Table of Contents Author Guidelines Submit a Manuscript
Scientific Programming
Volume 2017, Article ID 9749581, 12 pages
https://doi.org/10.1155/2017/9749581
Research Article

Fault-Aware Resource Allocation for Heterogeneous Data Sources with Multipath Routing

School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, 333 Long Teng Road, Shanghai 201620, China

Correspondence should be addressed to Xiaomei Zhang; moc.liamtoh@uncc_mxz

Received 1 March 2017; Accepted 24 April 2017; Published 17 September 2017

Academic Editor: Chi-Hung Chi

Copyright © 2017 Xiaomei Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. Yang, C. Liu, X. Zhang, S. Nepal, and J. Chen, “A time efficient approach for detecting errors in big sensor data on cloud,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 2, pp. 329–339, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. M. Díaz, C. Martín, and B. Rubio, “State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing,” Journal of Network and Computer Applications, vol. 67, pp. 99–117, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. R. He, H. Rutagemwa, and X. Shen, “Differentiated reliable routing in hybrid vehicular ad-hoc networks,” in Proceedings of the IEEE International Conference on Communications, (ICC '08), pp. 2353–2358, Beijing, China, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  4. R. Mitchell and I.-R. Chen, “Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 16–30, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. J. M. Gormally and R. L. Richards, “Application layer protocols for disruption tolerant remote sensor SATCOM links,” in Proceedings of the 33rd Annual IEEE Military Communications Conference, (MILCOM '14), pp. 975–982, Baltimore, MD, USA, October 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. A. Hava, Y. Ghamri-Doudane, G.-M. Muntean, and J. Murphy, “Increasing user perceived quality by selective load balancing of video traffic in wireless networks,” IEEE Transactions on Broadcasting, vol. 61, no. 2, pp. 238–250, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. L. Chen and J. Leneutre, “On multipath routing in multihop wireless networks: security, performance, and their tradeoff,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, no. 1, Article ID 946493, 2009. View at Publisher · View at Google Scholar
  8. W. Wang, M. Chatterjee, K. Kwiat, and Q. Li, “A game theoretic approach to detect and co-exist with malicious nodes in wireless networks,” Computer Networks, vol. 71, pp. 63–83, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. R. Mitchell and I.-R. Chen, “Behavior-rule based intrusion detection systems for safety critical smart grid applications,” IEEE Transactions on Smart Grid, vol. 4, no. 3, pp. 1254–1263, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. V. Karyotis, S. Papavassiliou, and B. Maglaris, “Modeling framework for the study and analysis of mobile attack propagation in wireless ad-hoc networks,” in Proceedings of the 12th European Wireless Conference on Enabling Technologies for Wireless Multimedia Communications, European Wireless 2006, Athens, Greece, April 2006. View at Scopus
  11. F. P. Kelly, A. K. Maulloo, and D. Tan, “Rate control for communication networks: shadow prices, proportional fairness and stability,” Journal of the Operational Research Society, vol. 49, no. 3, pp. 237–252, 1998. View at Google Scholar
  12. W. H. Wang, M. Palaniswami, and S. H. Low, “Application-oriented flow control: fundamentals, algorithms and fairness,” IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 1282–1291, 2006. View at Publisher · View at Google Scholar · View at Scopus
  13. V. G. Subramanian, K. R. Duffy, and D. J. Leith, “Existence and uniqueness of fair rate allocations in lossy wireless networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 7, pp. 3401–3406, 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. Z. Cao and E. W. Zegura, “Utility max-min: an application-oriented bandwidth allocation scheme,” in Proceedings of the IEEE 18th Annual Joint Conference of Computer and Communications Societies (INFOCOM '99), vol. 2, pp. 793–801, NY, USA, March 1999. View at Publisher · View at Google Scholar
  15. K. J. Arrow, L. Hurwicz, and H. Uzawa, Studies in Linear And Non-Linear Programming, Stanford University Press, Palo Alto, Calif, USA, 1958. View at MathSciNet
  16. G. Hosseinabadi and N. Vaidya, “Selfish misbehavior in scheduling algorithms of wireless networks,” CRHC, University of Illinois at Urbana-Champaign, Albuquerque, NM, USA, http://www.crhc.illinois.edu/wireless/papers/tech-report-Ghazale-SelfishCrossLayered-March.pdf. View at Publisher · View at Google Scholar
  17. D. W. K. Ng, E. S. Lo, and R. Schober, “Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 10, pp. 3528–3540, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Saad, A. Leon-Garcia, and W. Yu, “Optimal network rate allocation under end-to-end quality-of-service requirements,” IEEE Transactions on Network and Service Management, vol. 4, no. 3, pp. 40–49, 2007. View at Publisher · View at Google Scholar · View at Scopus
  19. M. H. Eiza, Q. Ni, T. Owens, and G. Min, “Investigation of routing reliability of vehicular ad hoc networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2013, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. G. Yan, S. Olariu, and M. C. Weigle, “Providing location security in vehicular Ad Hoc networks,” IEEE Wireless Communications, vol. 16, no. 6, pp. 48–55, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Chiang, S. H. Low, A. R. Calderbank, and J. C. Doyle, “Layering as optimization decomposition: a mathematical theory of network architectures,” Proceedings of the IEEE, vol. 95, no. 1, pp. 255–312, 2007. View at Publisher · View at Google Scholar · View at Scopus
  22. Y. Xue, B. Li, and K. Nahrstedt, “Optimal resource allocation in wireless ad hoc networks: a price-based approach,” IEEE Transactions on Mobile Computing, vol. 5, no. 4, pp. 347–364, 2007. View at Publisher · View at Google Scholar · View at Scopus
  23. X. Zhang, X. Dong, N. Xiong, J. Wu, and X. Li, “Fault-aware flow control and multi-path routing in VANETs,” Peer-to-Peer Networking and Applications, vol. 8, no. 6, pp. 1090–1107, 2015. View at Publisher · View at Google Scholar · View at Scopus
  24. J.-W. Lee, R. R. Mazumdar, and N. B. Shroff, “Non-convex optimization and rate control for multi-class services in the internet,” IEEE/ACM Transactions on Networking, vol. 13, no. 4, pp. 827–840, 2005. View at Publisher · View at Google Scholar · View at Scopus