RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong 2011-11-15.

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
Using TTCN-3 in Interoperability Testing for Real-time Communication Systems Zhiliang Wang, Jianping Wu, Xia Yin, Xingang Shi and Beihang Tian Department.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Protocol Design, Testing, and Diagnosis towards Dependable Wireless Sensor Networks XIONG, Junjie CSE, CUHK Supervisor: Michael R. Lyu, Evangeline F.Y.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
1 School of Computing Science Simon Fraser University, Canada PCP: A Probabilistic Coverage Protocol for Wireless Sensor Networks Mohamed Hefeeda and Hossein.
Automated Model-Based Testing of Hybrid Systems Michiel van Osch PROSE January 25,
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
Exploring Tradeoffs in Failure Detection in P2P Networks Shelley Zhuang, Ion Stoica, Randy Katz HIIT Short Course August 18-20, 2003.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
1 A Comparison of Mechanisms for Improving TCP Performance over Wireless Links Course : CS898T Instructor : Dr.Chang - Swapna Sunkara.
Applying Dynamic Analysis to Test Corner Cases First Penka Vassileva Markova Madanlal Musuvathi.
TOSSIM: Visualizing the Real World Philip Levis, Nelson Lee, Dennis Chi and David Culler UC Berkeley NEST Retreat, January 2003.
Selected Data Rate Packet Loss Channel-error Loss Collision Loss Reduced Packet Probing (RPP) Multirate Adaptation For Multihop Ad Hoc Wireless Networks.
Backbone Support for Host Mobility: A Joint ORBIT/VINI Experiment Jennifer Rexford Princeton University Joint work with the ORBIT team (Rutgers) and Andy.
On the Node Clone Detection inWireless Sensor Networks.
Speed and Direction Prediction- based localization for Mobile Wireless Sensor Networks Imane BENKHELIFA and Samira MOUSSAOUI Computer Science Department.
Redes Inalámbricas Máster Ingeniería de Computadores 2008/2009 Tema 7.- CASTADIVA PROJECT Performance Evaluation of a MANET architecture.
1 Enabling Large Scale Network Simulation with 100 Million Nodes using Grid Infrastructure Hiroyuki Ohsaki Graduate School of Information Sci. & Tech.
WinMee 2005 A Framework for the Management of Large-Scale Wireless Network Testbeds Krishna Ramachandran, Kevin C. Almeroth, Elizabeth Belding-Royer Dept.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
VeriFlow: Verifying Network-Wide Invariants in Real Time
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Distributed Monitoring and Aggregation in Wireless Sensor Networks INFOCOM 2010 Changlei Liu and Guohong Cao Speaker: Wun-Cheng Li.
Networking Version2 10/27/2015Slide 1 Format Layered models of processes The seven layers OSI Model Network Requirements Network Topology.
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor Networks Yun Wang,Kai Li, Jie Wu Southeast University, Nanjing, China, Temple.
Reducing Energy Consumption in Human- centric Wireless Sensor Networks The 2012 IEEE International Conference on Systems, Man, and Cybernetics October.
An Architecture and Prototype Implementation for TCP/IP Hardware Support Mirko Benz Dresden University of Technology, Germany TERENA 2001.
Supervisor: Antoine Bagula Students: Mthokozisi Moyo Luis Sa Wireless Sensor Network Repairing.
Hot Interconnects TCP-Splitter: A Reconfigurable Hardware Based TCP/IP Flow Monitor David V. Schuehler
Secure In-Network Aggregation for Wireless Sensor Networks
1 RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong, Edith C.-Ngai, Yangfan Zhou, Michael R. Lyu.
1 Evaluating NGI performance Matt Mathis
Xiong Junjie Node-level debugging based on finite state machine in wireless sensor networks.
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling Olaf Landsiedel 1, Euhanna Ghadimi 2, Simon Duquennoy 3, Mikael Johansson 2 1 Chalmers University.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Troubleshooting Mesh Networks Lili Qiu Joint Work with Victor Bahl, Ananth Rao, Lidong Zhou Microsoft Research Mesh Networking Summit 2004.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
TempLab : A Testbed to Study the Impact of Temperature on Wireless Sensor Networks C.A. Boanoy, M.A. Zúñiga, J. Brownz, U. Roedigz, C. Keppitiyagama§,
1 Software Reliability in Wireless Sensor Networks (WSN) -Xiong Junjie
Reliability of Wireless sensors with code attestation for intrusion detection Ing-Ray Chen, Yating Wang, Ding-Chau Wang Information Processing Letters.
KAIS T Sensor Deployment Based on Virtual Forces Reference: Yi Zou and Krishnendu Chakarabarty, “Sensor Deployment and Target Localization Based on Virtual.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
Lazy Preemption to Enable Path-Based Analysis of Interrupt-Driven Code
Diagnosing Wireless Sensor Networks through Wireless Mobile Nodes
Algorithms for Big Data Delivery over the Internet of Things
Understanding the OSI Reference Model
Layer 1 of the TCP/IP protocol stack: Network Access Layer (NAL)
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
SDN Based IoT-Cloud Comm.
Wireless Sensor Networks
ModelNet: A Large-Scale Network Emulator for Wireless Networks Priya Mahadevan, Ken Yocum, and Amin Vahdat Duke University, Goal:
Yiannis Andreopoulos et al. IEEE JSAC’06 November 2006
Modeling and Simulation of WSN for Target Tracking
Computer Networking A Top-Down Approach Featuring the Internet
Process-to-Process Delivery: UDP, TCP
Task Manager & Profile Interface
Presentation transcript:

RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong 2011-11-15

Outline Motivation RealProct Design Evaluation Conclusion

Motivation Wireless sensor networks (WSNs) are vulnerable to software bugs. Simulation is different from real execution. Testbeds are designed for network performance evaluation rather than software bug detection. Large-scale real deployment is expensive. RealProct uses a small number of real sensor nodes to mimic large-scale WSNs and test the protocol against the specification.

Outline Motivation RealProct Design Evaluation Conclusion

Challenges Sensor nodes are resource-constrained devices. Sensor node is difficult to control than a computer. Volatile wireless environment in WSNs will result in random packet loss. How to test the protocol with various topologies and events when RealProct only employs a few real sensor nodes. Emphasis on my own work

Protocol Conformance Testing Process PCT process IUT (Implementation Under Test) Emphasis on my own work 6 6

RealProct Architecture Point of Control & Observation SUT (System Under Test) Upper Tester Lower Tester Emphasis on my own work 7 7

Topology Virtualization Emphasis on my own work 8 8

Event Virtualization Packet disorder Emphasis on my own work 9 9

Test Execution and Verdict Suppose packet loss probability is L0, a test case is executed n times, and it passes n1 times and fails n2 times. If n1 > n2, declare as pass, the false negative probability is Let the FN error rate be lower than Th, then the minimum n is Emphasis on my own work 10 10

Outline Motivation RealProct Design Evaluation Conclusion

Performance Evaluation Two real TelosB sensor nodes and a PC. Contiki 2.4: μIP TCP/IP protocol. Two new bugs and previous bug repetition. Bug 1 & 2 – Connect to opened & unopened TCP ports. Bug 3 – An SYN/ACK packet loss. Bug 4 – SYN packet duplication.

Performance Evaluation Bug 1 – Connect to opened TCP ports. Test opened port 0 & 80 (within 0 to 65535). TCP connection are from 0 to 65535: test opened port 0 & 80.

Performance Evaluation Bug 1 – Connect to opened TCP ports. Test opened port 0 & 80 (within 0 to 65535). TCP connection are from 0 to 65535: test opened port 0 & 80.

Performance Evaluation Bug 2 – Connect to unopened TCP ports.

Outline Motivation RealProct Design Evaluation Conclusion

Conclusion As a protocol testing tool, RealProct finds two new bugs, discovers all the previously detected bugs in the TCP/IP stack, and validates the Rime mesh routing protocol. Propose two techniques, topology virtualization and event virtualization, for testing. Design an algorithm to tackle the inaccuracy problem caused by non-deterministic events in test execution.

Q & A Thank you!