Robust Communication Primitives in Sensor Networks - PowerPoint PPT Presentation

1 / 21
About This Presentation
Title:

Robust Communication Primitives in Sensor Networks

Description:

Saurabh Bagchi Dependable Computing Systems Lab School of Electrical and Computer Engineering Purdue University Joint work with: Issa Khalil, Gunjan Khanna, Ravish ... – PowerPoint PPT presentation

Number of Views:125
Avg rating:3.0/5.0
Slides: 22
Provided by: CenterforR150
Category:

less

Transcript and Presenter's Notes

Title: Robust Communication Primitives in Sensor Networks


1
Robust Communication Primitives in Sensor
Networks
Saurabh Bagchi Dependable Computing Systems
Lab School of Electrical and Computer
Engineering Purdue University Joint work with
Issa Khalil, Gunjan Khanna, Ravish Khosla, Ness
Shroff
http//shay.ecn.purdue.edu/dcsl
2
Sensor Nodes Nature of the Beast
  • Miniature platform for
  • Sensing Integrated sensor board with sensors for
    temperature, pressure, humidity, etc.
  • Computation Low power Atmel processor with 128
    KB programming and 512 KB data memory
  • Communication Low range ISM band transceiver
  • Constraints
  • Class I Energy, Bandwidth, Fragility
  • Class II Processor, Memory

Radio-Processor Board
Sensor Board
Interface Board
3
Dependable Sensor Networking
  • Dependability is the property of a system to
    tolerate failures, be it from natural errors or
    malicious errors, aka security attacks

Dependability
Resilience to natural errors, i.e., Reliability
Resilience to malicious errors, i.e., Security
Why for Sensors?
Why for Sensors?
  1. Placed in hostile environments
  2. Adversaries have huge gains from compromising
    sensor network
  3. Low cost rules out tamper proof hardware
  4. Omni-directional wireless links
  1. The nodes are failure prone
  2. The wireless links are failure prone
  3. Placed in hazardous environments
  4. Sometimes used for detection of critical events

4
Application Domains
Domains Domains Sample Applications
Military Military Target tracking, battlefield surveillance
Civilian Private Healthcare monitoring, Environmental monitoring, Household security
Civilian Public Infrastructure monitoring, Water quality monitoring
5
What is data dissemination?
  • There are some sources of sensory data
  • Possibly sources with overlapping sensing regions
  • There are some nodes interested in sensory data
  • Maybe resource constrained nodes themselves
  • Can be cluster heads in hierarchical
    communication
  • Alternately, can be a moving data collector

Control center Cluster heads Sensor nodes
6
What is Reliable Data Dissemination?
  • Challenge Need to get data from source to
    destination
  • Handle any-to-any communication
  • Optimized for common communication pattern
  • Capt. Edward Murphy said
  • If a sensor node can fail, it will eventually
  • If a sensor network link can fail, it will
    eventually
  • Capt. Edward Murphy also said
  • If a sensor node can move, it will eventually
  • Reliable data dissemination is achieving
    continuous stream of data from source to
    destination in the face of the above Murphys
    laws

7
Some Current Approaches for Reliable Data
Dissemination
  • Flooding

N7
N6
N1
N3
N5
S
T
T
T
N4
N2
  • Con
  • Many many redundant transmissions leading to
    inefficient energy usage

8
Some Current Approaches for Reliable Data
Dissemination
  • Direct Communication with Base Station

Base Station
C
9
Our Approach
  • Hybrid of Push and Pull
  • Push From source towards sink
  • Pull Interested sink nodes query and pull data
    from relevant sources
  • Approach
  • Use meta data transmissions to reduce redundant
    transmissions
  • Advertise the data prior to sending the data
  • Only interested nodes pull data
  • Reduces collisions and energy wastage

B
ADV
REQ
DAT
S
S Sender B Interested node C Disinterested node
C
ADV
10
Shortest Path Minded SPIN (SPMS)
  • Timers
  • TimeOutADV Nodes wait for the data to come to
    the nearest node before sending REQ
  • TimeOutDAT Nodes wait for the data after sending
    the REQ packet

3
4
REQ
ADV
ADV
ADV
ADV
ADV
1
DAT
6
DAT
REQ
5
REQ
DAT
2
ADV
ADV
11
SPMS Protocol Failure Scenario
  • Resilience to Failures
  • After a TimeOutADV expires, node sends the
    request to PRONE through the shortest path
  • DATA is received using the same path if there is
    no failure
  • Incase of a failure TimeOutDAT occurs
  • Node directly sends the REQ packet to PRONE
  • In case PRONE is also not responding then the REQ
    is sent to SCONE
  • Failures tolerated
  • Intermediate nodes
  • Source node

12
SPMS Failure Scenario
3
4
ADV
ADV
ADV
ADV
ADV
1
6
TimeOut_ADV
TimeOut_DAT
REQ
DATA
REQ
5
2
13
Energy and Delay Analysis
  • Time to get data from source to adjacent
    destination is defined as Tround

D
ADV
REQ
DAT
S
Tround G.n12 A.Ttx Tproc G.ns2 R.Ttx
Tproc G.ns2 D.Ttx
Tround G.n12 (ARD).Ttx 2Tproc 2G.ns2
14
Energy and Delay Analysis
  • In case of K relay nodes between two nodes
  • The ratio of energy between SPIN and SPMS can be
    given by

ESPMS k.A.E1 k.(DR).Emk.(ADR).Er
ESPIN (ADR).E1 (ADR).Er
15
Energy and Delay Comparisons Equation Plots
SPIN uses more energy than SPMS as relay nodes
increase.
Delay advantage of SPMS decreases as relay nodes
increase.
16
Simulations
  • SPMS protocol is simulated in ns-2 and compared
    with SPIN
  • We vary the transmission radius and the number of
    nodes
  • Crossbow data sheet is used to calculate the
    power spent in transmission and receiving
    packets.
  • Experiments are carried out for two topologies
  • All to All communication Every node requests
    data from every other data
  • Cluster Based Hierarchical Communication Cluster
    heads collect the data and send it to the sink
    using SPMS
  • Experiments for failure free and failure
    scenarios
  • Failures are transient and follow exponential
    inter-arrival times
  • Results
  • Energy saving with and without failure, with
    mobility, increases with increasing sensor field
    size
  • Delay improvement increases with increasing
    sensor field size

17
Optimizations for Failure and Mobility
  • Failure optimized SPMS
  • Avoid sending REQ through a suspected failed path
  • Inform neighbors of suspected failed path
  • Mobility optimized SPMS
  • Avoid Bellman Ford on entire zone if node moves
    in
  • Incremental computation in a lazy manner

18
Secure Communication Primitive
  • Different types of attacks
  • Control traffic, vs. Data traffic
  • Message tampering, eavesdropping, and ID spoofing
  • Nodes may be compromised
  • Symmetric key cryptography can be used
  • Need to manage the keys
  • Energy efficient
  • Latency sensitive
  • Capt. Edward Murphy also said
  • Dont trust thy neighbor

19
Our Approach SECOS
  • All the above goals are realized in protocol
    called SECOS
  • Base station is fixed, secure, and has no
    resource constraints
  • All other nodes are generic sensor nodes and have
    all the typical resource constraints
  • Guarantee Compromising any number of nodes in
    the network does not compromise the session
    between two legitimate nodes

20
Take Away Lessons
  • Communication protocols in sensor networks have
    to be designed with
  • Failures in mind
  • Node compromise in mind
  • Trade-offs exist between latency and energy
    consumption and customizable protocols that fit
    different regions of trade-off curve are
    desirable
  • Desirable characteristics of large class of
    sensor network communication protocols
  • No privileged nodes
  • No node trusted completely

21
Questions Anyone?
Ness Shroff
Gunjan Khanna
Issa Khalil
  • Fault Tolerant Energy Aware Data Dissemination
    Protocol in Sensor Network, Gunjan Khanna,
    Saurabh Bagchi, Yu-Sung Wu. At IEEE Dependable
    Systems and Networks Conference (DSN 2004), June
    28-July 1, 2004, Florence, Italy.
  • Analysis and Evaluation of SECOS, A Protocol for
    Energy Efficient and Secure Communication in
    Sensor Networks, Issa Khalil, Saurabh Bagchi,
    Ness Shroff. Submitted to Ad-hoc Networks
    Journal, September 2004. Available as CERIAS Tech
    Report from home page.
Write a Comment
User Comments (0)
About PowerShow.com