Optimal Service Distribution in WSN Service System Subject to Data Security Constraints
Abstract
: Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm.1. Introduction
Wireless Sensor Network (WSN) is validated to become an integral part of the future Internet where they extend the Internet to the physical world [1,2]. It has been imported to adapt business processes and the underlying software infrastructure quickly and flexibly to react to changes on the markets. To achieve this goal, organizations have focused on modeling, analysis and adaptation of business processes since early 2004 [3]. In recent years, WSN service system has been presented for integrating seamlessly WSN with existing, widely deployed Service-Oriented Architecture (SOA) technologies to build WSN Service Applications (WSA) [4,5]. In WSA, data stemming from WSN may influence the control flow of a business process in real-time or even trigger a business process. In these approaches, WSN is packaged as some standard Web services which can be published, located, and invoked across the Web. Therefore, these WSN services can be combined into workflows to fulfill certain tasks in a services composition way [6,7].
How to maintain the data security, reliability and performance in WSA is an important issue, which has attracted wide attention from researchers [8–10]. Great progress has been made in this field. However, little research focused on maintaining the reliability and performance at the same time ensuring the data security in WSA. Recently, there has been growing interest in this field. Methods and technologies related to data security for WSA have attracted attention because they can forecast the data security level that users will obtain from WSA [11,12]. In addition, it is helpful to analyze whether there are some data security bottlenecks in WSA.
The real and specific problem in the WSN service system is coordinated resource sharing in distributed dynamic WSN [13–15]. It is related to the SNs resource allocation issue with resource-related constraints in WSN [16,17]. The resource sharing is not primarily data exchange but rather access to SNs, software, data, and other resources, which are expressed in the form of services. This is achieved by way of collaborative problem-solving and resource-brokering strategies emerging in industry, science, and engineering.
The sharing is controlled by a WSN Services Broker (WSB) [18,19]. When the WSB receives a service request from a user, the task can be mapped into a set of atom-services (ASs) according to related business rules from domain experts. Then, these ASs can be sent into a set of sensor nodes (SNs) that are executed in parallel. After SNs finish the assigned ASs, they return the results back to the WSB and then the WSB integrates the received results into the entire task output, which is requested by the user.
The reliability and performance of WSA is of great concern. Usually, the measure of performance is the task execution time (service time) [20,21]. This index can be significantly improved using the WSB that divides a task into a set of ASs, which can be executed in parallel by some SNs. Many complicated and time-consuming tasks that could not be implemented before are currently working well under the WSN service system. The reliability can also be significantly improved using the WSB that assigns the same AS into several SNs.
The service time is a random variable affected by many factors. First, there are many SNs available in WSN service system, which have different task processing speeds. Thus, the task execution time can vary depending on which SN is assigned to execute the AS. Second, some SNs can fail when running the AS, so the execution time is also affected by the SN reliability. Similarly, the communication links in SNs can fail during the data transmission. Thus, the communication reliability influences the service time as well as data transmission speed in the communication channels.
The choice of the group of ASs assigned to the same SN can influence the total amount of data transmitted between the WSB and SN, since different ASs can use common input data. This also affects the entire service time.
The data security is also a crucial issue in WSN service system [22]. The greater number of SNs and communication channels process and transmit some data blocks the greater chances of unauthorized access (UA) to these blocks [23,24]. Different channels and SNs can have different security levels. Therefore, the distribution of ASs among the SNs affects the data security during the service execution.
Most of the previous researchers separated performance, reliability, and security into different fields and studied them individually. However, in fact, performance, reliability and security are closely related and affect each other, in particular when the WSA is implemented [25,26]. For example, when a task is divided into n different ASs executed by m SNs simultaneously, the performance is high but the reliability can be low because failure of any SN makes the entire task incomplete. This causes the task to restart, which inversely increases its execution time (i.e., reduces its performance). Therefore, it is worth having some redundant SNs to execute the same AS especially for those failure-prone SNs. However, too many redundancies, even though improving the reliability, can decrease the performance by not fully parallelizing the execution of different AS and considerably reduces data security as multiple replicas of the same data are processed by different SNs, which increases chances of UA. Thus, performance, reliability and security should be studied together in the WSN service analysis.
This paper studies the optimization method that distributes service tasks into a set of SNs available in the WSN service system for maintaining the reliability, performance and data security of WSA. The paper is organized as follows. Section 2 presents the architecture of the WSN service system and the mechanisms of service partition and distribution, as well as the data security constraints. A set of assumptions are given in the end of Section 2. Section 3 presents the model of service execution time, data security, service reliability and expected performance of WSA. Section 4 presents an effective algorithm for determining the service reliability, performance and data security of WSA based on Universal Generating Function Technique (UGF). Based on this, Section 5 describes the optimization technique based on GA. In the end, the experimental analysis and conclusions are described in Sections 6 and 7, respectively.
2. WSN Service System
2.1. Architecture
The architecture of a WSN service system can be approximated as a three-tier structure as shown in Figure 1. At the bottom of Figure 1, some redundancy SNs are deployed which compose a cluster. To assure the correctness of observed data provided by these SNs and to improve the reliability of WSA, These SNs in the same cluster are responsible for observing the same object. That is to say, at the same observation time the same observed data should be sent by these redundancy SNs for the same object.
The sink is responsible for receiving the observed data from the cluster-sinks, and sending them to the management server through the gateway. From the point of view of the data processing, the SNs can be considered as resources, because they provide the observed data of target objects to the WSN service system.
In the intermediate layer of Figure 1, the management server controls the startup, initialization, distribution and recovery of the managed sinks, cluster-sinks and nodes dynamically.
As the resource management center, the WSB is one of the important components in the management server. The WSB manages users' service requests and controls the startup, access to, and sharing of data resources located in the management server. When a user's service request is received, the WSB maps the service request into a super-service which is not a physical WSN service but a logical service at first. Then, according to some domain-specific business rules the WSB divides the super-service into a services composition which consists of a set of sub-services. Each sub-service represents a certain, specific business operations.
Unfortunately, there are usually not some physical services matching these sub-services in WSN service system. Therefore, the WSB must map each sub-service into a services composition that consists of a set of physical WSN services, i.e., ASs. The next section illustrates the mapping process from a user's service request into a WSA.
2.2. Service Partition
Service partition is fulfilled by the WSB through a mapping process from a service request into a WSA, which is a service composition comprising a set of ASs physically. The WSB follows the related domain-specific business rules to execute the mapping process. The domain-specific business rules define the mapping relations between the service requests and the functionalities of a set of ASs, as well as their workflows. Therefore, the functionality of the generated WSA can satisfy the user's service request. By way of collaboration among ASs, the WSA can fulfill the service request from users.
Figure 2 illustrates the above mapping process which forms a three-tier structure. Each tier represents the different abstract granularities. Specifically, the top tier represents the super-service which corresponds to the service request from users; the middle tier represents the sub-services composition which corresponds to the business logic composition according to the domain-specific business rules; the bottom tier represents the ASs composition, i.e., WSA, which comprises some physical WSN services.
The WSA consists of a set of ASs which should be executed by some SNs of different types. Some initiatory ASs may be located at the head of the workflow, i.e., the composition structure of the WSA. Therefore, the WSB should allocate suitable SNs for them, and execute them at first. The execution of the behind ASs may require input data which should have been generated by the front ASs in the composition structure of the WSA. The execution logics of the WSA control the execution order of ASs. When a front AS was fulfilled and the result was output by a resource on which the AS was executed, the WSB transfers the received result to the next AS as it inputs data according to the execution logics, and allocates suitable resources to execute this AS. When these ASs in the WSA are all fulfilled and the final result is returned, the service request is executed completely under the control of the WSB. In the end, the final result should be transferred to the user by the WSB.
The service request is fulfilled by a WSA through the data processing at ASs and data exchange between the WSB and ASs, in fact. The data security of services is related to the successful completion of the users' service requests. The data security of sub-service is discussed in the next section.
2.3. Data Security of Service
The SNs and communication channels are distributed in the WSN service system. The various types of SNs with corresponding channels are of different insecurity levels. These insecurity levels are characterized by the probabilities of unauthorized access to data processed/generated by SNs. Usually, the insecurity level is determined as a product of the probability of an attack against a resource and resource vulnerability (conditional probability of the attack success given the resource is attacked). The attack probability can depend on the resource attractiveness to the attackers and can be evaluated by security experts and attack statistics. The resource vulnerability usually depends on the protection efforts made by the managers of WSN service system and WSA developers. Different models for evaluating the vulnerability of software operating systems can be found, for example, in [27,28].
In the WSN service system, the service request can be fulfilled by a set of ASs independently executed on different SNs. Each AS can be characterized by a fixed complexity, a fixed amount of output data and a fixed set of input data blocks necessary for the AS execution. Different ASs may need some common input data blocks for their execution. Some business-dependent ASs belong to the same sub-service according to the mapping process. For example, from Figure 2, one can see that the ASs and belong to the sub-service , and ASs , and belong to the sub-service , and so on. In addition, the output data block from is the input data block of and .
The input data block for any sub-service consists of input data blocks necessary for executing all ASs belonging to this sub-service. Execution of some ASs is associated with transferring and/or processing data. The unauthorized access to this data results in the security failure of service. The security failure occurs if sensitive data is processed by an AS or transmitted by a channel when unauthorized access to the AS or channel is accomplished.
Some data sets can be useful only in their integrity. For example, in Figure 2, only after the output data blocks from ASs and have been processed by according to some certain business rules, the resulted data block output by can be useful. In other words, each sub-service has relative-independent data security. If unauthorized access occurs only to some SNs executing a part of ASs or some channels transferring a part of data blocks from these ASs, the service security of sub-service will not become invalid completely. On the contrary, only if unauthorized access occurs to all of the SNs or all of the channels used by a sub-service, the service security of this sub-service will be invalid completely.
The SNs are involved in data exchange process. The next section presents the allocation of SNs, i.e., the distribution of ASs.
2.4. Service Distribution
The service distribution is fulfilled by WSB through the process of SNs allocation. Usually, each sensor node can only process a single AS when it is available. On the other hand, the same AS can be assigned to several SNs in the same cluster. Considering the reliability and efficiency of WSN service system, WSB usually allocates multiple SNs for each AS to execute in parallel, which is illustrated in Figure 3.
There are 18 SNs allocated to AS to in Figure 3. Specifically, the set ω1 of SNs is allocated to the AS , which can be expressed by ω1 = {r1,r2,r3}, the set ω2 is allocated to , ω2 = {r4,r5}, and so on.
To improve reliability, a check mechanism, named k out of n, is introduced in WSN service system. After receiving the data blocks sent by n SNs in the same cluster, the cluster-sink compares them. When k out of n received data blocks are the same, where k ≤ n distinctly, the cluster-sink will regard them as the correct results and send one of them to WSB in the end. For other k − n different data blocks will be regarded as inaccurate data and be discarded by the cluster-sink, simply.
To improve efficiency, when k same data blocks are obtained before all of the n data blocks have been received, WSB makes a finished mark for this AS and cancels the execution of other SNs allocated to this AS.
The values of k and n are related to the expected service reliability from WSN service designers and the number of SNs allocated to each ASs.
The reliability and efficiency of WSN service system are improved through employing the redundant allocation of SNs and k out of n check mechanism, whereas the service cost is also improved along with the improvement of the number of redundant SNs at the same time.
Thus far, we have discussed the architecture of the WSN service system, the mechanism of service partition and distribution, as well as the data security of sub-service. For analyzing the performance, reliability and security in WSN service system, some assumptions are presented in the next section.
2.5. Assumptions
- (1)
After receiving necessary input data from WSB through the corresponding communication channel, each sensor node starts immediately processing assigned AS. Once the assigned AS is fulfilled, each sensor node sends output data to WSB through the same communication channel.
- (2)
Each sensor node has a given constant data processing speed and a given constant failure rate whenever it is idle, loaded or busy. In addition, the failure rates at different SNs are independent. The processing time used for an AS is proportional to its computational complexity.
- (3)
Each communication channel has a given constant data transmission speed and a given constant failure rate whenever it is idle, loaded or busy. In addition, the failure rates at different SNs are independent. The data transmission time is proportional to the amount of data transferred between the WSB and sensor node.
- (4)
All of the sub-services in a WSA and the entire ASs in a sub-service are executed serially, i.e., not concurrently.
- (5)
The WSB is fully reliable. Comparing with the processing time of AS, the time of service processing by the WSB can be negligible.
- (6)
The unauthorized accesses to different SNs or communication channels are independent events. The probability of unauthorized access depends on the protection level of SNs and their communication channel and does not depend on the amount of processed data and type of services processed by ASs.
According to the above assumptions, the measurements methods on performance, reliability and security in WSN service system are presented in the following sections.
3. Model
3.1. Service Execution Time
Assume that all of the ASs within a WSA can be executed independently through service partition by the WSB. Each AS fulfills its functionality through processing the input data exported by its anterior ASs in the composition structure of a WSA. Let the computational complexity of each AS be cj, and the amount of the input data of each AS j be Ij, while the amount of the output data of each AS j is Oj. The completion time of each AS j depends on the processing speed of the SNs and the transmission speed of the communication channels of these SNs. Let the processing speed of the SN l be xl, and the transmission speed of its communication channels be sl. The execution time of AS is defined as the time from the beginning of input data transmission from the WSB to the SNs, on which the AS is executed, to the end of transmission of the final output data from these ASs to the WSB. Therefore, according to Assumption (1), the random time tjl of AS j completion by the SN l can take two possible values
According to the k out of n check mechanism presented in Section 2.4, if the number of the same output data transferred from SNs to the WSB is equal to k, then the AS is successful and the WSB will immediately cancel the other execution of this AS by other SNs, and record the execution time of cancelled ASs as zero. Assume that the AS j is assigned to a set ωj of SNs. Therefore, the total service processing time of the AS j takes the following form
On the contrary, if the number of the same output data transferred from SNs to the WSB is less than k, then the WSB considers that this AS is failed, and records the AS execution time as ∞.
Following [29], we adopt the Crow/AMSAA reliability model in which failure intensity h(τ) for each SN is expressed as a function of development test time τ as follows:
For non-repairable elements, their reliability r after performing RGT during time τ can be expressed by the following function of time t:
According to Assumptions (2) and (3), SNs and their communication channels have the constant failure rates λl and πl, respectively. Therefore, the parameters of the above equations can be as: h(τ) = λl + πl, and t = in this paper.
AS j can be successfully completed by SN l, if this SN and its communication link do not fail before the end of AS execution. For constant failure rates of SN l and its communication link (Assumptions (2) and (3) presume exponential distribution of time to failure), one can obtain the conditional probability of AS j success given both SN l & link l, i.e., the reliability of AS j, are available at the beginning of the AS execution as
These give the conditional distribution of the random AS j execution time tjl as: Pr(tjl = t̂jl) = pl(t̂jl) and Pr(tjl = ∞) = 1 − pl(t̂jl).
According to Assumption (4) that all of the sub-services in a WSA and the entire ASs in a sub-service are executed serially, for any one of sub-service i comprising m ASs, i.e., the set of ASs σi (|σi|= m), its random completion time takes the form
Similarly, for the WSA comprising h sub-services, i.e., the set of sub-services φ (|φ|= h), its total completion time takes the form
Having the distributions of each random time t̂j,ωj one can obtain the distribution of the entire WSA execution time T (probability mass function of discrete variable T) in the form of pairs (Tf, Pf), 0≤ f ≤ F, where Tf is f-th realization of T, Pf = Pr(T = Tf), and F is total number of different realizations of T.
3.2. Data Security in WSN Service System
When AS j is executed by a set of SNs ωj, the unauthorized access to any one of the SNs, as well as its communication channel, belonging to the set ωj results in the security failure of this AS. Let the security of the SN l and its communication channel is yl, the probability of security failure of the AS j assigned to the set of SNs ωj can be represented as
If all of the ASs in a sub-service have been compromised by unauthorized access, the unauthorized access to this sub-service succeeds. Assume that a sub-service i comprises a set of ASs σi The probability of security failure of the sub-service i can be obtained as
Similarly, for a WSA comprising a set of sub-services φ, its probability of security failure can be obtained as
Obviously, the risk of security failure of a WSA is increased along with the increase of the number of SNs which are unauthorized accessed. The security requirement of WSN service system can be defined as a threshold of security failure probability. It can be obtained from the security experts or the designers of the WSN service system. When the security failure probability fφ is less than , the WSN service system is considered to be secure.
3.3. Service Reliability and Expected Performance
In order to evaluate the service reliability and performance of the WSN service system, the service execution time has been defined in Section 3.1. According to the performance concept in [30,31], the system reliability R(T*) is defined as a probability that the correct output is produced in time less than T*. This index can be obtained as
The number of fulfilled service requests over a fixed time, i.e., the average service performance, is an important index in the WSN service system. The service reliability is defined as the probability that it produces correct outputs without respect to the service time, which can be referred as R(∞). Given that the service does not fail, the conditional expected service time T̃ can be considered as the measurement of service performance. The index can be obtained as
Summarily, in our architecture of WSN service system, the service task, i.e., super-service, corresponding to a given users' service request is partitioned into h sub-services (represented by the set φ, |φ|= h) according to some domain-specific rules. Then, each sub-service i is partitioned into m ASs (represented by the set σi, 1 ≤ i ≤ h) according to some domain-specific rules. On this basis, each AS j is distributed among a set of SNs (represented by the set ωj, 1 ≤ j ≤ m, | ωj | = n). Each SN has the constant processing speed xl, the independent security yl and the constant failure rates λl. The above partitions and distribution determine the service reliability, performance and security of a WSA. Therefore, the optimal service distribution, i.e., the distribution of all of the ASs among the SNs in WSN service system subject to data security constraints, can come down to two optimization problems:
- (1)
How to find the distribution ωj of each AS j 1 ≤ j ≤ m in the set of sub-services σi 1 ≤ i ≤ h maximizing R(T*) for a given T* subject to the data security constraint . It can be formalized as:
- (2)
How to find the distribution ωj of each AS j 1 ≤ j ≤ m in the set of sub-services σi 1 ≤ i ≤ h minimizing T̃ subject to the service reliability constraint R(∞) ≥ R* and the data security constraint . It can be formalized as:
In solving the above two optimization problems, determining the Probability Mass Function (PMF) of the service time is primary. The following section proposes an algorithm based on the universal generating function (u-function) technique for determining the PMF of the service time for arbitrary service partition and distribution.
4. Algorithm for Determining the PMF of Service Time
Since the service time can take different values, the WSA should be considered as a multi-state system (MSS) [32] with performance depending on combination of states of its elements. In other words, the WSA can have different performance levels corresponding to different combinations of available and failed SNs with different processing speeds and failure rates, as well as their communication channels with different data transmission speeds and failure rates.
Generally, the methods of MSS reliability and performance assessment can be divided into four different types [33]: (1) an extension of the Boolean models to the multi-valued case; (2) the stochastic process (mainly Markov and semi-Markov) approach; (3) the Monte-Carlo simulation technique; (4) the u-function approach [34]. The first three approaches have some disadvantages, either the applicability of only small-scale MSS or too much time consumed for executing model. On the contrary, the u-function technique is fast enough, and can be applied in the assessment of reliability and performance of a large-scale MSS. This is because that u-function technique allows one to find the performance distribution of the entire MSS based on the performance distributions of its elements by using a fast algebraic procedure.
For the above reasons, we choose u-function technique to determine the PMF of the service time for arbitrary service partition and distribution. The next section presents the expression of the PMF of service time base on the u-function technique.
4.1. Expression of the PMF of Service Time
The procedure used in this paper for the evaluation of the service time distribution is based on the UGF technique, which was introduced in [35], and which proved to be very effective for the reliability evaluation of different types of multi-state systems [36].
The service time of a WSA is a random discrete variable T. Assume that T has K possible values, i.e., K possible states T1,T2,…,Tk. Let pk is the probability when T is in the state Tk, 1 ≤ k ≤ K. According to the UGF technique, the probability distribution of the service time of a WSA can be obtained using a formal operator z that resembles the procedure of the product of polynomials. The u-function representing the PMF of the random discrete service time T can be defined as a polynomial
Each term coefficient of the polynomial in Equation (14) denotes the probability that the performance of WSA takes on determinate state k, while the corresponding exponent denotes the performance corresponding to state k. The representation (14) is named the generating function (or z-transform). In general, z-transform of any random discrete service time that has the PMF pk, Tk takes the form (14). The essence of z-transform representation lies in relating the possible values of the variable with the probabilities that the random variable takes these values.
Based on the above definition, the u-function representing the PMF of the completion time for an AS j assigned to SN l can take the form of
According to Equation (2), the total completion time of the AS j assigned to a pair of SNs l1 and l2 is equal to the maximum of completion times for different SNs. In order to obtain the u-function representing the PMF of this time, a composition operator ⊗max with ⊗max(t̂jl1,t̂jl2) = max(t̂jl1,t̂jl2) should be used
The u-function technique provides a recursive computation approach to efficiently obtain the PMF. For a AS j, 1 ≤ j ≤ m, assigned to a set of SNs ωj = {l1,l2, ⋯, ln}, the u-function representing the PMF of the total completion time can be obtained recursively
Having the u-functions uj,ωj (z) of each ASs j, according to Equation (7), we can recursively obtain the u-function representing the PMF of completion time of each sub-service i comprising the set of ASs σi = {j1,j2, ⋯,jm} using the composition operator ⊗sum with ⊗sum(t̂j1,ωj1,t̂j2,ωj2) = t̂j1,ωj1 + t̂j2,ωj2
Similarly, based on the u-functions ui,σi (z) of each sub-services, according to Equation (8), the u-function Uφ(z) representing the PMF of the total completion time of a WSA comprising h sub-services i (1 ≤ i ≤ h) can be obtained recursively using the composition operator ⊗sum
The final u-function Uφ(z) represents the PMF of random completion time T of the service request from users in the form
Using Equations (12) and (13), the service reliability R(T*) and the expected service time T̃ can be obtained. The next section presented an algorithm for determining the service reliability, performance and security of a WSA with arbitrary service partition (φ,|φ|= h, σi, 1 ≤ i ≤ h, |σi|= m) and distribution ωj, 1 ≤ j ≤ m, |ωj|= n.
4.2. Algorithm for Determining the Service Reliability, Performance and Data Security
Given a WSA comprises the set of sub-services φ, |φ|= h. Each sub-service i in this WSA, comprises the set of ASs σi, 1 ≤ i ≤ h, |σi|= m. Each AS j has the amount of the input data Ij and the amount of the output data Oj. Each AS j is assigned to the set of SNs ωj, 1 ≤ j ≤ m, |ωj|= n. Each SN l has the constant processing speed xl, the independent security yl and the constant failure rates λl. Additionally, the communication channel of the SN l has the constant transmission speed sl, the independent security yl and the constant failure rates πl.
The algorithm for determining the service reliability, performance and security of a WSA is described as follows:
- Step 1
For the given distribution ωj, (1 ≤ j ≤ m, |ωj|= n) of each AS j among the SNs, determine the service processing time t̂jl and the probability pjl(t̂jl) of successful completion of AS j assigned to each SN l using Equations (1) and (6), respectively. On this basis, obtain the u-function uj,{l}(z) representing the PMF of completion time for the AS j assigned to each SN l using Equation (15).
- Step 2
For each AS j assigned to the set of SNs ωj, determine the u-function uj,ωj (z) representing the PMF of total completion time for the AS j assigned to the set of SNs ωj according to the recursive process described by Equation (17). Then, determine the probability of security failure fj,ωj of the AS j using Equation (9).
- Step 3
For the given service partition σi, (1 ≤ i ≤ h, |σi|= m) of each sub-service i, determine the u-function ui,σi (z) representing the PMF of completion time of each sub-service i according to the recursive process described by Equation (18). Then, determine the probability of security failure fj,σi the sub-service i using Equation (10).
- Step 4
For the given service partition φ (|φ|= h) of the WSA, determine the u-function Uφ(z) representing the PMF of the total completion time of the WSA according to the recursive process described by Equation (19). Then, determine the probability of security failure fφ of the WSA using Equation (11).
- Step 5
Determine the reliability R(T*) and the conditional expected service time T̃ using Equations (12) and (13), respectively.
From the above algorithms described, especially (8), one can see that the time complexity of the suggested algorithm in finding the PMF is O(|σ|×|φ|). In other words, the time consumption of the suggested algorithm in finding the PMF is determined by the number of sub-services in a WSA and the number of ASs within each sub-service.
Using the above algorithm, the final reliability and the conditional expected service time of a WSA can be obtained, as well as the probability of security failure. On this basis, the different distribution solutions for the entire ASs in a WSA can be compared under an optimization algorithm framework. The next section proposes an optimization technique for ASs distribution subject to data security constraint.
5. Optimal Service Distribution Technique
Considering reasonable time limitations, an exhaustive examination of all possible solutions for the distribution of ASs among SNs is not realistic. Therefore, the optimal service distribution problem is a complicated NP complete problem. Because the quality of solution for a given AS distribution is the only information available during the search for the optimal solution, a heuristic search algorithm is used for estimating the solution quality.
The genetic algorithm (GA) has been proven to be an effective optimization tool for a large number of complicated problems in reliability engineering [37,38]. Therefore, we choose GA to solve the optimization problem of service distribution. The next section introduces the solution representation in optimal search algorithms.
5.1. Encoding and Decoding of Solution
In the framework of the above WSN service system, there are h sub-services and m ASs belonging to each sub-service. Each AS is assigned to n SNs. So, the number of the entire ASs distributed among these SNs is h×m. Furthermore, the number of SNs allocated to the entire ASs is h×m×n. Therefore, the service distribution problem can be considered as a problem of partitioning a set Ω of h×m×n SNs into a collection of h×m mutually disjoint subsets ωj, i.e., such that
In order to express concisely, let R = h×m×n and S = h×m, the above partition problem can be expressed as partitioning a set Ω of R SNs into a collection of S mutually disjoint subsets ωs, i.e., such that
In order to encode a feasible solution for the distribution of S ASs among R SNs, let R different integer numbers (from 1 to R) represent these SNs, and S different integer numbers (from R+1 to R+S) represent these ASs. In other words, the integer number r (1≤r≤R) represents any one of R SNs whereas the integer number S (R+1≤s≤R+S) represents any one of S ASs. Therefore, a feasible solution can be represented by a string with any permutation of R+S different integer numbers (from 1 to R+S).
The rule of permutation decoding is as follows: a set of SNs represented by any sequence of adjacent SN numbers, i.e., the numbers of greater than or equal to 1 and less than or equal to R, execute a set of ASs represented by any sequence of adjacent AS numbers, i.e., the numbers of greater than or equal to R+1 and less than or equal to R+S, located on the right side of this SN number sequence. In other words, all the SNs taking adjacent positions execute the same set of ASs taking adjacent positions which is located on its right side. In order to ensure that all ASs can be assigned to at least one SN, the smallest number, i.e., 1, representing a SN always takes the leftmost position in the permutation. In addition, the condition of a sequence of adjacent SN numbers located on the rightmost position in the permutation implies these SNs represented by this number sequence are not assigned to any AS. In other words, they can remain idle.
Since the place of the first number, i.e., the first SN, is fixed in a solution sequence, the solution depends on permutation of R+S−1 numbers. Therefore, the solution decoding procedure determines S mutually disjoint subsets ωs from any permutation of R+S−1 different numbers. On this basis, an optimal solution can be found in a random searching framework. The next section presents the crossover and mutation operations used in our random searching framework.
5.2. Crossover and Mutation Operations
New feasible solutions, i.e., chromosomes in GA, are obtained through crossover operations and mutation operations on the solution strings. An efficient crossover procedure presented in [39] is used in this work. This procedure copies all the string elements from the first parent to the same positions of the offspring at first. Then, a fragment of this offspring is identified as a set of adjacent positions between two randomly defined positions in the string. On this basis, all the offspring numbers belonging to this fragment are reallocated in the order they appear in the second parent. In other words, for the offspring, the numbers in the defined fragment are reordered according to their order appearing in the second parent, whereas the order of the rest of offspring numbers is same as the first parent. The following is an example of the crossover procedure in which the fragment is marked in bold.
First parent: | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
Second parent: | 1 | 8 | 9 | 10 | 4 | 3 | 7 | 6 | 2 | 5 |
First parent: | 1 | 2 | 8 | 4 | 3 | 7 | 6 | 5 | 9 | 10 |
The mutation operations used in our work just swaps the numbers located in two randomly chosen positions of the string.
The above crossover and mutation operations preserve solution feasibility. The optimal solution can be found through comparing the fitness of solutions generated by crossover and mutation operations. The next section proposes the searching process for the optimal service distribution based on GA.
5.3. Searching Process for the Optimal Solution
According to the algorithm presented in Section 4.2, the system reliability, expected service time and security corresponding to any feasible solution can be calculated. For the optimization problem (1) described in Section 3.3, the solution fitness F is determined as
For the optimization problem (2) described in Section 3.3, the solution fitness F is determined as
The searching process for the optimal service distribution, illustrated in Figure 4, comprise the evolution procedure with the selection procedure on the whole. From Figure 4, one can see that the evolution procedure consists of the crossover operation, the mutation operation and addition operation corresponding to Steps 1–3 respectively, whereas the selection procedure consists of the decoding operation, the evaluating operation, the comparing operation and the replacing operation corresponding to Steps 4–7.
Before the searching process begins to work, the current generation population in the chromosome pool is initialized with k generating randomly chromosomes. Obviously, k is the size of the population. The next generation population with the same size will be generated by k executions of the searching process. Furthermore, some of the best chromosomes found in all searching processes will be stored in the best chromosomes' pool. Through the population evolution of some generations within the specified time, the best chromosome in the best chromosomes pool represents the optimal solution that can be found. All the steps in the searching process are described as follows.
- (1)
Randomly choose two chromosomes from the current population in the chromosome pool as the first parent and the second parent. Then, according to the crossover procedure described in Section 5.2, a crossover operation is performed on these two chromosomes with a specified crossover probability. As a result, a new chromosome different to its parents is generated.
- (2)
A mutation operation described in Section 5.2 is performed sequentially on this new generated chromosome with a specified mutation probability. Thus, a new chromosome is generated finally.
- (3)
Add the new generated chromosome into the next generation population in the chromosome pool.
- (4)
Decode the new generated chromosome to obtain the distribution ωs (1≤s≤S) of all ASs on SNs according to the decoding procedure in Section 5.1.
- (5)
Calculate the system reliability, the conditional expected service time and the probability of security failure of a WSA with ASs distribution ωs (1≤s≤S) on SNs using the algorithm presented in Section 4.2.
- (6)
According to the solution fitness defined in (23) or (24), calculate the fitness of the new generated chromosome. Then, compare it with the current worst chromosome in the best chromosome pool.
- (7)
If the new generated chromosome is superior to the worst one in the best chromosome pool, replace the worst one with it.
In order to examine the feasibility of our algorithm, some examples have been performed which are presented in the next section.
6. Experimental Analysis
Consider a WSA that uses 10 SNs distributed in a WSN service system. The processing speeds xl, the failure rates λl and security probabilities yl of these SNs, and the transmission speeds sl, the failure rates πl of their communication channels are presented in Table 1.
The entire WSA can be mapped into three sub-services comprising six atom-services. We supposed for simplicity that all of these sub-services and atom-services are executed in series. The service partition and the computational complexities, the amount of the input data and the amount of the output data for each atom-service are presented in Table 2.
6.1. Experimental Environment
We have developed a parallel GA program based on MATLAB® Distributed Computing Server (MDCS) and Parallel Computing Toolbox (PCT) to investigate the efficiency and performance of the suggested algorithm. In order to efficiently perform an in-depth experimental analysis, we use a cloud computing platform based on IBM PureFlex® cluster with seven blade servers. In this cloud computing platform, 25 virtual machines have been built for searching optimal solution in parallel in our GA program, which is shown as Figure 5.
Based on the above experiment platform, we compared and analyzed the dependencies among the optimal reliability, the MAX service time, and the data security, as well as the robustness of the suggested algorithm, which are described in the following sections.
6.2. Optimal Reliability vs. MAX Service Time
In order to investigate the change of optimal reliability of a WSA along with the MAX service time rise under some given data security constraints, a set of experiments was designed. In suggested GA algorithm, the population size is set to 1600 chromosomes. The max generation is set to 30. The size of the optimal chromosome pool is dynamically increased from 0.5%–5% of population size with the increase of generation. The crossover probability is set to 0.7. The variation probability is set to 0.3. The penalty factor of reliability is set to 100. The number of repeated experiments is set to 20. A set of experiments were performed, which observe the searching process for the optimal reliabilities along with the MAX service time rise under the given data security constraints 0, 0.3, 0.6, 0.9, respectively.
6.2.1. The Number of Experiments that Found Feasible Solutions
For each MAX service time, the numbers of experiments that found feasible solutions in 20 repeated experiments is different under each constant data security constraint. The number of experiments that found feasible solutions for the MAX service time T* changes from 501–540 with a constant incremental change of 1 under the given data security constraints, which are shown in Figure 6.
From Figure 6, one can see that the number of experiments that found feasible solutions in 20 repeated experiments increases gradually along with the MAX service time. From the comparison of the curves of the number of feasible solutions in Figure 6I–IV, one can see that the climbing speed under a lower data security constraint is faster than that under a higher data security constraint. It indicates that it is more difficult to find plentiful feasible solutions under a stricter data security constraint. In addition, the shaded areas in Figure 6I–IV represent the number of feasible solutions subject to each given data security constraint. Comparing the area of shadows in Figure 6I–IV, one can draw an intuitive judgment that the amount of feasible solutions under a looser data security constraint is larger than one under a stricter data security constraint at the same MAX service time.
In order to investigate the relationship of the MAX service time and the data security constraint in the combining effects on the amount of feasible solutions, the above experimental results are shown in the form of 3D image in Figure 7. From this figure, one can see that the data security constraint plays the more important role in the increase of the amount of feasible solutions under a smaller MAX service time than one under a larger MAX service time. On the contrary, the MAX service time plays the more important role in the increase of the amount of feasible solutions under a stricter data security constraint than one under a looser data security constraint.
Thus, the conclusion can be drawn that the potential feasible solutions are found to be more difficult when the MAX service time is smaller or the data security constraint is stricter. Therefore, for a smaller MAX service time or a stricter data security constraint, it will take more genetic generations to search the potential feasible solutions.
6.2.2. The Trend of the Optimal Reliabilities
Under each constant data security constraint, the change trend of the optimal reliabilities was investigated along with the MAX service time rise. The found optimal reliabilities for the MAX service time T* change from 501 to 540 with a constant incremental change of 1 under the given data security constraints are shown in Figure 8.
From Figure 8, one can see that the optimal reliabilities increase gradually along with the MAX service time. From the comparison of the curves of optimal reliabilities in Figure 8I–IV, one can see that the climbing speed under a lower data security constraint is faster than that under a higher data security constraint. It indicates that it is more difficult to find the solutions with higher optimal reliability under a stricter data security constraint. Similarly to Figure 6I–IV, the shaded areas in Figure 8I–IV represent the optimal reliabilities of solutions which are subject to each given data security constraint. Comparing the area of shadows in Figure 8I–IV, one can see clearly that the optimal reliability of feasible solutions under a looser data security constraint is larger than one under a stricter data security constraint at the same MAX service time. Additionally, it is more and more obvious along with the increase of data security constraint.
In order to investigate the relationship of the MAX service time and the data security constraint in the combining effects on the optimal reliability of feasible solutions, the above experimental results are shown as a 3D plot in Figure 9. From this figure, one can see that the data security constraint plays a more important role in the increase of the optimal reliability of feasible solutions than the MAX service time. On the contrary, comparing to the data security, the MAX service time plays a limited role on the increase of the optimal reliability of feasible solutions under each data security constraint.
Thus, the conclusion can be drawn that the potential feasible solutions are found to be more difficult when the MAX service time is smaller, or the data security constraint is stricter. Therefore, for a smaller MAX service time or a stricter data security constraint, it will take more genetic generations to search the potential feasible solutions.
The reasons for the above results are that the probabilistic sum of optimal reliabilities of the feasible solutions changes more violently along with the alterations of the data security constraint than with the alterations of the MAX service time. It indicates that the reliability of WSA is largely dependent on the restriction of data security constraint. Therefore, determining an appropriate data security constraint is very important to improve the reliability of WSA. When the data security constraint is determined, the reliability of a WSA can be enhanced to a certain extent by choosing an appropriate MAX service time.
6.2.3. The Trend of the Mean Value of Optimal Reliabilities
In addition, we also investigated the mean values of the optimal reliabilities in 20 repeated experiments. Figure 10 shows these mean values for the MAX service time T* change from 501 to 540 with a constant incremental change of 1 under each constant data security constraint. The curves of the mean value of optimal reliability in Figure 10 from I–IV show a growth trend on the whole along with the MAX service time rise. The 3D plot of the mean value of optimal reliability is shown in Figure 11.
In such a situation that the exact values of reliability need not be calculated, the mean values of the optimal reliabilities in an adequate number of repeated experiments still have a role in comparing the different service distribution solutions. Obviously, the maximum number of generic generations in these repeated experiments can be far less than those in the case of calculating exact reliabilities. Therefore, these mean values can be used for the high effective determination of the appropriate MAX service time and the appropriate data security constraint in the rough range according to the climbing speed of curves in Figures 10 and 11.
Thus, the reliability, the data security and the MAX service time are contradicting optimization objectives. The suggested algorithm allows one to find the compromise solution by changing the constraints and solving the optimization problems (1) or (2). Another possible approach is solving the multi-objective optimization problem with reliability, security and MAX service time as different criteria. Based on the above analysis, we suggest a distinct solution method for problem (1) or (2) in the next section.
6.3. A Distinct Solution Method for the Problems (1) or (2) in Section 3.3
On the basis of the above experimental analysis, we present a distinct solution method for the problems (1) or (2) described in Section 3.3 based on Figure 8 in Section 6.2.2. For the problem (1), based on Figure 8 (II) corresponding to the given data security constraint assuming , we can draw a vertical auxiliary line according to the given MAX service time value T*, which is shown in Figure 12I. The intersection between the vertical line and the optimal reliability curve forms a shadow area. The points fallen into the shadow area represent the feasible solutions subject to T≤T* and . The point with maximal reliability in these points is just the optimal solution. Obviously, the point is the cross point of the vertical line and the optimal reliability curve. Thus, the reliability corresponding to the point is just the solution of the problem (1).
For the problem (2) described in Section 3.3, the distinct solution method is similar to the above description. According to the given R*, we can draw a horizontal auxiliary line corresponding to the given reliability value R* based on Figure 8II, which is shown in Figure 12II. The intersection between the horizontal line and the optimal reliability curve forms a shadow region. The points fallen into the shadow region represent the feasible solutions subject to R≥R* and . The point with the minimal value of MAX service time in these points is just the optimal solution. Obviously, the point is the cross point of the horizontal line and the optimal reliability curve. Thus, the MAX service time corresponding to the point is just the solution of the problem (2).
In the case that the restrictions of the MAX service time and data security constraint are too strict, the auxiliary line cannot cross over the optimal reliability curve. Thus, a feasible solution of problem (1) or (2) cannot be found. In such a case, the improvement of reliability or the decrease of expected service time of WSA can be obtained only by increasing the amount of SNs available for the execution of ASs in parallel. The influence of the number of SNs on the optimal reliability of WSA is further invested in the next section.
6.4. Optimal Reliability vs. the Number of SNs
In order to investigate the influence of the number of SNs on the optimal reliability, a set of experiments were designed. The variation range of the number of SNs is set from 6 to 15 with a constant incremental change 1. In order to compare the influence of different number of SNs on the reliability of WSA, the SNs gradually added to the WSN service system available for the WSA are set to the same. The MAX service time and the data security constraint are set as 620 and 0.4, respectively. Other parameters of our GA algorithm are set as the same as Section 6.2.
The experiments were performed 30 times. Figure 13 shows the change of optimal reliability of WSA along with increasing the number of SNs from 6 to 15.
From Figure 13, one can see that the reliability closes to zero when the number of available SNs is 6. After adding one SN to the WSN service system, the reliability rapidly increases to 0.8219. Along with the increase of the number of SNs, the reliability slowly but steadily climbs to the pinnacle: 0.8859. After that, the reliability remains unchanged even when SNs are continued to be added to the WSN service system. This result indicates that increasing the number of SNs can only enhance the reliability of WSA to a certain degree when the MAX service time and data security constraints are given values. Obviously, the optimal configuration amount of SNs can be found directly from Figure 13. Therefore, the intersection of the auxiliary line and the optimal reliability curve can be created by improving the reliability or by decreasing the expected service time though increasing the appropriate number of SNs. On this basis, problems (1) and (2) can be solved by employing the distinct solution method proposed in the previous section. In addition, the suggested method is also helpful to reduce waste of computing resources and improve their utilization efficiency as much as possible.
7. Conclusions
The WSA is a newly developed computing model of delivering WSN services in the Internet of Things. The WSA model allows effective distribution of computational tasks among different SNs available in the WSN service system [40,41]. The WSB can map the user's service request into a set of ASs and send them to some different SNs for parallel execution [42,43]. In order to provide a desired level of service reliability, the WSB can assign the same ASs to several different SNs. However, executing the same ASs at different SNs as well as sending multiple replicas of associated data through different channels increases the probability of unauthorized access to sensitive data, which leads to reduction of the service data security. For any service request from a user, the service reliability, service completion time and data security depend on service task partition into ASs and their distribution among the available SNs. The suggested optimization algorithm is aimed at achieving the maximum reliability or minimum service completion time subject to data security constraints by the optimal service task partition and distribution. The high computational efficiency of the proposed algorithm is achieved using the universal generating function approach. This allows the algorithm to be used in optimization procedures where a large number of different solutions should be estimated.
Acknowledgments
This research was supported by the National Natural Science Foundation of China [61172084]; Science and Technology Support Program of Hubei Province of China [2013BHE022]; Natural Science Foundation of Hubei Province of China [2013CFC026]; Key new product research and development of Hubei Province of China [2012BBA25002, 2012IHA015]; The Universities Outstanding Youth Science and Technology Innovation Team Project of Hubei Province of China [T201413]; International cooperation project in Su Zhou city [SH201214]; Youth Science Foundation of Jiangxi Province [20122BAB211022].
Author Contributions
Zhao Wu originated this work and prepared the manuscript. Zhao Wu, Naixue Xiong and Qiong Gu contributed to the theory studies. Zhao Wu and Yannong Huang designed the experiments. Naixue Xiong helped improve the quality of this work.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. Int. J. Grid Comput. Escience 2013, 29, 1645–1660. [Google Scholar]
- Bellavista, P.; Cardone, G.; Corradi, A.; Foschini, L. The Future Internet convergence of IMS and ubiquitous smart environments: An IMS-based solution for energy efficiency. J. Netw. Comput. Appl. 2012, 35, 1203–1209. [Google Scholar]
- Gaynor, M.; Moulton, S.L.; Welsh, M.; LaCombe, E.; Rowan, A.; Wynne, J. Integrating wireless sensor networks with the grid. IEEE Internet Comput. 2004, 8, 32–39. [Google Scholar]
- Moritz, G.; Golatowski, F.; Lerche, C.; Timmermann, D. Beyond 6LoWPAN: Web Services in Wireless Sensor Networks. IEEE Trans. Ind. Inf. 2013, 9, 1795–1805. [Google Scholar]
- Kyusakov, R.; Eliasson, J.; Delsing, J.; van Deventer, J.; Gustafsson, J. Integration of Wireless Sensor and Actuator Nodes with IT Infrastructure Using Service-Oriented Architecture. IEEE Trans. Ind. Inf. 2013, 9, 43–51. [Google Scholar]
- Tong, E.D.; Niu, W.J.; Li, G.; Tang, D.; Chang, L.; Shi, Z.Z.; Ci, S. Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks. J. Netw. Comput. Appl. 2014, 39, 38–51. [Google Scholar]
- Martinez, J.F.; Familiar, M.S.; Corredor, I.; Garcia, A.B.; Bravo, S.; Lopez, L. Composition and deployment of e-Health services over Wireless Sensor Networks. Math. Comput. Model. 2011, 53, 485–503. [Google Scholar]
- Kifayat, K.; Merabti, M.; Shi, Q.; Abbas, S. Component-based security system (COMSEC) with QoS for wireless sensor networks. Secur. Commun. Netw. 2013, 6, 461–472. [Google Scholar]
- Seo, H.; Shim, K.A.; Kim, H. Performance enhancement of TinyECC based on multiplication optimizations. Secur. Commun. Netw. 2013, 6, 151–160. [Google Scholar]
- Torres, C.; Glosekotter, P. Reliable and energy optimized WSN design for a train application. J. Syst. Arch. 2011, 57, 896–904. [Google Scholar]
- Roy, S.; Conti, M.; Setia, S.; Jajodia, S. Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact. IEEE Trans. Inf. Forensics Secur. 2014, 9, 681–694. [Google Scholar]
- He, D.J.; Chen, C.; Chan, S.; Bu, J.J.; Yang, L.T. Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks. IEEE Trans. Ind. Electron. 2013, 60, 5348–5354. [Google Scholar]
- Lim, Y.; Park, J. Sensor Resource Sharing Approaches in Sensor-Cloud Infrastructure. Int. J. Distrib. Sens. Netw. 2014, 476090:1–476090:8. [Google Scholar]
- Cheng, X.L.; Deng, Z.D. Constructing a Large Scale Wireless Sensors Network and Resources Scheduling Among Multiple Personal Area Networks. Int. J. Distrib. Sens. Netw. 2009, 5, 76. [Google Scholar]
- Yang, J.; Zhang, H.S.; Ling, Y.; Pan, C.; Sun, W. Task Allocation for Wireless Sensor Network Using Modified Binary Particle Swarm Optimization. IEEE Sens. J. 2014, 14, 882–892. [Google Scholar]
- Li, W.; Delicato, F.C.; Pires, P.F.; Lee, Y.C.; Zomaya, A.Y.; Miceli, C.; Pirmez, L. Efficient allocation of resources in multiple heterogeneous Wireless Sensor Networks. J. Parallel Distrib. Comput. 2014, 74, 1775–1788. [Google Scholar]
- Semnani, S.H.; Basir, O.A. Target to sensor allocation: A hierarchical dynamic Distributed Constraint Optimization approach. Comput. Commun. 2013, 36, 1024–1038. [Google Scholar]
- Liu, Y.; Seet, B.C.; Al-Anbuky, A. In-Network Storage for Virtual Broker-based Publish/Subscribe in WSNs. Proceedings of the 2012 IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications (Pimrc), Sydney, Australia, 9–12 September 2012; pp. 2553–2558.
- Russello, G.; Mostarda, L.; Dulay, N. A policy-based publish/subscribe middleware for sense-and-react applications. J. Syst. Softw. 2011, 8, 638–654. [Google Scholar]
- Pilloni, V.; Navaratnam, P.; Vural, S.; Atzori, L.; Tafazolli, R. TAN: A Distributed Algorithm for Dynamic Task Assignment in WSNs. IEEE Sens. J. 2014, 14, 1266–1279. [Google Scholar]
- Dai, L.; Chang, Y.; Shen, Z. An Optimal Task Scheduling Algorithm in Wireless Sensor Networks. Int. J. Comput. Commun. Control 2011, 6, 101–112. [Google Scholar]
- Tomur, E.; Erten, Y.M. Security and service quality analysis for cluster-based wireless sensor networks. Proceedings of the 5th International Conference on Wired/Wireless Internet Communications, Coimbra, Portugal, 23–25 May 2007; 4517, pp. 103–114.
- Wu, F.; Pai, H.T.; Zhu, X.; Hsueh, P.Y.; Hu, Y.H. An adaptable and scalable group access control scheme for managing wireless sensor networks. Telemat. Inf. 2013, 30, 144–157. [Google Scholar]
- Aysal, T.C.; Barner, K.E. Sensor data cryptography in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2008, 3, 273–289. [Google Scholar]
- Zhou, J.; Geng, Y.S.; Wang, X.G. Research on the Key Technologies of Wireless Sensor Networks in Smart Power Grids. Proceedings of the International Conference on Mechatronics and Industrial Informatics (ICMII 2013), Guangzhou, China, 13–14 March 2013; pp. 1396–1399.
- Haji, R.; Hasbi, A.; Ghallali, M.; El Ouahidi, B. Towards an Adaptive QoS-Oriented and Secure Framework for Wireless Sensor Networks in Emergency Situations. Proceedings of the International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, Morocco, 10–12 May 2012; pp. 1007–1011.
- Alhazmi, O.; Malaiya, Y. Application of vulnerability discovery models to major operating systems. IEEE Trans. Reliab. 2008, 57, 14–22. [Google Scholar]
- Alhazmi, O.; Malaiya, Y. Quantitative vulnerability assessment of systems software. Proceedings of the Annual Reliability and Maintainability Symposium, Alexandria, WV, USA, 24–27 January 2005; pp. 615–620.
- Coit, D. Economic allocation of test times for subsystem-level reliability growth testing. IIE Trans 1998, 30, 1143–1151. [Google Scholar]
- Tai, A.; Meyer, J.; Avizienis, A. Performability enhancement of fault-tolerant software. IEEE Trans. Reliab. 1993, 42, 227–237. [Google Scholar]
- Meyer, J. On evaluating the performability of degradable computing systems. IEEE Trans. Comput. 1980, 29, 720–731. [Google Scholar]
- Murhland, J. Fundamental Concepts and Relations for Reliability Analysis of Multistate System: Reliability and Fault Tree Analysis. Theor. Appl. Asp. Syst. Reliab. SIAM 1975, 581–618.
- El-Neveihi, E.; Proschan, F.; Setharaman, J. Multistate coherent system. J. Appl. Probab. 1978, 15, 675–688. [Google Scholar]
- Lisnianski, A.; Levitin, G. Multi-State System Reliability: Assessment, Optimization and Applications; World Scientific: Singapore, 2003; pp. 15–48. [Google Scholar]
- Ushakov, I. Optimal standby problems and a universal generating function. Sov. J. Comput. Syst. Sci. 1987, 25, 79–82. [Google Scholar]
- Levitin, G.; Lisnianski, A.; Ben-Haim, H. Redundancy optimization for series-parallel multistate systems. IEEE Trans. Reliab. 1998, 47, 165–172. [Google Scholar]
- Goldberg, E.D. Genetic Algorithms in Search, Optimization and Machine Learning; Addison Wesley: Reading, MA, USA, 1989; pp. 285–294. [Google Scholar]
- Back, T. Evolutionary Algorithms in Theory and Practice. Evolution Strategies. Evolutionary Programming. In Genetic Algorithms; Oxford University Press: New York, NY, USA, 1996; pp. 25–38. [Google Scholar]
- Rubinovitz, J.; Levitin, G. Genetic algorithm for assembly line balancing. Int. J. Prod. Econ. 1995, 42, 343–354. [Google Scholar]
- Cheng, H.; Chen, Y.; Xiong, N.; Li, F. Layer-Based Data Aggregation and Performance Analysis in Wireless Sensor Networks. J. Appl. Math. 2013, 9, 502381:1–502381:12. [Google Scholar]
- Xiong, N.; Cao, M.; Vasilakos, A.V.; Yang, L.T.; Yang, F. An energy-efficient scheme in next-generation sensor networks. Int. J. Commun. Syst. 2010, 23, 1189–1200. [Google Scholar]
- Zhou, Y.; Zhang, Y.; Liu, H.; Xiong, N.; Vasilakos, A.V. A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization. IEEE Trans. Services Comput 2014, 7, 40–53. [Google Scholar]
- Cheng, H.; Guo, R.; Su, Z.; Xiong, N.; Guo, W. Service-Oriented Node Scheduling Schemes with Energy Efficiency in Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2014, 247173:1–247173:12. [Google Scholar]
# of SNs (channels) l | xl (megabytes s−1) | λl (s−1) | Security yl | sl (mega operations s−1) | πl (s−1) |
---|---|---|---|---|---|
1 | 10 | 0.0001 | 0.99 | 20 | 0.0001 |
2 | 4 | 0.0003 | 0.85 | 14 | 0.0002 |
3 | 6 | 0.0004 | 0.82 | 13 | 0.0010 |
4 | 2 | 0.0002 | 0.88 | 12 | 0.0003 |
5 | 1 | 0.0002 | 0.83 | 10 | 0.0002 |
6 | 5 | 0.0002 | 0.85 | 15 | 0.0001 |
7 | 4 | 0.0003 | 0.92 | 12 | 0.0001 |
8 | 9 | 0.0001 | 0.94 | 18 | 0.0002 |
9 | 5 | 0.0002 | 0.94 | 11 | 0.0003 |
10 | 2 | 0.0002 | 0.90 | 11 | 0.0002 |
# of Sub-Services i | # of ASs j | cj (Mega Operations) | Ij (Megabytes) | Oj (Megabytes) | With Security Requirement |
---|---|---|---|---|---|
1 | 1 | 100 | 5 | 12 | FALSE |
1 | 2 | 1500 | 12 | 7 | FALSE |
2 | 3 | 200 | 7 | 3 | TRUE |
2 | 4 | 500 | 3 | 8 | TRUE |
3 | 5 | 1200 | 8 | 10 | TRUE |
3 | 6 | 300 | 10 | 7 | TRUE |
© 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license ( http://creativecommons.org/licenses/by/3.0/).
Share and Cite
Wu, Z.; Xiong, N.; Huang, Y.; Gu, Q. Optimal Service Distribution in WSN Service System Subject to Data Security Constraints. Sensors 2014, 14, 14180-14209. https://doi.org/10.3390/s140814180
Wu Z, Xiong N, Huang Y, Gu Q. Optimal Service Distribution in WSN Service System Subject to Data Security Constraints. Sensors. 2014; 14(8):14180-14209. https://doi.org/10.3390/s140814180
Chicago/Turabian StyleWu, Zhao, Naixue Xiong, Yannong Huang, and Qiong Gu. 2014. "Optimal Service Distribution in WSN Service System Subject to Data Security Constraints" Sensors 14, no. 8: 14180-14209. https://doi.org/10.3390/s140814180