A Multi-broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development

  • Soumaya Bel Hadj Youssef
  • Slim Rekhis
  • Noureddine Boudriga
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10542)

Abstract

In this paper, we propose a multi-broker cloud architecture for the purpose of large scale sensing applications development. A set of heterogeneous Sensor cloudlets are deployed everywhere to collect data and disseminate them to a set of known sink nodes. An Unmanned Aerial Vehicle (UAV) cloud is used for the purpose of data muling from sink nodes to data centers. In this work, we address the problem of optimal deployment of UAVs over the sky to serve the maximal possible number of incoming requests, maximize the connectivity between busy UAVs, and minimize the consumed UAV energy. A set of algorithms are provided for the re-deployment of idle UAVs, and the reallocation of data collection tasks of UAVs. A simulation is conducted to evaluate the proposal.

References

  1. 1.
    Alamri, A., Ansari, W.S., Hassan, M.M., Hossain, M.S., Alelaiwi, A., Hossain, M.A.: A survey on sensor-cloud: architecture, applications, and approaches. Int. J. Distrib. Sens. Netw. 9(2) (2013)Google Scholar
  2. 2.
    Alfadhly, A., Baroudi, U., Younis, M.: Least distance movement recovery approach for large scale wireless sensor and actor networks. In: 7th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 2058–2063, July 2011Google Scholar
  3. 3.
    Barber, C.B., Dobkin, D.P., Huhdanpaa, H.: The quickhull algorithm for convex hulls. ACM Trans. Math. Softw. 22(4), 469–483 (1996)CrossRefMATHMathSciNetGoogle Scholar
  4. 4.
    Dean, B.C.: A simple expected running time analysis for randomized “divide and conquer” algorithms. Discret. Appl. Math. 154, 1–5 (2006)CrossRefMATHMathSciNetGoogle Scholar
  5. 5.
    Hayat, S., Yanmaz, E., Muzaffar, R.: Survey on unmanned aerial vehicle networks for civil applications: a communications viewpoint. IEEE Commun. Surv. Tutor. 18(4), 2624–2661 (2016)CrossRefGoogle Scholar
  6. 6.
    Imran, M., Younis, M., Said, A.M., Hasbullah, H.: Volunteer-instigated connectivity restoration algorithm for wireless sensor and actor networks. In: IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), pp. 679–683, June 2010Google Scholar
  7. 7.
    Mahmoud, S., Mohamed, N.: Broker architecture for collaborative UAVs cloud computing. In: International Conference on Collaboration Technologies and Systems (CTS), pp. 212–219, June 2015Google Scholar
  8. 8.
    Stankovic, J.A., Wood, A.D., He, T.: Realistic applications for wireless sensor networks. In: Nikoletseas, S., Rolim, J. (eds.) Theoretical Aspects of Distributed Computing in Sensor Networks. Monographs in Theoretical Computer Science. An EATCS Series, pp. 835–863. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-14849-1_25 Google Scholar
  9. 9.
    Tamboli, N., Younis, M.: Coverage-aware connectivity restoration in mobile sensor networks. Netw. Comput. Appl. 33(4), 363–374 (2010)CrossRefGoogle Scholar
  10. 10.
    Tirta, Y., Lau, B., Malhotra, N., Bagchi, S., Li, Z., Lu, Y.-H.: Controlled mobility for efficient data gathering in sensor networks with passively mobile nodes. In: Sensor Network Operations, Wiley-IEEE Press (2006)Google Scholar
  11. 11.
    Yi, W.Y., Lo, K.M., Mak, T., Leung, K.S., Leung, Y., Meng, M.L.: A survey of wireless sensor network based air pollution monitoring systems. Sensors 12, 31392–31427 (2015)CrossRefGoogle Scholar
  12. 12.
    Younis, M.F., Lee, S., Abbasi, A.A.: A localized algorithm for restoring internode connectivity in networks of moveable sensors. Localized Algorithm Restoring Internode Connect. Netw. Moveable Sens. 59(12), 1669–1682 (2010)MATHMathSciNetGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Soumaya Bel Hadj Youssef
    • 1
  • Slim Rekhis
    • 1
  • Noureddine Boudriga
    • 1
  1. 1.Communication Networks and Security Research LaboratoryUniversity of CarthageTunisTunisia

Personalised recommendations