skip to main content
article

Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking

Published:01 September 2007Publication History
Skip Abstract Section

Abstract

This article presents a hierarchical approach for detecting faults in wireless sensor networks (WSNs) after they have been deployed. The developers of WSNs can specify “invariants” that must be satisfied by the WSNs. We present a framework, Hierarchical SEnsor Network Debugging (H-SEND), for lightweight checking of invariants. H-SEND is able to detect a large class of faults in data-gathering WSNs, and leverages the existing message flow in the network by buffering and piggybacking messages. H-SEND checks as closely to the source of a fault as possible, pinpointing the fault quickly and efficiently in terms of additional network traffic. Therefore, H-SEND is suited to bandwidth or communication energy constrained networks. A specification expression is provided for specifying invariants so that a protocol developer can write behavioral level invariants. We hypothesize that data from sensor nodes does not change dramatically, but rather changes gradually over time. We extend our framework for the invariants that includes values determined at run-time in order to detect data trends. The value range can be based on information local to a single node or the surrounding nodes' values. Using our system, developers can write invariants to detect data trends without prior knowledge of correct values. Automatic value detection can be used to detect anomalies that cannot be detected in existing WSNs. To demonstrate the benefits of run-time range detection and fault checking, we construct a prototype WSN using CO2 and temperature sensors coupled to Mica2 motes. We show that our method can detect sudden changes of the environments with little overhead in communication, computation, and storage.

References

  1. An Huang, Y. and Lee, W. 2003. A cooperative intrusion detection system for ad hoc networks. In ACM Workshop on Security of Ad Hoc and Sensor Networks. 135--147. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Buchegger, S. and Boudec, J.-Y. L. 2002. Performance analysis of the CONFIDANT protocol. In ACM International Symposium on Mobile Ad Hoc Networking & Computing. 226--236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Diaz, M., Juanole, G., and Courtiat, J.-P. 1994. Observer---A concept for formal on-line validation of distributed systems. IEEE Trans. Softw. Engin. 20, 12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dolev, S., Israeli, A., and Moran, S. 1997. Uniform dynamic self-stabilizing leader election. IEEE Trans. Para. Distrib. Syst. 8, 4 (Apr.), 424--440. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Emmerich, S. 1996. Demand-controlled ventilation in a multi-zone office building. Fuel and Energy Abstracts 37, 4, 294--294.Google ScholarGoogle Scholar
  6. Erdmann, C. A., Stiener, K. C., and Apte, M. G. 2002. Indoor carbon dioxide concentrations and sick building syndrome symptoms in the base study revisited: Analysis of the 100 building dataset. In Indoor Air. 443--448.Google ScholarGoogle Scholar
  7. Ernst, M. D., Cockrell, J., Griswold, W. G., and Notkin, D. 2001. Dynamically discovering likely program invariants to support program evolution. IEEE Trans. Softw. Engin. 27, 2 (Feb.), 99--123. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Goldsmith, S., O'Callahan, R., and Aiken, A. 2005. Relational queries over program traces. In ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications. 385--402. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Haghighat, F. and Donnini, G. 1992. IAQ and energy-management by demand controlled ventilation. Environ. Techno. 13, 4, 351--359.Google ScholarGoogle ScholarCross RefCross Ref
  10. Hamlet, D. 2005. Invariants and state in testing and formal methods. In ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering. 48--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hangal, S. and Lam, M. S. 2002. Tracking down software bugs using automatic anomaly detection. In International Conference on Software Engineering. 291--301. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Heinzelman, W. B., Chandrakasan, A. P., and Balakrishnan, H. 2002. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Comm. 1, 4 (Oct.), 660--670. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Heinzelman, W. R., Chandrakasan, A., and Balakrishnan, H. 2000. Energy-efficient communication protocol for wireless microsensor networks. In Hawaii International Conference on System Sciences. 2, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Herbert, D., Lu, Y.-H., Bagchi, S., and Li, Z. 2006. Detection and repair of software errors in hierarchical sensor networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. 403--410. Google ScholarGoogle ScholarCross RefCross Ref
  15. Herbert, D., Modelo-Howard, G., Perez-Toro, C., and Bagchi, S. 2007. Fault tolerant ARIMA-based aggregation of data in sensor networks. IEEE International Conference on Dependable Systems and Networks.Google ScholarGoogle Scholar
  16. Herbert, D., Sundaram, V., Albin, L., Lu, Y.-H., Bagchi, S., and Li, Z. 2007. Pervasive carbon dioxide and temperature monitoring utilizing large numbers of low-cost wireless sensors. American Industrial Hygiene Conference and Expo. 163.Google ScholarGoogle Scholar
  17. Hill, J. L. and Culler, D. E. 2002. Mica: A wireless platform for deeply embedded networks. IEEE Micro. 22, 6 (Nov.-Dec.), 12--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Hui, J. W. and Culler, D. 2004. The dynamic behavior of a data dissemination protocol for network programming at scale. In International Conference on Embedded Networked Sensor Systems. 81--94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Khalil, I., Bagchi, S., and Nina-Rotaru, C. 2005. DICAS: Detection, diagnosis, and isolation of control attacks in sensor networks. In International Conference on Security and Privacy for Emerging Areas in Communications Networks. 89--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Khalil, I., Bagchi, S., and Shroff, N. B. 2005. LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. In IEEE International Conference on Dependable Systems and Networks. 612--621. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Khalil, I., Bagchi, S., and Shroff, N. B. 2006. MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks. In IEEE International Conference on Security and Privacy in Communication Networks.Google ScholarGoogle Scholar
  22. Khanna, G., Varadharajan, P., and Bagchi, S. 2004. Self checking network protocols: A monitor based approach. In International Symposium on Reliable Distributed Systems. 18--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Kumar, N., Childers, B. R., and Soffa, M. L. 2005. Low overhead program monitoring and profiling. In ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering. 28--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Lamport, L., Shostak, R., and Pease, M. 1982. The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4, 3 (July), 382--401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Levis, P., Lee, N., Welsh, M., and Culler, D. 2003. TOSSIM: Accurate and scalable simulation of entire tinyOS applications. In International Conference on Embedded Networked Sensor Systems. 126--137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Liao, C.-M., Chang, C.-F., and Liang, H.-M. 2005. A probabilistic transmission dynamic model to access indoor airborne infection risks. Risk Analysis. 25, 5, 1097--1107.Google ScholarGoogle ScholarCross RefCross Ref
  27. Lindsey, S., Raghavendra, C., and Sivalingam, K. M. 2002. Data gathering algorithms in sensor networks using energy metrics. IEEE Trans. Paral. and Distrib. Syst. 13, 9 (Sept.), 924--935. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Lynch, N. A. 1996. Distributed Algorithms. Morgan Kaufmann. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Mahaney, S. R. and Schneider, F. B. 1985. Inexact agreement: Accuracy, precision, and graceful degradation. ACM Symposium on Principles of Distributed Computing. 237--249. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Marti, S., Giuli, T. J., Lai, K., and Baker, M. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In International Conference on Mobile Computing and Networking. 255--265. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Marzullo, K. 1990. Tolerating failures of continuous-valued sensors. ACM Trans. Comput. Syst., 8, 4 (Nov.), 284--304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Medidi, S. R., Medidi, M., and Gavini, S. 2003. Detecting packet-dropping faults in mobile ad-hoc networks. In IEEE ASILOMAR Conference on Signals, Systems and Computers.Google ScholarGoogle Scholar
  33. Milton, D. K., Glencross, P. M., and Walters, M. D. 2000. Risk of sick leave associated with outdoor air supply rate, humidification, and occupant complaints. Indoor Air 10, 4 (Dec.), 212--221.Google ScholarGoogle ScholarCross RefCross Ref
  34. Min, R., Bhardwaj, M., Cho, S.-H., Shih, E., Sinha, A., Wang, A., and Chandrakasan, A. 2001. Low-power wireless sensor networks. In International Conference on VLSI Design. 205--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Muruganathan, S. D., Ma, D. C. F., Bhasin, R. I., and Fapojuwo, A. O. 2005. A centralized energy-efficient routing protocol for wireless sensor networks. IEEE Commun. Mag. 43, 3 (Mar.), 8--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Myatt, T. A., Johnston, S. L., Zuo, Z., Wand, M., Kebadze, T., Rudnick, S., and Milton, D. K. 2004. Detection of airborne rhinovirus and its relation to outdoor air supply in office environments. Amer. J. Respir. Critic. Care Med. 169, 1187--1190.Google ScholarGoogle ScholarCross RefCross Ref
  37. Nakano, K. and Olariu, S. 2002. A survey on leader election protocols for radio networks. In International Symposium on Parallel Architectures, Algorithms and Networks. 63--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Nasipuri, A., Castaneda, R., and Das, S. R., 2001. Performance of multipath routing for on-demand protocols in mobile ad hoc networks. Mobile Netw. Appl. 6, 4, 339--349. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Perkins, J. H. and Ernst, M. D. 2004. Efficient incremental algorithms for dynamic detection of likely invariants. In ACM SIGSOFT International Symposium on Foundation of Software Engineering. 23--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Pirzada, A. A. and McDonald, C. Establishing trust in pure ad hoc networks. In Conference on Australasian Computer Science. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Ramanathan, N., Chang, K., Kapur, R., Girod, L., Kohler, E., and Estrin, D. 2005. Sympathy for the sensor network debugger. In International Conference On Embedded Networked Sensor Systems. 255--267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Rudnick, S. N. and Milton, D. K. 2003. Risk of indoor airborne infection transmission estimated from carbon dioxide concentration. Indoor Air 13, 3 (Sept.), 237--245.Google ScholarGoogle ScholarCross RefCross Ref
  43. Seppanen, O. A., Fisk, W. J., and Mendell, M. J. 1999. Association of ventilation rates and CO2 concentrations with health and other responses in commercial and institutional buildings. Indoor Air. 226--252.Google ScholarGoogle Scholar
  44. Singh, G. 1996. Leader election in the presence of link failures. IEEE Trans. Paral. Distrib. Syst. 7, 3 (March), 231--236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Smith, B. R., Murthy, S., and Garcia-Luna-Aceves, J. J. 1997. Securing distance-vector routing protocols. In Proceedings of the Symposium on Network and Distributed System Security. 85--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Soro, S. and Heinzelman, W. B. 2005. Prolonging the lifetime of wireless sensor networks via unequal clustering. In IEEE International Parallel and Distributed Processing Symposium, page 236b. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Tel, G. 1991. Topics in Distributed Algorithms. Cambridge University Press, Chapter 3: Assertional Verification. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Vigna, G., Gwalani, S., Srinivasan, K., Belding-Royer, E. M., and Kemmerer, R. A. 2004. An intrusion detection tool for AODV-based ad hoc wireless networks. In IEEE Annual Computer Security Applications Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Wang, J. Yi., Shue, Y.-S., Vijaykumar, T. N., and Bagchi, S. 2006. Pesticide: Using SMT processors to improve performance of pointer bug detection. In IEEE International Conference on Computer Design.Google ScholarGoogle Scholar
  50. Yen, I.-L., Bastani, F. B., and Taylor, D. J. 2001. Design of multi-invariant data structures for robust shared accesses in multiprocessor systems. IEEE Trans. Softw. Engin. 27, 3, 193--207. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Younis, M., Youssef, M., and Arisha. K. Energy-aware routing in cluster-based sensor networks. In IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems. 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Yu, I. T., Li, Y., Wong, T. W., Tam, W., Chan, A. T., Lee, J. H., Leung, D. Y., and Ho, T. 2004. Evidence of airborne transmission of the severe acute respiratory syndrome virus. New Engl. J. Med. 350, 17 (Apr.), 1731--1739.Google ScholarGoogle ScholarCross RefCross Ref
  53. Zhou, Y., Zhou, P., Qin, F., Liu, W., and Torrellas, J. 2005. Efficient and flexible architectural support for dynamic monitoring. ACM Trans. Arch. Code Optim. 2, 1 (March), 3--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Zulkernine M. and Seviora, R. E. 2002. A Compositional approach to monitoring distributed systems. In International Conference on Dependable Systems and Networks. 763--772. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!