International Journal of Wireless and Ad Hoc Communication

Submit Your Paper

2692-4056ISSN (Online)

Volume 10 , Issue 2 , PP: 18–26, 2026 | Cite this article as | XML | Html | PDF | Full Length Article

Tiny Intelligence in Fog-Assisted Wireless Sensor IoT Networks: A Review of Deployment Patterns, Resource Trade-offs, and Open Challenges

Aygul Z. Ibatova 1 * , Baumuratova Dilaram 2

  • 1 Tyumen Industrial University, Russia - (aigoul@rambler.ru)
  • 2 Astana International University, Kazakhstan - (Baumuratova.d@gmail.com)
  • Doi: https://doi.org/10.54216/IJWAC.100203

    Received: February 05, 2026 Revised: March 09, 2026 Accepted: May 12, 2026
    Abstract

    Wireless sensor IoT networks are moving from simple measurement pipelines toward distributed systems where sensing, interpretation, filtering, and coordination are divided across devices, fog nodes, and cloud services. This review examines that transition through the lens of tiny intelligence, with special attention to how small models, local event filters, federated updates, service placement, and privacy controls reshape fog-assisted wireless sensor deployments. The paper does not treat fog computing as a generic latency layer. Instead, it studies fog as a governance and orchestration layer that decides which data should stay at the device, which events should be aggregated nearby, and which models require cloud-level supervision. A structured comparison of prior studies is provided across architecture, TinyML, federated learning, placement, security, benchmarking, and lifecycle coverage. The synthesis shows that the literature has matured in modelling fog resources and building lightweight inference functions, but remains fragmented in lifecycle management, cross-layer wireless awareness, privacy accounting, and reproducible evaluation. The review concludes with a research agenda for sensor-to-fog intelligence pipelines that are adaptive, auditable, energy-aware, and suitable for long-lived cyber-physical deployments.

    Keywords :

    Fog computing , Wireless sensor networks , Internet of Things , TinyML , Edge intelligence , Federated learning , Resource-aware orchestration

    References

    [1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: A survey,” Computer Networks, vol. 38, no. 4, pp. 393–422, 2002, doi: 10.1016/S1389-1286(01)00302-4.

     

    [2] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008, doi: 10.1016/j.comnet.2008.04.002.

     

    [3] T. Rault, A. Bouabdallah, and Y. Challal, “Energy efficiency in wireless sensor networks: A top-down survey,” Computer Networks, vol. 67, pp. 104–122, 2014, doi: 10.1016/j.comnet.2014.03.027.

     

    [4] H. Yetgin, K. T. K. Cheung, M. El-Hajjar, and L. H. Hanzo, “A survey of network lifetime maximization techniques in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 828–854, 2017, doi: 10.1109/COMST.2017.2650979.

     

    [5] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010, doi: 10.1016/j.comnet.2010.05.010.

     

    [6] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013, doi: 10.1016/j.future.2013.01.010.

     

    [7] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A survey on enabling technologies, protocols, and applications,” IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347–2376, 2015, doi: 10.1109/COMST.2015.2444095.

     

    [8] A. Botta, W. de Donato, V. Persico, and A. Pescape, “Integration of cloud computing and Internet of Things: A survey,” Future Generation Computer Systems, vol. 56, pp. 684–700, 2016, doi: 10.1016/j.future.2015.09.021.

     

    [9] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, 2016, doi: 10.1109/JIOT.2016.2579198.

     

    [10] M. Satyanarayanan, “The emergence of edge computing,” Computer, vol. 50, no. 1, pp. 30–39, 2017, doi: 10.1109/MC.2017.9.

     

    [11] C. Mouradian, D. Naboulsi, S. Yangui, R. H. Glitho, M. J. Morrow, and P. A. Polakos, “A comprehensive survey on fog computing: State-of-the-art and research challenges,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 416–464, 2018, doi: 10.1109/COMST.2017.2771153.

     

    [12] A. Yousefpour et al., “All one needs to know about fog computing and related edge computing paradigms: A complete survey,” Journal of Systems Architecture, vol. 98, pp. 289–330, 2019, doi: 10.1016/j.sysarc.2019.02.009.

     

    [13] P. Bellavista, J. Berrocal, A. Corradi, S. K. Das, L. Foschini, and A. Zanni, “A survey on fog computing for the Internet of Things,” Pervasive and Mobile Computing, vol. 52, pp. 71–99, 2019, doi: 10.1016/j.pmcj.2018.12.007.

     

    [14] C. Puliafito, E. Mingozzi, C. Vallati, F. Longo, and G. Merlino, “Fog computing for the Internet of Things: A survey,” ACM Transactions on Internet Technology, vol. 19, no. 2, Art. 18, 2019, doi: 10.1145/3301443.

     

    [15] R. K. Naha et al., “Fog computing: Survey of trends, architectures, requirements, and research directions,” IEEE Access, vol. 6, pp. 47980–48009, 2018, doi: 10.1109/ACCESS.2018.2866491.

     

    [16] P. Habibi, M. Farhoudi, S. Kazemian, S. Khorsandi, and A. Leon-Garcia, “Fog computing: A comprehensive architectural survey,” IEEE Access, vol. 8, pp. 69105– 69133, 2020, doi: 10.1109/ACCESS.2020.2983253.

     

    [17] P. Mach and Z. Becvar, “Mobile edge computing: A survey on architecture and computation offloading,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1628–1656, 2017, doi: 10.1109/COMST.2017.2682318.

     

    [18] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge computing: The communication perspective,” IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2322–2358, 2017, doi: 10.1109/COMST.2017.2745201.

     

    [19] Q.-V. Pham et al., “A survey of multi-access edge computing in 5G and beyond: Fundamentals, technology integration, and state-of-the-art,” IEEE Access, vol. 8, pp. 116974–117017, 2020, doi: 10.1109/ACCESS. 2020.3001277.

     

    [20] C.-H. Hong and B. Varghese, “Resource management in fog/edge computing: A survey on architectures, infrastructure, and algorithms,” ACM Computing Surveys, vol. 52, no. 5, Art. 97, 2019, doi: 10.1145/3326066.

     

    [21] N. Kumari, A. Yadav, and P. K. Jana, “Task offloading in fog computing: A survey of algorithms and optimization techniques,” Computer Networks, vol. 214, Art. 109137, 2022, doi: 10.1016/j.comnet.2022.109137.

     

    [22] J. Vergara, M. J. Santofimia, J. C. Moya, and J. Carretero, “A comprehensive survey on resource allocation in the fog-cloud continuum,” Sensors, vol. 23, no. 9, Art. 4413, 2023, doi: 10.3390/s23094413.

     

    [23] S. A. Al-Asadi and S. Al-mamory, “A survey on edge and fog nodes’ placement methods, techniques, parameters, and constraints,” IET Networks, 2023, doi: 10.1049/ntw2.12087.

     

    [24] H. K. Apat, V. Goswami, B. Sahoo, R. K. Barik, and M. J. Saikia, “Fog Service Placement Optimization: A Survey of State-of-the-Art Strategies and Techniques,” Computers, vol. 14, no. 3, Art. 99, 2025, doi: 10.3390/computers14030099.

     

    [25] Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, “Edge intelligence: Paving the last mile of artificial intelligence with edge computing,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1738–1762, 2019, doi: 10.1109/JPROC.2019.2918951.

     

    [26] J. Chen and X. Ran, “Deep learning with edge computing: A review,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1655–1674, 2019, doi: 10.1109/JPROC.2019.2921977.

     

    [27] L. Dutta and S. Bharali, “TinyML meets IoT: A comprehensive survey,” Internet of Things, vol. 16, Art. 100461, 2021, doi: 10.1016/j.iot.2021.100461.

     

    [28] S. Heydari and Q. H. Mahmoud, “Tiny machine learning and on-device inference: A survey of applications, challenges and future directions,” Sensors, vol. 25, no. 10, Art. 3191, 2025, doi: 10.3390/s25103191.

     

    [29] A. Imteaj, U. Thakker, S. Wang, J. Li, and M. H. Amini, “A survey on federated learning for resource-constrained IoT devices,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 1–24, 2022, doi: 10.1109/JIOT.2021.3095077.

     

    [30] D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, and H. V. Poor, “Federated learning for Internet of Things: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 23, no. 3, pp. 1622–1658, 2021, doi: 10.1109/COMST.2021.3075439.

     

    [31] A. Brecko, E. Kajati, J. Koziorek, and I. Zolotova, “Federated learning for edge computing: A survey,” Applied Sciences, vol. 12, no. 18, Art. 9124, 2022, doi: 10.3390/app12189124.

     

    [32] V. Mothukuri et al., “A survey on security and privacy of federated learning,” Future Generation Computer Systems, vol. 115, pp. 619–640, 2021, doi: 10.1016/j.future.2020.10.007.

     

    [33] N. Bouacida and P. Mohapatra, “Vulnerabilities in federated learning,” IEEE Access, vol. 9, pp. 63229–63249, 2021, doi: 10.1109/ACCESS.2021.3075203.

     

    [34] A. M. Alwakeel, “An overview of fog computing and edge computing security and privacy issues,” Sensors, vol. 21, no. 24, Art. 8226, 2021, doi: 10.3390/s21248226.

     

    [35] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen- Porisini, “Insights into security and privacy towards fog computing evolution,” Computers & Security, vol. 117, Art. 102682, 2022, doi: 10.1016/j.cose.2022.102682.

     

    [36] H. Gupta, A. Vahid Dastjerdi, S. K. Ghosh, and R. Buyya, “iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, edge and fog computing environments,” Software: Practice and Experience, vol. 47, no. 9, pp. 1275–1296, 2017, doi: 10.1002/spe.2509.

     

    [37] C. Sonmez, A. Ozgovde, and C. Ersoy, “Edge- CloudSim: An environment for performance evaluation of edge computing systems,” Transactions on Emerging Telecommunications Technologies, vol. 29, no. 11, Art. e3493, 2018, doi: 10.1002/ett.3493.

     

    [38] I. Lera, C. Guerrero, and C. Juiz, “YAFS: A simulator for IoT scenarios in fog computing,” IEEE Access, vol. 7, pp. 91745–91758, 2019, doi: 10.1109/ACCESS. 2019.2927895.

     

    [39] M. A. Ferrag et al., “Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning,” IEEE Access, vol. 10, pp. 40281–40306, 2022, doi: 10.1109/ACCESS. 2022.3165809.

     

    [40] E. C. P. Neto et al., “CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment,” Sensors, vol. 23, no. 13, Art. 5941, 2023, doi: 10.3390/s23135941.

    Cite This Article As :
    Z., Aygul. , Dilaram, Baumuratova. Tiny Intelligence in Fog-Assisted Wireless Sensor IoT Networks: A Review of Deployment Patterns, Resource Trade-offs, and Open Challenges. International Journal of Wireless and Ad Hoc Communication, vol. , no. , 2026, pp. 18–26. DOI: https://doi.org/10.54216/IJWAC.100203
    Z., A. Dilaram, B. (2026). Tiny Intelligence in Fog-Assisted Wireless Sensor IoT Networks: A Review of Deployment Patterns, Resource Trade-offs, and Open Challenges. International Journal of Wireless and Ad Hoc Communication, (), 18–26. DOI: https://doi.org/10.54216/IJWAC.100203
    Z., Aygul. Dilaram, Baumuratova. Tiny Intelligence in Fog-Assisted Wireless Sensor IoT Networks: A Review of Deployment Patterns, Resource Trade-offs, and Open Challenges. International Journal of Wireless and Ad Hoc Communication , no. (2026): 18–26. DOI: https://doi.org/10.54216/IJWAC.100203
    Z., A. , Dilaram, B. (2026) . Tiny Intelligence in Fog-Assisted Wireless Sensor IoT Networks: A Review of Deployment Patterns, Resource Trade-offs, and Open Challenges. International Journal of Wireless and Ad Hoc Communication , () , 18–26 . DOI: https://doi.org/10.54216/IJWAC.100203
    Z. A. , Dilaram B. [2026]. Tiny Intelligence in Fog-Assisted Wireless Sensor IoT Networks: A Review of Deployment Patterns, Resource Trade-offs, and Open Challenges. International Journal of Wireless and Ad Hoc Communication. (): 18–26. DOI: https://doi.org/10.54216/IJWAC.100203
    Z., A. Dilaram, B. "Tiny Intelligence in Fog-Assisted Wireless Sensor IoT Networks: A Review of Deployment Patterns, Resource Trade-offs, and Open Challenges," International Journal of Wireless and Ad Hoc Communication, vol. , no. , pp. 18–26, 2026. DOI: https://doi.org/10.54216/IJWAC.100203