Title: Robust Communication Primitives in Sensor Networks
1 Robust Communication Primitives in Sensor
Networks
Saurabh Bagchi Dependable Computing Systems
Lab School of Electrical and Computer
Engineering Purdue University Joint work with
Issa Khalil, Gunjan Khanna, Ravish Khosla, Ness
Shroff
http//shay.ecn.purdue.edu/dcsl
2Sensor Nodes Nature of the Beast
- Miniature platform for
- Sensing Integrated sensor board with sensors for
temperature, pressure, humidity, etc. - Computation Low power Atmel processor with 128
KB programming and 512 KB data memory - Communication Low range ISM band transceiver
- Constraints
- Class I Energy, Bandwidth, Fragility
- Class II Processor, Memory
Radio-Processor Board
Sensor Board
Interface Board
3Dependable Sensor Networking
- Dependability is the property of a system to
tolerate failures, be it from natural errors or
malicious errors, aka security attacks
Dependability
Resilience to natural errors, i.e., Reliability
Resilience to malicious errors, i.e., Security
Why for Sensors?
Why for Sensors?
- Placed in hostile environments
- Adversaries have huge gains from compromising
sensor network - Low cost rules out tamper proof hardware
- Omni-directional wireless links
- The nodes are failure prone
- The wireless links are failure prone
- Placed in hazardous environments
- Sometimes used for detection of critical events
4Application Domains
Domains Domains Sample Applications
Military Military Target tracking, battlefield surveillance
Civilian Private Healthcare monitoring, Environmental monitoring, Household security
Civilian Public Infrastructure monitoring, Water quality monitoring
5What is data dissemination?
- There are some sources of sensory data
- Possibly sources with overlapping sensing regions
- There are some nodes interested in sensory data
- Maybe resource constrained nodes themselves
- Can be cluster heads in hierarchical
communication - Alternately, can be a moving data collector
Control center Cluster heads Sensor nodes
6What is Reliable Data Dissemination?
- Challenge Need to get data from source to
destination - Handle any-to-any communication
- Optimized for common communication pattern
- Capt. Edward Murphy said
- If a sensor node can fail, it will eventually
- If a sensor network link can fail, it will
eventually
- Capt. Edward Murphy also said
- If a sensor node can move, it will eventually
- Reliable data dissemination is achieving
continuous stream of data from source to
destination in the face of the above Murphys
laws
7Some Current Approaches for Reliable Data
Dissemination
N7
N6
N1
N3
N5
S
T
T
T
N4
N2
- Con
- Many many redundant transmissions leading to
inefficient energy usage
8Some Current Approaches for Reliable Data
Dissemination
- Direct Communication with Base Station
Base Station
C
9Our Approach
- Hybrid of Push and Pull
- Push From source towards sink
- Pull Interested sink nodes query and pull data
from relevant sources - Approach
- Use meta data transmissions to reduce redundant
transmissions - Advertise the data prior to sending the data
- Only interested nodes pull data
- Reduces collisions and energy wastage
B
ADV
REQ
DAT
S
S Sender B Interested node C Disinterested node
C
ADV
10Shortest Path Minded SPIN (SPMS)
- Timers
- TimeOutADV Nodes wait for the data to come to
the nearest node before sending REQ - TimeOutDAT Nodes wait for the data after sending
the REQ packet
3
4
REQ
ADV
ADV
ADV
ADV
ADV
1
DAT
6
DAT
REQ
5
REQ
DAT
2
ADV
ADV
11SPMS Protocol Failure Scenario
- Resilience to Failures
- After a TimeOutADV expires, node sends the
request to PRONE through the shortest path - DATA is received using the same path if there is
no failure - Incase of a failure TimeOutDAT occurs
- Node directly sends the REQ packet to PRONE
- In case PRONE is also not responding then the REQ
is sent to SCONE - Failures tolerated
- Intermediate nodes
- Source node
12 SPMS Failure Scenario
3
4
ADV
ADV
ADV
ADV
ADV
1
6
TimeOut_ADV
TimeOut_DAT
REQ
DATA
REQ
5
2
13Energy and Delay Analysis
- Time to get data from source to adjacent
destination is defined as Tround
D
ADV
REQ
DAT
S
Tround G.n12 A.Ttx Tproc G.ns2 R.Ttx
Tproc G.ns2 D.Ttx
Tround G.n12 (ARD).Ttx 2Tproc 2G.ns2
14Energy and Delay Analysis
- In case of K relay nodes between two nodes
- The ratio of energy between SPIN and SPMS can be
given by
ESPMS k.A.E1 k.(DR).Emk.(ADR).Er
ESPIN (ADR).E1 (ADR).Er
15Energy and Delay Comparisons Equation Plots
SPIN uses more energy than SPMS as relay nodes
increase.
Delay advantage of SPMS decreases as relay nodes
increase.
16Simulations
- SPMS protocol is simulated in ns-2 and compared
with SPIN - We vary the transmission radius and the number of
nodes - Crossbow data sheet is used to calculate the
power spent in transmission and receiving
packets. - Experiments are carried out for two topologies
- All to All communication Every node requests
data from every other data - Cluster Based Hierarchical Communication Cluster
heads collect the data and send it to the sink
using SPMS - Experiments for failure free and failure
scenarios - Failures are transient and follow exponential
inter-arrival times - Results
- Energy saving with and without failure, with
mobility, increases with increasing sensor field
size - Delay improvement increases with increasing
sensor field size
17Optimizations for Failure and Mobility
- Failure optimized SPMS
- Avoid sending REQ through a suspected failed path
- Inform neighbors of suspected failed path
- Mobility optimized SPMS
- Avoid Bellman Ford on entire zone if node moves
in - Incremental computation in a lazy manner
18Secure Communication Primitive
- Different types of attacks
- Control traffic, vs. Data traffic
- Message tampering, eavesdropping, and ID spoofing
- Nodes may be compromised
- Symmetric key cryptography can be used
- Need to manage the keys
- Energy efficient
- Latency sensitive
- Capt. Edward Murphy also said
- Dont trust thy neighbor
19Our Approach SECOS
- All the above goals are realized in protocol
called SECOS - Base station is fixed, secure, and has no
resource constraints - All other nodes are generic sensor nodes and have
all the typical resource constraints
- Guarantee Compromising any number of nodes in
the network does not compromise the session
between two legitimate nodes
20Take Away Lessons
- Communication protocols in sensor networks have
to be designed with - Failures in mind
- Node compromise in mind
- Trade-offs exist between latency and energy
consumption and customizable protocols that fit
different regions of trade-off curve are
desirable - Desirable characteristics of large class of
sensor network communication protocols - No privileged nodes
- No node trusted completely
21Questions Anyone?
Ness Shroff
Gunjan Khanna
Issa Khalil
- Fault Tolerant Energy Aware Data Dissemination
Protocol in Sensor Network, Gunjan Khanna,
Saurabh Bagchi, Yu-Sung Wu. At IEEE Dependable
Systems and Networks Conference (DSN 2004), June
28-July 1, 2004, Florence, Italy. - Analysis and Evaluation of SECOS, A Protocol for
Energy Efficient and Secure Communication in
Sensor Networks, Issa Khalil, Saurabh Bagchi,
Ness Shroff. Submitted to Ad-hoc Networks
Journal, September 2004. Available as CERIAS Tech
Report from home page.