Professional Documents
Culture Documents
Backbones - for - Internet - of - Battlefield - Things нема шта да се узме
Backbones - for - Internet - of - Battlefield - Things нема шта да се узме
Abstract—The Internet of Battlefield Things is a relatively new missions, operate in a (semi)autonomic mode, and execute
cyberphysical system and even though it shares a lot of concepts battlefield operations in order to support end-to-end control
from the Internet of Things and wireless ad hoc networking in and command. A bulleted description of the significant aspects
general, a lot of research is required to address its scale and
peculiarities. In this article we examine a fundamental problem of IoBT from the perspective of a US Army research program
pertaining to the routing/dissemination of information, namely is quite comprehensive2 .
the construction of a backbone. We model an IoBT ad hoc Even though IoBT stems from IoT, a number of challenging
network as a multilayer network and employ the concept of dom- characteristics [2] distinguish it from traditional IoT. We
ination for multilayer networks which is a complete departure briefly describe the most significant features below:
from the volume of earlier works, in order to select sets of nodes
that will support the routing of information. Even though there • Diversity in tasks and goals. There will likely be many
is huge literature on similar topics during the past many years, networks operating at the same time to achieve their
the problem in military (IoBT) networks is quite different since particular goal, e.g., surveillance, tracking, attack.
these wireless networks are multilayer networks and treating
• Operation in dynamic and resource starving environ-
them as a single (flat) network or treating each layer in isolation
and calculating dominating set produces submoptimal or bad ments. Some “devices” comprising the IoBT network
solutions; thus all the past literature which deals with single layer might be energy-starving such as sensors, drones, others
(flat) networks is in principle inappropriate. We design a new, might not have energy issues, but they might be obliged
distributed algorithm for calculating connected dominating sets to travel in not well chartered territories (e.g., planes).
which produces dominating sets of small cardinality. We evaluate
• Extreme device heterogeneity. An IoBT network might
the proposed algorithm on synthetic topologies, and compare
it against the only two existing competitors. The proposed include from tiny little sensors to some as big as armoured
algorithm establishes itself as the clear winner in all experiments. fighting vehicles.
• High variance in network size and density. An IoBT
Index Terms—Dominating sets, multilayer networks, Internet might be comprised for instance by the highly dense
of Battlefield Things, adhoc networking and cluttered network of a drone swarm, or it might
be comprised by the union of a network formed by the
I. I NTRODUCTION soldiers of a battalion spread over a large area and the
During the last decade the Internet of Things (IoT) took network formed by a tank platoon.
major steps towards its realization due to the abundance of One of the major challenges for IoBT comprises the so-
wireless networks, the extreme miniaturization of devices, called assured synthesis and in particular the tasks of recruit-
their supply with significant computing, communication and ment and network composition [2]. The former deals with the
control power, and the further development of algorithmic discovery of cyberphysical assets, the human assets and their
solutions in distributed computing. particularities, and finally, with the the resilience to adversarial
As expected, the advances in IoT inevitably impacted upon behaviour. The latter deals with the issue of dictating the set
modern military operations, and specifically upon the modern of nodes that must be included that satisfy the requirements
and future battlefield which is populated by tens of thousands and constraints of the planned mission.
of “things”, such as humans, vehicles, unmanned aerial vehi-
cles (UAVs), aircrafts, sensors, etc. performing a wide variety A. Motivation and contributions
of tasks including sensing the environment, communicating, We took a first step [19] in dealing with the extreme
acting in isolation and in cooperation [15], [24]. Thus, a new heterogeneity of such a network by modelling it as a multilayer
term and a new development/study area was born, namely the network [7]. We showed analytically that treating such a
Internet of Battle(field) Things [15] or the Internet of Military network as a plain union of independent subnetworks does not
Things (IoMT)1 whose high level goal is to create a network provide efficient solutions, at least for the task of facilitating
of communication with any kind of “device”. These devices fast packet/information routing. So, even though there is huge
are dynamically connected to meet multiple and often diverse literature during the past many years, on dominating sets for
1 https://www.computer.org/publications/tech-news/research/internet-of- 2 https://www.arl.army.mil/business/collaborative-alliances/current-
military-battlefield-things-iomt -iobt cras/iobt-cra/
single layer ad hoc networks, the problem in military (IoBT) backbones for routing [19], designing secure and reconfig-
networks is quite different since these wireless networks urable IoBT networks [10], supporting secure information
are multilayer networks and treating them as a single (flat) exchange [27], performing enemy localization [11], conduct-
network or treating each layer in isolation and calculating ing communication link control [20], combating attacks at
dominating set produces submoptimal or bad solutions; thus nodes [3], malware and fake news detection [4], [5], [14],
all the past literature which deals with single layer (flat) net- and human assets protection [8], [17].
works is in principle inappropriate. In subsequent works, we
developed distributed algorithms for monitoring and control The most closely related work to the present article are
of the communication links to deal with attacks [20], [21], those that deal with backbones that support routing in ad
and also with fact-finding algorithms to account for the social hoc type of wireless networks. Even though there is huge
sensing aspects, e.g., characterize human assets/sources [14]. literature on this topic during the past twenty-five years [25],
Moreover, in [19] we developed low-communication cost, [29], [30], the problem in military (IoBT) networks is quite
distributed algorithms for selecting a set of nodes to comprise different since these wireless networks are modelled as mul-
a backbone for a multilayer network – in our case, the tilayer networks [10], [19] (see Figure 1), and thus all the
IoBT network, based on the concept of node domination. past literature which deals with single layer networks is in
Independently of our efforts and in the field of biological principle inappropriate. As mentioned in [19, Theorem 1],
sciences, the work in [16] developed (centralized) algorithms such approaches can produce suboptimal solutions meaning
for calculating dominating sets for multilayer networks. that it is better to announce as a dominator a node with a few
However, neither the algorithms developed in [16] nor those interlayer links rather than one with many intralayer links.
developed in [19] can adequately serve the purpose we are
seeking in this article. The former because it is centralized The first approach in designing a backbone for military
and thus can not work in the realm of IoBT, and moreover multilayer networks is reported in [19], where a distributed
because it produces unconnected network spanners, and thus backbone formation algorithm named clP CI was presented
it can not guarantee free flow of information. The main issue there. That algorithm utilized the well-known concept of
with the latter algorithms is the fact that they produce not very (connected) dominating set (CDS) for forming the backbone.
compact spanner, i.e., there is still room for improvements as The choice of dominating set concept was made because the
far as the size of the produced connected dominating set is battlefield requires a) distributed algorithms: even though the
concerned. This is of crucial significance, should we wish to calculation of a minimum (in size) CDS is in NP-Complete,
have solutions scalable for enormous IoBT networks. there exist efficient distributed algorithms for this problem, b)
In this context, the present article makes the following resilient solutions: indeed there is mature knowledge on how
contributions: to create a multi-connected, multi-dominating CDS, c) energy-
• It presents a new distributed algorithm CCDS for cal- aware solutions (e.g., sleep scheduling): there is also mature
culating connected dominating sets for IoBT ad hoc theory and practice on how to create e.g., multiple dominating
networks, by applying an efficient pruning mechanism sets, i.e., the so-called domatic partitions [23]. So, clP CI was
to reduce the size of the dominating set. the first algorithm to construct a connected dominating set in
• It enhances F AST − M DSM [16] so as to produce a distributed way for multilayer networks. Until then, there
connected dominating sets for multilayer networks, i.e., was no prior work on the topic of calculating (connected)
we get a new algorithm called F AST − CM DSM . dominating sets for multilayer networks, probably because it
• It implements the only existing competitors, namely the was mistakenly conceived that that a multilayer network is
algorithm in [19] and F AST − CM DSM . equivalent (from the perspective of computing CDS) to a single
• It compares exhaustively the new algorithm against the layer network after ignoring layer information.
aforementioned competitors using synthetically generated
network topologies, and shows their shortcomings and In biological sciences, where the concept of multilayer
advantages. The evaluation attests the overall superiority networks has been successfully used to model interacting
of the proposed algorithm. networks, the algorithm F AST − M DSM was presented
The rest of this article is organized as follows: Section II at [16] for calculating dominating sets in multilayer networks.
describes the related work on the article’s topic; Section III F AST − M DSM is a centralized algorithm based on integer
formulates the problem in mathematical terms, and Section IV programming. It constructs an unconnected dominating set.
develops distributed solutions for it. Section V evaluates the The idea of using integer programming to find the minimum
competing algorithms, and finally, Section VI summarizes the dominating set isn’t new; in fact, there are several works that
article. use different methods of integer programming to find both
minimum dominating set and minimum connected dominating
II. R ELATED WORK set [9]. However, all those past works, except from the
The concept of Internet of Battle(field) Things emerged centralized approach and the real-time constraints, consider
during the last five years or so [1], [15]. Since then, intense only single layer graphs. Nevertheless, F AST − M DSM
research is being conducted in issues such as designing comprises a departure from this literature.
III. P ROBLEM FORMULATION IoBT networks, and provide without proof its computational
complexity (Proposition 1).
Let us start by briefly mentioning the concept of dominating Definition 1 (Multilayer MCDS problem for IoBT): Solve
set of graph [13]: a dominating set (DS) of a graph (i.e., the set the M CDS for a multilayer network in a distributed fashion,
of dominators) is a subset of the nodes of the graph such that i.e., determine the set M CDS M L comprised of the minimum
the rest of the nodes are adjacent (i.e., into one hop distance) number of nodes (belonging to any layer) such as: a) their
from some node(s) of the dominating set. There might exist induced subgraph is connected (with intra and/or inter-layer
more than one DS for a graph. In case the graph induced by the links) and the rest of the nodes (not belonging to M CDS M L )
dominators is connected, then the DS is called connected DS are adjacent to at least one node belonging to M CDS M L ,
(CDS). There might exist more than one CDS for a graph. For b) the number of dominators with many interlayer links is
our purposes, we are interested in minimum CDS (MCDS), maximized, c) having only knowledge of the k-hop neighbor-
i.e., CDS with minimum cardinality. There might exist more hood around each node. Here, we set k = 2.
than one MCDS for a graph. The problem of calculating a
Proposition 1: The Multilayer MCDS problem for IoBT is
MCDS is NP-complete in the centralised setting [12].
NP-complete.
In our IoBT context, we model an IoBT ad hoc network as
a multilayer network, i.e., as a multilayer graph [7], [10], [19]. IV. P ROPOSED ALGORITHMS
We assume the existence of only bidirectional links3 . A mul- Due to the computational complexity of the problem, we
tilayer network comprised of n layers is a pair (GM L , E M L ), strive to design efficient heuristic distributed algorithms to
where GM L = {Gi , i = 1, . . . , n} is a set of networks solve it; here we describe two such algorithms.
(Gi , Ei ) (i.e., with Gi nodes and Ei links), and a set of inter-
layer links E M L = {Ei,j ⊆ Gi ×Gj ; i, j ∈ {1, . . . , n}, i 6= j}. A. Distributed CDS in multilayer networks
Figure 1 depicts such a network where for instance we can In principle, any efficient heuristic algorithm for calculating
see a layer of soldiers, a layer of helicopters, the intralayer a M CDS seeks to detect in the topology strategically posi-
links connecting entities of the same layer, and interlayer links tioned nodes (connected to many other) in order to decrease
connecting entities belonging to different layers. the size of the obtained DS. In our case, we additionally
seek such nodes with many interlayer links. So, we use the
clP CI centrality measure [19] to identify nodes with these
two characteristics. Thus, we exploit the clP CI measure and
incorporate it into a distributed algorithm for computing a
CDS. The algorithm will be called Cross layer Connected
Dominating Set formation algorithm (CCDS).
In brief, the constituent main parts of CCDS are the CDS
construction and the redundant relay node pruning. Before
these two steps take place, however, one more procedure
evolves that is typical and common in (almost) all distributed
algorithms for ad hoc networks with non GPS-enabled nodes.
During this process, each node learns the topology of its
Fig. 1. A typical ad hoc network in the IoBT setting. neighborhood. For CCDS, each node learns the connectivity
of all its neighbors up to its 2-hop neighborhood N 2 (u). Then,
It is obvious that scalability issues [2] justify the require- it calculates its own clP CI index, it broadcasts its value to
ment of finding a minimum cardinality CDS. Moreover, from its neighbours and, by mutuality of the distributed protocol, it
the discussion in section I and in [2, SectionIII.B], where receives its neighbors’ clP CI values.
“...resilience and latency requirements for synthesizing a near- The CDS construction phase is based on a source-initiated
optimal network” [2] are emphasized, we conclude that our relay node selection process that is executed by every node u,
IoBT backbone must include as many nodes with many and is divided into two tasks, namely neighbor prioritization
interlayer links as possible. This is because the existence of and construction task. In particular, each node u prioritizes its
many nodes with “a lot” of interlayer links support low-latency neighborhood in decreasing order of their clP CI values and
communication among layers; think of them as the hubs progressively selects from his 1 − hop neighborhood N (u) to
encountered in complex networks that reduce the “degrees of include in its relay node set R(u) the nodes with the largest
separation”. Also, if there are many nodes with “a lot” of clP CI index value that cover at least one new node in the
interlayer links, then the danger of partition among layers is respective 2 − hop neighborhood N 2 (u).
reduced significantly. Thus, we give the following definition Then, a pruning phase follows, because the relay node
(Definition 1) for the problem of calculating a MCDS for selection process produces many redundant CDS nodes. To
achieve a good balance between efficiency and overhead
3 In principle, the paper ideas can be applied to multilayer networks with CCDS makes use of the restricted pruning Rule k as this
unidirectional links as well, but our algorithms need to be properly adjusted. self pruning scheme, in general, is more efficient in reducing
the relay node set than several existing schemes that ensure the Algorithm 2: FAST-CMDSM
broadcast coverage [28]. Notably, in the pruning rule we make precondition : All nodes are designated as dominators
use of connectivity as quantified by clP CI as priority value postcondition: Completed MCDS election process
in order to establish a total order among nodes that participate remarks : mlNetwork G =(V, E) where V and E are
in the CDS. Connectivity has been proved to be the most vertex & edge set, M (u) : (T)rue/(F)alse
indicator for node u to being a DS node, V m :
efficient priority under all circumstances. The pseudo-code of DS node set, M DSV : Minimum DS node set
CCDS is presented in Algorithm 1. of V, CDSV : Connected DS node set of V.
1 repeat
2 if ∃ uj (1≤ j ≤n) ∈ V |
Algorithm 1: CCDS
3 d(uj ) = 1 & ui (1≤ i ≤n, i 6= j) ∈ N (uj ) then
precondition : Known clPCI index values of nodes in 4 M (ui (1≤i≤n) ) = T;
(N (u)) ∧ (N 2 (u)) 5 if ui (1≤i≤n) ∈ / V m then
postcondition: Completed MCDS election process 6 Add node ui (1≤i≤n) to V m;
remarks : mlNetwork G =(V, E) where V and E are 7 end
vertex & edge set, R(u) : relay node set of 8 end
node u ∈ V , M (u) : (T)rue/(F)alse indicator 9 until all nodes at every layer have been examined
for node u being a DS node. 10 repeat
1 repeat 11 if M (uj (1≤j≤n) ) = T then
2 Add to R(u) node l ∈ N (u) which has the largest 12 if ∃ ui (1≤i≤n) ∈ N (uj )&M (ui (1≤i≤n) ) = T then
clP CI and covers at least one new node in N 2 (u); 13 M (uj (1≤j≤n) ) = F; continue;
3 until each node in N 2 (u) is covered by node(s) in R(u) 14 else
4 Announce R(u); 15 if uj (1≤j≤n) ∈ / V m then
5 if selected as a relay node then 16 Add node uj (1≤j≤n) to V m;
6 M (u) = T ; Announce status change; 17 end
constrained
7 Build S(u) = u1 , u2 , . . . , un | uk (1≤k≤n) ∈ 18 end
N (u) ∧ N 2 (u), M (uk (1≤k≤n) ) = T , 19 end
clP CI(u) < clP CI(uk (1≤k≤n) ); 20 until no more nodes are Pnadded to V m
8
constrained
if S(u) is subject to 21 M DSV = Minimize Pn i=1 xi
N (u) ⊂ N (u1 ) ∪ N (u2 )... ∪ N (un ) and 22 Subject to xi + j (uj ,ui )∈Ek xj ≥ 1 ∀ ui ∈ Vk (1≤k≤n)
u1 , u2 , ..., un form a connected graph then 23 repeat
9 M (u) = F ; Announce status change; 24 Add to CDSV the least possible nodes from N (u) that are
10 Return; /* CDS Pruning */ needed to cover N 2 (u) neighborhood
11 end 25 until any node S u ∈ M DSV has beenTexamined
12 end 26 CDSV = V m (CDSV − (CDSV V m))
27 Use Pruning in order to decrease the size of the CDSV
Table II records all the independent parameters we used in our 100 CCDS FAST-CMDSM CCDS* FAST-CMDSM* FAST-MDSM
Layer 4
topology generator. 10
50
49
47
48
47
46
44
43
40
38
16
11
9
9
8
8
8
6
6
5
5
5
5
4
3
100 CCDS FAST-CMDSM CCDS* FAST-CMDSM* FAST-MDSM
Layer 3
10
50
48
48
47
47
46
46
44
42
39
E XPERIMENTATION PARAMETERS VALUES
16
14
11
9
8
8
8
6
6
6
6
5
5
3
100 CCDS FAST-CMDSM CCDS* FAST-CMDSM* FAST-MDSM
Layer 2
10
49
48
48
48
47
46
45
46
43
41
18
18
15
avg. node degree (D) 3, 6, 10, 16, 20 6
13
10
9
8
7
6
6
6
3
network diameter (H) 3, 5, 8, 12, 17 5 100 CCDS FAST-CMDSM CCDS* FAST-CMDSM* FAST-MDSM
Layer 1
#network layers (L) 2, 3, 4, 5, 7 4
10
49
46
45
46
44
42
41
40
40
size of a layer relative 10%, 20%, 30%, 50%, 70% -
34
18
15
12
10
10
10
9
7
7
6
5
5
4
3
to its adjacent layers
3 6 10 16 20
Degree
Layer 4
10
to act as connectors and thus for more nodes for the CDS.
49
48
47
47
47
47
45
46
44
44
20
15
14
12
10
9
9
9
9
8
8
7
6
Focusing on the evaluation of the competitors, we observe that
6
5
100 CCDS FAST-CMDSM CCDS* FAST-CMDSM* FAST-MDSM
Layer 3
10
48
48
48
47
47
47
46
45
17
17
13
12
12
11
11
10
10
9
7
7
6
6
5
100 CCDS FAST-CMDSM CCDS* FAST-CMDSM* FAST-MDSM
11% upto 16%. That is because in such dense topologies, the
redundant paths remain inside the field of view of CCDS
Layer 2
10
50
49
48
48
48
48
48
48
48
47
20
19
16
15
15
14
13
13
12
10
10
8
7
5
5
Layer 1
10
layer by 50% or more then F AST − CM DSM outperforms
49
47
47
46
46
46
45
45
44
42
22
15
15
14
12
12
11
11
10
9
9
9
7
7
5
3 5 8 12 17
CCDS from 18% up to 21%. That is, because of the large
Diameter
difference in the cardinality of the multilayer network layers
Fig. 3. Impact of network diameter.
which equally results to a large number of interlayer links
towards the other layers. In such a case in order to calculate
the redundant paths and proceed with the pruning process
the number of layers increases it increases also the number of a broader view of the network topology is needed, which
interlinks among layers and the multilayer network becomes justifies the better performance of the centralized controlled
denser. Thus, we would expect the coverage capability of the F AST − CM DSM . Finally, both the respective pruning free
nodes to increase accordingly. However, that does not happen versions of the competing algorithms select almost all nodes as
and it is due to the multilayer network architecture. Focusing dominators and thus the results are not considered interpretable
on the evaluation of the competitors, we observe that both (the performance of the pruning mechanism for CCDS and
CCDS perform equally well (10% or less variance) when the F AST − CM DSM regarding the CDS size reduction is up
number of layers is 5 or less. Notably, however, CCDS is to 80% and 83% , respectively, in this particular case).
the champion algorithm compared to F AST − CM DSM ,
as it presents a better performance by 14%. Those results 100
CCDS FAST-CMDSM CCDS* FAST-CMDSM* FAST-MDSM
Layer 4
are consistent to the previous as we have already seen that
245
242
166
160
108
107
83
82
65
64
10
39
32
23
21
18
18
18
15
14
14
12
12
11
11
both competitors perform well in dense topologies, which
10
CCDS FAST-CMDSM CCDS* FAST-CMDSM* FAST-MDSM
those under consideration are. The case where CCDS out- 100
CDS size (per network layer)
Layer 3
performs F AST − CM DSM is justified by its efficient
142
139
112
111
81
80
71
71
60
60
10
30
27
20
17
17
15
15
15
14
12
12
11
9
9
9
pruning mechanism. As for the respective pruning free version CCDS FAST-CMDSM CCDS* FAST-CMDSM* FAST-MDSM
100
Layer 2
83
83
73
73
65
65
60
59
10
55
54
20
19
18
18
17
17
17
16
17
15
14
14
7
6
6
Layer 1
reduction is up to 79% and 75% , respectively, in this particular 10
49
50
50
50
49
49
49
49
49
48
26
23
21
20
18
16
16
15
14
13
13
12
10
case).
7
10
Fig. 5. Impact of increasing layer cardinality.
47
46
10
9
10
48
47
10
48
48
46
45
10
9
9
8
6
6
10
49
47
48
46
45
44
9
7
10 the most energy efficient CDS in, almost, any case, followed
49
48
48
48
48
46
45
44
13
12
12
12
11
11
11
10
6
6
6
10
49
48
47
49
48
48
44
42
42
40
15
15
14
14
14
12
11
11
10
10
7
6
10
47
47
47
46
44
42
42
40
40
38
13
13
12
12
12
12
11
11
10
9
6
6
2 3 4 5 7
Number of Layers
ing reality of the well known Internet of Things, but at
Fig. 4. Impact of network number of layers. a significantly larger scale, and with stringent requirements
concerning robustness and latency. Its main goal is to carry out
4) Impact of increasing the layer size: In this section, commander’s intent in a safe, responsive and resilient manner.
we consider the impact of increasing the layer size on the In this article, we dealt with the problem of designing a
performance of each competitor. In Figure 5 we evaluate the small and resilient backbone for IoBT networks. We used
per layer size of the CDS that each competitor creates. Note the modelling strength of multilayer graphs to abstract the
that the size of the CDS is an increasing function with respect real topology of an IoBT network, and adopted the graph-
to the increasing layer size. This happens because as the size theoretic concept of dominating sets to address our target. In
0.6
[9] N. Fan and J.-P. Watson, “Solving the connected dominating set problem
FAST-CMDSM*
0.4
0.635
0.609
0.600
0.596
0.589
0.580
0.578
0.572
0.554
0.545
0.322
0.2
ceedings of the International Conference on Combinatorial Optimization
0.275
0.249
0.248
0.242
0.196
0.192
0.176
0.169
0.166
Minimum Energy (mean) per Relay Node Set
CCDS*
0.6
layer network design for critical information dissemination in the
0.4 Internet of Battlefield Things (IoBT),” IEEE Transactions on Wireless
0.669
0.640
0.588
0.582
Communications, vol. 17, no. 4, pp. 2618–2632, 2018.
0.577
0.559
0.542
0.538
0.511
0.440
0.2
FAST-CMDSM
0.272
0.266
0.258
0.236
0.227
0.219
0.218
0.177
[11] N. B. Gaikwad, H. Ugale, A. Keskar, and N. C. Shivaprakash, “The
0.173
0.150
CCDS
0.4
[12] M. R. Garey and D. S. Johnson, Computers and Intractability: A Guide
0.794
0.761
0.739
0.712
0.697
0.642
0.604
0.579
0.517
0.470
0.2
to the Theory of NP-Completeness. W. H. Freenan and Company, 1979.
0.277
0.257
0.254
0.232
0.224
0.214
0.178
0.155
0.141
0.138
[13] T. W. Haynes, S. Hedetniemi, and P. Slater, Fundamentals of Domination
3 6 10
Degree
16 20 in Graphs, ser. Chapman & Hall/CRC Pure and Applied Mathematics.
CRC Press, 1998.
Fig. 6. Energy awareness of the competitors. [14] D. Katsaros, G. Stavropoulos, and D. Papakostas, “Which machine
learning paradigm for fake news detection?” in Proceedings of the
IEEE/WIC/ACM Web Intelligence Conference (WI), 2019, pp. 383–387.
[15] A. Kott, A. Swami, and B. J. West, “The Internet of Battle Things,”
this context, we designed a distributed algorithm for calcu- IEEE Computer magazine, pp. 70–75, 2016.
lating small-cardinality connected dominating sets for such [16] J. C. Nacher, M. Ishitsuka, S. Miyazaki, and T. Akutsu, “Finding and
analysing the minimum set of driver nodes required to control multilayer
multilayer networks where nodes located in the borders of and networks,” Nature Scientific Reports, vol. 9, no. 576, 2019.
having connections to different/many layers were preferably [17] I. Nasim and S. Kim, “Human EMf exposure in wearable networks
selected as members of the dominating set, since they are for Internet of Battlefield Things,” in Proceedings of the IEEE Military
Communications Conference (MILCOM), 2019.
able to support short communication latency, and significant [18] F. A. Onat and I. Stojmenovic, “Generating random graphs for wireless
tolerance to network partitioning attacks. We compared the actuator networks,” in Proceedings of the IEEE International Symposium
developed algorithm to two state-of-the-art algorithms for on a World of Wireless, Mobile and Multimedia Networks (WoWMoM),
2007, pp. 1–12.
computing connected dominating sets for multilayer networks [19] D. Papakostas, P. Basaras, D. Katsaros, and L. Tassiulas, “Backbone
using synthetically generated data across a range of topology formation in military multi-layer ad hoc networks using complex net-
characteristics. The proposed algorithm showed constantly work concepts,” in Proceedings of the IEEE Military Communications
Conference (MILCOM), 2016, pp. 842–848.
better performance against its competitors. [20] D. Papakostas, S. Eshghi, D. Katsaros, and L. Tassiulas, “Distributed al-
Apart from future plans regarding algorithmic aspects and gorithms for multi-layer connected edge dominating sets,” IEEE Control
extensions of the proposed solution to unidirectional links, Systems Letters, vol. 3, no. 1, pp. 31–36, 2019.
[21] ——, “Energy-aware distributed edge domination of multilayer net-
our future work includes the application of tiny machine works,” in Proceedings of the IEEE American Control Conference
learning in a federated fashion to other aspects of IoBT such as (ACC), 2019.
developing sophisticated distributed deep learning algorithms [22] K. N. Patel and R. H. Jhaveri, “A survey on emulation testbeds for
mobile ad-hoc networks,” Procedia Computer Science, vol. 45, pp. 581–
for heterogeneous learning nodes. 591, 2015.
[23] S. V. Pemmaraju and I. A. Pirwani, “Energy conservation via domatic
R EFERENCES partitions,” in Proceeding of the ACM International Symposium on
[1] T. Abdelzaher and et al., “Toward and Internet of Battle Things: A Mobile Ad Hoc Networking and Computing (MOBIHOC), 2006, pp.
resilience perspective,” IEEE Computer magazine, vol. 51, no. 11, pp. 143–154.
24–36, 2018. [24] S. Russel and T. Abdelzaher, “The Internet of Battlefield Things: The
[2] ——, “Will distributed computing revolutionize peace? The emergence next generation of command, control, communications and intelligence
of Battlefield IoT,” in Proceedings of the IEEE International Conference (C3I) decision-making,” in Proceedings of the IEEE Conference on
on Distributed Computing Systems, 2018, pp. 1129–1138. Military Communications, 2018, pp. 737–742.
[3] N. Abuzainab and W. Saad, “Dynamic connectivity game for adversarial [25] I. Stojmenovic, M. Seddigh, and J. Zunic, “Dominating sets and neigh-
Internet of Battlefield Things Systems,” IEEE Internet of Things Journal, bor elimination-based broadcasting algorithms in wireless networks,”
vol. 5, no. 1, pp. 378–390, 2018. IEEE Transactions on Parallel and Distributed Systems, vol. 13, no. 1,
[4] ——, “A multiclass mean-field game for thwarting misinformation pp. 14–25, 2002.
spread in the Internet of Battlefield Things,” IEEE Transactions on [26] Q. Tang, K. Yang, P. Li, J. Zhang, Y. Luo, and B. Xiong, “An energy
Communications, vol. 66, no. 12, pp. 6643–6658, 2018. efficient MCDS construction algorithm for wireless sensor networks,”
[5] A. Azmoodeh, A. Dehghantanha, and K.-K. R. Choo, “Robust mal- EURASIP Journal on Wireless Communications and Networking, no. 1,
ware detection for Internet of (Battlefield) Things devices using deep p. 83, 2012.
eigenspace learning,” IEEE Transactions on Sustainable Computing, [27] D. K. Tosh, S. Shetty, P. Foytik, L. Njilla, and C. A. Kamhoua,
vol. 4, no. 1, pp. 88–95, 2019. “Blockchain-empowered secure Internet-of-Battlefield Things (IoBT)
[6] P. Basaras, G. Iosifidis, D. Katsaros, and L. Tassiulas, “Identifying architecture,” in Proceedings of the IEEE Military Communications
influential spreaders in complex multilayer networks: A centrality per- Conference (MILCOM), 2018.
spective,” IEEE Transactions on Network Science and Engineering, [28] J. Wu and F. Dai, “Broadcasting in ad hoc networks based on self-
vol. 6, no. 1, pp. 31–45, 2019. pruning,” in Proceedings of the IEEE Conference on Computer Com-
[7] S. Boccaletti, G. Bianconi, R. Criado, C. I. del Genio, J. Gomez- munications (INFOCOM), vol. 3, 2003, pp. 2240–2250.
Gardenes, M. Romance, I. Sendina-Nadal, Z. Wang, and M. Zanin, “The [29] J. Wu and H. Li, “On calculating connected dominating set for efficient
structure and dynamics of multilayer networks,” Physics Reports, vol. routing in ad hoc wireless networks,” in Proceedings of the Workshop
544, pp. 1–222, 2014. on Discrete Algorithms and Methods for Mobile Computing and Com-
[8] A. Castiglione, K.-K. R. Choo, M. Nappi, and S. Ricciardi, “Context munications (DIAL-M), 1999, pp. 7–14.
aware ubiquitous biometrics in edge of military things,” IEEE Cloud [30] J. Yu, N. Wang, G. Wang, and D. Yu, “Connected dominating sets
Computing magazine, vol. 4, no. 6, pp. 16–20, 2017. in wireless ad hoc and sensor networks: A comprehensive survey,”
Computer Communications, vol. 24, no. 6, pp. 121—-134, 2013.