Skip to main content

Reconfiguration of Access Schemes in Virtual Networks of the Internet of Things by Genetic Algorithms

  • Conference paper
  • First Online:
Book cover Intelligent Distributed Computing IX

Part of the book series: Studies in Computational Intelligence ((SCI,volume 616))

Abstract

Virtual local area networks (VLAN) is a well-known technology of computer security in heterogeneous network infrastructures. It does not require significant computing resources. For this reason, it should find success in Internet of things. The VLAN access control scheme formation is divided into the tasks of initial configuration and reconfiguration. The paper presents an approach to the reconfiguration of VLAN access control schemes based on the improved class of genetic algorithms. Unlike the initial configuration, the reconfiguration additionally uses the previous access control scheme as input. Its search criterion is focused on minimizing the possible changes in the previous scheme. The paper shows that this problem is a special form of the Boolean matrix factorization. Main enhancements relate to generation of the initial population based on trivial solutions, using the columns of the connectivity matrix as the genes of chromosomes and applying in the fitness function the criterion of minimal cost to modify the access scheme. Experimental results demonstrate the proposed genetic algorithm has a high enough effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Catalyst 2900 Series XL and Catalyst 3500 Series XL Software Configuration Guide.: Cisco IOS Release 12.0(5) WC(1). Cisco Systems, San Jose (2001)

    Google Scholar 

  2. Perera, Ch., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the internet of things: a survey. In: IEEE Commission Surveys and Tutorials, vol. 16(1) (2014)

    Google Scholar 

  3. Applegate, S.D.: The Principle of maneuver in cyber operations. In: 4th International Conference on Cyber Conflict, pp. 1–13 (2012)

    Google Scholar 

  4. Saenko, I., Kotenko, I.: A genetic approach for virtual computer network design. Stud. Comput. Intell. 570, 95–105 (2014)

    Google Scholar 

  5. Miettinen, P., Vreeken, J.: Model order selection for boolean matrix factorization. In: 17th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 51–59 (2011)

    Google Scholar 

  6. Miettinen, P.: Dynamic Boolean matrix factorizations. In: 2012 IEEE 12th International Conference on Data Mining, pp. 519–528 (2012)

    Google Scholar 

  7. Cergani, E., Miettinen, P.: Discovering relations using matrix factorization methods. In: ACM International Conference on Information and Knowledge Management, pp. 1549–1552 (2013)

    Google Scholar 

  8. Janecek, A., Tan, Y.: Using population based algorithms for initializing nonnegative matrix factorization. LNCS 6729, 307–316 (2011)

    Google Scholar 

  9. Snasel, V., Platos, J., Kromer, P.: On genetic algorithms for boolean matrix factorization. In: Eighth International Conference on Intelligent Systems Design and Applications, vol. 2 (2008)

    Google Scholar 

  10. Snasel, V., Platos, J., Kromer, P., Husek, D., Neruda, R., Frolov, A.A.: Investigating boolean matrix factorization. In: Workshop on Data Mining using Matrices and Tensors (2008)

    Google Scholar 

  11. Lu, H., Vaidya, J., Atluri, V., Hong, Y.: Extended boolean matrix decomposition. In: Ninth IEEE International Conference on Data Mining, pp. 317–326 (2009)

    Google Scholar 

  12. Lu, H., Vaidya, J., Atluri, V.: Optimal boolean matrix decomposition: application to role engineering. In: 24th IEEE International Conference on Data Engineering, pp. 297–306 (2008)

    Google Scholar 

  13. Saenko, I., Kotenko, I.: Genetic algorithms for role mining problem. In: 19th International Conference on Parallel, Distributed and Network-based Processing, pp. 646–650 (2011)

    Google Scholar 

  14. Saenko, I., Kotenko, I.: Design and performance evaluation of improved genetic algorithm for role mining problem. In: 20th International Conference on Parallel, Distributed and Network-based Processing, pp. 269–274 (2011)

    Google Scholar 

  15. Tai, Ch.-F., Chiang, Tz.-Ch., Hou, T.-W.: A virtual subnet scheme on clustering algorithms for mobile Ad Hoc networks. Expert Syst. with Appl. 38(3):1269–2922 (2011)

    Google Scholar 

  16. Saenko, I., Kotenko, I.: Genetic optimization of access control schemes in virtual local area networks. LNCS 6258, 209–216 (2010)

    Google Scholar 

  17. Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley Longman Publishing, Boston (1989)

    MATH  Google Scholar 

  18. Mitchell, M.: An Introduction to Genetic Algorithms. MIT Press, Massachusetts (1998)

    MATH  Google Scholar 

  19. Eiben, A.E., Smith, J.E.: Introduction to Evolutionary Computing. Springer, Berlin (2007)

    Google Scholar 

  20. Saenko, I., Kotenko, I.: Design of virtual local area network scheme based on genetic optimization and visual analysis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (JoWUA) 5(4):86–102 (2014)

    Google Scholar 

  21. Schwartz, M.: Internet of Things with the Arduino Yún. Packt Publishing, Birmingham (2014)

    Google Scholar 

Download references

Acknowledgement

This research is being supported by The Ministry of Education and Science of The Russian Federation (contract # 14.604.21.0033, unique contract identifier RFMEFI60414X0033).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Igor Saenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Saenko, I., Kotenko, I. (2016). Reconfiguration of Access Schemes in Virtual Networks of the Internet of Things by Genetic Algorithms. In: Novais, P., Camacho, D., Analide, C., El Fallah Seghrouchni, A., Badica, C. (eds) Intelligent Distributed Computing IX. Studies in Computational Intelligence, vol 616. Springer, Cham. https://doi.org/10.1007/978-3-319-25017-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25017-5_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25015-1

  • Online ISBN: 978-3-319-25017-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics