4.7 Article

Energy-Aware Service Selection and Adaptation in Wireless Sensor Networks with QoS Guarantee

Journal

IEEE TRANSACTIONS ON SERVICES COMPUTING
Volume 13, Issue 5, Pages 829-842

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TSC.2017.2749227

Keywords

Quality of service; Wireless sensor networks; Energy consumption; Service-oriented architecture; Adaptation models; Monitoring; Concrete; Wireless sensor network; energy-aware; quality of service; service selection; workflow management

Funding

  1. National Key Research and Development Program of China [2017YFB0203501]
  2. Beijing Science and Technology Project [Z171100001117147]

Ask authors/readers for more resources

Workflow-based Service-oriented WSNs have recently received a lot of attention from both academia and industry. With well-defined service components, various flexible WSN applications can be developed. However, the key characteristic of WSNs is resource constraints. Sensor nodes in WSNs have limited storage, computation and especially limited energy. As service components in WSNs rely on the data gathered by sensor nodes, they are also resource-constrained. Unfortunately, traditional workflow technologies (i.e., service selection, composition and adaptation) ignore the residual energy of services. This will bring unbalanced energy consumption and furthermore shorten the network lifetime. In order to resolve this issue, we proposed an energy-aware QoS-guaranteed workflow management mechanism. In this mechanism, a new QoS model is first presented to improve the QoS evaluation. Then, based on this QoS model, an efficient service selection schema, which considers both the energy and the QoS of services, is proposed. Furthermore, an adaptation mechanism for balanced energy consumption is also proposed. Experimental evaluations demonstrate the capability of our proposed approach.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy

Wenjia Niu, Endong Tong, Qian Li, Gang Li, Xuemin Wen, Jianlong Tan, Li Guo

KNOWLEDGE AND INFORMATION SYSTEMS (2016)

Article Computer Science, Information Systems

Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks

Bo Zhang, Endong Tong, Jie Hao, Wenjia Niu, Gang Li

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2016)

Article Computer Science, Information Systems

Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence

Xinyu Huang, Yunzhe Tian, Yifei He, Endong Tong, Wenjia Niu, Chenyang Li, Jiqiang Liu, Liang Chang

SECURITY AND COMMUNICATION NETWORKS (2020)

Article Computer Science, Information Systems

An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method

Yike Li, Yingxiao Xiang, Endong Tong, Wenjia Niu, Bowei Jia, Long Li, Jiqiang Liu, Zhen Han

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2020)

Article Computer Science, Artificial Intelligence

Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding

Chen Tong, Liu Jiqiang, Xiang Yingxiao, Niu Wenjia, Tong Endong, Wang Shuoru, Li He, Chang Liang, Li Gang, Chen Qi Alfred

Summary: Pathfinding is crucial in real-world scenarios and undergoing a revolution in efficient parallel learning with the development of reinforcement learning. This study is the first to explore adversarial attacks on A3C, achieving a high success rate and discussing defense strategies.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning

Yingdi Wang, Yunzhe Tian, Jiqiang Liu, Wenjia Niu, Endong Tong

Summary: With the rapid development of AI, the issue of AI security has emerged, as adversarial examples may attack machine learning algorithms and pose potential threats to AI applications. This paper explores a training-based method to automatically identify adversarial examples in Value Iteration Networks (VIN), achieving high accuracy and effectiveness.

JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS (2021)

Article Computer Science, Information Systems

Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure

Yunzhe Tian, Jiqiang Liu, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Wei Wang

Summary: This paper introduces a parallel adversarial attack framework on node classification, redesigning loss and objective functions and integrating node filtering methods to achieve parallel adversarial attacks. Experimental results on the Polblogs dataset demonstrate the effectiveness of the proposed approach.

SECURITY AND COMMUNICATION NETWORKS (2021)

Review Computer Science, Information Systems

Survey on Astroturfing Detection and Analysis from an Information Technology Perspective

Tong Chen, Jiqiang Liu, Yalun Wu, Yunzhe Tian, Endong Tong, Wenjia Niu, Yike Li, Yingxiao Xiang, Wei Wang

Summary: With the rise of the Internet, user comments have had a significant impact on information acquisition and e-commerce, as well as attracting researchers' interest. Astroturfing, as a form of online suspicious behavior, can lead to abnormal and damaging actions in cyberspace, prompting an urgent need for detection and prevention measures.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods

Yingxiao Xiang, Wenjia Niu, Endong Tong, Yike Li, Bowei Jia, Yalun Wu, Jiqiang Liu, Liang Chang, Gang Li

Summary: This paper proposes a congestion attack detection approach by combining empirical prediction and analytical verification, which successfully predicts and verifies congestion attacks by collecting traffic images and defining traffic flow features, achieving timely and accurate congestion attack detection.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

Security Analysis on Blockchain-Powered Mobile APPs Connected with In-Vehicle Networks by Context-Based Reverse Engineering

Xingyu Wu, Ziyan Qiao, Xingjuan Cai, Qian Wang, Zhiqiang Xie, Rui Sun, Dong Zi, Wenjia Niu, Endong Tong

Summary: This paper proposes a context-based reverse engineering approach to uncover deep hidden commands in blockchain-powered mobile automotive APPs, aiming to reveal the threat of command leakage. The effectiveness of the approach is validated through extensive experiments and case studies.

SECURITY AND COMMUNICATION NETWORKS (2022)

Article Computer Science, Information Systems

A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering

Endong Tong, Wenjia Niu, Jiqiang Liu

Summary: QoS guarantee is crucial in building service-oriented applications. Previous CF methods neglected temporal factors and resulted in decreased prediction accuracy due to outdated QoS values. To address this, our time-aware collaborative filtering approach combines historical QoS and CF technology to predict missing QoS with improved accuracy.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Telecommunications

Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation

Yike Li, Wenjia Niu, Yunzhe Tian, Tong Chen, Zhiqiang Xie, Yalun Wu, Yingxiao Xiang, Endong Tong, Thar Baker, Jiqiang Liu

Summary: Efficient signal planning is crucial for reducing traffic congestion, fuel consumption, and exhaust emissions. This study focuses on the development of a connected vehicle-based traffic control system for multi-intersection networks. By utilizing multi-agent reinforcement learning, an actor-attention-critic algorithm is proposed to improve transportation and energy efficiency, as well as combat congestion attack. Experimental results demonstrate significant reductions in delay, CO2 emissions, and improved robustness under congestion attack.

IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING (2022)

Article Telecommunications

A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things

Endong Tong, Wenjia Niu, Yunzhe Tian, Jiqiang Liu, Thar Baker, Sandeep Verma, Zheli Liu

Summary: A hierarchical energy efficient service selection approach for resource-constrained IoT is proposed, which includes global constraints decomposition and selection of local QoS constraints to achieve an energy efficient service selection scheme based on dynamic network state. Experimental evaluations show the capability of the proposed approach.

IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System

Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Jiqiang Liu

2020 IEEE 26TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS) (2020)

No Data Available