Skip to main content

A Security-Driven Scheduling Model for Delay-Sensitive Tasks in Fog Networks

  • Chapter
  • First Online:
Advances in Computing, Informatics, Networking and Cybersecurity

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 289))

Abstract

Nowadays, the uses of delay-sensitive applications are rapidly increasing due to their performance, QoS, and enrich the user experience. Therefore, security and scheduling aspects for delay-sensitive tasks have become more critical issues that are not incorporated in the current existing algorithms. To solve these intricate issues, “A security-driven scheduling model for delay-sensitive tasks in Fog networks” has been introduced and abbreviated as “SDSM”. The proposed method is the integration of binary integer programming, Min_Heap algorithm, and modified Earliest Deadline First policy (m-EDF). The binary integer programming is used to evaluate optimal average security value for delay-sensitive tasks from basic security service categories, i.e., confidentiality, integrity, and authentication whereas, only one security service can be selected from a category, however, each category has some distinct security services along with their normalized performance value. The Min_Heap algorithm is used to find an optimal node in Fog networks, in which system load and load threshold values are used as the key parameters which are based on the weighted sum of the square method. And the m-EDF scheduling policy is used for the delay-sensitive tasks. The contribution of the proposed method is two-fold: first, is to provide the robust security service to the delay-sensitive tasks, and second, is to enhance the performance of the system (in terms of success ratio) without violating the scheduling constraints of delay-sensitive tasks. The novelty of the proposed method is proven in terms of success ratio, average security value, and overall performance through extensive experimental result analysis and compared to some existing baseline algorithms. The Network Simulator (NS-3) with python scriptwriting and a synthetic data set is used to obtain the experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The global buffer is assumed as a finite size buffer.

  2. 2.

    The accepted and rejected queue are used to calculate the success ratio only.

  3. 3.

    Here node has multi-core processor.

  4. 4.

    Starting index of an array is zero (0).

  5. 5.

    sum of all assigned weight of each category equals to 1 [22].

  6. 6.

    The scheduling mode (SM), m-EDF scheduler, FN, task model, and scheduling constraints have developed using Python scriptwriting.

  7. 7.

    Author have selected these baseline algorithms due to having sufficient available synthetic data set.

  8. 8.

    This study has considered three Fog networks for simulation.

  9. 9.

    Overall performance is measured in terms of Fog networks.

References

  1. Faller, W.E., Schreck, S.J.: Real-time prediction of unsteady aerodynamics: application for aircraft control and manoeuvrability enhancement. IEEE Trans. Neural Netw. 6(6), 1461–1468 (1995)

    Article  Google Scholar 

  2. Gregor, T., Sergej, V.: Railway signalling & interlocking. In: International Compendium, Hamburg, p. 448. Eurail-press Publ. (2009)

    Google Scholar 

  3. Mo, Y., Kim, T.H., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100(1), 195–209 (2012)

    Article  Google Scholar 

  4. Mahafza, B., Welstead, S., Champagne, D., Manadhar, R., Worthington, T., Campbell, S.: Real-time radar signal simulation for the ground based radar for national missile defense. In: Proceedings of the 1998 IEEE Radar Conference, RADARCON’98. Challenges in Radar Systems and Solutions (Cat. No.98CH36197), pp. 62–67 (1998)

    Google Scholar 

  5. Nilsson, J., Dahlgren, F.: Improving performance of load-store sequences for transaction processing workloads on multiprocessors. In: Proceedings of the 1999 International Conference on Parallel Processing, pp. 246–255 (1999)

    Google Scholar 

  6. Son, S.H., Zimmerman, R., Hansson, J.: An adaptable security manager for real-time transactions. In: Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000, pp. 63–70 (2000)

    Google Scholar 

  7. Singh, G.: A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int. J. Comput. Appl. 67(19) (2013)

    Google Scholar 

  8. Dulana, R., Hassan, S.: Task allocation, migration and scheduling for energy-efficient real-time multiprocessor architectures. J. Syst. Archit. 98, 17–26 (2019)

    Article  Google Scholar 

  9. Liu, F., Narayanan, A., Bai, Q.: Real-time systems (2000)

    Google Scholar 

  10. Xie, T., Sung, A., Qin, X.: Dynamic task scheduling with security awareness in real-time systems. In: 19th IEEE International Parallel and Distributed Processing Symposium, pp. 8–14 (2005)

    Google Scholar 

  11. Singh, S., Ranvijay: Improve real-time packet scheduling algorithm with security constraint. In: 2014 Annual IEEE India Conference (INDICON), pp. 1–6 (2014)

    Google Scholar 

  12. Syed, M., Fernández, E., Ilyas, M.: A Pattern for Fog Computing, pp. 1–10 (2016)

    Google Scholar 

  13. Huang, R., Sun, Y., Huang, C., Zhao, G., Ma, Y.: A survey on fog computing. In: Wang, G., Feng, J., Alam Bhuiyan, M.Z., Lu, R. (eds.) Security, Privacy, and Anonymity in Computation, Communication, and Storage, pp. 160–169 (2019)

    Google Scholar 

  14. Yi, S., Li, C., Li, Q.: A survey of fog computing. In: Proceedings of the 2015 Workshop on Mobile Big Data—Mobidata-15. ACM Press (2015)

    Google Scholar 

  15. Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R., Morrow, M., Polakos, P.: A comprehensive survey on fog computing: state-of-the-art and research challenges. IEEE Commun. Surv. Tutor. (2017)

    Google Scholar 

  16. Mehta, H., Kanungo, P., Chandwani, M.: Performance enhancement of scheduling algorithms in web server clusters using improved dynamic load balancing policies. In: 2nd National Conference, INDIACom-2008 Computing For Nation Development, pp. 651–656 (2008)

    Google Scholar 

  17. Ababneh, M., Hassan, S., Bani-Ahmad, S.: On static scheduling of tasks in real time multiprocessor systems: an improved GA-based approach. Int. Arab. J. Inf. Technol. 11(6), 560–572 (2014)

    Google Scholar 

  18. Mittal, A., Manimaran, G., Siva Ram Murthy, C.: Integrated dynamic scheduling of hard and QoS degradable real-time tasks in multiprocessor systems. J. Syst. Archit. 46(9), 793–807 (2000)

    Google Scholar 

  19. Casavant, T.L., Kuhl, J.G.: A taxonomy of scheduling in general-purpose distributed computing systems. IEEE Trans. Softw. Eng. 14(2), 141–154 (1988)

    Article  Google Scholar 

  20. Saleh, M., Dong, L.: Real-time scheduling with security enhancement for packet switched networks. IEEE Trans. Netw. Serv. Manag. 10(3), 271–285 (2013)

    Article  Google Scholar 

  21. Singh, S., Tripathi, S., Batabyal, S.: Secured dynamic scheduling algorithm for real-time applications on grid. In: Ray, I., Gaur, M.S., Conti, M., Sanghi, D., Kamakoti, V. (eds.) Information Systems Security, pp. 283–300. Springer (2016)

    Google Scholar 

  22. Lin, M., Xu, L., Yang, L.T., Qin, X., Zheng, N., Wu, Z., Qiu, M.: Static security optimization for real-time systems. IEEE Trans. Ind. Informatics 5(1), 22–37 (2009)

    Article  Google Scholar 

  23. Krishna, C.M.: Real-Time Systems (1999)

    Google Scholar 

  24. Burns, A.: Scheduling hard real-time systems: a review. Softw. Eng. J. 6(3), 116–128 (1991)

    Article  Google Scholar 

  25. Lee, Y.-H., Leu, S., Chang, R.-S.: Improving job scheduling algorithms in a grid environment. Future Gen. Comput. Syst. 27(8), 991–998 (2011)

    Article  Google Scholar 

  26. Chetto, M., Marchand, A.: Dynamic scheduling of skippable periodic tasks in weakly-hard real-time systems. In: 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS’07), pp. 171–177 (2007)

    Google Scholar 

  27. Marchand, A., Chetto, M.: Dynamic scheduling of periodic skippable tasks in an overloaded real-time system. In: 2008 IEEE/ACS International Conference on Computer Systems and Applications, pp. 456–464 (2008)

    Google Scholar 

  28. Bai, L., Hu, Y., Lao, S.-Y., Zhang, W.: Task scheduling with load balancing using multiple ant colonies optimization in grid computing. In: 2010 Sixth International Conference on Natural Computation, vol. 5, pp. 2715–2719 (2010)

    Google Scholar 

  29. Singh, S., Tripathi, S., Batabyal, S.: Utilization based secured dynamic scheduling algorithm for real-time applications on grid (u-SDSA). In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 606–613 (2017)

    Google Scholar 

  30. Singh, S., Batabyal, S., Tripathi, S.: Security aware dynamic scheduling algorithm (SADSA) for real-time applications on grid. Cluster Comput. 1–17 (2019)

    Google Scholar 

  31. Qin, X., Alghamdi, M., Nijim, M., Zong, Z., Bellam, K., Ruan, X., Manzanares, A.: Improving security of real-time wireless networks through packet scheduling [transactions letters]. IEEE Trans. Wirel. Commun. 7(9), 3273–3279 (2008)

    Article  Google Scholar 

  32. Zhu, X., Guo, H., Liang, S., Yang, X.: An improved security-aware packet scheduling algorithm in real-time wireless networks. Inf. Process. Lett. 112(7), 282–288 (2012)

    Article  MathSciNet  Google Scholar 

  33. Xie, T., Qin, X.: Enhancing security of real-time applications on grids through dynamic scheduling. In: Feitelson, D., Frachtenberg, E., Rudolph, L., Schwiegelshohn, U. (eds.) Job Scheduling Strategies for Parallel Processing, pp. 219–237 (2005)

    Google Scholar 

  34. Singh, S., Tripathi, S.: SLOPE: secure and load optimized packet scheduling model in a grid environment. J. Syst. Archit. 91, 41–52 (2018)

    Article  Google Scholar 

  35. Xie, T., Qin, X., Sung, A.: SAREC: a security-aware scheduling strategy for real-time applications on clusters. In: 2005 International Conference on Parallel Processing (ICPP’05), pp. 5–12 (2005)

    Google Scholar 

  36. MIT. Binary Integer Programming. http://web.mit.edu/15.053/www/AMP-Chapter-09.pdf

  37. Chang, R.S., Lee, Y.H., Leu, S.: Improving job scheduling algorithms in a grid environment. Future Gen. Comput. Syst. 27(8), 991–998 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Surendra Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Singh, S., Tripathi, S. (2022). A Security-Driven Scheduling Model for Delay-Sensitive Tasks in Fog Networks. In: Nicopolitidis, P., Misra, S., Yang, L.T., Zeigler, B., Ning, Z. (eds) Advances in Computing, Informatics, Networking and Cybersecurity. Lecture Notes in Networks and Systems, vol 289. Springer, Cham. https://doi.org/10.1007/978-3-030-87049-2_29

Download citation

Publish with us

Policies and ethics