Upload
natalie-waters
View
216
Download
0
Tags:
Embed Size (px)
Citation preview
CS2510 Fault Tolerance and Privacy in Wireless
Sensor Networks
partially based on presentation by Sameh Gobriel
Agenda
• Introduction to Wireless Sensor Networks (WSNs)
• Challenges and constraints in WSNs
• In-network Aggregation
• RideSharing fault tolerance protocol
• Secure RideSharing, privacy-preserving and fault tolerance protocol
Conventional Wireless Networks
Typical conventional wireless networks are Infrastructure-based (access point). Single hop communication Uses a contention-based MAC access protocol
Adhoc and Sensor Wireless Networks
No Backbone infrastructure.
Multihop wireless communication.
Nodes are mobile and network topology is dynamic.
Level (n-1)
Level (n)
SPARC/Solaris Systems
Applications are countless
...
Parking lot monitoring
Adhoc and Sensor Wireless Networks
Professional Care giving for seniors Habitat and
environmental monitoring
Health Monitoring Body Embedded
Network
• Participatory sensing• Military
Challenges
Nodes are low power, low cost devices.
Very limited supply energy.
Required Lifetime of months or even years.
It may be hard (or undesirable) to retrieve the nodes to change or recharge the batteries.
Considerable challenge on the “Energy Consumption”.
Constraints
These challenges induce constraints on the protocols developed to achieve:
Communication Data Fusion Fault Tolerance Security
Energy Consumption
0
5
10
15
20
Pow
er
(mW
)
Sensing
CPU TX RX
IDLE SLEEP
Idle Listening
Tx Data Pkts
Col. & Re-Tx
Tx Cntrl Pkts
Transmit Receive Idle
Rx Data Pkts
OverhearingRx Cntrl
Pkts
Idle
Rec
eive
Tra
nsm
it
Off
In-network Aggregation
In-network aggregation Energy Efficient data fusion in WSNs
Each sensor monitors the area around it Sensor is supposed to send its data to the end
user.
S
T = 73Wind = 30
In-network Aggregation
End user is not interested in individual sensor readings
Global system information.
77
7573 80
95
Fire in Region 1 ??Avg. T > 90
Region 1
Tree-Construction and Data ReportingAvg. T
in Region 1 ??
Region 1
Avg. T in Region 1 ??
Region 1
Avg. T
Region 1
Avg. T
Level 0
Level 1
Region 1
77
7573 80
95
Region 1
Tree-Construction and Data Reporting
Sending raw data is expensive
77
7573 80
95
95
73
S1 = 73S2 = 77S3 = 95
…...
77
7573 80
9573 [1] 80 [1]
248 [3]
Data aggregation (in-network processing) can save a lot of overhead
What are potential problems that you can
think of with in-network aggregation?
Frequent Errors When an error occurs
A subtree of values is lost Incorrect result reported to the user
X
Wireless links are unreliable
X
Nodes energy depleted
X
Hazardous environment
Objective:
Fault-tolerant aggregation and routing scheme for WSN
Fault Tolerant aggregation: Retransmission
X12
Level (n-1)
Level (n)
When an error occurs, retransmit the lost value
Delayed Query response:Each level has to wait for possible retransmissions before its own
Packet Overhead:Packet overhead because some handshake is required
Fault Tolerant aggregation: Multipath Routing
A node attached itself to all parents it can hear from. When a link fails, the node value is not lost.
10
X
10
10
10What could be the problem with this scheme ?
Duplicate Sensitive Aggregation
5
31 2
6
7
4X
1 1 2 2 3
Max(0,0,1)Max(1,2,4) Max(2,5,4)
5
31 2
6
7
4
X
1 1 2 2 3
0+0+11+2+4 2+5+4
Duplicate insensitive aggregation:Max(5, 7, 10, 4, 10)
Duplicate sensitive aggregation:Sum, Avg, Count, …
RideSharing:
Fault-tolerant duplicate sensitive aggregation and routing scheme for WSN
RideSharing: General Idea
Node selects a primary parents and backup parents
If error free: Child broadcasts value to all
parents Only primary aggregates it
C1 C2 C3
P1 R1R2
C1
C1+P1 C2+R1C3+R2
C2 C3
C1 C2
C1
C1+P1
RideSharing: General Idea When a link error occurs between child and primary
Backup parent detects it
(small bit vector 2 bit per child)
Backup parent aggregates the
missed child value in its message
(if it has not sent its
own yet)
C1 C2 C3
P1 R1R2
P1 C2+R1+C1C3+R2
C2 C3
C1 C2
P1
XIn case of error value of a node rideshares with the backup parent’s value
RS Detection: Bit Vector
C1 C2 C3
P1 R1R2
C2+R1C3+R2
C2 C3C1
C2
C1+P11e 1r 2e 2r C1+P1
1e 1r
Error in C1 Primary Link
This parent is Correcting
RS Correctness
C1 C2 C3
P1 R1R2
C2+R1C3+R2
C2 C3C1
C2
C1+P1 C1+P1
Parents have to be in communication range
Primary has to send before backup
Backup overhears primary error-free
RideSharing Overhead
C1 C2 C3
P1 R1R2
C1
C1+P1 C2+R1C3+R2
C2 C3
C1 C2
C1
C1+P1
1. Child broadcast to all parents (no overhead).
2. Primary (or backup) aggregates the value and broadcast one message to parents (no overhead).
No overhead for error correction but only for error detection: Parents listen to children Detection of primary link failure [small bit vector]
Cascaded RideSharing
1 2 3 4
CVc
V1+Vc
Error free case, primary aggregates child value
1 2 3 4
CVc
V2+Vc
X
In case of one link error, child value rideshares with
first backup parent
1 2 3 4
CVc
V3+Vc
X X
In case of two link errors
2nd backup handles it
What about Privacy ?!
Applications Collaborative sensing over shared infrastructure
text
Monitoring
Sensors
Attack Model
stealthily infiltrate the network to
eavesdrop
Honest-but-Curious
Quiet infiltrators
correctly aggregate, but eavesdrop
New Privacy-Preserving Fault Tolerant Protocol for in-network aggregation in WSN
Additively homomorphic
stream ciphers
Cascaded Ridesharing
Privacy Preservation Robustness
Secure RideSharing Protocol
1. Each sensor ni encrypts its
value vi as ci = vi + gi(ki) mod
M, and sets its corresponding bit
in the P-Vector.
2. The resulting ci values are
aggregated using the Cascaded
RideSharing protocol, which
results in the sink receiving the
value C = ∑i ci mod M.
3. The sink computes the aggregate
key value K = ∑i gi(ki) mod M
for
each i ϵ P- Vector.
4.The sink extracts the final
aggregate value
V = ∑i vi = C − K mod M.
Protocol
n iP
2
P3P
1
ERROROK “Got it”
ci = vi + gi(ki) mod MP-Vector[i] = 1
L-Vector
n1 n2 nn…ni
r-bit = 0e-bit =1
Rec
eive
r
Secure RideSharing Protocol
P-Vector
n1 n2 nn…ni
1 .. 1
nj
n i
P2
P3P
1ci ; P-Vector[i] = 1
n j
c j ; P-Vecto
r[j] =
1
Now I can recover the plain aggregate value
given the P-vectorR
ecei
ver
Evaluation
• Comparison of four protocols using the CSIM simulatorSpanning-tree: no fault tolerance, but efficient for power!Cascaded RideSharingOur confidentiality-preserving fault-tolerant aggregation protocolOur protocol with state compression
• Comparison metrics:
Average relative RMS error in aggregated resultsAverage energy consumed per node per epochAverage message size transmitted per node per epoch
Parameter Value RangesTotal number of nodes 300, 400, 500, . . . ,1000
Link error rate 0.05, 0.10, . . . , 0.35
Number of primary + backup parents max(3)
Participation level (% of nodes reporting values) 1.5%, 2.5%, 5%, . . . , 25%
SIMULATION PARAMETERS