857 research outputs found

    Distributed Adaptive Primal Algorithm for P2P-ETS over Unreliable Communication Links

    Get PDF
    Algorithms for distributed coordination and control are increasingly being used in smart grid applications including peer-to-peer energy trading and sharing to improve reliability and efficiency of the power system. However, for realistic deployment of these algorithms, their designs should take into account the suboptimal conditions of the communication network, in particular the communication links that connect the energy trading entities in the energy network. This study proposes a distributed adaptive primal (DAP) routing algorithm to facilitate communication and coordination among proactive prosumers in an energy network over imperfect communication links. The proposed technique employs a multi-commodity flow optimization scheme in its formulation with the objective to minimize both the communication delay and loss of energy transactional messages due to suboptimal network conditions. Taking into account realistic constraints relating to network delay and communication link capacity between the peers, the DAP routing algorithm is used to evaluate network performance using various figures of merit such as probability of signal loss, message delay, congestion and different network topologies. Further, we address the link communication delay problem by redirecting traffic from congested links to less utilized ones. The results show that the proposed routing algorithm is robust to packet loss on the communication links with a 20% reduction in delay compared with hop-by-hop adaptive link state routing algorith

    Enabling individually entrusted routing security for open and decentralized community networks

    Get PDF
    Routing in open and decentralized networks relies on cooperation. However, the participation of unknown nodes and node administrators pursuing heterogeneous trust and security goals is a challenge. Community-mesh networks are good examples of such environments due to their open structure, decentralized management, and ownership. As a result, existing community networks are vulnerable to various attacks and are seriously challenged by the obligation to find consensus on the trustability of participants within an increasing user size and diversity. We propose a practical and novel solution enabling a secured but decentralized trust management. This work presents the design and analysis of securely-entrusted multi-topology routing (SEMTOR), a set of routing-protocol mechanisms that enable the cryptographically secured negotiation and establishment of concurrent and individually trusted routing topologies for infrastructure-less networks without relying on any central management. The proposed mechanisms have been implemented, tested, and evaluated for their correctness and performance to exclude non-trusted nodes from the network. Respective safety and liveness properties that are guaranteed by our protocol have been identified and proven with formal reasoning. Benchmarking results, based on our implementation as part of the BMX7 routing protocol and tested on real and minimal (OpenWRT, 10 Euro) routers, qualify the behaviour, performance, and scalability of our approach, supporting networks with hundreds of nodes despite the use of strong asymmetric cryptography.Peer ReviewedPostprint (author's final draft

    Distributed Delay-Tolerant Strategies for Equality-Constraint Sum-Preserving Resource Allocation

    Full text link
    This paper proposes two nonlinear dynamics to solve constrained distributed optimization problem for resource allocation over a multi-agent network. In this setup, coupling constraint refers to resource-demand balance which is preserved at all-times. The proposed solutions can address various model nonlinearities, for example, due to quantization and/or saturation. Further, it allows to reach faster convergence or to robustify the solution against impulsive noise or uncertainties. We prove convergence over weakly connected networks using convex analysis and Lyapunov theory. Our findings show that convergence can be reached for general sign-preserving odd nonlinearity. We further propose delay-tolerant mechanisms to handle general bounded heterogeneous time-varying delays over the communication network of agents while preserving all-time feasibility. This work finds application in CPU scheduling and coverage control among others. This paper advances the state-of-the-art by addressing (i) possible nonlinearity on the agents/links, meanwhile handling (ii) resource-demand feasibility at all times, (iii) uniform-connectivity instead of all-time connectivity, and (iv) possible heterogeneous and time-varying delays. To our best knowledge, no existing work addresses contributions (i)-(iv) altogether. Simulations and comparative analysis are provided to corroborate our contributions

    Forwarding fault detection in wireless community networks

    Get PDF
    Wireless community networks (WCN) are specially vulnerable to routing forwarding failures because of their intrinsic characteristics: use of inexpensive hardware that can be easily accessed; managed in a decentralized way, sometimes by non-expert administrators, and open to everyone; making it prone to hardware failures, misconfigurations and malicious attacks. To increase routing robustness in WCN, we propose a detection mechanism to detect faulty routers, so that the problem can be tackled. Forwarding fault detection can be explained as a 4 steps process: first, there is the need of monitoring and summarizing the traffic observed; then, the traffic summaries are shared among peers, so that evaluation of a router's behavior can be done by analyzing all the relevant traffic summaries; finally, once the faulty nodes have been detected a response mechanism is triggered to solve the issue. The contributions of this thesis focus on the first three steps of this process, providing solutions adapted to Wireless Community Networks that can be deployed without the need of modifying its current network stack. First, we study and characterize the distribution of the error of sketches, a traffic summary function that is resilient to packet dropping, modification and creation and provides better estimations than sampling. We define a random process to describe the estimation for each sketch type, which allows us to provide tighter bounds on the sketch accuracy and choose the size of the sketch more accurately for a set of given requirements on the estimation accuracy. Second, we propose KDet, a traffic summary dissemination and detection protocol that, unlike previous solutions, is resilient to collusion and false accusation without the need of knowing a packet's path. Finally, we consider the case of nodes with unsynchronized clocks and we propose a traffic validation mechanism based on sketches that is capable of discerning between faulty and non-faulty nodes even when the traffic summaries are misaligned, i.e. they refer to slightly different intervals of time.Las redes comunitarias son especialmente vulnerables a errores en la retransmisión de paquetes de red, puesto que están formadas por equipos de gama baja, que pueden ser fácilmente accedidos por extraños; están gestionados de manera distribuida y no siempre por expertos, y además están abiertas a todo el mundo; con lo que de manera habitual presentan errores de hardware o configuración y son sensibles a ataques maliciosos. Para mejorar la robustez en el enrutamiento en estas redes, proponemos el uso de un mecanismo de detección de routers defectuosos, para así poder corregir el problema. La detección de fallos de enrutamiento se puede explicar como un proceso de 4 pasos: el primero es monitorizar el tráfico existente, manteniendo desde cada punto de observación un resumen sobre el tráfico observado; después, estos resumenes se comparten entre los diferentes nodos, para que podamos llevar a cabo el siguiente paso: la evaluación del comportamiento de cada nodo. Finalmente, una vez hemos detectado los nodos maliciosos o que fallan, debemos actuar con un mecanismo de respuesta que corrija el problema. Esta tesis se concentra en los tres primeros pasos, y proponemos una solución para cada uno de ellos que se adapta al contexto de las redes comunitarias, de tal manera que se puede desplegar en ellas sin la necesidad de modificar los sistemas y protocolos de red ya existentes. Respecto a los resumenes de tráfico, presentamos un estudio y caracterización de la distribución de error de los sketches, una estructura de datos que es capaz de resumir flujos de tráfico resistente a la pérdida, manipulación y creación de paquetes y que además tiene mejor resolución que el muestreo. Para cada tipo de sketch, definimos una función de distribución que caracteriza el error cometido, de esta manera somos capaces de determinar con más precisión el tamaño del sketch requerido bajo unos requisitos de falsos positivos y negativos. Después proponemos KDet, un protocolo de diseminación de resumenes de tráfico y detección de nodos erróneos que, a diferencia de protocolos propuestos anteriormente, no require conocer el camino de cada paquete y es resistente a la confabulación de nodos maliciosos. Por último, consideramos el caso de nodos con relojes desincronizados, y proponemos un mecanismo de detección basado en sketches, capaz de discernir entre los nodos erróneos y correctos, aún a pesar del desalineamiento de los sketches (es decir, a pesar del que estos se refieran a momentos de tiempo ligeramente diferentes)

    Research on Information Flow Topology for Connected Autonomous Vehicles

    Get PDF
    Information flow topology plays a crucial role in connected autonomous vehicles (CAVs). It describes how CAVs communicate and exchange information with each other. It predominantly affects the platoon\u27s performance, including the convergence time, robustness, stability, and scalability. It also dramatically affects the controller design of CAVs. Therefore, studying information flow topology is necessary to ensure the platoon\u27s stability and improve its performance. Advanced sliding mode controllers and optimisation strategies for information flow topology are investigated in this project. Firstly, the impact of information flow topology on the platoon is studied regarding tracking ability, fuel economy and driving comfort. A Pareto optimal information flow topology offline searching approach is proposed using a non-dominated sorting genetic algorithm (NSGA-II) to improve the platoon\u27s overall performance while ensuring stability. Secondly, the concept of asymmetric control is introduced in the topological matrix. For a linear CAVs model with time delay, a sliding mode controller is designed to target the platoon\u27s tracking performance. Moreover, the Lyapunov analysis is used via Riccati inequality to guarantee the platoon\u27s internal stability and input-to-output string stability. Then NSGA-II is used to find the homogeneous Pareto optimal asymmetric degree to improve the platoon\u27s performance. A similar approach is designed for a nonlinear CAVs model to find the Pareto heterogeneous asymmetric degree and improve the platoon\u27s performance. Thirdly, switching topology is studied to better deal with the platoon\u27s communication problems. A two-step switching topology framework is introduced. In the first step, an offline Pareto optimal topology search with imperfect communication scenarios is applied. The platoon\u27s performance is optimised using a multi-objective evolutionary algorithm based on decomposition (MOEA/D). In the second step, the optimal topology is switched and selected from among the previously obtained Pareto optimal topology candidates in real-time to minimise the control cost. For a continuous nonlinear heterogeneous platoon with actuator faults, a sliding mode controller with an adaptive mechanism is developed. Then, the Lyapunov approach is applied to the platoon\u27s tracking error dynamics, ensuring the systems uniformly ultimately bounded stability and string stability. For a discrete nonlinear heterogeneous platoon with packet loss, a discrete sliding mode controller with a double power reaching law is designed, and a modified MOEA/D with two opposing adaptive mechanisms is applied in the two-step framework. Simulations verify all the proposed controllers and frameworks, and experiments also test some. The results show the proposed strategy\u27s effectiveness and superiority in optimising the platoon\u27s performance with multiple objectives

    A framework for implementing interactive algorithms on distributed systems

    Get PDF
    In this thesis, we build a framework for implementing iterative algorithms by abstracting the code for node communication. This thesis explains the building of said framework using a distributed algorithm and introduces the tools and methods used. First an algorithm was implemented and tested out on a testbed of 15 Raspberry pi’s. After the desired functionality was met, we proceeded with abstracting the code so that similar iterative algorithms could reuse the parts of the code that dealt with internode communication and communication link setup. This work is funded in part by the National Science Foundation.National Science FoundationOpe

    Digital provenance - models, systems, and applications

    Get PDF
    Data provenance refers to the history of creation and manipulation of a data object and is being widely used in various application domains including scientific experiments, grid computing, file and storage system, streaming data etc. However, existing provenance systems operate at a single layer of abstraction (workflow/process/OS) at which they record and store provenance whereas the provenance captured from different layers provide the highest benefit when integrated through a unified provenance framework. To build such a framework, a comprehensive provenance model able to represent the provenance of data objects with various semantics and granularity is the first step. In this thesis, we propose a such a comprehensive provenance model and present an abstract schema of the model. ^ We further explore the secure provenance solutions for distributed systems, namely streaming data, wireless sensor networks (WSNs) and virtualized environments. We design a customizable file provenance system with an application to the provenance infrastructure for virtualized environments. The system supports automatic collection and management of file provenance metadata, characterized by our provenance model. Based on the proposed provenance framework, we devise a mechanism for detecting data exfiltration attack in a file system. We then move to the direction of secure provenance communication in streaming environment and propose two secure provenance schemes focusing on WSNs. The basic provenance scheme is extended in order to detect packet dropping adversaries on the data flow path over a period of time. We also consider the issue of attack recovery and present an extensive incident response and prevention system specifically designed for WSNs
    corecore