Abstract
This article presents a hierarchical approach for detecting faults in wireless sensor networks (WSNs) after they have been deployed. The developers of WSNs can specify “invariants” that must be satisfied by the WSNs. We present a framework, Hierarchical SEnsor Network Debugging (H-SEND), for lightweight checking of invariants. H-SEND is able to detect a large class of faults in data-gathering WSNs, and leverages the existing message flow in the network by buffering and piggybacking messages. H-SEND checks as closely to the source of a fault as possible, pinpointing the fault quickly and efficiently in terms of additional network traffic. Therefore, H-SEND is suited to bandwidth or communication energy constrained networks. A specification expression is provided for specifying invariants so that a protocol developer can write behavioral level invariants. We hypothesize that data from sensor nodes does not change dramatically, but rather changes gradually over time. We extend our framework for the invariants that includes values determined at run-time in order to detect data trends. The value range can be based on information local to a single node or the surrounding nodes' values. Using our system, developers can write invariants to detect data trends without prior knowledge of correct values. Automatic value detection can be used to detect anomalies that cannot be detected in existing WSNs. To demonstrate the benefits of run-time range detection and fault checking, we construct a prototype WSN using CO2 and temperature sensors coupled to Mica2 motes. We show that our method can detect sudden changes of the environments with little overhead in communication, computation, and storage.
- An Huang, Y. and Lee, W. 2003. A cooperative intrusion detection system for ad hoc networks. In ACM Workshop on Security of Ad Hoc and Sensor Networks. 135--147. Google Scholar
Digital Library
- Buchegger, S. and Boudec, J.-Y. L. 2002. Performance analysis of the CONFIDANT protocol. In ACM International Symposium on Mobile Ad Hoc Networking & Computing. 226--236. Google Scholar
Digital Library
- Diaz, M., Juanole, G., and Courtiat, J.-P. 1994. Observer---A concept for formal on-line validation of distributed systems. IEEE Trans. Softw. Engin. 20, 12. Google Scholar
Digital Library
- Dolev, S., Israeli, A., and Moran, S. 1997. Uniform dynamic self-stabilizing leader election. IEEE Trans. Para. Distrib. Syst. 8, 4 (Apr.), 424--440. Google Scholar
Digital Library
- Emmerich, S. 1996. Demand-controlled ventilation in a multi-zone office building. Fuel and Energy Abstracts 37, 4, 294--294.Google Scholar
- Erdmann, C. A., Stiener, K. C., and Apte, M. G. 2002. Indoor carbon dioxide concentrations and sick building syndrome symptoms in the base study revisited: Analysis of the 100 building dataset. In Indoor Air. 443--448.Google Scholar
- Ernst, M. D., Cockrell, J., Griswold, W. G., and Notkin, D. 2001. Dynamically discovering likely program invariants to support program evolution. IEEE Trans. Softw. Engin. 27, 2 (Feb.), 99--123. Google Scholar
Digital Library
- Goldsmith, S., O'Callahan, R., and Aiken, A. 2005. Relational queries over program traces. In ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications. 385--402. Google Scholar
Digital Library
- Haghighat, F. and Donnini, G. 1992. IAQ and energy-management by demand controlled ventilation. Environ. Techno. 13, 4, 351--359.Google Scholar
Cross Ref
- Hamlet, D. 2005. Invariants and state in testing and formal methods. In ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering. 48--51. Google Scholar
Digital Library
- Hangal, S. and Lam, M. S. 2002. Tracking down software bugs using automatic anomaly detection. In International Conference on Software Engineering. 291--301. Google Scholar
Digital Library
- Heinzelman, W. B., Chandrakasan, A. P., and Balakrishnan, H. 2002. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Comm. 1, 4 (Oct.), 660--670. Google Scholar
Digital Library
- Heinzelman, W. R., Chandrakasan, A., and Balakrishnan, H. 2000. Energy-efficient communication protocol for wireless microsensor networks. In Hawaii International Conference on System Sciences. 2, 1--10. Google Scholar
Digital Library
- Herbert, D., Lu, Y.-H., Bagchi, S., and Li, Z. 2006. Detection and repair of software errors in hierarchical sensor networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. 403--410. Google Scholar
Cross Ref
- Herbert, D., Modelo-Howard, G., Perez-Toro, C., and Bagchi, S. 2007. Fault tolerant ARIMA-based aggregation of data in sensor networks. IEEE International Conference on Dependable Systems and Networks.Google Scholar
- Herbert, D., Sundaram, V., Albin, L., Lu, Y.-H., Bagchi, S., and Li, Z. 2007. Pervasive carbon dioxide and temperature monitoring utilizing large numbers of low-cost wireless sensors. American Industrial Hygiene Conference and Expo. 163.Google Scholar
- Hill, J. L. and Culler, D. E. 2002. Mica: A wireless platform for deeply embedded networks. IEEE Micro. 22, 6 (Nov.-Dec.), 12--24. Google Scholar
Digital Library
- Hui, J. W. and Culler, D. 2004. The dynamic behavior of a data dissemination protocol for network programming at scale. In International Conference on Embedded Networked Sensor Systems. 81--94. Google Scholar
Digital Library
- Khalil, I., Bagchi, S., and Nina-Rotaru, C. 2005. DICAS: Detection, diagnosis, and isolation of control attacks in sensor networks. In International Conference on Security and Privacy for Emerging Areas in Communications Networks. 89--100. Google Scholar
Digital Library
- Khalil, I., Bagchi, S., and Shroff, N. B. 2005. LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. In IEEE International Conference on Dependable Systems and Networks. 612--621. Google Scholar
Digital Library
- Khalil, I., Bagchi, S., and Shroff, N. B. 2006. MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks. In IEEE International Conference on Security and Privacy in Communication Networks.Google Scholar
- Khanna, G., Varadharajan, P., and Bagchi, S. 2004. Self checking network protocols: A monitor based approach. In International Symposium on Reliable Distributed Systems. 18--30. Google Scholar
Digital Library
- Kumar, N., Childers, B. R., and Soffa, M. L. 2005. Low overhead program monitoring and profiling. In ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering. 28--34. Google Scholar
Digital Library
- Lamport, L., Shostak, R., and Pease, M. 1982. The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4, 3 (July), 382--401. Google Scholar
Digital Library
- Levis, P., Lee, N., Welsh, M., and Culler, D. 2003. TOSSIM: Accurate and scalable simulation of entire tinyOS applications. In International Conference on Embedded Networked Sensor Systems. 126--137. Google Scholar
Digital Library
- Liao, C.-M., Chang, C.-F., and Liang, H.-M. 2005. A probabilistic transmission dynamic model to access indoor airborne infection risks. Risk Analysis. 25, 5, 1097--1107.Google Scholar
Cross Ref
- Lindsey, S., Raghavendra, C., and Sivalingam, K. M. 2002. Data gathering algorithms in sensor networks using energy metrics. IEEE Trans. Paral. and Distrib. Syst. 13, 9 (Sept.), 924--935. Google Scholar
Digital Library
- Lynch, N. A. 1996. Distributed Algorithms. Morgan Kaufmann. Google Scholar
Digital Library
- Mahaney, S. R. and Schneider, F. B. 1985. Inexact agreement: Accuracy, precision, and graceful degradation. ACM Symposium on Principles of Distributed Computing. 237--249. Google Scholar
Digital Library
- Marti, S., Giuli, T. J., Lai, K., and Baker, M. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In International Conference on Mobile Computing and Networking. 255--265. Google Scholar
Digital Library
- Marzullo, K. 1990. Tolerating failures of continuous-valued sensors. ACM Trans. Comput. Syst., 8, 4 (Nov.), 284--304. Google Scholar
Digital Library
- Medidi, S. R., Medidi, M., and Gavini, S. 2003. Detecting packet-dropping faults in mobile ad-hoc networks. In IEEE ASILOMAR Conference on Signals, Systems and Computers.Google Scholar
- Milton, D. K., Glencross, P. M., and Walters, M. D. 2000. Risk of sick leave associated with outdoor air supply rate, humidification, and occupant complaints. Indoor Air 10, 4 (Dec.), 212--221.Google Scholar
Cross Ref
- Min, R., Bhardwaj, M., Cho, S.-H., Shih, E., Sinha, A., Wang, A., and Chandrakasan, A. 2001. Low-power wireless sensor networks. In International Conference on VLSI Design. 205--210. Google Scholar
Digital Library
- Muruganathan, S. D., Ma, D. C. F., Bhasin, R. I., and Fapojuwo, A. O. 2005. A centralized energy-efficient routing protocol for wireless sensor networks. IEEE Commun. Mag. 43, 3 (Mar.), 8--13. Google Scholar
Digital Library
- Myatt, T. A., Johnston, S. L., Zuo, Z., Wand, M., Kebadze, T., Rudnick, S., and Milton, D. K. 2004. Detection of airborne rhinovirus and its relation to outdoor air supply in office environments. Amer. J. Respir. Critic. Care Med. 169, 1187--1190.Google Scholar
Cross Ref
- Nakano, K. and Olariu, S. 2002. A survey on leader election protocols for radio networks. In International Symposium on Parallel Architectures, Algorithms and Networks. 63--68. Google Scholar
Digital Library
- Nasipuri, A., Castaneda, R., and Das, S. R., 2001. Performance of multipath routing for on-demand protocols in mobile ad hoc networks. Mobile Netw. Appl. 6, 4, 339--349. Google Scholar
Digital Library
- Perkins, J. H. and Ernst, M. D. 2004. Efficient incremental algorithms for dynamic detection of likely invariants. In ACM SIGSOFT International Symposium on Foundation of Software Engineering. 23--32. Google Scholar
Digital Library
- Pirzada, A. A. and McDonald, C. Establishing trust in pure ad hoc networks. In Conference on Australasian Computer Science. Google Scholar
Digital Library
- Ramanathan, N., Chang, K., Kapur, R., Girod, L., Kohler, E., and Estrin, D. 2005. Sympathy for the sensor network debugger. In International Conference On Embedded Networked Sensor Systems. 255--267. Google Scholar
Digital Library
- Rudnick, S. N. and Milton, D. K. 2003. Risk of indoor airborne infection transmission estimated from carbon dioxide concentration. Indoor Air 13, 3 (Sept.), 237--245.Google Scholar
Cross Ref
- Seppanen, O. A., Fisk, W. J., and Mendell, M. J. 1999. Association of ventilation rates and CO2 concentrations with health and other responses in commercial and institutional buildings. Indoor Air. 226--252.Google Scholar
- Singh, G. 1996. Leader election in the presence of link failures. IEEE Trans. Paral. Distrib. Syst. 7, 3 (March), 231--236. Google Scholar
Digital Library
- Smith, B. R., Murthy, S., and Garcia-Luna-Aceves, J. J. 1997. Securing distance-vector routing protocols. In Proceedings of the Symposium on Network and Distributed System Security. 85--92. Google Scholar
Digital Library
- Soro, S. and Heinzelman, W. B. 2005. Prolonging the lifetime of wireless sensor networks via unequal clustering. In IEEE International Parallel and Distributed Processing Symposium, page 236b. Google Scholar
Digital Library
- Tel, G. 1991. Topics in Distributed Algorithms. Cambridge University Press, Chapter 3: Assertional Verification. Google Scholar
Digital Library
- Vigna, G., Gwalani, S., Srinivasan, K., Belding-Royer, E. M., and Kemmerer, R. A. 2004. An intrusion detection tool for AODV-based ad hoc wireless networks. In IEEE Annual Computer Security Applications Conference. Google Scholar
Digital Library
- Wang, J. Yi., Shue, Y.-S., Vijaykumar, T. N., and Bagchi, S. 2006. Pesticide: Using SMT processors to improve performance of pointer bug detection. In IEEE International Conference on Computer Design.Google Scholar
- Yen, I.-L., Bastani, F. B., and Taylor, D. J. 2001. Design of multi-invariant data structures for robust shared accesses in multiprocessor systems. IEEE Trans. Softw. Engin. 27, 3, 193--207. Google Scholar
Digital Library
- Younis, M., Youssef, M., and Arisha. K. Energy-aware routing in cluster-based sensor networks. In IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems. 129--136. Google Scholar
Digital Library
- Yu, I. T., Li, Y., Wong, T. W., Tam, W., Chan, A. T., Lee, J. H., Leung, D. Y., and Ho, T. 2004. Evidence of airborne transmission of the severe acute respiratory syndrome virus. New Engl. J. Med. 350, 17 (Apr.), 1731--1739.Google Scholar
Cross Ref
- Zhou, Y., Zhou, P., Qin, F., Liu, W., and Torrellas, J. 2005. Efficient and flexible architectural support for dynamic monitoring. ACM Trans. Arch. Code Optim. 2, 1 (March), 3--33. Google Scholar
Digital Library
- Zulkernine M. and Seviora, R. E. 2002. A Compositional approach to monitoring distributed systems. In International Conference on Dependable Systems and Networks. 763--772. Google Scholar
Digital Library
Index Terms
Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking
Recommendations
DICE: Monitoring Global Invariants with Wireless Sensor Networks
Wireless sensor networks (WSNs) enable decentralized architectures to monitor the behavior of physical processes and to detect deviations from a specified “safe” behavior, for example, to check the operation of control loops. Such correct behavior is ...
Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks
Efficient network coverage and connectivity are the requisites for most Wireless Sensor Network (WSN) deployments, particularly those concerned with area monitoring. Due to the resource constraints of the sensor nodes, redundancy of coverage area must ...






Comments