Abstract
Recently, Ethernet Passive Optical Network (EPON) is a significant solution in the access layer of network that can provide large amount of bandwidth for different kind of traffic. In this paper, we propose a dynamic bandwidth allocation scheme based on the trust based VCG-Kelly mechanism. To enhance the EPON system performance, the proposed scheme can take into account the measure of each ONU’s payoff variation succeeding at a given bandwidth allocation. By considering the current outcome, ONUs adaptively select their bid strategies and the OLT dynamically allocates bandwidth to reach a certain desired EPON outcome. In addition, we also consider the network security situation, which reflects what is happening in the EPON network including both the offense and defense behaviors. During this iterative learning approach, the EPON system can converge to a stable network state. Evidences from simulations demonstrate that the proposed scheme outperforms the existing schemes.





Similar content being viewed by others
References
Garfias, P., Gutierrez, L., & Sallent, S. (2012). Enhanced DBA to provide QoS to coexistent EPON and 10G-EPON networks. IEEE/OSA Journal of Optical Communications and Networking, 4(12), 978–988.
Yang, K., Ou, S., Guild, K., & Chen, H.-H. (2009). Convergence of ethernet PON and IEEE 802.16 broadband access networks and its QoS-aware dynamic bandwidth allocation scheme. IEEE Journal on Selected Areas in Communications, 27(2), 101–116.
Yang, S., & Hajek, B. (2007). VCG-Kelly mechanisms for allocation of divisible goods: Adapting VCG mechanisms to one-dimensional signals. IEEE Journal on Selected Areas in Communications, 25(6), 1237–1243.
Harounabadi, M., & Alireza, M. (2012). A novel high utilization idle time free dynamic bandwidth allocation algorithm in EPON. In IEEE ICCIT’2012 (pp. 155–160).
Xiang, M. (2013). Trust-based energy aware geographical routing for smart grid communications networks. Master’s Thesis, Auckland University of Technology.
Izquierdo, L. R., & Izquierdo, S. S. (2008). Dynamics of the Bush-Mosteller learning algorithm in 2x2 games. InTech Publisher.
Kim, S. (2013). An online bandwidth allocation scheme based on mechanism design model. IEICE Transactions, 96(1), 321–324.
Kang, T., Li, X., Chansu, Yu., & Kim, J. (2013). A survey of security mechanisms with direct sequence spread spectrum signals. Journal of Computing Science and Engineering, 7(3), 187–197.
Ryoo, J., & Park, E.-A. (2011). Internet security readiness: The influence of internet usage level and awareness on internet security readiness capital, skill, and actual uptake/use of infrastructure. Journal of Computing Science and Engineering, 5(1), 33–50.
Wang, B., Cai, J., Zhang, S., & Li, J. (2010). A network security assessment model based on attack-defense game theory. IEEE ICCASM2010 (pp. 639–643).
Jiang, W., Fang, B.-X., Zhang, H.-L., Tian, Z.-H., & Song, X.-f. (2009). Optimal network security strengthening using attack-defense game model. In IEEE information technology, new generations (ITNG’09) (pp. 475–480).
Lv, H., & Li, H. (2011). Research on intrusion recognition and tracing under attack and defense confront environment. In IEEE information management, innovation management and industrial engineering (ICIII’2011) (pp. 209–214).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, S. Trust Based Dynamic Bandwidth Allocation Scheme for Ethernet Passive Optical Networks. Wireless Pers Commun 83, 2869–2882 (2015). https://doi.org/10.1007/s11277-015-2571-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-2571-3