SlideShare a Scribd company logo
Elham Hormozi & Razieh Asadi


    e.hormozi@ustmb.ac.ir & Rzh_asadi@yahoo.com



1
Outline

       Review of Wireless Sensor Network

       Fault Tolerance in WSNs

       Fault Detection

       Fault Recovery
           Relay Node Placement in Wireless Sensor Networks

           Hop-by-Hop TCP for Sensor Networks

       Conclusion

    2
Review of Wireless Sensor Network
       A WSN is a self-organized network that consists of a large number
        of low-cost and low powered sensor devices, called sensor nodes

       Can be deployed on the ground, in the air, in vehicles, on bodies,
        under water, and inside buildings

       Each sensor node is equipped with a sensing unit, which is used to
        capture events of interest, and a wireless transceiver, which is used
        to transform the captured events back to the base station, called
        sink node

       Sensor nodes collaborate with each other to perform tasks of data
        sensing, data communication, and data processing

    3
Type of failure in WSNs
       Energy depletion
           Have very limited energy and their batteries cannot usually be recharged or
            replaced, due to hostile or hazardous environments
       Hardware failure
           A sensor node has two component: sensing unit and wireless transceiver
           Usually directly interact with the environment, which is subject to variety of physical,
            chemical, and biological factors.
       Communication link errors
           Even if condition of the hardware is good, the communication between sensor
            nodes is affected by many factors, such as signal strength, antenna angle,
            obstacles, weather conditions
       Malicious attack

               It results in low reliability of performance of sensor nodes.
              Therefore, fault tolerance is one of the critical issues in WSNs


    4
Fault Detection:

       Centralized Approach
        •    Sympathy
        •    Secure Locations

       Distributed Approach
        1.   Node Self-detection
        2.   Clustering Approach( MANNA)




    5
Sympathy[4]
   Using a message-flooding approach to pool event data and current
    states (metrics) from sensor node

   Nodes periodically send metrics back to a sink to detect failures and
    cause of failure

   Given sensor hardware and network limitations, these transmitted
    metrics must be minimized

   Insufficient data at the sink implies failure; sufficient data at the sink
    implies acceptable network behavior

   Based on these metrics, it detects which nodes or components have
    not delivered sufficient data and infers the causes of failures
    6
Secure Locations[5]

       Work on location-aware sensor networks

       Introduces a scalable trust-based routing protocol (TRANS)

       Select trusted paths that do not include misbehaving
        nodes by identifying the insecure locations and routing

       Include two parts:
        1.   trust routing
        2.   insecure location discovery and isolation

    7
Secure Locations                    (cont’d)


       Select a secure path and avoid insecure locations

       All destination nodes use TESLA, to authenticate all requests

        1.   sink creates a message with( source location, destination
             location, authentication message)

        2.    encrypts this message with its share key and broadcasts it.
        3.   neighbors who know its shared key will be able to decrypt the
             request

        4.   trusted neighbor decrypts the request, adds its location,
             encrypts the message with its share key and sends it to
             neighbors
    8
Secure Locations             (cont’d)



       Use Expanding TTL Search (ETS).

1.       Sink marks data packets with increasing hop-count

2.       Each intermediate node decrements the hop-count before
         forwarding

3.       When hop count reaches zero node sends ACK to the
         source informing it of its location is safe

4.       The source identifies that part of the path as safe and
         increases the hop count in subsequent packets.

    9
Advantage & Disadvantage of Centralize
Approaches

    The centralized approach is efficient and accurate to identify
     the network faults in certain ways
    Resource-constrained sensor networks can not always afford
     to periodically collect all the sensor measurements and states
     in a centralized manner
    Central node easily becomes a single point of data traffic
     concentration in the network, as it is responsible for all the
     fault detection and fault management
    This subsequently causes a high volume of message traffic and
     quick energy depletion in certain regions of the network,
     especially the nodes closer to the base station

    10
Advantage & Disadvantage of Centralize
    Approaches(cont’d)


   This approach will become extremely inefficient and expensive
    in consideration of a large-scale sensor network

   Multi-hops communication of this approach will also increase
    the response delay from the base station to faults occurred in
    the network

   Therefore, we have to seek a localized and more
    Computationally efficient fault detection model


    11
Distributed Approach & Node Self-detection
    Use flexible circuit acts as a sensing layer around a node,
     capable of sensing the physical condition of a node.
    Detect physical faults requires the use:

     1.       Hardware interface consists of a
              sensing layer(wraps around the node).

     1.       Software interface reads the sensors,
                                                            Figure 1: SYS25 node.
              and transmits the data to the Sink

               Use TinyOS( have very small footprint, energy-aware, event-based )


    12
Distributed Approach & Clustering
Approach MANNA
    Design for event-driven WSN

    Clustering use for building scalable and energy balanced applications
     for WSNs

    Distribute fault management into each cluster

    Management agents execute in the cluster-heads

    This mechanism decreases the information flow and energy
     consumption as well

    A manager is located externally to the WSN has a global vision

    13
Distributed Approach & Clustering
Approach MANNA
    Management application is divided into two phases:


        Installation

        Occurs as soon as the nodes are deployed in the network.

        Each node report its position and energy to the agent located in the
         cluster-head.

        Agent sends a LOCATION TRAP and ENERGY TRAP to the
         manager

        Manager build topology map model and the WSN energy model

    14
Distributed Approach & Clustering
Approach MANNA
    Management application is divided into two phases:


        Operation


        Each node report its energy level and position to the agent
         whenever there is a state change (another ENERGY TRAP or
         LOCATION TRAP)

        Manager rebuild topology map model and energy model

        Manager sends GET operations in order to retrieve the node
         state
    15
Fault Recovery
    WSN restructured or reconfigured, in such a way that
     failures or faulty nodes do not impact further on network
     performance

    The most commonly used technique for fault recovery is
     replication or redundancy of components that are prone
     to be failure
        When some nodes fail to provide data, the base station still
         gets sufficient data if redundant sensor nodes are deployed in
         the region



    16
Fault Recovery(cont’d)

    Relay Node Placement in Wireless Sensor Networks
        Two-Tiered Wireless Sensor Networks


    Hop-by-Hop TCP for Sensor Networks

    RideSharing: Fault Tolerant Aggregation




    17
Relay Node Placement in Wireless Sensor
Networks(Two-Tiered Wireless Sensor Networks)
    Improving reliability and prolonging lifetime of WSNs

    Energy consumption is proportional to d for transmitting over
     distance d, where is a constant in the interval , long distance
     transmission in WSNs is costly

    Employs some powerful relay nodes whose main function is to
     gather information from raw data from sensor nodes and relay the
     information to the sink

    Relay nodes serve as a backbone of the network

    The relay nodes are more powerful than sensor nodes ( energy
     storage, computing, and communication capabilities)
    18
Two-Tiered Wireless Sensor Networks
   Each cluster has only one cluster head and each sensor
    belongs to at least (backup cluster heads)


   Receiver of a relay node fails
        Data sent by the sensors will be lost
        Sensor to be reallocated to other cluster heads

   Handle general communication faults
        There should be at least two node-disjoint paths between each
         pair of relay nodes in the network



    19
Two-Tiered Wireless Sensor Networks

    An intuitive objective of relay node placement in two-tiered
     WSNs is to place the minimum number of relay nodes, such
     that some degree of fault tolerance can be achieved.


    There are other works that study placement of sensor nodes
     to make a sensor network k-connected




    20
Hop-by-Hop TCP for Sensor Networks
    Why conventional TCP protocol can not be used?
        Communication links in a sensor network are unstable
        TCP protocol over a high loss rate will suffer from severe
         performance degradation
        Sensor may not have sufficient computing power to implement
         the entire TCP/IP protocol
    Hop-by-Hop TCP for Sensor Networks
        Aiming to accelerate reliable packet delivery
        Minimizing end-to-end packet delivery time without too much
         throughput degradation
        Minimizing the number of retransmissions


    21
Hop-by-Hop TCP for Sensor Networks

        Every intermediate node execute a light-weight local
         TCP

        Include two part:
         1.       End-to-End TCP
                   Working on the source and destination nodes


         2.       One-Hop TCP
                  Working on every node
                  The sender module of a One-Hop TCP is working at the
                   sender end of a link, and the receiver module is working at the
                   receiver end.
22
Hop-by-Hop TCP for Sensor Networks




          Figure2. Protocol Stack Hop by Hop TCP
 23
End-to-End TCP

    Reuse an existing popular TCP protocol, NewReno, with
     several modifications

     1.   Sender module forwards packets to the One-Hop TCP
          module
     2.   Receiver module receives packets from the One-Hop TCP
          module
     3.   One-Hop TCP in each node forwards data packets hop by
          hop
     4.   End-to-End ACKs, are forwarded to the source node using
          One-Hop TCP in the opposite direction
     5.   Set a larger initial RTO value
24
One-Hop TCP

         A light-weight version of TCP running on each node to
          forward received packets reliably

         Many TCP features, such as packetization and congestion
          control, are removed
     1.     Add the IP address of current node to the packet header
            (receiver knows where to send Local ACK)
     2.     Set CWND to 1
     3.     Set the upper threshold for the number of
            retransmissions.


25
RideSharing: Fault Tolerant Aggregation
    Aggregation use for filter redundancy and reduce communication
     and energy consumption

    Multipath routing can overcome losses by duplicating and
     forwarding each sensor measurement

    One or more other sensors have correctly overheard the packet

    Some aggregate functions, such as SUM, COUNT, are duplicate-
     sensitive

    Use RideSharing (RS) scheme for fault-tolerant, duplicate-sensitive
     aggregation

    26
RideSharing: Fault Tolerant Aggregation
    Edges are classified into three types: primary, backup, and side
     edges

    Using a small bit vector that each parent attaches to each data
     message it sends

    Parents detect link errors
     when one or more children
     are missing from the bit vector


                                        Figure3. Track Topology

    27
Cascaded RideSharing

    Each parent broadcasts children ids and their bit positions
     inside its bit vector

    When an error occurs, each backup parent decides whether
     or not to correct the error based on its order in a correction
     sequence(parent with smallest id)




    28
References
   [1] Hai Liu, Amiya Nayak, and Ivan Stojmenovi ' Fault-Tolerant Algorithms/Protocols in
    Wireless Sensor Networks' Department of Computer Science, Hong Kong Baptist
    University, Springer-Verlag London Limited 2009


   [2] M.Yu, H.Mokhtar, and M.Merabti, 'A Survey on Fault Management in Wireless Sensor
    Networks' School of Computing & Mathematical Science Liverpool John Moores
    University, 2007


    [3] Farinaz Koushanfar1, Miodrag Potkonjak2, Alberto Sangiovanni-Vincentelli1, ' FAULT
    TOLERANCE IN WIRELESS SENSOR NETWORKS'1Department of Electrical Engineering
    and Computer Science Univeristy of California, Berkeley , CA, US 94720, 2Department of
    Computer Science Univeristy of California, Los Angeles Los Angeles, CA, US 90095


   [4] Nithya Ramanathan, Kevin Chang, Rahul Kapur, Lewis Girod, Eddie Kohler, and eborah
    Estrin,' Sympathy for the Sensor Network Debugger' UCLA Center for Embedded Network
    Sensing, ACM 2005
 29
References(cont’d)

    [5] Jessica Staddon, Dirk Balfanz, Glenn Durfee' Efficient Tracing of Failed Nodes in
     Sensor Networks ', September 28, 2002, Atlanta, Georgia, USA,ACM.


     [6] Sapon Tanachaiwiwat1, Pinalkumar Dave1, Rohan Bhindwale2, Ahmed Helmy1,'
     Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-Aware
     Sensor Networks ' 1. Department of Electrical Engineering – Systems 2. Department of
     Computer Science University of Southern California, ACM 2003


    [7] Gaurav Gupta1, Mohamed Younis2, ' Fault-Tolerant Clustering of Wireless Sensor
     Networks ', Dept. of Computer Science and Elec. Eng. Dept. of Computer Science and
     Elec. Eng. University of Maryland Baltimore County University of Maryland Baltimore
     County 2003 IEEE




30
References(cont’d)
    [8] Jinran Chen, Shubha Kher, and Arun Somani,' Distributed Fault Detection of Wireless
     Sensor Networks' Dependable Computing and Networking Lab Iowa State University
     Ames, Iowa 50010, 2006 IEEE


    [9] Sameh Gobriel, Sherif Khattab, Daniel Moss´e, Jos´e Brustoloni and Rami Melhem,’
     RideSharing: Fault Tolerant Aggregation in Sensor Networks Using Corrective Actions’,
     Computer Science Department, University of Pittsburgh,2006


    [10] Weiyi Zhang, Guoliang Xue and Satyajayant Misra,'Fault-Tolerant Relay Node
     Placement in Wireless Sensor Networks', Department of Computer Science and
     Engineering at Arizona State University, IEEE INFOCOM 2007


    [11] S Harte1, A Rahman1, K M Razeeb2 'FAULT TOLERANCE IN SENSOR NETWORKS
     USING SELF-DIAGNOSING SENSOR NODES', 1 University of Limerick, Ireland 2 Tyndall
     National Institute, Ireland,2005


    31

More Related Content

What's hot

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Darwin Nesakumar
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
ejbyun77
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
Roma Vyas
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
nehabsairam
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
juno susi
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor network
rasyidi usman
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
shiujinghan
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
DeepaDasarathan
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
Mahbubur Rahman
 

What's hot (20)

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Voting protocol
Voting protocolVoting protocol
Voting protocol
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor network
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 

Viewers also liked

Session 5.6 towards a semantic outlier detection framework in wireless sens...
Session 5.6   towards a semantic outlier detection framework in wireless sens...Session 5.6   towards a semantic outlier detection framework in wireless sens...
Session 5.6 towards a semantic outlier detection framework in wireless sens...
semanticsconference
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Sigma web solutions pvt. ltd.
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
Priya Kaushal
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
studying telecommuciation engineering
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
Devdutta Chakrabarti
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
Bala Lavanya
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
IOSR Journals
 
Linear books to open world adventure
Linear books to open world adventureLinear books to open world adventure
Linear books to open world adventure
semanticsconference
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Karthik
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
Jasleen Kaur (Chandigarh University)
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
praveen369
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
ahmad abdelhafeez
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
Mshari Alabdulkarim
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
Souhaiel tekaya
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
Karthik
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
deawoo Kim
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKPavithraRShettigar
 

Viewers also liked (19)

Session 5.6 towards a semantic outlier detection framework in wireless sens...
Session 5.6   towards a semantic outlier detection framework in wireless sens...Session 5.6   towards a semantic outlier detection framework in wireless sens...
Session 5.6 towards a semantic outlier detection framework in wireless sens...
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Lecture3 - Machine Learning
Lecture3 - Machine LearningLecture3 - Machine Learning
Lecture3 - Machine Learning
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Linear books to open world adventure
Linear books to open world adventureLinear books to open world adventure
Linear books to open world adventure
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORK
 

Similar to Fault tolerance in wsn

Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
Munazza63
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 
C0511318
C0511318C0511318
C0511318
IOSR Journals
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data Transfer
IJAEMSJORNAL
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
mmjalbiaty
 
Building Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology ModelBuilding Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology Model
IJAAS Team
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
DeepaDasarathan
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
IDES Editor
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
Thesis Scientist Private Limited
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
Adit Pathak
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
IDES Editor
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
IJMTST Journal
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
Ramesh Patriotic
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
IISRT
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...
IISRTJournals
 
Bm32410415
Bm32410415Bm32410415
Bm32410415
IJERA Editor
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
sophiabelthome
 

Similar to Fault tolerance in wsn (20)

Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
FINAL
FINALFINAL
FINAL
 
C0511318
C0511318C0511318
C0511318
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data Transfer
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Building Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology ModelBuilding Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology Model
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Bm32410415
Bm32410415Bm32410415
Bm32410415
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Fault tolerance in wsn

  • 1. Elham Hormozi & Razieh Asadi e.hormozi@ustmb.ac.ir & Rzh_asadi@yahoo.com 1
  • 2. Outline  Review of Wireless Sensor Network  Fault Tolerance in WSNs  Fault Detection  Fault Recovery  Relay Node Placement in Wireless Sensor Networks  Hop-by-Hop TCP for Sensor Networks  Conclusion 2
  • 3. Review of Wireless Sensor Network  A WSN is a self-organized network that consists of a large number of low-cost and low powered sensor devices, called sensor nodes  Can be deployed on the ground, in the air, in vehicles, on bodies, under water, and inside buildings  Each sensor node is equipped with a sensing unit, which is used to capture events of interest, and a wireless transceiver, which is used to transform the captured events back to the base station, called sink node  Sensor nodes collaborate with each other to perform tasks of data sensing, data communication, and data processing 3
  • 4. Type of failure in WSNs  Energy depletion  Have very limited energy and their batteries cannot usually be recharged or replaced, due to hostile or hazardous environments  Hardware failure  A sensor node has two component: sensing unit and wireless transceiver  Usually directly interact with the environment, which is subject to variety of physical, chemical, and biological factors.  Communication link errors  Even if condition of the hardware is good, the communication between sensor nodes is affected by many factors, such as signal strength, antenna angle, obstacles, weather conditions  Malicious attack It results in low reliability of performance of sensor nodes. Therefore, fault tolerance is one of the critical issues in WSNs 4
  • 5. Fault Detection:  Centralized Approach • Sympathy • Secure Locations  Distributed Approach 1. Node Self-detection 2. Clustering Approach( MANNA) 5
  • 6. Sympathy[4]  Using a message-flooding approach to pool event data and current states (metrics) from sensor node  Nodes periodically send metrics back to a sink to detect failures and cause of failure  Given sensor hardware and network limitations, these transmitted metrics must be minimized  Insufficient data at the sink implies failure; sufficient data at the sink implies acceptable network behavior  Based on these metrics, it detects which nodes or components have not delivered sufficient data and infers the causes of failures 6
  • 7. Secure Locations[5]  Work on location-aware sensor networks  Introduces a scalable trust-based routing protocol (TRANS)  Select trusted paths that do not include misbehaving nodes by identifying the insecure locations and routing  Include two parts: 1. trust routing 2. insecure location discovery and isolation 7
  • 8. Secure Locations (cont’d)  Select a secure path and avoid insecure locations  All destination nodes use TESLA, to authenticate all requests 1. sink creates a message with( source location, destination location, authentication message) 2. encrypts this message with its share key and broadcasts it. 3. neighbors who know its shared key will be able to decrypt the request 4. trusted neighbor decrypts the request, adds its location, encrypts the message with its share key and sends it to neighbors 8
  • 9. Secure Locations (cont’d)  Use Expanding TTL Search (ETS). 1. Sink marks data packets with increasing hop-count 2. Each intermediate node decrements the hop-count before forwarding 3. When hop count reaches zero node sends ACK to the source informing it of its location is safe 4. The source identifies that part of the path as safe and increases the hop count in subsequent packets. 9
  • 10. Advantage & Disadvantage of Centralize Approaches  The centralized approach is efficient and accurate to identify the network faults in certain ways  Resource-constrained sensor networks can not always afford to periodically collect all the sensor measurements and states in a centralized manner  Central node easily becomes a single point of data traffic concentration in the network, as it is responsible for all the fault detection and fault management  This subsequently causes a high volume of message traffic and quick energy depletion in certain regions of the network, especially the nodes closer to the base station 10
  • 11. Advantage & Disadvantage of Centralize Approaches(cont’d)  This approach will become extremely inefficient and expensive in consideration of a large-scale sensor network  Multi-hops communication of this approach will also increase the response delay from the base station to faults occurred in the network  Therefore, we have to seek a localized and more Computationally efficient fault detection model 11
  • 12. Distributed Approach & Node Self-detection  Use flexible circuit acts as a sensing layer around a node, capable of sensing the physical condition of a node.  Detect physical faults requires the use: 1. Hardware interface consists of a sensing layer(wraps around the node). 1. Software interface reads the sensors, Figure 1: SYS25 node. and transmits the data to the Sink  Use TinyOS( have very small footprint, energy-aware, event-based ) 12
  • 13. Distributed Approach & Clustering Approach MANNA  Design for event-driven WSN  Clustering use for building scalable and energy balanced applications for WSNs  Distribute fault management into each cluster  Management agents execute in the cluster-heads  This mechanism decreases the information flow and energy consumption as well  A manager is located externally to the WSN has a global vision 13
  • 14. Distributed Approach & Clustering Approach MANNA  Management application is divided into two phases:  Installation  Occurs as soon as the nodes are deployed in the network.  Each node report its position and energy to the agent located in the cluster-head.  Agent sends a LOCATION TRAP and ENERGY TRAP to the manager  Manager build topology map model and the WSN energy model 14
  • 15. Distributed Approach & Clustering Approach MANNA  Management application is divided into two phases:  Operation  Each node report its energy level and position to the agent whenever there is a state change (another ENERGY TRAP or LOCATION TRAP)  Manager rebuild topology map model and energy model  Manager sends GET operations in order to retrieve the node state 15
  • 16. Fault Recovery  WSN restructured or reconfigured, in such a way that failures or faulty nodes do not impact further on network performance  The most commonly used technique for fault recovery is replication or redundancy of components that are prone to be failure  When some nodes fail to provide data, the base station still gets sufficient data if redundant sensor nodes are deployed in the region 16
  • 17. Fault Recovery(cont’d)  Relay Node Placement in Wireless Sensor Networks  Two-Tiered Wireless Sensor Networks  Hop-by-Hop TCP for Sensor Networks  RideSharing: Fault Tolerant Aggregation 17
  • 18. Relay Node Placement in Wireless Sensor Networks(Two-Tiered Wireless Sensor Networks)  Improving reliability and prolonging lifetime of WSNs  Energy consumption is proportional to d for transmitting over distance d, where is a constant in the interval , long distance transmission in WSNs is costly  Employs some powerful relay nodes whose main function is to gather information from raw data from sensor nodes and relay the information to the sink  Relay nodes serve as a backbone of the network  The relay nodes are more powerful than sensor nodes ( energy storage, computing, and communication capabilities) 18
  • 19. Two-Tiered Wireless Sensor Networks  Each cluster has only one cluster head and each sensor belongs to at least (backup cluster heads)  Receiver of a relay node fails  Data sent by the sensors will be lost  Sensor to be reallocated to other cluster heads  Handle general communication faults  There should be at least two node-disjoint paths between each pair of relay nodes in the network 19
  • 20. Two-Tiered Wireless Sensor Networks  An intuitive objective of relay node placement in two-tiered WSNs is to place the minimum number of relay nodes, such that some degree of fault tolerance can be achieved.  There are other works that study placement of sensor nodes to make a sensor network k-connected 20
  • 21. Hop-by-Hop TCP for Sensor Networks  Why conventional TCP protocol can not be used?  Communication links in a sensor network are unstable  TCP protocol over a high loss rate will suffer from severe performance degradation  Sensor may not have sufficient computing power to implement the entire TCP/IP protocol  Hop-by-Hop TCP for Sensor Networks  Aiming to accelerate reliable packet delivery  Minimizing end-to-end packet delivery time without too much throughput degradation  Minimizing the number of retransmissions 21
  • 22. Hop-by-Hop TCP for Sensor Networks  Every intermediate node execute a light-weight local TCP  Include two part: 1. End-to-End TCP  Working on the source and destination nodes 2. One-Hop TCP  Working on every node  The sender module of a One-Hop TCP is working at the sender end of a link, and the receiver module is working at the receiver end. 22
  • 23. Hop-by-Hop TCP for Sensor Networks Figure2. Protocol Stack Hop by Hop TCP 23
  • 24. End-to-End TCP  Reuse an existing popular TCP protocol, NewReno, with several modifications 1. Sender module forwards packets to the One-Hop TCP module 2. Receiver module receives packets from the One-Hop TCP module 3. One-Hop TCP in each node forwards data packets hop by hop 4. End-to-End ACKs, are forwarded to the source node using One-Hop TCP in the opposite direction 5. Set a larger initial RTO value 24
  • 25. One-Hop TCP  A light-weight version of TCP running on each node to forward received packets reliably  Many TCP features, such as packetization and congestion control, are removed 1. Add the IP address of current node to the packet header (receiver knows where to send Local ACK) 2. Set CWND to 1 3. Set the upper threshold for the number of retransmissions. 25
  • 26. RideSharing: Fault Tolerant Aggregation  Aggregation use for filter redundancy and reduce communication and energy consumption  Multipath routing can overcome losses by duplicating and forwarding each sensor measurement  One or more other sensors have correctly overheard the packet  Some aggregate functions, such as SUM, COUNT, are duplicate- sensitive  Use RideSharing (RS) scheme for fault-tolerant, duplicate-sensitive aggregation 26
  • 27. RideSharing: Fault Tolerant Aggregation  Edges are classified into three types: primary, backup, and side edges  Using a small bit vector that each parent attaches to each data message it sends  Parents detect link errors when one or more children are missing from the bit vector Figure3. Track Topology 27
  • 28. Cascaded RideSharing  Each parent broadcasts children ids and their bit positions inside its bit vector  When an error occurs, each backup parent decides whether or not to correct the error based on its order in a correction sequence(parent with smallest id) 28
  • 29. References  [1] Hai Liu, Amiya Nayak, and Ivan Stojmenovi ' Fault-Tolerant Algorithms/Protocols in Wireless Sensor Networks' Department of Computer Science, Hong Kong Baptist University, Springer-Verlag London Limited 2009  [2] M.Yu, H.Mokhtar, and M.Merabti, 'A Survey on Fault Management in Wireless Sensor Networks' School of Computing & Mathematical Science Liverpool John Moores University, 2007  [3] Farinaz Koushanfar1, Miodrag Potkonjak2, Alberto Sangiovanni-Vincentelli1, ' FAULT TOLERANCE IN WIRELESS SENSOR NETWORKS'1Department of Electrical Engineering and Computer Science Univeristy of California, Berkeley , CA, US 94720, 2Department of Computer Science Univeristy of California, Los Angeles Los Angeles, CA, US 90095  [4] Nithya Ramanathan, Kevin Chang, Rahul Kapur, Lewis Girod, Eddie Kohler, and eborah Estrin,' Sympathy for the Sensor Network Debugger' UCLA Center for Embedded Network Sensing, ACM 2005  29
  • 30. References(cont’d)  [5] Jessica Staddon, Dirk Balfanz, Glenn Durfee' Efficient Tracing of Failed Nodes in Sensor Networks ', September 28, 2002, Atlanta, Georgia, USA,ACM.  [6] Sapon Tanachaiwiwat1, Pinalkumar Dave1, Rohan Bhindwale2, Ahmed Helmy1,' Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-Aware Sensor Networks ' 1. Department of Electrical Engineering – Systems 2. Department of Computer Science University of Southern California, ACM 2003  [7] Gaurav Gupta1, Mohamed Younis2, ' Fault-Tolerant Clustering of Wireless Sensor Networks ', Dept. of Computer Science and Elec. Eng. Dept. of Computer Science and Elec. Eng. University of Maryland Baltimore County University of Maryland Baltimore County 2003 IEEE 30
  • 31. References(cont’d)  [8] Jinran Chen, Shubha Kher, and Arun Somani,' Distributed Fault Detection of Wireless Sensor Networks' Dependable Computing and Networking Lab Iowa State University Ames, Iowa 50010, 2006 IEEE   [9] Sameh Gobriel, Sherif Khattab, Daniel Moss´e, Jos´e Brustoloni and Rami Melhem,’ RideSharing: Fault Tolerant Aggregation in Sensor Networks Using Corrective Actions’, Computer Science Department, University of Pittsburgh,2006   [10] Weiyi Zhang, Guoliang Xue and Satyajayant Misra,'Fault-Tolerant Relay Node Placement in Wireless Sensor Networks', Department of Computer Science and Engineering at Arizona State University, IEEE INFOCOM 2007   [11] S Harte1, A Rahman1, K M Razeeb2 'FAULT TOLERANCE IN SENSOR NETWORKS USING SELF-DIAGNOSING SENSOR NODES', 1 University of Limerick, Ireland 2 Tyndall National Institute, Ireland,2005 31