Observability by Design Principles of Observable Sensor Networks J. Beutel F. Mattern K. Römer L. Thiele.

Slides:



Advertisements
Similar presentations
Energy-efficient distributed algorithms for wireless ad hoc networks Ramki Gummadi (MIT)
Advertisements

Chris Karlof and David Wagner
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Trace Analysis Chunxu Tang. The Mystery Machine: End-to-end performance analysis of large-scale Internet services.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
KUASAR An efficient and light-weight protocol for routing and data dissemination in ad hoc wireless sensor networks David Andrews Aditya Mandapaka Joe.
Fault, Configuration, Performance Management
Cross Layer Design in Wireless Networks Andrea Goldsmith Stanford University Crosslayer Design Panel ICC May 14, 2003.
1IMIC, 8/30/99 Constraint-Based Unicast and Multicast: Practical Issues Bala Rajagopalan NEC C&C Research Labs Princeton, NJ
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Wireless Sensor Network Security Anuj Nagar CS 590.
SUPERB-IT Center For Hybrid & Embedded Software Systems COLLEGE OF ENGINEERING, UC BERKELEY July 29, 2005 SUPERB-IT.
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
Transport Layer Issue in Wireless Ad Hoc and Sensor Network
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
WIRELESS SENSOR NETWORKS: POWER RELATED ISSUES Jay Wiley, # CSE 7344,Computer Networks and Distributed Systems II Dr. Golla.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Enabling Dependable Communication in Cyber-Physical Systems with a Wireless Bus Federico Ferrari PhD Defense October 18, 2013 — Zurich, Switzerland Computer.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
Wireless Sensor Networks Akyildiz/Vuran 1 Chapter 18: Grand Challenges.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
A Distributed Framework for Correlated Data Gathering in Sensor Networks Kevin Yuen, Ben Liang, Baochun Li IEEE Transactions on Vehicular Technology 2008.
Wireless Networks Breakout Session Summary September 21, 2012.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Wireless Sensor Networks COE 499 Energy Aware Routing
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
X1X1 X2X2 Encoding : Bits are transmitting over 2 different independent channels.  Rn bits Correlation channel  (1-R)n bits Wireless channel Code Design:
Tufts University. EE194-WIR Wireless Sensor Networks. April 21, 2005 Increased QoS through a Degraded Channel using a Diverse, Cross-Layered Protocol Elliot.
Distributed Virtual Environments Introduction. Outline What are they? DVEs vs. Analytic Simulations DIS –Design principles Example.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Abstract Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Cross-layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks IEEE INFOCOM 2008 Mehmet C. Vuran and Ian F.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
October 7, 1999Reactive Sensor Network1 Workshop - RSN Update Richard R. Brooks Head Distributed Intelligent Systems Dept. Applied Research Laboratory.
Networked Embedded and Control Systems WP ICT Call 2 Objective ICT ICT National Contact Points Mercè Griera i Fisa Brussels, 23 May 2007.
1 Exploiting Diversity in Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign Presentation at Mesh.
Comments on Networking and Security - Challenges for Environmental Observatories Arthur C. Sanderson Rensselaer Polytechnic Institute NSF Workshop on Cyberinfrastructure.
Xiong Junjie Node-level debugging based on finite state machine in wireless sensor networks.
Real Time Sensor Networks – challenges and solutions Information Prioritization Proposed scheme: Design techniques for priority assignment to an information.
DISTIN: Distributed Inference and Optimization in WSNs A Message-Passing Perspective SCOM Team
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
1 Order Reconstruction and Data Integrity Testing of Sensor Network Data Matthias Keller, ETH Zürich MICS Workshop,
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
TempLab : A Testbed to Study the Impact of Temperature on Wireless Sensor Networks C.A. Boanoy, M.A. Zúñiga, J. Brownz, U. Roedigz, C. Keppitiyagama§,
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
Energy-Efficient Signal Processing and Communication Algorithms for Scalable Distributed Fusion.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
Data Link Layer Architecture for Wireless Sensor Networks Charlie Zhong September 28, 2001.
Dominik Kaspar, Eunsook Kim, Carles Gomez, Carsten Bormann
Diagnosing Wireless Sensor Networks through Wireless Mobile Nodes
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Protocols.
Aggregation.
Protocols.
Presentation transcript:

Observability by Design Principles of Observable Sensor Networks J. Beutel F. Mattern K. Römer L. Thiele

2 Goal: Make Sensor Networks Observable  Minimal or no interference  Systematic and methodology-based  Facilitate deployment  Improve reliability

3 Example  Project Permasense

4 Based on Phase II Project  WSN Diagnosis using Deployment Support Network –overhearing message traffic Temporary deployment support network sensor network  Infer basic network state –Approximate neighborhood –Routing topology  Many symptoms are detectable by passive inspection  E.g., basic failure indicators –Dead nodes –Network partitions Observe network state on deployment site

5 Some Relevant Publications 2007  M. Ringwald, K. Römer, A. Vitaletti: Passive Inspection of Sensor Networks, Proc. 3rd IEEE Conf. Distributed Computing in Sensor Systems (DCOSS 2007).  M. Ringwald, K. Römer: Deployment of Sensor Networks: Problems and Passive Inspection, Proc. 5th Work- shop on Intelligent Solutions in Embedded Systems (WISES 2007).  M. Dyer, J. Beutel, T. Kalt, P. Oehen, L. Thiele, K. Martin, P. Blum: Deployment Support Network, Proc. 4th European Conf. Wireless Sensor Networks (EWSN 2007).  M. Wöhrle, C. Plessl, J. Beutel and L. Thiele: Increasing the Reliability of Wireless Sensor Networks with a Unit Testing Framework, Proc. 4th Workshop on Embedded Networked Sensors (EmNets 2007).

6 Limitations of Passive Inspection  Some important information cannot be inferred, e.g. –Battery level, clock drift, power consumption –Did a certain node receive a broadcast message?  Message losses difficult to detect  Only approximations for certain state info (e.g., neighborhood of a node)  Primary reasons for failures symptoms often unclear  Ad hoc “solutions” –Add specific message –Add sequence numbers, sender ID,… to packets –Protocol changes (e.g., acks)  Systematic / generic?  Specification of (applica- tion specific) observable state / behavior?  Automatic generation? Observable Sensor Networks Design and Implementation of Design Methodology for

7 A Framework for Observability Application Observability requirements Trace analysis Back annotation Observable state Energy/ resource budget Protocols include extra bits of state info in headers Generator Executable code

8 Research Agenda  Metrics –Observability, energy cost of observability  Networking protocols and programming models –Add a small amount of information to message headers –Specify observable system state –Time-triggered paradigm  Trace analysis –Analyze gathered execution traces to infer state, failure indicators and causes  Back annotation –Correlate failure causes with programming models  Test in application context (e.g., Permasense)

Observability by Design Principles of Observable Sensor Networks J. Beutel F. Mattern K. Römer L. Thiele

11 Related Work  Stanford (MNet) –Share goal of design for observability –Different approach (in-band), less comprehensive (protocol design)  UCLA (Sympathy) –Collection of metrics and detection of events to identify failure states  Virginia (Clairvoyant) –Node-level debugger for sensor nodes –Heavy impact on sensor node behavior, not practical for true networking problems

12 Core Research Challenges  Genericity –Provide reusable abstractions and frameworks rather than ad hoc solutions  Incomplete information –Allow reliable observation of system state despite incomplete/noisy information  Resource constraints –Manage tradeoff between observability and energy/resource consumption

13 Summary  Observability is a critical property of sensor networks to ensure their correct operation –Establish observability as a main design goal  Advance state of the art through provision of –A comprehensive and generic observability framework –Networking protocols, programming models, trace analysis, back annotation  Contribute to the use of large-scale sensor networks for real-world applications  We expect mutual benefit through cooperation with application projects

14 Resources  3 PhD –Programming models, networking protocols –Trace analysis –Back annotation

15 Reliability?  Sensor networks are fragile –Harsh environment, scare resources effort 100% reliability (“working correctly”) Failure reasons often unclear trial-and-error