114,99 €
RESOURCE MANAGEMENT FOR ON-DEMAND MISSION-CRITICAL INTERNET OF THINGS APPLICATIONS Discover an insightful and up-to-date treatment of resource management in Internet of Things technology In Resource Management for On-Demand Mission-Critical Internet of Things -Applications, an expert team of engineers delivers an insightful analytical perspective on modeling and decision support for mission-critical Internet of Things applications. The authors dissect the complex IoT ecosystem and provide a cross-layer perspective on the design and operation of IoT, especially in the context of smart and connected communities. The book offers an economic perspective on resource management in IoT systems with a particular emphasis on three main areas: spectrum management via reservation, allocation of cloud/fog resources to IoT applications, and resource provisioning to smart city service requests. It leverages theories from dynamic mechanism design, optimal control theory, and spatial point processes, providing an overview of integrated decision-making frameworks. Finally, the authors discuss future directions and relevant problems on the economics of resource management from new perspectives, like security and resilience. Readers will also enjoy the inclusion of: * A thorough introduction and overview of IoT applications in smart cities, mission critical IoT services and requirements, and key metrics and research challenges * A comprehensive exploration of the allocation of spectrum resources to mission critical IoT applications, including the massive surge of IoT and spectrum scarcity problem * Practical discussions of the provisioning of cloud/fog computing resources to IoT applications, including allocation policy * In-depth examinations of resource provisioning to spatio-temporal service requests in smart cities Perfect for engineers working on Internet of Things and cyber-physical systems, Resource Management for On-Demand Mission-Critical Internet of Things Applications is also an indispensable reference for graduate students, researchers, and professors with an interest in IoT resource management.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 288
Veröffentlichungsjahr: 2023
Cover
Title Page
Copyright
Dedication
Preface
Acknowledgments
Acronyms
Part I: Introduction
1 Internet of Things-Enabled Systems and Infrastructure
1.1 Cyber–Physical Realm of IoT
1.2 IoT in Mission-Critical Applications
1.3 Overview of the Book
2 Resource Management in IoT-Enabled Interdependent Infrastructure
2.1 System Complexity and Scale
2.2 Network Geometry and Dynamics
2.3 On-Demand MC-IoT Services and Decision Avenues
2.4 Performance Metrics
2.5 Overview of Scientific Methodologies
Part II: Design Challenges in MC-IoT
3 Wireless Connectivity Challenges
3.1 Spectrum Scarcity and Reservation Based Access
3.2 Connectivity in Remote Environments
3.3 IoT Networks in Adversarial Environments
Note
4 Resource and Service Provisioning Challenges
4.1 Efficient Allocation of Cloud Computing Resources
4.2 Dynamic Pricing in the Cloud
4.3 Spatio-Temporal Urban Service Provisioning
Notes
Part III: Wireless Connectivity Mechanisms for MC-IoT
5 Reservation-Based Spectrum Access Contracts
5.1 Reservation of Time–Frequency Blocks in the Spectrum
5.2 Dynamic Contract Formulation
5.3 Mission-Oriented Pricing and Refund Policies
5.4 Summary and Conclusion
Note
6 Resilient Connectivity of IoT Using Aerial Networks
6.1 Connectivity in the Absence of Backhaul Networks
6.2 Aerial Base Station Modeling
6.3 Dynamic Coverage and Connectivity Mechanism
6.4 Performance Evaluation and Simulation Results
6.5 Summary and Conclusion
Notes
Part IV: Secure Network Design Mechanisms
7 Wireless IoT Network Design in Adversarial Environments
7.1 Adversarial Network Scenarios
7.2 Modeling Device Capabilities and Network Heterogeneity
7.3 Information Dissemination Under Attacks
7.4 Mission-Specific Network Optimization
7.5 Simulation Results and Validation
7.6 Summary and Conclusion
Notes
8 Network Defense Mechanisms Against Malware Infiltration
8.1 Malware Infiltration and Botnets
8.2 Propagation Modeling and Analysis
8.3 Patching Mechanism for Network Defense
8.4 Summary and Conclusion
Notes
Part V: Resource Provisioning Mechanisms
9 Revenue Maximizing Cloud Resource Allocation
9.1 Cloud Service Provider Resource Allocation Problem
9.2 Allocation and Pricing Rule
9.3 Dynamic Revenue Maximization
9.4 Numerical Results and Discussions
9.5 Summary and Conclusion
Notes
10 Dynamic Pricing of Fog-Enabled MC-IoT Applications
10.1 Edge Computing and Delay Modeling
10.2 Allocation Efficiency and Quality of Experience
10.3 Optimal Allocation and Pricing Rules
10.4 Numerical Experiments and Discussion
10.5 Summary and Conclusion
Notes
11 Resource Provisioning to Spatio-Temporal Urban Services
11.1 Spatio-Temporal Modeling of Urban Service Requests
11.2 Optimal Dynamic Allocation Mechanism
11.3 Numerical Results and Discussion
11.4 Summary and Conclusions
Notes
Part VI: Conclusion
12 Challenges and Opportunities in the IoT Space
12.1 Broader Insights and Future Directions
12.2 Future Research Directions
12.3 Concluding Remarks
Bibliography
Index
End User License Agreement
Chapter 6
Table 6.1 Simulation parameters.
Chapter 1
Figure 1.1 IoT technology stack describing the different actors involved in ...
Chapter 2
Figure 2.1 IoT-enabled infrastructure systems.
Figure 2.2 Geometry of heterogeneous wireless network and degree profile of ...
Figure 2.3 Key goals and objectives in IoT system design.
Chapter 3
Figure 3.1 A spectrum reservation based UNB-IoT system where the IoT devices...
Figure 3.2 Stages of spectrum reservation contract. In the first stage, the ...
Figure 3.3 Example scenario of spatially clustered mobile smart devices inte...
Chapter 4
Figure 4.1 Cloud service provider allocating available VMs to sequentially a...
Figure 4.2 Tolerable end-to-end delays of some typical mission-critical IoT ...
Figure 4.3 Architecture of a fog-enabled IoT ecosystem in which the MC-IoT d...
Figure 4.4 Expected revenue of the CSP for a single available VMI with varyi...
Figure 4.5 Illustration of the centralized resource allocation problem durin...
Chapter 5
Figure 5.1 Available spectrum divided into time–frequency blocks for reserva...
Figure 5.2 Effect of varying proportion of MC applications in the network.
Figure 5.3 Effect of decreasing average valuation of MC applications.
Figure 5.4 Effect of average channel cost on the reservation contract.
Chapter 6
Figure 6.1 Illustration of the strength of communication link function in (1...
Figure 6.2 An example of two connected MAPs serving the underlying MSDs. The...
Figure 6.3 Feedback cognitive loop for the proposed resilient connectivity f...
Figure 6.4 Example run of the cognitive algorithm showing snapshots of the M...
Figure 6.5 A random MAP failure event is induced at seconds, making % of ...
Figure 6.6 Proportion of MSDs covered by the MAPs.
Figure 6.7 Probability of information penetration in the D2D enabled MAP net...
Figure 6.8 Reachability of MAPs determined by the algebraic connectivity.
Figure 6.9 Top view of final configurations of MAPs in comparison with the p...
Figure 6.10 Comparison of coverage of MSDs with baseline algorithms.
Figure 6.11 Comparison of reachability of MAPs with baseline algorithms.
Figure 6.12 Comparison of probability of information dissemination in the MA...
Chapter 7
Figure 7.1 Heterogeneous IoBT network decomposed into virtual connectivity l...
Figure 7.2 Combined degree of a typical device located at the origin.
Figure 7.3 State transition diagram for the simultaneous diffusion of two di...
Figure 7.4 Accuracy of Jensen's lower bound.
Figure 7.5 Information dissemination profiles for varying average degree of ...
Figure 7.6 Optimal network parameters for the intelligence mission. (a) Tran...
Figure 7.7 Optimal network parameters for the encounter mission. (a) Transmi...
Figure 7.8 Network parameter variation with changes in combined-layer inform...
Figure 7.9 Network parameter variation with changes in intra-layer informati...
Chapter 8
Figure 8.1 Network model: A typical IoT device, referred to as device , is ...
Figure 8.2 Analyzing potential connectivity of WiFi hotspots in NYC.
Figure 8.3 State evolution diagram for a typical device. Un-compromised devi...
Figure 8.4 Approximation accuracy of link probabilities.
Figure 8.5 Curvature analysis of equilibrium population processes for differ...
Figure 8.6 Relative impact of unit patching rate of a degree device on net...
Figure 8.7 Impact of varying un-compromised bot proportion threshold and i...
Figure 8.8 Expected total cost of patching against varying system parameters...
Figure 8.9 Snapshot of network states at equilibrium in a PPP network.
Figure 8.10 Time evolution of the proportion of un-compromised devices. (a) ...
Figure 8.11 Snapshot of network states at equilibrium in the LinkNYC network...
Chapter 9
Figure 9.1 Flow diagram of the adaptive and resilient resource allocation an...
Figure 9.2 Optimal allocation thresholds for low and high arrival rates of c...
Figure 9.3 Optimal allocation threshold for varying number of available VMs....
Figure 9.4 Expected revenue of the CSP over time under variations in the num...
Chapter 10
Figure 10.1 Resource allocation and pricing flow diagram.
Figure 10.2 Optimal cutoff curves for (a) exponentially distributed and (b) ...
Figure 10.3 Effect of arrival rate on the expected revenue of the CSP (a, c)...
Figure 10.4 Effect of the mean characteristic on the expected revenue of the...
Figure 10.5 Comparison of expected QoE for exponentially distributed (a, b) ...
Chapter 11
Figure 11.1 Decision tree when allocation periods are remaining and reso...
Figure 11.2 Light gray dots indicate the boundary cases for the pair (). Da...
Figure 11.3 Spatial requests in one allocation period. The bold arrow repres...
Figure 11.4 Resource allocation thresholds for exponential magnitude of serv...
Figure 11.5 Total expected utility against varying spatio-temporal density o...
Figure 11.6 Total expected utility against varying magnitude of requests.
Figure 11.7 The shaded region represents the region of integration . (a) Sh...
Chapter 12
Figure 12.1 Autonomic CPS/IoT systems.
Figure 12.2 Overview of future research and approach.
Figure 12.3 Examples of urban on-demand services.
Cover Page
Title Page
Copyright
Dedication
Preface
Acknowledgments
Acronyms
Table of Contents
Begin Reading
Bibliography
Index
WILEY END USER LICENSE AGREEMENT
iii
iv
v
xi
xii
xiii
xv
xvi
1
3
4
5
6
7
8
9
10
11
12
13
15
17
18
19
20
21
22
23
25
26
27
28
29
30
31
32
33
34
35
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
127
128
129
130
131
132
133
134
135
136
137
138
139
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
183
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
207
208
209
Junaid Farooq
University of Michigan-Dearborn
Quanyan Zhu
New York University
This edition first published 2021
© 2021 John Wiley & Sons, Inc.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
The rights of Junaid Farooq and Quanyan Zhu to be identified as the authors of this work has been asserted in accordance with law.
Registered Office
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
Editorial Office
111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that appears in standard print versions of this book may not be available in other formats.
Limit of Liability/Disclaimer of Warranty
The contents of this work are intended to further general scientific research, understanding, and discussion only and are not intended and should not be relied upon as recommending or promoting scientific method, diagnosis, or treatment by physicians for any particular patient. In view of ongoing research, equipment modifications, changes in governmental regulations, and the constant flow of information relating to the use of medicines, equipment, and devices, the reader is urged to review and evaluate the information provided in the package insert or instructions for each medicine, equipment, or device for, among other things, any changes in the instructions or indication of usage and for added warnings and precautions. While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
Library of Congress Cataloging-in-Publication Data Applied for:
ISBN: 9781119716099
Cover Design: Wiley
Cover Image: © Vasin Lee/Shutterstock
To our parents
Modern infrastructure is becoming increasingly connected and autonomous, giving rise to new paradigms such as smart homes, offices, factories, and cities, etc. These utilize recent advancements in wireless communication technologies, embedded systems, and artificial intelligence-based software to create an ecosystem of networked electronic devices, referred to an Internet of things (IoT). The cyber-physical integration, enabled by the IoT, is resulting in a myriad of applications and services. However, the IoT itself is not a standalone system. Instead, it is composed of a variety of different systems and components such as endpoint devices, communication networks, cloud computing systems, and user devices, etc. Furthermore, the footprint of the IoT is massive and the constituent components are often operated and controlled by completely different entities. Therefore, effective management and operation of the resources in the IoT ecosystem requires the development of policies, decision-making frameworks, and practical mechanisms.
At each level of interactions between the systems in the IoT, there are decision problems that arise for achieving various objectives such as enhancing the efficiency, quality of service and experience, economics, security, and resilience, etc. This book takes a holistic cyber-physical view towards decision-making, when applied to large scale IoT systems and networks that may also be highly dynamic in nature. For instance, at the device level, it is important to ensure wireless connectivity and communication efficacy. If the communication infrastructure such as wireless base stations are deployed, there is a need for regulating the spectrum usage. However, in the absence of such infrastructure, the connectivity might have to be achieved using alternative techniques such as an overlay network of aerial base stations. Decisions have to be made on how to allocate the spectrum to users and how to configure and place aerial base stations to provide adequate coverage and connectivity. This book proposes a reservation-based spectrum usage mechanism that provides performance guarantees to enable real-time and mission-critical applications. In the absence of backhaul wireless connectivity, a novel approach based on flocking of unmanned aerial vehicles is proposed for providing uninterrupted wireless services to ground users and communities.
Once the connectivity of devices has been achieved, networks are used for information dissemination. The emphasis is on designing networks that achieve the desired information propagation and are reconfigurable in the case of adversarial attacks. Furthermore, there is a need to design security mechanisms against stealthy adversarial threats that may be using the same communication networks to infiltrate and sabotage network operation. This book proposes a novel modeling and analysis approach based on spatial point processes and mathematical epidemiology to analytically characterize the propagation of information and/or malware over wireless communication networks. This is then used to propose decision support in designing networks that are geared towards achieving the desired objective such as information dissemination or network security. The developed theoretical foundations have widespread applications in military and civilian scenarios.
The next frontier in the IoT ecosystem is the resource allocation and service provisioning, which appears in a variety of scenarios such as the use of cloud computing resources by smart devices or the use of city resources in an urban setting. Service requests may appear randomly over time and space with varying service requirements. It is important to efficiently allocate and price the available resources in order to provide a high quality of experience to the users and to generate high revenues for the cloud service provider. This book proposes revenue maximizing approaches to filter the requests dynamically and sets rules for allocation and pricing of available resources. The decisions are based on statistical modeling of the service requests and predictive analysis to schedule and assign resources to incoming requests.
The overarching goal of this book is to lay the theoretical foundations of decision and management science in IoT network design and operation. It leverages tools and theories from a diverse range of systems sciences such as mathematical epidemiology, spatial point processes, stochastic processes, optimal control theory, and optimization to address the challenges and problems at multiple levels across the IoT stack. In a nutshell, this book aims to close the gap between the theory of dynamic mechanism design and wireless and IoT systems. It also paves the way for the development of a comprehensive science for decision-making in the IoT networks. The proposed mechanisms in this book are envisioned to enable and support the development of smart and connected cities with features including resilient communications infrastructure, next generation emergency response, critical infrastructure security, sensing and data markets, etc. We hope that this book will provide a broad understanding of the multiple facets of resource management in the IoT ecosystem and will enable the readers to delve deeper in this interesting and rapidly evolving area of research.
Dearborn, MI, March 2021
Brooklyn, NY, March 2021
Junaid Farooq
Quanyan Zhu
We would like to acknowledge the support that we receive from our institutions: the University of Michigan-Dearborn and New York University (NYU). We also thank many of our friends and colleagues for their inputs and suggestions. Special thanks go to the members of the Laboratory of Agile and Resilient Complex Systems (LARX) at NYU, including Jeffrey Pawlick, Juntao Chen, Rui Zhang, Tao Zhang, Linan Huang, Yunhan Huang, and Guanze Peng. Their encouragement and support has provided an exciting intellectual environment for us where the major part of the work presented in this book was completed. We would also like to acknowledge support from several funding agencies, including the National Science Foundation (NSF), Army Research Office (ARO), and the Critical Infrastructure Resilience Institute (CIRI) at the University of Illinois at Urbana-Champaign for making this work possible.
Junaid Farooq and Quanyan Zhu
AI
Artificial Intelligence
AP
Access Point
AR
Augmented Reality
BS
Base Station
ISR
Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance
CDF
Cumulative Distribution Function
CI
Critical Infrastructure
CPS
Cyber-Physical Systems
CRN
Cognitive Radio Networks
CSMA
Carrier Sense Multiple Access
CSP
Cloud Service Provider
D2D
Device-to-Device
DDoS
Distributed Denial of Service
FSD
First-Order Stochastic Dominance
HVAC
Heating Ventilation and Air Conditioning
IC
Incentive Compatibility
IoBT
Internet of Battlefield Things
IoT
Internet of Things
IR
Individual Rationality
LPWA
Low-Power Wide-Area
MAC
Medium Access Control
MAP
Mobile Access Point
MC-IoT
Mission-Critical Internet of Things
MD
Mechanism Design
MSD
Mobile Smart Device
Probability Density Function
PMF
Probability Mass Function
PPP
Poisson Point Process
QoE
Quality of Experience
QoS
Quality of Service
RAN
Radio Access Network
RGG
Random Geometric Graph
RTT
Round Trip Time
SG
Stochastic Geometry
SINR
Signal-to-Noise-Plus Interference-Ratio
SIS
Susceptible-Infected-Susceptible
TF
Time-Frequency
ToI
Things of Internet
UAV
Unmanned Aerial Vehicle
VM
Virtual Machine
VMI
Virtual Machine Instance
VR
Virtual Reality
WAN
Wide Area Network
WDoS
Wireless Denial of Service
WPAN
Wireless Personal Area Network
Network-connected electronic devices are becoming an essential part of modern infrastructure systems to automate manual processes resulting in improved efficiency and productivity. The Internet of Things (IoT) is an interconnection of different types of devices (classified as sensors and actuators) using communication networks and computing systems to achieve such automated operation. The difference in IoT from traditional computing systems is their interaction with the physical world as opposed to just the cyber world. For instance, we have electronic devices controlling the temperature in smart buildings by sensing the environment and operating the heating, ventilation, and air conditioning (HVAC) systems. The IoT is in fact a massive network of cyber–physical systems (CPSs). Therefore, the cyber and physical components are an integral part of the emerging IoT ecosystem. The cyber and physical systems are coupled together in an intricate fashion where the cyber world influences decisions in the physical world and vice versa.
Figure 1.1 shows the structure of a typical IoT system. In essence, there are several actors involved in setting up the IoT ecosystem that includes sensing/actuating devices, firmware, radio access network (RAN), cloud server, mobile apps, and end user devices. The endpoint devices are made of embedded hardware that interact with the physical environment and are driven by software processes referred to as firmware or operating system. They make use of communication infrastructure, which is composed of access points, gateways, and core IP networks to connect to cloud servers, that in turn host applications and services, which are operated by users via computing devices, such as smart phones, smart watches, and voice assistants, etc.
Figure 1.1 IoT technology stack describing the different actors involved in setting up the IoT ecosystem.
IoT systems have a wide variety of application areas. Some of the IoT applications are highly delay-sensitive, e.g. real-time systems such as those involving artificial intelligence (AI), virtual reality (VR) and augmented reality (AR), real-time control loops, streaming analytics, etc. [121]. Such applications are referred to as mission-critical [158] not only due to conventional “life risk” interpretation but also pertaining to the risks of interruption of public services interruption, perturbing public order, jeopardizing enterprise operation and causing losses to businesses, etc. In mission-critical IoT (MC-IoT) applications, often a delay in communication may in fact fail the initial objective of the application. For instance, in a surveillance system where an unusual activity needs to be reported promptly to avoid any potential damage or loss of property and a report beyond a certain delay may be futile. Nevertheless, the traditional MC definition still holds and more so since IoT is also being rapidly integrated into these systems such as in public safety systems or other emergency networks [38] requiring dedicated resources at all times due to the unpredictability of unforeseen events.
The book is organized into six main parts. Part I provides a high level description of the IoT ecosystem and its main features; Part II provides an overview of the main design challenges facing the IoT systems and networks across different layers; Part III investigates and addresses the wireless connectivity challenge faced by the endpoint devices; Part IV tackles the networking layer challenges including information dissemination and message propagation over networks. Part V deals with the service provisioning and resource allocation problems in IoT for mission-critical service delivery. Finally, Part VI provides a broader view of the impact of this work along with a vision governing future research in this domain. Each part is further organized into multiple chapters. The main contributions of the book along with references to the relevant chapters are summarized in the following subsection.
This book takes a clean slate approach toward the design of IoT-enabled systems and networks. It uses a cross-layer perspective in decision-making across various avenues in the IoT ecosystem. Some of the main topics are presented in the following subsections.
In Chapter 5, a dynamic mechanism for spectrum reservation considering the uncertainty in available spectrum at each time and the uncertainty in the requirement for spectrum access is developed. We make use of tools from sequential screening [26] and mechanism design literature to establish a dynamic menu of contracts which comprise of an advanced payment for spectrum reservation in the future along with a rebate policy if the spectrum is released before the time of spectrum access. This allows the network operator to discriminate the unknown application types and generate higher profits than the traditional auction mechanisms where every application is completely aware of its true utility. A two-type categorization of IoT applications is considered where they are classified as either MC or non-MC and consequently an optimal binary contract is designed by the service provider. Based on assumptions on the distribution of utility of the MC and non-MC applications, closed form results for the optimal contracts are derived and the effect of system parameters is analyzed to gain insights.
In Chapter 6, a dynamic approach is used to configure robotic network nodes such as unmanned aerial vehicles (UAVs) to provide connectivity to IoT devices. Although the existing methodologies provide optimization based approaches to the UAV placement problem, this problem is dynamic in nature and hence a more holistic approach is required to obtain an efficient placement of the UAVs in real-time. In addition to effective initial deployment of UAVs, there is a need for an autonomic, self-organizing, and self-healing overlay network that can continuously adapt and reconfigure according to the constantly changing network conditions [23]. Therefore, a distributed and dynamic approach to providing resilient connectivity is essential to cope with the growing scale of the networks toward a massive IoT [44]. To this end, this book develops a feedback based distributed cognitive framework that maintains connectivity of the network and is resilient to the mobility of ground users and/or failures of the UAVs. The continuous feedback enables the framework to actively react to network changes and appropriately reconfigure the network in response to a failure event that has resulted in loss of connectivity. Simulation results demonstrate that if sufficient UAVs are available, they can be arranged into a desired configuration from arbitrary initial positions and the configuration continuously adapts according to the movement of the ground users as well as recovers connectivity under varying levels of a random UAV failure event.
In Chapter 7, a stochastic geometry (SG) based model is used to characterize the connectivity of wireless networks in adversarial environments such as battlefields. We then use an epidemic spreading model to capture the dynamic diffusion of multiple messages within the network of devices at the equilibrium state. A novel multiplex network model for Internet of battlefield things (IoBT) networks is proposed that helps in characterizing the intra-layer and network-wide connectivity of heterogeneous battlefield devices by considering the spatial randomness in their locations. A tractable framework is developed for quantification of simultaneous information dissemination in the multiplex IoBT network based on mathematical epidemiology that considers the perceived level of threat to the network from cyber–physical attacks. Approximate closed form results relating the proportion of informed devices at equilibrium and the network parameters are provided. The resulting integrated open-loop system model is used as a basis for reconfiguring the network parameters to ensure a mission-driven information spreading profile in the network. An optimization problem is formulated that can assist military commanders in identifying the physical network parameters that are required in order to sufficiently secure the network from the perceived attacks. It can also help in reconfiguring existing networks to achieve a desired level of communication reliability. A detailed investigation of the developed integrated framework is provided for particular battlefield missions, and the effect of threat level and performance thresholds is studied. This book bridges the gap between the spatial stochastic models for wireless networks and the dynamic diffusion models in contact-based biological networks to derive new insights that aid in the planning and design of secure and reliable IoBT networks for mission critical information dissemination. The developed framework, with some modifications, is also applicable to the more general class of heterogeneous ad-hoc networks.
In Chapter 8, novel methodologies are proposed to overcome the unique challenges of modeling and analyzing the crucial interplay between malware infection, control commands propagation, and device patching in wireless IoT networks. We leverage ideas from the theories of dynamic population processes [70] and point processes to setup a mean field dynamical system that captures the evolution of malware infected devices and control command aware devices over time. In general, obtaining tractable characterizations of the equilibrium state in such population processes is theoretically involved due to the self-consistent nature of the equations involved and the complex connectivity profile of the network. However, we propose a variation of the mean field population process model based on a customized state space that allows us to analyze the formation of botnets in wireless IoT networks and helps in making decisions to control its impact.
In Chapter 9, an adaptive and resilient dynamic resource allocation and pricing framework is developed for the context of cloud-enabled IoT systems. We present an optimal dynamic policy to filter incoming service requests by IoT applications based on the complexity of the tasks. The qualification threshold for tasks is adaptive to the number of available virtual machines (VMs), the arrival rate of requests, and their average complexity. The optimal policy can be dynamically updated in order to maintain high expected revenues of the cloud service provider (CSP). Furthermore, the proposed framework is also able to adapt according to the changing availability of the VMs due to reprovisioning of resources for other applications or due to the effect of malicious attacks.
In Chapter 10, a revenue maximizing perspective toward allocation and pricing in fog based systems designed for mission critical IoT applications is proposed. The quality-of-experience (QoE) resulting from the pairing of fog resources with computation requests is used as a basis for pricing. We develop a dynamic policy framework leveraging the literature in economics, mechanism design [51], and dynamic revenue maximization [52] to provide an implementable mechanism for dynamic allocation and pricing of sequentially arriving IoT requests that maximizes the expected revenue of the CSP. The developed optimal policy framework assists in both determining which fog node to allocate an incoming task to and the price that should be charged for it for revenue maximization. The proposed policy is statistically optimal, dynamic, i.e. adapts with time, and is implementable in real-time as opposed to other static matching schemes in the literature. The dynamically optimal solution can be computed offline and implemented in real-time for sequentially arriving computation requests.
In Chapter 11, the spatio-temporal aspect is combined with incomplete information about resource requests to devise an integrated resource provisioning framework. Ideas from the stochastic assignment of sequentially arriving tasks to workers [32] are enriched to encompass a more generic utility function that also incorporates the spatial dimension of the sequentially arriving requests. Statistical properties of utility maximizing spatial service requests are characterized using spatio-temporal Poisson processes and extreme value analysis. Analysis for a generalized utility function is done based on the distance from the source as well as the magnitude of the request. Special cases of the utility function are considered for numerical evaluations. An integrated and holistic policy framework is developed that is dynamically optimal and can act as the foundation for allocation and pricing in a wide variety of applications in the context of smart city applications. Finally, a comparison of the performance of the proposed resource provisioning framework is provided with benchmark allocation strategies.
The book has used a breadth of different notations for studying various theoretical models. In general, there has been an attempt to keep the notations consistent unless otherwise highlighted individually on a case-by-case basis. Some common notations used are presented as follows:
Double-struck symbols, e.g. , , etc. generally indicate sets or spaces, except , which represents the probability measure, and , which represents the expectation operator. The associated density and distribution functions are denoted by and , respectively. Upper case alphabets, e.g. etc. are generally used to represent random variables, while lower case alphabets indicate the value assumed by the random variables. The operator represents the cardinality of the set, while denotes the Euclidean norm. First derivative and second derivatives are denoted by and , respectively. Other notations apply to the chapters within which they are defined.
The Internet of Things (IoT) is becoming indispensable in the critical infrastructure (CI) systems such as in energy, transportation, communications, emergency services, public administration, defense, etc., due to their burgeoning scale and complexity. Furthermore, CIs may be interdependent, for instance, most CIs depend on energy systems and hence the energy systems may have a significant influence on the operation of other CIs. An illustration of the IoT-enabled infrastructure is provided in Figure 2.1