as outlined in [25], the energy consumption (Et) required to transmit a 1500-byte packet amounts to 0.005 × 1500 joule, which translates to 7.5 joule.
Extending this computation to encompass multiple packet transfers, the energy consumption for transmitting 20 packets (Et for 20 packet transfer) is determined as 20 × 7.5 joule, which equals 150 joule or approximately 0.15 KJ. Analogously, for 40, 60, 80, and 100 packet transfers, the corresponding energy consumptions (ET) amount to 300 joule (0.3 KJ), 450 joule (0.45 KJ), 600 joule (0.60 KJ), and 750 joule (0.75 KJ), respectively.

7.1.2. Ec and Ea Calculations

Upon executing the MATLAB code for health condition assessment, employed for determining data priority through fuzzy-based classification, we noted an execution time of 0.35 s. Likewise, the execution of the code for fuzzy-based server allocation yielded an execution time of 0.34 s. Consequently, the cumulative processing time for both classification and allocation processes tallies to 0.35 + 0.34 = 0.69 s.
The power consumption of the CPU hinges on the configuration of a laptop equipped with an 11th Gen Intel(R) Core(TM) i7-1165G7 @ 2.80 GHz 1.69 GHz, with a power consumption spectrum spanning 12 to 28 watts. Considering the peak power consumption of 28 watts, equivalent to 100.8 KJ per hour, the energy consumption for running the code within 0.69 s is computed as (100.8 × 0.69)/3600 KJ, amounting to 0.019 KJ. This signifies the energy consumed for a single packet categorization, encompassing the determination of priority and its allocation to a specified node.
Extending this computation to accommodate multiple packets, the energy consumption for 20 packets totals to 0.019 × 20 KJ, equivalent to 0.38 KJ. Similarly, for 40 packets, it stands at 0.76 KJ, for 60 packets at 1.14 KJ, for 80 packets at 1.52 KJ, and for 100 packets at 1.9 KJ.
In summary, the overall energy consumption (Etotal) of the MFHS is tabulated as follows: 0.53 KJ for 20 packets, 1.06 KJ for 40 packets, 1.59 KJ for 60 packets, 2.12 KJ for 80 packets, and 2.65 KJ for 100 packets, as presented in Table 7.
Table 7. Energy consumption of the MFHS for 20, 40, 60, 80, and 100 packets.
Based on the results in [15], the energy consumption of FOFSA, ATAT, and OLB using the same packets transfer 20, 40, 60, 80, and 100 are shown in Table 8—please refer to Appendix A for detailed calculations.
Table 8. Total energy consumption (Etotal) of FOFSA, ATAT, and OLB.

7.1.3. Energy Cost Comparison

Figure 14 presents a comparison of the energy costs between our proposed MFHS approach and the FOFSA, OLB, and ATAT algorithms discussed in [15], with respect to the number of packets. The chart clearly illustrates that our MFHS approach achieves superior energy cost results compared to the existing methods, particularly as the number of packets increases. This indicates that the MFHS algorithm outperforms its counterparts in handling extensive data analysis, which is essential for IoT networks.
Figure 14. A comparative analysis of energy consumption.

7.2. Processing Time

The processing time computations are based on the three parameters defined in Section 6: Ttr, Tc, and Ta.

7.2.1. Ttr Calculations

In our experimentation with the proposed MFHS using MATLAB, the total energy consumption for transferring one byte of data equates to 1.6 × 3 mJ, resulting in 4.8 mJ or approximately 0.0048 joule, which can be approximated as 0.005 joule. In parallel, considering a maximum CPU power consumption of 28 watts, translating to 100.8 KJ per hour, and with a packet size of 1500 bytes, we deduce that the average energy required for one byte packet transfer is approximately 0.0049 joule or 0.0049/1000 KJ.
Furthermore, it is evident that 100.8 KJ of energy is consumed within 1 h, corresponding to 3600 s. Therefore, 1 KJ of energy is consumed in 3600/100.8 s. Consequently, the energy consumption of 0.0049/1000 KJ amounts to (3600 × 0.0049)/(100.8 × 1000) seconds, multiplied by the packet size of 1500 bytes, which results in approximately 0.2625 s.

7.2.2. Tc and Ta Calculations

The classification process takes 0.35 s, while the allocation process consumes 0.34 s, as elucidated in the above energy consumption calculation section.
In Figure 15, we present a comparison of the processing time between our proposed MFHS algorithm and the FOFSA method, which has been demonstrated to outperform both ATAT and OLB algorithms [15], with respect to the number of packets. The chart clearly indicates that the processing time of the MFHS algorithm outperforms the existing approach, particularly as the number of packets increases. This suggests that the MFHS algorithm excels in handling big data analyses, which are crucial for IoT networks. This comparison is made without sacrificing generality, highlighting the superior performance of MFHS in terms of processing time.
Figure 15. A comparative analysis of processing time.

8. Discussion

Central to the crux of this study is a novel approach meticulously crafted to address the pivotal facets of offloading and load balancing, recognizing their cardinal significance in fortifying the performance metrics of diverse computing networks. The paramount goal of this innovative approach is to harness the latent potential of these key elements, thereby ushering in an era of heightened operational efficiency and enhanced system performance.
The strength of this approach lies in the adept utilization of fuzzy logic systems, acting as a guide in the areas of data processing, offloading strategies, and the intricate balance of workload distribution within the IoT networks. By harnessing the nuanced capabilities of fuzzy logic, the proposed framework brings forth a level of granularity and adaptability in the IoT landscape.
The proposed MFHS (Mist-based fuzzy healthcare system) systems unfold their operations at the very fabric of the Mist layer. This strategic initiation sets the tone for proactive decision making, injecting an element of timeliness and precision throughout the entire network. Here, the focal aim is a dual-pronged enhancement: the augmentation of energy efficiency and the amplification of processing expediency. By intervening at the nascent stages, MFHS sets the stage for a cascading series of optimized decisions that cumulatively foster an environment of superior performance.
The empirical validation of this paradigm-shifting approach is revealed through a meticulous evaluation conducted on the robust platforms of Eclipse and MATLAB. The results of this comprehensive assessment unequivocally showcase the tangible benefits reaped from the implementation of MFHS. Key performance indicators, namely processing time and power consumption, experience marked reductions, reinforcing the pivotal role played by this approach in fostering efficiency gains.
A noteworthy aspect is the empirical comparison against established benchmarks. Notably, the MFHS approach emerges triumphant, demonstrating its prowess over contemporaneous algorithms such as the feedback-based optimized fuzzy scheduling approach (FOFSA), the adaptive task allocation technique (ATAT), and the osmosis load balancing algorithm (OLB). This superiority manifests resoundingly across the twin dimensions of energy efficiency and processing time, affirming the innovative approach’s strength and its potential to revolutionize the IoT landscape.

9. Conclusions

The proposed approach in this study focuses on the key aspects of offloading and load balancing, recognizing their potential to enhance the performance of any computing network. To achieve this, fuzzy logic systems were employed to aid in processing, offloading, and workload balancing within IoT networks. The proposed MFHS systems initiate operations at the Mist level, enabling early decision making and aiming to improve both energy efficiency and processing time. The evaluation of MFHS involved the use of Eclipse and MATLAB, and the results demonstrated successful reductions in processing time and power consumption. Notably, the MFHS approach outperformed the feedback-based optimized fuzzy scheduling approach (FOFSA) algorithm, as well as the adaptive task allocation technique (ATAT) and osmosis load balancing algorithm (OLB), in terms of energy efficiency and processing time.
In conclusion, the proliferation of the Internet of Things (IoT) has ushered in a new era of connectivity and innovation, fostering seamless communication between devices and systems across diverse sectors. In healthcare, IoT networks hold the promise to reshape patient care, expedite critical interventions, and streamline administrative operations. As the demand for IoT networks continues to surge, the introduction of novel solutions like the Mist-based fuzzy healthcare system (MFHS) underscores the commitment to enhancing the efficiency, stability, and adaptability of IoT technology. By strategically allocating IoT data resources through the Mist layer, MFHS contributes to faster processing times, increased energy efficiency, and overall improved performance within IoT networks, thereby advancing the capabilities of healthcare systems and various other industries alike.

Author Contributions

Conceptualization, Z.A. and B.S.; methodology, Z.A. and B.S.; software, Z.A.; validation, Z.A.; formal analysis, Z.A.; investigation, Z.A., B.S. and A.L.; writing—original draft, Z.A.; writing—review and editing, B.S. and A.L.; supervision, B.S. and A.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1. Energy Consumption Calculations for FOFSA, ATAT, and OLB

Appendix A.1.1. FOFSA

The energy consumption of FOFSA [15] translates to approximately 4 KWH for 50 VMs, 10 KWH for 100 VMs, 18 KWH for 150 VMs, 20 KWH for 200 VMs, 23 KWH for 250 VMs, and 28 KWH for 300 VMs.
Our analysis of the execution time graph for VMs handling different numbers of tasks, as presented in [15], indicates that a single VM can execute a maximum of 10,000 tasks. Therefore, a VM can handle up to 10,000 tasks.
Consequently, the total number of tasks allotted equates to 500,000 for 50 VMs, 1,000,000 for 100 VMs, 1,500,000 for 150 VMs, 2,000,000 for 200 VMs, and 2,500,000 for 250 VMs.
Based on this analysis, we deduce the following energy consumption figures: 4 KWH for 500,000 tasks, 10 KWH for 1,000,000 tasks, 18 KWH for 1,500,000 tasks, 20 KWH for 2,000,000 tasks, and 23 KWH for 2,500,000 tasks.
Since the number of tasks has been considered equivalent to the number of packets, the energy consumption for each task aligns with the corresponding packet count. Thus, for 500,000 packets, the energy consumption amounts to 4 KWH, which translates to (4 × 20)/500,000 KWH, or (4 × 3600 × 20)/500,000 KJ, equalling 0.56 KJ.
Similarly, for 1,000,000 packets, the energy consumption corresponds to 10 KWH, translating to (10 × 40)/1,000,000 KWH, or (10 × 40 × 3600)/1,000,000 KJ, equalling 1.44 KJ.
Continuing this trend, for 1,500,000 packets, the energy consumption amounts to 18 KWH, which translates to (18 × 60)/1,500,000 KWH, or (18 × 60 × 3600)/1,500,000 KJ, resulting in 2.592 KJ.
For 2,000,000 packets, the energy consumption corresponds to 20 KWH, translating to (20 × 80)/2,000,000 KWH, or (20 × 80 × 3600)/2,000,000 KJ, resulting in 2.88 KJ.
Lastly, for 2,500,000 packets, the energy consumption amounts to 23 KWH, which translates to (23 × 100)/2,500,000 KWH, or (23 × 100 × 3600)/2,500,000 KJ, resulting in 3.312 KJ.

Appendix A.1.2. ATAT

Since the number of tasks has been equated to the number of packets, the energy consumption outcome for tasks in ATAT [15] will equivalently apply to the corresponding number of packets. Thus, for 500,000 packets, the energy consumption corresponds to 15 KWH. For instance, for a mere 20 packets, the energy consumption is calculated as (15 × 20)/500,000 KWH, which converts to (15 × 3600 × 20)/500,000 KJ, resulting in 2.16 KJ.
Similarly, with 1,000,000 packets, the energy consumption aligns with 23 KWH. For 40 packets, the energy consumption computes as (23 × 40)/1,000,000 KWH or (23 × 40 × 3600)/1,000,000 KJ, amounting to 3.3 KJ.
Furthermore, for 1,500,000 packets, the energy consumption value corresponds to 28 KWH. Consequently, for 60 packets, the energy consumption is determined as (28 × 60)/1,500,000 KWH or (28 × 60 × 3600)/1,500,000 KJ, resulting in 4.03 KJ.
Likewise, with 2,000,000 packets, the energy consumption value aligns with 35 KWH. For 80 packets, the energy consumption computation stands at (35 × 80)/2,000,000 KWH or (35 × 80 × 3600)/2,000,000 KJ, leading to 5.04 KJ.
Similarly, for 2,500,000 packets, the energy consumption corresponds to 42 KWH. Correspondingly, for 100 packets, the energy consumption calculates as (42 × 100)/2,500,000 KWH or (42 × 100 × 3600)/2,500,000 KJ, resulting in 6.04 KJ.
This pattern continues, extending the computation for larger numbers of packets, which demonstrates a consistent relationship between energy consumption and the number of tasks, underscoring the scalability of the presented results.

Appendix A.1.3. OLB

Given the equivalence between the number of tasks and the number of packets, the energy consumption results for tasks in OLB [15] naturally apply to their corresponding number of packets. Thus, for 500,000 packets, the energy consumption is reflective of 8 KWH. For example, when considering a mere 20 packets, this energy consumption translates to (8 × 20)/500,000 KWH, which further converts to (8 × 3600 × 20)/500,000 KJ, resulting in 1.15 KJ.
Similarly, for 1,000,000 packets, the energy consumption aligns with 18 KWH. Thus, for 40 packets, the energy consumption calculation stands at (18 × 40)/1,000,000 KWH or (18 × 40 × 3600)/1,000,000 KJ, yielding 2.6 KJ.
In a similar vein, when dealing with 1,500,000 packets, the energy consumption approximates 24 KWH. Consequently, for 60 packets, the energy consumption computes as (24 × 60)/1,500,000 KWH, which equates to (24 × 60 × 3600)/1,500,000 KJ, culminating in 3.4 KJ.
Similarly, for 2,000,000 packets, the energy consumption aligns with 29 KWH. Correspondingly, for 80 packets, the energy consumption computation stands at (29 × 80)/2,000,000 KWH or (29 × 80 × 3600)/2,000,000 KJ, yielding 4.1 KJ.
Finally, for 2,500,000 packets, the energy consumption is in the vicinity of 35 KWH. Correspondingly, for 100 packets, the energy consumption translates to (35 × 100)/2,500,000 KWH, resulting in (35 × 100 × 3600)/2,500,000 KJ, amounting to 5.04 KJ.
This coherent pattern persists, demonstrating a consistent relationship between energy consumption and the number of tasks (or packets), highlighting the scalability and predictability of the presented results.

References

  1. Alghofaili, Y.; Rassam, M.A. A Dynamic Trust-Related Attack Detection Model for IoT Devices and Services Based on the Deep Long Short-Term Memory Technique. Sensors 2023, 23, 3814. [Google Scholar] [CrossRef] [PubMed]
  2. Barik, R.K.; Patra, S.S.; Kumari, P.; Mohanty, S.N.; Hamad, A.A. A new energy aware task consolidation scheme for geospatial big data application in Mist computing environment. In Proceedings of the 8th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 17–19 March 2021; pp. 48–52. [Google Scholar]
  3. Hmissi, F.; Ouni, S. An MQTT Brokers Distribution Based on Mist Computing for Real-Time IoT Communications; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
  4. Refaat, H.E. MLITS:Multi-Level tasks scheduling model for IoT Service Provisioning. Inf. Bull. Comput. Inf. 2020, 2, 1–9. [Google Scholar] [CrossRef]
  5. Rubio-Drosdov, E.; Sánchez, D.D.; Almenárez, F.; Marín, A. A framework for efficient and scalable service offloading in the Mist. In Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 460–463. [Google Scholar]
  6. Hensh, F.; Gupta, M.; Nene, M.J. Mist-Edge-Cloud (MEC) Computing: An Integrated Computing Architecture. In Proceedings of the Second International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 4–6 August 2021; pp. 1035–1040. [Google Scholar]
  7. Shahid, H.; Shah, M.A.; Almogren, A.; Khattak, H.A.; Din, I.U.; Kumar, N.; Maple, C. Machine Learning-based Mist Computing Enabled Internet of Battlefield Things. ACM Trans. Internet Technol. 2021, 21, 1–26. [Google Scholar] [CrossRef]
  8. Hosen, A.S.; Sharma, P.K.; Cho, G.H. MSRM-IoT: A reliable resource management for Cloud, Fog and Mist assisted IoT networks. IEEE Internet Things J. 2021, 9, 2527–2537. [Google Scholar] [CrossRef]
  9. Ejaz, M.; Kumar, T.; Ylianttila, M.; Harjula, E. Performance and Efficiency Optimization of Multi-layer IoT Edge Architecture. In Proceedings of the 2nd 6G Wireless Summit (6G SUMMIT), Levi, Finland, 17–20 March 2020; pp. 1–5. [Google Scholar] [CrossRef]
  10. Tripathy, S.S.; Barik, R.K.; Roy, D.S. Secure-M2FBalancer: A Secure Mist to Fog Computing-Based Distributed Load Balancing Framework for Smart City Application. In Advances in Communication, Devices and Networking; Springer: Berlin/Heidelberg, Germany, 2021; pp. 277–285. [Google Scholar] [CrossRef]
  11. Barik, R.K.; Misra, C.; Lenka, R.K.; Dubey, H.; Mankodiya, K. Hybrid mist-cloud systems for large scale geospatial big data analytics and processing: Opportunities and challenges. Arab. J. Geosci. 2019, 12, 32. [Google Scholar] [CrossRef]
  12. Stavrinides, G.L.; Karatza, H.D. Security and Cost Aware Scheduling of Real-Time IoT Workflows in a Mist Computing Envi-ronment. In Proceedings of the 8th International Conference on Future Internet of Things and Cloud (FiCloud), Rome, Italy, 23–25 August 2021; pp. 34–41. [Google Scholar]
  13. Ali, H.S.; Rout, R.R.; Parimi, P.; Das, S.K. Real-Time Task Scheduling in Fog-Cloud Computing Framework for IoT Applications: A Fuzzy Logic based Approach. In Proceedings of the International Conference on COMmunication Systems & NETworkS (COMSNETS), Bangalore, India, 5–9 January 2021; pp. 556–564. [Google Scholar]
  14. Das, A.K.; Kalam, S.; Sahar, N.; Sinha, D. UCFL: User Categorization using fuzzy logic towards PUF based two-phase authentication of Foassisted IoT devices. Comput. Secur. 2020, 97, 101938. [Google Scholar] [CrossRef]
  15. Reddy, D.A.; Krishna, P.V. Feedback-based fuzzy resource management in IoT using fog computing. Evol. Intell. 2020, 14, 669–681. [Google Scholar] [CrossRef]
  16. Cuka, M.; Elmazi, D.; Bylykbashi, K.; Spaho, E.; Ikeda, M.; Barolli, L. Implementation and performance evaluation of two fuzzy-based systems for selection of IoT devices in opportunistic networks. J. Ambient. Intell. Humaniz. Comput. 2018, 10, 519–529. [Google Scholar] [CrossRef]
  17. Haripriya, A.; Kulothungan, K. Secure-MQTT: An efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for Internet of Things. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 1–15. [Google Scholar]
  18. Khalil, A.; Mbarek, N.; Togni, O. Fuzzy Logic based security trust evaluation for IoT environments. In Proceedings of the IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA), Abu Dhabi, United Arab Emirates, 3–7 November 2019; pp. 1–18. [Google Scholar]
  19. Sankar, S.; Srinivasan, P. Fuzzy Logic Based Energy Aware Routing Protocol for Internet of Things. Int. J. Intell. Syst. Appl. 2018, 10, 11–19. [Google Scholar] [CrossRef]
  20. Ramkumar, K.; Ananthi, N.; Brabin, D.R.D.; Goswami, P.; Baskar, M.; Bhatia, K.K.; Kumar, H. Efficient routing mechanism for neighbour selection using fuzzy logic in wireless sensor network. Comput. Electr. Eng. 2021, 94, 107365. [Google Scholar] [CrossRef]
  21. Radhika, S.; Rangarajan, P. Fuzzy Based Sleep Scheduling Algorithm with Machine Learning Techniques to Enhance Energy Efficiency in Wireless Sensor Networks. Wirel. Pers. Commun. 2021, 118, 3025–3044. [Google Scholar] [CrossRef]
  22. Deabes, W.; Bouazza, K.E.; Algthami, W. Smart Fuzzy Petri Net-Based Temperature Control Framework for Reducing Building Energy Consumption. Sensors 2023, 23, 5985. [Google Scholar] [CrossRef] [PubMed]
  23. Hu, Y.; Meng, J.; Li, G.; Zhao, D.; Feng, G.; Zuo, G.; Liu, Y.; Zhang, J.; Shi, C. Fuzzy Adaptive Passive Control Strategy Design for Upper-Limb End-Effector Rehabilitation Robot. Sensors 2023, 23, 4042. [Google Scholar] [CrossRef] [PubMed]
  24. Shehabi, A.; Smith, S.; Sartor, D.; Brown, R.; Herrlin, M.; Koomey, J.; MasaneT, E.; Lintner, W.; Horner, N.; Azevedo, I. United States Data Center Energy Usage Report; LBNL-1005775; Lawrence Berkeley National Laboratory: Berkeley, CA, USA, 2016. [Google Scholar]
  25. Bennouri, H.; Berqia, A. U-NewReno transmission control protocol to improve TCP performance in Underwater Wireless Sensors Networks. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 5746–5758. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.