Research Article  Open Access
Xiaomei Zhang, Qiang Chen, Zhicai Shi, Jianru Liang, "FaultAware Resource Allocation for Heterogeneous Data Sources with Multipath Routing", Scientific Programming, vol. 2017, Article ID 9749581, 12 pages, 2017. https://doi.org/10.1155/2017/9749581
FaultAware Resource Allocation for Heterogeneous Data Sources with Multipath Routing
Abstract
With the rapid development of cloud computing and big data, diverse types of traffic generated from heterogeneous data sources are delivered throughout communication networks, which consist of various node kinds such as digital sensors and smart actuators, and different applications. Due to the shared medium, communication networks are vulnerable to misbehaving nodes, and it is a crucial aspect to maintain an acceptable level of service degradation. This paper studies the faultaware resource allocation problem by exploiting multipath routing and dynamic rate assignment for heterogeneous sources. We estimate the impacts of faults and formulate the resource allocation as a lossy network flow optimization problem based on these estimates. The traditional flow optimization solutions focus on homogeneous traffic. In our work, we model the performance of heterogeneous applications as a relaxed utility function and develop an effective utility framework of rate control for heterogeneous sources with multipath routing in presence of misbehaving nodes. We design a distributed algorithm to decide the routing strategy and obtain the rate assignments on the available paths in a lossy utility fair manner. Extensive performance evaluations corroborate the significant performance of our algorithm in effective utility and utility fairness in the presence of misbehaving nodes.
1. Introduction
With the rapid development of cloud computing and big data, communication networks where a wide variety of devices can be connected are increasingly used in dataintensive applications, such as video surveillance, robots, industrial process control, and mobile entities [1]. Various types of traffic generated from heterogeneous data sources have increasing growth in demand for efficient transmission services, for example, traditional data, audio, video, and multimedia delivery through the network [2]. Different qualityofservice (QoS) requirements of these services are specified in the form of application performance metrics, which are not easy to be guaranteed in the homogeneous network service architecture. Therefore, communication networks are expected to support heterogeneous data sources with diverse QoS requirements supporting.
Most existing designs of communication networks are based on the assumption that each node is well behaved and cooperative; and packet loss that does occur is mainly due to contention or congestion. Built upon open transmission mediums, communication networks are vulnerable to channel impairments, failure, interference and fading, and so on [3, 4]. Misbehaving nodes always exist along the available paths between sources and destinations. All of these can cause unreliable data transmission, lower effective data rate received successfully at the destination node, and unfairness between different sources [5]. The network performance is significantly degraded by misbehaving nodes particularly for data sources with tight qualityofservice requirements such as realtime provision in citywide wireless network [6]. How to maintain an acceptable level of network performance degradation for heterogeneous data sources still remains an open problem in the design of a communication network with the presence of misbehaving nodes.
The majority of antifault approaches make use of network redundancy. For example, reliable protocols may introduce multiple routing paths, different spectrums, or multiple wireless channels to curb the effects of malicious attacks or failures. In addition, multipath routing, which can be useful in enhancing the network performance, was actively studied in communication networks [7]. In this paper, we guarantee the QoS requirements based on the use of multiple routing paths. For various applications, higher effective throughput and better fairness offer better QoS. To make efficient utilization of this routing diversity, however, heterogeneous data sources must be able to perform an intelligent traffic allocation along the available paths while considering the potential impact of faults on the effective throughput.
In order to characterize the effect of misbehaving nodes on throughput, each source must rely on direct knowledge of the impact of faulty nodes in various parts of the network. Unfortunately, it is not an easy job to collect information on misbehaving nodes directly, in a realistic environment. Few current works consider uncertainties and dynamics in the adversarial environment. Most of them assume that the misbehavior is fixed with time. In fact, the extent of misbehaviors at each network node depends on many unknown parameters, including malicious nodes’ actions, schemes used by attackers, mobility patterns, and other unknown external/internal faults [8–10]. Hence, the impact of faulty nodes is probabilistic from the perspective of the network. We estimate the impact of jamming and characterize the effect of faults as a random process. Each source performs traffic allocation based on statistical information at probabilistic faulty nodes.
To provide better traffic management on multiple paths, Optimal Flow Control (OFC) approach [11], which is regarded as the most successful result in the area of traffic allocation, optimizes the sum utility of homogeneous traffic. Wang et al. [12] have shown that if various applications are run over a network, the OFC approach usually leads to an unfair traffic allocation according to the utility performance for heterogeneous traffic. The objective of heterogeneous applications is no longer to solely maximize the sum utility of the sources. Instead, it is supposed to meet different QoS requirements related to heterogeneous applications. In order to support different traffic types, we model application performance as a generic utility function by relaxing the utility function conditions. Explicitly taking account of misbehaviors’ effect, we generalize the OFC approach to obtain new problem formulations, namely, faultaware utility flow control (FUFC), which can optimize relaxed utilities of lossy flows on multiple routing paths, having the ability to handle a number of heterogeneous traffic.
In this article, we investigate the problem of resource allocation in multiplepath routing strategies for heterogeneous data sources in the event of faulty behaviors. We first model the effect of misbehaviors at each node as a random process due to the misbehavior dynamic and mobility. Owing to traversing over the probabilistic faulty paths, the flow at the destination node must be studied using a stochastic framework and smaller than that from the source node. We formulate this rate allocation as a lossy flow optimization problem for multipath routing while considering the thinning feature of data flows across faulty paths. In order to support heterogeneous traffic, we relax the utility function conditions in our lossy optimization problem. Then we design a distributed rate control algorithm that allocates source rate so that the performance of heterogeneous data sources is guaranteed. Each source has the ability to compensate for misbehaviors in network performance degradation across multiple routing paths in terms of utilities, rather than performance degradation in terms of rates. In this way, our algorithm improves the utility performance of heterogeneous sources according to different QoS requirements resulting in overall improvement in system performance.
The main contributions of this paper are outlined as follows:(i)We formulate the problem of allocating traffic across multiple routing paths in the presence of faulty nodes as a network lossy flow optimization problem which can optimize relaxed utilities, having the ability to handle heterogeneous traffic.(ii)We propose an approach which allows network nodes to locally characterize the impact of the nondeterministic and dynamic faulty behaviors and aggregate this information for the heterogeneous source nodes. Each source can introduce bias into rate allocation and routing decisions, leading to compensating for misbehaviors in network performance degradation in terms of utility return.(iii)We provide a novel distributed algorithm, FUFC, to be friendly with heterogeneous applications and allocate the effective rate in lossy utility fair manner.(iv)Through comprehensive performance comparisons, we demonstrate the considerable gains in network performance including higher effective throughput and better fairness among heterogeneous sources that can be achieved by our algorithm.
The rest of the paper is organized as follows. We depict our system model in Section 2. We propose methods that allow nodes to estimate the impact of misbehaviors and model the leakypath flow in Section 3. In Section 4, we present the faultaware utility flow control approach with multipath routing. The performance of our algorithm is evaluated in Section 5. Finally, we describe the related work in Section 6 and conclude the paper in Section 7.
2. System Model and Assumptions
2.1. Network Model
We consider a network with a set of links of capacity , , and a set of nodes. We denote a link as a pair of nodes , where is the transmitter of the link and is the receiver. The network is shared by a set of sources, and . Each source has available paths or routes from the source to destination. Denote vector the set of links used by source on its path , whose th element is equal to if and only if the path passes through link and otherwise. Then the set of all the available paths of source is defined by and the whole set of paths in the network is defined by a routing matrix where is the total number of paths.
Denote the vector as the set flow ’ paths pass through link , whose th element is equal to 1 if the path of flow contains link , and 0 otherwise. For each source , define be the rate of source on the path , and obviously the total source rate , where , where and are the required minimum and maximum source rate, respectively. Letbe the corresponding vector of all path rates of all sources and let the vector denote the set of all path rates of source .
Figure 1 illustrates an example network of the sources . Each source consists of multiple routing paths:
For communication networks, usually, users focus on source rate and throughput at the destination node. However, since networks consist of various node types or modalities, as shown in Figure 1, there may exist different applications with diverse utility behaviors. Each application uses its utility as a measure of the QoS performance in terms of provided services. Regardless of the types of sources, we assume that utility is achieved by the traffic as a function of its rate . More generally, utilities of multiple applications can be categorized as follows in terms of performance goal perspectives [12]:(i)Elastic utility for traditional data services such as file transfer, mail, and ftp;(ii)Realtime utility for delaysensitive services such as video surveillance, realtime monitoring, and teleconferencing;(iii)Rateadaptive utility for realtime rateadaptive services which are able to adjust their rates dynamically;(iv)Stepwise utility for other types of services such as audio and video delivery services via a layered encoding and transmission model.
2.2. Misbehaving Node Model
In this article, we assume that the source nodes have no prior knowledge of the abnormal behaviors of nodes: failures of internal components, or some external attacks/interferences in the adversarial environment. That is, we make no assumption about the strategy used by malicious nodes, mobility patterns, or misbehaviors’ goals. Instead of basing on direct of knowledge of the misbehaviors, we suppose that the network nodes characterize the impact of faulty behaviors in terms of their direct impact on throughput. We assume that packet loss occurs not due to contention or congestion but misbehaving nodes, since the former can be managed by the provision of the underlying network protocols. With the existence of misbehaving nodes, the increased packet loss ratio of each node usually occurs, which is caused by the increased probability of collisions for the transmission mechanism. Network nodes can then incorporate the information to the decision of source nodes’ optimal rate allocation and routing.
3. Estimating the Impact of Misbehaviors and Models for LeakyPath Flows
In this section, we provide methods for the network node to estimate and characterize the impact of misbehaviors and for a source node to obtain misbehavior information. Before incorporating the impact into traffic allocation and routing, each node must estimate the effect of misbehaviors on transmissions over link and relay it to source . In the presence of misbehaving nodes, the increased probability of collisions usually leads to the increased packet loss ratio of each link for the transmission mechanism. Due to the impact of misbehaviors, network links are lossy in nature. Consequently, the flow rate turns into lower and lower across its routing path called leakypath, and the effective data rate received successfully at the destination node is lower than the transmission rate at the source. To study this, we present the models for lossy links and leakypath flows in the following.
3.1. Estimating the Impact of Misbehaviors
In this paper, we assume that packet loss or corruption occurs only due to faulty nodes since contention or congestion can be controlled by the provision of the underlying network protocols. Although a faulty node may perform various malicious behaviors, any good node exhibits the same behavior: delivering packets correctly. During the updated period represented by the time interval , each node can record the number of packets received over link and the number of valid packets which pass an error detection check. As the network has no knowledge of the misbehaving nodes actions, the impact of fault is uncertain and probabilistic from the perspective of the network. The behavior of node is formulated as a random variable . The outcomes of are defined as follows: The packet delivery ratio over each link can be formulated as a random variable using statistics from node . Due to the packet loss in faulty links, the data rate of a flow becomes thinner and thinner along its routing path. For a routing path, the behavior of a path can also be formulated as a random variable . The outcomes of are defined as follows:
Then, the packet delivery ratio over node can itself be characterized as , a random variable using statistics from past network communication, due to the network’s uncertainty in the faulty node’s action. During the time interval , each node records the number of packets received over links, and the number of valid packets. The packet delivery probability over link () for the update period is thus equal to the ratio In order to reduce significant variation, and to include memory of misbehaviors history, we update the estimation through the previous estimate as where is a constant weight representing the relative preference between recent and historic samples. The constant time interval influences the quality of the estimate process. If the interval is too large, the estimate result will be outdated and cost more time. Otherwise, the dynamics of misbehaviors can not be captured, and the result of is not accurate enough. Hence, the choice of depends on the application scenarios. We use a similar estimation procedure to update the variance : where is a constant weight and is the sample variance of packet delivery ratios computed using (7) during the time interval . The node collects sample values during time interval . Hence, the time interval should be larger than the time interval .
Given the packet delivery ratio estimates for the links in the routing path , the source needs to estimate the effective endtoend packet delivery probability. The endtoend packet success ratio for the path can be formulated as which is also a random variable due to the randomness in variable . We let denote as the mean of random variable which is equal to the product of estimations :
Let denote the subpath of from source to the intermediate node and denote the subpath of from the intermediate node to the destination node of . The estimated packet delivery ratio of subpath can be computed using (10):
The covariance is similar given by
3.2. LeakyPath Flow Model
Due to misbehaviors at nodes along the path, the effective rate is potentially reduced at each intermediate receiving node since data packets are lost. At a link in the routing path with transmission source rate , data is only received correctly on . We define the goodput of a flow as the effective data rate received successfully at its destination node [13]. For a flow from source traversing multiple hops, the goodput received at the destination node is given by where is the transmission rate at the source and is the set of links along the route. It can be seen that the data rate of a flow declines every hop along its routing path, and it is in this sense that we call it a leakypath flow.
To define a set of constraints for the multipath rate allocation problem, we must consider the resource constraints and the reduction of data flow due to misbehaviors at intermediate nodes. The resource constraint in necessary conditions of network utility maximization was that the average data rate should be no more than average capacity of each link. We next generate the stochastic constraint through incorporating the fault statistics into the link capacity constraint. For a communication network under probabilistic misbehaviors, the data flow rate is reduced along each path with increased the hops from source . Hence, if the data flow rate at the source is chosen without considering the packet loss by misbehaviors, the actual aggregate rate may not be tightly bounded by the average capacity, where . Thus at the node of path , the goodput is given by . The stochastic constraint is thus imposed by the capacity constraint on the total traffic traversing a link which can be given as follows:
In order to compensate for the randomness in (15), we use the expected value and variance to replace the packet delivery ratio . The mean and variance of can be computed using (12) and (13), respectively. We replace with the statistic value , where constant . The link constraint can be expresses by
A principal objective in optimal flow control problem formulation is to maximize the overall effective network utility of all flows from different sources:orwhere is the associated utility as a measure of performance (or equivalently QoS).
4. FaultAware Utility Flow Control with Multipath Routing
4.1. Utility Framework for Fair Flow Control
Even though the optimal flow control approach has made a success in dealing with resource allocation, it also processes serious limitations when different types of traffic exist in the network. If each source selects different utility functions with different QoS requirements, OFC may cause utility unfairness among contending users for practical use. Since the source with high demand may receive a low resource, this results in applications receiving low utility.
In bigdata communication networks, sources with different traffic types offer various valuable information regarding the environment. In order to support numerous applications with different utility demands, the flow control strategy should have the ability to allocate traffic rates properly in order to balance the performance for different applications. When considering different QoS requirements of heterogeneous sources, it can not meet the practical demand to allocate source rate simply in terms of conventional fairness criteria. Therefore, we design a utility framework of fair flow control, which allocates source rate according to the different QoS utilities.
In this framework, each source attains a utility , where is the source rate. The utility function is assumed to be continuous, strictly increasing, and bounded in the interval . We define a “pseudo utility” as . The goal is to maximize the sum of the pseudo utility
We generalize the OFC approach to obtain new problem formulations, namely, utility optimal flow control (UFC), which replace the conventional utility function with pseudo utility .
The demand for different QoS utilities also motivates a new concept of the utility maxmin fairness [14].
Definition 1. A source rate allocation is utility maxmin fair, if it is feasible and for each source , the utility cannot be increased while maintaining feasibility, without decreasing the utility for some source with a lower utility .
The definition shows that we should design rate control protocols that try to achieve fairness in terms of utilities, rather than fairness in terms of rates. For heterogeneous sources, the utilities, rather than source rates, are meaningful metrics of QoS for the applications.
To apply the UFC in faultaware wireless networks, one needs to specify the resource constraints as in (19). Due to the faulty nodes existence on the routing path, the traffic rate is potentially decreased at each receiver as faulty nodes are lossy. Then the UFC operates over faulty links as follows: at each link, the link resource constraint is calculated as in (19), but using the total actual received rate at the link, not the sum of the original rates; and the source node updates the flow rate according to the feedback parameter of resource constraints along its route. This straightforward application of the UFC framework takes account of the faulty links, but only in the way the feedback parameters are computed. The lossy nature of the routing path is not considered in the objective function in the UFC problem itself. In the following section, we will propose the faultaware utility flow control algorithm, which takes account of the lossy nature of the faulty paths in the objective function and constraints, to achieve lossy utilitybased fairness for heterogeneous sources and study the properties in detail.
4.2. FaultAware Utility Flow Control Algorithm with Multiple Paths
Since the optimization framework of utility flow control is primarily developed for faultfree network environments, it cannot be directly applied to adversarial environments. In order to guarantee the network performance in the presence of misbehaving nodes, we provide the lossy optimization framework of utility flow control based on leakypath model. The objective in this problem formulation is to maximize the overall pseudo utility of all effective flows, subject to the link capacity including expected packet loss due to misbehaviors. Then we have the following optimization problem:
The Lagrangian function can be defined as
Here, , , , and are all nonnegative. The objective function of the dual problem is given by
In terms of the ArrowHurwicz gradient method [15], we can obtainwhere is a small step size and is the path price, which is composed of the link prices along the particular route. Then the objective function of the dual problem is then
The Lagrangian multipliers for the dual can be computed by the gradient method, as follows:
We present our design of distributed algorithm based on proximal optimization steps for solving the utility maxmin fair flow control with multiple paths problem. The FUFC algorithm for heterogeneous sources with multiple routing paths can be summarized in Algorithm 1.

For each source with multiple paths, the property of updating formulations can easily lead to the oscillations in the Lagrangian algorithm. Since this kind of oscillation is detrimental to network control, we introduce an augmented variable to solve the oscillation problem. The following modified objective function is used to replace the objective function of formulation (20):
Denoting as the optimal value of (20), the optimal value of the utility maximization problem with objective function (28) is , . Therefore, (23) is slightly modified by applying the new objective function:
4.3. Lossy Utility MaxMin Fairness
Based on the assumption of nonadversarial environments, each node in the network is wellbehaved and . Our distributed algorithm with can allocate rates to achieve the utility maxmin fairness among sources. The path rate algorithm of (23) simplifies to
We can obtain that or at convergence. In steady state, nodes attain a normal utility . Let denote the set of nodes which have at least one path rate by the link price . Let us first consider the highest link price ; all the sources get the smallest utility . They are feasible and no source utility can be increased without decreasing another source utility that has the maximum price . So for these flows with price , they are utility maxmin fair.
Then we consider the second highest link price . All the sources attain the same utility . No source utility can be increased without decreasing another source utility of having a lower utility . All other flows traversing this link will be assigned a price of and equally share the remaining utility, which is also a utility maxmin fair allocation.
Let us keep selecting all the link prices in the order ; it is concluded that the algorithm with allocates source rate in utility maxmin fair manner and that the global fairness is achieved.
When , the source rate in our algorithm can achieve utility maxmin fairness, while the source rate can achieve lossy utility maxmin fairness with . The following corollary establishes that utility maxmin fair solutions also have the convergence property as loss ratios tend to zero.
Corollary 2. As the node fault ratio drop to zero: , lossy utility maxmin fair solutions converge to the lossless utility maxmin fair solution.
The continuity of solutions can be proved using standard techniques in convergence analysis of PompeiuHausdorff distance [13]. For the sake of limited space, we omit the proof here.
With the rapid process of Internet of Things and smart cities, the nature of the network is gradually evolving heterogeneously. There are various types of nodes, such as camera, robots, and mobile entities, in distributed heterogeneous systems. Our approach caters for a variety of service performance metrics related to heterogeneous sources. The network performance and QoS requirements are guaranteed through providing both effective throughput and fairness among various sources. We show the numerical results of our proposed algorithm in the following section.
5. Performance Evaluations
In this section, we evaluate through simulations the performance of our proposed rate control algorithm with multiple routing paths in two case studies. In the first case, we apply our flow control algorithm to a specific multipath communication network and demonstrate the dynamics of behaviors. We use numerical examples to illustrate the advantage of the FUFC over the UFC approach without considering the impact of faulty nodes. In the second case, we extend the scale of network topology in order to observe the performance trends and shows the convergence of utility fair flow control solutions established in Section 4.
We consider two network cases with four heterogeneous sources , , , and which support multiple services with different QoS requirements. Therefore, we set utility functions consisting of heterogeneous traffic. The utility function of each source node with source rate is given as , , , and . The linear utility function represents that the satisfaction of an application increases linearly. The logarithmic utility function corresponds to the realtime application which the sigmoidal function approximates.
Each fault parameter is modeled as an independent beta random variable with parameters as . For example, has corresponding parameters and . Other simulation parameters are summarized in Table 1.

5.1. Case 1
In this case, we show how our FUFC protocol can provide effective flow control with the existence of misbehaving nodes. The proposed FUFC protocol is benchmarked against the standard utility flow control (UFC) protocol [12]. Figure 2 depicts the topology of the network with 7 links, 6 nodes, and four sources , , , and . routes its flow along two paths () with path rate , and () with path rate . routes its flow along two paths, () with path rate , and () with path rate . routes its flow along two paths () with path rate , and () with path rate . routes its flow along a single path () with path rate .
We denote that is the data rate of one flow at the source node, and as the goodput at the destination node. Note the time scale in all the relevant figures is in terms of number of iterations. In the UFC approach, we use the algorithm in Problem (19) calculated based on the flow rate on each link and link price on each path. Figure 3 shows the utility of flow rates at four source nodes using the UFC approach. Two utilities of and of converge to 0.9876, while of and of converge to 0.6381. Without considering the effect of faulty links, the algorithm computes and to share the bottleneck resource with an equal utility. The UFC approach provides a utility maxmin fair resource allocation in which is equal to , and is equal to of their source rates .
In fact, the effective utilities of four flows cannot maintain the utility fairness at their destination node after traveling along the leakypaths. The effective utilities of goodput for four sources in the UFC approach are depicted in Figure 4. The effective utilities decrease to 0.9099, 0.5756, 0.8075, and 0.6023 among four sources. For FUFC, the effective rates in Algorithm 1 are shown in Figure 5. It can be seen that FUFC yields higher effective utilities (0.987, 0.6381, 0.9883, and 0.6381) for four sources than UFC. We take a closer look at utility allocation among flows and effective flows in Figures 4 and 5. In Figure 3, four flows share a maxmin fair utility allocation of source rate that of is equal to of , and of is equal to of . However, the utility fairness is broken due to different faulty effects on four paths by faulty links. of and of are lower than of and of , respectively, in Figure 4. In Figure 5, the effective utilities of and of in FUFC are closer to each other than those in the UFC approach. The same situation happens in of and of . It demonstrates that better utility fairness is attained among effective flow rates by FUFC.
Figures 6 and 7 report the goodput at the destination node of UFC and FUFC, respectively. It can be seen that FUFC yields higher effective rates (6.185, 3.619, 8.196, and 6.381) for flows than UFC with goodput (5.156, 2.976, 6.717, and 6.023). This is because in our algorithm, multiple source nodes allocate traffic across multiple routing paths adaptively to compensate for faulty nodes, whose effects on throughput are taken into account in utility functions and constraints. Thus the network performance in presence of faulty nodes is improved through higher effective utility, higher effective throughput, and better utility fairness among effective flows by our algorithm FUFC.
5.2. Case 2
We investigate the performance while increasing faulty links from 1 to 8 between and , and , and , and and in the network of Case . Consider a wireless network given in Figure 8 where each flow travels multiple hops.
With an increasing number of links, the equilibrium utilities and of effective flow over the above paths of four sources for both UFC and FUFC are plotted in Figure 9. As the number of links increases, the effective utilities of goodput in both UFC and FUFC decline. Clearly, the effective utility of FUFC can be significantly higher than that of UFC. Meanwhile, the effective utilities of the flows in FUFC are closer to each other than those in the UFC approach, indicating that better fairness among effective utilities is achieved by FUFC. The gain of FUFC over UFC increases as the number of hops increases. Each source increases its flow rate adaptively to compensate for the higher data loss as the number of hops increases.
We can see from Figure 10 that, with decreasing the number of faulty links, the rate allocation is convergent to the rate allocation in wireless lossless condition. As discussed in Section 4, the rate region in our algorithm converges to the rate region in the corresponding lossless network while a sequence of link loss rate converges to zero (the number of faulty links converges to zero). The lossy utility maxmin fairness can be achieved in our algorithm and converges to the corresponding lossless fairness with a sequence of loss rates converging to 0 in Figure 11. Figures 10 and 11 show the trends of rate region and utility fairness of four sources.
6. Related Work
There has been much work on resource allocation approaches for providing reliable transmissions (see, e.g., [16–18]). Some of these approaches are obtained as distributed solutions to an optimization problem first motivated by Kelly et al. in [11], with setting fixed reliability constraints. Saad et al. focus on effective rate allocation by maximizing the network utility with qualityofservice (QoS) constraints [18]. Hosseinabadi and Vaidya allocate data rates using a crosslayer approach with the presence of misbehavior nodes [16]. To ensure secure communication, [17] formulate resource allocation as an optimization problem considering QoS metrics and artificial noises. Their work, however, is unable to adjust the effective rate and fairness adaptively in terms of the actual receiveresource at destination nodes. In our work, we define effective utility function associated with the effective rate at receivers and make the fairness objectives involve in optimization problem. Thus, our flow control approach could maintain an acceptable level of network performance degradation through getting better fairness and more effective utility in the presence of misbehaving nodes.
Existing techniques for secure communication under misbehaving nodes provide methods for reaction to misbehaviors by classifying each receiving node as either faulty or regular. For example, the authors of [19] provide a technique to divide the network links into reliable and unreliable ones and route around the region of the network being faulty, and the authors of [20] propose an approach to detect misbehaving nodes and perform coordinated channelhopping. However, the state of being faulty at each node is uncertain under random attacks, smart attacks, or stochastic software/hardware failures. Our approach incorporates the impact of potential dynamic faults into the traffic allocation and routing protocol and provides sufficient protection from stationary failures, mobile interferences, and the uncertain losses from the various environments.
Rate control stack design has been studied for the Internet in the 90s. Recently, rate control mechanisms for wireless networks are studied in [21–23]. The basic idea is that each application attains concave utility function and, thus, is appropriate only for homogeneous traffic. Further, Lee et al. [24] show that instability may be caused by heterogeneous traffic without appropriate rate controllers. Wang et al. [12] have provided a rate control framework that is able to deal with various types of traffic, such that the resulting utility is proportional fair. All these results are based on the assumption of nonadversarial environments where each wireless node is cooperative and wellbehaved.
7. Conclusion
In this paper, we studied the problem of traffic allocation across multiple routing paths for heterogeneous data sources in the presence of misbehaving nodes whose effects can be characterized statistically. We have presented methods for each network node to estimate the impact of misbehaving nodes and for data sources to these estimates into our traffic allocation and routing algorithm. We formulated multiplepath traffic allocation as a lossy network flow optimization problem based on leakypath model. In order to handle heterogeneous traffic, we extended the concept of solving the lossy network flow optimization problem which maximizes effective relaxed utility function and proposed a FUFC algorithm to allocate the effective rate in lossy utility fair manner. We showed that considerable gains in effective network utility and utility fairness among heterogeneous sources are achieved by the FUFC approach.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
Acknowledgments
This work was supported by the Program of Shanghai Shentong Metro Group Co., Ltd., “The Research on Safety Control and Detection Devices for Centralized Shielding Doors”(Grant no. JSKY13R0362).
References
 C. Yang, C. Liu, X. Zhang, S. Nepal, and J. Chen, “A time efficient approach for detecting errors in big sensor data on cloud,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 2, pp. 329–339, 2015. View at: Publisher Site  Google Scholar
 M. Díaz, C. Martín, and B. Rubio, “Stateoftheart, challenges, and open issues in the integration of internet of things and cloud computing,” Journal of Network and Computer Applications, vol. 67, pp. 99–117, 2016. View at: Publisher Site  Google Scholar
 R. He, H. Rutagemwa, and X. Shen, “Differentiated reliable routing in hybrid vehicular adhoc networks,” in Proceedings of the IEEE International Conference on Communications, (ICC '08), pp. 2353–2358, Beijing, China, May 2008. View at: Publisher Site  Google Scholar
 R. Mitchell and I.R. Chen, “Behavior rule specificationbased intrusion detection for safety critical medical cyber physical systems,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 16–30, 2015. View at: Publisher Site  Google Scholar
 J. M. Gormally and R. L. Richards, “Application layer protocols for disruption tolerant remote sensor SATCOM links,” in Proceedings of the 33rd Annual IEEE Military Communications Conference, (MILCOM '14), pp. 975–982, Baltimore, MD, USA, October 2014. View at: Publisher Site  Google Scholar
 A. Hava, Y. GhamriDoudane, G.M. Muntean, and J. Murphy, “Increasing user perceived quality by selective load balancing of video traffic in wireless networks,” IEEE Transactions on Broadcasting, vol. 61, no. 2, pp. 238–250, 2015. View at: Publisher Site  Google Scholar
 L. Chen and J. Leneutre, “On multipath routing in multihop wireless networks: security, performance, and their tradeoff,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, no. 1, Article ID 946493, 2009. View at: Publisher Site  Google Scholar
 W. Wang, M. Chatterjee, K. Kwiat, and Q. Li, “A game theoretic approach to detect and coexist with malicious nodes in wireless networks,” Computer Networks, vol. 71, pp. 63–83, 2014. View at: Publisher Site  Google Scholar
 R. Mitchell and I.R. Chen, “Behaviorrule based intrusion detection systems for safety critical smart grid applications,” IEEE Transactions on Smart Grid, vol. 4, no. 3, pp. 1254–1263, 2013. View at: Publisher Site  Google Scholar
 V. Karyotis, S. Papavassiliou, and B. Maglaris, “Modeling framework for the study and analysis of mobile attack propagation in wireless adhoc networks,” in Proceedings of the 12th European Wireless Conference on Enabling Technologies for Wireless Multimedia Communications, European Wireless 2006, Athens, Greece, April 2006. View at: Google Scholar
 F. P. Kelly, A. K. Maulloo, and D. Tan, “Rate control for communication networks: shadow prices, proportional fairness and stability,” Journal of the Operational Research Society, vol. 49, no. 3, pp. 237–252, 1998. View at: Google Scholar
 W. H. Wang, M. Palaniswami, and S. H. Low, “Applicationoriented flow control: fundamentals, algorithms and fairness,” IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 1282–1291, 2006. View at: Publisher Site  Google Scholar
 V. G. Subramanian, K. R. Duffy, and D. J. Leith, “Existence and uniqueness of fair rate allocations in lossy wireless networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 7, pp. 3401–3406, 2009. View at: Publisher Site  Google Scholar
 Z. Cao and E. W. Zegura, “Utility maxmin: an applicationoriented bandwidth allocation scheme,” in Proceedings of the IEEE 18th Annual Joint Conference of Computer and Communications Societies (INFOCOM '99), vol. 2, pp. 793–801, NY, USA, March 1999. View at: Publisher Site  Google Scholar
 K. J. Arrow, L. Hurwicz, and H. Uzawa, Studies in Linear And NonLinear Programming, Stanford University Press, Palo Alto, Calif, USA, 1958. View at: MathSciNet
 G. Hosseinabadi and N. Vaidya, “Selfish misbehavior in scheduling algorithms of wireless networks,” CRHC, University of Illinois at UrbanaChampaign, Albuquerque, NM, USA, http://www.crhc.illinois.edu/wireless/papers/techreportGhazaleSelfishCrossLayeredMarch.pdf. View at: Publisher Site  Google Scholar
 D. W. K. Ng, E. S. Lo, and R. Schober, “Secure resource allocation and scheduling for OFDMA decodeandforward relay networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 10, pp. 3528–3540, 2011. View at: Publisher Site  Google Scholar
 M. Saad, A. LeonGarcia, and W. Yu, “Optimal network rate allocation under endtoend qualityofservice requirements,” IEEE Transactions on Network and Service Management, vol. 4, no. 3, pp. 40–49, 2007. View at: Publisher Site  Google Scholar
 M. H. Eiza, Q. Ni, T. Owens, and G. Min, “Investigation of routing reliability of vehicular ad hoc networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2013, 2013. View at: Publisher Site  Google Scholar
 G. Yan, S. Olariu, and M. C. Weigle, “Providing location security in vehicular Ad Hoc networks,” IEEE Wireless Communications, vol. 16, no. 6, pp. 48–55, 2012. View at: Publisher Site  Google Scholar
 M. Chiang, S. H. Low, A. R. Calderbank, and J. C. Doyle, “Layering as optimization decomposition: a mathematical theory of network architectures,” Proceedings of the IEEE, vol. 95, no. 1, pp. 255–312, 2007. View at: Publisher Site  Google Scholar
 Y. Xue, B. Li, and K. Nahrstedt, “Optimal resource allocation in wireless ad hoc networks: a pricebased approach,” IEEE Transactions on Mobile Computing, vol. 5, no. 4, pp. 347–364, 2007. View at: Publisher Site  Google Scholar
 X. Zhang, X. Dong, N. Xiong, J. Wu, and X. Li, “Faultaware flow control and multipath routing in VANETs,” PeertoPeer Networking and Applications, vol. 8, no. 6, pp. 1090–1107, 2015. View at: Publisher Site  Google Scholar
 J.W. Lee, R. R. Mazumdar, and N. B. Shroff, “Nonconvex optimization and rate control for multiclass services in the internet,” IEEE/ACM Transactions on Networking, vol. 13, no. 4, pp. 827–840, 2005. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2017 Xiaomei Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.