Next Article in Journal
Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things
Next Article in Special Issue
A Layered Trust Information Security Architecture
Previous Article in Journal
Vehicle Tracking for an Evasive Manoeuvres Assistant Using Low-Cost Ultrasonic Sensors
Previous Article in Special Issue
BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analyzing Comprehensive QoS with Security Constraints for Services Composition Applications in Wireless Sensor Networks

1
School of Mathematics and Computer Science, Hubei University of Arts and Science, Xiangyang 441053, China
2
School of Computer Science, Colorado Technical University, Colorado Springs, CO 80907, USA
*
Author to whom correspondence should be addressed.
Sensors 2014, 14(12), 22706-22736; https://doi.org/10.3390/s141222706
Submission received: 27 July 2014 / Revised: 14 October 2014 / Accepted: 24 November 2014 / Published: 1 December 2014
(This article belongs to the Special Issue Sensor Computing for Mobile Security and Big Data Analytics)

Abstract

: Services composition is fundamental to software development in multi-service wireless sensor networks (WSNs). The quality of service (QoS) of services composition applications (SCAs) are confronted with severe challenges due to the open, dynamic, and complex natures of WSNs. Most previous research separated various QoS indices into different fields and studied them individually due to the computational complexity. This approach ignores the mutual influence between these QoS indices, and leads to a non-comprehensive and inaccurate analysis result. The universal generating function (UGF) shows the speediness and precision in QoS analysis. However, only one QoS index at a time can be analyzed by the classic UGF. In order to efficiently analyze the comprehensive QoS of SCAs, this paper proposes an improved UGF technique—vector universal generating function (VUGF)—which considers the relationship between multiple QoS indices, including security, and can simultaneously analyze multiple QoS indices. The numerical examples demonstrate that it can be used for the evaluation of the comprehensive QoS of SCAs subjected to the security constraint in WSNs. Therefore, it can be effectively applied to the optimal design of multi-service WSNs.

1. Introduction

In recent years, WSNs have evolved with new features such as large scale, high device heterogeneity and the capability of supporting multiple applications [1]. WSNs are optimized for low-power, low-cost and a small form factor. Enterprise-IT systems are typically equipped with orders of magnitude more resources [2]. In Enterprise-IT it is important to adapt business processes and the underlying software infrastructure quickly and flexibly to react to changes on the markets [3]. To achieve this goal, some organizations focus on modeling, analysis and adaptation of business processes since the early 1990s [4]. Yet, while Service-Oriented Architecture (SOA) is prospering in Enterprise-IT, WSNs have—despite contrary prognoses—not yet found their way into enterprises. In recent years, some approaches have been presented for the seamless integration of WSNs with the existing, widely deployed SOA technologies such as XML, Web Services, and the Business Process Execution Language to build a service application based on wireless sensor networks [5].

In parallel with this development, WSNs are envisioned to become an integrated part of the Future Internet where they extend the Internet to the physical world [6]. Under the combined efforts of WSNs and Internet, these two trends lay the groundwork for a new class of applications where all kinds of devices ranging from simple sensor nodes (SNs) to large-scale application servers interact to drive business processes not possible before. In this way data stemmed from a WSN may influence the control flow of a business process in real-time or even trigger a business process [7]. To achieve this level of integration, WSNs must seamlessly interoperate with existing widely deployed SOA technologies such as XML, Web Services, and the Business Process Execution Language to name only a few [8]. In recent years, some approaches have been presented for the seamless integration of WSNs with these SOA technologies to successfully build a service application based on wireless sensor networks [911]. In these approaches, WSNs are packaged as some standard Web services which can be published, located, and invoked across the Web. Therefore, based on Business Process Execution Language (BPEL), these WSNs services can be combined into a workflow to fulfill some tasks by the way of services composition [1214].

The SCAs can be achieved in a centralized or distributed fashion. For simplicity, this paper uses a centralized fashion. The WSNs Service Broker (WSB) deployed in the management server can act as a central decision node receiving service requests from users and dispatching the service tasks to the suitable SNs.

The SCAs in WSNs can be approximated as a three-tier architecture as shown in Figure 1, which is composed of the request layer, the composition layer and the deployment layer. The top layer represents the service requests from users, as well as the control instructions from system administrators. These service requests and control instructions are submitted to the composition layer through a firewall which improves the access security of the SCAs in WSNs by separating the application server from the users and the administrators.

The middle layer represents the logic entity of the SCAs in WSNs. As the resource management center, the WSB runs in the management server of WSNs. The WSB is responsible for the receiving of service request from the top layer, the partitioning of service task, the mapping from sub-tasks to atom-services, the assembling of an application of the services composition, and the allocating of SNs in the bottom layer for an SCA, as well as the operation monitoring of WSNs.

As a core component of WSNs service system, the WSB manages users' service request and controls the startup, access to, and sharing of data resources from the bottom layer. When a user's service request is received, the WSB partitions the service task into some sub-tasks according to adomain-specific business rules at first. Each sub-task represents a certain specific business operation. Then the WSB maps these sub-tasks into an atom-service which can be fulfilled by a single SNs according to the functionality of each atom-service. The service task can be fulfilled by the cooperation between these atom-services. Thus, under the coordination by the WSB these atom-services form a services composition. When all computing tasks are fulfilled by SNs, the WSB is responsible for receiving the observed data from the bottom layer through a gateway and sending them back to the users through the firewall.

The bottom layer represents the physical entity of the SCAs in WSNs. In the bottom layer, some SNs are deployed in different locations. These SNs make up a network through the wireless connections by the relay nodes and sink nodes. The relay nodes are responsible for the data transmission between the sink nodes and SNs located in a geographic range. The sink nodes are responsible for the data transmission between the WSB and all of the SNs in the WSNs through the different relay nodes.

From the aspect of system architecture, the application of services composition in WSNs is a type of Internet components based on WSNs services, which is built by services composition technique [15]. As a type of abstract of distributed software system running on the Internet which is open, dynamic and difficult to be controlled, there are many differences between the Internet components and the traditional software system, such as structure, operation mechanism, correctness guarantees, development method and life cycle [16]. Being different from the traditional software model, the WSNs services, as a type of Internet components, exist in each SN on the WSNs service platform with a proactive software service form [17].

In the framework of WSNs service system, the WSNs services composition fulfills the users' service request through the collaboration among the SNs. Typically, the execution route and the selection for SNs are dynamically determined according to the operating condition during the execution of an SCA [18]. In addition, the outside SNs can be dynamically added in a WSNs service system at any time. And it can be selected to execute during the execution of an SCA by the late binding technology. Therefore, there is no knowing all the SNs, as well as their operating condition and performance indices before the end of the operation of an SCA, which are the essential differences with the traditional software. The QoS assurance methods of the traditional software are mostly based on a software model constant during the execution [1921]. Thus, they are not suitable for the SCA which is based on services composition techniques.

On the other hand, the computational burden is the crucial factor in solving optimization problems where the QoS indices, such as cost, execution time, credibility and reputation, have to be evaluated for a great number of possible solutions along the search process [22]. The traditional QoS assessment methods, such as Boolean Models [23], Markov Process [24] and Monte-Carlo simulation technique [25], have some disadvantages, either the applicability of only small-scale system or too much time consumed for executing model [26].

Unlike the traditional software QoS assurance technique, the QoS assurance method for the application of services composition in WSNs pays more attention to the mechanism of flexible QoS measures, deduction and adoption based on cumulative evaluation of operation information in an open running environment [27]. Therefore, the fast QoS optimization methods for the application of services composition in WSNs have great theoretical research value.

In order to provide better QoS to users, SCAs must have more adaptability to collect various changes in real-time, and to adjust online according to pre-established strategies at runtime [28]. However, with the closed, controllable and static user's requirement in the background, the traditional software QoS optimization methods lack the ability to dynamically adapt themselves to the changes both in running environment and user's requirement [29,30]. Therefore, they cannot be employed in QoS optimization for the application of services composition in WSNs, so the fast QoS prediction method for SCAs has an important realistic requirement.

At present, researches on QoS optimization for SCAs is still just starting. Due to the open and dynamic running environment, continuously variable user's requirement, randomly selected SNs and the own characteristics of loose coupling and long transaction, the QoS optimization for the application of services composition in WSNs are confronted with severe challenges, which seriously restrict the further development, application and extension of the SCAs [31]. Faced with the urgent demands for SCAs with high-reliability and high-performance from the government, economy and commerce fields such as e-government, e-commerce and e-banking, fast QoS optimization is the key to promote the successful development, application and extension of the SCAs [32], which provides a flexible and effective mechanism of QoS measure for SCAs by deduction and adoption based on the summative evaluation of operating information.

In recent years, many previous studies have focused on the security guarantees at the network layer in WSNs [33,34]. However, it is impossible to assure the overall security of SCAs in WSNs only depending on the security guarantees of the network layer [3537]. Therefore, the security must be considered together with other QoS indices in analyzing comprehensive QoS of SCAs in WSNs.

Therefore, this paper focuses on the comprehensive evaluation of multiple QoS indices including security for SCAs in WSNs, which aims at providing a selection criterion for some potential solutions for designers of SCAs. On this basis, this paper further focuses on analyzing the contribution of each SN to the total evaluation, which aims at providing some potential optimization probabilities to the designers. The current solutions cannot solve the above problems well. Most current researchers separate performance, reliability, and security into different fields and study them individually. However, in fact, performance, reliability and security are closely related and affect each other, in particular when the WSA is implemented [3841]. For example, when a task is divided into different ASs simultaneously executed by SNs, the performance is high, but the reliability can be low because failure of any SN will make the entire task incomplete. This causes the task to restart, which inversely increases its execution time (i.e., reduces its performance). Therefore, it is worth having some redundant SNs to execute the same AS, especially for those failure-prone SNs. However, too many redundancies, even though improving the reliability, can decrease the performance by not fully parallelizing the execution of different AS and considerably reduces data security as multiple replicas of the same data are processed by different SNs, which increases the chances of unauthorized access. For different types of users (or different usage scenarios), the security requirements may be different, which relates to the security levels of data accessed by users. That is to say, the security of service applications based on wireless sensor networks is interconnected with the security levels of the accessed data. In the design of the service application system, the high security level should be used for the data with high confidentiality to prevent the occurrence of unsafe events. For example, the probability of the occurrence of unauthorized access can be reduced by limiting the number of redundant key nodes. Obviously, doing so may reduce the system performance and/or reliability. Therefore, ensuring absolute security is unrealistic in the design of a service application system. Designers usually have to compromise between the security, the performance and the reliability. Thus, performance, reliability and security should be studied together in WSN service analysis.

In order to assure the lowest security strength of SCAs in WSNs satisfying users' individualized security requirements and improve other QoS indices as much as possible, this paper studies the analysis method for the comprehensive QoS with security constraints of SCAs in WSNs based on the VUGF technology. Our contributions are as follows: (I) We present the working mechanisms of SCAs in WSNs and analyze the necessity of comprehensive assessment on multiple QoS indices; (II) We analyze the disadvantages of the classic UGF, and present a VUGF technique that can obviously improve the efficiency on comprehensive QoS assessment in a parallel computing environment; (III) Employing our VUGF, we present a composition calculation method of multiple QoS indices for SCAs in WSNs, which can work out the total comprehensive QoS assessment by using a fast algebraic procedure; (IV) We present an identification method for the key SNs based on analyzing the contribution of each SN to the total evaluation, which can most likely improve the total comprehensive QoS of SCAs in WSNs. This method provides an approach for designers to further optimize the total comprehensive QoS.

The remainder of this paper is organized as follows: Section 2 gives the working mechanisms of SCAs in WSNs. Section 3 presents the VUGF technique as well as comparisons with the classic UGF. Following this, the approaches of VUGF-based composition calculation of multiple QoS indices are proposed in Section 4. On this basis, Section 5 presents the analysis methods of multiple QoS indices for SCAs in WSNs in detail. In order to illustrate our approach, some numerical examples and analysis process are described in Section 6. Finally, the conclusions and future work are given in Section 7.

2. Working Mechanisms of WSNs Service Broker

Under the service oriented architecture, the independent Web services are built for every SN in WSNs, which are deployed in the management server beforehand. The functionalities of each SN, such as initialization, starting and accessing data, are encapsulated in some methods in the corresponding Web service. Therefore, these Web services can be regarded as the agents of those SNs. By invoking the appropriate methods in the Web service using the SOAP message protocol, the expected functional effects provided by the corresponding SNs can be obtained. From the outside of the WSNs service system, the WSB can be regarded as the agent of users who made service requests. Under the control of WSB, the service requests from users are fulfilled. The control process includes some operations, such as aportioning the service task, assembling the composite service, and allocating SNs. The working mechanisms of WSB are shown in Figure 2.

When receiving a service request from a user, a suitable workflow process will be chosen by the WSB according to some related domain-specific business rules, which are depicted as the business flow layer in Figure 2. These workflow processes are physically implemented as a group of workflow templates. Each template is composed of some interconnected predefined sub-services which are denoted as S i sub. It is noteworthy that these sub-services are the abstract definitions of some larger-granularity services in the business layer rather than some physical Web services in the operation layer. Therefore, the determination of workflow process by the WSB is actually the partition of service tasks, which is depicted as the evolution process from the service request layer to the business flow layer in Figure 2.

The Web service is a self-defined, self-describing, modular application that can be published, located, and invoked across the Internet based on UDDI/OWL-S. After choosing a suitable workflow process for a user's service request, the WSB can discover and match the required Web services deployed physically in the WSNs service system for each sub-service within the workflow. In most cases, the accomplishment of the functionalities of a sub-service needs the cooperation of some Web services, named atom-service and denoted as S i atom in Figure 2, corresponding to the same SN or different SNs.

These interlinked atom-services, which cooperate to fulfill the service task specified by a sub-service, form a services composition which is denoted as CSk in Figure 2. To improve the efficiency, the domain expert and the system builders usually define the mapping relationships between the sub-services and the Web services beforehand.

Corresponding to each sub-service within the workflow, all of the atom-services are assembled as a composite service which can be invoked by the WSB to fulfill the user's service request. Therefore, the discovery and matching of the required atom-services by the WSB is actually the services composition assembly process, which is depicted as the evolution from the business flow layer to the services composition layer in Figure 2.

After the composite service is assembled, the WSB can dynamically deploy each atom-service to some suitable SN according to its execution order defined in the composite service. Normally, the system builders can deploy some redundant SNs to improve system's reliability and scalability. Each SN has a unique address which can be used by the WSB for the configuration of every atom-service. Therefore, the WSB can dynamically select the most appropriate SNs for each atom-service according to their functionality and non-functional indices, which is depicted as the evolution from the services composition layer to the wireless sensor networks layer in Figure 2. To reduce the time consumed for dynamic configuration, we deploy and configure an atom-service for each SN beforehand. The dynamic QoS indices of each SN are recorded by the WSB. Therefore, based on these atom-services deployed for every SN the selection of the appropriate SNs is translated into the selection of the appropriate atom-services.

The selection of atom-services for an SCA is crucial to its QoS. The QoS analysis of the alternative solutions for an SCA should be performed in order to find the best solution. In this paper, we choose the UGF technique to build our QoS analysis method. The next section introduces the classical UGF technique first, and then presents an improved UGF technique (VUGF) which can be used for analyzing multiple QoS indices simultaneously.

3. VUGF Technique

In order to better introduce our VUGF, the classic UGF technique is introduced first. On this basis, we analyze its disadvantages and then we put forward our innovative thoughts and give the definition of our VUGF. Finally, we compare the classic UGF and our VUGF.

3.1. Classical UGF Technique

Some systems can perform their tasks with various distinguished levels of efficiency usually referred to as performance rates. A system that can have a finite number of performance rates is called a Multi-State System (MSS) [42]. Any system consisting of different units that have a cumulative effect on the entire system performance has to be considered as a MSS [43].

Since the QoS indices of atom-services can take different values, the SCA should be considered as a MSS with different QoS levels depending on different combination of available and failed SNs with different performance, reliability, security and creditability. MSS was introduced in the mid-1970s in [44,45]. In these works, the basic concepts of MSS were primarily formulated, the system structure function was defined, and its properties were initially studied. The notions of minimal cut set and minimal path set were introduced in the MSS context, as well as the notions of coherence and element relevancy.

MSS QoS analysis relates to systems for which one cannot formulate an “all or nothing” type of failure criterion. Such systems are able to perform their task with partial performance (intensity of the task accomplishment). Failures of some system elements lead only to the degradation of the system performance.

The SCA is a typical MSS which has a variety of operation states (or failure states) besides the normal operation states and complete failure states. In other words the SCA can runs on multiple QoS levels. The failure or QoS degradation of some SNs will cause QoS degradation of the entire SCA. Thereby, the whole SCA presents multiple QoS levels.

The QoS analysis method based on MSS theory can broadly define the QoS indices of each atom-service (represents corresponding SN) and the entire SCA in detail. It can also analyze the effect of QoS variation of each atom-service (or SN) on QoS of the entire SCA thoroughly, as well as the gradual process of SCA failure.

Generally, the approaches of MSS QoS analysis can be divided into four different types: (1) an extension of the Boolean models to the multi-valued case; (2) the stochastic process (mainly Markov and semi-Markov) approach; (3) the Monte-Carlo simulation technique; (4) the u-function approach.

The approach based on the multi-valued Boolean models is historically the first method that was developed and applied for MSS QoS evaluation. It is based on the natural expansion of the Boolean methods to Multi-State systems.

The stochastic process methods that are widely used for the MSS QoS analysis are more universal. These methods can be applied only to relatively small MSS because the number of system states increases dramatically with the increase in the number of system elements.

Even though almost every real world MSS can be represented by a Monte-Carlo simulation for QoS assessment, the main disadvantages of this approach are the time and expense involved in the development and execution of the model.

Thus, the first three approaches have some disadvantages, either the applicability of only small-scale MSS or too much time consumed for executing the model. The computational burden is the crucial factor when one solves optimization problems where the QoS indices have to be evaluated for a great number of possible solutions along the search process. This makes the use of the first three approaches in QoS optimization problematic [46].

On the contrary, the UGF technique is fast enough, and can be applied in the QoS analysis of a large-scale MSS [47]. This is because that UGF technique allows one to find the performance distribution of the entire MSS based on the performance distributions of its elements by using a fast algebraic procedure. For the above reasons, we chose the UGF technique as a fundamental one to explore an approach for simultaneously analyzing multiple QoS indices of an SCA. In the next section, we present an enhanced UGF technique, named Vector UGF (VUGF).

3.2. Vector UGF Technique

Although the classic UGF has some outstanding advantages, such as its speediness and precision, its framework only supports analyzing a single variable, i.e., a single QoS index, in an algebraic procedure. In other words, it cannot analyze multiple QoS indices simultaneously, which exposes its disadvantage of low efficiency.

In addition, the classic UGF can only express one QoS index in an UGF expression by a pair of the possible value variable and the probability variable. Based on this UGF expression, there is only one QoS index can be computed in an algebraic procedure. In other words, each QoS index is computed separately in classic UGF. Therefore, the classic UGF cannot depict the relationships between the QoS indices, and it does not consider the QoS constraints in the analysis procedure. Different QoS indices may affect each other. For example, some SNs can fail when running the AS, so the execution time is also affected by the SN reliability. Similarly, the communication links in SNs can fail during the data transmission. Thus, the communication reliability influences the service time as well as data transmission speed in the communication channels, so the analysis results worked out by the classic UGF are incomplete and inaccurate.

To overcome these disadvantages of the classic UGF, we present an improved UGF, named VUGF, to study the simultaneous analysis of multiple QoS indices for an SCA in an algebraic procedure. The VUGF inherits the outstanding advantages that allow one to find the entire MSS performance distribution based on the performance distribution of its elements by using a fast algebraic procedure. An analyst can use the same recursive procedures with a different physical nature of QoS and different types of element interaction. The VUGF is defined as follows:

It is assumed that G = {G1, G2, …, Gm} is an m-dimensional discrete random vector, where G1, G2, …, Gm represent m different QoS indices of an atom-service G in the SCA, such as cost, execution time, security, credibility, and reputation. The probability distribution of G can be described as two vector sets g and q.

The vector g represents the M possible values of the vector G, that is the atom-service G have M different states corresponding to these m different QoS indices G1, G2, … Gm. The g can be expressed by the following formula:

g = { g 1 , g 2 , , g M }
where:
g l = { g 1 , 1 , g 1 , 2 , , g 1 , m } , l = 1 , 2 , , M

In other words, g1,1, g1,2, …, g1,m are the values of QoS indices G1, G2, …, Gm, respectively.

The vector q represents the probability that the QoS indices G1, G2, …, Gm take the values g1,1, g1,2, …, g1,m. The q can be expressed by the following formula:

q = { q 1 , q 2 , , q M }
where:
q l = Pr { G = g l } = Pr { G 1 = g 1 , 1 , , G m = g 1 , m }
where:
l = 1 M q l = 1

Thereby, the VUGF of vector G can be defined as:

U G ( z ) = l = 1 M q l z g l

Figure 3 describes the relationships between the QoS index of vector G, the possible value vector g and the probability vector q in the VUGF.

Figure 4 describes the relationships between the QoS index vector Y and the probability vector α in the classic UGF. Comparing the definitions of the VUGF and the classic UGF in Figures 3 and 4, the biggest difference is that the gl in Formula (6) is a vector, while the gl is a variable in the definition of the classic UGF. The vector gl enables that the possible values of multiple QoS indices are expressed in a VUGF formula simultaneously, which supports the synchronous computation of multiple QoS indices. Employing our VUGF, the WSNs service broker can use a cluster to parallel work out the estimate for each QoS index. For example, each estimation task of QoS indices can be assigned to some different parallel computing units (workers). Our VUGF program can these estimation tasks in parallel based on MATLAB® Distributed Computing Server (MDCS (The MathWorks, Inc., Natick, MA, USA)) and Parallel Computing Toolbox (PCT). Therefore, compared with the classic UGF, our VUGF can provide better performance in parallel computation conditions.

Being different from the traditional UGF, VUGF can combine the security and multiple different types of QoS indices into a unified, parallel computation-enabled framework by converting the variables of QoS indices and their probability distributions into the corresponding vectors. Thus, analyzing comprehensive QoS with security constraints can be fulfilled. The benefit to do so are not only that the computational efficiency can be greatly improved by the parallel computation in computing models, but also a reasonable compromise between the security, the performance and the reliability can be obtained easily for the optimal system design. The next section describes the mechanism of composition calculation for the multiple QoS indices from the single atom-services to the entire SCA based on VUGF.

4. Composition Calculation of Multiple QoS Indices Based on VUGF

4.1. Definition of Composition Operator

The VUGF of the entire SCA can be derived from the VUGFs of all atom-services within this SCA by the composition calculation. In order to facilitate the description of the composition calculation, we define a composition operator Ω as follows.

Define N discrete random vectors G1, G2, …, GN, and their VUGFs are U1(z), U2(z), …, UN(z) respectively. Thus, the VUGF of a vector function f(G1, G2, …, GN) is the composition calculation of U1(z), U2(z), …, UN(z) which can be expressed as the following formula:

U ( z ) = Ω ( U 1 ( z ) , U 2 ( z ) , , U N ( z ) )

When calculating Formula (7), the following VUGF's characteristics will be applied:

Ω ( U 1 ( z ) , , U k ( z ) , U k + 1 ( z ) , , U N ( z ) ) = Ω ( U 1 ( z ) , , U k + 1 ( z ) , U k ( z ) , , U N ( z ) )
Ω ( U 1 ( z ) , , U k ( z ) , U k + 1 ( z ) , , U N ( z ) ) = Ω ( Ω ( U 1 ( z ) , , U k ( z ) ) , Ω ( U k + 1 ( z ) , , U N ( z ) ) )

By applying the characteristics mentioned above, the obtained VUGF of the vector function f(G1, G2, …, GN) takes the following forms:

U ( z ) = s = 1 M sys q s z x s
where the Msys is the number of the possible values (i.e., possible system states) of the vector function f(G1, G2, …, GN), and M sys i = 1 N M i owing to the collection of like terms; the xs is the vector which composes of the possible values of the vector function f(G1, G2, …, GN); the qs is the probability of xs.

4.2. Composition Calculation for the VUGF of Two Random Vectors

Define an m-dimensional discrete random vector H = {H1, H2, …, Hm}. H1, H2, …, Hm that represents m different QoS indices of another atom-service H within the SCA, respectively. The probability distribution of H1, H2, …, Hm can be described by two vector sets h and p. The h = {h1, h2, …, hM′}, hk = {hk,1, hk,2, …, hk,m} (1 ≤ kM′), express all possible M′ values which H can take. p = {p1, p2, …, pM′} express the probabilities that H takes the value of hk. According to Formula (6), the VUGF of H is:

U H ( z ) = k = 1 M p k z h k

Define an m-dimensional discrete random vector D = {D1, D2, …, Dm}. It is a function of vectors G and H, i.e., D = f(G, H), where:

D i = f i ( G 1 , , G m , H 1 , , H m )

Thereby, the vector D represents the m different QoS indices of the composite service composing of two arbitrary atom-services G and H within the SCA. According to Equations (7)(9), the VUGF of D can be obtained by the following composition calculation:

U D ( z ) = Ω ( U G ( z ) , U H ( z ) ) = l = 1 M k = 1 M q l p k z f ( g l , h k )

As seen from the above formula, UD(z) is composed of M × M′ terms. The resulting probabilities of each term within the VUGF of D are equal to the products of the probabilities of the corresponding terms within the VUGF of G and H, and the resulting values of QoS indices can be worked out according to the specification of the vector function f(gl, hk) where l and k are the order number of the possible values of QoS indices in G and H. The vector function f(gl, hk) can take the following expression:

f ( g l , h k ) = ( f 1 ( g l , 1 , h k , 1 ) , , f m ( g l , m , h k , m ) )

In the calculation process of the above formula, the alike terms in the VUGF can be collected, which can obviously simplify the calculation process. For example, if f(g1, h1) = f(g2, h2) then the two terms q1p1zf(g1,h1) and q2p2zf(g2,h2) can be collected into (q1p1+q2,p2)zf(g1,h1), so the number of terms in the resulting VUGF UD(z) may be less than M × M′. Combining like terms can reduce the number of possible values of the vector D, so then the calculation workload can be reduced.

For the different types of QoS indices and the different composite structures in the SCA, different computational methods should be selected to calculate each term fi(gl,i, hk,i) in the vector function f(gl, hk). In order to facilitate the description of composition calculation, we define several commonly used operators as follows:

sum ( g l , i , h k , i ) = g l , i + h k , i
max ( g l , i , h k , i ) = max ( g l , i , h k , i )
max ( g l , i , h k , i ) = max ( g l , i , h k , i )
product ( g l , i , h k , i ) = g l , i × h k , i

According to the structures of the composite services within the SCA, one can obtain the values of various types of QoS indices of each composite service by applying the above operators to calculate each term fi(gl,i, hk,i) in vector function f(gl, hk).

For example, assume that a composite service is composed of two atom-services G and H; the discrete random vectors G and H represent the four kinds of QoS indices (i.e., cost, security, execution time, and credibility) of G and H, respectively. Here execution time is used for depicting the performance of atom-service. G and H can be respectively expressed as: G = {Gcost, Gsecurity, Gexec_time, Gcredibility}, H = {Hcost, Hsecurity, Hexec_time, Hcredibility}.

The vector gl = {gl,cost, gl,security, gl,exec_time, gl,credibility} (1 ≤ lM) represents the M possible values that the vector G may take. Similarly, the discrete random vector hk = {hk,cost, hk,security, hk,exec_time, hk,credibility} (1 ≤ kM′) represents the M′ possible values that the vector H may take.

Aiming at the various connections of G and H in the structure of composite service in the SCA, the different operators should be selected to calculate the values of various QoS indices of this composite service. The four common types of connections in the composite structure are discussed as follows:

(1)

G and H in series connection

Using the operator sum, the values of two QoS indices “cost and execution time” of the composite service composing of G and H can be worked out according to the following two formulas, respectively:

f cost ( g l , cost , h k , cost ) = sum ( g l , cost , h k , cost ) = g l , cost + h k , cost
f exec _ time ( g l , exec _ time , h k , exec _ time ) = sum ( g l , exec _ time , h k , exec _ time ) = g l , exec _ time + h k , exec _ time
where fexec_time(gl,exec_time,hk,exec_time) is used for depicting the performance of the composite service.

Using the operator product, the values of QoS index “security” of the composite service composing of G and H can be worked out according to the following formula:

f security ( g l , security , h k , security ) = product ( g l , security , h k , security ) = g l , security × h k , security

Using the operator min, the values of QoS index “credibility” of the composite service composing of G and H can be worked out according to the following formula:

f credibility ( g l , credibility , h k , credibility ) = min ( g l , credibility , h k , credibility ) = min { g l , credibility , h k , credibility }

(2)

G and H in parallel connection

Using the operator sum, the values of QoS index “cost” of the composite service composed of G and H can be worked out according to Equation (19).

Using the operator max, the values of QoS index, execution time, of the composite service composing of G and H can be worked out according to the following formula:

f exec _ time ( g l , exec _ time , h k , exec _ time ) = max ( g l , exec _ time , h k , exec _ time ) = max { g l , exec _ time , h k , exec _ time }

Using the operator min, the values of QoS index “security” of the composite service composing of G and H can be worked out according to the following formula:

f security ( g l , security , h k , security ) = min ( g l , security , h k , security ) = min { g l , security , h k , security }

Using the operator min, the values of QoS index “credibility” of the composite service composing of G and H can be worked out according to Equation (22).

(3)

G executed circularly cG times

The values of QoS indices “cost and execution time” of the composite service composing of G executed circularly cG times can be worked out according to the following formulas, respectively:

f cost ( g l , cost ) = c G g l , cost
f exec _ time ( g l , exec _ time ) = c G g l , exec _ time

The values of QoS indices “security” of the composite service composing of G executed circularly cG times can be worked out according to the following formula:

f security ( g l , security ) = ( g l , security ) c G

The values of QoS indices “credibility” of the composite service composing of G executed circularly cG times can be worked out according to the following formula:

f reputation ( g l , reputation ) = g l , reputation

In addition to the above situations, the atom-services G and H may also be combined in a branch structure with the selection probabilities pG and pH (pG + pH = 1), respectively. That is to say that the composite service will dynamically select either the atom-service G with the selection probability pG, or the atom-service H with the selection probability pH to execute according to the runtime conditions. In this case, the VUGF of the composite service can be obtained as follows:

U D ( z ) = p G U G ( z ) + p H U H ( z )

4.3. Recursive Computation of the VUGF of Multiple Random Vectors

The VUGF of multiple random vectors represents the vector of QoS indices of a composite service composing of multiple atom-services in the SCA. It can be expressed as follows:

U ( z ) = Ω ( U G 1 ( z ) , U G 2 ( z ) , , U G n ( z ) ) = l 1 = 1 M 1 l 2 = 1 M 2 l n = 1 M n p l 1 p l 2 p l n z f ( g 1 , g 2 , , g n )

Through the following recursive computation process, the VUGF f(g1, g2, …, gn) of multiple random vectors can be obtained using Equations (15)(28) according to the composite structure of all atom-services within the SCA:

f ( g 1 , g 2 , , g n ) = f ( g 1 , g 2 ) , f ( g 1 , g 2 , , g n ) = f ( f ( g 1 , g 2 , , g n ) , g e ) for e = 3 , , n .

5. Analysis of Multiple QoS Indices Including the Security

In the suggested analysis method, the security is considered as a specific QoS index standing at parity with other QoS indices. In order to facilitate the description of analyzing multiple QoS indices, a composite structure of an example instance of an SCA is shown in Figure 5.

The SCA instance is composed of four composite services: cs1, cs2, cs3, and cs4 which represent the four types of composition structures mentioned above, respectively. The composite service cs1 is composed of n atom-services s1,1, s1,2, …, s1,n in serial connection. The composite service cs2 is composed of n atom-services s2,1, s2,2, …, s2,n in parallel connection. The composite service cs3 is composed of n atom-services s3,1, s3,2, …, s3,n in branch connection with the selection probability Ps3,1, Ps3,2,…,Ps3,n respectively. The composite service cs4 is composed of an atom-services s4,1 to be executed circularly cs4,1 times. In the above SCA instance, the calculation process of the VUGF of the multiple QoS indices comprises three steps. Firstly, for each atom-service, its VUGF of QoS indices is calculated. Secondly, for each composite service, its VUGF of the QoS indices is calculated based on the VUGFs of all the atom-services it contains. Thirdly, for the entire SCA instance, its VUGF of the QoS indices is calculated based on the VUGFs of all the composite services it contains. Finally, the comprehensive QoS of the entire SCA instance can be estimated. The details of each step of the above-mentioned process are described in the next sections.

5.1. Calculating the VUGF of QoS Indices for Each Atom-Service

Let the atom-service si,j in the composite service csi have Mij states. At time t, the QoS of all atom-services in the composite service csi can be expressed by gij(t)={gij1(t),gij2(t),…,gijMij(t)}, where gijl(t) (l∈[1,Mij]) is the QoS vector of the atom-service si,j in the l-th state, and the corresponding state probability vector is qij(t)={qij1(t),qij2(t),…,qijMij(t)}.

According to Equation (6), the VUGF of the atom-service si,j can be expressed by the following formula:

U i j ( z , t ) = l = 1 M i j q ijl ( t ) z g ijl ( t )

Normally, the QoS gij(t) and the corresponding state probabilities qij(t) of each atom-service si,j can be directly obtained through online monitoring or estimate of the operational log of each atom-service from WSB. Following this, based on the VUGFs of all the atom-services, the VUGF of the QoS indices of each composite service can be calculated, which is described in the next section.

5.2. Calculating the VUGF of the QoS Indices for Each Composite Service

The composite services cs1, cs2, and cs3 are all composed of n different atom-services in serial, parallel, and branch connection, respectively. Their QoS states can be expressed in a unified form by the following formula:

X i = f ( G i 1 , G i 2 , , G i n )
where Xi, 1 ≤ i ≤ 3, are the QoS vectors of the above composite services, and Gi1, Gi2, …, Gin are the QoS vectors of each atom-service, respectively. The above formula is called the structure function which describes the relationships between the QoS of the composite service and the atom-services.

According to the VUGF of atom-services described by Formula (32) and the structure function described by Formula (33), the VUGF of the composite services cs1, cs2, and cs3 can be worked out using Equations (7)(9), which can be expressed in a unified form as follows:

U i ( z , t ) = Ω ( U i 1 ( z , t ) , , U i n i ( z , t ) ) = k = 1 M i q i k ( t ) z x i k ( t )
where Mi (1 ≤ i ≤ 3) is the number of the states of each composite service; {xi1(t),…,xiMi(t)} (1 ≤ i ≤ 3) is the QoS of each composite service at time t; {qi1(t),…,qiMi(t)} is the corresponding state probability.

Aiming at the parallel connection of atom-services, such as in the composite services cs2, in the event that a composite service has many parallel atom-services, the number of states of this composite service, for example M2, will be very large. In order to improve the computation speed of the VUGF of the entire SCA instance, a state redistricting method can be applied to reduce the number of states of the composite service, which is described in the case of the composite service cs2 as follows:

Redistrict the M2 states of U2(z, t) into M2′ states (M2′<M2). The size of M2′ can be decided by the computational accuracy and the computing speed required actually. After redistricting M2 into M2′, the QoS of the composite service cs2 will be changed as follows:

x 21 ( t ) , , x 2 c ( t ) x 21 ( t ) , x 2 d ( t ) , , x 2 M 2 ( t ) x 2 M 2 ( t ) .

The corresponding state probability will be changed as follows:

q 21 ( t ) , , q 2 c ( t ) q 21 ( t ) = q 21 ( t ) + + q 2 c ( t ) , q 2 d ( t ) , , q 2 M 2 ( t ) q 2 M 2 ( t ) = q 2 d ( t ) + + q 2 M 2 ( t ) .

Thus, the VUGF of the composite service cs2 will be changed into:

U 2 ( z , t ) = k = 1 M 2 q 2 k ( t ) z x 2 k ( t )

The above state redistricting method can be neatly applied in the calculation process of the VUGF of the composite services or the entire SCA instance. The composite service cs4 takes a loop connection. G is executed circularly cG times in cs4. This can be transformed into a serial connecting format where the same cG atom-services s4,1 are executed sequentially. Thereby, the VUGF of the composite services cs4 can also be worked out according to the approaches presented above.

5.3. Calculating the VUGF of the QoS Indices for Entire SCA Instance

The example of an SCA instance shown in Figure 5 comprises four composite services in serial. The structure function of the SCA instance can be expressed by the following formula:

Y = f ( X 1 , X 2 , X 3 , X 4 )
where the Y is QoS vector of the entire SCA instance; X1, X2, X3, X4 are the QoS vectors of the composite services in the SCA instance, respectively. The VUGF of the QoS indices of the entire SCA instance can be obtained by using Equations (7)(9) as follows:
U ( z , t ) = Ω ( U 1 ( z , t ) , , U 4 ( z , t ) ) = s = 1 M s y s q s ( t ) z y s ( t )
where Msys is the number of states of the entire SCA instance; ys(t) = {y1(t), …, yMsys(t)} (1 ≤ sMsys) is the QoS indices of the entire SCA instance; the qs(t) = {q1(t), …, qMsys(t)} (1 ≤ sMsys) is the corresponding state probability.

5.4. Estimating the Comprehensive QoS of an SCA Instance

To estimate the comprehensive QoS, such as the reliability, the usability and the output-performance, of an SCA instance, a vector w = (ω1, ω2, …, ωm) is defined as the QoS constraint for the entire SCA instance from users or designers, such as the maximum cost, the minimum credibility, the maximum execution time, and the minimum security. When the QoS index of the ys(t) of the entire SCA instance meets the QoS constraint w in the state s, it is denoted by ys(t)∝w in this paper. To make the VUGF of the QoS indices of the entire SCA instance meet the QoS constraint w, the constraint operator δw is defined as follows:

δ w ( q s ( t ) z y s ( t ) , w ) = { q s ( t ) , y s ( t ) w , 0 , otherwise .

The above formula indicates that some QoS index terms, i.e., some qs(t)zys(t) in the VUGF U ( z , t ) = s = 1 M s y s q s ( t ) z y s ( t ), can be omitted when they don't satisfy the constraints w. Thereby, those terms will be deleted by setting δw(qs(t)zys(t),w)=0.

Thereby, the VUGF of the comprehensive QoS indices of the entire SCA instance under the constraint w, i.e., Uw(z, t), can be calculated by the following formula:

U w ( z , t ) = δ w ( s = 1 M s y s q s ( t ) z y s ( t ) , w ) = s = 1 M sys δ w ( q s ( t ) z y s ( t ) , w )

The expected value of each QoS index, defined in the vector Y such as cost, execution time, security, credibility, and reputation, of the entire SCA instance can be worked out by the following formula:

E ( y s ( t ) | U w ( z , t ) ) = y s ( t ) w q s ( t ) y s ( t ) w q s ( t ) y s ( t )

In addition, some other QoS indices of the entire SCA instance, such as reliability, usability, and output-performance, can also be worked out based on the VUGF of the multiple QoS indices of the entire SCA instance.

In order to facilitate the description, three QoS operators, i.e., reliability operator δR, usability operator δA, and output-performance operator δG, are defined. The approaches of estimating the reliability, usability, and output-performance of the entire SCA instance are described as follows: to begin with, the reliability operator δR is defined. The reliability of the entire SCA instance in time t under the constraint w can be calculated by the following formula:

R ( t ) = δ R ( U w ( z , t ) ) = y s ( t ) w q s ( t )

Following this, the usability operator δA can be defined. On the basis of the reliability of the entire SCA instance, i.e., R(t) calculated by Equation (41), the usability EA(t) of the entire SCA instance can be calculated by the following formula:

E A ( t ) = s = 1 M s y s q s δ R ( U w ( z , t ) ) = s = 1 M s y s q s ( t ) y s ( t ) w q s ( t ) ( y s ( t ) w q s ( t ) ) = s = 1 M sys q s ( t ) y s ( t ) w q s ( t ) R ( t )

The total output-performance of the entire SCA instance includes both the ones that meet the constraint w and ones that don't meet the constraint w. The total output-performance operator δG is defined as follows. The total output-performance of the entire SCA instance can be calculated by the following formula:

E G ( t ) = δ G ( U ( z , t ) ) = δ G ( s = 1 M s y s q s ( t ) z y s ( t ) ) = d U d z ( 1 ) = s = 1 M sys q s ( t ) y s ( t )

Thereby, the total output of a certain QoS index of the entire SCA instance can be worked out by the following formula:

E ( y s ( t ) ) = s = 1 M sys q s ( t ) y s ( t )

6. Numerical Examples

6.1. Description for the Example

To describe the calculation and analysis process of multiple QoS indices for the SCA in WSNS, we give a numerical example shown in Figure 6. The given instance of SCA in WSNs is composed of four composite services, i.e., cs1, cs2, cs3, and cs4. The composite service cs1 is combined by two atom-services, i.e., s1,1 and s1,2, in serial. The composite service cs2 is composed of two atom-services, i.e., s2,1 and s2,2, in parallel. The composite service cs3 is composed of two atom-services, i.e., s3,1 and s3,2, in branch connection with selective probability ps3,1=0.4 and ps3,2=0.6, respectively. The composite service cs4 is composed by just an atom-service, i.e., s4,1, that will be executed circularly cs4,1=2 times.

In this numerical example, we pay attention to five types of QoS indices, i.e., reliability, cost, security, execution time, and credibility. The values of five QoS indices of each atom-service in the numerical example are shown in Table 1. In order to express the dynamics and randomness of SCAs in WSNs, the numerical values in numerical examples are selected randomly within the bounds of possibility. In order to investigate the contribution on the total QoS indices by each atom-service, we use percent improvement of each atom-service to find the key atom-services by comparing the improvements of the total QoS indices resulting from them. This can help designers further optimize the total comprehensive QoS by modifying SNs allocation for atom-services, such as allocating more computing resource to those key atom-services.

6.2. Calculating the VUGF of Each Atom-Service

According to Formula (11), the VUGF of each atom-service can be obtained as follows:

  • s1,1: Us1,1(z)=0.98z(5,0.95,16,0.9)+0.02z(5,0.95,∞,0.9), s1,2: Us1,2(z)=0.96z(15,0.9,25,0.85)+0.04z(15,0.9,∞,0.85)

  • s2,1: Us2,1(z)=0.99z(10,0.85,30,0.8)+0.01z(10,0.85,∞,0.8), s2,2: Us2,2(z)=0.97z(20,0.9,25,0.95)+0.03z(20,0.9,∞,0.95)

  • s3,1: Us3,1(z)=0.95z(18,0.95,40,095)+0.01z(18,0.95,∞,0.95), s3,2: Us3,2(z)=0.97z(6,0.85,35,0.8)+0.03z(6,0.85,∞,0.8)

  • s4,1: Us4,1(z)=0.98z(20,0.9,20,0.95)+0.02z(20,0.9,∞,0.95)

6.3. Calculating the VUGF of Each Composite Service

According to Equation (13), the VUGF of the composite services cs1, cs2, and cs4 can be calculated respectively using the composite operator Ω as follows:

U c s 1 ( z ) = l = 1 M s 1 , 1 k = 1 M s 1 , 2 p l s 1 , 1 p k s 1 , 2 z f c s 1 ( h l s 1 , 1 , h k s 1 , 2 ) U c s 2 ( z ) = l = 1 M s 2 , 1 k = 1 M s 2 , 2 p l s 2 , 1 p k s 2 , 2 z f c s 2 ( h l s 2 , 1 , h k s 2 , 2 ) U c s 4 ( z ) = l = 1 M s 4 , 1 k = 1 M s 4 , 1 p l s 4 , 1 p k s 4 , 1 z f c s 4 ( h l s 4 , 1 , h k s 4 , 1 )

The vector functions in the above four expressions, i.e., f c s 1 ( h l s 1 , 1 , h k s 1 , 2 ), f c s 2 ( h l s 2 , 1 , h k s 2 , 2 ), f c s 3 ( h l s 3 , 1 , h k s 3 , 2 ), and f c s 4 ( h l s 4 , 1 , h k s 4 , 1 ) can be obtained by using the suitable operators, which are defined in Equations (15)(18), according to the types of composite structures as well as the types of QoS indices as follows:

U c s 1 ( z ) = 0.9408 z ( 20 , 0.855 , 41 , 0.85 ) + 0.0592 z ( 20 , 0.855 , , 0.85 )
U c s 2 ( z ) = 0.9603 z ( 30 , 0.85 , 30 , 0.8 ) + 0.0397 z ( 30 , 0.85 , , 0.8 )
U c s 3 ( z ) = 0.38 z ( 18 , 0.95 , 40 , 0.95 ) + 0.02 z ( 18 , 0.95 , , 0.95 ) + 0.582 z ( 6 , 0.85 , 35 , 0.8 ) + 0.018 z ( 6 , 0.85 , , 0.8 )
U c s 4 ( z ) = 0.9604 z ( 40 , 0.81 , 40 , 0.95 ) + 0.0396 z ( 40 , 0.81 , , 0.95 )

6.4. Calculating the VUGF of the Entire SCA Instance

The given SCA instance is composed by the four composite services, i.e., cs1, cs2, cs3, and cs4, in serial. Each of the above composite services can be viewed as a complex Web service concealing its internal structures. Thereby, the VUGF of the entire SCA instance can be obtained through the calculation process like the VUGF of the cs1 as follows:

U ( z ) = Ω ( U c s 1 ( z ) , U c s 2 ( z ) , U c s 3 ( z ) , U c s 4 ( z ) ) = l = 1 M c s 1 k = 1 M c s 2 i = 1 M c s 3 j = 1 M c s 4 p l c s 1 p k c s 2 p i c s 3 p j c s 4 z f ( h l c s 1 , h k c s 2 , h i c s 3 , h j c s 4 ) = 0.3297 z ( 108 , 0.5593 , 151 , 0.8 ) + 0.1533 z ( 108 , 0.5593 , , 0.8 ) + 0.5050 z ( 96 , 0.5004 , 146 , 0.8 ) + 0.0950 z ( 96 , 0.5004 , , 0.8 )

6.5. Analysis of QoS Indices with Security Constraint in the VUGF of the Entire SCA

According to the different SCAs and their different application scenarios in WSNs, different users or designers can have different QoS requirements. These different QoS requirements are represented by some QoS constraints. The vector w = {ωcost, ωsecurity, ωexec_time, ωcredibility} represents the QoS constraints of the entire SCA instance in this example from the users or designers. It is assumed that there are four QoS constraints, including security constraint, from four different types of users:

w 1 = ( ω cost 96 , ω secutity 0.5 , ω exec _ time 150 , ω credibility 0.8 ) w 2 = ( ω cost 150 , ω secutity 0.55 , ω exec _ time 200 , ω credibility 0.8 ) w 3 = ( ω cost 150 , ω secutity 0.5 , ω exec _ time 200 , ω credibility 0.8 ) w 4 = ( ω cost 95 , ω secutity 0.55 , ω exec _ time 150 , ω credibility 0.8 )

For the different QoS constraints, the analytical values of QoS indices based on the VUGF of the entire SCA are shown in the corresponding columns of Table 2. The last column of Table 2 shows the analytical values of QoS indices in the case of non-constraint.

The analysis process of QoS indices for the above four different types of constrains are described one by one as follows:

(1)

Analysis of QoS indices for the first type of users

For the first type of users, according to Equations (39) and (40) there is only the third term which satisfies the constraint w1, i.e.:

U w 1 ( z ) = s = 1 M s y s δ w 1 ( q s z y s , w 1 ) = 0.5050 z ( 96 , 0.5004 , 146 , 0.8 )

Thereby, the QoS indices, which the SCA instance can provide to the first type of user, are cost = 96, security = 0.5004, exec_time = 146, and credibility = 0.8 respectively. The reliability, which the SCA instance can provide to the first type of user, can obtained according to Equation (41), i.e.:

R ( t ) = δ R ( U w 1 ( z ) ) = y s w 1 q s = 0.5050

The usability provided to the first type of user can be obtained according to Formula (42), i.e.:

E A = s = 1 M sys q s R ( t ) = 0.5050 × 0.5050 0.2550

(2)

Analysis of QoS indices for the second type of users

Similar to the above analysis process, for the second type of users, there is only the first term which satisfies the constraint w2, i.e.:

U w 2 ( z ) = s = 1 M s y s δ w 2 ( q s z y s , w 2 ) = 0.3297 z ( 108 , 0.5593 , 192 , 0.8 )

Thereby, the QoS indices provided to the second type of user are cost = 108, security = 0.5593, exec_time = 192, credibility = 0.8, reliability = 0.3297, and usability ≈ 0.1087, respectively.

(3)

Analysis of QoS indices for the third type of users

For the third type of users, there are two terms, i.e., the first one and the third one, which satisfy the constraint w3, i.e.:

U w 3 ( z ) = s = 1 M s y s δ w 3 ( q s z y s , w 3 ) = 0.3297 z ( 108 , 0.5593 , 192 , 0.8 ) + 0.5050 z ( 96 , 0.5004 , 146 , 0.8 )

Thereby, the QoS indices provided to the third type of users are cost = 100.74, security = 0.5237, exec_time = 164.1696, credibility = 0.8, reliability = 0.8347, and usability = 0.6967, respectively.

Because all the items, whose execution times are less than ∞, are considered in this case, the result of execution time in Uw3(z) describes the performance of the entire SCA instance. The output of the entire SCA instance can be worked out by the differentiation of this execution time. Thus, we can compare and judge different designs of composite service by evaluating the performance of the corresponding SCA instance, as well as the credibility, the reliability, the usability and so on.

(4)

Analysis of QoS indices for the fourth type of users

For the fourth type of users, there no a term that satisfy the constraint w4. Thereby, the SCA instance cannot provide the QoS indices that meet the requirements of the fourth type of user. Assume that the SCA instance has no failures during its execution. Some users are maybe not sensitive to the service execution time. In this case, the total output-performance of the entire SCA instance includes both the ones that meet the constraint w and ones that don't meet the constraint w. Without considering the execution time constraint, the total expected output-performance provided to users can be obtained according to Formula (44), i.e., cost = 109.7640, security = 0.5704, and credibility = 0.8.

6.6. Performance Sensitivity Analysis and Performance Optimization Subjected to the Security Constraint of the Entire SCA

For designers and managers of an SCA instance, it is very important and valuable to know the degree of influence on the performance of an SCA instance resulting from the performance changes of each atom-service subjected to the security constraint of the entire SCA. The performance of an SCA instance can be represented by its execution time. We chose four atom-services, i.e., s1,1, s2,1, s3,1 and s4,1, in each composite service in the SCA instance to study their performance sensitivities. In order to analyze the influence on the total execution time by each atom-service, a set of experiments have been performed. Figure 7 shows the variation of the execution time of the instance caused by the changes of the execution time of each atom-service.

The horizontal axis shows that the execution times of each atom-service gradually increase from 50% to 150% on the basis of the original values shown in Table 1. The execution time of the SCA instance, represented by these curves in Figure 7, gradually increases as the execution times of each atom-service increase.

On this basis, we analyzed the contribution on the total execution time by each atom-service. Figure 8 shows the variation of relative contribution rates on total execution time with the changes of execution time of each service. The relative contribution rates equal the growth rate of total execution time per incremental execution time of each service.

In order to analyze the performance influence on the SCA instance caused by performance changes of each atom-service, we studied the performance variation of the SCA instance caused by the performance changes of each atom-service. Figure 9 shows the gradual improvement of performance of the SCA instance as the performances of each atom-service increase from original ones of 50% to 150%.

On this basis, we analyzed the contribution on total execution time by each atom-service. Figure 10 shows the variation of relative contribution rates on total performance with the changes of performance of each atom-service. The relative contribution rates equal the growth rate of total performance per incremental performance of each atom-service.

From Figures 9 and 10, we draw the following conclusions:

(1)

These curves in Figure 9 show a rising trend from left to right in the mass, which indicates that the performance changes of each atom-service can influence the performance of the SCA instance. With the increase (decrease) of the performance of each atom-service, the performance of the SCA instance increases (decreases) gradually.

(2)

The gradients of these curves are not all the same. This indicates the degrees of influence caused by each atom-service are not all the same on the total performance of the SCA instance. From Figure 10, one can see the similar situation that the contributions on the total performance by each atom-service are not same. It can be seen that the gradient of the curve corresponding to s4,1 is the largest, which indicates the degree of influence on the total performance of the SCA instance caused by s4,1 is the largest. The gradient of the curve corresponding to s3,1 is the smallest. In the other words, the contribution rate of s4,1 on the total performance of the SCA instance is the largest. On the contrary, that of s3,1 is the smallest.

(3)

Thus, the designers and managers of the SCA instances can adjust the deployment of atom-services within an SCA instance to optimize the total performance according to the contribution rates of each atom-service. Specifically, they can improve the performance of atom-services with the highest or higher contribution rate. There are various approaches to improve the performance of atom-services. For example, in our experiment the management server is deployed on a cloud computing platform. Thus, we can add more CPU or/and more memory into the virtual machines where these atom-services are deployed. In addition, when the computing resource of the host where these atom-services are deployed is limited, we still can emigrate these atom-services to other virtual machines with better performance (such as more CPU or/and more memory).

(4)

Sometimes, the total computing resources, i.e., CPU and memory, provided to the SCA instance by the cloud computing platform are limited and cannot meet the demand. In this case, the designers and managers of the SCA instances can allocate relatively more computing resources to those atom-services with higher contribution rates, which can improve the performance of the SCA instance as much as possible.

(5)

From the curve corresponding to s2,1 in Figures 9 and 10, it can be seen that the performance improvement of the SCA instance stops after the performance of s2,1 grows to the original ones' 120%. Analyzing the composition structure of the SCA instance, we found that the parallel structure connecting s2,1 and s2,2 is the primary reason. In the other words, the contribution rate of s2,1 is limited by the performance of s2,2. In this case, the designers and managers of the SCA instances should not allocate more computing resource to s2,1.

Generally, high performance and high security may be contratictory as well as high credibility, high reputation and low cost. The value of the suggested analysis method lies in that they provide the basis for the tradeoff between these QoS indices, including security, by the users or designers.

7. Conclusions and Future Work

Services composition is one of the key software development techniques in multi-service WSNs. The QoS of SCAs is confronted with severe challenges due to the open, dynamic, and complex nature of WSNs. The traditional QoS analysis techniques, fox example Boolean Models, Markov Process and Monte-Carlo simulation technique, have some defects such as being too time-consuming, easy to cause state space explosions and unsatisfactory assumptions of component execution independence. In addition, the traditional analysis techniques seldom consider the relationship between the QoS indices. Though the classic UGF technique shows the obvious advantages of speediness and precise on the analysis of QoS indices, its computational efficiency limits the application in large-scale WSNs because only one QoS index can be analyzed simultaneously.

Being different from the general software system, there are huge number and variety of sensor services that may join or leave the system at any time in a WSNs service system. When a WSNs service system achieves a certain scale, using traditional analysis methods may cause a state space explosion, while using the classic UGF the computational efficiency and analyzing ability for comprehensive indices are difficult to meet the requirements. Depending on the abilities of parallel computation and comprehensive analysis, VUGF can successfully deal with the characteristics of large-scale sensor services and high dynamics.

Aiming at the defects in the existing methods, an improved UGF technique—VUGF—is proposed in this paper, by which the multiple QoS indices can be simultaneously analyzed and the computational efficiency is improved obviously. The VUGF eliminates the limitation for component execution independence, and more fits the actual execution of SCAs. In addition, the VUGF has very small consumption of time and space to eliminate the risk of state space explosion.

In the use of VUGF for estimating the multiple QoS indices of an SCA instance, the estimation accuracy is related to the number of divided states. The more divided states, the more accurate the estimation, at the same time more complicated the computation will be. Combining like terms and redistricting states can further reduce the calculation workload.

The suggested comprehensive QoS indices analysis based on the VUGF considers the relationship between multiple QoS indices, including security. It can be used for the evaluation of the comprehensive QoS of SCAs subjected to the security constraint in WSNs. Therefore, it can be effectively applied to the optimal design of multi-service WSNs.

In the future, we are going to study a fast optimization method for multiple QoS indices of SCAs in WSNs based on the hybrid optimization algorithm and the analysis method proposed in this paper. At first, we will further research the multiple QoS indices model of SCAs in WSNs based on the MSS theory. Then, we will further research the comprehensive evaluation method for the multiple QoS indices of SCAs in WSNs based on the VUGF. On this basis, we will research the fast optimization algorithm for multiple QoS indices of SCAs in WSNs based on the hybrid optimization algorithm.

Acknowledgments

This research was supported by the National Natural Science Funds Fund of China [61172084]; National Xinghuo Program of China [2014GA760023]; Science and Technology Support Program of Hubei Province of China [2013BHE022]; Natural Science Foundation of Hubei Province of China [2013CFC026]; Key new product research and development of Hubei Province of China [2012BBA25002, 2012IHA015]; The Universities Outstanding Youth Science and Technology Innovation Team Project of Hubei Province of China [T201413]; International cooperation project in Su Zhou city [SH201214]; Youth Science Foundation of Jiangxi Province [20122BAB211022].

Author Contributions

Naixue Xiong and Zhao Wu originated this work and prepared the manuscript. Zhao Wu, Naixue Xiong and Degang Xu contributed to the theoretical studies. Zhao Wu and Yannong Huang designed the experiments. Naixue Xiong helped Zhao Wu improve the quality of this work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mottola, L.; Picco, G.P. Programming wireless sensor networks: Fundamental concepts and state of the art. ACM Comput. Surv. 2011, 43, 1–51. [Google Scholar]
  2. Kim, Y.; Chang, H. A. Study on Small and Medium Enterprise Information Foundation for Wireless Sensor Networks Work Environment Implementation. Sens. Lett. 2013, 11, 1799–1803. [Google Scholar]
  3. Guinard, D.; Trifa, V.; Karnouskos, S.; Spiess, P.; Savio, D. Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services. IEEE Trans. Serv. Comput. 2010, 3, 223–235. [Google Scholar]
  4. Oshri, I.; van Uhm, B. A historical review of the information technology and business process captive centre sector. J. Inf. Technol. 2012, 27, 270–284. [Google Scholar]
  5. Havlik, D.; Schade, S.; Sabeur, Z.A.; Mazzetti, P.; Watson, K.; Berre, A.J.; Mon, J.L. From Sensor to Observation Web with Environmental Enablers in the Future Internet. Sensors 2011, 11, 3874–3907. [Google Scholar]
  6. Chang, K.D.; Chen, J.L. A. Survey of Trust Management in WSNs, Internet of Things and Future Internet. KSII Trans. Internet Inf. Syst. 2012, 6, 5–23. [Google Scholar]
  7. Wu, Z.; Xiong, N.X.; Han, W.L.; Huang, Y.N.; Hu, C.Y.; Gu, Q.; Hang, B. A. Fault-Tolerant Method for Enhancing Reliability of Services Composition Application in WSNs Based on BPEL. Int. J. Distrib. Sens. Netw. 2013, 2013. [Google Scholar] [CrossRef]
  8. Glombitza, N.; Ebers, S.; Pfisterer, D.; Fischer, S. Using BPEL to Realize Business Processes for an Internet of Things. Proceedings of the 10th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW), Paderborn, Germany, 18–20 July 2011; pp. 294–307.
  9. Faghih, M.M.; Moghaddam, M.E. SOMM: A New Service Oriented Middleware for Generic Wireless Multimedia Sensor Networks Based on Code Mobility. Sensors 2011, 11, 10343–10371. [Google Scholar]
  10. Moritz, G.; Golatowski, F.; Lerche, C.; Timmermann, D. Beyond 6LoWPAN: Web Services in Wireless Sensor Networks. IEEE Trans. Ind. Inf. 2013, 9, 1795–1805. [Google Scholar]
  11. Liu, L.; Masfary, O.; Antonopoulos, N. Energy Performance Assessment of Virtualization Technologies Using Small Environmental Monitoring Sensors. Sensors 2012, 12, 6610–6628. [Google Scholar]
  12. De Pauw, T.; Volckaert, B.; Hristoskova, A.; Ongenae, V.; de Turck, F. Symbiotic Service Composition in Distributed Sensor Networks. Int. J. Distrib. Sens. Netw. 2013, 2013. [Google Scholar] [CrossRef]
  13. Choi, M.; Jeong, Y.S.; Park, J.H. Improving Performance through REST Open API Grouping for Wireless Sensor Network. Int. J. Distrib. Sens. Netw. 2013, 2013. [Google Scholar] [CrossRef]
  14. Xi, N.; Ma, J.F.; Sun, C.; Shen, Y.L.; Zhang, T. Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network. Int. J. Distrib. Sens. Netw. 2013, 2013. [Google Scholar] [CrossRef]
  15. Gracanin, D.; Eltoweissy, M.; Wadaa, A.; DaSilva, L.A. A service-centric model for wireless sensor networks. IEEE J. Sel. Areas Commun. 2005, 23, 1159–1166. [Google Scholar]
  16. Egyed, A. Dynamic deployment of executing and simulating software components. In Component Deployment; Springer: Berlin/Heidelberg, Germany, 2004; Volume 3083, pp. 113–128. [Google Scholar]
  17. Kang, S.; Lee, J.; Jang, H.; Lee, Y.; Park, S.; Song, J. A. Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks. IEEE Trans. Mob. Comput. 2010, 9, 686–702. [Google Scholar]
  18. Sun, L.; Yang, D.; Qin, Y.J.; Zhang, H.K. Energy-Aware Service Selection Method Based on Sharing Routes in Wireless Sensor Networks. China Commun. 2011, 8, 25–33. [Google Scholar]
  19. Xia, F. QoS challenges and opportunities in wireless sensor/actuator networks. Sensors 2008, 8, 1099–1110. [Google Scholar]
  20. He, L.; Yang, Z.; Pan, J.P.; Cai, L.; Xu, J.D.; Gu, Y. Evaluating Service Disciplines for On-Demand Mobile Data Collection in Sensor Networks. IEEE Trans. Mob. Comput. 2014, 13, 797–810. [Google Scholar]
  21. Ehsan, S.; Hamdaoui, B. A. Survey on Energy-Efficient Routing Techniques with QoS Assurances for Wireless Multimedia Sensor Networks. IEEE Comm. Surv. Tutor. 2012, 14, 265–278. [Google Scholar]
  22. Abu-Mahfouz, A.M.; Hancke, G.P. An efficient distributed localisation algorithm for wireless sensor networks: Based on smart reference-selection method. Int. J. Sens. Netw. 2013, 13, 94–111. [Google Scholar]
  23. Aveyard, R.L. Boolean model for a class of discrete event systems. IEEE Trans. Syst. Man Cybern. 1974, 3, 249–258. [Google Scholar]
  24. Broadbent, S.R. The Inspection of a Markov Process. J. R. Stat. Soc. Ser. B Stat. Methodol. 1958, 20, 111–119. [Google Scholar]
  25. Marseguerra, M.; Zio, E.; Devooght, J.; Labeau, P.E. A concept paper on dynamic reliability via Monte Carlo simulation. Math. Comput. Simul. 1998, 47, 371–382. [Google Scholar]
  26. Lisnianski, A.; Levitin, G. Multi-State System Reliability: Assessment, Optimization and Applications; World Scientific: Singapore, 2003; pp. 15–48. [Google Scholar]
  27. Ansola, P.G.; Morenas, J.D.; Garcia, A.; Otamendi, J. Distributed decision support system for airport ground handling management using WSN and MAS. Eng. Appl. Artif. Intell 2012, 25, 544–553. [Google Scholar]
  28. Sleman, A.; Moeller, R. SOA Distributed Operating System for Managing Embedded Devices in Home and Building Automation. IEEE Trans. Consum. Electron 2011, 57, 945–952. [Google Scholar]
  29. Malatras, A.; Asgari, A.; Bauge, T. Web Enabled Wireless Sensor Networks for Facilities Management. IEEE Syst. J. 2008, 2, 500–512. [Google Scholar]
  30. Tong, E.D.; Niu, W.J.; Li, G.; Tang, D.; Chang, L.; Shi, Z.Z.; Ci, S. Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks. J. Netw. Comput. Appl. 2014, 39, 38–51. [Google Scholar]
  31. Martinez, J.F.; Familiar, M.S.; Corredor, I.; Garcia, A.B.; Bravo, S.; Lopez, L. Composition and deployment of e-Health services over Wireless Sensor Networks. Math. Comput. Model. 2011, 53, 485–503. [Google Scholar]
  32. Wang, X.; Wang, J.; Zheng, Z.; Xu, Y.; Yang, M. Service Composition in Service-Oriented Wireless Sensor Networks with Persistent Queries. Proceedings of the 6th IEEE Consumer Communication and Networking Conference, Las Vegas, NV, USA, 11–13, January 2009.
  33. Stajano, F.; Hoult, N.; Wassell, I.; Bennett, P.; Middleton, C.; Soga, K. Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure. Ad Hoc Netw. 2010, 8, 872–888. [Google Scholar]
  34. Mostarda, L.; Dong, C.Y.; Dulay, N. Context-based authentication and transport of cultural assets. Pers. Ubiquitous Comput. 2010, 14, 321–334. [Google Scholar]
  35. Han, G.J.; Jiang, J.F.; Shu, L.; Niu, J.W.; Chao, H.C. Management and applications of trust in Wireless Sensor Networks: A survey. J. Comput. Syst. Sci. 2014, 80, 602–617. [Google Scholar]
  36. Zin, S.M.; Anuar, N.B.; Kiah, M.L.M.; Pathan, A.S.K. Routing protocol design for secure WSN: Review and open research issues. J. Netw. Comput. Appl. 2014, 41, 517–530. [Google Scholar]
  37. Mitchell, R.; Chen, I.R. A survey of intrusion detection in wireless network applications. Comput. Comm. 2014, 42, 1–23. [Google Scholar]
  38. Zhou, J.; Geng, Y.S.; Wang, X.G. Research on the Key Technologies of Wireless Sensor Networks in Smart Power Grids. Proceedings of the International Conference on Mechatronics and Industrial Information (ICMII 2013), Guangzhou, China, 13–14, March 2013; pp. 1396–1399.
  39. Haji, R.; Hasbi, A.; Ghallali, M.; El Ouahidi, B. Towards an Adaptive QoS-Oriented and Secure Framework for Wireless Sensor Networks in Emergency Situations. Proceedings of the International Conference on Multimedia Computer and System (ICMCS), Tangiers, Morocco, 10–12, May 2012; pp. 1007–1011.
  40. Zhou, L.; Chao, H.C.; Vasilakos, A.V. Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks. IEEE J. Sel. Areas in Commun. 2011, 29, 1358–1367. [Google Scholar]
  41. Lu, K.; Qian, Y.; Guizani, M.; Chen, H.H. A. Framework for a Distributed Key Management Scheme in Heterogeneous Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 2008, 7, 639–647. [Google Scholar]
  42. Barlow, R.; Wu, A. Coherent system with multistate elements. Math. Oper. Res. 1978, 3, 275–281. [Google Scholar]
  43. El-Neveihi, E.; Proschan, F.; Setharaman, J. Multistate coherent system. J. Appl. Prob. 1978, 15, 675–688. [Google Scholar]
  44. Murhland, J. Fundamental concepts and relations for reliability analysis of Multi-state system. Reliab. Fault Tree Anal. 1975, 581–618. [Google Scholar]
  45. Ross, S. Mulivalued state element system. Ann. Prob. 1979, 7, 379–383. [Google Scholar]
  46. Levitin, G. Reliability and performance analysis for fault-tolerant programs consisting of versions with different characteristics. Reliab. Eng. Syst. Saf. 2004, 86, 75–81. [Google Scholar]
  47. Levitin, G. A universal generating function approach for the analysis of multi-state systems with dependent elements. Reliab. Eng. Syst. Saf. 2004, 84, 285–292. [Google Scholar]
Figure 1. Architecture of SCAs in WSNs.
Figure 1. Architecture of SCAs in WSNs.
Sensors 14 22706f1 1024
Figure 2. Working mechanisms of the WSN service broker.
Figure 2. Working mechanisms of the WSN service broker.
Sensors 14 22706f2 1024
Figure 3. Relationships between G, g and q in the VUGF.
Figure 3. Relationships between G, g and q in the VUGF.
Sensors 14 22706f3 1024
Figure 4. Relationships between Y and α in the UGF.
Figure 4. Relationships between Y and α in the UGF.
Sensors 14 22706f4 1024
Figure 5. Composite structure of an example of SCA instance.
Figure 5. Composite structure of an example of SCA instance.
Sensors 14 22706f5 1024
Figure 6. A numerical example.
Figure 6. A numerical example.
Sensors 14 22706f6 1024
Figure 7. The influence on the execution time of the SCA instance by the changes of the execution time of each atom-service.
Figure 7. The influence on the execution time of the SCA instance by the changes of the execution time of each atom-service.
Sensors 14 22706f7 1024
Figure 8. Relative contribution rates on total execution time by each atom-service.
Figure 8. Relative contribution rates on total execution time by each atom-service.
Sensors 14 22706f8 1024
Figure 9. The performance influence on the SCA instance by the performance changes of each atom-service.
Figure 9. The performance influence on the SCA instance by the performance changes of each atom-service.
Sensors 14 22706f9 1024
Figure 10. Relative contribution rates on total performance of the SCA instance by each atom-service.
Figure 10. Relative contribution rates on total performance of the SCA instance by each atom-service.
Sensors 14 22706f10 1024
Table 1. The QoS indices values of each service in the numerical example.
Table 1. The QoS indices values of each service in the numerical example.
QoS Indicescs1cs2cs3cs4




s1,1s1,2s2,1s2,2s3,1s3,2s4,1
Reliability0.980.960.990.970.950.970.98
Cost515102018620
Security0.950.900.850.900.950.850.90
Execution Time16253025403520
Credibility0.900.850.800.950.950.800.95
Table 2. The analytical values of QoS indices based on the VUGF of the entire SCA.
Table 2. The analytical values of QoS indices based on the VUGF of the entire SCA.
QoS IndicesQoS Constraints

ω1ω2ω3ω4φ
Reliability0.50500.32970.8347--
Cost96.00108.00100.74-109.76
Security0.50040.55930.5237-0.5704
Execution Time146192164--
Credibility0.80.80.8-0.8
Usability0.25500.10870.6967--

Share and Cite

MDPI and ACS Style

Xiong, N.; Wu, Z.; Huang, Y.; Xu, D. Analyzing Comprehensive QoS with Security Constraints for Services Composition Applications in Wireless Sensor Networks. Sensors 2014, 14, 22706-22736. https://doi.org/10.3390/s141222706

AMA Style

Xiong N, Wu Z, Huang Y, Xu D. Analyzing Comprehensive QoS with Security Constraints for Services Composition Applications in Wireless Sensor Networks. Sensors. 2014; 14(12):22706-22736. https://doi.org/10.3390/s141222706

Chicago/Turabian Style

Xiong, Naixue, Zhao Wu, Yannong Huang, and Degang Xu. 2014. "Analyzing Comprehensive QoS with Security Constraints for Services Composition Applications in Wireless Sensor Networks" Sensors 14, no. 12: 22706-22736. https://doi.org/10.3390/s141222706

Article Metrics

Back to TopTop