Trust-Aware Virtual Network Embedding in Wireless Sensor Networks

被引:3
|
作者
Rezaeimoghaddam, Parinaz [1 ]
Al-Anbagi, Irfan [1 ]
机构
[1] Univ Regina, Fac Engn & Appl Sci, Regina, SK S4S 0A2, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Wireless sensor networks; Security; Substrates; Interference; Sensors; Quality of service; Virtualization; Network virtualization (NV); quality of information (QoI); quality of service (QoS); resource allocation; resource management; trust awareness; virtual network embedding (VNE); wireless sensor networks (WSNs); QUALITY;
D O I
10.1109/JSEN.2023.3240386
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network virtualization in wireless sensor networks (WSNs) enables the utilization of their shared sensing capabilities. Efficient assignment of WSN resources to maximize the infrastructure provider's revenue can be achieved by virtual network embedding (VNE) while considering quality of information (QoI) (as the accuracy of sensing), quality of service (QoS) (as the reliability), and wireless interference handling constraints. Improving the acceptance ratio of VNE is essential because the more the virtual networks can be mapped onto the substrate network, the more revenue they will generate for the infrastructure provider. However, the shared and complex nature of VNE exposes the WSNs to security risks. This article develops a novel offline trust-aware virtual WSN (TA-VWSN) algorithm to maximize the virtual networks acceptance rate while minimizing the cost. This algorithm improves the QoI, QoS, and security by adding required trust level constraints to virtual nodes and links and trust level constraints to the substrate counterparts. Our algorithm embeds virtual nodes and links on substrate nodes and links with the required trust levels. The additional constraints increase the complexity of computation required to achieve an optimal solution. However, our TA-VWSN algorithm achieves a high-quality suboptimal solution in a short duration, enabling us to investigate the tradeoff between solution quality and search time. Our algorithm is also evaluated in large-scale network scenarios to verify all enforced limitations by the WSN substrate. While adding security constraints limits the acceptance ratio, the simulation results demonstrate its superiority in terms of average network throughput, measurement error efficiency, and processing time when the trust attributes are assigned, making the VNE algorithm more practical.
引用
收藏
页码:6326 / 6337
页数:12
相关论文
共 50 条
  • [31] Trust aware systems in Wireless Sensor Networks
    Rani
    JayaKumar
    Divya
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 174 - 179
  • [32] Cost-Efficient and Trust-Aware Virtual Network Embedding for Dense Industrial IoT Systems Using Multiagent Systems
    Rezaeimoghaddam, Parinaz
    Al-Anbagi, Irfan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (01): : 1100 - 1114
  • [33] Trust-Aware Clustering Approach Using Type-2 Fuzzy Logic for Mobile Wireless Sensor Networks
    Kousar, Asra
    Mittal, Nitin
    Singh, Prabhjot
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2019, PT II, 2019, 1076 : 300 - 310
  • [34] Variable-Length Multiobjective Social Class Optimization for Trust-Aware Data Gathering in Wireless Sensor Networks
    Saad, Mohammed Ayad
    Jaafar, Rosmina
    Chellappan, Kalaivani
    SENSORS, 2023, 23 (12)
  • [35] Application-driven Virtual Network Embedding for Industrial Wireless Sensor Networks
    Li, Mingyan
    Hua, Cunqing
    Chen, Cailian
    Guan, Xinping
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [36] Virtual Network Embedding in Wireless Multihop Networks
    Yun, Donggyu
    Yi, Yung
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET TECHNOLOGIES (CFI11), 2011,
  • [37] Trust-Aware Distributed and Adaptive Energy Efficient Secure Routing in Sensor Networks
    Bhasin, Vandana
    Kumar, Sushil
    Saxena, P. C.
    Katti, C. P.
    AD HOC & SENSOR WIRELESS NETWORKS, 2021, 50 (1-4) : 73 - 115
  • [38] Trust-Aware Monitoring Scheme for WiMAX Networks
    Safa, Haidar
    Abu Shahla, Farah
    PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 88 - 95
  • [39] TruGRC: Trust-Aware Group Recommendation with Virtual Coordinators
    Wang, Ximeng
    Liu, Yun
    Lu, Jie
    Xiong, Fei
    Zhang, Guangquan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 94 : 224 - 236
  • [40] Trust-aware Information Dissemination in Social Network
    Zhang, Bo
    Xiang, Yang
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 2400 - 2404