Optimizing Vehicle-to-Edge Mapping with Load Balancing for Attack-Resilience in IoV

Anum Talpur,Mohan Gurusamy
DOI: https://doi.org/10.48550/arXiv.2210.01375
2022-10-04
Abstract:Attack-resilience is essential to maintain continuous service availability in Internet of Vehicles (IoV) where critical tasks are carried out. In this paper, we address the problem of service outage due to attacks on the edge network and propose an attack-resilient mapping of vehicles to edge nodes that host different types of service instances considering resource efficiency and delay. The distribution of service requests (of an attack-affected edge node) to multiple attack-free edge nodes is performed with an optimal vehicle-to-edge (V2E) mapping. The optimal mapping aims to improve the user experience with minimal delay while considering fair usage of edge capacities and balanced load upon a failure over different edge nodes. The proposed mapping solution is used within a deep reinforcement learning (DRL) based framework to effectively deal with the dynamism in service requests and vehicle mobility. We demonstrate the effectiveness of the proposed mapping approach through extensive simulation results using real-world vehicle mobility datasets from three cities.
Networking and Internet Architecture
What problem does this paper attempt to address?
The paper attempts to address the issue of service disruption in the Internet of Vehicles (IoV) caused by attacks on edge networks. Specifically, the authors focus on how to ensure service continuity and availability by optimizing the Vehicle-to-Edge (V2E) mapping during an attack, while maintaining efficient resource utilization and low latency. ### Background and Motivation - **Background**: Edge Networks (EN) in IoV can significantly reduce latency and improve reliability, but they also introduce new security risks such as jamming attacks and denial of service attacks. These attacks can cause edge node failures, affecting vehicle service availability and potentially endangering human lives. - **Motivation**: Existing research mainly focuses on attack defense, with less attention on recovery after edge node failures. Additionally, some studies consider the impact of dynamic and mobile traffic but do not fully address recovery mechanisms post-attack. Therefore, this paper proposes a proactive, attack-resilient V2E mapping method to minimize or avoid service disruption without using backup resources. ### Main Contributions - **Proposed a new mapping model**: Load-Balanced Proactive Secondary V2E Mapping (LB-PSVM), which can remap affected vehicles to non-attacked edge nodes during an attack, while minimizing service latency and maintaining load balance. - **Optimization framework**: The model is based on a Deep Reinforcement Learning (DRL) framework, effectively handling dynamic changes in service requests and vehicle mobility. - **Performance evaluation**: The proposed method's effectiveness is validated through simulations using real vehicle trajectory datasets from three cities. ### Method Overview - **System Model**: The paper proposes a three-layer architecture for an edge-enhanced IoV network, including the data layer, edge layer, and cloud layer. - **Optimization Problems**: - **Primary V2E Mapping**: Under normal conditions, vehicles are mapped to edge nodes providing the required service instances, aiming to minimize latency. - **Secondary V2E Mapping**: During an attack, affected vehicles are remapped to non-attacked edge nodes, aiming to maintain service availability and load balance. - **Service Recovery Placement (SRP)**: After an attack, redeploy affected service instances to ensure network recovery. ### Experimental Results - **Service Latency**: Experimental results show that LB-PSVM effectively maintains low service latency during an attack, with higher resource utilization compared to the Backup Resource (BR) method. - **Load Balancing**: LB-PSVM demonstrates better fairness in load distribution, avoiding overload on individual edge nodes. - **Performance Comparison**: Compared to traditional Secondary V2E Mapping (PSVM) and backup resource methods, LB-PSVM performs better in terms of latency and service quality. ### Conclusion This paper proposes an optimized secondary V2E mapping method that ensures service continuity and availability during edge network attacks, while maintaining efficient resource utilization and low latency. The effectiveness of the method is validated through simulations using real datasets.