MOMTA-HN: A Secure and Reliable Multi-Objective Optimized Multipath Transmission Algorithm for Heterogeneous Networks
-
Published:2024-07-10
Issue:14
Volume:13
Page:2697
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Qi Shengyuan123, Yang Lin123, Ma Linru2, Jiang Shanqing123, Zhou Yuyang13, Cheng Guang13
Affiliation:
1. School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China 2. National Key Laboratory of Science and Technology on Information System Security, Beijing 100101, China 3. Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing 211189, China
Abstract
With the rapid development of heterogeneous network technologies, such as mobile edge computing, satellite communications, self-organizing networks, and the wired Internet, satisfying users’ increasingly diversified and complex communication needs in dynamic and evolving network environments has become a critical research topic. Ensuring secure and reliable information transmission is essential for stable network operation in these complex environments. Addressing this challenge, this study proposed a secure and reliable multi-objective optimized multipath transmission algorithm for heterogeneous networks to enhance security and reliability during data transmission. The core principle of this algorithm was that multipath transmission can provide additional protection through redundant paths. This redundancy ensured that even if one path is attacked or fails, alternative paths can maintain data integrity and reachability. In this study, we employed the Optimized Non-dominated Sorting Genetic Algorithm II (ONSGA-II) to determine the range of the initial population and filter suitable paths by optimizing them according to different demand objectives. In the path selection process, we introduced an innovative deletion graph method, which ensures that redundant paths do not share any common links with the original paths, except when there are unique links. This approach enhances the independence of transmission paths and improves the security of the transmission process. It effectively protects against security threats such as single points of failure and link attacks. We have verified the effectiveness of the algorithm through a series of experiments, and the proposed algorithm can provide decision-makers with high-reliability and low-latency transmission paths in heterogeneous network environments. At the same time, we verified the performance of the algorithm when encountering attacks, which is superior to other classical algorithms. Even in the face of network failures and attacks, it can maintain a high level of data integrity and security.
Funder
National Natural Science Foundation of China China Postdoctoral Science Foundation Jiangsu Funding Program for Excellent Postdoctoral Talent
Reference53 articles.
1. Shah, Z., Ullah, I., Li, H., Levula, A., and Khurshid, K. (2022). Blockchain based solutions to mitigate distributed denial of service (ddos) attacks in the internet of things (iot): A survey. Sensors, 22. 2. Wang, J., Du, H., Niyato, D., Kang, J., Xiong, Z., Rajan, D., Mao, S., and Shen, X. (2024). A unified framework for guiding generative ai with wireless perception in resource constrained mobile edge networks. IEEE Trans. Mob. Comput., 1–17. 3. Qos-aware computation offloading in leo satellite edge computing for iot: A game-theoretical approach;Chen;Chin. J. Electron.,2023 4. Optical satellite networks;Karafolas;J. Light. Technol.,2000 5. Software defined satellite networks: A survey;Jiang;Digit. Commun. Netw.,2023
|
|