A Dependency- and Trust-Aware Task Scheduling Framework for Efficient Internet of Things Edge Systems
DOI:
https://doi.org/10.63158/journalisi.v8i2.1489Keywords:
Internet of Things, Edge computing, DAG-based Scheduling, Trust-Aware Scheduling, Particle Swarm OptimizationAbstract
The rapid growth of the Internet of Things (IoT) has significantly increased the number of connected devices, generating massive volumes of data and placing substantial demands on edge and fog computing infrastructures. Traditional resource management approaches often overlook task dependencies, which can lead to inefficient resource utilization, increased execution delays, reduced reliability, and potential security risks in distributed IoT environments. To address these challenges, this paper proposes an improved dependency-aware task scheduling framework designed to operate between edge devices and edge servers. The framework employs directed acyclic graph (DAG) modeling to represent task dependencies and execution order, trust-aware node selection to avoid malicious, overloaded, or unreliable nodes, and Particle Swarm Optimization (PSO) to support adaptive resource allocation under dynamic and heterogeneous workloads. Experimental results demonstrate that the proposed framework achieves an average latency of 50 ms, throughput of approximately 500 transactions per second (tps), and a task completion rate of 98%. These findings indicate that the proposed approach outperforms conventional scheduling methods by improving latency, throughput, reliability, security, and overall task execution efficiency in IoT-enabled edge computing environments.
Downloads
References
[1] B. Rathi, S. Thapaswi, M. Kambhampati et al., “Realizing the potential of Internet of Things (IoT) in industrial applications,” Discover Internet of Things, vol. 5, no. 1, p. 45, Apr. 2025, doi: 10.1007/s43926-025-00141-5.
[2] G. Jeon, M. Albertini, V. Bellandi, and A. Chehri, “Intelligent mobile edge computing for IoT big data,” Complex & Intelligent Systems, vol. 8, no. 5, pp. 3595–3601, Oct. 2022, doi: 10.1007/s40747-022-00821-7.
[3] U. Islam, M. N. Alatawi, A. Alqazzaz, S. Alamro, B. Shah, and F. Moreira, “A hybrid fog-edge computing architecture for real-time health monitoring in IoMT systems with optimized latency and threat resilience,” Scientific Reports, vol. 15, no. 1, p. 25655, Jul. 2025, doi: 10.1038/s41598-025-09696-3.
[4] B. Isong, F. H. Mamidza, and R. Molose, “The role of dynamic trust and resource management in improving IoT-based edge computing: A review,” in Proc. AI Revolution: Research, Ethics, and Society (AIR-RES 2025), Communications in Computer and Information Science, vol. 2723. Cham, Switzerland: Springer, 2026, pp. 337–355, doi: 10.1007/978-3-032-13056-3_25.
[5] T. Wang, Y. Liang, X. Shen, X. Zheng, A. Mahmood, and Q. Z. Sheng, “Edge computing and sensor-cloud: Overview, solutions, and directions,” ACM Computing Surveys, vol. 55, no. 13s, pp. 1–37, Dec. 2023, doi: 10.1145/3582270.
[6] Y. Chen, J. Zhao, J. Hu, S. Wan, and J. Huang, “Distributed task offloading and resource purchasing in NOMA-enabled mobile edge computing: Hierarchical game theoretical approaches,” ACM Transactions on Embedded Computing Systems, vol. 23, no. 1, pp. 1–28, Jan. 2024, doi: 10.1145/3597023.
[7] H. Zou, J. Guo, J. Zeng, Y. Li, J. Cao, and T. Wang, “Fine-grained service lifetime optimization for energy-constrained edge-edge collaboration,” in Proc. IEEE 44th Int. Conf. Distributed Computing Systems (ICDCS), Jersey City, NJ, USA, Jul. 2024, pp. 565–576, doi: 10.1109/ICDCS60910.2024.00059.
[8] Y. Liang, W. Wang, X. Zheng, Q. Liu, L. Wang, and T. Wang, “Collaborative edge service placement for maximizing QoS with distributed data cleaning,” in Proc. IEEE/ACM 31st Int. Symp. Quality of Service (IWQoS), Orlando, FL, USA, Jun. 2023, pp. 1–4, doi: 10.1109/IWQoS57198.2023.10188694.
[9] R. Qing, H. Rao, G. Jia, Y. Xu, W. Wei, and G. Xie, “Task scheduling strategy based on resource constraint in edge computing system,” in Proc. IEEE 7th Int. Conf. Industrial Cyber-Physical Systems (ICPS), St. Louis, MO, USA, May 2024, pp. 1–7, doi: 10.1109/ICPS59941.2024.10639950.
[10] A. Khatoon, A. Ullah, A. U. Bello, A. Khan, M. B. Roslee, and H. Amin, “Fuzzy logic-based task scheduling for AI-enabled IoT edge devices in smart communication networks,” in Proc. Multimedia University Engineering Conf. (MECON), Cyberjaya, Malaysia, Jul. 2025, doi: 10.1109/MECON67253.2025.11276908.
[11] A. A. Al-Habob, O. A. Dobre, A. G. Armada, and S. Muhaidat, “Task scheduling for mobile edge computing using genetic algorithm and conflict graphs,” IEEE Transactions on Vehicular Technology, vol. 69, no. 8, pp. 8805–8819, Aug. 2020, doi: 10.1109/TVT.2020.2995146.
[12] G. Vijayasekaran and M. Duraipandian, “Resource scheduling in edge computing IoT networks using a hybrid deep learning algorithm,” System Research and Information Technologies, no. 3, pp. 86–101, Oct. 2022, doi: 10.20535/SRIT.2308-8893.2022.3.06.
[13] A. M. Sheikh, M. R. Islam, M. H. Habaebi, S. A. Zabidi, A. R. Najeeb, and A. Kabbani, “A survey on edge computing security challenges: Classification, threats, and mitigation strategies,” Future Internet, vol. 17, no. 4, p. 175, Apr. 2025, doi: 10.3390/fi17040175.
[14] M. Maray, E. Mustafa, J. Shuja, and M. Bilal, “Dependent task offloading with deadline-aware scheduling in mobile edge networks,” Internet of Things, vol. 23, p. 100868, Oct. 2023, doi: 10.1016/j.iot.2023.100868.
[15] J. Li, Y. Pan, Y. Xia, Z. Fan, X. Wang, and J. Lv, “Optimizing DAG scheduling and deployment for IoT data analysis services in multi-UAV mobile edge computing systems,” Wireless Networks, vol. 30, no. 7, pp. 6465–6479, Oct. 2024, doi: 10.1007/s11276-023-03451-0.
[16] G. Li et al., “DAG scheduling in mobile edge computing,” ACM Transactions on Sensor Networks, vol. 20, no. 1, Oct. 2023, doi: 10.1145/3616374.
[17] V. Prakash, S. Bawa, and L. Garg, “Multi-dependency and time-based resource scheduling algorithm for scientific applications in cloud computing,” Electronics, vol. 10, no. 11, p. 1320, May 2021, doi: 10.3390/electronics10111320.
[18] M. Su, G. Wang, and K.-K. R. Choo, “Prediction-based resource deployment and task scheduling in edge-cloud collaborative computing,” Wireless Communications and Mobile Computing, vol. 2022, no. 1, p. 2568503, Jan. 2022, doi: 10.1155/2022/2568503.
[19] S. A. Murad, A. J. M. Muzahid, Z. R. M. Azmi, M. I. Hoque, and M. Kowsher, “A review on job scheduling techniques in cloud computing and priority rule-based intelligent framework,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 6, pp. 2309–2331, Jun. 2022, doi: 10.1016/j.jksuci.2022.03.027.
[20] Q. Cai, M. R. Bajuri, K. E. Leong, L. Chen, L, “Multimodal Learning Interactions Using MATLAB Technology in a Multinational Statistical Classroom,” Multimodal Technologies and Interaction, vol. 9, no. 10, pp. 106, Oct. 2025, doi: 10.3390/mti9100106.
[21] M. R. Saha, M. E. Kader, and R. Reaz, “Dependency, deadline, and priority-aware multi-queue dynamic task scheduling using heterogeneous resources in fog environment,” in Proc. IEEE/ACM 17th Int. Conf. Utility and Cloud Computing (UCC), Sharjah, UAE, Dec. 2024, pp. 9–16, doi: 10.1109/UCC63386.2024.00012.
[22] Y. Zhang, B. Tang, J. Luo, and J. Zhang, “Deadline-aware dynamic task scheduling in edge–cloud collaborative computing,” Electronics, vol. 11, no. 15, p. 2464, Aug. 2022, doi: 10.3390/electronics11152464.
[23] E. M. Elshahed, R. M. Abdelmoneem, E. Shaaban, H. A. Elzahed, and S. M. Al-Tabbakh, “Prioritized scheduling technique for healthcare tasks in cloud computing,” Journal of Supercomputing, vol. 79, no. 5, pp. 4895–4916, Mar. 2023, doi: 10.1007/s11227-022-04823-7.
[24] F. K. Karim, S. Ghorashi, S. Alkhalaf, S. H. A. Hamza, A. B. Ishak, and S. Abdel-Khalek, “Optimizing makespan and resource utilization in cloud computing environment via evolutionary scheduling approach,” PLOS ONE, vol. 19, no. 11, p. e0311814, Nov. 2024, doi: 10.1371/journal.pone.0311814.
[25] Y. Wang, T. Tang, Z. Fang, Y. Deng, and Y. Duan, “Intelligent task scheduling for microservices via A3C-based reinforcement learning,” in Proc. IEEE Int. Conf. Communications, Information Systems and Computer Engineering (CISCE), Guangzhou, China, 2025, pp. 585–589, doi: 10.1109/CISCE65916.2025.11065827.
[26] H. Nie, Y. Wu, W. Zhu, J. Zhong, H. Yang, and Y. Zhou, “Time-triggered task offloading scheduling in TSN-based edge computing power networks,” IEEE Access, vol. 13, pp. 85979–85996, 2025, doi: 10.1109/ACCESS.2025.3568848.
[27] A. Mahapatra, R. Pradhan, S. K. Majhi, and K. Mishra, “DELTa: Dynamic energy- and latency-aware task scheduling for fog-cloud paradigm,” IEEE Access, vol. 13, pp. 74617–74633, 2025, doi: 10.1109/ACCESS.2025.3563103.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Journal of Information Systems and Informatics

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














