Skip to main content

An Approach to Ensure High-Availability Deployment of IoT Devices

  • Chapter
  • First Online:
Blockchain, Artificial Intelligence, and the Internet of Things

Abstract

With millions of smart devices being integrated each day through the Internet of Things (IoT), ensuring ubiquitous computing along with pertinent security has now become more significant than ever. Generally, it is difficult to guarantee zero downtime even if the backhaul network is optimally deployed. An automated system that could predict the downtime and take suitable steps to ensure High Availability (HA) of resources could protect businesses from losing data at a critical time. Such an automated model is put forward that would guarantee zero downtime deployment without comprising the security of end devices. The emphasis is on designing an effective solution by improvising the current strategies for this deployment challenge. The proposed architecture is evaluated through numerous tests, and by visualization of the results obtained, one can mitigate the planned and unplanned downtime to ensure continuous operational efficiency of services for businesses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Miorandi D, Sicari S, Pellegrini FD, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10:1497–1516

    Article  Google Scholar 

  2. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutorials 17(4):2347–2376

    Article  Google Scholar 

  3. Alcatel and British Telecommunications (2012) Wi-Fi roaming building on andsf and hotspot2.0. White Paper

    Google Scholar 

  4. Cisco Systems (2011) The future of hotspots: making Wi-Fi as secure and easy to use as cellular. White Paper

    Google Scholar 

  5. Frangoudis PA, Polyzos GC (2010) Report-based topology discovery schemes for centrally-managed Wi-Fi deployments. In: Next generation internet (NGI), 6th EURO-NF conference, pp 1–8

    Google Scholar 

  6. Roman R, Lopez J, Najera P (2011) A cross-layer approach for integrating security mechanisms in sensor networks architectures. Wirel Commun Mob Comput 11(2):267–276

    Article  Google Scholar 

  7. Wang Y, Ren Y, Meng Y, Bai J (2017) Research on performance of three-layer MG-OXC system based on MLAG and OCDM. In: Proceedings of SPIE 10464, AOPC, 24 October 2017

    Google Scholar 

  8. IEEE 802.1AX – Link Aggregation, IEEE, 2008

    Google Scholar 

  9. Farkas J, Antal C, Westberg L, Paradisi A, Tronco T, de Oliveira V (2011) Fast failure handling in ethernet networks. IEEE Int Conf Commun 2:841–846

    Google Scholar 

  10. Irawati LD, Hariyani YS, Hadiyoso S (2017) Link aggregation control protocol on software defined network. Int J Electr Comput Eng 7(5):2706

    Google Scholar 

  11. Xiao Y et al (2010) Security services and enhancements in the IEEE 802.15.4 wireless sensor networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM ’05), November 2010

    Google Scholar 

  12. Garcia-Morchon O et al (2011) Security considerations in the IP-based Internet of Things. IETF. http://tools.ietf.org/html/draft-garcia-core-security, March 2011

  13. Lu B, Pooch UW (2005) A lightweight authentication protocol for mobile ad hoc networks. Int J Inf Technol 11(2):119–135

    Google Scholar 

  14. Cheung MH, Huang J (2015) DAWN: delay-aware Wi-Fi offloading and network selection. IEEE J Sel Areas Commun 33(6):1214–1223

    Article  Google Scholar 

  15. Park S, et al (2013) An analysis of replication enhancement for a high availability cluster. J Inf Process Syst 9(2):205–216

    Google Scholar 

  16. Brenner S, Garbers B, Kapitza R (2014) Adaptive and scalable high availability for infrastructure clouds. Distributed Applications and Interoperable Systems. Springer, Berlin, Heidelberg, Systems, pp 16–30

    Google Scholar 

  17. Kim H, Feamster N (2013) Improving network management with software-defined networking. Communications Magazine, IEEE 51(2):114–119

    Article  Google Scholar 

  18. Cleveland F (2012) Enhancing the reliability and security of the information infrastructure used to manage the power system. In: IEEE PES general meeting, Tampa, 24–28 June 2012

    Google Scholar 

  19. Moreno-Vozmediano R et al (2018) Orchestrating the deployment of high availability services on multi-zone and multi-cloud scenarios. Int J Grid Utility Computing 16(1):39–53

    Article  Google Scholar 

  20. Cziva R, Stapleton D, Tso FP, Pezaros DP (2014) SDN-based virtual machine management for cloud data centers. In: IEEE 3rd international conference on cloud networking (CloudNet), pp 388–394

    Google Scholar 

  21. Benz K, Bohnert TM (2014) Impact of pacemaker failover configuration on mean time to recovery for small cloud clusters. In: Cloud computing (CLOUD), IEEE 7th international conference on, pp 384–391

    Google Scholar 

  22. Park J, Jeong J, Jeong H, Liang C-JM, Ko J (2014) Improving the packet delivery performance for concurrent packet transmissions in WSNs. IEEE Commun Lett 18(1):58–61

    Article  Google Scholar 

  23. Nai W, Zhang F, Yu Y, Dong D (2015) Reliability evaluation for key equipment of high-speed maglev operation and control system in uncertainty environment based on fuzzy fault tree analysis. Proceedings of MAPE Conference, Shanghai

    Google Scholar 

  24. Bulut E, Szymanski BK (2012) Wi-Fi access point deployment for efficient mobile data offloading. Proceedings of 1st ACM International Workshop on Practical Issues and Applications in Next Generation Wireless Networks (PINGEN), Turkey, pp 45–50

    Google Scholar 

  25. Wang CS, Kao LF (2012) The optimal deployment of Wi-Fi wireless access points using the genetic algorithm. In: Proceedings 6th International Conference on Genetic and Evolutionary Computing (IGCEC 2012), Kitakyushu, Japan, pp 542–545

    Google Scholar 

  26. Zhang C, Gu B, Yamori K, Xu S, Tanaka Y (2013) Duopoly competition in time-dependent pricing for improving the revenue of network service providers. IEICE Trans Commun E96-B(12):2964–2975

    Google Scholar 

  27. Wang M, et al (2016) Cellular machine-type communications: physical challenges and solutions. IEEE Wireless Commun 23(2):126–135

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mohan, A., Seetharaman, B., Janarthanan, P. (2022). An Approach to Ensure High-Availability Deployment of IoT Devices. In: Raj, P., Dubey, A.K., Kumar, A., Rathore, P.S. (eds) Blockchain, Artificial Intelligence, and the Internet of Things. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-77637-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-77637-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-77636-7

  • Online ISBN: 978-3-030-77637-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics