Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Fault-Aware Resource Allocation for Heterogeneous Data Sources with Multipath Routing

Published: 01 January 2017 Publication History
  • Get Citation Alerts
  • Abstract

    With the rapid development of cloud computing and big data, diverse types of traffic generated from heterogeneous data sources are delivered throughout communication networks, which consist of various node kinds such as digital sensors and smart actuators, and different applications. Due to the shared medium, communication networks are vulnerable to misbehaving nodes, and it is a crucial aspect to maintain an acceptable level of service degradation. This paper studies the fault-aware resource allocation problem by exploiting multipath routing and dynamic rate assignment for heterogeneous sources. We estimate the impacts of faults and formulate the resource allocation as a lossy network flow optimization problem based on these estimates. The traditional flow optimization solutions focus on homogeneous traffic. In our work, we model the performance of heterogeneous applications as a relaxed utility function and develop an effective utility framework of rate control for heterogeneous sources with multipath routing in presence of misbehaving nodes. We design a distributed algorithm to decide the routing strategy and obtain the rate assignments on the available paths in a lossy utility fair manner. Extensive performance evaluations corroborate the significant performance of our algorithm in effective utility and utility fairness in the presence of misbehaving nodes.

    References

    [1]
    C. Yang, C. Liu, X. Zhang, S. Nepal, and J. Chen, “A time efficient approach for detecting errors in big sensor data on cloud,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 2, pp. 329–339, 2015.
    [2]
    M. Díaz, C. Martín, and B. Rubio, “State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing,” Journal of Network and Computer Applications, vol. 67, pp. 99–117, 2016.
    [3]
    R. He, H. Rutagemwa, and X. Shen, “Differentiated reliable routing in hybrid vehicular ad-hoc networks,” in Proceedings of the IEEE International Conference on Communications, (ICC '08), pp. 2353–2358, Beijing, China, May 2008.
    [4]
    R. Mitchell and I.-R. Chen, “Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 16–30, 2015.
    [5]
    J. M. Gormally and R. L. Richards, “Application layer protocols for disruption tolerant remote sensor SATCOM links,” in Proceedings of the 33rd Annual IEEE Military Communications Conference, (MILCOM '14), pp. 975–982, Baltimore, MD, USA, October 2014.
    [6]
    A. Hava, Y. Ghamri-Doudane, G.-M. Muntean, and J. Murphy, “Increasing user perceived quality by selective load balancing of video traffic in wireless networks,” IEEE Transactions on Broadcasting, vol. 61, no. 2, pp. 238–250, 2015.
    [7]
    L. Chen and J. Leneutre, “On multipath routing in multihop wireless networks: security, performance, and their tradeoff,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, no. 1, 2009.
    [8]
    W. Wang, M. Chatterjee, K. Kwiat, and Q. Li, “A game theoretic approach to detect and co-exist with malicious nodes in wireless networks,” Computer Networks, vol. 71, pp. 63–83, 2014.
    [9]
    R. Mitchell and I.-R. Chen, “Behavior-rule based intrusion detection systems for safety critical smart grid applications,” IEEE Transactions on Smart Grid, vol. 4, no. 3, pp. 1254–1263, 2013.
    [10]
    V. Karyotis, S. Papavassiliou, and B. Maglaris, “Modeling framework for the study and analysis of mobile attack propagation in wireless ad-hoc networks,” in Proceedings of the 12th European Wireless Conference on Enabling Technologies for Wireless Multimedia Communications, European Wireless 2006, Athens, Greece, April 2006.
    [11]
    F. P. Kelly, A. K. Maulloo, and D. Tan, “Rate control for communication networks: shadow prices, proportional fairness and stability,” Journal of the Operational Research Society, vol. 49, no. 3, pp. 237–252, 1998.
    [12]
    W. H. Wang, M. Palaniswami, and S. H. Low, “Application-oriented flow control: fundamentals, algorithms and fairness,” IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 1282–1291, 2006.
    [13]
    V. G. Subramanian, K. R. Duffy, and D. J. Leith, “Existence and uniqueness of fair rate allocations in lossy wireless networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 7, pp. 3401–3406, 2009.
    [14]
    Z. Cao and E. W. Zegura, “Utility max-min: an application-oriented bandwidth allocation scheme,” in Proceedings of the IEEE 18th Annual Joint Conference of Computer and Communications Societies (INFOCOM '99), vol. 2, pp. 793–801, NY, USA, March 1999.
    [15]
    K. J. Arrow, L. Hurwicz, and H. Uzawa, Studies in Linear And Non-Linear Programming, Stanford University Press, Palo Alto, Calif, USA, 1958.
    [16]
    G. Hosseinabadi and N. Vaidya, “Selfish misbehavior in scheduling algorithms of wireless networks,” CRHC, University of Illinois at Urbana-Champaign, Albuquerque, NM, USA, http://www.crhc.illinois.edu/wireless/papers/tech-report-Ghazale-SelfishCrossLayered-March.pdf.
    [17]
    D. W. K. Ng, E. S. Lo, and R. Schober, “Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 10, pp. 3528–3540, 2011.
    [18]
    M. Saad, A. Leon-Garcia, and W. Yu, “Optimal network rate allocation under end-to-end quality-of-service requirements,” IEEE Transactions on Network and Service Management, vol. 4, no. 3, pp. 40–49, 2007.
    [19]
    M. H. Eiza, Q. Ni, T. Owens, and G. Min, “Investigation of routing reliability of vehicular ad hoc networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2013, 2013.
    [20]
    G. Yan, S. Olariu, and M. C. Weigle, “Providing location security in vehicular Ad Hoc networks,” IEEE Wireless Communications, vol. 16, no. 6, pp. 48–55, 2012.
    [21]
    M. Chiang, S. H. Low, A. R. Calderbank, and J. C. Doyle, “Layering as optimization decomposition: a mathematical theory of network architectures,” Proceedings of the IEEE, vol. 95, no. 1, pp. 255–312, 2007.
    [22]
    Y. Xue, B. Li, and K. Nahrstedt, “Optimal resource allocation in wireless ad hoc networks: a price-based approach,” IEEE Transactions on Mobile Computing, vol. 5, no. 4, pp. 347–364, 2007.
    [23]
    X. Zhang, X. Dong, N. Xiong, J. Wu, and X. Li, “Fault-aware flow control and multi-path routing in VANETs,” Peer-to-Peer Networking and Applications, vol. 8, no. 6, pp. 1090–1107, 2015.
    [24]
    J.-W. Lee, R. R. Mazumdar, and N. B. Shroff, “Non-convex optimization and rate control for multi-class services in the internet,” IEEE/ACM Transactions on Networking, vol. 13, no. 4, pp. 827–840, 2005.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Scientific Programming
    Scientific Programming  Volume 2017, Issue
    2017
    637 pages
    ISSN:1058-9244
    EISSN:1875-919X
    Issue’s Table of Contents
    This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

    Publisher

    Hindawi Limited

    London, United Kingdom

    Publication History

    Published: 01 January 2017

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media