CS2510 Fault Tolerance and Privacy in Wireless Sensor Networks partially based on presentation by Sameh Gobriel.

Slides:



Advertisements
Similar presentations
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
Advertisements

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
Sensor network Routing protocol A study on LEACH protocol and how to improve it.
Introduction to Wireless Sensor Networks
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Efficient aggregation of encrypted data in Wireless Sensor Network Author: Einar Mykletun, Gene Tsudik Presented by Yi Cheng Lin Date: March 13, 2007.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols.
A Data Fusion Approach for Power Saving in Wireless Sensor Networks Reporter : Chi-You Chen.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
1 On Handling QoS Traffic in Wireless Sensor Networks 吳勇慶.
Security Issues In Sensor Networks By Priya Palanivelu.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
 Idit Keidar, Technion Intel Academic Seminars, February Octopus A Fault-Tolerant and Efficient Ad-hoc Routing Protocol Idit Keidar, Technion Joint.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
A Transmission Control Scheme for Media Access in Sensor Networks Presented by Jianhua Shao.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Wireless Sensor Network Security Anuj Nagar CS 590.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
CS Dept, City Univ.1 Research Issues in Wireless Sensor Networks Prof. Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Protocols for Self-Organization of a Wireless Sensor Network K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie IEEE Personal Comm., Oct Presented.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
AN ENERGY CONSUMPTION ANALYTIC MODEL FOR WIRELESS SENSOR MAC PROTOCOL ERIC MAKITA SEPTEMBRE
Query Processing for Sensor Networks Yong Yao and Johannes Gehrke (Presentation: Anne Denton March 8, 2003)
Multi-Resolution Spatial and Temporal Coding in a Wireless Sensor Network for Long-Term Monitoring Applications You-Chiun Wang, Member, IEEE, Yao-Yu Hsieh,
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
 SNU INC Lab MOBICOM 2002 Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, John Heidemann, and Fabio Silva.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
DATA AGGREGATION Siddhartha Sarkar Roll no: CSE-4 th Year-7 th semester Sensor Networks (CS 704D) Assignment.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
KAIS T Distributed cross-layer scheduling for In-network sensor query processing PERCOM (THU) Lee Cheol-Ki Network & Security Lab.
Tufts Wireless Laboratory Tufts University School Of Engineering Real-Time Data Services for Cyber Physical Systems Zhong Zou.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Ching-Ju Lin Institute of Networking and Multimedia NTU
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
By: Gang Zhou Computer Science Department University of Virginia 1 Medians and Beyond: New Aggregation Techniques for Sensor Networks CS851 Seminar Presentation.
Delivery ratio-maximized wakeup scheduling for ultra-low duty-cycled WSNs under real-time constraints Fei Yang, Isabelle Augé-Blum National Institute of.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
Dynamic Link Labels for Energy Efficient MAC Headers in Wireless Sensor Networks Sheng-Shih Wang Gautam Kulkarni, Curt Schurgers, and Mani Srivastava IEEE.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
Wireless Sensor Networks
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Energy-Efficient Protocols for communication in Biosensor networks.
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Energy Efficiency Energy consumption is the most important factor to determine the life of sensor network. since sensors networks has low power resources,
In the name of God.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Protocols.
Aggregation.
Protocols.
Presentation transcript:

CS2510 Fault Tolerance and Privacy in Wireless Sensor Networks partially based on presentation by Sameh Gobriel

Agenda Introduction to Wireless Sensor Networks (WSNs) Challenges and constraints in WSNs In-network Aggregation RideSharing fault tolerance protocol Secure RideSharing, privacy-preserving and fault tolerance protocol

Conventional Wireless Networks Typical conventional wireless networks are  Infrastructure-based (access point).  Single hop communication  Uses a contention-based MAC access protocol

Adhoc and Sensor Wireless Networks No Backbone infrastructure. Multihop wireless communication. Nodes are mobile and network topology is dynamic.

SPARC/Solaris Systems Applications are countless... Parking lot monitoring Adhoc and Sensor Wireless Networks Professional Care giving for seniors Habitat and environmental monitoring Health Monitoring Body Embedded Network Participatory sensing Military

Challenges  Nodes are low power, low cost devices.  Very limited supply energy.  Required Lifetime of months or even years.  It may be hard (or undesirable) to retrieve the nodes to change or recharge the batteries.  Considerable challenge on the “Energy Consumption”.

Constraints  These challenges induce constraints on the protocols developed to achieve:  Communication  Data Fusion  Fault Tolerance  Security

Energy Consumption Power (mW) SensingCPUTXRXIDLESLEEP

In-network Aggregation  In-network aggregation  Energy Efficient data fusion in WSNs  Each sensor monitors the area around it  Sensor is supposed to send its data to the end user.

In-network Aggregation End user is not interested in individual sensor readings Global system information.

Tree-Construction and Data Reporting

 Sending raw data is expensive Data aggregation (in-network processing) can save a lot of overhead What are potential problems that you can think of with in- network aggregation?

Frequent Errors  When an error occurs  A subtree of values is lost  Incorrect result reported to the user Wireless links are unreliable Nodes energy depleted Hazardous environment Objective: Fault-tolerant aggregation and routing scheme for WSN

Fault Tolerant aggregation: Retransmission  When an error occurs, retransmit the lost value Delayed Query response: Each level has to wait for possible retransmissions before its own Packet Overhead: Packet overhead because some handshake is required

Fault Tolerant aggregation: Multipath Routing  A node attached itself to all parents it can hear from.  When a link fails, the node value is not lost. What could be the problem with this scheme ?

Duplicate Sensitive Aggregation Duplicate insensitive aggregation: Max(5, 7, 10, 4, 10) Duplicate sensitive aggregation: Sum, Avg, Count, … RideSharing: Fault-tolerant duplicate sensitive aggregation and routing scheme for WSN

RideSharing: General Idea Node selects a primary parents and backup parents If error free:  Child broadcasts value to all parents  Only primary aggregates it

RideSharing: General Idea When a link error occurs between child and primary  Backup parent detects it (small bit vector 2 bit per child)  Backup parent aggregates the missed child value in its message (if it has not sent its own yet) In case of error  value of a node rideshares with the backup parent’s value

RS Detection: Bit Vector

RS Correctness Parents have to be in communication range Primary has to send before backup Backup overhears primary error-free

RideSharing Overhead 1. Child broadcast to all parents (no overhead). 2. Primary (or backup) aggregates the value and broadcast one message to parents (no overhead). No overhead for error correction but only for error detection:  Parents listen to children  Detection of primary link failure [small bit vector]

Cascaded RideSharing Error free case, primary aggregates child value In case of one link error, child value rideshares with first backup parent In case of two link errors 2 nd backup handles it

What about Privacy ?! Applications Collaborative sensing over shared infrastructure text Monitoring Sensors

Attack Model stealthily infiltrate the network to eavesdrop stealthily infiltrate the network to eavesdrop Honest-but-Curious Quiet infiltrators correctly aggregate, but eavesdrop

New Privacy-Preserving Fault Tolerant Protocol for in-network aggregation in WSN Additively homomorphic stream ciphers Cascaded Ridesharing Privacy Preservation Robustness

Secure RideSharing Protocol 1.Each sensor n i encrypts its value v i as c i = v i + g i (k i ) mod M, and sets its corresponding bit in the P-Vector. 2. The resulting c i values are aggregated using the Cascaded RideSharing protocol, which results in the sink receiving the value C = ∑ i c i mod M. 3. The sink computes the aggregate key value K = ∑ i g i (k i ) mod M for each i ϵ P- Vector. 4.The sink extracts the final aggregate value V = ∑ i v i = C − K mod M. Protocol ERROR OK “Got it” c i = v i + g i (k i ) mod M P-Vector[i] = 1 L-Vector n1n1 n2n2 n … nini r-bit = 0 e-bit =1

Secure RideSharing Protocol P-Vector n1n1 n2n2 n … nini njnj c i ; P-Vector[i] = 1 c j ; P-Vector[j] = 1 Now I can recover the plain aggregate value given the P- vector

Evaluation Comparison of four protocols using the CSIM simulator Spanning-tree: no fault tolerance, but efficient for power! Cascaded RideSharing Our confidentiality-preserving fault-tolerant aggregation protocol Our protocol with state compression Comparison metrics: Average relative RMS error in aggregated results Average energy consumed per node per epoch Average message size transmitted per node per epoch Parameter Value Ranges Total number of nodes 300, 400, 500,...,1000 Link error rate 0.05, 0.10,..., 0.35 Number of primary + backup parents max(3) Participation level (% of nodes reporting values) 1.5%, 2.5%, 5%,..., 25% S IMULATION P ARAMETERS

More Simulation Parameters Parameter Possible values Square area 320×320 ft 2 grid Radio range of each node 30 ft Simulations 10 simulation runs each 30 epochs Sensor Nodes Mica2 Data Transmission power consumption65 mW Listening and reception power consumption21 mW Network Bandwidth38.4 Kbps Crypto usedRC4 stream cipher Optimization (Compression)RLE standard compression S IMULATION P ARAMETERS -- cont

1- Effect of Link Error Rate 48.2% improvement in RMS Constant overhead

2- Effect of Participation Level Only 7.1% increase Only 3.6% increase

3- Effect of Network Density 90.2% improvement using optimization

Thank you