H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.

Slides:



Advertisements
Similar presentations
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
Advertisements

Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Weight based Multicast Routing Protocol for Ad hoc Wireless Networks 學生:陳信皇 教授:陳仁暉.
A Distributed Algorithm for the Dead End Problem of Location Based Routing in Sensor Networks Le Zou, Mi Lu, Zixiang Xiong, Department of Electrical Engineering,
A novel Energy-Efficient and Distance- based Clustering approach for Wireless Sensor Networks M. Mehdi Afsar, Mohammad-H. Tayarani-N.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
An Interest-Driven Approach to Integrated Unicast and Multicast Routing in MANETs Rolando Menchaca-Mendez J.J. Garcia-Luna-Aceves 280N Seminar: 4/28/2008.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
KUASAR An efficient and light-weight protocol for routing and data dissemination in ad hoc wireless sensor networks David Andrews Aditya Mandapaka Joe.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Before start… Earlier work single-path routing in sensor networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Ad Hoc Networking Course Instructor: Carlos Pomalaza-Ráez Geographical Routing Using Partial Information for Wireless Ad Hoc Networks Rahul Jain, Anuj.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Ad Hoc Wireless Routing COS 461: Computer Networks
1 The Orphan Problem in ZigBee- based Wireless Sensor Networks IEEE Trans. on Mobile Computing (also in MSWiM 2007) Meng-Shiuan Pan and Yu-Chee Tseng Department.
The Zone Routing Protocol (ZRP)
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Presented by Fei Huang Virginia Tech April 4, 2007.
Wireless Sensor Networks COE 499 Energy Aware Routing
Presented by Chaitanya Nemallapudi Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks Lap Kong.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
Rate-Based Channel Assignment Algorithm for Multi-Channel Multi- Rate Wireless Mesh Networks Sok-Hyong Kim and Young-Joo Suh Department of Computer Science.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
Evaluating Mobility Support in ZigBee Networks
Self-stabilizing energy-efficient multicast for MANETs.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Remote Deployment of Sensor Networks Presentation 3: Providing connectivity between sensor nodes and uplinks.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
An efficient reliable broadcasting protocol for wireless mobile ad hoc networks Chih-Shun Hsu, Yu-Chee Tseng, Jang-Ping Sheu Ad Hoc Networks 2007, vol.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Sensor Network Routing
Net 435: Wireless sensor network (WSN)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
A Routing Protocol for WLAN Mesh
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon

Outline Introduction SPREAD N-to-1 Multipath Discovery Protocol  Motivation and Overview  Phase One: Branch-Aware Flooding  Phase Two: Multipath Extension of Flooding  Performance Evaluation Alternate Path Packet Salvaging Conclusion

Introduction A typical communication task in a wireless sensor network is for every sensor node to sense its local environment, and upon request, send data of interest back to a base station (BS). a hybrid multipath scheme (H-SPREAD) to improve both the security and reliability of this task in a potentially hostile and unreliable wireless sensor network is proposed.

Brief Review Of SPREAD SPREAD ( Security Protocol for REliable dAta Delivery )- enhance data confidentiality in a MANET. A secret message m is transformed into multiple shares, S1, S2,..., by the secret sharing scheme, and then delivered to the destination via the multiple independent paths.

Brief Review Of SPREAD A (T,N) threshold secret sharing scheme could transform a secret into N pieces. The generation of shares is very simple—by evaluating a polynomial of degree (T − 1) f(x) = (a 0 + a 1 x + ・ ・ ・ + a T-1 x T-1 ) mod p at point x = i to obtain the ith share S i = f(i) where a 0, a 1, a 2,..., a T-1 are the secret bits, while p is a large prime number greater than any of the coefficients and can be made public.

N-to-1 Multipath Discovery Protocol - Motivation and Overview (1/3) Berkeley’s TinyOS sensor platform utilizes a flooding- based beaconing protocol. - The BS periodically broadcasts a route update. Each sensor node when receiving the update for the first time rebroadcasts the update and marks the node from which it receives the update as its parent. The algorithm continues recursively until every node in the network has rebroadcasted the update once and found its parent. What follows is that, every node forwards the packets it received or generated to its parent until the packets reach the BS.

N-to-1 Multipath Discovery Protocol - Motivation and Overview (2/3) As illustrated in Fig.1, the beaconing protocol essentially constructs a breadth first spanning tree rooted at a BS. It finds every sensor node a single path back to the BS efficiently. However, reliability and security suffer from the single path routing.

N-to-1 Multipath Discovery Protocol - Motivation and Overview (3/3) The proposed N-to-1 multipath discovery protocol is based on the simple flooding initiated at the BS. Phase  Branch-Aware Flooding - the mechanism is able to find a certain number of node-disjoint paths.  Multipath Extension of Flooding - helps to exchange the node-disjoint paths found in the phase one among the nodes on different branches.

N-to-1 Multipath Discovery Protocol - Phase One: Branch-Aware Flooding (1/5) The general form of the routing messages in both phases is {mtype, mid, nid, bid, cst, path}, where  mtype - type of message We define mtype = “RPRI” for phase one, which refers to a “primary,” because the primary paths (i.e., on the shortest path tree) are found by this type of messages  mid - the sequence number of the current routing update  nid - the identifier of the node sending out the message  bid - the identifier of the branch defined as nid of the node closest to the BS in the branch  path - contains a sequence of nodes, which the message has traveled  cst - the cost of the path

N-to-1 Multipath Discovery Protocol - Phase One: Branch-Aware Flooding (2/5) The propagation of the RPRI messages follows exactly the same way as the TinyOS beaconing protocol. The BS initializes a routing update periodically (or on demand) by broadcasting a message {RPRI, mid, Sink, ∅, 0, (Sink)}. Every node, say z, when hearing a message {RPRI,mid, nid, bid, cst, path} for the first time,  (1) marks a node nid as its parent (2) learns the primary path back to the BS by following the reverse order of p = path + (z).  It then forms a new routing message {RPRI,mid, z, (bid == ∅ )?z : bid, cst + cost(z, parent(z)), path + (z)} and rebroadcasts it.

N-to-1 Multipath Discovery Protocol - Phase One: Branch-Aware Flooding (3/5) in our branch-aware flooding, when a node z hears the same message (i.e., identified by the same mid) from a neighbor, it will check the content of the message and mark the neighbor accordingly.  If the message has the same bid as the node z itself, z will mark that neighbor as a child or sibling, according to the path contained in the message.  If the message has a different bid, which means that the message is from another branch, z will mark that neighbor as a cousin.

N-to-1 Multipath Discovery Protocol - Phase One: Branch-Aware Flooding (4/5) Node z maintains an alternate path set Qz. Once receiving a message from a cousin node, z will further examine the path contained in the message. If the new path q = path + (z) is disjoint from the primary path p and any other alternate path with a lower cost in Qz, the new path q will be included into the Qz, while at the same time, paths with higher cost than q that share common nodes with q will be removed from Qz. Same as the beaconing protocol, the propagation of the RPRI messages is terminated at the leaf nodes when each node has rebroadcasted the message once and only once.

N-to-1 Multipath Discovery Protocol - Phase One: Branch-Aware Flooding (5/5) The maximum number of the node-disjoint paths from any node to the BS is thus bounded by the number of branches. ex : node w has the primary path (w − r − l − g − d − Sink), the alternate path (w − v − q − k − e − a − Sink) when overhearing the v’s broadcast.

N-to-1 Multipath Discovery Protocol Phase Two: Multipath Extension of Flooding (1/4) The ability of finding extra paths by the branch-aware flooding is limited to nodes that have cousin neighbors. The rationale behind the design - to maximize the number of disjoint paths at each node by further propagating the alternate paths found at the phase one across the multiple branches.

N-to-1 Multipath Discovery Protocol Phase Two: Multipath Extension of Flooding (2/4) Phase two message exchange uses the same message format but with mtype field set to “RALT”, which refers to “alternate,” because this type of messages finds the alternate paths. The propagation of the RALT messages is initiated distributively and independently at each node, where an alternate disjoint path(s) is found during the branch- aware flooding. For each alternate path q, node z forms a RALT message {RALT, mid, z, q.bid, q.cst, q} and broadcasts it in its neighborhood.

N-to-1 Multipath Discovery Protocol Phase Two: Multipath Extension of Flooding (3/4) Upon receiving a RALT message {RALT,mid, nid, bid, cst, path}  From its parent - ignore  Others - check if itself is already in the path If not, node z learns about a new path q = path + (z). * Again, node z includes the new path q into its alternate path set Qz, if q is disjoint from any other paths in Qz of lower cost. * If q is included, node z excludes from the path set Qz paths of higher cost and intersecting with q. * Whenever a new path q is added to Qz, node z forms a new RALT message {RALT, mid, z, q.bid, q.cst, q} and broadcasts it in the neighborhood.

N-to-1 Multipath Discovery Protocol Phase Two: Multipath Extension of Flooding (4/4) The propagation of the RALT messages terminates when no new disjoint path is added to any path set. ex : node r has the primary path (r − l − g − d − Sink). When it hears a disjoint path (w − v − q − k − e − a − Sink) from w, it learns a new disjoint path (r − w − v − q − k − e − a − Sink). Tradeoff : additional routing messages

N-to-1 Multipath Discovery Protocol - Performance Evaluation (1/5) We use simulations to evaluate the performance of the proposed N-to-1 multipath routing protocol.  We simulate the WSN consisting of 100 nodes randomly deployed in a field of 100 × 100-m square area.  The BS is located in the middle of one edge.  Table I summarizes some topological parameters of the networks simulated when using a different transmission ranges - the average node degree d (i.e., the number of neighbors a node has) - the average network diameter D (i.e., the maximum hop count from any sensor node to the BS based on the shortest path routing).

N-to-1 Multipath Discovery Protocol - Performance Evaluation (2/5) Results : in general, the routing algorithm is very efficient in terms of path finding— the per path cost is less than one message.

N-to-1 Multipath Discovery Protocol - Performance Evaluation (3/5) Fig. 5 shows the distribution of nodes in terms of their distances from the BS.

N-to-1 Multipath Discovery Protocol - Performance Evaluation (4/5) Fig. 6 depicts the average number of node-disjoint paths found per node with regard to the distance between the sensor nodes and the BS. Results : the closer the node to the BS, the more paths from that node to the BS. Nodes that are closer to the BS would be used more for forwarding traffic, thus, it is more desirable for those nodes to be more reliable.

N-to-1 Multipath Discovery Protocol - Performance Evaluation (5/5) Fig.7 shows the average hop count per path correspondingly. The dotted line is plotted as the reference, indicating the shortest distance to the BS. Results : the average path length is typically one or two hops longer than the shortest path.

Alternate Path Packet Salvaging the multipath routing is effective in improving the reliability in the face of persistent errors, such as the node failure or persistent link errors (i.e., pure-erasure- channel model), while it does not help in the case that the loss of packets is due to intermittent link failures.

Conclusion N-to-1 multipath discovery protocol is receiver- initiated (in contrast to the common source- initiated route discovery). The proposed hybrid multipath data collection scheme is more resilient to node/link failures and a collusive attack of the compromised nodes. It is effective in improving both reliability and security at the same time.