Wireless Sensor Networks Self-Healing Professor Jack Stankovic University of Virginia 2005.

Slides:



Advertisements
Similar presentations
Cyber-Physical Systems: Aspects as a Basis for Robustness and Openness John A. Stankovic Department of Computer Science University of Virginia March 2009.
Advertisements

1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Agreement: Byzantine Generals UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department CS 739 Distributed Systems Andrea C. Arpaci-Dusseau Paper: “The.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Transmission Power Control in Wireless Sensor Networks CS577 Project by Andrew Keating 1.
Walter Binder University of Lugano, Switzerland Niranjan Suri IHMC, Florida, USA Green Computing: Energy Consumption Optimized Service Hosting.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Kyung Tae Kim, Hee Yong Youn (Sungkyunkwan University)
Introduction to Wireless Sensor Networks
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Luca De Nardis Ranging and positioning in UWB ad- hoc networks Problem definition.
Differentiated Surveillance for Sensor Networks Ting Yan, Tian He, John A. Stankovic CS294-1 Jonathan Hui November 20, 2003.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
2/23/2009CS50901 Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial Fred B. Schneider Presenter: Aly Farahat.
Autonomic Wireless Sensor Networks: Intelligent Ubiquitous Sensing G.M.P. O’Hare, M.J. O’Grady, A. Ruzzelli, R. Tynan Adaptive Information Cluster (AIC)
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 13th Lecture Christian Schindelhauer.
Sensor Node Architecture Issues Stefan Dulman
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
GS 3 GS 3 : Scalable Self-configuration and Self-healing in Wireless Networks Hongwei Zhang & Anish Arora.
Radio-Triggered Wake-Up Capability for Sensor Networks Soji Sajuyigbe Duke University Slides adapted from: Wireless Sensor Networks Power Management Prof.
Ted Herman/March Time, Synchronization, and Wireless Sensor Networks Part II Ted Herman University of Iowa.
Fault Tolerance in ZigBee Wireless Sensor Networks
Achieving Long-Term Surveillance in VigilNet Pascal A. Vicaire Department of Computer Science University of Virginia Charlottesville, USA.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Authors: Joaquim Azevedo, Filipe Santos, Maurício Rodrigues, and Luís Aguiar Form : IET Wireless Sensor Systems Speaker: Hao-Wei Lu sleeping zigbee networks.
Network Topologies.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Tracking Mobile Sensor Nodes in Wildlife Francine Lalooses Hengky Susanto EE194-Professor Chang.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
Decentralized Scattering of Wake-up Times in Wireless Sensor Networks Amy L. Murphy ITC-IRST, Trento, Italy joint work with Alessandro Giusti, Politecnico.
Project Introduction 이 상 신 Korea Electronics Technology Institute.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
Description of the monitoring system experimentation on the freight car pSHIELD Demonstrator Testbed Architecture pSHIELD Final Review Meeting, Bruxelles.
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Distributed Systems: Concepts and Design Chapter 1 Pages
Crowd Management System A presentation by Abhinav Golas Mohit Rajani Nilay Vaish Pulkit Gambhir.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Fault Tolerance Computer Programs that Can Fix Themselves! Prof’s Paul Sivilotti and Tim Long Dept. of Computer & Info. Science The Ohio State University.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
High-integrity Sensor Networks Mani Srivastava UCLA.
1 A Context Discovery Middleware for Context-Aware Applications with Heterogeneous Sensors Yu-Min Tseng.
Enabling Self-management of Component-based High-performance Scientific Applications Hua (Maria) Liu and Manish Parashar The Applied Software Systems Laboratory.
University of Virginia Self-Organizing Wireless Sensor Networks in Action A Case Study Computer Science University of Virginia Jack Stankovic.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
DISTIN: Distributed Inference and Optimization in WSNs A Message-Passing Perspective SCOM Team
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
TOPICS INTRODUCTION CLASSIFICATION CHARACTERISTICS APPLICATION RELATED WORK PROBLEM STATEMENT OBJECTIVES PHASES.
Adaptable and Reactive Security for Wireless Sensor Networks John A. Stankovic Department of Computer Science University of Virginia.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
Week#3 Software Quality Engineering.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Presentation transcript:

Wireless Sensor Networks Self-Healing Professor Jack Stankovic University of Virginia 2005

WSN Property Unattended long-term operation –System Initialization Set system parameters –Adapt to Wireless communication changes –Adapt to environmental changes Impact on sensor thresholds, etc. –Adapt to failures –Adapt to workload changes –Adapt to power reductions

Self-Healing One aspect of self-* system –Needs self-monitoring –Self-organizing –Self-managing –Self-calibration (turn-key system?) –Self-power management –… –Called Autonomic Computing

Self-Healing Relates to Fault Tolerance –Mask (correct) an error ECC Are you healed with respect to that error? –Yes for that error, but maybe not the cause! –Detect an error Lost message Re-send message –Ignore error (design for it) Robustness - Act in presence of error (are you healed)? Example: WSN still works if 20% of nodes are dead

Self-Healing Detect and heal –Example: Detect neighbor is “dead”, try restarting it and if successful -> healed From a system perspective –Wide spectrum of capabilities –Not binary

Self-Healing In Localization –Heal: If node fails to obtain location during walking GPS, it gets info from neighbors and uses tri-lateration –Heal: A node detects that it lost its localization information, then re- determines it from its neighbors

Recall APIT Algorithm Assumption: An area covered with heterogeneous nodes. –Anchor nodes equipped with high-powered transmitter. –Location information obtained from GPS. Location estimation by Area-based Approach. Narrow down the location of one node by deciding its presence inside or outside the triangles formed by the anchors. Estimated Location A Green- Anchors Example: 14 anchors, but There are 100s of nodes like A

Self-Healing In Routing –Multiple parents in backbone tree If detect one parent is dead, use the other Local decision on choosing alternative parent is fast Heal: Re-create n-parent tree on system rotation In MAC –Retransmit lost packet –Heal: Enough lost packets -> change power level or other thresholds

Self-Healing In System Initialization –Each phase is coordinated and sequential –If a node is not in-step it becomes silent –Heal: Silent node (possibly) becomes active at next system rotation

Time-Driven System Operation

Self-Healing In Wakeup –Decentralized and if some nodes fail to wake-up it is not a problem because many others will be awake –Heal: If it keeps happening then perhaps increase wakeup preamble and if this works then the wakeup has been healed

Duty Cycle W W Preamble

Self-Healing In Sensing –Fail-stop – use of many sensors in WSN and since targets move, problems are masked (robust) –Heal: Byzantine failure – detect that a node is continuously reporting and shut it down In Tracking –If group leader fails –Heal: Info is still with the group members and is passed to next leader

Group Management (Tracking) Base Station

Underlying Self-Healing in WSN Limited Effect –Clock sync, neighbor discovery, etc. are highly decentralized and local. Single node failures (hopefully) only affect that node and do not propagate to the rest of the network.

Self-Healing Mechanism System Rotation –Can correct many issues –Can be executed based on time –Could be extended to re-run when many failures are detected, BUT this means extra detection messages which affects lifetime and stealthiness!

Security in WSN Solutions from the start System must operate in presence of faults AND attacks Framework for security updates as attacks evolve over time Solution: Adaptable Self-Healing as Security Support in Wireless Sensor Networks

Confluence of Techniques Self-Healing Aspects Decentralized control with diversity Wireless downloads

Adaptive Self-Healing/ Aspects Partition Routing Advice Point Cuts Download New Entities Component-Based WSN Self-Healing MONITORMONITOR

Decentralized Control Redundancy Mask faults Uniformity a problem –Diversity

Wireless Download New executables (or WSN individual components) –Includes monitoring New Join Points and Point Cuts New Advice

Summary Unattended operation over long lifetime –Require self-* Good software design and implementation Good FT techniques Security attack models and healing –Denial of Service –Mis-information (may be of more use in some situations)