Trust-Aware Virtual Network Embedding in Wireless Sensor Networks

被引:3
作者
Rezaeimoghaddam, Parinaz [1 ]
Al-Anbagi, Irfan [1 ]
机构
[1] Univ Regina, Fac Engn & Appl Sci, Regina, SK S4S 0A2, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Wireless sensor networks; Security; Substrates; Interference; Sensors; Quality of service; Virtualization; Network virtualization (NV); quality of information (QoI); quality of service (QoS); resource allocation; resource management; trust awareness; virtual network embedding (VNE); wireless sensor networks (WSNs); QUALITY;
D O I
10.1109/JSEN.2023.3240386
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network virtualization in wireless sensor networks (WSNs) enables the utilization of their shared sensing capabilities. Efficient assignment of WSN resources to maximize the infrastructure provider's revenue can be achieved by virtual network embedding (VNE) while considering quality of information (QoI) (as the accuracy of sensing), quality of service (QoS) (as the reliability), and wireless interference handling constraints. Improving the acceptance ratio of VNE is essential because the more the virtual networks can be mapped onto the substrate network, the more revenue they will generate for the infrastructure provider. However, the shared and complex nature of VNE exposes the WSNs to security risks. This article develops a novel offline trust-aware virtual WSN (TA-VWSN) algorithm to maximize the virtual networks acceptance rate while minimizing the cost. This algorithm improves the QoI, QoS, and security by adding required trust level constraints to virtual nodes and links and trust level constraints to the substrate counterparts. Our algorithm embeds virtual nodes and links on substrate nodes and links with the required trust levels. The additional constraints increase the complexity of computation required to achieve an optimal solution. However, our TA-VWSN algorithm achieves a high-quality suboptimal solution in a short duration, enabling us to investigate the tradeoff between solution quality and search time. Our algorithm is also evaluated in large-scale network scenarios to verify all enforced limitations by the WSN substrate. While adding security constraints limits the acceptance ratio, the simulation results demonstrate its superiority in terms of average network throughput, measurement error efficiency, and processing time when the trust attributes are assigned, making the VNE algorithm more practical.
引用
收藏
页码:6326 / 6337
页数:12
相关论文
共 50 条
  • [21] Trust-Aware Privacy Evaluation in Online Social Networks
    Zeng, Yongbo
    Sun, Yan
    Xing, Liudong
    Vokkarane, Vinod
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 932 - 938
  • [22] Multiobjective, trust-aware, artificial hummingbird algorithm-based secure clustering and routing with mobile sink for wireless sensor networks
    Naik, Anil Kumar Jemla
    Parameswarappa, Manjunatha
    Ramachandra, Mohan Naik
    ETRI JOURNAL, 2024, 46 (06) : 950 - 964
  • [23] Trust-Aware Distributed and Adaptive Energy Efficient Secure Routing in Sensor Networks
    Bhasin, Vandana
    Kumar, Sushil
    Saxena, P. C.
    Katti, C. P.
    AD HOC & SENSOR WIRELESS NETWORKS, 2021, 50 (1-4) : 73 - 115
  • [24] Enhanced Metaheuristics with Trust Aware Route Selection for Wireless Sensor Networks
    Devaraj A.F.S.
    Murthy T.S.
    Alenezi F.
    Lydia E.L.
    Zawawi M.A.Md.
    Ishak M.K.
    Computer Systems Science and Engineering, 2023, 46 (02): : 1431 - 1445
  • [25] Trust and Location-Aware Routing Protocol for Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    IETE JOURNAL OF RESEARCH, 2016, 62 (05) : 634 - 644
  • [26] QoS Aware Trust Metric based Framework for Wireless Sensor Networks
    Prabha, R.
    Krishnaveni, M.
    Manjula, S. H.
    Venugopal, K. R.
    Patnaik, L. M.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 373 - 380
  • [27] Trust Aware Directed Diffusion Scheme for Wireless Sensor Networks
    Kundu, Kaustav
    Chowdhury, Chandreyee
    Neogy, Sarmistha
    Chattopadhyay, Samiran
    2014 FOURTH INTERNATIONAL CONFERENCE OF EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2014, : 385 - 391
  • [28] CATM : Congestion aware trust model for wireless sensor networks
    Yadava, Rajit Ram
    Ranvijay
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (05) : 1475 - 1485
  • [29] Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network
    K. Dinesh
    S. V. N. Santhosh Kumar
    International Journal of Information Security, 2024, 23 : 199 - 223
  • [30] Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network
    Dinesh, K.
    Santhosh Kumar, S. V. N.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (01) : 199 - 223