Abstract
Nowadays, the uses of delay-sensitive applications are rapidly increasing due to their performance, QoS, and enrich the user experience. Therefore, security and scheduling aspects for delay-sensitive tasks have become more critical issues that are not incorporated in the current existing algorithms. To solve these intricate issues, “A security-driven scheduling model for delay-sensitive tasks in Fog networks” has been introduced and abbreviated as “SDSM”. The proposed method is the integration of binary integer programming, Min_Heap algorithm, and modified Earliest Deadline First policy (m-EDF). The binary integer programming is used to evaluate optimal average security value for delay-sensitive tasks from basic security service categories, i.e., confidentiality, integrity, and authentication whereas, only one security service can be selected from a category, however, each category has some distinct security services along with their normalized performance value. The Min_Heap algorithm is used to find an optimal node in Fog networks, in which system load and load threshold values are used as the key parameters which are based on the weighted sum of the square method. And the m-EDF scheduling policy is used for the delay-sensitive tasks. The contribution of the proposed method is two-fold: first, is to provide the robust security service to the delay-sensitive tasks, and second, is to enhance the performance of the system (in terms of success ratio) without violating the scheduling constraints of delay-sensitive tasks. The novelty of the proposed method is proven in terms of success ratio, average security value, and overall performance through extensive experimental result analysis and compared to some existing baseline algorithms. The Network Simulator (NS-3) with python scriptwriting and a synthetic data set is used to obtain the experimental results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The global buffer is assumed as a finite size buffer.
- 2.
The accepted and rejected queue are used to calculate the success ratio only.
- 3.
Here node has multi-core processor.
- 4.
Starting index of an array is zero (0).
- 5.
sum of all assigned weight of each category equals to 1 [22].
- 6.
The scheduling mode (SM), m-EDF scheduler, FN, task model, and scheduling constraints have developed using Python scriptwriting.
- 7.
Author have selected these baseline algorithms due to having sufficient available synthetic data set.
- 8.
This study has considered three Fog networks for simulation.
- 9.
Overall performance is measured in terms of Fog networks.
References
Faller, W.E., Schreck, S.J.: Real-time prediction of unsteady aerodynamics: application for aircraft control and manoeuvrability enhancement. IEEE Trans. Neural Netw. 6(6), 1461–1468 (1995)
Gregor, T., Sergej, V.: Railway signalling & interlocking. In: International Compendium, Hamburg, p. 448. Eurail-press Publ. (2009)
Mo, Y., Kim, T.H., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100(1), 195–209 (2012)
Mahafza, B., Welstead, S., Champagne, D., Manadhar, R., Worthington, T., Campbell, S.: Real-time radar signal simulation for the ground based radar for national missile defense. In: Proceedings of the 1998 IEEE Radar Conference, RADARCON’98. Challenges in Radar Systems and Solutions (Cat. No.98CH36197), pp. 62–67 (1998)
Nilsson, J., Dahlgren, F.: Improving performance of load-store sequences for transaction processing workloads on multiprocessors. In: Proceedings of the 1999 International Conference on Parallel Processing, pp. 246–255 (1999)
Son, S.H., Zimmerman, R., Hansson, J.: An adaptable security manager for real-time transactions. In: Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000, pp. 63–70 (2000)
Singh, G.: A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int. J. Comput. Appl. 67(19) (2013)
Dulana, R., Hassan, S.: Task allocation, migration and scheduling for energy-efficient real-time multiprocessor architectures. J. Syst. Archit. 98, 17–26 (2019)
Liu, F., Narayanan, A., Bai, Q.: Real-time systems (2000)
Xie, T., Sung, A., Qin, X.: Dynamic task scheduling with security awareness in real-time systems. In: 19th IEEE International Parallel and Distributed Processing Symposium, pp. 8–14 (2005)
Singh, S., Ranvijay: Improve real-time packet scheduling algorithm with security constraint. In: 2014 Annual IEEE India Conference (INDICON), pp. 1–6 (2014)
Syed, M., Fernández, E., Ilyas, M.: A Pattern for Fog Computing, pp. 1–10 (2016)
Huang, R., Sun, Y., Huang, C., Zhao, G., Ma, Y.: A survey on fog computing. In: Wang, G., Feng, J., Alam Bhuiyan, M.Z., Lu, R. (eds.) Security, Privacy, and Anonymity in Computation, Communication, and Storage, pp. 160–169 (2019)
Yi, S., Li, C., Li, Q.: A survey of fog computing. In: Proceedings of the 2015 Workshop on Mobile Big Data—Mobidata-15. ACM Press (2015)
Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R., Morrow, M., Polakos, P.: A comprehensive survey on fog computing: state-of-the-art and research challenges. IEEE Commun. Surv. Tutor. (2017)
Mehta, H., Kanungo, P., Chandwani, M.: Performance enhancement of scheduling algorithms in web server clusters using improved dynamic load balancing policies. In: 2nd National Conference, INDIACom-2008 Computing For Nation Development, pp. 651–656 (2008)
Ababneh, M., Hassan, S., Bani-Ahmad, S.: On static scheduling of tasks in real time multiprocessor systems: an improved GA-based approach. Int. Arab. J. Inf. Technol. 11(6), 560–572 (2014)
Mittal, A., Manimaran, G., Siva Ram Murthy, C.: Integrated dynamic scheduling of hard and QoS degradable real-time tasks in multiprocessor systems. J. Syst. Archit. 46(9), 793–807 (2000)
Casavant, T.L., Kuhl, J.G.: A taxonomy of scheduling in general-purpose distributed computing systems. IEEE Trans. Softw. Eng. 14(2), 141–154 (1988)
Saleh, M., Dong, L.: Real-time scheduling with security enhancement for packet switched networks. IEEE Trans. Netw. Serv. Manag. 10(3), 271–285 (2013)
Singh, S., Tripathi, S., Batabyal, S.: Secured dynamic scheduling algorithm for real-time applications on grid. In: Ray, I., Gaur, M.S., Conti, M., Sanghi, D., Kamakoti, V. (eds.) Information Systems Security, pp. 283–300. Springer (2016)
Lin, M., Xu, L., Yang, L.T., Qin, X., Zheng, N., Wu, Z., Qiu, M.: Static security optimization for real-time systems. IEEE Trans. Ind. Informatics 5(1), 22–37 (2009)
Krishna, C.M.: Real-Time Systems (1999)
Burns, A.: Scheduling hard real-time systems: a review. Softw. Eng. J. 6(3), 116–128 (1991)
Lee, Y.-H., Leu, S., Chang, R.-S.: Improving job scheduling algorithms in a grid environment. Future Gen. Comput. Syst. 27(8), 991–998 (2011)
Chetto, M., Marchand, A.: Dynamic scheduling of skippable periodic tasks in weakly-hard real-time systems. In: 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS’07), pp. 171–177 (2007)
Marchand, A., Chetto, M.: Dynamic scheduling of periodic skippable tasks in an overloaded real-time system. In: 2008 IEEE/ACS International Conference on Computer Systems and Applications, pp. 456–464 (2008)
Bai, L., Hu, Y., Lao, S.-Y., Zhang, W.: Task scheduling with load balancing using multiple ant colonies optimization in grid computing. In: 2010 Sixth International Conference on Natural Computation, vol. 5, pp. 2715–2719 (2010)
Singh, S., Tripathi, S., Batabyal, S.: Utilization based secured dynamic scheduling algorithm for real-time applications on grid (u-SDSA). In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 606–613 (2017)
Singh, S., Batabyal, S., Tripathi, S.: Security aware dynamic scheduling algorithm (SADSA) for real-time applications on grid. Cluster Comput. 1–17 (2019)
Qin, X., Alghamdi, M., Nijim, M., Zong, Z., Bellam, K., Ruan, X., Manzanares, A.: Improving security of real-time wireless networks through packet scheduling [transactions letters]. IEEE Trans. Wirel. Commun. 7(9), 3273–3279 (2008)
Zhu, X., Guo, H., Liang, S., Yang, X.: An improved security-aware packet scheduling algorithm in real-time wireless networks. Inf. Process. Lett. 112(7), 282–288 (2012)
Xie, T., Qin, X.: Enhancing security of real-time applications on grids through dynamic scheduling. In: Feitelson, D., Frachtenberg, E., Rudolph, L., Schwiegelshohn, U. (eds.) Job Scheduling Strategies for Parallel Processing, pp. 219–237 (2005)
Singh, S., Tripathi, S.: SLOPE: secure and load optimized packet scheduling model in a grid environment. J. Syst. Archit. 91, 41–52 (2018)
Xie, T., Qin, X., Sung, A.: SAREC: a security-aware scheduling strategy for real-time applications on clusters. In: 2005 International Conference on Parallel Processing (ICPP’05), pp. 5–12 (2005)
MIT. Binary Integer Programming. http://web.mit.edu/15.053/www/AMP-Chapter-09.pdf
Chang, R.S., Lee, Y.H., Leu, S.: Improving job scheduling algorithms in a grid environment. Future Gen. Comput. Syst. 27(8), 991–998 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Singh, S., Tripathi, S. (2022). A Security-Driven Scheduling Model for Delay-Sensitive Tasks in Fog Networks. In: Nicopolitidis, P., Misra, S., Yang, L.T., Zeigler, B., Ning, Z. (eds) Advances in Computing, Informatics, Networking and Cybersecurity. Lecture Notes in Networks and Systems, vol 289. Springer, Cham. https://doi.org/10.1007/978-3-030-87049-2_29
Download citation
DOI: https://doi.org/10.1007/978-3-030-87049-2_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-87048-5
Online ISBN: 978-3-030-87049-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)