Você está na página 1de 10

IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO.

2, APRIL 2018 571

Virtualization in Wireless Sensor Networks: Fault


Tolerant Embedding for Internet of Things
Omprakash Kaiwartya, Member, IEEE, Abdul Hanan Abdullah, Member, IEEE, Yue Cao, Member, IEEE,
Jaime Lloret, Senior Member, IEEE, Sushil Kumar, Member, IEEE, Rajiv Ratn Shah, Member, IEEE,
Mukesh Prasad, Member, IEEE, and Shiv Prakash

Abstract—Recently, virtualization in wireless sensor


networks (WSNs) has witnessed significant attention due
to the growing service domain for Internet of Things (IoT).
Related literature on virtualization in WSNs explored resource
optimization without considering communication failure
in WSNs environments. The failure of a communication link in
WSNs impacts many virtual networks running IoT services. In
this context, this paper proposes a framework for optimizing
fault tolerance (FT) in virtualization in WSNs, focusing on
heterogeneous networks for service-oriented IoT applications.
An optimization problem is formulated considering FT and
communication delay as two conflicting objectives. An adapted
nondominated sorting-based genetic algorithm (A-NSGA)
is developed to solve the optimization problem. The major
components of A-NSGA include chromosome representation,
FT and delay computation, crossover and mutation, and
nondominance-based sorting. Analytical and simulation-based
comparative performance evaluation has been carried out.
From the analysis of results, it is evident that the framework
effectively optimizes FT for virtualization in WSNs.
Index Terms—Internet of Things (IoT), virtualization, wireless
sensor networks (WSNs).

Fig. 1. Heterogeneous networks in IoT.


I. I NTRODUCTION
ETWORK virtualization has got significant attention as
N an enabling technology for service-oriented heteroge-
neous network for Internet of Things (IoT) [1]. The rigid
issues in IoT. Network virtualization enables Internet to retain
its communication architecture while enlarging and trans-
communication architecture of Internet is one of challenging forming as IoT. In IoT enabled smart cities, service-oriented
communication architecture is required for smart applications
Manuscript received December 31, 2016; revised May 14, 2017; accepted (see Fig. 1). It can be addressed by implementing network as
June 4, 2017. Date of publication June 20, 2017; date of current version
April 10, 2018. This work was supported by the Ministry of Higher Education a service through virtualization [2]. Sensing as a service can
Malaysia in Collaboration with Research Management Centre, Universiti be implemented in collaboration with network as a service,
Teknologi Malaysia under Grant Q.J130000.2528.14H81. (Corresponding to support heterogeneous networking and sensing resource
author: Yue Cao.)
O. Kaiwartya and A. H. Abdullah are with the Faculty of Computing, optimization for smart applications in IoT.
Universiti Teknologi Malaysia, Johor Bahru 81310, Malaysia (e-mail: Network virtualization is implemented using virtual network
omprakash@utm.my; hanan@utm). embedding (VNE) algorithms [3]. Due to the inception and
Y. Cao is with the Department of Computer and Information Sciences,
Northumbria University, Newcastle upon Tyne NE2 1XE, U.K. (e-mail: evolution of VNE, the role of Internet service provider has
yue.cao@northumbria.ac.uk). been divided into two parts namely, infrastructure provider
J. Lloret is with the Department of Communication, Polytechnic University and service provider. Infrastructure provider is responsible
of Valencia, 46022 Valencia, Spain (e-mail: jlloret@dcom.upv.es).
S. Kumar is with the School of Computer and Systems Sciences, for deployment and maintenance of physical infrastructure,
Jawaharlal Nehru University, New Delhi 110067, India (e-mail: whereas, service provider is responsible for range of cus-
skdohare@mail.jnu.ac.in). tomizable services to end user. Various VNE techniques have
R. R. Shah is with the School of Information Systems, Singapore
Management University, Singapore 188065 (e-mail: rajivshah@smu.edu.sg). been suggested focusing on wired-networks [4]. The two
M. Prasad is with the School of Software, University of Technology Sydney, key issues in VNE include resource optimization [5], and
Ultimo, NSW 2007, Australia (e-mail: mukesh.prasad@uts.edu.au). survivability [6].
S. Prakash is with the Indian Institute of Information Technology Kottayam,
Kottayam 686635, India (e-mail: shivprakash16@gmail.com). Due to the recent developments in IoT technology, network
Digital Object Identifier 10.1109/JIOT.2017.2717704 virtualization in wireless sensor networks (WSNs) has been
2327-4662 c 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
572 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

envisioned [7]. Some of the initial works on the virtualization Specifically, SVNE is mathematically formulated and solved
focuses on service-oriented network architecture to optimize using two heuristic considerations including hybrid policy
sensing resources. An four-layered architecture for virtual- heuristic and baseline policy heuristic. The preserved quota for
ization in WSNs has been suggested, based on reducing backup on each link has been utilized for restoration and
redundant deployment of sensor networks for different IoT protection. Although link restoration and protection-based
applications [8]. Another five-layered virtualization architec- survivability measure is quite effective in business perspec-
ture has been explored to support network diversity and tive. The management of restoration information for each
increase resource utilization in IoT [2]. Brain-inspired adap- link reduces the applicability of the approach in realistic
tive architecture has been presented for embedding and network scenario specifically in case of wireless environments.
running IoT applications on virtual WSNs [9]. The aforemen- Moreover, FT capability of links and CD are not considered in
tioned architectures did not consider communication failure the survivability measurement. SVNE has been enhanced by
on virtual networks, caused by the communication failure on addressing node failure along with link failure using dynamic
physical WSNs. The fault tolerance (FT) (reactive capability recovery technique [11]. An algorithm has been developed to
of handling communication failure in physical networks) is discover alternative path end points of the failed link as source
a pressing issue in virtualization in wired networks [10]. The and destination. Node failure has been addressed by discov-
FT in WSNs environments is more challenging as compared ering a set of alternative paths for each link of the node.
to its wired counterparts, due to the dynamic wireless channel Although back up resources have not been utilized in dynamic
based connectivity. Bandwidth reservation-based FT enhance- recovery yet, it manages backup information for recovering
ment decreases resource utilization [11]. Moreover, estimation each link. It did not explore all the alternative paths to select
of guaranteed connectivity, which is utilized to enhance FT in best available alternative path rather finds the first alternative
VNE for wired-networks [12], is quite challenging in WSNs. path satisfying the requirement.
In this context, this paper proposes a framework to maxi- Another SVNE technique has been suggested based on
mize FT and minimize communication delay (CD) for VNE in optimal resource allocation for both working and backup
WSNs environments focusing on IoT services. It is a reactive resources [14]. The problem of single node failure in the
optimization of FT and CD for service-oriented heterogeneous network has been viewed as NP complete multicommodity
virtual networks in IoT. Specifically, the major components of network flow problem. Integer linear programing model-based
the framework are listed below as contributions to literature. solution has been suggested to utilize available and backup
1) The FT optimization problem is mathematically formu- resources optimally. Auxiliary protection graph is constructed
lated considering FT and CD as the two conflicting to facilitate single node survivability. Heuristic-based algo-
objectives in WSNs environments. rithm is developed for embedding auxiliary protection graph
2) An adapted nondominated sorting-based genetic algo- to physical network. Although heuristic-based mapping effec-
rithm (A-NSGA) is developed to solve the optimization tively addresses single node failure. The consideration of
problem. backup resources, and possibility of multiple nodes and links
3) The solution framework is consisted of chromosome rep- failure are the undesirable aspects of this embedding tech-
resentation, FT and delay computation, crossover and nique. SVNE has been enhanced considering failure depen-
mutation, and nondominance-based sorting. dent protection and transformed virtual network request [10].
4) Simulations are performed to analyze the performance of A backup node has been considered corresponding to each
A-NSGA in optimizing FT for virtualization in WSNs. node. Enhanced virtual network has been designed from the
The rest of this paper is organized as follows. Section II initial virtual network request using complete connected graph,
reviews related literature on FT in VNE considering three for minimizing the requirement of resources to survive in
categorizations including survivability, topological knowledge case of failure. Binary quadratic programing and mixed inte-
for trust, and reliability using single objective optimization. ger linear programing have been utilized to formulate failure
Section III presents the detail of mathematical formulation dependent protection and transform virtual network, respec-
of the multiobjective optimization problem, and A-NSGA for tively. Heuristic-based algorithms have been developed for
solving the problem. Section IV discusses simulation setting, solving the embedding problem. The undesirable aspect of
metrics, and comparative performance evaluation, followed by failure dependent protection is the management of backup
the conclusion made in Section V. resources.

II. R ELATED W ORK


B. Topological Knowledge-Based Survivability
In this section, related literature on FT in VNE is reviewed.
Topology aware VNE has been suggested to improve uti-
It is divided into three categories including resource reserva-
lization of resources, and thus, maximize revenues due to
tion, topological knowledge, and single objective optimization-
the better utilization [15]. Six topological characteristics have
based survivability. Next, virtualization in WSNs is critically
been suggested to rank both node and link during map-
explored as the contribution area.
ping. The characteristics include degree, strength, closeness,
between-ness, eigen vector, and Katz centralities. Heuristic
A. Resource Reservation-Based Survivability embedding algorithms have been developed by utilizing these
A proactive survival VNE (SVNE) technique has been sug- topological characteristics apart from resource requirements.
gested for single link failure using bandwidth reservation [13]. The topological characteristics have been devised focusing
KAIWARTYA et al.: VIRTUALIZATION IN WSNs: FAULT TOLERANT EMBEDDING FOR IoT 573

on better utilization of resources without considering the FT on the two key issues in IoT environments, including the
capability. Topology aware embedding has been improved con- lack of end-to-end connectivity among sensors in gateway-
sidering convergence degree to avoid embedding of virtual based communication, and access control and authentication
link on longer physical path [12]. The degree of virtual nodes in direct communication without using gateways. Some use
has been considered as convergence degree. Maximum conver- cases have conceptualized the virtual networking in IoT. An
gence degree-based embedding algorithm has been developed architecture has been suggested for virtualization of WSNs,
to ensure shorter physical paths for virtual links. Although to reduce redundant deployment of sensor networks for dif-
survivability improves due to the shorter path consideration ferent IoT applications [8]. The architecture includes four
yet, no direct contribution on FT. Geographical location of layers considering: 1) physical; 2) virtual sensor; 3) vir-
physical resources has been utilized in VNE to enhance surviv- tual sensor access; and 4) application. Two communication
ability with lower operational cost [16]. Location constrained paths including data and control, and five interfaces have
SVNE problem has been vied as multicommodity network been also considered in the architecture. Another network
flow problem. The problem has been addressed using inte- virtualization architecture for IoT has been suggested to sup-
ger linear programing model for small size network, whereas, port network diversity and increase resource utilization [2].
heuristic-based algorithm has been utilized for larger size A five-layered architecture namely, smart service system has
network. The impact of location information is negligible been developed for implementing network virtualization in
in case of smaller network due to the high speed of phys- IoT. A four-phase service delivery model for IoT has been
ical links. The topological knowledge significantly increases designed considering registration, discovery, description, and
revenue gain, and indirectly enhances survivability. The unde- execution of services. The virtual network resource man-
sirable aspects of topology-based survivability are the direct agement model for IoT environments has been presented
impact of topology change on virtual networks. It could force to handle service delivery with optimal resource utiliza-
re-embedding for revenue gain. tion. Brain-inspired adaptive architecture has been presented
for embedding and running IoT applications on virtual-
C. Single-Objective Optimization-Based Survivability ized WSNs [9]. Specifically, hierarchical modular structure
of brain has been utilized for constructing different level of
FT in VNE with redundant resource has been modeled as an
virtualization.
integer linear programming problem [17]. A single-objective
Most of the proposal on virtualization in WSNs focuses
optimization technique namely, discrete particle swarm opti-
on enhancing resource (i.e., sensor) utilization, by executing
mization (PSO) has been utilized to solve the embedding
application-centric multiple tasks in sensors and abstracting
problem. The consideration of redundant resource as backup
sensors based on application (i.e., virtual sensors). This is
reduces resource utilization of the PSO-based survivability
evident from recent surveys focusing on critical investiga-
enhancements. Another single-objective optimization tech-
tion of node and network level virtualization in WSNs for
nique namely, ant colony optimization (ACO) has been utilized
IoT [20], [21] and applications [22]–[25]. Different levels of
to improve survivability of VNE, by guarantying complete-
abstraction have been considered for the same purpose includ-
ness of virtual network despite a node failure [18]. The
ing four layers [8], five layers [2], and hierarchical layers [9].
survival embedding problem has been modeled as integer
Complementary to these proposal, we focus on FT aspect in
linear programming problem. To solve the problem, first,
virtualization in WSNs, which can be utilized to aid the afore-
primary-cut set of has been identified from the subnetwork
mentioned resource-centric proposals. Specifically, we utilize
of the virtual network obtained after the removal of failed
multiobjective optimization to maximize FT and minimize CD
node. Second, ACO has been utilized to find optimal embed-
parallelly.
ding of virtual network. The performance of some well-known
single-objective optimization techniques and their variants has
been investigated comparatively for VNE [19]. ACO-based
algorithms differ in the order of virtual node embedding III. FAULT T OLERANT V IRTUALIZATION
and computing pheromone trail, whereas, PSO-based algo-
In this section, the detail of fault tolerant aspect of vir-
rithms differ in calculating rank of nodes. Although number
tualization in WSNs is presented. A four-layered network
of network parameters are considered for procuring sur-
architecture is considered (see Fig. 2). The bottom most phys-
vival embedding yet, optimal values of the parameters not
ical layer is represented by the actual sensor nodes, i.e.,
obtained due to the usage of single-objective optimization
(s1 , s2 , s3 , s4 ), capable of performing different types of tasks.
techniques.
Task-based virtualization of sensors is performed in the sen-
sor virtualization layer, i.e., (s11 , s12 , . . . , s43 ), resulting in
D. Virtualization in WSNs for IoT: The Contribution Area more number of sensors than the number of actual phys-
Recently, virtualization in WSNs has witnessed significant ical sensors. Different wireless networks are generated at
attention due to the advancements in IoT technology. Although the access layer based on fault tolerant embedding of task
not much works has been done in the area yet, some potential oriented sensors. Each embedded network is considered as
initiatives have been made toward VNE for WSNs infras- access agent. The application layer represents smart appli-
tructure. Network virtualization for IoT has been introduced cations of IoT. The proposal is implemented in the access
focusing on resource constrained devices [7]. It has focused layer.
574 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

To find the total number of paths, expected distance of the


nearest neighbor node qualified for communication establish-
ment is computed. The expected distance of closest neighbor
sensor can be determined once the probability density function
(pdf) of the location of sensors is known. To determine pdf of
the location of sensors, the probability of a neighbor sensors
between the two distances r and (r + r) is derived, where
r is a distance within transmission radius and r represents
a small incremental distance.
It is assumed that sensors are distributed across a physical
WSN area NA with uniform density λ. Therefore, the proba-
bility of presence of a sensor in the area is 1, which can be
expressed as given by

1
λ dNA = 1 ⇒ λ = . (1)
Fig. 2. FT embedding at virtual sensor access layer. NA NA
TABLE I The probability Pcr|(r+r) of closest neighbor sensor at the
N OMENCLATURE
distance between r and (r + r) is the joint probability of
Psr|(r+r) presence of some neighbor sensor at this distance,
and probability P0<r of presence of no other sensor closer than
the distance r. The probability Pcr|(r+r) can be expressed as
given by

Pcr|(r+r) = P0<r · Psr|(r+r)


   
= 1 − Ps<r · Psr|(r+r) . (2)

Considering only half of the area in transmission range toward


destination dp with Nn sensor nodes in the network, it is
simplified as given by

Pcr|(r+r)
⎡ ⎤
Nn

2 j
2 Nn −j
N λπ r λπ r
= ⎣1 − ⎦
n
1−
j 2 2
j=1

Nn
 r+r
 r+r
⎣ Nn 2λπ r · dr j
× dr ·
j r 2 r
j=1



2λπ r · dr Nn −j ⎦
× 1− dr
2
 N    Nn 
2 n
= 1 − λπ r 1 − 1 − λπ rdr + dr 2

 N  
  
2 n Nn
= 1 − λπ r 1− 1− · λπ rdr + dr2
1

  2 
Nn
+ · λπ rdr + dr2 ...
2
 Nn 
A. Optimization Problem = 1 − λπ r2 Nn λπ rdr + Nn λπ dr2
Let there is a link failure between two virtual sensors sv
  2 
and dv due to the path failure embedded for the link. The Nn
− · λπ rdr + dr 2
. . . . (3)
path for the link in WSN is between the physical sensor 2
nodes sp and dp . All the available paths between sp and dp The PDF fr (r) of closest neighbor distance can be obtained
need to be explored to obtain an alternative path between these by considering limit in (3) as
nodes with maximum fault tolerant capacity. The knowledge of
expected number of paths with intermediate node is required Pcr|(r+r)  Nn
for exploring these paths. fr (r) = lim = Nn λπ r 1 − λπ r2 . (4)
dr→0 dr
KAIWARTYA et al.: VIRTUALIZATION IN WSNs: FAULT TOLERANT EMBEDDING FOR IoT 575

Considering R as transmission range of sensors in (4), the


expected closest neighbor distance E(r) can be expressed as
given by
 R Fig. 3. Genotype representation of chromosome.

E(r) = rfr (r)dr


0
 R  Nn B. Adapted NSGA
= Nn λπ r2 1 − λπ r2 dr An adapted NSGA is developed for solving the
0
   R  R  N +1 multiobjective optimization problem focusing on chro-
−r 1 − λπ r2 1 − λπ r2 n mosome representation, FT and delay computation, cross
= + dr
λπ(Nn + 1) 0 λπ(Nn + 1) over, and mutation operations, and sorting chromosomes
0
  i R
n +1

N using nondominance concept.


1 Nn + 1 −λπ r2 r 1) Chromosome Representation: An ordered set of inter-
= op
λπ (Nn + 1) i i+1 mediated nodes Si starting from source sp and ending with
i 0 p
√ N n +1
destination d nodes, represents a chromosome in the solu-
NA (−1) i
tion space of A-NSGA considering the optimization problem.
E(r) = . (5)
λπ 3/2 (Nn + 1) i+1 Each node of the set represents a gene of the chromosome
i
representation. An ith chromosome can be represented as (see
Now, the number of paths from sp to dp with k num-
Fig. 3)
ber of intermediate nodes is (Nin − 2)Ck , where k =
 FT,CD
{1, 2, 3, . . . , (D/E(r) − 1)}, total intermediate nodes Nin = CHi = sp 1, 2, . . . ,(D/E(r) − 2), (D/E(r) − 1), dp .
(D/E(r) − 1) and D represents distance between sp and dp .
(11)
The total number of paths N p from sp to dp can be expressed
as given by 2) Fault Tolerance and Communication Delay: The FT of
N = (Nin − 2)C1 + (Nin − 2)C2 + · · · + (Nin − 2)C(N −2)
p links are utilized to obtain cumulative FT of a path. The FT of
 in
 a link is derived considering packet error rate-based link qual-
= (Nin − 2)C0 + (Nin − 2)C + · · · + (Nin − 2)C(N −2) − 1 ity estimation, and neighbor density-based degree estimation.
1 in
It can be expressed as given by
= 2Nin − 1. (6)  
Using the number of paths in (6), the maximization function Nre
 t  
FTli,j = 1 − ei,j 1 − ei,j + di,j
l
(12)
for FT can be expressed as
 p t=0
Maximize FT = max p FTi (7) where Nre is the number of retransmission required for a suc-
i=1,2,...,N
p cessful transmission over the link, ei,j is the packet error rate
where, FTirepresents FT of ith path from sp to dp . The l is the degree estimation of the link. The
of the link and di,j
normalized FT of a path can be expressed as degree estimation can be derived as expressed by
1 j=d
i=(D/E(r)−1), p

p
= FTli,j ⎪ 1, die = dje = Nn − 1
FTi (8) ⎪

(D/E(r) − 1) ⎨1 − α i ,
d e
die = dje < Nn − 1
i=sp , j=1 l
di,j =  2 (13)
where, FTli,j is the FT of a link between an adjacent pair ⎪

die −dje
" "

⎩ e
d +d e " "
op
of nodes, and i, j ∈ Si = sp , 1, 2, . . . , (D/E(r) − 2), 1 − α i j , "die − dje " > 0
(D/E(r) − 1), d . The ordered set of nodes of ith path is
p
where die and dje are the degrees of nodes i and j, respectively,
op
represented by Si . Similarly, the minimization function for and α is a decision variable varies between 0 and 1.
CD can be expressed as The CD is computed considering interference for the link
 p
Minimize CD = min p CDi (9) determined by the link quality, and propagation and transmis-
i=1,2,...,N
sion delay. It can be expressed as given by
p
where, CDirepresents delay of ith path from sp to dp . The  
normalized CD of a path can be expressed as Nre
 t   di,j Spkt
CDi,j = 1 −
l
ei,j 1 − ei,j + + (14)
p  Sp St
p 1 j=d
i=(D/E(r)−1),
CDli,j t=0
CDi = (10)
(D/E(r) − 1) CDlmax where, di,j is the distance between the pair of nodes i and j,
i=sp , j=1
Sp represents propagation speed, Spkt is the packet size and St
where, CDli,j is the delay of a link between an adjacent pair of represents transmission speed.
op
nodes, and i, j ∈ Si . The maximum link delay among all the 3) Crossover and Mutation: The crossover operation is
links is represented by CDlmax . The constraints corresponding performed by selecting two chromosomes (also termed as
to the aforementioned optimization problem include parent solution in optimization theory) from the population
CDli,j (all paths between sp and dp ), and randomly exchanging
p p
0 < FTi ≤ 1, 0 < FTli ≤ 1, 0 < CDi ≤ 1, 0 < ≤ 1. a group of nodes between the chromosomes (see Fig. 4).
CDlmax The exchange is constrained to the reachability of the nodes
576 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

Algorithm 1 A-NSGA
path
Notations: lS,D : Link between sp and dp ; Fi :Fault tolerance of ith path
Dsi : Dominance set of ith solution; Si : ith solution of the population
np =This is the number of solutions that dominate p; Fj : jth front
Schild−pop : Size of child population; Ri : Rank of ith solution
g : Number of generations used for looping; Spop : Size of the old population
considered for execution; Cdist : Crowding distance
N gen : Number of generations; oldpop : Old population; childpop : Child
population;
path
Input: lS,D , Fi , Spop , N gen
Process:
1. Generate initial population of size Spop by random distribution
of decision variable in given range (low, high). Save one copy of
population as oldpop
2. for each Si ∈ oldpop
a. Calculate objective-1 normalized fault-tolerance using Eq. (8)
b. Calculate objective-2 normalized delay using Eq. (10)
endfor
g=1  
3. While g ≤ N gen
Non-dominated_sorting( oldpop ) // function for Non-Dominated sorting
4. for each Si ∈ oldpop
Calculate Dsi
Fig. 4. Crossover operation. endfor
j = 1,
5. For each Si ∈ oldpop
If (Dsi =?)
Fj = Fj ∪ Si
Ri = 1
Endif
Endfor
j=2
6. For each Si ∈ oldpop
If (Dsi =? && Ri == j − 1)
Fj = Fj ∪ Si
Ri = j
j=j+1
Fig. 5. Mutation operation. Endif
Endfor // end of function Non-dominated_sorting
Crowing_distance (oldpop ) // function for crowing distanc
from both downward and upward direction in the chromo- Assume Cdist from boundary point (group of solution) to ∞ for any
solution
some. The larger group size is considered in initial stage of 7. for each Si ∈ oldpop // The crowing distance Start
the solution (at lower generations) whereas, smaller group calculate Cdist from all point excluding boundary points
size is preferred in latter stages. Thus, size of the group for endfor // end of crowding distance function
crossover operation is based on the generation number and 8. Select the best half population as parentpop considering R and Cdist
using tournament selection approach.
size of the chromosome pair. Due to the possibility of repe- childpop = 
tition of intermediate nodes, the chromosome after crossover Schild−pop
 =0 
pop
operation (also termed as offspring in optimization theory) are 9. While Schild−pop ≤ S
Randomly select two chromosomes from the parent population
repaired. The intermediate nodes present in the parent chromo- Perform crossover to produce two child chromosomes
some but not in the newly generated offspring, are considered Update childpop and Schild−pop = Schild−pop + 2
while repairing the offspring. Randomly choose a chromosome from parent population
Mutate chromosome to produce a child chromosome
In the mutation operation, the order of two randomly Update childpop and Schild−pop = Schild−pop +
selected nodes is exchanged in the chromosome, if the endwhile  
nodes are reachable (present as neighbor) from their down- 10. Generate new population of size 2 × Spop by oldpop ∪ childpop
11. Calculate normalize fault-tolerance using Eq. (8)
ward nodes. Illustrative example of crossover and mutation 12. Calculate normalized delay using Eq. (10)
operation is shown in Figs. 4 and 5, respectively. 13. Non-dominated_sorting( oldpop ∪ childpop )
4) Nondominance-Based Sorting for Chromosomes: The 14. Crowing_distance (oldpop ∪ childpop )
15. Select again the best half population as oldpop using rank and Cdist
concept of nondominance is used for sorting population of endwhile
chromosomes. The sorting technique prioritizes chromosomes 16. exit
based on multiple conflicting objectives. Let us consider, two Output: optimized chromosomes
chromosomes CHi and CHj from the population. According
to Pareto optimal, chromosome CHi is said to dominate CHj
if at least one of the objectives fitness value of CHi is bet- it can be derived as
ter than the fitness value of CHj , and the fitness value of the 
other objectives are equivalent. Parato optimal-based prioriti- CHi (FT) > CHj (FT), ∧ CHi (CD) ≮ CHj (CD)
CHi > CHj =
zation is preferred in multiobjective optimization use cases CHi (CD) > CHj (CD), ∧ CHi (FT) ≮ CHj (FT).
in communication networks [26], [27]. For two objectives, (15)
KAIWARTYA et al.: VIRTUALIZATION IN WSNs: FAULT TOLERANT EMBEDDING FOR IoT 577

Fig. 6. Flowchart of A-NSGA.

The chromosomes of the population are ranked in ascending


order by comparing their fitness values using nondominance
concept. The chromosomes not dominated by any other chro-
mosomes are ranked first in the population. The second rank
is assigned to the chromosomes dominated by only one chro-
mosome in the population. The chromosomes dominated by
two other chromosomes are ranked third in the population.
The crowding distance is calculated for each chromosomes of
the population after ranking of the chromosome. Tournament
selection approach is utilized to select population for the next
generation. (a) (b)
5) Adapted NSGA: The complete set of steps utilized for
solving the optimization problem is presented in Algorithm 1. Fig. 7. Analytical results. (a) Impact of NA on E(r). (b) Impact of Nin on N p .
6) Explanation of A-NSGA: In steps 1 and 2, population
(paths from source and destination pair) is generated and
initialized. The population is sorted following nondominance- analysis evaluates the performance of the mathematical for-
based sorting in steps 3–6. The best half population is selected mulations obtained for solving the optimization problem in
as parent in steps 7 and 8. In step 9, crossover and muta- IoT environments. Most of the parameters considered for gen-
tion operations are performed for generating better solutions erating analytical results are pointed in the results itself. The
from selected parent population. In steps 10–15, better half increment on network area has exponential impact on expected
population is again selected from the combined (old and nearest node distance. The increment in number of paths with
newly generated) population. These steps are repeated until the increase in number of intermediate vehicles is initially
the condition mentioned in step 3 satisfies (the predefined slower but continuous and approximately exponential nature
maximum number of generations). These steps are presented with higher intermediate nodes [see Fig. 7(a) and (b)].
as flowchart in Fig. 6. The time complexity of A-NSGA is
O(2 × Spop ×N gen ), where Spop is size of population and N gen
represents the number of generations. The size of the network B. Simulation Results
indirectly controls the number of generations, and thus execu- In this section, simulations carried out to evaluate the
tion time. Also, time require for each generation might vary, performance of the framework is presented focusing on
and depend on the hardware configuration of the system. environment setting, metrics, and comparative analysis of
results. The two objectives were aimed for performing case
IV. E MPIRICAL R ESULTS study-based simulations. First, effectiveness of fault tolerant
optimization is measured considering the impact of number
In this section, analytical, case study-based simulation of generations on optimization. Second, efficiency of fault
results are discussed for analyzing the performance of the tolerant optimization is measured considering network density.
proposed FT optimization framework for IoT. It is broadly
1) Simulation Setting and Metrics: The proposed opti-
divided into two parts. Analytical results are discussed in the
mization of FT and delay in virtual network is imple-
first part, whereas simulation setting, metrics and comparative
mented in network simulator NS-2 using C++ programing
analysis of simulation results are discussed in the second part.
language for implementing major classes of the simulation.
The major classes of the simulation include “NetworkNode,”
A. Analytical Results “VirtualNode,” “RandomProvider,” “PathSearchNSGA,” and
The characteristics of the mathematical derivations are ana- “MainApp.” All the characteristics of a node in a network,
lytically analyzed using mathematical tool. The analytical such as position, list of neighbors, link delay with
578 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

Fig. 8. Optimized chromosome with 100 nodes after (a) 500, (b) 600, (c) 700, Fig. 9. Optimized chromosome with 500 nodes after (a) 500, (b) 600, (c) 700,
and (d) 800 generations. and (d) 800 generations.

neighbors, FT of associated links are implemented in estimation. The estimation is not suitable in wireless scenario.
NetworkNode. Interface-based task processing is implemented Moreover, large number of chromosomes has higher delay and
at VirtualNode, For different simulation runs, different set of lower FT values. Also, the impact of increment of number
network nodes are randomly generated using RandomProvider. of generations on the optimized chromosome is quite lower
The optimization of FT and delay for generating virtual due to the smaller network (100 nodes). As the difference
network is implemented in PathSearchNSGA. Two proto- between the successive results [Fig. 8(a)–(d)] is not clearly
type IoT applications are implemented in MainApp class. visible. This is due to the lesser number of path formation in
The simulation is performed in a machine having Intel Core smaller networks.
i7-2500S 2.70 GHz processor, 16 GB RAM, 64bit Linux The network size is enlarged considering 500 nodes for
OS. The other basic setting of parameters in simulation is magnifying the optimization performance difference in succes-
approximately similar the parameter table and setting consid- sive generations. A comparison of optimization performance
ered in [28] and [29]. Three different sets of network with the larger network size is shown in Fig. 9(a)–(d). It is evident
100, 500 and 1000, 1500, 2000 nodes are generated follow- from results that the optimization performance of A-NSGA is
ing Poisson process. The adapted NSGA is executed up to better as compared to SVNE considering both the objectives.
500, 1000, and 1500, and 2000 generations to optimize FT In particular, the last optimized chromosome value of FT is
and CD in four deferent networks. The chromosomes of the approximately 0.8, whereas, the optimized chromosome value
last generation in results which represents the last optimized of CD is approximately 0.015. This can be attributed to the
values. availability of higher number of paths with larger networks
2) Analysis of Results: A comparison of optimization which helps in selection better quality links, with greater FT
performance between A-NSGA and SVNE is shown in and lower CD. The optimized chromosome value of FT is
Fig. 8(a)–(d) considering 100 nodes and 500 ∼ 800 gen- approximately 0.3, whereas the optimized value of delay is
erations. It can be clearly observed that the optimization approximately 0.15. This is due to the slower convergence of
performance of A-NSGA is better as compared to SVNE for the wired network-based approach. Moreover, the number of
both the objectives including FT and CD. The observation optimized chromosomes has still lesser and the convergence
affirms the capability of handling failure in virtualization of rate toward optimal solution is quite lower. Also, the impact of
WSNs. Specifically, the optimized value of FT is approxi- increment of number of generations on the optimized chromo-
mately 0.65, whereas the optimized value of delay is approx- some is little bit better due to the larger network (500 nodes).
imately 0.02. This can be attributed to the accurate prediction As the difference between the successive results [Fig. 9(a)–(d)]
of FT using packet error rate-based link quality estimation. is more visible.
In case SVNE, optimized value of FT is approximately 0.3, The network size is further enhanced with 1000 nodes
whereas the optimized value of delay is approximately 0.2. to improve the convergence rate toward optimal solution.
This is due to the degree of connectivity-based fault tolerant A comparison of optimization convergence rate is shown in
KAIWARTYA et al.: VIRTUALIZATION IN WSNs: FAULT TOLERANT EMBEDDING FOR IoT 579

clustered with scaled network size. Therefore, the fault toler-


ant approach is scalable, and suitable for the scaled network
environments of IoT.

V. C ONCLUSION
In this paper, a framework for optimizing FT in virtualiza-
tion in WSNs is presented focusing on heterogeneous network
requirement for IoT applications. A multiobjective optimiza-
tion problem is mathematically formulated considering FT
and CD in virtualization. An A-NSGA is developed for solv-
ing the optimization problem. The optimization framework is
more effective as compared the state of the art approaches. It
is evident from the better optimization results obtained with
lower number of generations. The optimization results are also
obtained in shorter time as compared to the state of the art
approaches. This affirms the efficiency of the proposed frame-
work. In future research work, authors will consider more
network parameter in the multiobjective optimization problem.

R EFERENCES
[1] K. Xu, Y. Qu, and K. Yang, “A tutorial on the Internet of Things: From
Fig. 10. Optimized chromosome with 1000 nodes after (a) 500, (b) 600, a heterogeneous network integration perspective,” IEEE Netw., vol. 30,
(c) 700, and (d) 800 generations. no. 2, pp. 102–108, Mar./Apr. 2016.
[2] Y. Guo, H. Zhu, and L. Yang, “Service-oriented network virtualization
architecture for Internet of Things,” China Commun., vol. 13, no. 9,
Fig. 10(a)–(d). It is evident from results that the optimization pp. 163–172, Sep. 2016.
convergence rate of A-NSGA is better as compared to SVNE [3] M. Chowdhury, M. R. Rahman, and R. Boutaba, “ViNEYard: Virtual
network embedding algorithms with coordinated node and link map-
for both the objectives. The optimized chromosome value of ping,” IEEE/ACM Trans. Netw., vol. 20, no. 1, pp. 206–219, Feb. 2012.
FT is approximately 0.98, whereas, the optimized chromosome [4] A. Fischer, J. F. Botero, M. T. Beck, H. de Meer, and X. Hesselbach,
value of CD is approximately 0.010. This can be attributed to “Virtual network embedding: A survey,” IEEE Commun. Surveys Tuts.,
vol. 15, no. 4, pp. 1888–1906, 4th Quart., 2013.
the better felt tolerant path selection from the large number [5] S. Zhang, Z. Qian, J. Wu, S. Lu, and L. Epstein, “Virtual network embed-
of available paths with scaled network size. In case of SVNE, ding with opportunistic resource sharing,” IEEE Trans. Parallel Distrib.
the optimized chromosome value of FT is approximately 0.48, Syst., vol. 25, no. 3, pp. 816–827, Mar. 2014.
[6] B. Guo et al., “Survivable virtual network design and embedding to
whereas the optimized value of delay is approximately 0.13. survive a facility node failure,” J. Lightw. Technol., vol. 32, no. 3,
Moreover, the number of optimized chromosomes has signifi- pp. 483–493, Feb. 1, 2014.
cantly increased with scaled network size. The chromosomes [7] I. Ishaq, J. Hoebeke, I. Moerman, and P. Demeester, “Internet of
Things virtual networks: Bringing network virtualization to resource-
are densely clustered for both approaches. The impact of incre- constrained devices,” in Proc. IEEE Int. Conf. Green Comput.
ment of number of generations on the optimized chromosome Commun. (GreenCom), Besançon, France, 2012, pp. 293–300.
is clearly visible in successive results [Fig. 10(a)–(d)] due to [8] I. Khan et al., “Wireless sensor network virtualization: Early architecture
and research perspectives,” IEEE Netw., vol. 29, no. 3, pp. 104–112,
the greater availability of paths. May/Jun. 2015.
[9] S. Toyonaga, D. Kominami, and M. Murata, “Virtual wireless sensor
networks: Adaptive brain-inspired configuration for Internet of Things
C. Summary of Observations applications,” Sensors, vol. 16, no. 8, p. 1323, 2016.
The optimization of FT in virtualization WSNs significantly [10] B. Guo et al., “Survivable virtual network design and embedding to
survive a facility node failure,” J. Lightw. Technol., vol. 32, no. 3,
improves the performance of IoT applications, requiring het- pp. 483–493, Feb. 1, 2014.
erogeneous network architecture. The problem can be modeled [11] B. Lu, T. Huang, X.-C. Sun, J. Y. Chen, and Y.-J. Liu, “Dynamic recov-
as multiobjective optimization. The optimization problem can ery for survivable virtual network embedding,” J. China Univ. Posts
Telecommun., vol. 21, no. 3, pp. 77–84, 2014.
be solved using A-NSGA. The number of paths between [12] H. Cui, S. Tang, F. Sun, Y. Xu, and X. Yang, “Topological embed-
source and destination pair increases exponentially with the ding feature based resource allocation in network virtualization,” Math.
increase of network density The FT can be represented as Problems Eng., vol. 2014, no. 1, pp. 1–10, 2014.
[13] M. R. Rahman and R. Boutaba, “SVNE: Survivable virtual network
link quality and density of neighbor nodes in wireless network embedding algorithms for network virtualization,” IEEE Trans. Netw.
environments. The analysis of case study-based simulation Service Manag., vol. 10, no. 2, pp. 105–118, Jun. 2013.
results attests the effectiveness of the optimization framework [14] Q. Hu, Y. Wang, and X. Cao, “Survivable network virtualization for
in handling failure of virtual networks. The convergence rate single facility node failure: A network flow perspective,” Opt. Switch.
Netw., vol. 10, no. 4, pp. 406–415, 2013.
of the optimal solution is quite lower with smaller network [15] J. Liao, M. Feng, T. Li, J. Wang, and S. Qing, “Topology-aware virtual
size (100 nodes). The impact of number of generations on network embedding using multiple characteristics,” KSII Trans. Internet
optimization of solutions is more visible with larger network Inf. Syst., vol. 8, no. 1, pp. 145–164, 2014.
[16] Q. Hu, Y. Wang, and X. Cao, “Location-constrained survivable network
size (1000 nodes), due to the higher number of paths. The virtualization,” in Proc. 35th IEEE Sarnoff Symp. (SARNOFF), Newark,
optimized chromosomes are higher in numbers and densely NJ, USA, May 2012, pp. 1–5.
580 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

[17] Y. Yuan, C. Wang, C. Zhang, and N. Zhu, “Fault tolerant virtual network Jaime Lloret (M’07–SM’10) received the M.Sc.
embedding algorithm based on redundant backup resource,” in Proc. degree in physics in 1997, the M.Sc. degree in elec-
3rd Int. Conf. Instrum. Meas. Comput. Commun. Control (IMCCC), tronic engineering in 2003, and the Ph.D. degree in
Shenyang, China, Sep. 2013, pp. 354–357. telecommunication engineering in 2006.
[18] Q. Zhu et al., “A hybrid reliable heuristic mapping method based on He is currently an Associate Professor with
survivable virtual networks for network virtualization,” Discrete Dyn. the Polytechnic University of Valencia, Valencia,
Nat. Soc., vol. 2015, no. 1, pp. 1–8, 2015. Spain. He has authored 22 book chapters and has
[19] X. L. Chang, X. M. Mi, and J. K. Muppala, “Performance evaluation of over 340 research papers published in national
artificial intelligence algorithms for virtual network embedding,” Eng. and international conferences, international journals
Appl. Artif. Intell., vol. 26, no. 10, pp. 2540–2550, 2013. (over 110 with ISI).
[20] I. Khan et al., “Wireless sensor network virtualization: A survey,” IEEE Dr. Lloret is currently the Chair of the Internet
Commun. Surveys Tuts., vol. 18, no. 1, pp. 553–576, 1st Quart., 2015. Technical Committee (IEEE Communications Society and Internet Society)
[21] M. M. Islam, M. M. Hassan, G. W. Lee, and E. N. Huh, “A survey and Working Group of the Standard IEEE 1907.1. He has been a Co-Editor
on virtualization of wireless sensor networks,” Sensors, vol. 12, no. 2, of 38 conference proceedings and a Guest Editor of several international
pp. 2175–2207, 2012. books and journals. He is the Editor-in-Chief of Ad Hoc and Sensor Wireless
[22] S. Kim, “Game based certificate revocation algorithm for Internet Networks and an Associate Editor of 46 international journals (16 ISI). He has
of Things security problems,” Adhoc Sensor Wireless Netw., vol. 32, been involved in over 320 program committees of international conferences
nos. 3–4, pp. 319–336, 2016. and over 130 organization and Steering Committees. He has been the General
[23] R. R. Shah et al., “NEWSMAN: Uploading videos over adaptive mid- Chair of 28 international workshops and conferences.
dleboxes to news servers in weak network infrastructures,” in Proc. Int.
Conf. Multimedia Model., Miami, FL, USA, 2016, pp. 100–113.
[24] Y. Cao et al., “Toward efficient, scalable, and coordinated on-the-move
EV charging management,” IEEE Wireless Commun., vol. 24, no. 2,
pp. 66–73, Apr. 2017. Sushil Kumar (M’14) received the Ph.D. degree
[25] A. Calhan, “A non-preemptive priority scheduling algorithm for improv- in computer science from the School of Computer
ing priority data transmission delay in wireless body area networks,” and Systems Sciences, Jawaharlal Nehru University,
Adhoc Sensor Wireless Netw., vol. 34, no. 1, pp. 59–75, 2016. New Delhi, India, in 2014.
[26] O. Kaiwartya et al., “Multiobjective dynamic vehicle routing problem He is currently an Assistant Professor with
and time seed based solution using particle swarm optimization,” Jawaharlal Nehru University. His current research
J. Sensors, vol. 2015, no. 1, pp. 1–14, 2015. interest includes vehicular ad-hoc networks and
[27] B. Zhou and Q. Chen, “On the particle-assisted stochastic search wireless sensor networks.
mechanism in wireless cooperative localization,” IEEE Trans. Wireless
Commun., vol. 15, no. 7, pp. 4765–4777, Jul. 2016.
[28] O. Kaiwartya et al., “T-MQM: Testbed-based multi-metric quality mea-
surement of sensor deployment for precision agriculture—A case study,”
IEEE Sensors J., vol. 16, no. 23, pp. 8649–8664, Dec. 2016.
[29] B. Zhou, Q. Chen, and P. Xiao, “The error propagation analysis of the Rajiv Ratn Shah (M’16) received the Ph.D. degree
received signal strength-based simultaneous localization and tracking from the School of Computing, National University
in wireless sensor networks,” IEEE Trans. Inf. Theory, vol. 63, no. 6, of Singapore, Singapore, in 2016.
pp. 3983–4007, Jun. 2017. He is currently a Post-Doctoral Research
Fellow with the School of Information Systems,
Omprakash Kaiwartya (M’15) received the Ph.D.
Singapore Management University, Singapore.
degree in computer science from the School of
His current research interests include multimodal
Computer and Systems Sciences, Jawaharlal Nehru
analysis of user-generated content in support of
University, New Delhi, India, in 2015.
social media applications, location-based services
He is currently a Post-Doctoral Research
in support of social media applications, and
Fellow with the Faculty of Computing, Universiti
multimedia analysis and retrieval.
Teknologi Malaysia, Johor Bahru, Malaysia. He
was recently selected as a Visiting Scholar with the
Department of Computer and Information Sciences,
Northumbria University, Newcastle upon Tyne,
U.K. His current research interests include Internet
of vehicles, electronic vehicles, and IoT use case of wireless sensor networks. Mukesh Prasad (M’13) received the Ph.D. degree
in computer science from National Chiao Tung
Abdul Hanan Abdullah (M’15) received the Ph.D. University, Hsinchu, Taiwan, in 2015.
degree from Aston University, Birmingham, U.K., in He is currently a Lecturer with the School of
1995. Software, University of Technology Sydney, Ultimo,
He is currently a Professor and heads the Faculty NSW, Australia. He was a Principle Engineer
of Computing, Pervasive Computing Research (Research and Development) with the Taiwan
Group, Universiti Teknologi Malaysia, Johor Bahru, Semiconductor Manufacturing Company, Hsinchu.
Malaysia. He was the Dean of the faculty from His current research interests include machine learn-
2004 to 2011. His current research interests include ing, pattern recognition, fuzzy systems, neural
wireless sensor networks, vehicular ad hoc networks, networks, artificial intelligence, and brain computer
Internet of Things, network security, and next- interface.
generation networks.
Yue Cao (M’16) received the Ph.D. degree from
the Institute for Communication Systems (ICS) (for-
merly known as the Centre for Communication
Systems Research), University of Surrey, Guildford, Shiv Prakash received the Ph.D. degree in computer
U.K., in 2013. science from the School of Computer and System
He was a Research Fellow with the ICS. He is cur- Sciences, Jawaharlal Nehru University, New Delhi,
rently a Lecturer with the Department of Computer India, in 2014.
and Information Sciences, Northumbria University, He is currently an Assistant Professor with
Newcastle upon Tyne, U.K. His current research the Indian Institute of Information Technology
interests include delay/disruption tolerant networks, Kottayam, Kottayam, India. His current research
electric vehicle charging management, informa- interests include parallel and distributed system,
tion centric networking, device-to-device communication, and mobile edge cloud computing, artificial intelligence, and machine
computing. learning.

Você também pode gostar