Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 3273917, 17 pages
Research Article

SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers

1The Department of Information Security Engineering, Soonchunhyang University, Asan-si 31538, Republic of Korea
2Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea

Correspondence should be addressed to Ilsun You; moc.liamg@unusli

Received 19 January 2017; Revised 19 February 2017; Accepted 26 February 2017; Published 11 April 2017

Academic Editor: Eric Rondeau

Copyright © 2017 Vishal Sharma et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Internet of things (IoT) aims at bringing together large business enterprise solutions and architectures for handling the huge amount of data generated by millions of devices. For this aim, IoT is necessary to connect various devices and provide a common platform for storage and retrieval of information without fail. However, the success of IoT depends on the novelty of network and its capability in sustaining the increasing demand by users. In this paper, a self-aware communication architecture (SACA) is proposed for sustainable networking over IoT devices. The proposed approach employs the concept of mobile fog servers which make relay using the train and unmanned aerial vehicle (UAV) networks. The problem is presented based on Wald’s maximum model, which is resolved by the application of a distributed node management (DNM) system and state dependency formulations. The proposed approach is capable of providing prolonged connectivity by increasing the network reliability and sustainability even in the case of failures. The effectiveness of the proposed approach is demonstrated through numerical and network simulations in terms of significant gains attained with lesser delay and fewer packet losses. The proposed approach is also evaluated against Sybil, wormhole, and DDoS attacks for analyzing its sustainability and probability of connectivity in unfavorable conditions.