-
QoE Based Revenue Maximizing Dynamic Resource Allocation and Pricing for Fog-Enabled Mission-Critical IoT Applications
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Fog computing is becoming a vital component for Internet of things (IoT) applications, acting as its computational engine. Mission-critical IoT applications are highly sensitive to latency, which depends on the physical location of the cloud server. Fog nodes of varying response rates are available to the cloud service provider (CSP) and it is faced with a challenge of forwarding the sequentially…
▽ More
Fog computing is becoming a vital component for Internet of things (IoT) applications, acting as its computational engine. Mission-critical IoT applications are highly sensitive to latency, which depends on the physical location of the cloud server. Fog nodes of varying response rates are available to the cloud service provider (CSP) and it is faced with a challenge of forwarding the sequentially received IoT data to one of the fog nodes for processing. Since the arrival times and nature of requests is random, it is important to optimally classify the requests in real-time and allocate available virtual machine instances (VMIs) at the fog nodes to provide a high QoE to the users and consequently generate higher revenues for the CSP. In this paper, we use a pricing policy based on the QoE of the applications as a result of the allocation and obtain an optimal dynamic allocation rule based on the statistical information of the computational requests. The developed solution is statistically optimal, dynamic, and implementable in real-time as opposed to other static matching schemes in the literature. The performance of the proposed framework has been evaluated using simulations and the results show significant improvement as compared with benchmark schemes.
△ Less
Submitted 2 June, 2020;
originally announced June 2020.
-
Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties
Authors:
Timothy Kieras,
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Supply chain security threats pose new challenges to security risk modeling techniques for complex ICT systems such as the IoT. With established techniques drawn from attack trees and reliability analysis providing needed points of reference, graph-based analysis can provide a framework for considering the role of suppliers in such systems. We present such a framework here while highlighting the n…
▽ More
Supply chain security threats pose new challenges to security risk modeling techniques for complex ICT systems such as the IoT. With established techniques drawn from attack trees and reliability analysis providing needed points of reference, graph-based analysis can provide a framework for considering the role of suppliers in such systems. We present such a framework here while highlighting the need for a component-centered model. Given resource limitations when applying this model to existing systems, we study various classes of uncertainties in model development, including structural uncertainties and uncertainties in the magnitude of estimated event probabilities. Using case studies, we find that structural uncertainties constitute a greater challenge to model utility and as such should receive particular attention. Best practices in the face of these uncertainties are proposed.
△ Less
Submitted 20 March, 2020;
originally announced March 2020.
-
PhD Forum: Enabling Autonomic IoT for Smart Urban Services
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
The development of autonomous cyber-physical systems (CPS) and advances towards the fifth generation (5G) of wireless technology is promising to revolutionize many industry verticals such as Healthcare, Transportation, Energy, Retail Services, Building Automation, Education, etc., leading to the realization of the smart city paradigm. The Internet of Things (IoT), enables powerful and unprecedente…
▽ More
The development of autonomous cyber-physical systems (CPS) and advances towards the fifth generation (5G) of wireless technology is promising to revolutionize many industry verticals such as Healthcare, Transportation, Energy, Retail Services, Building Automation, Education, etc., leading to the realization of the smart city paradigm. The Internet of Things (IoT), enables powerful and unprecedented capabilities for intelligent and autonomous operation. We leverage ideas from Network Science, Optimization & Decision Theory, Incentive Mechanism Design, and Data Science/Machine Learning to achieve key design goals, in IoT-enabled urban systems, such as efficiency, security & resilience, and economics.
△ Less
Submitted 24 December, 2019;
originally announced January 2020.
-
Dynamic Spatio-Temporal Resource Provisioning for On-Demand Urban Services in Smart Cities
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Efficient allocation of finite resources is a crucial problem in a wide variety of on-demand smart city applications. Service requests often appear randomly over time and space with varying intensity. Resource provisioning decisions need to be made strategically in real-time, particularly when there is incomplete information about the time, location, and intensity of future requests. In this paper…
▽ More
Efficient allocation of finite resources is a crucial problem in a wide variety of on-demand smart city applications. Service requests often appear randomly over time and space with varying intensity. Resource provisioning decisions need to be made strategically in real-time, particularly when there is incomplete information about the time, location, and intensity of future requests. In this paper, we develop a systematic approach to the dynamic resource provisioning problem at a centralized source node to spatio-temporal service requests. The spatial statistics are combined with dynamically optimal decision-making to derive recursive threshold based allocation policies. The developed results are easy to compute and implement in real-time applications. For illustrative purposes, we present examples of commonly used utility functions, based on the power law decay and exponential decay coupled with exponentially, and uniformly distributed intensity of stochastic arrivals to demonstrate the efficacy of the developed framework. Semi-closed form expressions along with recursive computational procedure has been provided. Simulation results demonstrate the effectiveness of the proposed policies in comparison with less strategic methodologies.
△ Less
Submitted 24 January, 2019;
originally announced January 2019.
-
Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them to a high risk of malware infiltration. Malware may infect a large number of network devices using de…
▽ More
The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them to a high risk of malware infiltration. Malware may infect a large number of network devices using device-to-device (D2D) communication resulting in the formation of a botnet, i.e., a network of infected devices controlled by a common malware. A botmaster may exploit it to launch a network-wide attack sabotaging infrastructure and facilities, or for malicious purposes such as collecting ransom. In this paper, we propose an analytical model to study the D2D propagation of malware in wireless IoT networks. Leveraging tools from dynamic population processes and point process theory, we capture malware infiltration and coordination process over a network topology. The analysis of mean-field equilibrium in the population is used to construct and solve an optimization problem for the network defender to prevent botnet formation by patching devices while causing minimum overhead to network operation. The developed analytical model serves as a basis for assisting the planning, design, and defense of such networks from a defender's standpoint.
△ Less
Submitted 28 December, 2018;
originally announced January 2019.
-
Real-Time Transmission Mechanism Design for Wireless IoT Sensors with Energy Harvesting under Power Saving Mode
Authors:
Jin Shang,
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
The Internet of things (IoT) comprises of wireless sensors and actuators connected via access points to the Internet. Often, the sensing devices are remotely deployed with limited battery power and are equipped with energy harvesting equipment. These devices transmit real-time data to the base station (BS), which is used in applications such as anomaly detection. Under sufficient power availabilit…
▽ More
The Internet of things (IoT) comprises of wireless sensors and actuators connected via access points to the Internet. Often, the sensing devices are remotely deployed with limited battery power and are equipped with energy harvesting equipment. These devices transmit real-time data to the base station (BS), which is used in applications such as anomaly detection. Under sufficient power availability, wireless transmissions from sensors can be scheduled at regular time intervals to maintain real-time data acquisition. However, once the battery is significantly depleted, the devices enter into power saving mode and need to be more selective in transmitting information to the BS. Transmitting a particular piece of sensed data consumes power while discarding it may result in loss of utility at the BS. The goal is to design an optimal dynamic policy which enables the device to decide whether to transmit or to discard a piece of sensing data particularly under the power saving mode. This will enable the sensor to prolong its operation while causing minimum loss of utility to the application. We develop an analytical framework to capture the utility of the IoT sensor transmissions and leverage dynamic programming based approach to derive an optimal real-time transmission policy that is based on the statistics of information arrival, the likelihood of harvested energy, and designed lifetime of the sensors. Numerical results show that if the statistics of future data valuation are accurately predicted, there is a significant increase in utility obtained at the BS as well as the battery lifetime.
△ Less
Submitted 8 April, 2019; v1 submitted 6 December, 2018;
originally announced December 2018.
-
A Multi-Layer Feedback System Approach to Resilient Connectivity of Remotely Deployed Mobile Internet of Things
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Enabling the Internet of things in remote environments without traditional communication infrastructure requires a multi-layer network architecture. Devices in the overlay network such as unmanned aerial vehicles (UAVs) are required to provide coverage to underlay devices as well as remain connected to other overlay devices to exploit device-to-device (D2D) communication. The coordination, plannin…
▽ More
Enabling the Internet of things in remote environments without traditional communication infrastructure requires a multi-layer network architecture. Devices in the overlay network such as unmanned aerial vehicles (UAVs) are required to provide coverage to underlay devices as well as remain connected to other overlay devices to exploit device-to-device (D2D) communication. The coordination, planning, and design of such overlay networks constrained by the underlay devices is a challenging problem. Existing frameworks for placement of UAVs do not consider the lack of backhaul connectivity and the need for D2D communication. Furthermore, they ignore the dynamical aspects of connectivity in such networks which presents additional challenges. For instance, the connectivity of devices can be affected by changes in the network, e.g., the mobility of underlay devices or unavailability of overlay devices due to failure or adversarial attacks. To this end, this work proposes a feedback based adaptive, self-configurable, and resilient framework for the overlay network that cognitively adapts to the changes in the network to provide reliable connectivity between spatially dispersed smart devices. Results show that the proposed framework requires significantly lower number of aerial base stations to provide higher coverage and connectivity to remotely deployed mobile devices as compared to existing approaches.
△ Less
Submitted 14 May, 2018;
originally announced May 2018.
-
On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc. The IoT technology is also envisioned to play an important role in improving the effectiveness of military operations in battlefields. The interconnection of combat equipment and other battlefield r…
▽ More
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc. The IoT technology is also envisioned to play an important role in improving the effectiveness of military operations in battlefields. The interconnection of combat equipment and other battlefield resources for coordinated automated decisions is referred to as the Internet of battlefield things (IoBT). IoBT networks are significantly different from traditional IoT networks due to battlefield specific challenges such as the absence of communication infrastructure, heterogeneity of devices, and susceptibility to cyber-physical attacks. The combat efficiency and coordinated decision-making in war scenarios depends highly on real-time data collection, which in turn relies on the connectivity of the network and information dissemination in the presence of adversaries. This work aims to build the theoretical foundations of designing secure and reconfigurable IoBT networks. Leveraging the theories of stochastic geometry and mathematical epidemiology, we develop an integrated framework to quantify the information dissemination among heterogeneous network devices. Consequently, a tractable optimization problem is formulated that can assist commanders in cost effectively planning the network and reconfiguring it according to the changing mission requirements.
△ Less
Submitted 26 January, 2018;
originally announced January 2018.
-
Cognitive Connectivity Resilience in Multi-layer Remotely Deployed Mobile Internet of Things
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Enabling the Internet of things in remote areas without traditional communication infrastructure requires a multi-layer network architecture. The devices in the overlay network are required to provide coverage to the underlay devices as well as to remain connected to other overlay devices. The coordination, planning, and design of such two-layer heterogeneous networks is an important problem to ad…
▽ More
Enabling the Internet of things in remote areas without traditional communication infrastructure requires a multi-layer network architecture. The devices in the overlay network are required to provide coverage to the underlay devices as well as to remain connected to other overlay devices. The coordination, planning, and design of such two-layer heterogeneous networks is an important problem to address. Moreover, the mobility of the nodes and their vulnerability to adversaries pose new challenges to the connectivity. For instance, the connectivity of devices can be affected by changes in the network, e.g., the mobility of the underlay devices or the unavailability of overlay devices due to failure or adversarial attacks. To this end, this work proposes a feedback based adaptive, self-configurable, and resilient framework for the overlay network that cognitively adapts to the changes in the network to provide reliable connectivity between spatially dispersed smart devices. Our results show that if sufficient overlay devices are available, the framework leads to a connected configuration that ensures a high coverage of the mobile underlay network. Moreover, the framework can actively reconfigure itself in the event of varying levels of device failure.
△ Less
Submitted 2 September, 2017;
originally announced September 2017.
-
A Stochastic Geometry-based Demand Response Management Framework for Cellular Networks Powered by Smart Grid
Authors:
Muhammad Junaid Farooq,
Hakim Ghazzai,
Abdullah Kadri
Abstract:
In this paper, the production decisions across multiple energy suppliers in smart grid, powering cellular networks are investigated. The suppliers are characterized by different offered prices and pollutant emissions levels. The challenge is to decide the amount of energy provided by each supplier to each of the operators such that their profitability is maximized while respecting the maximum tole…
▽ More
In this paper, the production decisions across multiple energy suppliers in smart grid, powering cellular networks are investigated. The suppliers are characterized by different offered prices and pollutant emissions levels. The challenge is to decide the amount of energy provided by each supplier to each of the operators such that their profitability is maximized while respecting the maximum tolerated level of CO2 emissions. The cellular operators are characterized by their offered quality of service (QoS) to the subscribers and the number of users that determines their energy requirements. Stochastic geometry is used to determine the average power needed to achieve the target probability of coverage for each operator. The total average power requirements of all networks are fed to an optimization framework to find the optimal amount of energy to be provided from each supplier to the operators. The generalized $α$-fair utility function is used to avoid production bias among the suppliers based on profitability of generation. Results illustrate the production behavior of the energy suppliers versus QoS level, cost of energy, capacity of generation, and level of fairness.
△ Less
Submitted 5 December, 2016;
originally announced December 2016.