48
Graduate Theses, Dissertations, and Problem Reports 2017 Information Centric Strategies for Scalable Data Transport in Information Centric Strategies for Scalable Data Transport in Cyber Physical Systems (CPSs) Cyber Physical Systems (CPSs) Ajay Krishna Teja Kavuri Follow this and additional works at: https://researchrepository.wvu.edu/etd Recommended Citation Recommended Citation Kavuri, Ajay Krishna Teja, "Information Centric Strategies for Scalable Data Transport in Cyber Physical Systems (CPSs)" (2017). Graduate Theses, Dissertations, and Problem Reports. 5948. https://researchrepository.wvu.edu/etd/5948 This Thesis is protected by copyright and/or related rights. It has been brought to you by the The Research Repository @ WVU with permission from the rights-holder(s). You are free to use this Thesis in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you must obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/ or on the work itself. This Thesis has been accepted for inclusion in WVU Graduate Theses, Dissertations, and Problem Reports collection by an authorized administrator of The Research Repository @ WVU. For more information, please contact [email protected].

Information Centric Strategies for Scalable Data Transport

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Information Centric Strategies for Scalable Data Transport

Graduate Theses, Dissertations, and Problem Reports

2017

Information Centric Strategies for Scalable Data Transport in Information Centric Strategies for Scalable Data Transport in

Cyber Physical Systems (CPSs) Cyber Physical Systems (CPSs)

Ajay Krishna Teja Kavuri

Follow this and additional works at: https://researchrepository.wvu.edu/etd

Recommended Citation Recommended Citation Kavuri, Ajay Krishna Teja, "Information Centric Strategies for Scalable Data Transport in Cyber Physical Systems (CPSs)" (2017). Graduate Theses, Dissertations, and Problem Reports. 5948. https://researchrepository.wvu.edu/etd/5948

This Thesis is protected by copyright and/or related rights. It has been brought to you by the The Research Repository @ WVU with permission from the rights-holder(s). You are free to use this Thesis in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you must obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/ or on the work itself. This Thesis has been accepted for inclusion in WVU Graduate Theses, Dissertations, and Problem Reports collection by an authorized administrator of The Research Repository @ WVU. For more information, please contact [email protected].

Page 2: Information Centric Strategies for Scalable Data Transport

Information Centric Strategies forScalable Data Transport in Cyber

Physical Systems (CPSs)

Ajay Krishna Teja Kavuri

Thesis submitted to the

Benjamin M. Statler College of Engineering and Mineral Resources

at West Virginia University

in partial fulfillment of the requirements

for the degree of

Master of Science

in

Computer Science

Vinod Kulathumani, Ph.D., Chair

Yanfang Ye, Ph.D.

Saiph Savage, Ph.D.

Lane Department of Computer Science and Electrical Engineering

Morgantown, West Virginia

2017

Keywords: Cyber Physical Systems, Data Transport, Information Centric Strategies,

Regression, Time-series Segmentation

© 2017 Ajay Krishna Teja Kavuri

Page 3: Information Centric Strategies for Scalable Data Transport

Abstract

Information Centric Strategies for Scalable Data Transport inCyber Physical Systems (CPSs)

Ajay Krishna Teja Kavuri

Cyber-Physical Systems (CPSs) represent the next generation ofcomputing that is ubiquitous, wireless and intelligent. These networked sens-ing systems are at the intersection of sensing, communication, control, andcomputing [16]. Such systems will have applications in numerous fields suchas vehicular systems and transportation, medical and health care systems,smart homes and buildings, etc. The proliferation of such sensing systems willtrigger an exponential increase in the computational devices that exchangedata over existing network infrastructure.

Transporting data at scale in such systems is a challenge [21] mainlydue to the underlying network infrastructure which is still resource con-strained and bandwidth-limited. Efforts have been made to improve thenetwork infrastructure [5] [2] [15]. The focus of this thesis is to put forwardinformation-centric strategies that optimize the data transport over existingnetwork infrastructure.

This thesis proposes four different information-centric strategies:(1) Strategy to minimize network congestion in a generic sensing systemby estimating data with adaptive updates, (2) An adaptive informationexchange strategy based on rate of change of state for static and mobilenetworks, (3) Spatio-temporal strategy that maintains spatial resolution byreducing redundant transmissions, (4) Proximity-dependent data transferstrategy to ensure most updated information in high-density regions. Eachof these strategies is experimentally verified to optimize the data transportin their respective setting.

Page 4: Information Centric Strategies for Scalable Data Transport

Acknowledgements

Firstly, I would like to express my sincere gratitude to my advisor, Dr. VinodKulathumani, for his constant support and mentorship. I sincerely thank himfor believing in me and providing me an opportunity to work in his ardentresearch group. This thesis is possible due to his technical and editorialguidance throughout my graduate studies.

I am indebted to my committee members: Dr. Yanfang Ye, Dr.Saiph Savage. Their valuable insights, comments, and corrections have shapedthis thesis.

I would like to thank Integrated Sensing Systems for Surface Min-ing Safety project. Also, I thank WVU Library Systems Department forproviding an opportunity to work as a Graduate Service Assistant.

I extend my gratitude to Dr. Masahiro Nakagawa, Dr. Rahul Kavi,Mr. Venkata Raghava Siva Naga Shashank Sabniveesu, Mr. Rohit and Mr.Priyashraba Misra at the Distributed Computing and Networking Lab. Thenumerous technical discussions have fortified my understanding of the subjectand contributed to my research.

Finally, I thank my parents Satyavathi Vemuri and Prabhakar SarmaKavuri for their love and support. My parents have always been support-ive of my decision to pursue graduate studies. Special thanks to my sisterBhavya Royyuru for her encouragement.

iii

Page 5: Information Centric Strategies for Scalable Data Transport

Contents

Acknowledgements iii

List of Figures vi

List of Tables vii

1 Introduction 11.1 Motivation and Problem . . . . . . . . . . . . . . . . . . . . . 11.2 Thesis Contributions . . . . . . . . . . . . . . . . . . . . . . . 31.3 Thesis Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

2 Strategy to minimize network congestion in a generic sens-ing system by estimating data with adaptive updates 42.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42.2 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . 52.3 Experimental Setup . . . . . . . . . . . . . . . . . . . . . . . . 82.4 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

2.4.1 Percentage of packets saved without packet loss . . . . 82.4.2 Percentage of packets saved with packet loss . . . . . . 92.4.3 Average difference percentage without packet loss . . . 112.4.4 Average difference percentage with packet loss . . . . . 11

2.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

3 An adaptive information exchange strategy based on rateof change of state for static and mobile networks 133.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133.2 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . 143.3 Experimental Setup . . . . . . . . . . . . . . . . . . . . . . . . 163.4 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

iv

Page 6: Information Centric Strategies for Scalable Data Transport

3.5 Use Case: MapMyTruck . . . . . . . . . . . . . . . . . . . . . 183.5.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . 183.5.2 System Architecture . . . . . . . . . . . . . . . . . . . 183.5.3 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

3.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

4 Spatio-temporal strategy that maintains spatial resolutionby reducing redundant transmissions 214.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214.2 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . 234.3 Experimental Setup . . . . . . . . . . . . . . . . . . . . . . . . 254.4 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

5 Proximity-dependent data transfer strategy to ensure mostupdated information in high-density regions 285.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285.2 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . 295.3 Experimental Setup . . . . . . . . . . . . . . . . . . . . . . . . 315.4 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

6 Conclusion and Future Work 346.1 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . 346.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

References 37

v

Page 7: Information Centric Strategies for Scalable Data Transport

List of Figures

2.1 Sensor Model ms block diagram . . . . . . . . . . . . . . . . . 52.2 Controller Model mc block diagram . . . . . . . . . . . . . . . 72.3 Percentage of Packets Saved vs Threshold Percentage (th) . . 92.4 Percentage of Packets Saved vs Threshold Percentage (th) un-

der packet drop . . . . . . . . . . . . . . . . . . . . . . . . . . 102.5 Average Difference Percentage (δ) vs Threshold Percentage(th) 112.6 Average Difference Percentage (δ) vs Threshold Percentage(th)

under packet drop . . . . . . . . . . . . . . . . . . . . . . . . . 12

3.1 Sensor Model ms block diagram . . . . . . . . . . . . . . . . . 153.2 Percentage of Packets Saved vs Threshold Percentage (th) . . 173.3 MapMyTruck system architecture . . . . . . . . . . . . . . . . 183.4 Sample track collected from the MapMyTruck for one of the

trucks in Red Hills Mine on a working day . . . . . . . . . . . 20

4.1 A snapshot of mobile sensor network scenario . . . . . . . . . 224.2 A scenario with two sensor node sx and sy. . . . . . . . . . . . 244.3 Percentage of Packets Saved vs Frequency Precision . . . . . . 26

5.1 Schematic of a VANET for simulation in Network Simulator3 (NS-3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

5.2 Percentage of Packets Saved vs Node Density (No. of vehiclesin the simulation) . . . . . . . . . . . . . . . . . . . . . . . . . 33

vi

Page 8: Information Centric Strategies for Scalable Data Transport

List of Tables

3.1 Logging rate as a function of vehicle speed and the correspond-ing precision in track accuracy; the precision denotes the max-imum distance that can be travelled by a truck without loggingany update . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

vii

Page 9: Information Centric Strategies for Scalable Data Transport

Chapter 1

Introduction

In this chapter, we present a brief overview and the challenges in buildingCyber-Physical System(s). Also, the list of contributions and focus of thisthesis is presented.

1.1 Motivation and Problem

Computational devices are increasingly occupying an import role in our dailylives. Thanks to the advancements in Wireless Networking, Wireless Sen-sor Networks, and Embedded Systems; this new generation of devices cancommunicate with one another and the physical world. These ubiquitousconnected devices are finding applications in many domains including ve-hicular systems and transportation, medical and health care systems, smarthomes and buildings, etc. Further proving Moore’s law [18], according toJuniper research over 38 billion connected devices will be in use by 2020 [15].Such integration of computation, networking, and physical processes formCyber-Physical System(s).

Cyber-Physical System(s) enable a new generation of services thatcan sense the environment, communicate with one another and affect thephysical process. Unlike traditional wireless sensor networks, the nodes are

1

Page 10: Information Centric Strategies for Scalable Data Transport

not just limited to resource constrained devices. Cyber-Physical System(s)can encompass energy-rich nodes such as workstations, mobile nodes suchas vehicles and handheld devices such as smartphones, PDAs, tablets, etc.This connected ecosystem takes feedback from the physical world to performcritical actions.

At the core of the Cyber-Physical Systems is the information ex-change between nodes. In many Cyber-Physical Systems, the central idea isto obtain data from distributed nodes to sense the physical world; usually,this data is queried for a fixed interval of time. Querying the data too oftencan introduce congestion in the network while querying for a larger interval oftime might degrade the quality of information. Unlike traditional networkedsystems, the information flows through a variety of heterogeneous platformsand nodes. Transporting data at such scale is a major challenge. Hence adevice oriented architecture is no longer valid [6]. A broader information-centric perspective is essential for building these complex ecosystems.

Through an information-centric perspective, our focus is on opti-mizing the information (or data) in Cyber-Physical System(s) without losingthe quality of the information necessary for the application performance. Weaim to reduce the amount of information being communicated through thenetwork without degrading application performance so that a larger numberof nodes can be accommodated in a Cyber-Physical System. In other words,our aim is to make Cyber-Physical System(s) scalable. Further, information-centric approaches have been surveyed and found to optimize the web ser-vices, provide better abstractions and improve security [3] [12].

In the past, such information-centric approaches are studied sep-arately for Wireless Sensor Networks [7] [4]. Due to the nature of Cyber-Physical System(s), there is no one strategy that can achieve our goal for allthe use cases. In this thesis, four different information-centric strategies areproposed for Cyber-Physical System(s). These strategies are inspired fromchallenges identified here at West Virginia University Distributed Computingand Networking Lab.

2

Page 11: Information Centric Strategies for Scalable Data Transport

1.2 Thesis Contributions

1. We propose a strategy for optimizing a generic sensing system. A sensormodel ms and controller model mc are designed such that the overallload on the network is optimized. Further, the strategy is validatedfor different network conditions. The strategy is inspired from SmartRefractory Systems project for overall network optimization.

2. A communication strategy applicable to both static and mobile net-works based on the rate of change in sensing system state is developed.The optimization is implemented for MapMyTruck module within In-tegrated Sensing Systems for Surface Mining Safety project.

3. A scenario for mobile sensor networks such as MANET(s) containsnodes that are spatially distributed as a function of time t given byD(t). A strategy is designed for such networks that ensures a spatialresolution while reducing redundant transmissions.

4. Strategy to ensure most recent information at dense regions is devel-oped. The strategy is experimentally verified by simulating a VANETusing NS3. We believe, such a strategy optimizes the Cooperative Col-lision Warning System developed as part of Integrated Sensing Systemsfor Surface Mining Safety project.

1.3 Thesis Outline

The rest of the document is organized as follows. In Chpater 2, we presenta strategy to minimize network congestion in a generic sensing system byestimating data with adaptive updates. In Chpater 3, we propose a rateof change based information exchange strategy for static and mobile net-works. In Chpater 4, we extend the information-centric approach to mobilenodes using a spatio-temporal strategy that ensures a spatial resolution. InChpater 5, we propose a proximity-dependent data transfer strategy to en-sure most updated information at high-density regions for Vehicular Ad hocNetwork (VANET). We present conclusion and future work in Chpater 6.

3

Page 12: Information Centric Strategies for Scalable Data Transport

Chapter 2

Strategy to minimize networkcongestion in a generic sensingsystem by estimating data withadaptive updates

2.1 Overview

In this case, our objective is to build a generic model that can optimizethe sensor network infrastructure. Traditionally, networked sensors transmitdata at a constant frequency. When the application requires most recentinformation, sensors communicate more frequently and vice versa. The goalis to curtail traffic in the network generated from sensors thereby reducingpacket collisions in the network. This model achieves the objective usinga linear model that intelligently makes a decision whether to communicatebased on the generated data from the sensor.

The trade-off with this model is that it introduces a small error (upto 1%) in the value of the sensor data. This model applies to both staticand mobile sensor networks. In the subsequent sections, the model, sensorcommunication algorithm, and experimental results are presented.

4

Page 13: Information Centric Strategies for Scalable Data Transport

2.2 Methodology

For any given sensor s it generates data ds such that at any given time t,sensor data ds has a value vt. For example, a temperature sensor s wouldgenerate data ds that is a tuple of values {v0, v1, v2, v3......vn} correspondingto time {t0, t1.......tn}. Ideally, the goal of a sensor network is to communicatethis tuple ds to a controller within an application at every interval controlledby frequency f .

This model aims to optimize the traffic irrespective of the underlyingnetwork protocol stack. The model runs synchronously on both ends of thecommunication; namely, sensor and controller within an application. In thismodel, in addition to the primary components, Sensor s consists a linear es-timator, thresholding phase and network interface represented in Figure 2.1.Initially, sensor values corresponding to time t0 and t1 are communicatedirrespective of the system state.

Figure 2.1: Sensor Model ms block diagram

For the model ms at the sensor s, ms estimates the value et of thesensor s at time t using values at time t− 1 and t− 2. The model estimatesthe value et by using a linear equation represented by Eq. (3.1) over a slidingwindow with previous two time intervals. It achieves this by first solvingm and c in Eq. (3.1) using the values {t− 1, t− 2} and corresponding datavalues from sensor s: {vt−1, vt−2}.

5

Page 14: Information Centric Strategies for Scalable Data Transport

et = m ∗ t+ c (3.1)

Once it has an estimated value et at time t it is compared withthe real value from sensor vt; if the difference percentage δt calculated usingEq. (3.2) falls within the threshold percentage th, then the sensor does notcommunicate to the controller.

δt = |et − vt|/vt ∗ 100 (3.2)

When the difference percentage δt doesn’t compare with the th thesensor transmits the real value vt and control message to update estimator.The algorithm for the model ms can be summarized as follows:

Algorithm 1 Algorithm for sensor model ms

1: Initialize:Transmit the values (v0, v1) for time (t0, t1)

2: for each time t do3: Solve for m, c in Eq. (3.1) using (vt−1, vt−2) and (t− 1, t− 2)4: Estimate sensor data value et at current time t5: Calculate difference percentage δt ← |et − vt|/vt ∗ 1006: if δt > th then . If δt doesn’t compare7: Transmit vt8: Send control message9: end if

10: end for

On the other hand, model at controller mc represented using Fig-ure 2.2 also consists a linear estimator. Controller model mc estimates thevalue et at time t and if no message is received from sensor s at the giveninterval, the controller reports estimated value et as the value from the sen-sor. It is important to note that et at both mc and ms are always identicalat any given time t provided that there be no packet loss in the network.Further, we have studied the performance of model under packet loss in theSection 2.4.

6

Page 15: Information Centric Strategies for Scalable Data Transport

Figure 2.2: Controller Model mc block diagram

The model mc updates the parameters m, c in Eq. (3.1) on receiv-ing the control messages and reports the received value vt as the sensor svalue. The model mc can introduce a small error et but reduces traffic onthe network. The strategy is represented with the following algorithm:

Algorithm 2 Algorithm for controller model mc

1: Initialize:Receive the values (v0, v1) for time (t0, t1)Solve for m, c in Eq. (3.1) using (v0, v1) and (t0, t1)

2: for each time t do3: Estimate sensor data value et at current time t4: if control message is heard then . If δt doesn’t compare5: return vt6: end if7: return et8: end for

The above model has been validated using a sensor network simu-lated for different conditions. Further, this strategy has been inspired fromSmart Refractory Systems project. In the following sections, the experimentand results are presented.

7

Page 16: Information Centric Strategies for Scalable Data Transport

2.3 Experimental Setup

To validate the model, sensor network has been simulated using data fromMica2Dot sensors with weather boards deployed at Intel Berkeley ResearchLab [13]. The data contains the time-stamped values of humidity, tempera-ture, light, and voltage from 54 sensors. The data is queried once every 31secs and collected between February 28th and April 5th, 2004. The entiresimulation is implemented using a custom tool written in Python here atWest Virginia University Distributed Systems and Networking Lab.

The model is validated for three different threshold percentage val-ues i.e. th = {0.1, 0.5, 1} for all 54 sensors. Further, packets are intentionallydropped to observe the behavior of models. The percentage of packets savedfor each threshold and bar plots for the average of δt for all values t validatethe strategy. In the following section, results are presented.

2.4 Results

2.4.1 Percentage of packets saved without packet loss

In the figure 2.3, the percentage of packets saved through the network fordifferent threshold percentage (th) under no packet loss is presented. TheFigure 2.3 shows the trend that when the threshold(th) is relaxed, the con-troller reports more data values that are estimated rather than queried fromthe real sensor. Further, it is important to note that even with the leastallowed threshold percentage(th = 0.1) the strategy saves about a median of40% of the data packets.

8

Page 17: Information Centric Strategies for Scalable Data Transport

Figure 2.3: Percentage of Packets Saved vs Threshold Percentage (th)

2.4.2 Percentage of packets saved with packet loss

Further, the simulation is repeated for a list of packet drop percentages givenby {5, 10, 20}. This is intentionally simulated to observe the behavior of themodel at controller mc when it doesn’t receive the control messages to updatethe estimator. The Figure 2.4 presents all the plots for comparison. It isevident that although there is a packet drop the percentage of packets saveddoesn’t vary significantly.

9

Page 18: Information Centric Strategies for Scalable Data Transport

(a) 0% packet drop (b) 5% packet drop

(c) 10% packet drop (d) 20% packet drop

Figure 2.4: Percentage of Packets Saved vs Threshold Percentage (th) underpacket drop

Another important observation is that individual sensor values re-ported by the controller at any given time t should be close to the real sensorvalue vt. This is validated by comparing the threshold percentage (th) withthe average of actual difference percentage (δt) at all values of t calculatedusing Eq. (3.3).

average of difference percentage =n∑

t=1

(|et − vt|/vt ∗ 100)/n (3.3)

10

Page 19: Information Centric Strategies for Scalable Data Transport

2.4.3 Average difference percentage without packet loss

The box plot in Figure 2.5 suggests that although there is allowed thresh-old percentage(th); the majority of the reported sensor values has a lowerdifference percentage than (th).

Figure 2.5: Average Difference Percentage (δ) vs Threshold Percentage(th)

2.4.4 Average difference percentage with packet loss

Further, Figure 2.6 contains the box plots for different packet drop values.Clearly, the spread of average difference percentage(δ) increases as the packetdrop percentage increases. A counter-argument can be made that while thisstrategy ensures that there is less load on the network, one can expect a lowpacket drop.

11

Page 20: Information Centric Strategies for Scalable Data Transport

(a) 0% packet drop (b) 5% packet drop

(c) 10% packet drop (d) 20% packet drop

Figure 2.6: Average Difference Percentage (δ) vs Threshold Percentage(th)under packet drop

2.5 Conclusion

This model presents a generic approach to optimize the sensor network infras-tructure using the information generated from the sensor. Such information-centric approach has the flexibility to be applied to any underlying networkinfrastructure. The algorithms have been presented and experimentally val-idated. The initial results have been satisfactory and such models have a lotof potential to be investigated.

12

Page 21: Information Centric Strategies for Scalable Data Transport

Chapter 3

An adaptive informationexchange strategy based onrate of change of state for staticand mobile networks

3.1 Overview

Similar to the strategy presented in Chapter 2, this strategy aims to mini-mize traffic in the network generated from sensors thereby reducing packetcollisions in the network. The idea is to use rate of change of current sen-sor state as a key metric to dynamically vary communication interval of asensor. Data from sensors change with respect to time, and a sensor statecan be defined based on the value of the sensor. We use the rate of changeof the defined state as key a metric; if it is identified that sensor state ischanging at a greater rate, the strategy adjusts the interval such that sensorscommunicate more often and vice versa.

This strategy is inspired by a real-world use case. An importantcomponent of Integrated Sensing Systems for Surface Mining Safety projectis to build MapMyTruck, a cloud-based logging system for GPS data from

13

Page 22: Information Centric Strategies for Scalable Data Transport

trucks for traffic analysis and route planing. The challenge is to build sensorcloud infrastructure while complying with bandwidth limitations of the mo-bile network. The rest of the chapter includes the methodology, experimentalsetup, results and MapMyTruck use case implementation.

3.2 Methodology

Consider a sensor s, at any given time t, sensor has a value vt and a sensorstate Ψt based on this value. We define the rate of change of state ROCΨ

as the difference between sensor state values Ψt and Ψt−1 over time intervaltr; the same is represented using Eq. (3.1). Unlike the strategy in Chapter2, frequency of the sensor varies with time such that at given time t, fre-quency ft is the value corresponding to rate of change of state ROCΨ. Adiscrete number of frequency values are mapped to the ROCΨ given by tuple{f0, f1, f2, f3......fn}.

ROCΨ ← (Ψt −Ψt−1)/tr (3.1)

Although this strategy applies to both static and mobile sensornetworks, it is particularly useful if the sensor state is constantly varying anddata is not required for every state. For example, if a given sensor is in anidle state (which can be identified using the sensor value); the correspondinginterval could be set to a relatively higher value to reduce the congestionon the network. This strategy does not require any additional logic at thecontroller.

14

Page 23: Information Centric Strategies for Scalable Data Transport

Figure 3.1: Sensor Model ms block diagram

The sensor model ms is represented in the Figure 3.1. The modelms contains a set of rules that map different rate of change of sensor stateROCΨ and corresponding frequency. For each time interval rt sensor has astate Ψt, using Eq. (3.1) ROCΨ is obtained. The current frequency fcurrentis updated based on the rules and if the interval duration is expired, thenthe value vt is sent over the network. The algorithm for sensor model ms isdescribed as follows:

Algorithm 3 Algorithm for sensor model ms

1: Initialize:Define rules R

2: for each time interval tr do3: Obtain rate of change of sensor state ROCΨ using Eq. (3.1)4: Update fcurrent(current frequency)← ft(corresponding frequency)5: end for

To evaluate the model, a sensor network is simulated, and a sim-plified version of the algorithm is implemented. The detailed algorithm is atthe core of MapMyTruck module. The experiment and results are presentedin the next section.

15

Page 24: Information Centric Strategies for Scalable Data Transport

3.3 Experimental Setup

As described in the Section 2.3, the experiment consists of a sensor net-work simulated using the data from Mica2Dot sensors with weather boardsdeployed at Intel Berkeley Research Lab [13]. A custom tool written inPython is used to conduct the experiment here at West Virginia UniversityDistributed Systems and Networking Lab.

The experiment consists of a simplified version of the Algorithm 3described below:

Algorithm 4 Algorithm for sensor model ms

1: Initialize:Transmit the value v0 for time t0

2: for Each time t do3: Calculate rate of change of state ROCΨ ← |vt − vt−1|/vt−1 ∗ 1004: if ROCΨ > th(threshold percentage) then5: fcurrent(current frequency)← fhigh6: else7: fcurrent(current frequency)← flow8: end if9: end for

The Algorithm 4 described above has two major differences fromthe Algorithm 3. First, the algorithm uses different equation to obtain rangeof change of state ROCΨ given by Eq. (3.2) instead of Eq. (3.1). Second,instead of defining tuple of frequency values {f0, f1, f2, f3......fn}, the algo-rithm has only two frequency values: {flow, fhigh}. The state is identified asactive if ROCΨ > th(threshold percentage) is satisfied and the sensor s willtransmit at frequency fhigh. Otherwise, the sensor s is in a idle state and notransmission is recommended. Hence, a map of rules R is not required.

ROCΨ ← |vt − vt−1|/vt−1 ∗ 100 (3.2)

Further, the model is validated for five different threshold percent-age values i.e. th = {1, 2, 3, 4, 5} for all 54 sensors. The bar plot between

16

Page 25: Information Centric Strategies for Scalable Data Transport

the percentage of packets saved and threshold percentage (th) for all valuesof t validate the model. The following section contains the results.

3.4 Results

In the figure 3.2, the bar plot between the percentage of packets saved throughthe network for different threshold percentage (th) is presented. The fig-ure 3.2 shows that there is a significant reduction in the packets sent throughthe network. A minimum threshold value (th = 1%) saves about 60% of thepackets. Also, there isn’t a significant increase in the percentage of packetssaved by increasing the threshold percentage (th).

Figure 3.2: Percentage of Packets Saved vs Threshold Percentage (th)

17

Page 26: Information Centric Strategies for Scalable Data Transport

3.5 Use Case: MapMyTruck

3.5.1 Overview

MapMyTruck is a sub-system of Integrated Sensing Systems for Surface MineSafety Project. The goal of the tool is to log GPS traces for long term collisionsafety evaluation. MapMyTruck is available to download at: http://bit.

ly/mapmytruck. The tool is the inspiration behind developing this strategyand has been tested in Red Hills Mine in Ackerman, Mississippi. During theinitial testing, MapMyTruck saved up to 86.1% of data transmitted to cloud.

3.5.2 System Architecture

This section details the architecture designed to achieve the goal of the Map-MyTruck described in section 3.5.1.

Figure 3.3: MapMyTruck system architecture

MapMyTruck architecture is described in Figure 3.3. The GPSinformation is logged from the CAT 769 haul trucks. A Garmin GPS deviceattached to a Windows Tablet running the .NET framework in each of thetrucks. Upon installation, the GPS would log location coordinates locally aswell as establish a remote connection to an FTP server and upload the data.Some of the features of this system are as follows:

18

Page 27: Information Centric Strategies for Scalable Data Transport

• Speed based logging rate: Logging all the data periodically (evenat a 10 second interval) would generate a huge amount of data which isnot cost effective (Internet Service Providers and cloud services chargebased on data transferred). For example, if each log is 100 bytes long,logging at 1 Hz would generate 360 Kbytes per truck per day. Onthe other hand, decreasing the logging frequency will prevent the datafrom being useful when vehicles come closer. Hence, rate of changebased information exchange strategy has been designed. The idea isto use rate of change of position, i.e. speed to determine the loggingfrequency. Hence, it acts as a speed based differential logging servicewhich logs and transmits data proportional to the speed. No datais transferred when the vehicle is idle and data rate is progressivelyincreased with speed and is transferred at 1 Hz at speeds of 25mphand above. Further, Table 3.1 provides detailed information on loggingfrequency at different speeds.

Table 3.1: Logging rate as a function of vehicle speed and the correspondingprecision in track accuracy; the precision denotes the maximum distance thatcan be travelled by a truck without logging any update

Speed (mph) Speed (mps) Frequency (s) Precision (m)<0.05 0.02572 600 15.432

0.05 - 2.3 1.0288 20 20.5762.3 - 4.6 2.0576 10 20.5764.6 - 9.2 4.1152 5 20.5769.2 - 18.4 8.2304 2.5 20.57618.4 - 36.8 16.4608 1 16.46136.8 - 73.6 32.9216 0.5 16.461

• Tolerates intermittent connection: It is not feasible to assume thatnetwork connection is always available in a mine. So the service logsdata locally, and whenever connection is available, it uploads the data.

• Auto package installer and auto sensor detect: The service canbe installed with an easy to use package installer and starts itself au-tomatically when a GPS device is detected.

19

Page 28: Information Centric Strategies for Scalable Data Transport

3.5.3 Results

MapMyTruck has been validated in a real-world scenario with the rate ofchange based information exchange strategy at it’s core. The Figure 3.4shows the GPS trace plotted using a custom tool developed in Java here atWest Virginia University Distributed Systems and Networking Lab. On anormal working day, MapMyTruck logs about 50 Kbytes of data per truckopposed to 360 Kbytes saving about 86.1% of data.

Figure 3.4: Sample track collected from the MapMyTruck for one of thetrucks in Red Hills Mine on a working day

3.6 Conclusion

The model presented in this section optimize the sensor cloud infrastructureusing a rate of change based information exchange strategy. The strategycan be generalized to any sensor cloud infrastructure to effectively reduceInternet Service Providers and Cloud Services costs. The results presentedin Section 3.4 and Section 3.5.3 validate the model both experimentally andpractically through MapMyTruck.

20

Page 29: Information Centric Strategies for Scalable Data Transport

Chapter 4

Spatio-temporal strategy thatmaintains spatial resolution byreducing redundanttransmissions

4.1 Overview

This section describes a spatio-temporal strategy for the mobile sensor net-works. In a mobile sensor network, the nodes position changes with respectto time. The goal of this strategy is to obtain information from these spa-tially distributed nodes such that the information always maintains a spatialresolution over the time period. This strategy is particularly useful for mon-itoring and surveying applications [24] where sensor nodes are distributed,and the information is aggregated to obtain knowledge about environmentparameters such as atmosphere humidity, water level, wind direction, etc.

In such monitoring and surveying applications, aggregating infor-mation from all the sensor nodes will have redundancies because the nodesthat are in close proximity contain same knowledge about the environmentparameter. Further, these spatially distributed nodes communicate in no

21

Page 30: Information Centric Strategies for Scalable Data Transport

particular order, i.e. it is not guaranteed that there is a spatial resolution ofthe region maintained in this information. A centralized control can be usedto orchestrate among the nodes, but that would be computationally costly.To further illustrate the case, a snapshot of mobile sensor network scenariois presented in the Figure 4.1.

In the Figure 4.1, the sensor nodes are labeled and spatially dis-tributed over the region. A virtual grid is overlayed through the region.Ideally, by maintaining a spatial resolution, the information from these mo-bile sensor nodes will detail about the whole region, i.e. data from all thesquares in the virtual grid is communicated and maintained temporally. Also,multiple sensor nodes within close proximity (within the same square in thevirtual grid) may introduce redundancies.

Figure 4.1: A snapshot of mobile sensor network scenario

The proposed spatio-temporal strategy uses a distributed asyn-chronous algorithm to achieve the goal of eliminating the redundancies whilemaintaining a spatial resolution without a need for centralized control. This

22

Page 31: Information Centric Strategies for Scalable Data Transport

model achieves the objective while transferring a minimum number of pack-ets through the underlying network. The methodology, experimental setup,and results are presented in the following sections.

4.2 Methodology

Consider a mobile sensor network spatially distributed over a region withboundaries (xmin, ymin), (xmin, ymax), (xmax, ymin) and (xmax, ymax). Con-sider a mobile sensor node s in this network, the position Ps =(xs,ys) variesaccording to time t as a function D(t) such that the position P is alwaysinside the boundaries. The same is represented using Eq. (4.1).

Ps = D(t) | xmin <= xs <= xmax and ymin <= ys <= ymax (4.1)

Consider a monitoring and surveying application that uses spatiallydistributed mobile wireless sensor network. Once deployed, a sensor node shas knowledge about an environment parameter such as atmosphere humid-ity, water level, wind direction, etc. at its location Ps =(xs,ys). Each sensornode s listens to any transmission from neighbouring nodes before transmit-ting it’s sensor value vt at time t. Further, if all the nodes act synchronously,i.e. all the nodes listen and transmit at the same time the strategy does nothave any effect. Hence, each node waits for a random amount of time tw forsniffing any transmissions from neighboring nodes.

23

Page 32: Information Centric Strategies for Scalable Data Transport

Figure 4.2: A scenario with two sensor node sx and sy.

Consider two sensor nodes sx and sy such that their positions Px

and Py are in communication range tr as illustrated in Figure 4.2; for eachtime interval tr, sensor nodes waits for a time tw = R(0.5 × tr, 0.8 × tr)during which sensor node sx listens to any transmission from other sensornode sy and vice-versa. The waiting time tw is different for sensor nodessx and sy. If either of the nodes listens to other node during the waitingtime tw it doesn’t transmit the information, thereby redundant informationis suppressed between sx and sy. The algorithm at each sensor node s isdescribed below:

24

Page 33: Information Centric Strategies for Scalable Data Transport

Algorithm 5 Distributed algorithm at each sensor node s

1: for each time interval tr do2: Wait for a time tw ← R(0.5× tr, 0.8× tr)3: if no transmission is heard then4: Transmit vt5: end if6: end for

In addition to filtering redundant information, the strategy ensuresthat the sensor nodes only communicate once for the unit of region boundedby communication range tr in a distributed manner. Consider the case rep-resented in Figure 4.2, either sx or sy will transmit the information for everytime tr but not both of them for the unit region. This is true even whenthere are n sensor nodes s1, s2, s3....sn in the region bounded by (xmin, ymin),(xmin, ymax), (xmax, ymin) and (xmax, ymax). In the following section, the ex-perimental setup is detailed.

4.3 Experimental Setup

The proposed strategy is validated using a simulated mobile wireless sensornetwork in Network Simulator 3 (NS-3). The simulation consists of 100mobile nodes spatially distributed in a 5×5 grid such that each unit satisfiesthe Eq. (4.2), similar to the case represented in Figure 4.2.

d (Diagonal of unit cell in grid) = 2× tr (4.2)

The position of the nodes varies with time using a random walkmobility model. The random walk mobility model mimics an erratic move-ment of sensor nodes. The model retains no knowledge of the past positionand speed. Using the model, each mobile sensor node position is determinedby randomly choosing the direction and speed for a constant time interval orafter covering a constant distance. If any sensor node reaches the boundaries,it retracts its position into the bounded region. The simulation is repeatedfor 20 runs with different seeding for each run.

25

Page 34: Information Centric Strategies for Scalable Data Transport

The analysis for the simulation is done using a custom tool writ-ten in Python here at West Virginia University Distributed Systems andNetworking Lab. The analysis is done for five different precision values, i.e.frequency precision = {20 Hz, 10 Hz, 2 Hz, 1 Hz, 0.2 Hz}; frequency precisionis defined as a measure for how often data is required. The experiment isdone with and without implementing distributed algorithm described in Sec-tion 4.2 for all 100 mobile sensor nodes. Finally, the percentage of packetssaved for each frequency precision value is plotted. The results are presentedin the following section.

4.4 Results

The Figure 4.3 shows the percentage of packets saved through the networkfor each frequency precision value using a bar plot for 20 runs. Further, avalue frequency precision = 20 Hz implies that each sensor node transmitsthe data once every 0.05 Seconds.

Figure 4.3: Percentage of Packets Saved vs Frequency Precision

The Figure 4.3 suggests that a median of 77% of the packets sent

26

Page 35: Information Centric Strategies for Scalable Data Transport

through the network can be saved using the strategy for frequency precision =20 Hz and there is almost similar behavior for all frequency precision values.Hence, the percentage of packets saved through the network using the currentstrategy remains same as the frequency precision value decreases, i.e., whentime interval after which each sensor node transmits the data is relaxed.

4.5 Conclusion

The presented model prescribes an asynchronous distributed strategy formobile sensor nodes that maintains spatial resolution over a region whileoptimizing the number of packets sent through the network. Such a strategyeliminates the need for centralized control and agnostic to the mobility model.The algorithm presented has been experimentally validated.

27

Page 36: Information Centric Strategies for Scalable Data Transport

Chapter 5

Proximity-dependent datatransfer strategy to ensuremost updated information inhigh-density regions

5.1 Overview

In the Chapter 2, Chapter 3 and Chapter 4, we have proposed strategiesto optimize the packets transmitted in the network by communicating lessoften or not communicating at all when the current data is not contributingto the overall quality of information. Contrary to the previous strategies,this chapter presents a strategy that aims to communicate more often foreffectively maintaining the quality of information.

We propose an information centric strategy for Vehicular Ad hocNetwork (VANET). Vehicular Ad hoc Network (VANET) are a type of MobileAd hoc Networks (MANETs) that help in establishing a wireless ad-hocnetwork between vehicle to vehicle (V2V) and vehicle to infrastructure (V2I).VANET is an essential component for building Intelligent TransportationSystems (ITS); specially VANET is being investigated for safety applications

28

Page 37: Information Centric Strategies for Scalable Data Transport

such as Cooperative Collision Warning System, Collision Avoidance System,Path Tracking Modules, etc [17] [8] [14] [19].

Such an application requires that each node has the most updatedinformation from the neighboring nodes which can be achieved by com-municating more frequently. Unlike traditional wireless network, VANETcomprises of varied network densities [23] and ensuring the most updatedinformation at high density regions is a challenge. Also, broadcasting theinformation for each interval is an overhead on the network. This strategyproposes a distributed algorithm to achieve the objective.

The idea is to use the proximity of neighboring nodes as a keymetric to dynamically adjust the frequency. This model is inspired fromGPS based Cooperative Collision Warning System developed for IntegratedSensing Systems for Surface Mining Safety project [10]. The module uses802.11 family of radios to establish an ad-hoc network between the haul trucksin surface mines. In the following sections, the methodology, experimentalsetup, and results are presented.

5.2 Methodology

In a Cooperative Collision Warning System consisting of n vehicles {∨0,∨1,∨2.......∨n}moving on a highway, the position of the vehicles vary according to their re-spective velocities {υ0, υ1, υ2.......υn}. Ideally, the vehicles broadcast theirrespective positions, and if the chance for collision is detected between twovehicles, warnings are triggered at each vehicle. This strategy aims to min-imize the number of packets in the network using a distributed algorithmthat runs at each vehicle in the Cooperative Collision Warning System.

Consider two vehicles ∨A and ∨B moving on a highway with respec-tive velocities υA and υB. Each vehicle has the ability to communicate overa range Rc i.e. the packets advertised by a certain vehicle can be heard byanother vehicle when the distance between them is less than the Rc. The ve-hicles are broadcasting periodically once for every time interval tn determinedby frequency fn.

29

Page 38: Information Centric Strategies for Scalable Data Transport

The vehicles are at a safe distance when the distance d between ∨Aand ∨B is greater than the communication range Rc. The same is true forn vehicles on a highway, i.e. it is safe to assume that vehicles are at a safedistance if they cannot hear each other. Hence, the strategy prescribes tocommunicate less often by doubling the time interval tn until thigh (highesttime interval) when there is no transmission heard from neighboring vehicles.

Alternatively, the vehicles are in close proximity when distance dbetween ∨A and ∨B is less than the communication range Rc. The strategyidentifies when a transmission is heard and prescribes to communicate moreoften by halving the time interval tn until tlow (lowest time interval). Further,while the proposed scenarios consist of only two vehicles ∨A and ∨B, thepresented case for the chance of a collision hold true for n vehicles.

By identifying the chance of collision based on the proximity be-tween two vehicles d will enable them to adjust the time interval tn accord-ingly. Further, this adaptive mechanism will enable vehicles to communicatemore often when there are more neighbors, i.e. the high-density regions willhave the most updated information to enable safety critical applications suchas Cooperative Collision Warning System. The distributed algorithm is sum-marized using the Algorithm 6. Further, the parameters tlow and thigh canbe tuned to ensure that the tlow is high enough to avoid broadcast stormsituation.

Algorithm 6 Proximity adaptive algorithm

1: Initialize:Set tlow (lowest time interval), thigh (highest time interval)

2: for each time t do3: if transmission is heard and tn > tlow then4: tn ← tn/25: else6: if tn < thigh then7: tn ← 2× tn8: end if9: end if

10: end for

30

Page 39: Information Centric Strategies for Scalable Data Transport

The proposed strategy is tested using a simulated VANET. Further,the strategy helped in devising a VANET for Integrated Sensing Systems forSurface Mining Safety project. The detailed experimental setup and resultsare presented in the following sections.

5.3 Experimental Setup

The proposed distributed algorithm presented using Algorithm 6 is evaluatedusing a VANET simulated in Network Simulator 3 (NS-3). The simulationconsists of a highway intersection as depicted in Figure 5.1. The vehicles ∨0,∨1, ∨2 and ∨3 depicted in the Figure 5.1 move in four different directions;vehicles move from bottom to top, top to bottom, left to right and right toleft respectively. However, the actual simulation consists of more one vehiclein each direction and an equal number of vehicles moving in each direction.

Figure 5.1: Schematic of a VANET for simulation in Network Simulator 3(NS-3)

31

Page 40: Information Centric Strategies for Scalable Data Transport

A different number of vehicles in tuple {40, 80, 120} are dispatchedfor an interval of 300 seconds over the entire simulation time. For example,from the starting time of the simulation t0 to t0 +300 s, there are 40 vehiclesparticipating in the simulation, i.e., 10 vehicles moving in each direction andso on. The vehicles are initialized at a random position on the road usingrandom rectangle position in NS-3. The nodes are assigned random velocitiesin the range of 25 mph - 70 mph and the position is determined using constantvelocity mobility model in NS-3. The vehicles on each of four lanes start fromone end of the road and travel in their respective direction. Node density iscalculated as the number of vehicles traveling through a unit road segmentarea, and it is equal to the number of vehicles in the simulation.

The impact of variations in node density is observed. Since our fo-cus is to observe the effects on the network for different node density values,we ignore the effects of the collision between vehicles. For each experimentsetting, the simulation is repeated for 20 runs with random seeding. Simi-lar to the previous strategies, a Python based tool is written here at WestVirginia University Distributed Systems and Networking Lab for performingthe analysis. The percentage of packets saved with and without using thestrategy for node density = {40, 80, 120} is analyzed using this tool. Theresults are detailed in the following section.

5.4 Results

For each node density, the percentage of packets saved through the networkwith and without using the strategy is represented using a box plot for all20 runs in Figure 5.2. As it is shown in the Figure 5.2, it is observed thata median value of 67.17% of packets sent through the network saved usingthis strategy for node density = 40. Unlike the strategy presented in theChapter 4, the median value of the percentage of packets saved using thestrategy decreases as node density increases.

32

Page 41: Information Centric Strategies for Scalable Data Transport

Figure 5.2: Percentage of Packets Saved vs Node Density (No. of vehicles inthe simulation)

5.5 Conclusion

A distributed strategy that aims to ensure the most updated information athigh density regions in a VANET is presented. The strategy achieves theobjective while optimizing the number of packets in the network. The Algo-rithm 6 is validated using a simulated VANET. The strategy is observed tosave packets broadcasted in the network for different values of node density.

33

Page 42: Information Centric Strategies for Scalable Data Transport

Chapter 6

Conclusion and Future Work

6.1 Contributions

In this thesis, we have proposed four different information centric strategiesfor Cyber-Physical System(s). Although each strategy addresses a differentchallenge, they all share one common goal, i.e. optimizing the traffic with-out significant modifications to the underlying infrastructure. Further, thestrategies are inspired by the challenges encountered while designing differ-ent systems here at West Virginia University Distributed Computing andNetworking Lab. We list the proposed strategies below.

1. First, we propose a linear estimator based strategy for a generic net-worked sensing system. Using Eq. (3.1), the sensor value is estimatedat sensor model ms and data is only transmitted if the value is greaterthat certain threshold; otherwise, the controller model mc uses esti-mated value as current sensor value. The strategy is validated usinga simulated sensor network using data from weather boards deployedat Intel Berkeley Research Lab. We have observed that the number ofpackets sent through the network reduced by at least 40% calculated asa median over 54 sensors. Further, we have observed that the model in-troduces more error in the sensor value using the strategy under packetloss. Such a generic optimization can be coupled with other strategies

34

Page 43: Information Centric Strategies for Scalable Data Transport

for better results.

2. Second, a data optimization strategy is proposed to address the chal-lenges encountered while designing MapMyTruck as part of IntegratedSensing Systems for Surface Mine Safety Project. We propose an algo-rithm for sensor model ms that identifies the sensor state Ψt and adjuststhe current frequency fcurrent based on a set of rules R. The strategyis experimentally validated and observed to save at least 60% of thepackets sent through the network. Further, we have implemented theMapMyTruck application for haul trucks in Red Hills Mine in Acker-man, Mississippi and observed to save about 86.1% of data on a normalworking day.

3. Third, for spatially distributed mobile sensor nodes, we have proposeda strategy to ensure a spatial resolution over a region while transmittinga minimum number of packets using a distributed algorithm presentedusing Algorithm 5. The proposed strategy is experimentally validatedusing a simulated mobile wireless sensor network in Network Simulator3 (NS-3). We have seen that a median of 77% of packets can be savedusing the strategy. Further, the strategy works very well when the datais needed more frequently.

4. Fourth, a distributed strategy for vehicles participating in a VehicularAd hoc Network (VANET) is proposed. Although we did not evaluatethe strategy in the real world like MapMyTruck, it is designed for a GPSbased Cooperative Collision Warning System developed for IntegratedSensing Systems for Surface Mining Safety project. We use the proxim-ity of the vehicles to dynamically adjust the communication interval tn.The strategy is found to save a median value of 67.17% of the packetswhen validated using a simulated VANET for node density = 40 inNetwork Simulator 3 (NS-3).

Overall, the proposed strategies found to reduce the traffic in thenetwork and there by reducing the packet collisions in the network. Specif-ically, applications like MapMyTruck have found to reduce the operationaland carrier costs. We summarized the directions for future work in the fol-lowing section.

35

Page 44: Information Centric Strategies for Scalable Data Transport

6.2 Future Work

Cyber-Physical System(s) encompasses complex processes with communica-tion at the core. A synergy between robust infrastructure and applicationstrategies is very much needed to build such complex ecosystem(s). We ac-knowledge the fact that there are a great number of ecosystems each withdifferent subsystems, components, and priorities; not all of them have beenaddressed in this thesis. With the proposed strategies, we would like to eval-uate the performance when multiple strategies are combined. For example,generic strategy presented in Chapter 2 can be coupled with any of the otherthree strategies presented in Chapter 3, Chapter 4 and Chapter 5.

The strategy presented in Chapter 3 is evaluated using MapMyTruckin real world scenario, and we would like to implement other three strate-gies and observe the performance. Also, the strategies can be experimentallyvalidated for larger simulation environments with more processes and sensornodes. Further, we have observed satisfactory results using a linear model inChapter 2 and we would like to investigate the performance of more complexmachine learning techniques for information centric strategies.

36

Page 45: Information Centric Strategies for Scalable Data Transport

References

[1] M. Mehdi Afsar and Mohammad-H. Tayarani-N. Clustering in sensornetworks: A literature survey. Journal of Network and Computer Ap-plications, 46:198 – 226, 2014.

[2] August Betzler, Carles Gomez, Ilker Demirkol, and Josep Paradells.Cocoa+: An advanced congestion control mechanism for coap. Ad HocNetworks, 33:126 – 139, 2015.

[3] G. Carofiglio, G. Morabito, L. Muscariello, I. Solis, and M. Varvello.From content delivery today to information centric networking. Com-puter Networks, 57(16):3116 – 3127, 2013. Information Centric Network-ing.

[4] Chih-Yung Chang, Jang-Ping Sheu, Sheng-Wen Chang, and Yu-ChiehChen. A frequency-aware data-centric mechanism for wireless sensornetworks. Wirel. Commun. Mob. Comput., 10(8):1078–1101, August2010.

[5] Jiann-Liang Chen, Han-Chuan Hsieh, and Y. T. Larosa. Congestioncontrol optimization of m2m in lte networks. In Advanced Communica-tion Technology (ICACT), 2013 15th International Conference on, pages823–827, Jan 2013.

[6] Grit Denker, Nikil Dutt, Sharad Mehrotra, Mark-Oliver Stehr, CarolynTalcott, and Nalini Venkatasubramanian. Resilient dependable cyber-physical systems: a middleware perspective. Journal of Internet Servicesand Applications, 3(1):41–49, 2012.

37

Page 46: Information Centric Strategies for Scalable Data Transport

[7] Truong-Xuan Do and Younghan Kim. Information-centric wireless sen-sor and actor network in the industrial network. In 2013 InternationalConference on ICT Convergence (ICTC), pages 1095–1096, Oct 2013.

[8] Tamer ElBatt, Siddhartha K. Goel, Gavin Holland, Hariharan Krish-nan, and Jayendra Parikh. Cooperative collision warning using dedi-cated short range wireless communications. In Proceedings of the 3rdInternational Workshop on Vehicular Ad Hoc Networks, VANET ’06,pages 1–9, New York, NY, USA, 2006. ACM.

[9] Bronwyn Flores. The expanding reach of iot. Dealerscope, 57(11):8–9, 09 2015. Copyright - Copyright North American Publishing Com-pany d/b/a NAPCO Media Sep 2015; Document feature - Photographs;Graphs; Tables; Last updated - 2015-10-10; SubjectsTermNotLitGenre-Text - United States–US.

[10] Ajay Kavuri, Bisleshana Prakash, VenkataraghavasivanagashashankSabniveesu, Ashish Nimbarte, Vinod Kulathumani, and Vladislav Keco-jevic. An adaptive, run-time navigation system for haul trucks in surfacemines. International Journal of Mining, Reclamation and Environment,0(0):1–11, 0.

[11] Ajay Kavuri, Bisleshana Prakash, VenkataraghavasivanagashashankSabniveesu, Ashish Nimbarte, Vinod Kulathumani, and Vladislav Keco-jevic. An adaptive, run-time navigation system for haul trucks in surfacemines. International Journal of Mining, Reclamation and Environment,pages 1–11, 2016.

[12] Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolin-skiy, Kye Hyun Kim, Scott Shenker, and Ion Stoica. A data-oriented(and beyond) network architecture. SIGCOMM Comput. Commun.Rev., 37(4):181–192, August 2007.

[13] Intel Berkeley Research lab. Intel Lab Data. http://db.csail.mit.

edu/labdata/labdata.html. [Online; accessed 29-October-2016].

[14] Robert Lasowski and Florian Gschwandtner. A novel beaconing ap-proach based on sender-centric movement predictions for collision avoid-ance in vanets. In Proceedings of the Eighth ACM International Work-shop on Vehicular Inter-networking, VANET ’11, pages 81–82, NewYork, NY, USA, 2011. ACM.

38

Page 47: Information Centric Strategies for Scalable Data Transport

[15] Yang Liu, Zhikui Chen, Xiaoning Lv, and Feng Han. Multiple layerdesign for mass data transmission against channel congestion in iot. In-ternational Journal of Communication Systems, 27(8):1126–1146, 2014.

[16] Haining Mo, Neeti Sharad Wagle, and Michael Zuba. Cyber-physicalsystems. XRDS, 20(3):8–9, March 2014.

[17] Rola Naja. Wireless Vehicular Networks for Car Collision Avoidance.Springer Publishing Company, Incorporated, 2013.

[18] Robert R. Schaller. Moore’s law: Past, present, and future. IEEESpectr., 34(6):52–59, June 1997.

[19] Zeeshan Shafiq, Latif Ullah Khan, Sahibzada Ali Mahmud, andGul Muhammad Khan. Context-aware cooperative collision avoidancevehicle braking alert system for vanet. In Proceedings of the 3rd Inter-national Conference on Context-Aware Systems and Applications, IC-CASA ’14, pages 92–96, ICST, Brussels, Belgium, Belgium, 2014. ICST(Institute for Computer Sciences, Social-Informatics and Telecommuni-cations Engineering).

[20] I. Stojmenovic. Machine-to-machine communications with in-networkdata aggregation, processing, and actuation for large-scale cyber-physical systems. IEEE Internet of Things Journal, 1(2):122–128, April2014.

[21] Chun-Wei Tsai, Chin-Feng Lai, and Athanasios V. Vasilakos. Futureinternet of things: open issues and challenges. Wireless Networks,20(8):2201–2217, 2014.

[22] Sabniveesu Venkataraghavasivanagashashank, Kavuri Ajay, Kavi Rahul,Kulathumani Vinod, Kecojevic Vladislav, and Nimbarte Ashish. Use ofwireless, ad-hoc networks for proximity warning and collision avoidancein surface mines. International Journal of Mining, Reclamation andEnvironment, 29(5):331–346, 2015.

[23] N. Wisitpongphan, F. Bai, P. Mudalige, V. Sadekar, and O. Tonguz.Routing in sparse vehicular ad hoc wireless networks. IEEE Journal onSelected Areas in Communications, 25(8):1538–1556, Oct 2007.

39

Page 48: Information Centric Strategies for Scalable Data Transport

[24] Dunfan Ye, Daoli Gong, and Wei Wang. Application of wireless sen-sor networks in environmental monitoring. In 2009 2nd InternationalConference on Power Electronics and Intelligent Transportation System(PEITS), volume 1, pages 205–208, Dec 2009.

40