Robustness in wireless sensor networks
Transcription
Robustness in wireless sensor networks
Robustness in wireless sensor networks David SIMPLOT-RYL Centre de recherche INRIA Lille – Nord Europe IRCICA/LIFL, CNRS 8022, Université de Lille 1 http://www.lifl.fr/~simplot simplot@lifl.fr SETOP 2008 David SIMPLOT-RYL Robustness in WSN Outlines I. Wireless Sensor Networks II. Activity scheduling and coverage problem III. Key distribution in wireless sensor networks IV. Routing with guaranteed delivery SETOP 2008 David SIMPLOT-RYL Robustness in WSN Outlines I. Wireless Sensor Networks II. Activity scheduling and coverage problem III. Key distribution in wireless sensor networks IV. Routing with guaranteed delivery SETOP 2008 David SIMPLOT-RYL Robustness in WSN RFID Tags Smart labels Radio Frequency Identification Tag By opposition to bar code which use optical principles A stronly limited component: 500 times smaller than a classical microprocessor Intel Pentium 4 RFID Tag SETOP 2008 David SIMPLOT-RYL Robustness in WSN Chip with a size of some mm² EAS Application Electronic Article Surveillance Once powered, the tag emits The reader listen channel and activate alarm as early as transmission is detected During checkout, the tag is burned out Problem: power and hear the tag whatever the tag orientation SETOP 2008 David SIMPLOT-RYL Robustness in WSN Applications Batch identification It is the capability to collect information from a set of tags In opposition to optical identification Marathon Automatic clocking in Automatic luggage sorting Automatic inventory 50 items in less than one second SETOP 2008 David SIMPLOT-RYL Robustness in WSN More POPS, smaller POPS… 100µm Courtesy, Alien Technology POPS = Portable Objects Proved to be Safe POPS = Petits Objets Portables et Sécurisés SETOP 2008 David SIMPLOT-RYL Robustness in WSN SETOP 2008 David SIMPLOT-RYL Robustness in WSN Courtesy, Auto-ID Center The MIT Auto-ID Center Vision of “the internet of things” Networking the physical world Savant Control System RF Tag SETOP 2008 David SIMPLOT-RYL Robustness in WSN Networked Tag Readers Auto-ID Center classification Class V tags Readers. Can power other Class I, II and III tags; Communicate with Classes IV and V. Class IV tags: Active tags with broad-band peer-to-peer communication Class III tags: semi-passive RFID tags Class II tags: passive tags with additional functionality Class 0/Class I: read-only passive tags SETOP 2008 David SIMPLOT-RYL Robustness in WSN Benefits of class IV tags Decentralized behavior The request is broadcasted in the whole network by using multi-hop method Similar to sensor networks Reader Complete population Monitoring station SETOP 2008 David SIMPLOT-RYL Robustness in WSN Sensor Nets for Search and Rescue Inactive Sensor SETOP 2008 David SIMPLOT-RYL Robustness in WSN Sensor Nets for Search and Rescue SETOP 2008 David SIMPLOT-RYL Robustness in WSN Sensor Nets for Search and Rescue Active Sensor SETOP 2008 David SIMPLOT-RYL Robustness in WSN Application In the UC Berkeley Botanical Garden, 50 “micromotes” sensors are dangled like earrings from the branches of 3 redwood trees to monitor their growth. SETOP 2008 David SIMPLOT-RYL Robustness in WSN Event-driven model SETOP 2008 David SIMPLOT-RYL Robustness in WSN On-demand model SETOP 2008 David SIMPLOT-RYL Robustness in WSN WASP Project Wirelessly Accessible Sensor Populations Philips Research Eindhoven, Philips Forschung Laboratorium, IMEC, CSEM, TU/ e, Microsoft Aachen, Health Telematic Network, Fraunhofer IIS, Fokus, IGD, Wageningen UR, Imperial College London, STMicroelectronics, INRIA, Ecole Polytechnique Federale Lausanne, Cefriel, Centro Ricerce Fiat, Malaerdalen University, RWTH Aachen, SAP, Univ of Paderborn SETOP 2008 David SIMPLOT-RYL Robustness in WSN SVP Project Surveiller et Prévenir CEA, INRIA, Institut Maupertuis, Aphycare, LIP6, M2S, Thales, ANACT SETOP 2008 David SIMPLOT-RYL Robustness in WSN Outlines I. Wireless Sensor Networks II. Activity scheduling and coverage problem III. Key distribution in wireless sensor networks IV. Routing with guaranteed delivery SETOP 2008 David SIMPLOT-RYL Robustness in WSN Sensor Networks => Nodes periodically turn into sleep or active mode => Need for activity scheduling and self-organization => Connectivity and area coverage must be preserved SETOP 2008 David SIMPLOT-RYL Robustness in WSN Sensor Coverage How well do the sensors observe the physical space Sensor deployment: random vs. deterministic Sensor coverage: point vs. area Coverage algorithms: centralized, distributed, or localized Sensing & communication range Additional requirements: energy-efficiency and connectivity Objective: maximum network lifetime or minimum number of sensors Area (point)-dominating set A small subset of sensor nodes that covers the monitored area (targets) Nodes not belonging to this set do not participate in the monitoring – they sleep Localized solutions With and without neighborhood information SETOP 2008 David SIMPLOT-RYL Robustness in WSN Sensor coverage (2) Avoid blind points SETOP 2008 David SIMPLOT-RYL Robustness in WSN Sensor coverage (3) Avoid lost of connectivity SETOP 2008 David SIMPLOT-RYL Robustness in WSN Area-dominating set With neighborhood info [Tian and Geoganas, 2002] Each node knows all its neighbors’ positions. Each node selects a random timeout interval. At timeout, if a node sees that neighbors who have not yet sent any messages together cover its area, it transmits a “withdrawal” and goes to sleep Otherwise, the node remains active but does not transmit any message With neighborhood info based on Dai and Wu’s Rule k [Carle and Simplot-Ryl, 2004] Each node knows either 2- or 3-hop neighborhood topology information A node u is fully covered by a subset S of its neighbors iff three conditions hold The subset S is connected. Any neighbor of u is a neighbor of S. All nodes in S have higher priority than u. SETOP 2008 David SIMPLOT-RYL Robustness in WSN Wu & Dai dominating sets (Simplified version [Carle and Simplot-Ryl 2004]) Each node has a priority (e.g. its ID) Variations: <degree, ID> <battery, degree, ID> <random, battery, degree, ID> … A node is not dominant iff The set of neighbors with higher priority is connected and covers the neighborhood SETOP 2008 David SIMPLOT-RYL Robustness in WSN Connected area dominating sets [Carle, Simplot-Ryl 2004][Gallais et al. 2006] We change notion of coverage A node u is covered by a subset A of its neighborhood if the monitoring area of u is covered by nodes of A Remaining battery is used as priority Timeout is used to inform transmit priority Examples: SETOP 2008 David SIMPLOT-RYL Robustness in WSN Connected area dominating sets (2) We obtain a Connected Area Dominating Set SETOP 2008 David SIMPLOT-RYL Robustness in WSN Coverage without neighborhood info PEAS: probabilistic approach [F. Ye et al, 2003] A node sleeps for a while (the period is adjustable) and decides to be active iff there are no active nodes closer than r’. When a node is active, it remain active until it fails or runs out of battery. The probability of full coverage is close to 1 if where r is the sensing (transmission) range No guarantee of coverage or connectivity! SETOP 2008 David SIMPLOT-RYL Robustness in WSN Ranges Communication Range, noted as CR Sensing Range, noted as SR SR2SR SR < CR =≤CR < 2SR CR CR SRSR SR SETOP 2008 David SIMPLOT-RYL Robustness in WSN Monitored Area, noted as S(u) Overview TGJD Neighbor Discovery phase Evaluating phase Sensing phase One round Time Neighbor discovery phase Evaluating phase Back-off scheme: avoid blind point (no neighboring nodes can simultaneously decide to withdraw) A node decides to sleep: OFF message sent to one-hop neighbours Receiving OFF messages during the timeout: corresponding neighbors are removed from the neighbor table ⇒ At the end of the timeout, decision is made considering only non-turned-off neighbors Connectivity is ensured as long as 2SR ≤ CR SETOP 2008 David SIMPLOT-RYL Robustness in WSN Carle, Gallais, Simplot-Ryl and Stojmenovic, 2005 (CGSS) Neighbor Discovery phase Evaluating phase Sensing phase One round Time Evaluating phase Each node waits during a random timeout Once timeout ends, a node evaluates its coverage and decides Advertisement is then sent to one-hop neighbors It only contains the position (x,y) Any message received during the timeout stands for a new neighbor to be considered SETOP 2008 David SIMPLOT-RYL Robustness in WSN CGSS: Connectivity and Advertisements Connectivity is ensured for any SR/CR ratio since full coverage must be provided by a connected set (cf. Dai and Wu) SR=CR Which information must be broadcasted? Positive-only, PO: u broadcasts its position iff it remains active Positive and negative, PN: u emits whatever the decision is. SETOP 2008 David SIMPLOT-RYL Robustness in WSN CGSS: Positive-only (SR=CR) 1? empty 5 ? active 1 2 ? 1 7 3 4 2 active 6 6 1 2 3 active 3 ? ? 3 4 2 5 active 4 5 sleep 7 ? 1 2 4 ? active 1 active SETOP 2008 David SIMPLOT-RYL Robustness in WSN CGSS: Positive and Negative (SR=CR) 1 empty 5 active 1 2 7 3 4 2 active I’m OFF 1 6 6 1 2 3 active 3 4 3 ? 2 5 active 4 5 sleep 7 ? 1 2 6 4 sleep 1 active SETOP 2008 David SIMPLOT-RYL Robustness in WSN CGSS / TGJD: Overview Main results: Similar number of active nodes Both provide full area coverage CGSS: provides connectivity for nodes with any SR/CR ratio Uses a quicker, more simple and more flexible coverage evaluation scheme CGSS: Much lower communication overhead Impacts network lifetime once communication costs are considered CGSS: Knowledge comes with activity No impact on area coverage once messages get lost SETOP 2008 David SIMPLOT-RYL Robustness in WSN Experimental results impact on protocol performances once messages get lost => Loss of messages induce coverage Density 70loss for TGJD 100 David SIMPLOT-RYL area SETOP 2008 90Robustness in WSN 80 Work in progress Layer i Extend CGSS to k-coverage Insert a parameter (layer k) in activity messages While i<k and covered at layer i, evaluate coverage at layer i+1 Each node looks at its k-coverage Decides to be active or not Non-ideal physical layer for sensing Unit disk may not be always valid ;-) Would it really impact existing protocols? Coverage evaluation scheme would be modified Or shorter sensing radii could be announced SETOP 2008 David SIMPLOT-RYL Robustness in WSN Layer i+1 Outlines I. Wireless Sensor Networks II. Activity scheduling and coverage problem III. Key distribution in wireless sensor networks IV. Routing with guaranteed delivery SETOP 2008 David SIMPLOT-RYL Robustness in WSN Key pre-distribution in WSN Security issues in wireless sensor networks: Fault insertion and pervasive listening No collaboration problem Cryptography for communication between valid nodes Public key mechanisms require too much computation power Use of symmetrical schemes Nodes can be captured A single shared secret can be compromised by the capture of a single node (Nodes can be captured at anytime! Even during bootstrap!) Each node contains a subset of a key space Let K be a set keys. Each node has a randomly chosen subset of K of size n Two nodes can communicate if they share a key Remark: if 2n>k, two nodes can always communicate SETOP 2008 David SIMPLOT-RYL Robustness in WSN Illustration Determine the key spool (here K=12) Key pre-distribution: each node receives n keys (here n=3) S2 S1 SETOP 2008 David SIMPLOT-RYL Robustness in WSN Illustration (2) Random deployment Initialization phase: neighbour discovery + key establishment With ID Hello, I am Bob S2 S1 SETOP 2008 Hello, I am Alice David SIMPLOT-RYL Robustness in WSN Illustration (2) Random deployment Initialization phase: neighbour discovery + key establishment Without ID Hello, I am Bob S2 S1 SETOP 2008 Hello, me too David SIMPLOT-RYL Robustness in WSN Illustration (3) Initialization phase (continued) Find common key S2 S1 Nodes can proceed to mutual authentication by using this key or establish a pairwise key But since the enemy can capture nodes and listen even during initialization phase, a link which uses a key derived of “ ” is considered as corrupted SETOP 2008 David SIMPLOT-RYL Robustness in WSN K=10 000 K=100 % of key space size Probability of key establishment Number of keys What matters? n, the number of embedded keys p, the probability of key establishment SETOP 2008 David SIMPLOT-RYL Robustness in WSN K, the size of key space is derived from n and p Key predistribution in WSN (continued) Robustness of the network Percentage of compromised links (i.e. links that can be listened) vs number of captured nodes Common strategy = increase the size K It diminishes the probability of communication establishment The number of nodes has to be increased in order to preserve connectivity probability Probability of connectivity of the network if evaluate via random network model This model does not take physical proximity for link establishment The metric has to be modified: Percentage of compromise links vs percentage of captured nodes SETOP 2008 David SIMPLOT-RYL Robustness in WSN Examples of randomly generated graphs according to different probabilities p and different densities SETOP 2008 David SIMPLOT-RYL Robustness in WSN Probability of connectivity SETOP 2008 David SIMPLOT-RYL Robustness in WSN Compromised nodes Reducing p does not improve robustness (because of connectivity constrainsts) SETOP 2008 David SIMPLOT-RYL Robustness in WSN Summary Offline: generation of key spool and distribution of keys Deployment Sensing phase t Initialization phase SETOP 2008 David SIMPLOT-RYL Robustness in WSN Key-predistribution and activity scheduling Deployment Sensing phase Sensing phase Sensing phase t 1 round SETOP 2008 David SIMPLOT-RYL Robustness in WSN Multi-deployment scheme Multi-deployment Set of nodes are sequentially deployed with disjoint key spaces The number of deployed sensor nodes is linear with number of rounds Multi-deployment with re-use of already deployed nodes Introduction of “bridge” nodes which can connect nodes of different deployments These nodes are supposed to be stronger than usual nodes. It is not clear that capture of bridge nodes are considered Evaluation = simple repetition of basic scheme SETOP 2008 David SIMPLOT-RYL Robustness in WSN Evaluation Deployment Deployment Sensing phase Deployment Sensing phase Sensing phase t 1 round SETOP 2008 David SIMPLOT-RYL Robustness in WSN Conclusion (1) Augmentation of number of keys does not improve robustness of the networks Network lifetime enhancement: Multi-deployments schemes are efficient but what is the cost of redeployments? Activity scheduling requires that all nodes are present at the beginning and leads to low robustness Future works: Combination of activity scheduling and re-deployment (re-use of still active nodes by using not completely disjoint key spaces) Topology control: there are no need to establish pairwise key with all neighbors (e.g. RNG) SETOP 2008 David SIMPLOT-RYL Robustness in WSN Conclusion (2) Other solutions seem promising: Define unique session key for each couple of nodes with a probability of 100% Key spool = symmetric matrix K such K=AxB In each node we embed a random row and a random column Key establishment = exchange of rows and multiplication by own column To do: evaluation of amount of data needed for key establishment compared to key-predistribution scheme SETOP 2008 David SIMPLOT-RYL Robustness in WSN Outlines I. Wireless Sensor Networks II. Activity scheduling and coverage problem III. Key distribution in wireless sensor networks IV. Routing with guaranteed delivery SETOP 2008 David SIMPLOT-RYL Robustness in WSN Basic principles Nodes know their own geographical position and positions of their neighbors localized When a node has a packet for a given destination (knowing its position), it decides which neighbor is the next hop S A D memory-less B Example: S forwards to neighbor B closest to D [Finn 1987] SETOP 2008 David SIMPLOT-RYL Robustness in WSN Some variations Nearest forward progress [Hou] small steps More forward progress [Kleinrock] big steps Random progress [Nelson, Kleinrock] B ??? … Most close to SD with progress [Elhafsi, SimplotRyl] Variation of DIR [Basagni et al.] which is not loop free [Stojmenovic] SETOP 2008 David SIMPLOT-RYL Robustness in WSN E A C S A ’ F D DIR is not loop-free ! E H D F Transmission radius G • Greedy and MFR are loop free • If we include constraints on positive progress, the protocol is loopfree • What if there is no neighbor with (strictly) positive progress? • Dead-end Recovery process SETOP 2008 David SIMPLOT-RYL Robustness in WSN Face routing – guaranteed delivery S P C R A L B R E U L D F [Bose et al. 1999] Construct planar subgraph Route in planar subgraph: SABCEBFED SC…ABFD…W…VP SETOP 2008 David SIMPLOT-RYL Robustness in WSN V Right hand rule W Planarization GG SETOP 2008 RNG GG = Gabriel Graph RNG = Relative Neighborhood Graph GG contains RNG They are both planar (if the initial graph is the UDG) David SIMPLOT-RYL Robustness in WSN Example of GG SETOP 2008 David SIMPLOT-RYL Robustness in WSN FACE is not energy efficient For two reasons: The path itself can be long Because of GG, edges are short can be inefficient Two counter-measures: Stop the recovery as soon as possible When in dead-end: note the distance to the destination Apply FACE until reaching a node which is closer than this distance Frey and Stojmenovic have shown that only one face is used for each recovery This scheme is called GFG Greedy-FACE-Greedy [Data et al.] where greedy part can be energy efficient (see later) Apply Shortest path over FACE inefficient since edges maintained in GG are the shortest ones Other solutions exist (see later) SETOP 2008 David SIMPLOT-RYL Robustness in WSN Cost-over-progress scheme [Data, Stojmenovic] The principle is to consider each neighbor with positive progress and to evaluate the cost of the complete path Current node = U Considered neighbor = V Destination = D V D U Cost of one step = cost(U,V) Number of steps = |UD| / progress Progress = |UD|-|VD| Evaluation of the cost of the path under homogeneous hypothesis: cost(U,V)*|UD|/progress When minimizing this total cost |UD| is constant, so it is equivalent to minimize cost/progress SETOP 2008 David SIMPLOT-RYL Robustness in WSN Introducing shortest path in greedy part After choosing the next neighbor, SP can be apply SETOP 2008 Ruiz et al. proposed to apply this after MFR Problem: SP can include nodes which are farther to the destination the path has to be embedded in the message or at least the “truncated SP” David SIMPLOT-RYL Robustness in WSN Removing memorization of the SP In order to prevent the insertion of SP (or truncated SP) in message, we can use positive path A path is said to be positive is the distance to the destination is strictly decreasing 5. Note the distance from the current node to the destination 6. Apply FACE until reaching a node which is closer, then go to 1 SETOP 2008 David SIMPLOT-RYL Robustness in WSN Recovery 1. the current node choose the target neighbor (e.g. MFR) If there is no target, go to 5 (recovery) 2. It computes the shortest positive path to this node 3. It sends the packet to the next node in this path 4. Go to 1 Greedy Summary: Selecting the target neighbor Ruiz et al. proposed to apply MFR Cost-over-progress can also be applied More accurate: we can replace the cost by the cost of the shortest positive path… Summary: SETOP 2008 David SIMPLOT-RYL Robustness in WSN Recovery 5. Note the distance from the current node to the destination 6. Apply FACE until reaching a node which is closer, then go to 1 Greedy 1. the current node choose the target neighbor which is the neighbor with strictly positive progress which minimizes cost-over-progress where the cost is the cost of the shortest positive path If there is no target, go to 5 (recovery) 2. It computes the shortest positive path to this node 3. It sends the packet to the next node in this path 4. Go to 1 Performances Cost/progres SP after MFR SPP after C/P SETOP 2008 David SIMPLOT-RYL Robustness in WSN Energy-efficient recovery The main problem is length of the edges in GG idea: before applying GG: apply a connected dominating set algorithm which minimizes the number of dominant nodes A set of nodes is said to be dominant iff each node of the network is in this set of a neighbor of one node in this set SETOP 2008 David SIMPLOT-RYL Robustness in WSN Wu & Dai dominating sets (Simplified version [Carle and Simplot-Ryl 2004]) Each node has a priority (e.g. its ID) Variations: <degree, ID> <battery, degree, ID> <random, battery, degree, ID> … A node is not dominant iff The set of neighbors with higher priority is connected and covers the neighborhood SETOP 2008 David SIMPLOT-RYL Robustness in WSN Energy-efficient recovery The main problem is length of the edges in GG idea: before applying GG: apply a connected dominating set algorithm which minimises the number of dominant nodes A set of nodes is said to be dominant iff each node of the network is in this set of a neighbor of one node in this set Then, apply FACE over the dominating set where routing along an edge uses shortest positive path SETOP 2008 David SIMPLOT-RYL Robustness in WSN GG over CDS SETOP 2008 David SIMPLOT-RYL Robustness in WSN Performances Cost/Progress without DS with DS SETOP 2008 David SIMPLOT-RYL Robustness in WSN SPP after C/P SP after MFR What else? SETOP 2008 David SIMPLOT-RYL Robustness in WSN Multicasting Same problem but the message as to be sent to several targets SETOP 2008 David SIMPLOT-RYL Robustness in WSN MST-based splitting decision Ingelrest et al. have shown that MST is a good approximation of the Steiner tree and propose to use it for splitting decision: SETOP 2008 David SIMPLOT-RYL Robustness in WSN Greedy part For each group, apply a variation of cost-over-progress The cost is as usual (techniques presented in the first part apply) But what progress??? Again, we use MST in order to estimate to distance t1 V If U is the current node, the progress when considering V is |MST(U,t1,…,tN)|-|MST(V,t1,…,tN)| SETOP 2008 David SIMPLOT-RYL Robustness in WSN t2 U Recovery part We can apply a variation of FACE: When a dead-end is detected we note the distance to the closest target/ destination and we apply FACE to this destination until we reach a node for whom there exists a target closer than this distance. Other possibility: replace the line to the destination by the MST edge SETOP 2008 David SIMPLOT-RYL Robustness in WSN Performances Ruiz et al. 2007 MSTEAM Centralized Algorithm SETOP 2008 David SIMPLOT-RYL Robustness in WSN Next? SETOP 2008 David SIMPLOT-RYL Robustness in WSN Conclusion & perspectives Best-known position-based routing (unicast and multicast) have been presented With geographical information Basic algorithm: YES Energy efficient (EE): YES Guaranteed delivery (GD): YES EE+GD: YES (MFR) (cost/progress, ETE’ ……) (FACE, GFG) (ETE) Without geographical information SETOP 2008 Basic algorithm: YES Energy efficient (EE): YES Guaranteed delivery (GD): YES EE+GD: YES David SIMPLOT-RYL Robustness in WSN (VCap) (VCost…) (LTP) (HECTOR) Conclusion & perspectives Are these protocols efficient in real world? Big problem: the guaranteed delivery part requires planarization of the connection graph… Planarization of an arbitrary graph cannot be done in a localized way Challenge: which properties are needed for the physical layer in order to find a localized algorithm for the planarization SETOP 2008 David SIMPLOT-RYL Robustness in WSN Robustness in wireless sensor networks David SIMPLOT-RYL Centre de recherche INRIA Lille – Nord Europe IRCICA/LIFL, CNRS 8022, Université de Lille 1 http://www.lifl.fr/~simplot simplot@lifl.fr SETOP 2008 David SIMPLOT-RYL Robustness in WSN