Resource management for on-demand mission-critical Internet of Things applications:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
2021
|
Schriftenreihe: | IEEE Press series
|
Online-Zugang: | FAN01 FHI01 FWS01 FWS02 |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (xvi,208 Seiten) Illustrationen |
ISBN: | 9781119716112 9781119716105 9781119716129 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV048228599 | ||
003 | DE-604 | ||
005 | 20230202 | ||
007 | cr|uuu---uuuuu | ||
008 | 220517s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781119716112 |c Online |9 978-1-119-71611-2 | ||
020 | |a 9781119716105 |9 978-1-119-71610-5 | ||
020 | |a 9781119716129 |9 9781119716129 | ||
035 | |a (ZDB-30-PQE)EBC6710136 | ||
035 | |a (ZDB-30-PAD)EBC6710136 | ||
035 | |a (ZDB-89-EBL)EBL6710136 | ||
035 | |a (OCoLC)1265464850 | ||
035 | |a (DE-599)BVBBV048228599 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1102 |a DE-863 |a DE-862 |a DE-573 | ||
082 | 0 | |a 004.678 | |
100 | 1 | |a Farooq, Junaid |e Verfasser |4 aut | |
245 | 1 | 0 | |a Resource management for on-demand mission-critical Internet of Things applications |c Junaid Farooq, Quanyan Zhu |
264 | 1 | |a Hoboken, NJ |b Wiley |c 2021 | |
264 | 4 | |c ©2021 | |
300 | |a 1 Online-Ressource (xvi,208 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IEEE Press series | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Cover -- Title Page -- Copyright -- Contents -- Preface -- Acknowledgments -- Acronyms -- Part I Introduction -- Chapter 1 Internet of Things‐Enabled Systems and Infrastructure -- 1.1 Cyber-Physical Realm of IoT -- 1.2 IoT in Mission‐Critical Applications -- 1.3 Overview of the Book -- 1.3.1 Main Topics -- 1.3.1.1 Dynamic Reservation of Wireless Spectrum Resources -- 1.3.1.2 Dynamic Cross‐Layer Connectivity Using Aerial Networks -- 1.3.1.3 Dynamic Processes Over Multiplex Spatial Networks and Reconfigurable Design -- 1.3.1.4 Sequential Resource Allocation Under Spatio‐Temporal Uncertainties -- 1.3.2 Notations -- Chapter 2 Resource Management in IoT‐Enabled Interdependent Infrastructure -- 2.1 System Complexity and Scale -- 2.2 Network Geometry and Dynamics -- 2.3 On‐Demand MC‐IoT Services and Decision Avenues -- 2.4 Performance Metrics -- 2.5 Overview of Scientific Methodologies -- Part II Design Challenges in MC‐IoT -- Chapter 3 Wireless Connectivity Challenges -- 3.1 Spectrum Scarcity and Reservation Based Access -- 3.2 Connectivity in Remote Environments -- 3.3 IoT Networks in Adversarial Environments -- Chapter 4 Resource and Service Provisioning Challenges -- 4.1 Efficient Allocation of Cloud Computing Resources -- 4.2 Dynamic Pricing in the Cloud -- 4.3 Spatio‐Temporal Urban Service Provisioning -- Part III Wireless Connectivity Mechanisms for MC‐IoT -- Chapter 5 Reservation‐Based Spectrum Access Contracts -- 5.1 Reservation of Time-Frequency Blocks in the Spectrum -- 5.1.1 Network Model -- 5.1.2 Utility of Spectrum Reservation -- 5.2 Dynamic Contract Formulation -- 5.2.1 Objective of Network Operator -- 5.2.2 Spectrum Reservation Contract -- 5.2.2.1 Operator Profitability -- 5.2.2.2 IC and IR Constraints -- 5.2.3 Optimal Contracting Problem -- 5.2.4 Solution to the Optimization Problem -- 5.3 Mission‐Oriented Pricing and Refund Policies | |
505 | 8 | |a 5.4 Summary and Conclusion -- Chapter 6 Resilient Connectivity of IoT Using Aerial Networks -- 6.1 Connectivity in the Absence of Backhaul Networks -- 6.2 Aerial Base Station Modeling -- 6.3 Dynamic Coverage and Connectivity Mechanism -- 6.3.1 MAP-MSD Matching -- 6.3.2 MAP Dynamics and Objective -- 6.3.3 Controller Design -- 6.3.3.1 Attractive and Repulsive Function -- 6.3.3.2 Velocity Consensus Function -- 6.3.4 Individual Goal Function -- 6.3.5 Cluster Centers -- 6.4 Performance Evaluation and Simulation Results -- 6.4.1 Results and Discussion -- 6.4.1.1 Simulation Parameters -- 6.4.1.2 Resilience -- 6.4.1.3 Comparison -- 6.5 Summary and Conclusion -- Part IV Secure Network Design Mechanisms -- Chapter 7 Wireless IoT Network Design in Adversarial Environments -- 7.1 Adversarial Network Scenarios -- 7.2 Modeling Device Capabilities and Network Heterogeneity -- 7.2.1 Network Geometry -- 7.2.2 Network Connectivity -- 7.2.2.1 Intra‐layer Connectivity -- 7.2.2.2 Network‐wide Connectivity -- 7.3 Information Dissemination Under Attacks -- 7.3.1 Information Dynamics -- 7.3.1.1 Single Message Propagation -- 7.3.1.2 Multiple Message Propagation -- 7.3.2 Steady State Analysis -- 7.4 Mission‐Specific Network Optimization -- 7.4.1 Equilibrium Solution -- 7.4.2 Secure and Reconfigurable Network Design -- 7.5 Simulation Results and Validation -- 7.5.1 Mission Scenarios -- 7.5.1.1 Intelligence -- 7.5.1.2 Encounter Battle -- 7.6 Summary and Conclusion -- Chapter 8 Network Defense Mechanisms Against Malware Infiltration -- 8.1 Malware Infiltration and Botnets -- 8.1.1 Network Model -- 8.1.2 Threat Model -- 8.2 Propagation Modeling and Analysis -- 8.2.1 Modeling of Malware and Information Evolution -- 8.2.2 State Space Representation and Dynamics -- 8.2.3 Analysis of Equilibrium State -- 8.3 Patching Mechanism for Network Defense -- 8.3.1 Simulation Results | |
505 | 8 | |a 8.3.2 Simulation and Validation -- 8.4 Summary and Conclusion -- Part V Resource Provisioning Mechanisms -- Chapter 9 Revenue Maximizing Cloud Resource Allocation -- 9.1 Cloud Service Provider Resource Allocation Problem -- 9.2 Allocation and Pricing Rule -- 9.3 Dynamic Revenue Maximization -- 9.3.1 Adaptive and Resilient Allocation and Pricing Policy -- 9.4 Numerical Results and Discussions -- 9.5 Summary and Conclusion -- Chapter 10 Dynamic Pricing of Fog‐Enabled MC‐IoT Applications -- 10.1 Edge Computing and Delay Modeling -- 10.2 Allocation Efficiency and Quality of Experience -- 10.2.1 Allocation Policy -- 10.2.2 Pricing Policy -- 10.3 Optimal Allocation and Pricing Rules -- 10.3.1 Single VMI Case -- 10.3.2 Multiple VMI Case -- 10.3.3 Expected Revenue -- 10.3.4 Implementation of Dynamic VMI Allocation and Pricing -- 10.4 Numerical Experiments and Discussion -- 10.4.1 Experiment Setup -- 10.4.2 Simulation Results -- 10.4.3 Comparison with Other Approaches -- 10.5 Summary and Conclusion -- Chapter 11 Resource Provisioning to Spatio‐Temporal Urban Services -- 11.1 Spatio‐Temporal Modeling of Urban Service Requests -- 11.1.1 Characterization of Service Requests -- 11.1.2 Utility of Resource Allocation -- 11.1.3 Problem Definition -- 11.2 Optimal Dynamic Allocation Mechanism -- 11.2.1 Dynamic Programming Solution -- 11.2.2 Computation and Implementation -- 11.3 Numerical Results and Discussion -- 11.3.1 Special Cases -- 11.3.1.1 Power Law Utility -- 11.3.1.2 Exponential Utility -- 11.3.2 Performance Evaluation and Comparison -- 11.4 Summary and Conclusions -- Part VI Conclusion -- Chapter 12 Challenges and Opportunities in the IoT Space -- 12.1 Broader Insights and Future Directions -- 12.1.1 Distributed Cross‐Layer Intelligence for Mission‐Critical IoT Services -- 12.1.1.1 Secure and Resilient Networking for Massive IoT Networks | |
505 | 8 | |a 12.1.1.2 Autonomic Networked CPS: From Military to Civilian Applications -- 12.1.1.3 Strategic Resource Provisioning for Mission‐Critical IoT Services -- 12.2 Future Research Directions -- 12.2.1 Distributed Learning and Data Fusion for Security and Resilience in IoT‐Driven Urban Applications -- 12.2.1.1 Data‐Driven Learning and Decision‐Making for Smart City Service Provisioning -- 12.2.1.2 Market Design for On‐Demand and Managed IoT‐Enabled Urban Services -- 12.2.1.3 Proactive Resiliency Planning and Learning for Disaster Management in Cities -- 12.2.2 Supply Chain Security and Resilience of IoT -- 12.3 Concluding Remarks -- Bibliography -- Index -- EULA. | |
700 | 1 | |a Zhu, Quanyan |e Verfasser |0 (DE-588)1012966704 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-119-71609-9 |a Farooq, Junaid |t Resource Management for on-Demand Mission-Critical Internet of Things Applications |d Newark : John Wiley & Sons, Incorporated,c2021 |
912 | |a ZDB-30-PQE |a ZDB-35-WIC |a ZDB-35-WEL | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033609319 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119716112 |l FAN01 |p ZDB-35-WIC |q FAN_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/servlet/opac?bknumber=9536218 |l FHI01 |p ZDB-35-WEL |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119716112 |l FWS01 |p ZDB-35-WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119716112 |l FWS02 |p ZDB-35-WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1028256 |
---|---|
_version_ | 1824553667546578945 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Farooq, Junaid Zhu, Quanyan |
author_GND | (DE-588)1012966704 |
author_facet | Farooq, Junaid Zhu, Quanyan |
author_role | aut aut |
author_sort | Farooq, Junaid |
author_variant | j f jf q z qz |
building | Verbundindex |
bvnumber | BV048228599 |
collection | ZDB-30-PQE ZDB-35-WIC ZDB-35-WEL |
contents | Cover -- Title Page -- Copyright -- Contents -- Preface -- Acknowledgments -- Acronyms -- Part I Introduction -- Chapter 1 Internet of Things‐Enabled Systems and Infrastructure -- 1.1 Cyber-Physical Realm of IoT -- 1.2 IoT in Mission‐Critical Applications -- 1.3 Overview of the Book -- 1.3.1 Main Topics -- 1.3.1.1 Dynamic Reservation of Wireless Spectrum Resources -- 1.3.1.2 Dynamic Cross‐Layer Connectivity Using Aerial Networks -- 1.3.1.3 Dynamic Processes Over Multiplex Spatial Networks and Reconfigurable Design -- 1.3.1.4 Sequential Resource Allocation Under Spatio‐Temporal Uncertainties -- 1.3.2 Notations -- Chapter 2 Resource Management in IoT‐Enabled Interdependent Infrastructure -- 2.1 System Complexity and Scale -- 2.2 Network Geometry and Dynamics -- 2.3 On‐Demand MC‐IoT Services and Decision Avenues -- 2.4 Performance Metrics -- 2.5 Overview of Scientific Methodologies -- Part II Design Challenges in MC‐IoT -- Chapter 3 Wireless Connectivity Challenges -- 3.1 Spectrum Scarcity and Reservation Based Access -- 3.2 Connectivity in Remote Environments -- 3.3 IoT Networks in Adversarial Environments -- Chapter 4 Resource and Service Provisioning Challenges -- 4.1 Efficient Allocation of Cloud Computing Resources -- 4.2 Dynamic Pricing in the Cloud -- 4.3 Spatio‐Temporal Urban Service Provisioning -- Part III Wireless Connectivity Mechanisms for MC‐IoT -- Chapter 5 Reservation‐Based Spectrum Access Contracts -- 5.1 Reservation of Time-Frequency Blocks in the Spectrum -- 5.1.1 Network Model -- 5.1.2 Utility of Spectrum Reservation -- 5.2 Dynamic Contract Formulation -- 5.2.1 Objective of Network Operator -- 5.2.2 Spectrum Reservation Contract -- 5.2.2.1 Operator Profitability -- 5.2.2.2 IC and IR Constraints -- 5.2.3 Optimal Contracting Problem -- 5.2.4 Solution to the Optimization Problem -- 5.3 Mission‐Oriented Pricing and Refund Policies 5.4 Summary and Conclusion -- Chapter 6 Resilient Connectivity of IoT Using Aerial Networks -- 6.1 Connectivity in the Absence of Backhaul Networks -- 6.2 Aerial Base Station Modeling -- 6.3 Dynamic Coverage and Connectivity Mechanism -- 6.3.1 MAP-MSD Matching -- 6.3.2 MAP Dynamics and Objective -- 6.3.3 Controller Design -- 6.3.3.1 Attractive and Repulsive Function -- 6.3.3.2 Velocity Consensus Function -- 6.3.4 Individual Goal Function -- 6.3.5 Cluster Centers -- 6.4 Performance Evaluation and Simulation Results -- 6.4.1 Results and Discussion -- 6.4.1.1 Simulation Parameters -- 6.4.1.2 Resilience -- 6.4.1.3 Comparison -- 6.5 Summary and Conclusion -- Part IV Secure Network Design Mechanisms -- Chapter 7 Wireless IoT Network Design in Adversarial Environments -- 7.1 Adversarial Network Scenarios -- 7.2 Modeling Device Capabilities and Network Heterogeneity -- 7.2.1 Network Geometry -- 7.2.2 Network Connectivity -- 7.2.2.1 Intra‐layer Connectivity -- 7.2.2.2 Network‐wide Connectivity -- 7.3 Information Dissemination Under Attacks -- 7.3.1 Information Dynamics -- 7.3.1.1 Single Message Propagation -- 7.3.1.2 Multiple Message Propagation -- 7.3.2 Steady State Analysis -- 7.4 Mission‐Specific Network Optimization -- 7.4.1 Equilibrium Solution -- 7.4.2 Secure and Reconfigurable Network Design -- 7.5 Simulation Results and Validation -- 7.5.1 Mission Scenarios -- 7.5.1.1 Intelligence -- 7.5.1.2 Encounter Battle -- 7.6 Summary and Conclusion -- Chapter 8 Network Defense Mechanisms Against Malware Infiltration -- 8.1 Malware Infiltration and Botnets -- 8.1.1 Network Model -- 8.1.2 Threat Model -- 8.2 Propagation Modeling and Analysis -- 8.2.1 Modeling of Malware and Information Evolution -- 8.2.2 State Space Representation and Dynamics -- 8.2.3 Analysis of Equilibrium State -- 8.3 Patching Mechanism for Network Defense -- 8.3.1 Simulation Results 8.3.2 Simulation and Validation -- 8.4 Summary and Conclusion -- Part V Resource Provisioning Mechanisms -- Chapter 9 Revenue Maximizing Cloud Resource Allocation -- 9.1 Cloud Service Provider Resource Allocation Problem -- 9.2 Allocation and Pricing Rule -- 9.3 Dynamic Revenue Maximization -- 9.3.1 Adaptive and Resilient Allocation and Pricing Policy -- 9.4 Numerical Results and Discussions -- 9.5 Summary and Conclusion -- Chapter 10 Dynamic Pricing of Fog‐Enabled MC‐IoT Applications -- 10.1 Edge Computing and Delay Modeling -- 10.2 Allocation Efficiency and Quality of Experience -- 10.2.1 Allocation Policy -- 10.2.2 Pricing Policy -- 10.3 Optimal Allocation and Pricing Rules -- 10.3.1 Single VMI Case -- 10.3.2 Multiple VMI Case -- 10.3.3 Expected Revenue -- 10.3.4 Implementation of Dynamic VMI Allocation and Pricing -- 10.4 Numerical Experiments and Discussion -- 10.4.1 Experiment Setup -- 10.4.2 Simulation Results -- 10.4.3 Comparison with Other Approaches -- 10.5 Summary and Conclusion -- Chapter 11 Resource Provisioning to Spatio‐Temporal Urban Services -- 11.1 Spatio‐Temporal Modeling of Urban Service Requests -- 11.1.1 Characterization of Service Requests -- 11.1.2 Utility of Resource Allocation -- 11.1.3 Problem Definition -- 11.2 Optimal Dynamic Allocation Mechanism -- 11.2.1 Dynamic Programming Solution -- 11.2.2 Computation and Implementation -- 11.3 Numerical Results and Discussion -- 11.3.1 Special Cases -- 11.3.1.1 Power Law Utility -- 11.3.1.2 Exponential Utility -- 11.3.2 Performance Evaluation and Comparison -- 11.4 Summary and Conclusions -- Part VI Conclusion -- Chapter 12 Challenges and Opportunities in the IoT Space -- 12.1 Broader Insights and Future Directions -- 12.1.1 Distributed Cross‐Layer Intelligence for Mission‐Critical IoT Services -- 12.1.1.1 Secure and Resilient Networking for Massive IoT Networks 12.1.1.2 Autonomic Networked CPS: From Military to Civilian Applications -- 12.1.1.3 Strategic Resource Provisioning for Mission‐Critical IoT Services -- 12.2 Future Research Directions -- 12.2.1 Distributed Learning and Data Fusion for Security and Resilience in IoT‐Driven Urban Applications -- 12.2.1.1 Data‐Driven Learning and Decision‐Making for Smart City Service Provisioning -- 12.2.1.2 Market Design for On‐Demand and Managed IoT‐Enabled Urban Services -- 12.2.1.3 Proactive Resiliency Planning and Learning for Disaster Management in Cities -- 12.2.2 Supply Chain Security and Resilience of IoT -- 12.3 Concluding Remarks -- Bibliography -- Index -- EULA. |
ctrlnum | (ZDB-30-PQE)EBC6710136 (ZDB-30-PAD)EBC6710136 (ZDB-89-EBL)EBL6710136 (OCoLC)1265464850 (DE-599)BVBBV048228599 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08416nmm a2200493zc 4500</leader><controlfield tag="001">BV048228599</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230202 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220517s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119716112</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-119-71611-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119716105</subfield><subfield code="9">978-1-119-71610-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119716129</subfield><subfield code="9">9781119716129</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6710136</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6710136</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6710136</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1265464850</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048228599</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1102</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.678</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Farooq, Junaid</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Resource management for on-demand mission-critical Internet of Things applications</subfield><subfield code="c">Junaid Farooq, Quanyan Zhu</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi,208 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IEEE Press series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright -- Contents -- Preface -- Acknowledgments -- Acronyms -- Part I Introduction -- Chapter 1 Internet of Things‐Enabled Systems and Infrastructure -- 1.1 Cyber-Physical Realm of IoT -- 1.2 IoT in Mission‐Critical Applications -- 1.3 Overview of the Book -- 1.3.1 Main Topics -- 1.3.1.1 Dynamic Reservation of Wireless Spectrum Resources -- 1.3.1.2 Dynamic Cross‐Layer Connectivity Using Aerial Networks -- 1.3.1.3 Dynamic Processes Over Multiplex Spatial Networks and Reconfigurable Design -- 1.3.1.4 Sequential Resource Allocation Under Spatio‐Temporal Uncertainties -- 1.3.2 Notations -- Chapter 2 Resource Management in IoT‐Enabled Interdependent Infrastructure -- 2.1 System Complexity and Scale -- 2.2 Network Geometry and Dynamics -- 2.3 On‐Demand MC‐IoT Services and Decision Avenues -- 2.4 Performance Metrics -- 2.5 Overview of Scientific Methodologies -- Part II Design Challenges in MC‐IoT -- Chapter 3 Wireless Connectivity Challenges -- 3.1 Spectrum Scarcity and Reservation Based Access -- 3.2 Connectivity in Remote Environments -- 3.3 IoT Networks in Adversarial Environments -- Chapter 4 Resource and Service Provisioning Challenges -- 4.1 Efficient Allocation of Cloud Computing Resources -- 4.2 Dynamic Pricing in the Cloud -- 4.3 Spatio‐Temporal Urban Service Provisioning -- Part III Wireless Connectivity Mechanisms for MC‐IoT -- Chapter 5 Reservation‐Based Spectrum Access Contracts -- 5.1 Reservation of Time-Frequency Blocks in the Spectrum -- 5.1.1 Network Model -- 5.1.2 Utility of Spectrum Reservation -- 5.2 Dynamic Contract Formulation -- 5.2.1 Objective of Network Operator -- 5.2.2 Spectrum Reservation Contract -- 5.2.2.1 Operator Profitability -- 5.2.2.2 IC and IR Constraints -- 5.2.3 Optimal Contracting Problem -- 5.2.4 Solution to the Optimization Problem -- 5.3 Mission‐Oriented Pricing and Refund Policies</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.4 Summary and Conclusion -- Chapter 6 Resilient Connectivity of IoT Using Aerial Networks -- 6.1 Connectivity in the Absence of Backhaul Networks -- 6.2 Aerial Base Station Modeling -- 6.3 Dynamic Coverage and Connectivity Mechanism -- 6.3.1 MAP-MSD Matching -- 6.3.2 MAP Dynamics and Objective -- 6.3.3 Controller Design -- 6.3.3.1 Attractive and Repulsive Function -- 6.3.3.2 Velocity Consensus Function -- 6.3.4 Individual Goal Function -- 6.3.5 Cluster Centers -- 6.4 Performance Evaluation and Simulation Results -- 6.4.1 Results and Discussion -- 6.4.1.1 Simulation Parameters -- 6.4.1.2 Resilience -- 6.4.1.3 Comparison -- 6.5 Summary and Conclusion -- Part IV Secure Network Design Mechanisms -- Chapter 7 Wireless IoT Network Design in Adversarial Environments -- 7.1 Adversarial Network Scenarios -- 7.2 Modeling Device Capabilities and Network Heterogeneity -- 7.2.1 Network Geometry -- 7.2.2 Network Connectivity -- 7.2.2.1 Intra‐layer Connectivity -- 7.2.2.2 Network‐wide Connectivity -- 7.3 Information Dissemination Under Attacks -- 7.3.1 Information Dynamics -- 7.3.1.1 Single Message Propagation -- 7.3.1.2 Multiple Message Propagation -- 7.3.2 Steady State Analysis -- 7.4 Mission‐Specific Network Optimization -- 7.4.1 Equilibrium Solution -- 7.4.2 Secure and Reconfigurable Network Design -- 7.5 Simulation Results and Validation -- 7.5.1 Mission Scenarios -- 7.5.1.1 Intelligence -- 7.5.1.2 Encounter Battle -- 7.6 Summary and Conclusion -- Chapter 8 Network Defense Mechanisms Against Malware Infiltration -- 8.1 Malware Infiltration and Botnets -- 8.1.1 Network Model -- 8.1.2 Threat Model -- 8.2 Propagation Modeling and Analysis -- 8.2.1 Modeling of Malware and Information Evolution -- 8.2.2 State Space Representation and Dynamics -- 8.2.3 Analysis of Equilibrium State -- 8.3 Patching Mechanism for Network Defense -- 8.3.1 Simulation Results</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">8.3.2 Simulation and Validation -- 8.4 Summary and Conclusion -- Part V Resource Provisioning Mechanisms -- Chapter 9 Revenue Maximizing Cloud Resource Allocation -- 9.1 Cloud Service Provider Resource Allocation Problem -- 9.2 Allocation and Pricing Rule -- 9.3 Dynamic Revenue Maximization -- 9.3.1 Adaptive and Resilient Allocation and Pricing Policy -- 9.4 Numerical Results and Discussions -- 9.5 Summary and Conclusion -- Chapter 10 Dynamic Pricing of Fog‐Enabled MC‐IoT Applications -- 10.1 Edge Computing and Delay Modeling -- 10.2 Allocation Efficiency and Quality of Experience -- 10.2.1 Allocation Policy -- 10.2.2 Pricing Policy -- 10.3 Optimal Allocation and Pricing Rules -- 10.3.1 Single VMI Case -- 10.3.2 Multiple VMI Case -- 10.3.3 Expected Revenue -- 10.3.4 Implementation of Dynamic VMI Allocation and Pricing -- 10.4 Numerical Experiments and Discussion -- 10.4.1 Experiment Setup -- 10.4.2 Simulation Results -- 10.4.3 Comparison with Other Approaches -- 10.5 Summary and Conclusion -- Chapter 11 Resource Provisioning to Spatio‐Temporal Urban Services -- 11.1 Spatio‐Temporal Modeling of Urban Service Requests -- 11.1.1 Characterization of Service Requests -- 11.1.2 Utility of Resource Allocation -- 11.1.3 Problem Definition -- 11.2 Optimal Dynamic Allocation Mechanism -- 11.2.1 Dynamic Programming Solution -- 11.2.2 Computation and Implementation -- 11.3 Numerical Results and Discussion -- 11.3.1 Special Cases -- 11.3.1.1 Power Law Utility -- 11.3.1.2 Exponential Utility -- 11.3.2 Performance Evaluation and Comparison -- 11.4 Summary and Conclusions -- Part VI Conclusion -- Chapter 12 Challenges and Opportunities in the IoT Space -- 12.1 Broader Insights and Future Directions -- 12.1.1 Distributed Cross‐Layer Intelligence for Mission‐Critical IoT Services -- 12.1.1.1 Secure and Resilient Networking for Massive IoT Networks</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">12.1.1.2 Autonomic Networked CPS: From Military to Civilian Applications -- 12.1.1.3 Strategic Resource Provisioning for Mission‐Critical IoT Services -- 12.2 Future Research Directions -- 12.2.1 Distributed Learning and Data Fusion for Security and Resilience in IoT‐Driven Urban Applications -- 12.2.1.1 Data‐Driven Learning and Decision‐Making for Smart City Service Provisioning -- 12.2.1.2 Market Design for On‐Demand and Managed IoT‐Enabled Urban Services -- 12.2.1.3 Proactive Resiliency Planning and Learning for Disaster Management in Cities -- 12.2.2 Supply Chain Security and Resilience of IoT -- 12.3 Concluding Remarks -- Bibliography -- Index -- EULA.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Quanyan</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1012966704</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-119-71609-9</subfield><subfield code="a">Farooq, Junaid</subfield><subfield code="t">Resource Management for on-Demand Mission-Critical Internet of Things Applications</subfield><subfield code="d">Newark : John Wiley & Sons, Incorporated,c2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-35-WEL</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033609319</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119716112</subfield><subfield code="l">FAN01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FAN_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/servlet/opac?bknumber=9536218</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119716112</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119716112</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048228599 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:50:52Z |
indexdate | 2025-02-20T06:39:31Z |
institution | BVB |
isbn | 9781119716112 9781119716105 9781119716129 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033609319 |
oclc_num | 1265464850 |
open_access_boolean | |
owner | DE-1102 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-573 |
owner_facet | DE-1102 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-573 |
physical | 1 Online-Ressource (xvi,208 Seiten) Illustrationen |
psigel | ZDB-30-PQE ZDB-35-WIC ZDB-35-WEL ZDB-35-WIC FAN_PDA_WIC_Kauf |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Wiley |
record_format | marc |
series2 | IEEE Press series |
spellingShingle | Farooq, Junaid Zhu, Quanyan Resource management for on-demand mission-critical Internet of Things applications Cover -- Title Page -- Copyright -- Contents -- Preface -- Acknowledgments -- Acronyms -- Part I Introduction -- Chapter 1 Internet of Things‐Enabled Systems and Infrastructure -- 1.1 Cyber-Physical Realm of IoT -- 1.2 IoT in Mission‐Critical Applications -- 1.3 Overview of the Book -- 1.3.1 Main Topics -- 1.3.1.1 Dynamic Reservation of Wireless Spectrum Resources -- 1.3.1.2 Dynamic Cross‐Layer Connectivity Using Aerial Networks -- 1.3.1.3 Dynamic Processes Over Multiplex Spatial Networks and Reconfigurable Design -- 1.3.1.4 Sequential Resource Allocation Under Spatio‐Temporal Uncertainties -- 1.3.2 Notations -- Chapter 2 Resource Management in IoT‐Enabled Interdependent Infrastructure -- 2.1 System Complexity and Scale -- 2.2 Network Geometry and Dynamics -- 2.3 On‐Demand MC‐IoT Services and Decision Avenues -- 2.4 Performance Metrics -- 2.5 Overview of Scientific Methodologies -- Part II Design Challenges in MC‐IoT -- Chapter 3 Wireless Connectivity Challenges -- 3.1 Spectrum Scarcity and Reservation Based Access -- 3.2 Connectivity in Remote Environments -- 3.3 IoT Networks in Adversarial Environments -- Chapter 4 Resource and Service Provisioning Challenges -- 4.1 Efficient Allocation of Cloud Computing Resources -- 4.2 Dynamic Pricing in the Cloud -- 4.3 Spatio‐Temporal Urban Service Provisioning -- Part III Wireless Connectivity Mechanisms for MC‐IoT -- Chapter 5 Reservation‐Based Spectrum Access Contracts -- 5.1 Reservation of Time-Frequency Blocks in the Spectrum -- 5.1.1 Network Model -- 5.1.2 Utility of Spectrum Reservation -- 5.2 Dynamic Contract Formulation -- 5.2.1 Objective of Network Operator -- 5.2.2 Spectrum Reservation Contract -- 5.2.2.1 Operator Profitability -- 5.2.2.2 IC and IR Constraints -- 5.2.3 Optimal Contracting Problem -- 5.2.4 Solution to the Optimization Problem -- 5.3 Mission‐Oriented Pricing and Refund Policies 5.4 Summary and Conclusion -- Chapter 6 Resilient Connectivity of IoT Using Aerial Networks -- 6.1 Connectivity in the Absence of Backhaul Networks -- 6.2 Aerial Base Station Modeling -- 6.3 Dynamic Coverage and Connectivity Mechanism -- 6.3.1 MAP-MSD Matching -- 6.3.2 MAP Dynamics and Objective -- 6.3.3 Controller Design -- 6.3.3.1 Attractive and Repulsive Function -- 6.3.3.2 Velocity Consensus Function -- 6.3.4 Individual Goal Function -- 6.3.5 Cluster Centers -- 6.4 Performance Evaluation and Simulation Results -- 6.4.1 Results and Discussion -- 6.4.1.1 Simulation Parameters -- 6.4.1.2 Resilience -- 6.4.1.3 Comparison -- 6.5 Summary and Conclusion -- Part IV Secure Network Design Mechanisms -- Chapter 7 Wireless IoT Network Design in Adversarial Environments -- 7.1 Adversarial Network Scenarios -- 7.2 Modeling Device Capabilities and Network Heterogeneity -- 7.2.1 Network Geometry -- 7.2.2 Network Connectivity -- 7.2.2.1 Intra‐layer Connectivity -- 7.2.2.2 Network‐wide Connectivity -- 7.3 Information Dissemination Under Attacks -- 7.3.1 Information Dynamics -- 7.3.1.1 Single Message Propagation -- 7.3.1.2 Multiple Message Propagation -- 7.3.2 Steady State Analysis -- 7.4 Mission‐Specific Network Optimization -- 7.4.1 Equilibrium Solution -- 7.4.2 Secure and Reconfigurable Network Design -- 7.5 Simulation Results and Validation -- 7.5.1 Mission Scenarios -- 7.5.1.1 Intelligence -- 7.5.1.2 Encounter Battle -- 7.6 Summary and Conclusion -- Chapter 8 Network Defense Mechanisms Against Malware Infiltration -- 8.1 Malware Infiltration and Botnets -- 8.1.1 Network Model -- 8.1.2 Threat Model -- 8.2 Propagation Modeling and Analysis -- 8.2.1 Modeling of Malware and Information Evolution -- 8.2.2 State Space Representation and Dynamics -- 8.2.3 Analysis of Equilibrium State -- 8.3 Patching Mechanism for Network Defense -- 8.3.1 Simulation Results 8.3.2 Simulation and Validation -- 8.4 Summary and Conclusion -- Part V Resource Provisioning Mechanisms -- Chapter 9 Revenue Maximizing Cloud Resource Allocation -- 9.1 Cloud Service Provider Resource Allocation Problem -- 9.2 Allocation and Pricing Rule -- 9.3 Dynamic Revenue Maximization -- 9.3.1 Adaptive and Resilient Allocation and Pricing Policy -- 9.4 Numerical Results and Discussions -- 9.5 Summary and Conclusion -- Chapter 10 Dynamic Pricing of Fog‐Enabled MC‐IoT Applications -- 10.1 Edge Computing and Delay Modeling -- 10.2 Allocation Efficiency and Quality of Experience -- 10.2.1 Allocation Policy -- 10.2.2 Pricing Policy -- 10.3 Optimal Allocation and Pricing Rules -- 10.3.1 Single VMI Case -- 10.3.2 Multiple VMI Case -- 10.3.3 Expected Revenue -- 10.3.4 Implementation of Dynamic VMI Allocation and Pricing -- 10.4 Numerical Experiments and Discussion -- 10.4.1 Experiment Setup -- 10.4.2 Simulation Results -- 10.4.3 Comparison with Other Approaches -- 10.5 Summary and Conclusion -- Chapter 11 Resource Provisioning to Spatio‐Temporal Urban Services -- 11.1 Spatio‐Temporal Modeling of Urban Service Requests -- 11.1.1 Characterization of Service Requests -- 11.1.2 Utility of Resource Allocation -- 11.1.3 Problem Definition -- 11.2 Optimal Dynamic Allocation Mechanism -- 11.2.1 Dynamic Programming Solution -- 11.2.2 Computation and Implementation -- 11.3 Numerical Results and Discussion -- 11.3.1 Special Cases -- 11.3.1.1 Power Law Utility -- 11.3.1.2 Exponential Utility -- 11.3.2 Performance Evaluation and Comparison -- 11.4 Summary and Conclusions -- Part VI Conclusion -- Chapter 12 Challenges and Opportunities in the IoT Space -- 12.1 Broader Insights and Future Directions -- 12.1.1 Distributed Cross‐Layer Intelligence for Mission‐Critical IoT Services -- 12.1.1.1 Secure and Resilient Networking for Massive IoT Networks 12.1.1.2 Autonomic Networked CPS: From Military to Civilian Applications -- 12.1.1.3 Strategic Resource Provisioning for Mission‐Critical IoT Services -- 12.2 Future Research Directions -- 12.2.1 Distributed Learning and Data Fusion for Security and Resilience in IoT‐Driven Urban Applications -- 12.2.1.1 Data‐Driven Learning and Decision‐Making for Smart City Service Provisioning -- 12.2.1.2 Market Design for On‐Demand and Managed IoT‐Enabled Urban Services -- 12.2.1.3 Proactive Resiliency Planning and Learning for Disaster Management in Cities -- 12.2.2 Supply Chain Security and Resilience of IoT -- 12.3 Concluding Remarks -- Bibliography -- Index -- EULA. |
title | Resource management for on-demand mission-critical Internet of Things applications |
title_auth | Resource management for on-demand mission-critical Internet of Things applications |
title_exact_search | Resource management for on-demand mission-critical Internet of Things applications |
title_exact_search_txtP | Resource management for on-demand mission-critical Internet of Things applications |
title_full | Resource management for on-demand mission-critical Internet of Things applications Junaid Farooq, Quanyan Zhu |
title_fullStr | Resource management for on-demand mission-critical Internet of Things applications Junaid Farooq, Quanyan Zhu |
title_full_unstemmed | Resource management for on-demand mission-critical Internet of Things applications Junaid Farooq, Quanyan Zhu |
title_short | Resource management for on-demand mission-critical Internet of Things applications |
title_sort | resource management for on demand mission critical internet of things applications |
work_keys_str_mv | AT farooqjunaid resourcemanagementforondemandmissioncriticalinternetofthingsapplications AT zhuquanyan resourcemanagementforondemandmissioncriticalinternetofthingsapplications |