Layered Fault Management Scheme for End-to-end Transmission in Internet of Things

被引:0
|
作者
Li Xi [1 ]
Ji Hong [1 ]
Li Yi [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Key Lab Universal Wireless Commun, Minist Educ, Beijing 100088, Peoples R China
关键词
internet of things; fault management; fuzzy cognitive maps;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of things (IoT) network makes the interaction between people and things more active and provides the connection among different existing networks. To ensure the reliability of end-to-end transmission through the hierarchical networks, fault management is of great importance. Current relative fault detection algorithms are designed for specified network, not suited to this complex communication environment. In this paper, we propose a layered fault management scheme for IoT with uniform observing points setting around. In order to distinguish between the real fault and false alarm, fuzzy cognitive maps theory is introduced to set up the monitoring model. By adjusting the weighting rules in the model, different observing points may realize flexible judgment of the link failure risk in their authorities. After locating the fault roots, original recovery method for individual networks may be used to rescue the broken transmission. The distributed working mode makes the proposed scheme more efficient and strong. This design may both realize quick fault discovery and use the existing implementation to the maximum extent. Simulation results show the effectiveness of the proposed scheme.
引用
收藏
页码:1021 / 1025
页数:5
相关论文
共 50 条
  • [21] Standards-based End-to-End IP Security for the Internet of Things
    Hummen, Rene
    Wehrle, Klaus
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [22] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [23] Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things
    Coroller, Stevan
    Chabridon, Sophie
    Laurent, Maryline
    Conan, Denis
    Leneutre, Jean
    PROCEEDINGS OF THE 2018 WORKSHOP ON MIDDLEWARE AND APPLICATIONS FOR THE INTERNET OF THINGS (M4IOT '18), 2018, : 35 - 40
  • [24] End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
    Gao, Yansong
    Kim, Minki
    Abuadbba, Sharif
    Kim, Yeonjae
    Thapa, Chandra
    Kim, Kyuyeon
    Camtep, Seyit A.
    Kim, Hyoungshick
    Nepal, Surya
    2020 INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2020), 2020, : 91 - 100
  • [25] An End-to-End Bidirectional Authentication System for Pallet Pooling Management Through Blockchain Internet of Things (BIoT)
    Long, Wen
    Wu, C. H.
    Tsang, Y. P.
    Chen, Qiyang
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2021, 33 (06) : 1 - 24
  • [26] Cooperation and end-to-end in the Internet
    Kantola, Raimo
    Kabir, Hammad
    Loiseau, Patrick
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (12)
  • [27] Proxy-based End-to-End Key Establishment Protocol for the Internet of Things
    Porambage, Pawani
    Braeken, An
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2677 - 2682
  • [28] End-to-End Sample Tracking in the Laboratory Using a Custom Internet of Things Device
    Neil, William
    Zipp, Greg
    Nemeth, Gregory
    Russo, Mark F.
    Nirschl, David S.
    SLAS TECHNOLOGY, 2018, 23 (05): : 412 - 422
  • [29] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) : 603 - 604
  • [30] Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things
    Sahraoui, Somia
    Bilami, Azeddine
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, MISC 2016, 2016, : 249 - 260