Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
Search Results
Item TReB: Task dependency aware-Resource allocation for Internet of Things using Binary offloading(Elsevier B.V., 2025) Soni, P.; Hajare, A.G.; Keerthan Kumar, K.K.; Addya, S.K.The rapid growth of Internet of Things (IoT) applications in domains such as healthcare, smart homes, and autonomous vehicles has led to an exponential increase in data generated by compute intensive tasks. Efficiently offloading these tasks to nearby computational resources in fog environments remains a significant challenge due to the inherent heterogeneity and constrained resources of Fog Nodes (FNs). Most of the existing approaches fail to address the trade-offs between latency, energy, and resource utilization, particularly when managing dependent and independent task workloads. Moreover, establishing an offloading strategy within a densely interconnected IoT network is known to be NP-hard. To overcome these limitations, in this work, we propose a Task dependency-Aware Resource allocation for IoT using Binary offloading (TReB) framework by considering both independent and dependent tasks of IoT applications. The TReB utilizes the Analytic Hierarchy Process (AHP) technique to generate the preferences of FNs and tasks by considering diverse attributes. With preferences established, a binary offloading is handled through a one-to-many matching procedure, utilizing a Deferred Acceptance Algorithm (DAA). It allows TReB to jointly minimize system energy consumption, latency, and the number of outages in an IoT network. We evaluated the effectiveness of TReB through simulation experiments, and results show that the proposed approach achieves a 49.1%, 62.4%, and 41.7% minimization in overall system latency, energy, and outages compared to the existing baselines. © 2025 Elsevier B.V.Item SEDViN: Secure embedding for dynamic virtual network requests using a multi-attribute matching game(Academic Press Inc., 2025) Kumar, T.G.K.; Kumar, R.; Achal, A.M.; Satpathy, A.; Addya, S.K.Network virtualization (NV) has gained significant attention as it allows service providers (SP) to share substrate network (SN) resources. It is achieved by partitioning them into isolated virtual network requests (VNRs) comprising interrelated virtual machines (VMs) and virtual links (VLs). Although NV provides various advantages, such as service separation, enhanced quality-of-service, reliability, and improved SN utilization, it also presents multiple scientific challenges. In this context, one pivotal challenge encountered by the researchers is secure virtual network embedding (SVNE). The SVNE encompasses assigning SN resources to components of VNR, i.e., VMs and VLs, adhering to the security demands, which is a computationally intractable problem, as it is proven to be NP-Hard. In this context, maximizing the acceptance and revenue-to-cost ratios remains of utmost priority for SPs as it not only increases the revenue but also effectively utilizes the large pool of SN resources. Though VNE is a well-researched problem, the existing literature has the following flaws: (i.) security features of VMs and VLs are ignored, (ii.) limited consideration of topological attributes, and (iii.) restricted to static VNRs. However, SPs need to develop an embedding framework that overcomes the abovementioned pitfalls. Therefore, this work proposes a framework Secure Embedding for Dynamic Virtual Network requests using a multi-attribute matching game (SEDViN). In SedViN, the deferred acceptance algorithm (DAA) based matching game is used for effective embedding. SEDViN operates primarily in two steps to obtain a secure embedding of dynamic VNRs. Firstly, it generates a unified ranking for VMs and servers using a combination of entropy and a technique for order of preference by similarity to the ideal solution (TOPSIS), considering network, security, and system attributes. Taking these as inputs, in the second step, VNR embedding is conducted using the deferred acceptance approach based on a one-to-many matching strategy for VM embedding and VL embedding using the shortest path algorithm. The performance of SEDViN is evaluated through simulations and compared against different baseline approaches. The simulation outcomes exhibit that SEDViN surpasses the baselines with a gain of 56% in the acceptance and 44% in the revenue-to-cost ratios. © 2025 Elsevier Inc.
