MOMTA-HN: A Secure and Reliable Multi-Objective Optimized Multipath Transmission Algorithm for Heterogeneous Networks
Abstract
:1. Introduction
- A generic secure and reliable multi-objective optimized multipath transmission algorithm for heterogeneous networks is proposed: We propose an algorithm capable of constructing multiple redundant transmission paths in heterogeneous networks composed of various sub-networks. By considering the unique characteristics and task requirements of heterogeneous networks, multiple optimization objectives are introduced into the path selection process. This allows the computation of multiple optimal paths that not only meet performance requirements such as delay and reliability but also effectively avoid potential security threats, ensuring efficient and secure transmission across different types of network environments.
- Optimization of path planning decisions: Path planning decisions in this context represent a mixed-integer programming problem (MIPP), an NP-hard problem. Additionally, there are trade-offs between optimization objectives, and the dimensionality of the solution is variable, making it difficult for traditional algorithms to solve these problems in polynomial time. To address this, we propose optimizing the initial population range using the Optimized Non-dominated Sorting Genetic Algorithm II, which considers multiple objective functions, such as task reliability and delay. This approach filters out the optimal combination of paths to satisfy different demand objectives, ultimately obtaining the Pareto-optimal solution set for the optimization problem.
- Innovative application of the deletion graph method: After calculating the primary path, we propose simplifying the topological map using the deletion graph method. Unless no other links are available, this method ensures that any redundant paths do not share common links with the original path. This approach enhances the security of the transmission process and improves transmission reliability. The deletion graph technique searches for redundant paths on the new pruned graph by gradually deleting all links on the original paths, ensuring that these paths are physically independent from the original paths.
- Experimental validation and evaluation: We further validate the effectiveness of the proposed method through comparative analysis and experimental demonstration. The adaptability and robustness of the algorithm in complex and changing network environments are highlighted. The flexibility of the proposed algorithm in terms of optimization strategy is demonstrated by adopting a soft update strategy to dynamically adjust network weight parameters. This strategy allows for the collaborative optimization of the multi-objective problem under different priorities. Experimental results show that the proposed algorithm exhibits significant advantages in the face of malicious attacks and network failures, maintaining a high transmission success rate and low latency.
2. Methodology
2.1. System Model
Algorithm 1: Secure and Reliable Multi-Objective Optimization Multipath Transmission Algorithm for Heterogeneous Networks |
Input: heterogeneous network , source node , target node , optimization parameters |
Output: Multiple optimal transmission paths |
1 Initial: the current network topology data and optimization parameters. |
2 Obtain network topology information: the link status and connectivity status of each node. |
3 Path search: |
4 a. Run a variant algorithm based on Depth First Search (DFS) to recursively search for all feasible paths in the network. |
5 b. Ensure that each path in the path set does not contain duplicate vertices. |
6 c. When the path length exceeds the known maximum path length, stop further search. |
7 Path filtering: |
8 a. Using NSGA-II for multi-objective optimization, select the best path to maximize path reliability and minimize transmission delay. |
9 b. The global search capability of NSGA-II avoids getting stuck in local optima during the iteration process. |
10 Topology simplification: |
11 a. Delete the network topology based on the first optimal transmission path. |
12 b. Ensure that there is no common link between the new path and the original path. |
13 Repeat path search and filtering: |
14 a. Re input the deleted new topology map into the path search and multi-objective optimization module. |
15 b. Obtain the second path. |
16 Return multiple transmission paths that meet optimization objectives. |
2.2. Multi-Objective Optimization Strategy
Algorithm 2: Multi-objective optimization process of MOMTA-HN algorithm |
Input: heterogeneous network , source node , target node , optimization parameters |
Output: Optimal transmission paths |
1 Initial: The network with the input parameters. |
2 Initialize population: After determining the objective function, use heuristic methods to obtain a simple path between the source and destination to generate the initial population. |
3 Non dominated sorting and selection: Perform non dominated sorting and selection on the initial population obtained from the path planning module. |
4 Cross and mutation: Performing cross and mutation operations on the selected population to generate the next generation population. |
5 Constraint check and repair: Check whether the generated population meets the constraint conditions and make necessary repairs. |
6 Generate subpopulation: Generate the first generation subpopulation and update the evolutionary algebra. |
7 Fast non dominated sorting: Perform fast non dominated sorting on each generation of population. |
8 Repeat the above steps until the maximum evolutionary number is reached. |
9 Return Pareto frontier solution. |
2.3. Multipath Transmission Algorithm
2.3.1. The First Type of Simplification Operation
2.3.2. The Second Type of Simplification Operation
2.3.3. The Third Type of Simplification Operation
3. Experiment
3.1. Experiment Setup
3.2. Detailed Analysis and Comparison
4. Related Work
4.1. Multi-Objective Optimization
4.2. Multipath Transmission
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Shah, Z.; Ullah, I.; Li, H.; Levula, A.; Khurshid, K. Blockchain based solutions to mitigate distributed denial of service (ddos) attacks in the internet of things (iot): A survey. Sensors 2022, 22, 1094. [Google Scholar] [CrossRef] [PubMed]
- Wang, J.; Du, H.; Niyato, D.; Kang, J.; Xiong, Z.; Rajan, D.; Mao, S.; Shen, X. A unified framework for guiding generative ai with wireless perception in resource constrained mobile edge networks. IEEE Trans. Mob. Comput. 2024, 1–17. [Google Scholar] [CrossRef]
- Chen, Y.; Hu, J.; Zhao, J.; Min, G. Qos-aware computation offloading in leo satellite edge computing for iot: A game-theoretical approach. Chin. J. Electron. 2023, 33, 1–12. [Google Scholar]
- Karafolas, N.; Baroni, S. Optical satellite networks. J. Light. Technol. 2000, 18, 1792. [Google Scholar] [CrossRef]
- Jiang, W. Software defined satellite networks: A survey. Digit. Commun. Netw. 2023, 9, 1243–1264. [Google Scholar] [CrossRef]
- Chaoub, A.; Mämmelä, A.; Martinez-Julia, P.; Chaparadza, R.; Elkotob, M.; Ong, L.; Krishnaswamy, D.; Anttonen, A.; Dutta, A. Hybrid self-organizing networks: Evolution, standardization trends, and a 6G architecture vision. IEEE Commun. Stand. Mag. 2023, 7, 14–22. [Google Scholar] [CrossRef]
- Li, J.; Chen, B.M.; Lee, G.H. So-net: Self-organizing network for point cloud analysis. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 18–22 June 2018; pp. 9397–9406. [Google Scholar]
- Esbin, B. Internet Over Cable: Defining the Future in Terms of the Past. Commlaw Conspec. 1999, 7, 37. [Google Scholar]
- Ye, H.; Wang, S.; Li, D. Impact of International Submarine Cable on Internet Routing. In Proceedings of the IEEE INFOCOM 2023—IEEE Conference on Computer Communications, New York City, NY, USA, 17–20 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–10. [Google Scholar]
- Liu, J.; Gao, Q.; Wang, X.; Zhou, X.; Li, S.; Zhang, H.; Cui, X. FCMPR: A multi-path secure transmission method based on link security assessment and fountain coding. Int. J. Intell. Netw. 2024, 5, 275–285. [Google Scholar]
- Panda, M. Performance analysis of encryption algorithms for security. In Proceedings of the 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, India, 3–5 October 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 278–284. [Google Scholar]
- Li, Y.; Jiang, D.; Lian, R.; Wu, X.; Tan, C.; Xu, Y.; Su, Z. Heterogeneous latent topic discovery for semantic text mining. IEEE Trans. Knowl. Data Eng. 2021, 35, 533–544. [Google Scholar] [CrossRef]
- Iftikhar, A.A.; Qureshi, K.N.; Altalbe, A.A.; Javeed, K. Security Provision by Using Detection and Prevention Methods to Ensure Trust in Edge-Based Smart City Networks. IEEE Access 2023, 11, 137529–137547. [Google Scholar] [CrossRef]
- Qureshi, K.N.; Iftikhar, A.; Bhatti, S.N.; Piccialli, F.; Giampaolo, F.; Jeon, G. Trust management and evaluation for edge intelligence in the Internet of Things. Eng. Appl. Artif. Intell. 2020, 94, 103756. [Google Scholar] [CrossRef]
- Anwar, R.W.; Zainal, A.; Outay, F.; Yasar, A.; Iqbal, S. BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future Gener. Comput. Syst. 2019, 96, 605–616. [Google Scholar] [CrossRef]
- Ahmed, A.; Qureshi, K.N.; Anwar, M.; Masud, F.; Imtiaz, J.; Jeon, G. Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks. Wirel. Netw. 2022, 30, 4237–4259. [Google Scholar] [CrossRef]
- Gao, B.; Maekawa, T.; Amagata, D.; Hara, T. Environment-adaptive malicious node detection in MANETs with ensemble learning. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, 2–5 July 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 556–566. [Google Scholar]
- Long, J.; Chen, T.; Ye, G.; Zheng, K.; Nguyen, Q.V.H.; Yin, H. Physical trajectory inference attack and defense in decentralized poi recommendation. In Proceedings of the ACM on Web Conference 2024, Singapore, 13–17 May 2024; pp. 3379–3387. [Google Scholar]
- Zhang, T.; Xu, C.; Lian, Y.; Tian, H.; Kang, J.; Kuang, X.; Niyato, D. When Moving Target Defense Meets Attack Prediction in Digital Twins: A Convolutional and Hierarchical Reinforcement Learning Approach. IEEE J. Sel. Areas Commun. 2023, 41, 3293–3305. [Google Scholar] [CrossRef]
- Kim, D.S.; Kim, M.; Cho, J.H.; Lim, H.; Moore, T.J.; Nelson, F.F. Design and performance analysis of software defined networking based Web services adopting moving target defense. In Proceedings of the 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), Valencia, Spain, 29 June–2 July 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 43–44. [Google Scholar]
- Zhou, D.; He, L.; Cao, Z.; Han, X. Stability Analysis of Dynamic Heterogeneous Redundant System with Mode Feedback Control. In Proceedings of the 2023 IEEE 11th International Conference on Information, Communication and Networks (ICICN), Xi’an, China, 17–20 August 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 558–563. [Google Scholar]
- Xu, J.; Guo, P.; Zhao, M.; Erbacher, R.F.; Zhu, M.; Liu, P. Comparing different moving target defense techniques. In Proceedings of the First ACM Workshop on Moving Target Defense, Scottsdale, AZ, USA, 7 November 2014; pp. 97–107. [Google Scholar]
- Zhang, T.; Xu, C.; Shen, J.; Kuang, X.; Grieco, L.A. How to Disturb Network Reconnaissance: A Moving Target Defense Approach Based on Deep Reinforcement Learning. IEEE Trans. Inf. Forensics Secur. 2023, 18, 5735–5748. [Google Scholar] [CrossRef]
- Potteiger, B.; Dubey, A.; Cai, F.; Koutsoukos, X.; Zhang, Z. Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems. J. Syst. Archit. 2022, 125, 102420. [Google Scholar] [CrossRef]
- Zhang, T.; Xu, C.; Zou, P.; Tian, H.; Kuang, X.; Yang, S.; Zhong, L.; Niyato, D. How to mitigate DDoS intelligently in SD-IoV: A moving target defense approach. IEEE Trans. Ind. Inform. 2022, 19, 1097–1106. [Google Scholar] [CrossRef]
- Sahraoui, S.; Henni, N. SAMP-RPL: Secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 409–429. [Google Scholar] [CrossRef]
- Zhou, Z.; Chen, L.; Hu, Y.; Zheng, F.; Liang, C.; Li, K. Q-Learning Based Multi-objective Optimization Routing Strategy in UAVs Deterministic Network. In Proceedings of the International Conference on Computer Engineering and Networks, Kunming, China, 25–27 June 2021; Springer: Berlin/Heidelberg, Germany, 2023; pp. 399–408. [Google Scholar]
- Deb, K.; Agrawal, S.; Pratap, A.; Meyarivan, T. A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II. In Proceedings of the Parallel Problem Solving from Nature PPSN VI: 6th International Conference, Paris, France, 18–20 September 2000; Proceedings 6. Springer: Berlin/Heidelberg, Germany, 2000; pp. 849–858. [Google Scholar]
- Verma, S.; Pant, M.; Snasel, V. A comprehensive review on NSGA-II for multi-objective combinatorial optimization problems. IEEE Access 2021, 9, 57757–57791. [Google Scholar] [CrossRef]
- Ehrgott, M. Approximation algorithms for combinatorial multicriteria optimization problems. Int. Trans. Oper. Res. 2000, 7, 5–31. [Google Scholar] [CrossRef]
- Srinivas, N.; Deb, K. Muiltiobjective optimization using nondominated sorting in genetic algorithms. Evol. Comput. 1994, 2, 221–248. [Google Scholar] [CrossRef]
- Knight, S.; Nguyen, H.X.; Falkner, N.; Bowden, R.; Roughan, M. The internet topology zoo. IEEE J. Sel. Areas Commun. 2011, 29, 1765–1775. [Google Scholar] [CrossRef]
- Singh, M.; Shrivastava, L. Multi-objective optimized multi-path and multi-hop routing based on hybrid optimization algorithm in wireless sensor networks. Wirel. Netw. 2024, 30, 2715–2731. [Google Scholar] [CrossRef]
- Chai, Z.Y.; Cheng, Y.Y.; Chen, Z.P. Network access selection in heterogeneous Internet of vehicles based on improved multi-objective evolutionary algorithm. J. Ambient. Intell. Humaniz. Comput. 2024, 15, 673–682. [Google Scholar] [CrossRef]
- Asha, A.; Srivastava, A.K.; Doohan, N.V.; Sharma, D.; Bist, A.S.; Neware, R.; Kumar, S. An optimized DEEC approach for efficient packet transmission in sensor based IoTs network. Microprocess. Microsystems 2023, 96, 104714. [Google Scholar] [CrossRef]
- Song, X.; Cheng, M.; Lei, L.; Yang, Y. Multi-task and multi-objective joint resource optimization for UAV-assisted air-ground integrated networks under emergency scenarios. IEEE Internet Things J. 2023, 10, 20342–20357. [Google Scholar] [CrossRef]
- Pan, H.; Liu, Y.; Sun, G.; Wang, P.; Yuen, C. Resource Scheduling for UAVs-aided D2D Networks: A Multi-objective Optimization Approach. IEEE Trans. Wirel. Commun. 2023, 23, 4691–4708. [Google Scholar] [CrossRef]
- Guo, K.; Wu, M.; Li, X.; Song, H.; Kumar, N. Deep reinforcement learning and NOMA-based multi-objective RIS-assisted IS-UAV-TNs: Trajectory optimization and beamforming design. IEEE Trans. Intell. Transp. Syst. 2023, 24, 10197–10210. [Google Scholar] [CrossRef]
- Seifhosseini, S.; Shirvani, M.H.; Ramzanpoor, Y. Multi-objective cost-aware bag-of-tasks scheduling optimization model for IoT applications running on heterogeneous fog environment. Comput. Netw. 2024, 240, 110161. [Google Scholar] [CrossRef]
- Jiang, C.; Xie, J.; Ye, T. Network structure guided multi-objective optimization approach for key entity identification. Appl. Soft Comput. 2024, 151, 111115. [Google Scholar] [CrossRef]
- Tomar, P.; Kumar, G.; Verma, L.P.; Sharma, V.K.; Kanellopoulos, D.; Rawat, S.S.; Alotaibi, Y. Cmt-sctp and mptcp multipath transport protocols: A comprehensive review. Electronics 2022, 11, 2384. [Google Scholar] [CrossRef]
- Stewart, R.; Tüxen, M.; Nielsen, K. RFC 9260: Stream Control Transmission Protocol; Netflix, Inc.: Scotts Valley, CA, USA, 2022. [Google Scholar]
- Iyengar, J.R.; Amer, P.D.; Stewart, R. Concurrent multipath transfer using SCTP multihoming over independent end-to-end paths. IEEE/ACM Trans. Netw. 2006, 14, 951–964. [Google Scholar] [CrossRef]
- Wallace, T.D.; Shami, A. A review of multihoming issues using the stream control transmission protocol. IEEE Commun. Surv. Tutorials 2011, 14, 565–578. [Google Scholar] [CrossRef]
- Ford, A.; Raiciu, C.; Handley, M.; Bonaventure, O. TCP Extensions for Multipath Operation with Multiple Addresses. Technical Report. 2013. Available online: https://www.rfc-editor.org/rfc/rfc6824.html (accessed on 6 July 2024).
- Okamoto, K.; Yamai, N.; Okayama, K.; Kawano, K.; Nakamura, M.; Yokohira, T. Performance improvement of SCTP communication using selective bicasting on lossy multihoming environment. In Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference, Västerås, Sweden, 21–25 July 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 551–557. [Google Scholar]
- da Silva, C.A.G.; Ribeiro, E.P.; Pedroso, C.M. Preventing quality degradation of video streaming using selective redundancy. Comput. Commun. 2016, 91, 120–132. [Google Scholar] [CrossRef]
- Shailendra, S.; Bhattacharjee, R.; Bose, S. An implementation of Min–Max optimization for multipath SCTP through bandwidth estimation based resource pooling technique. AEU-Int. J. Electron. Commun. 2013, 67, 246–249. [Google Scholar] [CrossRef]
- Peng, Q.; Walid, A.; Low, S.H. Multipath TCP algorithms: Theory and design. ACM Sigmetrics Perform. Eval. Rev. 2013, 41, 305–316. [Google Scholar] [CrossRef]
- Cai, Y.; Xiong, H.; Yu, S.; Chen, M.; Zhou, X. D-OLIA: The packet loss differentiation based opportunistic linked-increases algorithm for MPTCP in wireless heterogeneous network. In Proceedings of the 2021 31st International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia, 24–26 November 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 78–85. [Google Scholar]
- Oh, B.H.; Lee, J. Constraint-based proactive scheduling for MPTCP in wireless networks. Comput. Netw. 2015, 91, 548–563. [Google Scholar] [CrossRef]
- Wang, P.; Sourav, S.; Li, H.; Chen, B. One Pass is Sufficient: A Solver for Minimizing Data Delivery Time over Time-varying Networks. In Proceedings of the IEEE INFOCOM 2023—IEEE Conference on Computer Communications, New York City, NY, USA, 17–20 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–10. [Google Scholar]
- Ouyang, M.; Zhang, R.; Wang, B.; Liu, J.; Huang, T.; Liu, L.; Tong, J.; Xin, N.; Yu, F.R. Network Coding-Based Multi-Path Transmission for LEO Satellite Networks with Domain Cluster. IEEE Internet Things J. 2024, 11, 21659–21673. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Qi, S.; Yang, L.; Ma, L.; Jiang, S.; Zhou, Y.; Cheng, G. MOMTA-HN: A Secure and Reliable Multi-Objective Optimized Multipath Transmission Algorithm for Heterogeneous Networks. Electronics 2024, 13, 2697. https://doi.org/10.3390/electronics13142697
Qi S, Yang L, Ma L, Jiang S, Zhou Y, Cheng G. MOMTA-HN: A Secure and Reliable Multi-Objective Optimized Multipath Transmission Algorithm for Heterogeneous Networks. Electronics. 2024; 13(14):2697. https://doi.org/10.3390/electronics13142697
Chicago/Turabian StyleQi, Shengyuan, Lin Yang, Linru Ma, Shanqing Jiang, Yuyang Zhou, and Guang Cheng. 2024. "MOMTA-HN: A Secure and Reliable Multi-Objective Optimized Multipath Transmission Algorithm for Heterogeneous Networks" Electronics 13, no. 14: 2697. https://doi.org/10.3390/electronics13142697
APA StyleQi, S., Yang, L., Ma, L., Jiang, S., Zhou, Y., & Cheng, G. (2024). MOMTA-HN: A Secure and Reliable Multi-Objective Optimized Multipath Transmission Algorithm for Heterogeneous Networks. Electronics, 13(14), 2697. https://doi.org/10.3390/electronics13142697