A Heterogeneous Layer-Based Trustworthiness Model for Long Backhaul NVIS Challenging Networks and an IoT Telemetry Service for Antarctica
Abstract
:1. Introduction
2. Background Work in IoT
2.1. IoT Access Network
2.2. IoT Backbone Network
3. Related Work on Cyber Physical Systems’ Trustworthiness
- Data Trustworthiness: It is defined as the possibility of ascertaining the correctness of the data provided by the source [33]. Many methods try to detect faulty nodes, false alarms, and sensor misreading using different approaches [32]. For instance, the authors of [34] presented a distributed Bayesian algorithm to detect faulty nodes, while the authors of [35] used a fog computing architecture to detect, filter, and correct abnormal sensed data. In addition, the authors of [36] presented a data intrusion detection system to trigger false data from malicious attacks;
- Network Trustworthiness: It can be defined as the probability that a packet will reach its destination unaltered despite the adversities (e.g., link failure, link saturation, malicious attacks), and it is a crucial factor of low-power and lossy networks (LLNs) [37]. Improving network trustworthiness and performance is a challenge that has been addressed from different perspectives such as transmission coding [38,39,40,41], load balancing and redundancy protocols [42], transport protocols [43], dynamic routing and topology control protocols [44,45], cybersecurity mechanisms [46], and delay tolerant network (DTN) architectures and protocols [47]. In the case of routing, both proactive routing protocols (e.g., the IPv6 Routing Protocol for low-power and lossy networks (RPL) and optimized link state routing (OLSR)) and reactive routing protocols (e.g., ad hoc on-demand distance vector (AODV) and link-quality source routing (LQSR)) have been proposed in the literature to solve the drawbacks of LLNs and MANETs [44,45];
- Social Trustworthiness: This trend has gained more attention since the irruption of the Social Internet of Things (SIoT) concept [48,49]. In SIoT trustworthiness, the capability of the objects to establish social relationships autonomously between them is leveraged to define more complex trust and reputation models that take into account several input parameters. The authors of [50] define a subjective model that considers factors as the computational capabilities of the nodes, the type of relationship between them, the total number of transactions, the credibility of a node, and the feedback provided by other nodes, among others. In [51], the authors evolved their previous model and based it on more parameters, such as the neighborhood of nodes, and presented a new objective model with a faster transitory response. The authors of [52] proposed another model that defines the input parameters as the expected gain on success, the expected damage on a failure, the expected cost, the expected result, and the goal. The authors of [53] define a decentralized, self-enforcing trust management system based on a feedback system and reputationally secure multiparty calculations to ensure the privacy of each party’s provided data;
- Consensus: This represents a state where all participants of the same distributed system agree on the same data values [54]. Consensus protocols can be divided into two general blocks: proof-based consensus and byzantine consensus. The first group is oriented to blockchain technology, where all participants compete with each other to mine a block, and the most used protocols are proof-of-work, proof-of-stake, and its variants [55,56,57,58,59]. The main drawback of these protocols for IoT is that most devices have simple hardware specifications and low processing power, being incapable of performing the mining tasks of blockchain [60]. The second major group of consensus protocols is the more classical byzantine based. These kinds of protocols implement voting-based mechanisms to reach an agreement rather than competing among them, which generally results in less resource consumption. The drawback of these mechanisms is the number of messages that need to be delivered through the network to reach an agreement. The most well-known protocols in this category are Practical Byzantine Fault Tolerance, RAFT, PaXoS, and Ripple, although several variants have emerged year-by-year [55].
4. Network and Service Architecture
- Due to the fact of Antarctica’s extreme weather and environmental conditions, both sensors and gateways could experience temporary or persistent malfunctioning;
- The irregular elevations of the Antarctic terrain might create situations where sensors do not have a LoS path through the gateway. This fact degrades the performance of LoRa communications considerably [23];
5. Trustworthiness Model Definition
5.1. Trustworthiness Layers’ Definitions
- Data Trustworthiness Layer: Is the layer responsible for ascertaining the correctness of the data provided by the source;
- Network Trustworthiness Layer: Is the layer responsible for assuring that a packet reaches its destination on time and unaltered despite the adversities (e.g., link failure, link saturation, or malicious attacks);
- Social Trustworthiness Layer: Is the layer responsible for leveraging the capability of the objects to establish social relationships autonomously between them to improve the trust between them and the correctness of gathered data;
- Consensus Layer: Is the layer responsible for reaching a state where all participants of a group agree on the same response or result.
5.2. Trustworthiness Layers’ Metrics
5.3. Trustworthiness Improvement Examples
5.3.1. Data Trustworthiness Countermeasures
5.3.2. Network Trustworthiness Countermeasures
5.3.3. Social Trustworthiness Countermeasures
5.3.4. Consensus Countermeasures
5.4. Trustworthiness Layers’ Dependencies
6. Simulation Tests
6.1. Network Models
6.2. Node Model
6.3. Application Model
6.4. Social Trustworthiness Model
6.5. Consensus Model
6.6. Tests Definitions
7. Simulation Results
8. Conclusions
- The solution still has an STR greater than the desired minimum value;
- The solution has less cost than the solution with the highest trustworthiness in any sense (e.g., economic, computational resources, network load);
- The difference of the STR value achieved by the solution with less trustworthiness and the solution with the highest trustworthiness is less or equal to an established threshold value dmax.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
Algorithm A1: Sensor Node Application Pseudocode |
int t, gateway_id, own_id, pk_id, tx_time, num_retries; |
int data_values[3 2], node_reputations[N]; //N: number of redundnant nodes |
float Pb0, Pb, k; |
boolean consensus, social, is_leader, ack_received; |
initializeVariables(Pb0,k,consensus,social, gateway_id, own_id, is_leader, ack_received); |
for (t=0; t++; t<T_MAX){ |
num_retries = 0; |
Pb = Pb0 + k * t; |
data_values = gatherData(Pb); |
if (consensus==TRUE){ |
data_values = reachGeneralAgreement(data_values); |
if (social==TRUE) node_reputations = computeReputations(); |
if (checkLeader(node_reputations)==TRUE) |
[tx_time, pk_id] = sendPacket(data_values, gateway_id, own_id); |
}else{ |
pk_id = NULL; |
} |
}else{ |
[tx_time, pk_id] = sendPacket(data_values, gateway_id, own_id); |
} |
if (pk_id != NULL){ |
ack_received = checkAck(pk_id); |
while(ack_received==FALSE && num_retries<MAX_RETRIES){ |
if (currentTime() >= tx_time + MAX_TIMEOUT){ |
[tx_time, pk_id] = sendPacket(data_values, gateway_id, own_id); |
num_retries++; |
} |
ack_received = checkAck(pk_id); |
} |
} |
pk_id = NULL; |
} |
Algorithm A2: Gateway Node Application Pseudocode |
int own_id, sensor_id; control_ctr_id, pk_id, tx_time, num_retries; |
int data_values[32], stored_values[N][32], node_reputations[N]; //N: number of redundnant nodes |
float Pb; |
boolean social, ack_received, data_pk_received; |
initializeVariables(Pb, social, sensor_id, pk_id, own_id, control_ctr_id, ack_received, data_pk_received); |
while(TRUE){ |
num_retries = 0; |
if (dataPkReceived()==TRUE){ |
[sensor_id, pk_id, data_values] = retrievePkData(); |
if (social==FALSE){ |
sendAck(pk_id, own_id, sensor_id); |
[tx_time, pk_id] = forwardDataPk(data_values, gateway_id, sensor_id, control_ctr_id); |
ack_received = checkAck(pk_id); |
while(ack_received==FALSE && num_retries<MAX_RETRIES){ |
if (currentTime() >= tx_time + MAX_TIMEOUT){ |
[tx_time, pk_id] = forwardDataPk(data_values, gateway_id, sensor_id, control_ctr_id); |
num_retries++; |
} |
ack_received = checkAck(pk_id); |
} |
ack_received=FALSE; |
num_retries=0; |
}else{ |
stored_values[sensor_id] = data_values; |
node_reputations[sensor_id] = computeReputation(data_values); |
if (roundIsFinished()==TRUE){ |
[data_values, sensor_id] = chooseData(node_reputations, stored_values); |
[tx_time, pk_id] = forwardDataPk(data_values, gateway_id, sensor_id, control_ctr_id); |
ack_received = checkAck(pk_id); |
while(ack_received==FALSE && num_retries<MAX_RETRIES){ |
if (currentTime() >= tx_time + MAX_TIMEOUT){ |
[tx_time, pk_id] = forwardDataPk(data_values, gateway_id, sensor_id, control_ctr_id); |
num_retries++; |
} |
ack_received = checkAck(pk_id); |
} |
ack_received=FALSE; |
num_retries=0; |
} |
} |
} |
} |
Algorithm A3: Control Center Application Pseudocode |
int own_id, sensor_id; gateway_id, pk_id; |
int data_values[32]; |
boolean data_pk_received; |
initializeVariables(sensor_id, pk_id, own_id, gateway_id, data_pk_received); |
while(TRUE){ |
if (dataPkReceived()==TRUE){ |
[sensor_id, gateway_id, pk_id, data_values] = retrievePkData(); |
storeData(data_values, sensor_id); |
computeSTR(data_values); |
sendAck(pk_id, gateway_id); |
} |
} |
References
- Kanao, M.; Genti, T.; Yamamoto, M.-Y. Antarctica—A Key to Global Change; IntechOpen: London, UK, 2019. [Google Scholar]
- Antarctic Stations—Scientific Research Bases and Facilities. Available online: https://www.coolantarctica.com/Community/antarctic_bases.php (accessed on 29 March 2021).
- Kennicutt, M.C.; Kim, Y.D.; Rogan-Finnemore, M.; Anandakrishnan, S.; Chown, S.L.; Colwell, S.; Cowan, D.; Escutia, C.; Frenot, Y.; Hall, J.; et al. Delivering 21st century Antarctic and Southern Ocean science. Antarct. Sci. 2016, 28, 407–423. [Google Scholar] [CrossRef] [Green Version]
- Porté, J.; Lluis Pijoan, J.; Masó, J.; Badia, D.; Zaballos, A.; Maria Alsina-Pagès, R. Advanced HF Communications for Remote Sensors in Antarctica. In Antarctica—A Key to Global Change; IntechOpen: London, UK, 2019; pp. 21–39. [Google Scholar]
- NVIS Sensors Network for the South Shetland Islands. Available online: https://www.salleurl.edu/en/research/research-lines-and-institutes/antarctica-project/summary (accessed on 29 March 2021).
- Maso, J.; Porte, J.; Pijoan, J.L.; Badia, D. Internet of things communications for remote sensors in Antarctica using NVIS. In Proceedings of the Nordic HF, Fårö, Sweden, 12–14 August 2019; Volume 3. [Google Scholar]
- Porte, J.; Maso, J.M.; Pijoan, J.L.; Badia, D. Sensing System for Remote Areas in Antarctica. Radio Sci. 2020, 55, 1–12. [Google Scholar] [CrossRef]
- Vilella, C.; Miralles, D.; Pijoan, J.L. An Antarctica-to-Spain HF ionospheric radio link: Sounding results. Radio Sci. 2008, 43, 1–17. [Google Scholar] [CrossRef]
- Ads, A.G.; Bergadà, P.; Vilella, C.; Regué, J.R.; Pijoan, J.L.; Bardají, R.; Mauricio, J. A comprehensive sounding of the ionospheric HF radio link from Antarctica to Spain. Radio Sci. 2013, 48, 1–12. [Google Scholar] [CrossRef]
- Hervás, M.; Ma Alsina-Pagès, R.; Orga, F.; Altadill, D.; Pijoan, J.L.; Badia, D. Narrowband and wideband channel sounding of an antarctica to spain ionospheric radio link. Remote Sens. 2015, 7, 11712–11730. [Google Scholar] [CrossRef] [Green Version]
- Male, J.; Porte, J.; Gonzalez, T.; Maso, J.M.; Pijoan, J.L.; Badia, D. Analysis of the Ordinary and Extraordinary Ionospheric Modes for NVIS Digital Communications Channels. Sensors 2021, 21, 2210. [Google Scholar] [CrossRef]
- Jerez, S.; Motas, M.; Benzal, J.; Diaz, J.; Barbosa, A. Monitoring trace elements in Antarctic penguin chicks from South Shetland Islands, Antarctica. Mar. Pollut. Bull. 2013, 69, 67–75. [Google Scholar] [CrossRef]
- Sancho, L.G.; Pintado, A.; Green, T.G.A. Antarctic Studies Show Lichens to be Excellent Biomonitors of Climate Change. Diversity 2019, 11, 42. [Google Scholar] [CrossRef] [Green Version]
- Aidi, L.; Changsu, J. Delay Tolerant Network. 2012, pp. 1–19. Available online: https://www.academia.edu/download/33087272/delaytolerantnetwork.pdf (accessed on 29 March 2021).
- Regi, M.; De Lauretis, M.; Redaelli, G.; Francia, P. ULF Geomagnetic Activity Signatures in the Atmospheric Parameters in Antarctica. In Antarctica—A Key to Global Change; IntechOpen: London, UK, 2019; pp. 5–20. [Google Scholar]
- Palm, S.P.; Yang, Y.; Kayetha, V. New Perspectives on Blowing Snow in Antarctica and Implications for Ice Sheet Mass Balance. In Antarctica—A Key to Global Change; IntechOpen: London, UK, 2019; pp. 41–57. [Google Scholar]
- Thomas, E.R.; Tetzner, D.R. The Climate of the Antarctic Peninsula during the Twentieth Century: Evidence from Ice Cores. In Antarctica—A Key to Global Change; IntechOpen: London, UK, 2019; pp. 75–92. [Google Scholar]
- de Pablo Hernández, M.Á.; Jiménez, J.J.; Ramos, M.; Prieto, M.; Molina, A.; Vieira, G.; Hidalgo, M.A.; Fernández, S.; Recondo, C.; Calleja, J.F.; et al. Frozen ground and snow cover monitoring in livingston and deception islands, antarctica: Preliminary results of the 2015-2019 PERMASNOW project. Geogr. Res. Lett. 2020, 46, 187–222. [Google Scholar] [CrossRef] [Green Version]
- Riverbed Modeler. Available online: https://www.riverbed.com/gb/products/npm/riverbed-modeler.html (accessed on 29 March 2021).
- Al-Sarawi, S.; Anbar, M.; Alieyan, K.; Alzubaidi, M. Internet of Things (IoT) communication protocols: Review. In Proceedings of the IEEE 2017 8th International Conference on Information Technology (ICIT), Amman, Jordan, 17–18 May 2017; pp. 685–690. [Google Scholar]
- Oliveira, L.; Rodrigues, J.J.P.C.; Kozlov, S.A.; Rabêlo, R.A.L.; de Albuquerque, V.H.C. MAC layer protocols for Internet of Things: A survey. Futur. Internet 2019, 11, 16. [Google Scholar] [CrossRef] [Green Version]
- Jolly, B.; Willig, A.; McDonald, A.; Pannell, M.; Plank, G. SNOWWEB—Wirelessly connected weather stations in Antarctica. In Proceedings of the 38th Annual IEEE Conference on Local Computer Networks—Workshops, Sydney, Australia, 21–24 October 2013; pp. 194–202. [Google Scholar]
- Gaelens, J.; Van Torre, P.; Verhaevert, J.; Rogier, H. Lora mobile-to-base-station channel characterization in the Antarctic. Sensors 2017, 17, 1903. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Zaidi, S.; Atiquzzaman, M.; Calafate, C.T. Internet of Flying Things (IoFT): A survey. Comput. Commun. 2020, 165, 53–74. [Google Scholar] [CrossRef]
- Liu, D.; Xu, Y.; Wang, J.; Chen, J.; Yao, K.; Wu, Q.; Anpalagan, A. Opportunistic UAV utilization in wireless networks: Motivations, applications, and challenges. IEEE Commun. Mag. 2020, 58, 62–68. [Google Scholar] [CrossRef]
- Guillen-Perez, A.; Cano, M.D. Flying ad hoc networks: A new domain for network communications. Sensors 2018, 18, 3571. [Google Scholar] [CrossRef] [Green Version]
- Lee, S.; Wu, Y.; Mortari, D. Satellite constellation design for telecommunication in Antarctica. Int. J. Satell. Commun. Netw. 2016, 34, 725–737. [Google Scholar] [CrossRef]
- Porte, J.; Briones, A.; Maso, J.M.; Pares, C.; Zaballos, A.; Pijoan, J.L. Heterogeneous wireless IoT architecture for natural disaster monitorization. EURASIP J. Wirel. Commun. Netw. 2020, 2020, 184. [Google Scholar] [CrossRef]
- Lee, E.A. Cyber physical systems: Design challenges. In Proceedings of the 2008 11th IEEE international symposium on object and component-oriented real-time distributed computing (ISORC), Orlando, FL, USA, 5–7 May 2008; pp. 363–369. [Google Scholar]
- Zanero, S. Cyber-Physical Systems. Computer 2017, 50, 14–16. [Google Scholar] [CrossRef] [Green Version]
- Crawford, M.; Liongosary, E. IIC Journal of Innovation; The Industrial Internet of Things Consortium: Milford, CT, USA, 2018; Volume 9. [Google Scholar]
- Tang, L.A.; Yu, X.; Kim, S.; Gu, Q.; Han, J.; Leung, A.; La Porta, T. Trustworthiness analysis of sensor data in cyber-physical systems. J. Comput. Syst. Sci. 2013, 79, 383–401. [Google Scholar] [CrossRef]
- Haron, N.; Jaafar, J.; Aziz, I.A.; Hassan, M.H.; Shapiai, M.I. Data trustworthiness in Internet of Things: A taxonomy and future directions. In Proceedings of the 2017 IEEE Conference on Big Data and Analytics (ICBDA), Kuching, Malaysia, 16–17 November 2017; pp. 25–30. [Google Scholar]
- Yuan, H.; Zhao, X.; Yu, L. A Distributed Bayesian Algorithm for data fault detection in wireless sensor networks. In Proceedings of the IEEE 2015 International Conference on Information Networking (ICOIN), Siem Reap, Cambodia, 12–14 January 2015; pp. 63–68. [Google Scholar]
- Zhang, G.; Li, R. Fog computing architecture-based data acquisition for WSN applications. China Commun. 2017, 14, 69–81. [Google Scholar] [CrossRef]
- Fantacci, R.; Nizzi, F.; Pecorella, T.; Pierucci, L.; Roveri, M. False Data Detection for Fog and Internet of Things Networks. Sensors 2019, 19, 4235. [Google Scholar] [CrossRef] [Green Version]
- Hassan, M.M.; Gumaei, A.; Huda, S.; Almogren, A. Increasing the Trustworthiness in the Industrial IoT Networks through a Reliable Cyberattack Detection Model. IEEE Trans. Ind. Inform. 2020, 16, 6154–6162. [Google Scholar] [CrossRef]
- Dhaliwal, S.; Singh, N.; Kaur, G. Performance Analysis of Convolutional code over different Code rates and Constraint length in Wireless Communication. In Proceedings of the IEEE 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), Palladam, India, 10–11 February 2017; pp. 464–468. [Google Scholar]
- Feng, D.; Xu, H.; Zheng, J.; Bai, B. Nonbinary LDPC-Coded Spatial Modulation. IEEE Trans. Wirel. Commun. 2018, 17, 2786–2799. [Google Scholar] [CrossRef]
- Fang, Y.; Chen, P.; Cai, G.; Lau, F.C.M.; Liew, S.C.; Han, G. Outage-limit-approaching channel coding for future wireless communications: Root-protograph low-density parity-check codes. IEEE Veh. Technol. Mag. 2019, 14, 85–93. [Google Scholar] [CrossRef]
- Bioglio, V.; Condo, C.; Land, I. Design of Polar Codes in 5G New Radio. IEEE Commun. Surv. Tutor. 2021, 23, 29–40. [Google Scholar] [CrossRef] [Green Version]
- Semong, T.; Maupong, T.; Anokye, S.; Kehulakae, K.; Dimakatso, S.; Boipelo, G.; Sarefo, S. Intelligent load balancing techniques in software defined networks: A survey. Electronics 2020, 9, 1091. [Google Scholar] [CrossRef]
- Polese, M.; Chiariotti, F.; Bonetto, E.; Rigotto, F.; Zanella, A.; Zorzi, M. A survey on recent advances in transport layer protocols. IEEE Commun. Surv. Tutor. 2019, 21, 3584–3608. [Google Scholar] [CrossRef] [Green Version]
- Alahari, H.P.; Yalavarthi, S.B. A Survey on Network Routing Protocols in Internet of Things (IOT). Int. J. Comput. Appl. 2017, 160, 18–22. [Google Scholar] [CrossRef]
- Ahmed, D.E.M.; Khalifa, O.O. A Comprehensive Classification of MANETs Routing Protocols. Int. J. Comput. Appl. Technol. Res. 2017, 6, 141–158. [Google Scholar] [CrossRef]
- Mrabet, H.; Belguith, S.; Alhomoud, A.; Jemai, A. A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors 2020, 20, 3625. [Google Scholar] [CrossRef]
- Bounsiar, S.; Benhamida, F.Z.; Henni, A.; Ipiña, D.L.d.; Mansilla, D.C. How to Enable Delay Tolerant Network Solutions for Internet of Things: From Taxonomy to Open Challenges. Proceedings 2019, 31, 24. [Google Scholar] [CrossRef] [Green Version]
- Atzori, L.; Iera, A.; Morabito, G. SIoT: Giving a Social Structure to the Internet of Things. IEEE Commun. Lett. 2011, 15, 1193–1195. [Google Scholar] [CrossRef]
- Caballero, V.; Vernet, D.; Zaballos, A. Social Internet of Energy—A New Paradigm for Demand Side Management. IEEE Internet Things J. 2019, 6, 9853–9867. [Google Scholar] [CrossRef]
- Nitti, M.; Girau, R.; Atzori, L.; Iera, A.; Morabito, G. A subjective model for trustworthiness evaluation in the social Internet of Things. In Proceedings of the 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications—(PIMRC), Sydney, Australia, 9–12 September 2012; pp. 18–23. [Google Scholar]
- Nitti, M.; Girau, R.; Atzori, L. Trustworthiness Management in the Social Internet of Things. IEEE Trans. Knowl. Data Eng. 2013, 26, 1253–1266. [Google Scholar] [CrossRef]
- Lin, Z.; Dong, L. Clarifying Trust in Social Internet of Things. IEEE Trans. Knowl. Data Eng. 2018, 30, 234–248. [Google Scholar] [CrossRef] [Green Version]
- Azad, M.A.; Bag, S.; Hao, F.; Shalaginov, A. Decentralized Self-Enforcing Trust Management System for Social Internet of Things. IEEE Internet Things J. 2020, 7, 2690–2703. [Google Scholar] [CrossRef]
- Xiao, Y.; Zhang, N.; Lou, W.; Hou, Y.T. A Survey of Distributed Consensus Protocols for Blockchain Networks. IEEE Commun. Surv. Tutor. 2020, 22, 1432–1465. [Google Scholar] [CrossRef] [Green Version]
- Bodkhe, U.; Mehta, D.; Tanwar, S.; Bhattacharya, P.; Singh, P.K.; Hong, W.C. A survey on decentralized consensus mechanisms for cyber physical systems. IEEE Access 2020, 8, 54371–54401. [Google Scholar] [CrossRef]
- Zoican, S.; Vochin, M.; Zoican, R.; Galatchi, D. Blockchain and Consensus Algorithms in Internet of Things. In Proceedings of the IEEE 2018 International Symposium on Electronics and Telecommunications (ISETC), Timisoara, Romania, 8–9 November 2018; pp. 1–4. [Google Scholar]
- Sankar, L.S.; Sindhu, M.; Sethumadhavan, M. Survey of consensus protocols on blockchain applications. In Proceedings of the IEEE 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 January 2017; pp. 1–5. [Google Scholar]
- Bano, S.; Sonnino, A.; Al-Bassam, M.; Azouvi, S.; McCorry, P.; Meiklejohn, S.; Danezis, G. SoK: Consensus in the Age of Blockchains. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies, Zurich, Switzerland, 21–23 October 2019; ACM: New York, NY, USA, 2019; pp. 183–198. [Google Scholar]
- Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 25–30 June 2017; pp. 557–564. [Google Scholar]
- Lao, L.; Li, Z.; Hou, S.; Xiao, B.; Guo, S.; Yang, Y. A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Comput. Surv. 2020, 53, 1–32. [Google Scholar] [CrossRef] [Green Version]
- Nitti, M.; Girau, R.; Atzori, L.; Pilloni, V. Trustworthiness management in the IoT: The importance of the feedback. In Proceedings of the IEEE 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), Paris, France, 7–9 March 2017; pp. 325–327. [Google Scholar]
- Penning, A.; Baumgärtner, L.; Höchst, J.; Sterz, A.; Mezini, M.; Freisleben, B. DTN7: An Open-Source Disruption-Tolerant Networking Implementation of Bundle Protocol 7. In Proceedings of the International Conference on Ad-Hoc Networks and Wireless, Luxembourg, 1–3 October 2019; Springer: Cham, Switzerland, 2019; Volume 11803 LNCS, pp. 196–209. [Google Scholar]
- Katsikas, S.; Gkioulos, V. Security, privacy, and trustworthiness of sensor networks and internet of things. Sensors 2020, 20, 3846. [Google Scholar] [CrossRef] [PubMed]
- Rehman, A.U.; Jiang, A.; Rehman, A.; Paul, A. Weighted Based Trustworthiness Ranking in Social Internet of Things by using Soft Set Theory. In Proceedings of the 2019 IEEE 5th International Conference on Computer and Communications (ICCC), Chengdu, China, 6–9 December 2019; pp. 1644–1648. [Google Scholar]
- Seo, J.; Ko, D.; Kim, S.; Park, S. A Coordination Technique for Improving Scalability of Byzantine Fault-Tolerant Consensus. Appl. Sci. 2020, 10, 7609. [Google Scholar] [CrossRef]
- Refaei, M.T.; Dasilva, L.A.; Eltoweissy, M.; Nadeem, T. Adaptation of reputation management systems to dynamic network conditions in Ad Hoc networks. IEEE Trans. Comput. 2010, 59, 707–719. [Google Scholar] [CrossRef]
- Jun, A.D.; Hong, S.; Lee, W.; Lee, K.; Joe, I.; Lee, K.; Park, T.J. Modeling and Simulation of LoRa in OPNET. In Advanced Multimedia and Ubiquitous Engineering; Springer: Singapore, 2017; pp. 551–559. [Google Scholar]
- Distefano, S. Evaluating reliability of WSN with sleep/wake-up interfering nodes. Int. J. Syst. Sci. 2013, 44, 1793–1806. [Google Scholar] [CrossRef]
- Pan, X.; Di Maio, F.; Zio, E. A benchmark of dynamic reliability methods for probabilistic safety assessment. In Proceedings of the IEEE 2017 2nd International Conference on System Reliability and Safety (ICSRS), Milan, Italy, 20–22 December 2017; pp. 82–90. [Google Scholar]
- Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Trans. Comput. Syst. 2002, 20, 398–461. [Google Scholar] [CrossRef]
- Lei, K.; Zhang, Q.; Xu, L.; Qi, Z. Reputation-Based Byzantine Fault-Tolerance for Consortium Blockchain. In Proceedings of the 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, 11–13 December 2018; pp. 604–611. [Google Scholar]
Trustworthiness Use | [34,35,36] | [38,39,40,41] | [42] | [43] | [44,45] | [47] | [50,51,52,53] | [54,55,56,57,58,59,60] | Own Model |
---|---|---|---|---|---|---|---|---|---|
Data Trustworthiness | High | None | None | None | None | None | Medium | Medium | High |
Network Trustworthiness | Low | Medium | High | Medium | High | High | Low | Low | High |
Social Trustworthiness | None | None | None | None | None | None | High | None | High |
Consensus | None | None | None | None | None | None | None | High | High |
Metrics used | Faulty Sensed Data | Bit Error Rate | Packet Delivery Ratio (PDR) | PDR, Throughput, Delay | PDR, Delay | PDR, Delay | Successful Transactions | Successful Transaction, Byzantine Node Tolerance, Throughput | Faulty Sensing Ratio, PDR, Successful Transaction Rate, Byzantine Node Tolerance |
Layer | Metric | Range |
---|---|---|
Data | Faulty Sensing Ratio [35,36] | [0, 1] |
Network | Packet Delivery Ratio [44,45] | [0, 1] |
Social | Successful Transaction Rate [50,51] | [0, 1] |
Consensus | Byzantine Node Tolerance [55,56] | [0, 1] |
Parameter | NVIS | LoRa |
---|---|---|
Transmission Band | 4.3 MHz | 868 MHz |
Channel Bandwidth | 2.3 kHz | 125 kHz |
Channel Bitrate | 4.6 kbps | 5.47 kbps |
Coverage Range | Up to 250 km | Up to 30 km |
Daytime Availability (6 a.m.–5 p.m.) | 70–100% | 100% (LoS), 2–100% (No LoS) |
Night Availability (5 p.m.–6 a.m.) | 0% | 100% (LoS), 2–100% (No LoS) |
Maximum Payload Size | 242 bytes | 140 bytes |
Parameter | Value |
---|---|
Number of runs per test | 30 |
Simulation duration | 120 hours (5 days) |
Simulation step | 1 h |
[1 × 10−3, 2 × 10−3, 4 × 10−3, 8 × 10−3, 1 × 10−2, 2 × 10−2, 4 × 10−2, 8 × 10−2, 1 × 10−1] | |
k | 5.7 × 10−5 |
Routing protocol | [AODV, OLSR] |
Consensus mechanism | [None, PBFT] |
Social Trustworthiness | [True, False] |
Number of NVIS gateways | 5 |
Number of GTN-P clusters per gateway | [8, 16, 32, 64, 128, 256, 512, 1024, 2048, 4096] |
Number of GTN-P redundant stations per cluster | [1–10] |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mallorquí, A.; Zaballos, A. A Heterogeneous Layer-Based Trustworthiness Model for Long Backhaul NVIS Challenging Networks and an IoT Telemetry Service for Antarctica. Sensors 2021, 21, 3446. https://doi.org/10.3390/s21103446
Mallorquí A, Zaballos A. A Heterogeneous Layer-Based Trustworthiness Model for Long Backhaul NVIS Challenging Networks and an IoT Telemetry Service for Antarctica. Sensors. 2021; 21(10):3446. https://doi.org/10.3390/s21103446
Chicago/Turabian StyleMallorquí, Adrià, and Agustín Zaballos. 2021. "A Heterogeneous Layer-Based Trustworthiness Model for Long Backhaul NVIS Challenging Networks and an IoT Telemetry Service for Antarctica" Sensors 21, no. 10: 3446. https://doi.org/10.3390/s21103446
APA StyleMallorquí, A., & Zaballos, A. (2021). A Heterogeneous Layer-Based Trustworthiness Model for Long Backhaul NVIS Challenging Networks and an IoT Telemetry Service for Antarctica. Sensors, 21(10), 3446. https://doi.org/10.3390/s21103446