Diagnosing Wireless Sensor Networks through Wireless Mobile Nodes

Slides:



Advertisements
Similar presentations
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
Advertisements

An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Introduction to Network Analysis and Sniffer Pro
SUSTAIN: An Adaptive Fault Tolerance Service for Geographically Overlapping Wireless Cyber-Physical Systems Gholam Abbas Angouti Kolucheh, Qi Han
Emulatore di Protocolli di Routing per reti Ad-hoc Alessandra Giovanardi DI – Università di Ferrara Pattern Project Area 3: Problematiche di instradamento.
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
Real Time Flow Handoff in Ad Hoc Wireless Networks using Mobility Prediction William Su Mario Gerla Comp Science Dept, UCLA.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
May 14, Organization Design and Dynamic Resources Huzaifa Zafar Computer Science Department University of Massachusetts, Amherst.
Intrusion Detection in Wireless Sensor Networks Group Meeting Spring 2005 Presented by Edith Ngai.
Unlocking the demo…. Jason Hill. Data Aggregation  Reduce network bandwidth requirements by aggregating data close to the source.  Two types aggregation:
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
Forest Fire Detection System based on Wireless Sensor Network Vel Pratheesh Sankar #
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Visualisation and Analysis of Real Time Application Behaviour in a Simulated Network (!Temporal Databases  K. Maciunas) Evan Bourlotos Supervisors Cheryl.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Link Estimation, CTP and MultiHopLQI. Learning Objectives Understand the motivation of link estimation protocols – the time varying nature of a wireless.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
CSE 6590 Fall 2009 Routing Metrics for Wireless Mesh Networks 1 12 November, 2015.
Implementation of Collection Tree Protocol in QualNet
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Dynamic Routing in Mobile Ad Hoc Network 報告者:呂佐鴻 指導教授:李鴻璋.
Performance Validation of Mobile IP Wireless Networks Presented by Syed Shahzad Ali Advisor Dr. Ravi Pendse.
1 RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong, Edith C.-Ngai, Yangfan Zhou, Michael R. Lyu.
Xiong Junjie Node-level debugging based on finite state machine in wireless sensor networks.
Evaluating Wireless Network Performance David P. Daugherty ITEC 650 Radford University March 23, 2006.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Video Streaming Transmission Over Multi-channel Multi-path Wireless Mesh Networks Speaker : 吳靖緯 MA0G WiCOM '08. 4th International.
TOPICS INTRODUCTION CLASSIFICATION CHARACTERISTICS APPLICATION RELATED WORK PROBLEM STATEMENT OBJECTIVES PHASES.
1 Software Reliability in Wireless Sensor Networks (WSN) -Xiong Junjie
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
“LPCH and UDLPCH: Location-aware Routing Techniques in WSNs”. Y. Khan, N. Javaid, M. J. Khan, Y. Ahmad, M. H. Zubair, S. A. Shah.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Frame counter: Achieving Accurate and Real-Time Link Estimation in Low Power Wireless Sensor Networks Daibo Liu, Zhichao Cao, Mengshu Hou and Yi Zhang.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
Minimum spanning tree diameter estimation in random sensor networks in fractal dimension Students: Arthur Romm Daniel Kozlov Supervisor: Dr.Zvi Lotker.
In the name of God.
Routing Metrics for Wireless Mesh Networks
Jamming for good: a fresh approach to authentic communication in WSNs
Protocols for Wireless Sensor Networks
Routing Metrics for Wireless Mesh Networks
MOBILE AD-HOC NETWORKS
Wireless LANs Wireless proliferating rapidly.
Wireless Sensor Network Architectures
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Introduction to Wireless Sensor Networks
Signal Theory Rei Sanchez.
Batch Forwarding in Wireless Sensor Networks (WSNs)
Routing Metrics for Wireless Mesh Networks
RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong
ModelNet: A Large-Scale Network Emulator for Wireless Networks Priya Mahadevan, Ken Yocum, and Amin Vahdat Duke University, Goal:
Exploiting Semantics for Event Detection Systems
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Collection Tree Protocol
By Pramit Choudhary, Balaji Raao & Ravindra Bhanot
Presentation transcript:

Diagnosing Wireless Sensor Networks through Wireless Mobile Nodes -Junjie Xiong 2011-03-21 1 1

Outline Motivation Mobile Node Aided Network Diagnosis Preliminary Experiments Emphasis on my own work 2 2

Outline Motivation Mobile Node Aided Network Diagnosis Preliminary Experiments Emphasis on my own work 3 3

Motivation   The diagnosis of wireless sensor networks (WSNs) is performed at the base station (BS). The log should be transmitted back to BS. How to transmit as much log to the BS as possible and take up as few bandwidth as possible? Emphasis on my own work 4 4

Motivation (Continue) In Sympathy, nodes periodically send metrics back to the BS. BS detects failures and determines their causes. Sympathy limit its metrics to information about connectivity and data flow, such as nodes’ next hops and neighbors. Emphasis on my own work 5 5

Motivation (Continue) PassiveDiagnosis adds a few fields to the original packets that will be sent to the BS. Using the information contained in the fields, the BS can infer the network problems. Emphasis on my own work 6 6

Outline Motivation Mobile Node Aided Network Diagnosis Preliminary Experiments Emphasis on my own work 7 7

The Role of Wireless Mobile Node It travels the WSNs to passively collect the packets sent or received by the sensor nodes. It does not require the sensor nodes to send network diagnosis log back to the BS. It does not send packets and hence does not interfere the WSN applications. Emphasis on my own work 8 8

The Packets Collected by the Wireless Mobile Node It is not all the packets generated by the whole network. Can it represent all the packets? Can it help detect anomalies in the network behavior? Emphasis on my own work 9 9

Analyze the Packets Application …. Chameleon Rime XMAC 802.15.4 We do not know the abnormal behavior, so we use 1-class SVM to identify anomalies. The features to be selected: the number of different types of packet sent or received. DATA packet #, routing packet #, forwarded packet #, and so on. The packets are collected from the radio frequency chip. Hence the packet contains all the upper protocol headers. Application …. Chameleon Rime XMAC 802.15.4 Emphasis on my own work 10 10

Outline Motivation Mobile Node Aided Network Diagnosis Preliminary Experiments Emphasis on my own work 11 11

Prepare Train and Test File for LibSVM Run 50-node-network emulation in Contiki. Emphasis on my own work 12 12

Prepare Train and Test File for LibSVM (Continue) Collect raw packets from the radio frequency chip. Parse the packets. Calculate the ratios of different types of packets sent by each node. Emphasis on my own work 13 13

Train and Test File for LibSVM The train file is generated from the packets collected by the mobile nodes. The test file is generated from all the packets sent and received in the WSNs. Emphasis on my own work 14 14

Learn with One-class SVM After running for 7 hours, we use the train file to build a model, and the test file to test the model. The accuracy is 76%. How to select the features and tune the parameters? Emphasis on my own work 15 15

Learn with One-class SVM (Continue) Ongoing experiments: inserting a real bug in CTP and checking the results. More experiments: Inserting more real bugs to verify the diagnosing method. Emphasis on my own work 16 16

Thank you! Emphasis on my own work 17 17