32
CS2510 Fault Tolerance and Privacy in Wireless Sensor Networks partially based on presentation by Sameh Gobriel

CS2510 Fault Tolerance and Privacy in Wireless Sensor Networks partially based on presentation by Sameh Gobriel

Embed Size (px)

Citation preview

CS2510 Fault Tolerance and Privacy in Wireless

Sensor Networks

partially based on presentation by Sameh Gobriel

Agenda

• Introduction to Wireless Sensor Networks (WSNs)

• Challenges and constraints in WSNs

• In-network Aggregation

• RideSharing fault tolerance protocol

• Secure RideSharing, privacy-preserving and fault tolerance protocol

Conventional Wireless Networks

Typical conventional wireless networks are Infrastructure-based (access point). Single hop communication Uses a contention-based MAC access protocol

Adhoc and Sensor Wireless Networks

No Backbone infrastructure.

Multihop wireless communication.

Nodes are mobile and network topology is dynamic.

Level (n-1)

Level (n)

SPARC/Solaris Systems

Applications are countless

...

Parking lot monitoring

Adhoc and Sensor Wireless Networks

Professional Care giving for seniors Habitat and

environmental monitoring

Health Monitoring Body Embedded

Network

• Participatory sensing• Military

Challenges

Nodes are low power, low cost devices.

Very limited supply energy.

Required Lifetime of months or even years.

It may be hard (or undesirable) to retrieve the nodes to change or recharge the batteries.

Considerable challenge on the “Energy Consumption”.

Constraints

These challenges induce constraints on the protocols developed to achieve:

Communication Data Fusion Fault Tolerance Security

Energy Consumption

0

5

10

15

20

Pow

er

(mW

)

Sensing

CPU TX RX

IDLE SLEEP

Idle Listening

Tx Data Pkts

Col. & Re-Tx

Tx Cntrl Pkts

Transmit Receive Idle

Rx Data Pkts

OverhearingRx Cntrl

Pkts

Idle

Rec

eive

Tra

nsm

it

Off

In-network Aggregation

In-network aggregation Energy Efficient data fusion in WSNs

Each sensor monitors the area around it Sensor is supposed to send its data to the end

user.

S

T = 73Wind = 30

In-network Aggregation

End user is not interested in individual sensor readings

Global system information.

77

7573 80

95

Fire in Region 1 ??Avg. T > 90

Region 1

Tree-Construction and Data ReportingAvg. T

in Region 1 ??

Region 1

Avg. T in Region 1 ??

Region 1

Avg. T

Region 1

Avg. T

Level 0

Level 1

Region 1

77

7573 80

95

Region 1

Tree-Construction and Data Reporting

Sending raw data is expensive

77

7573 80

95

95

73

S1 = 73S2 = 77S3 = 95

…...

77

7573 80

9573 [1] 80 [1]

248 [3]

Data aggregation (in-network processing) can save a lot of overhead

What are potential problems that you can

think of with in-network aggregation?

Frequent Errors When an error occurs

A subtree of values is lost Incorrect result reported to the user

X

Wireless links are unreliable

X

Nodes energy depleted

X

Hazardous environment

Objective:

Fault-tolerant aggregation and routing scheme for WSN

Fault Tolerant aggregation: Retransmission

X12

Level (n-1)

Level (n)

When an error occurs, retransmit the lost value

Delayed Query response:Each level has to wait for possible retransmissions before its own

Packet Overhead:Packet overhead because some handshake is required

Fault Tolerant aggregation: Multipath Routing

A node attached itself to all parents it can hear from. When a link fails, the node value is not lost.

10

X

10

10

10What could be the problem with this scheme ?

Duplicate Sensitive Aggregation

5

31 2

6

7

4X

1 1 2 2 3

Max(0,0,1)Max(1,2,4) Max(2,5,4)

5

31 2

6

7

4

X

1 1 2 2 3

0+0+11+2+4 2+5+4

Duplicate insensitive aggregation:Max(5, 7, 10, 4, 10)

Duplicate sensitive aggregation:Sum, Avg, Count, …

RideSharing:

Fault-tolerant duplicate sensitive aggregation and routing scheme for WSN

RideSharing: General Idea

Node selects a primary parents and backup parents

If error free: Child broadcasts value to all

parents Only primary aggregates it

C1 C2 C3

P1 R1R2

C1

C1+P1 C2+R1C3+R2

C2 C3

C1 C2

C1

C1+P1

RideSharing: General Idea When a link error occurs between child and primary

Backup parent detects it

(small bit vector 2 bit per child)

Backup parent aggregates the

missed child value in its message

(if it has not sent its

own yet)

C1 C2 C3

P1 R1R2

P1 C2+R1+C1C3+R2

C2 C3

C1 C2

P1

XIn case of error value of a node rideshares with the backup parent’s value

RS Detection: Bit Vector

C1 C2 C3

P1 R1R2

C2+R1C3+R2

C2 C3C1

C2

C1+P11e 1r 2e 2r C1+P1

1e 1r

Error in C1 Primary Link

This parent is Correcting

RS Correctness

C1 C2 C3

P1 R1R2

C2+R1C3+R2

C2 C3C1

C2

C1+P1 C1+P1

Parents have to be in communication range

Primary has to send before backup

Backup overhears primary error-free

RideSharing Overhead

C1 C2 C3

P1 R1R2

C1

C1+P1 C2+R1C3+R2

C2 C3

C1 C2

C1

C1+P1

1. Child broadcast to all parents (no overhead).

2. Primary (or backup) aggregates the value and broadcast one message to parents (no overhead).

No overhead for error correction but only for error detection: Parents listen to children Detection of primary link failure [small bit vector]

Cascaded RideSharing

1 2 3 4

CVc

V1+Vc

Error free case, primary aggregates child value

1 2 3 4

CVc

V2+Vc

X

In case of one link error, child value rideshares with

first backup parent

1 2 3 4

CVc

V3+Vc

X X

In case of two link errors

2nd backup handles it

What about Privacy ?!

Applications Collaborative sensing over shared infrastructure

text

Monitoring

Sensors

Attack Model

stealthily infiltrate the network to

eavesdrop

Honest-but-Curious

Quiet infiltrators

correctly aggregate, but eavesdrop

New Privacy-Preserving Fault Tolerant Protocol for in-network aggregation in WSN

Additively homomorphic

stream ciphers

Cascaded Ridesharing

Privacy Preservation Robustness

Secure RideSharing Protocol

1. Each sensor ni encrypts its

value vi as ci = vi + gi(ki) mod

M, and sets its corresponding bit

in the P-Vector.

2. The resulting ci values are

aggregated using the Cascaded

RideSharing protocol, which

results in the sink receiving the

value C = ∑i ci mod M.

3. The sink computes the aggregate

key value K = ∑i gi(ki) mod M

for

each i ϵ P- Vector.

4.The sink extracts the final

aggregate value

V = ∑i vi = C − K mod M.

Protocol

n iP

2

P3P

1

ERROROK “Got it”

ci = vi + gi(ki) mod MP-Vector[i] = 1

L-Vector

n1 n2 nn…ni

r-bit = 0e-bit =1

Rec

eive

r

Secure RideSharing Protocol

P-Vector

n1 n2 nn…ni

1 .. 1

nj

n i

P2

P3P

1ci ; P-Vector[i] = 1

n j

c j ; P-Vecto

r[j] =

1

Now I can recover the plain aggregate value

given the P-vectorR

ecei

ver

Evaluation

• Comparison of four protocols using the CSIM simulatorSpanning-tree: no fault tolerance, but efficient for power!Cascaded RideSharingOur confidentiality-preserving fault-tolerant aggregation protocolOur protocol with state compression

• Comparison metrics:

Average relative RMS error in aggregated resultsAverage energy consumed per node per epochAverage message size transmitted per node per epoch

Parameter Value RangesTotal number of nodes 300, 400, 500, . . . ,1000

Link error rate 0.05, 0.10, . . . , 0.35

Number of primary + backup parents max(3)

Participation level (% of nodes reporting values) 1.5%, 2.5%, 5%, . . . , 25%

SIMULATION PARAMETERS

1- Effect of Link Error Rate

48.2% improvement in RMS

Constant overhead

Constant overhead

2- Effect of Participation Level

Only 7.1% increase

Only 3.6% increase

3- Effect of Network Density

90.2% improvement

using optimization

Thank you