Trust-Aware Virtual Network Embedding in Wireless Sensor Networks

被引:3
|
作者
Rezaeimoghaddam, Parinaz [1 ]
Al-Anbagi, Irfan [1 ]
机构
[1] Univ Regina, Fac Engn & Appl Sci, Regina, SK S4S 0A2, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Wireless sensor networks; Security; Substrates; Interference; Sensors; Quality of service; Virtualization; Network virtualization (NV); quality of information (QoI); quality of service (QoS); resource allocation; resource management; trust awareness; virtual network embedding (VNE); wireless sensor networks (WSNs); QUALITY;
D O I
10.1109/JSEN.2023.3240386
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network virtualization in wireless sensor networks (WSNs) enables the utilization of their shared sensing capabilities. Efficient assignment of WSN resources to maximize the infrastructure provider's revenue can be achieved by virtual network embedding (VNE) while considering quality of information (QoI) (as the accuracy of sensing), quality of service (QoS) (as the reliability), and wireless interference handling constraints. Improving the acceptance ratio of VNE is essential because the more the virtual networks can be mapped onto the substrate network, the more revenue they will generate for the infrastructure provider. However, the shared and complex nature of VNE exposes the WSNs to security risks. This article develops a novel offline trust-aware virtual WSN (TA-VWSN) algorithm to maximize the virtual networks acceptance rate while minimizing the cost. This algorithm improves the QoI, QoS, and security by adding required trust level constraints to virtual nodes and links and trust level constraints to the substrate counterparts. Our algorithm embeds virtual nodes and links on substrate nodes and links with the required trust levels. The additional constraints increase the complexity of computation required to achieve an optimal solution. However, our TA-VWSN algorithm achieves a high-quality suboptimal solution in a short duration, enabling us to investigate the tradeoff between solution quality and search time. Our algorithm is also evaluated in large-scale network scenarios to verify all enforced limitations by the WSN substrate. While adding security constraints limits the acceptance ratio, the simulation results demonstrate its superiority in terms of average network throughput, measurement error efficiency, and processing time when the trust attributes are assigned, making the VNE algorithm more practical.
引用
收藏
页码:6326 / 6337
页数:12
相关论文
共 50 条
  • [41] Survivability-Enhanced Virtual Network Embedding Strategy in Virtualized Wireless Sensor Networks
    Wu, Dapeng
    Liu, Zhenli
    Yang, Zhigang
    Zhang, Puning
    Wang, Ruyan
    Ma, Xinqiang
    SENSORS, 2021, 21 (01) : 1 - 19
  • [42] A Novel Trust-Aware and Energy-Aware Clustering Method That Uses Stochastic Fractal Search in IoT-Enabled Wireless Sensor Networks
    Hriez, Safaa
    Almajali, Sufyan
    Elgala, Hany
    Ayyash, Moussa
    Salameh, Haythem Bany
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 2693 - 2704
  • [43] Virtual access network embedding in wireless mesh networks
    Lv, Pin
    Wang, Xudong
    Xu, Ming
    AD HOC NETWORKS, 2012, 10 (07) : 1362 - 1378
  • [44] Trust-Aware Privacy Evaluation in Online Social Networks
    Zeng, Yongbo
    Sun, Yan
    Xing, Liudong
    Vokkarane, Vinod
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 932 - 938
  • [45] Trust-aware media recommendation in heterogeneous social networks
    Jian Wu
    Liang Chen
    Qi Yu
    Panpan Han
    Zhaohui Wu
    World Wide Web, 2015, 18 : 139 - 157
  • [46] iTARS: trust-aware recommender system using implicit trust networks
    Yuan, W.
    Shu, L.
    Chao, H. -C.
    Guan, D.
    Lee, Y. -K.
    Lee, S.
    IET COMMUNICATIONS, 2010, 4 (14) : 1709 - 1721
  • [47] AWARE: Activity AWARE Network Clustering for Wireless Sensor Networks
    Urteaga, Inigo
    Yu, Na
    Hubbell, Nicholas
    Han, Qi
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 589 - 596
  • [48] Trust Aware Directed Diffusion Scheme for Wireless Sensor Networks
    Kundu, Kaustav
    Chowdhury, Chandreyee
    Neogy, Sarmistha
    Chattopadhyay, Samiran
    2014 FOURTH INTERNATIONAL CONFERENCE OF EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2014, : 385 - 391
  • [49] CATM : Congestion aware trust model for wireless sensor networks
    Yadava, Rajit Ram
    Ranvijay
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (05): : 1475 - 1485
  • [50] Trust-aware media recommendation in heterogeneous social networks
    Wu, Jian
    Chen, Liang
    Yu, Qi
    Han, Panpan
    Wu, Zhaohui
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2015, 18 (01): : 139 - 157