The advent of Network Function Virtualization(NFV)and Service Function Chains(SFCs)unleashes the power of dynamic creation of network services using Virtual Network Functions(VNFs).This is of great interest to network...The advent of Network Function Virtualization(NFV)and Service Function Chains(SFCs)unleashes the power of dynamic creation of network services using Virtual Network Functions(VNFs).This is of great interest to network operators since poor service quality and resource wastage can potentially hurt their revenue in the long term.However,the study shows with a set of test-bed experiments that packet loss at certain positions(i.e.,different VNFs)in an SFC can cause various degrees of resource wastage and performance degradation because of repeated upstream processing and transmission of retransmitted packets.To overcome this challenge,this study focuses on resource scheduling and deployment of SFCs while considering packet loss positions.This study developed a novel SFC packet dropping cost model and formulated an SFC scheduling problem that aims to minimize overall packet dropping cost as a Mixed-Integer Linear Programming(MILP)and proved that it is NP-hard.In this study,Palos is proposed as an efficient scheme in exploiting the functional characteristics of VNFs and their positions in SFCs for scheduling resources and deployment to optimize packet dropping cost.Extensive experiment results show that Palos can achieve up to 42.73%improvement on packet dropping cost and up to 33.03%reduction on average SFC latency when compared with two other state-of-the-art schemes.展开更多
A formal methodology is proposed to reduce the amount of information displayed to remote human operators at interfaces to large-scale process control plants of a certain type. The reduction proceeds in two stages. In ...A formal methodology is proposed to reduce the amount of information displayed to remote human operators at interfaces to large-scale process control plants of a certain type. The reduction proceeds in two stages. In the first stage, minimal reduced subsets of components, which give full information about the state of the whole system, are generated by determining functional dependencies between components. This is achieved by using a temporal logic proof obligation to check whether the state of all components can be inferred from the state of components in a subset in specified situations that the human operator needs to detect, with respect to a finite state machine model of the system and other human operator behavior. Generation of reduced subsets is automated with the help of a temporal logic model checker. The second stage determines the interconnections between components to be displayed in the reduced system so that the natural overall graphical structure of the system is maintained. A formal definition of an aesthetic for the required subgraph of a graph representation of the full system, containing the reduced subset of components, is given for this purpose. The methodology is demonstrated by a case study.展开更多
<div style="text-align:justify;"> <span style="font-family:Verdana;">Sensitivity analysis of neural networks to input variation is an important research area as it goes some way to addr...<div style="text-align:justify;"> <span style="font-family:Verdana;">Sensitivity analysis of neural networks to input variation is an important research area as it goes some way to addressing the criticisms of their black-box behaviour. Such analysis of RBFNs for hydrological modelling has previously been limited to exploring perturbations to both inputs and connecting weights. In this paper, the backward chaining rule that has been used for sensitivity analysis of MLPs, is applied to RBFNs and it is shown how such analysis can provide insight into physical relationships. A trigonometric example is first presented to show the effectiveness and accuracy of this approach for first order derivatives alongside a comparison of the results with an equivalent MLP. The paper presents a real-world application in the modelling of river stage shows the importance of such approaches helping to justify and select such models.</span> </div>展开更多
Saving energy and increasing network lifetime are significant challenges in wireless sensor networks (WSNs). In this paper, we propose a mechanism to distribute the responsibility of cluster-heads among the wireless...Saving energy and increasing network lifetime are significant challenges in wireless sensor networks (WSNs). In this paper, we propose a mechanism to distribute the responsibility of cluster-heads among the wireless sensor nodes in the same cluster based on the ZigBee standard, which is the latest WSN standard. ZigBee supports ad hoc on-demand vector (AODV) and cluster-tree routing protocols in its routing layer. However, none of these protocols considers the energy level of the nodes in the network establishing process or in the data routing process. The cluster-tree routing protocol supports single or multi-cluster networks. However, each single cluster in the multi-cluster network has only one node acting as a cluster head. These cluster-heads are fixed in each cluster during the network lifetime. Consequently, using these cluster-heads will cause them to die quickly, and the entire linked nodes to these cluster-heads will be disconnected from the main network. Therefore, the proposed technique to distribute the role of the cluster head among the wireless sensor nodes in the same cluster is vital to increase the lifetime of the network. Our proposed technique is better in terms of performance than the original structure of these protocols. It has increased the lifetime of the wireless sensor nodes, and increased the lifetime of the WSN by around 50% of the original network lifetime.展开更多
A combination of a cluster tree routing protocol and an Ad hoc on demand vector (AODV) routing protocol is used in the latest ZigBee standard wireless sensor networks (WSNs) technology.However,the AODV routing protoco...A combination of a cluster tree routing protocol and an Ad hoc on demand vector (AODV) routing protocol is used in the latest ZigBee standard wireless sensor networks (WSNs) technology.However,the AODV routing protocol has no means by which to take into consideration the power consumption of the nodes during the routing process.Therefore,a new approach is proposed in this paper to balance the power consumption speed and to distribute the responsibilities of routing among flat wireless sensor nodes and the three levels of hierarchical wireless sensor nodes.These three levels are based on the three types of devices,which are used in the ZigBee standard:the coordinator,the routers,and the end devices.In this paper,we have compared the original AODV routing protocol with our extension approach for the distribution of power consumption.Based on the simulation results,our new approach has achieved better performance in terms of increasing the lifetime of the flat wireless sensor network,the personal area network (PAN) coordinator,the routers,and the whole network of the hierarchical wireless sensor network.Additionally,it has better performance in terms of distributing the power consumption among the key nodes of the wireless sensor network.展开更多
Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web bas...Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web based applications. The mechanism incorporates the eXtensible Markup Language (XML) and Hierarchical Data Format (HDF) to provide a flexible and efficient data format. Heterogeneous transfer data is classified into light and heavy data, which are stored using XML and HDF respectively; the HDF data format is then mapped to Java Document Object Model (JDOM) objects in XML in the Java environment. These JDOM data objects are sent across computer networks with the support of the Java Remote Method Invocation (RMI) data transfer infrastructure. Client's defined data priority levels are implemented in RMI, which guides a server to transfer data objects at different priorities. A remote monitoring system for an industrial reactor process simulator is used as a case study to illustrate the proposed data transfer mechanism.展开更多
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke...Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.展开更多
The optimization of the network throughput and transmission range is one of the most important issues in cognitive relay networks (CRNs). Existing research has focused on the dual-hop network, which cannot be extend...The optimization of the network throughput and transmission range is one of the most important issues in cognitive relay networks (CRNs). Existing research has focused on the dual-hop network, which cannot be extended to a triple-hop network due to its shortcomings, including the limited transmission range and one-way communication. In this paper, a novel, triple-hop relay scheme is proposed to implement time-division duplex (TDD) transmission among secondary users (SUs) in a three-phase transmission. Moreover, a superposition coding (SC) method is adopted for handling two-receiver cases in triple-hop networks with a cognitive relay. We studied a joint optimization of time and power allocation in all three phases, which is formulated as a nonlinear and concave problem. Both analytical and numerical results show that the proposed scheme is able to improve the throughput of SUs, and enlarge the transmission range of primary users (PUs) without increasing the number of hops.展开更多
基金supported by the National Natural Science Foundation of China(NSFC)No.62172189 and 61772235the Natural Science Foundation of Guangdong Province No.2020A1515010771+1 种基金the Science and Technology Program of Guangzhou No.202002030372the UK Engineering and Physical Sciences Research Council(EPSRC)grants EP/P004407/2 and EP/P004024/1,and Innovate UK grant 106199-47198.
文摘The advent of Network Function Virtualization(NFV)and Service Function Chains(SFCs)unleashes the power of dynamic creation of network services using Virtual Network Functions(VNFs).This is of great interest to network operators since poor service quality and resource wastage can potentially hurt their revenue in the long term.However,the study shows with a set of test-bed experiments that packet loss at certain positions(i.e.,different VNFs)in an SFC can cause various degrees of resource wastage and performance degradation because of repeated upstream processing and transmission of retransmitted packets.To overcome this challenge,this study focuses on resource scheduling and deployment of SFCs while considering packet loss positions.This study developed a novel SFC packet dropping cost model and formulated an SFC scheduling problem that aims to minimize overall packet dropping cost as a Mixed-Integer Linear Programming(MILP)and proved that it is NP-hard.In this study,Palos is proposed as an efficient scheme in exploiting the functional characteristics of VNFs and their positions in SFCs for scheduling resources and deployment to optimize packet dropping cost.Extensive experiment results show that Palos can achieve up to 42.73%improvement on packet dropping cost and up to 33.03%reduction on average SFC latency when compared with two other state-of-the-art schemes.
基金This work was supported by the Royal Society in the UK (No.2004R1)An initial study appeared in Proceedings of IEEE International Conference on Systems,Man and Cybernetics,the Hague,Netherlands,pp.124-129,2004.
文摘A formal methodology is proposed to reduce the amount of information displayed to remote human operators at interfaces to large-scale process control plants of a certain type. The reduction proceeds in two stages. In the first stage, minimal reduced subsets of components, which give full information about the state of the whole system, are generated by determining functional dependencies between components. This is achieved by using a temporal logic proof obligation to check whether the state of all components can be inferred from the state of components in a subset in specified situations that the human operator needs to detect, with respect to a finite state machine model of the system and other human operator behavior. Generation of reduced subsets is automated with the help of a temporal logic model checker. The second stage determines the interconnections between components to be displayed in the reduced system so that the natural overall graphical structure of the system is maintained. A formal definition of an aesthetic for the required subgraph of a graph representation of the full system, containing the reduced subset of components, is given for this purpose. The methodology is demonstrated by a case study.
文摘<div style="text-align:justify;"> <span style="font-family:Verdana;">Sensitivity analysis of neural networks to input variation is an important research area as it goes some way to addressing the criticisms of their black-box behaviour. Such analysis of RBFNs for hydrological modelling has previously been limited to exploring perturbations to both inputs and connecting weights. In this paper, the backward chaining rule that has been used for sensitivity analysis of MLPs, is applied to RBFNs and it is shown how such analysis can provide insight into physical relationships. A trigonometric example is first presented to show the effectiveness and accuracy of this approach for first order derivatives alongside a comparison of the results with an equivalent MLP. The paper presents a real-world application in the modelling of river stage shows the importance of such approaches helping to justify and select such models.</span> </div>
文摘Saving energy and increasing network lifetime are significant challenges in wireless sensor networks (WSNs). In this paper, we propose a mechanism to distribute the responsibility of cluster-heads among the wireless sensor nodes in the same cluster based on the ZigBee standard, which is the latest WSN standard. ZigBee supports ad hoc on-demand vector (AODV) and cluster-tree routing protocols in its routing layer. However, none of these protocols considers the energy level of the nodes in the network establishing process or in the data routing process. The cluster-tree routing protocol supports single or multi-cluster networks. However, each single cluster in the multi-cluster network has only one node acting as a cluster head. These cluster-heads are fixed in each cluster during the network lifetime. Consequently, using these cluster-heads will cause them to die quickly, and the entire linked nodes to these cluster-heads will be disconnected from the main network. Therefore, the proposed technique to distribute the role of the cluster head among the wireless sensor nodes in the same cluster is vital to increase the lifetime of the network. Our proposed technique is better in terms of performance than the original structure of these protocols. It has increased the lifetime of the wireless sensor nodes, and increased the lifetime of the WSN by around 50% of the original network lifetime.
基金Applied Science University (ASU)-Faculty of Computer Science and Information Technology in the Hashemite Kingdom of Jordan for his Ph.D.study.
文摘A combination of a cluster tree routing protocol and an Ad hoc on demand vector (AODV) routing protocol is used in the latest ZigBee standard wireless sensor networks (WSNs) technology.However,the AODV routing protocol has no means by which to take into consideration the power consumption of the nodes during the routing process.Therefore,a new approach is proposed in this paper to balance the power consumption speed and to distribute the responsibilities of routing among flat wireless sensor nodes and the three levels of hierarchical wireless sensor nodes.These three levels are based on the three types of devices,which are used in the ZigBee standard:the coordinator,the routers,and the end devices.In this paper,we have compared the original AODV routing protocol with our extension approach for the distribution of power consumption.Based on the simulation results,our new approach has achieved better performance in terms of increasing the lifetime of the flat wireless sensor network,the personal area network (PAN) coordinator,the routers,and the whole network of the hierarchical wireless sensor network.Additionally,it has better performance in terms of distributing the power consumption among the key nodes of the wireless sensor network.
文摘Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web based applications. The mechanism incorporates the eXtensible Markup Language (XML) and Hierarchical Data Format (HDF) to provide a flexible and efficient data format. Heterogeneous transfer data is classified into light and heavy data, which are stored using XML and HDF respectively; the HDF data format is then mapped to Java Document Object Model (JDOM) objects in XML in the Java environment. These JDOM data objects are sent across computer networks with the support of the Java Remote Method Invocation (RMI) data transfer infrastructure. Client's defined data priority levels are implemented in RMI, which guides a server to transfer data objects at different priorities. A remote monitoring system for an industrial reactor process simulator is used as a case study to illustrate the proposed data transfer mechanism.
基金supported by Natural Science Foundation of China(Nos.61272204 and 61433006)the Fundamental Research Funds for the Central Universities,China(No.2013ZZGH006)
文摘Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.
基金Project supported by the Zhejiang Provincial National Natural Science Foundation (No. LQ14F020005), the National Natural Science Foundation of China (Nos. 61379123 and 61402414), and the Research Program of the Educational Commission of Zhej iang Province, China (No. Y201431815)
文摘The optimization of the network throughput and transmission range is one of the most important issues in cognitive relay networks (CRNs). Existing research has focused on the dual-hop network, which cannot be extended to a triple-hop network due to its shortcomings, including the limited transmission range and one-way communication. In this paper, a novel, triple-hop relay scheme is proposed to implement time-division duplex (TDD) transmission among secondary users (SUs) in a three-phase transmission. Moreover, a superposition coding (SC) method is adopted for handling two-receiver cases in triple-hop networks with a cognitive relay. We studied a joint optimization of time and power allocation in all three phases, which is formulated as a nonlinear and concave problem. Both analytical and numerical results show that the proposed scheme is able to improve the throughput of SUs, and enlarge the transmission range of primary users (PUs) without increasing the number of hops.