Results 1 - 10
of
189
Reputation-based framework for high integrity sensor networks
- In SASN ’04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, 2004
"... The traditional approach of providing network security has been to borrow tools from cryptography and authentication. However, we argue that the conventional view of security based on cryptography alone is not sufficient for the unique characteristics and novel misbehaviors encountered in sensor net ..."
Abstract
-
Cited by 257 (7 self)
- Add to MetaCart
(Show Context)
The traditional approach of providing network security has been to borrow tools from cryptography and authentication. However, we argue that the conventional view of security based on cryptography alone is not sufficient for the unique characteristics and novel misbehaviors encountered in sensor networks. Fundamental to this is the observation that cryptography cannot prevent malicious or non-malicious insertion of data from internal adversaries or faulty nodes. We believe that in general tools from different domains such as economics, statistics and data analysis will have to be combined with cryptography for the development of trustworthy sensor networks. Following this approach, we propose a reputation-based framework for sensor networks where nodes maintain reputation for other nodes and use it to evaluate their trustworthiness. We will show that this framework provides a scalable, diverse and a generalized approach for countering all types of misbehavior resulting from malicious and faulty nodes. We are currently developing a system within this framework where we employ a Bayesian formulation, specifically a beta reputation system, for reputation representation, updates and integration. We will explain the reasoning behind our design choices, analyzing their pros & cons. We conclude the paper by verifying the efficacy of this system through some preliminary simulation results.
The tenet architecture for tiered sensor networks
- In Sensys
, 2006
"... Most sensor network research and software design has been guided by an architectural principle that permits multi-node data fusion on small-form-factor, resource-poor nodes, or motes. We argue that this principle leads to fragile and un-manageable systems and explore an alternative. The Tenet archit ..."
Abstract
-
Cited by 163 (14 self)
- Add to MetaCart
(Show Context)
Most sensor network research and software design has been guided by an architectural principle that permits multi-node data fusion on small-form-factor, resource-poor nodes, or motes. We argue that this principle leads to fragile and un-manageable systems and explore an alternative. The Tenet architecture is motivated by the observation that future large-scale sensor network deployments will be tiered, consist-ing of motes in the lower tier and masters, relatively un-constrained 32-bit platform nodes, in the upper tier. Masters provide increased network capacity. Tenet constrains multi-node fusion to the master tier while allowing motes to pro-cess locally-generated sensor data. This simplifies applica-tion development and allows mote-tier software to be reused. Applications running on masters task motes by composing task descriptions from a novel tasklet library. Our Tenet im-plementation also contains a robust and scalable network-ing subsystem for disseminating tasks and reliably deliver-ing responses. We show that a Tenet pursuit-evasion applica-tion exhibits performance comparable to a mote-native im-plementation while being considerably more compact.
Active Sensor Networks
- in Proc. 2nd USENIX/ACM Symposium on Network Systems Design and Implementation (NSDI
, 2005
"... We propose using application specific virtual machines (ASVMs) to reprogram deployed wireless sensor networks. ASVMs provide a way for a user to define an applicationspecific boundary between virtual code and the VM engine. This allows programs to be very concise (tens to hundreds of bytes), making ..."
Abstract
-
Cited by 117 (12 self)
- Add to MetaCart
(Show Context)
We propose using application specific virtual machines (ASVMs) to reprogram deployed wireless sensor networks. ASVMs provide a way for a user to define an applicationspecific boundary between virtual code and the VM engine. This allows programs to be very concise (tens to hundreds of bytes), making program installation fast and inexpensive. Additionally, concise programs interpret few instructions, imposing very little interpretation overhead. We evaluate ASVMs against current proposals for network programming runtimes and show that ASVMs are more energy efficient by as much as 20%. We also evaluate ASVMs against hand built TinyOS applications and show that while interpretation imposes a significant execution overhead, the low duty cycles of realistic applications make the actual cost effectively unmeasurable. 1.
Programming Wireless Sensor Networks: Fundamental Concepts and State-of-the-Art
"... Wireless sensor networks (WSNs) are attracting great interest in a number of application domains concerned with monitoring and control of physical phenomena, as they enable dense and untethered deployments at low cost and with unprecedented flexibility. However, application development is still one ..."
Abstract
-
Cited by 81 (12 self)
- Add to MetaCart
(Show Context)
Wireless sensor networks (WSNs) are attracting great interest in a number of application domains concerned with monitoring and control of physical phenomena, as they enable dense and untethered deployments at low cost and with unprecedented flexibility. However, application development is still one of the main hurdles to a wide adoption of WSN technology. In current real-world WSN deployments, programming is typically carried out very close to the operating system, therefore requiring the programmer to focus on low-level system issues. This not only shifts the focus of the programmer away from the application logic, but also requires a technical background that is rarely found among application domain experts. The need for appropriate high-level programming abstractions, capable to simplify the programming chore without sacrificing efficiency, has been long recognized and several solutions have been hitherto proposed, which differ along many dimensions. In this paper, we survey the state-of-the-art in programming approaches for WSNs. We begin by presenting a taxonomy of WSN applications, to identify the fundamental requirements programming platforms must deal with. Then, we introduce a taxonomy of WSN programming approaches that captures the fundamental differences among existing solutions, and constitutes the core contribution of this paper. Our presentation style relies on concrete examples and code snippets taken from programming platforms representative of the taxonomy dimensions being discussed. We use the taxonomy to provide an exhaustive classification of existing approaches. Moreover, we also map existing approaches back to the application requirements, therefore providing not only a complete view of the state-of-the-art, but also useful insights for selecting the programming abstraction most appropriate to the application at hand.
Understanding the Causes of Packet Delivery Success and Failure in Dense Wireless Sensor Networks
- In Technical report SING-06-00
, 2006
"... We present empirical measurements of the packet delivery performance of the Telos and MicaZ sensor platforms. At a high level, their behavior is similar to that of earlier platforms. They exhibit link asymmetry, a reception “grey region, ” and temporal variations in packet loss. Looking more deeply, ..."
Abstract
-
Cited by 76 (5 self)
- Add to MetaCart
(Show Context)
We present empirical measurements of the packet delivery performance of the Telos and MicaZ sensor platforms. At a high level, their behavior is similar to that of earlier platforms. They exhibit link asymmetry, a reception “grey region, ” and temporal variations in packet loss. Looking more deeply, however, there are subtle differences, and looking deeper still, the patterns behind these complexities become clear. Packet losses are highly correlated over short time periods, but are independent over longer periods. Environmental noise (802.11b) has high spatial correlation. Packet loss occurs when a receiver operating near its noise floor experiences a small decrease in received signal strength, rather than an increase in environmental noise. These variations cause the reception “grey region. ” While short-term link asymmetries are not uncommon, long-term asymmetries are rare. Based on these findings, we suggest several ways in which current practices could be easily changed that would greatly improve the efficiency, performance, and lifetime of sensor networks. 1
VM*: Synthesizing Scalable Runtime Environments for Sensor Networks
- In In Proceedings of the third international Conference on Embedded Networked Sensor Systems (Sensys
, 2005
"... Sensor networks are being deployed at massive scales, containing a range of platforms. Programming paradigms for sensor networks should meet the attendant challenges of scale and heterogeneity. Researchers have considered virtual machines as a means to address these challenges. However, in order to ..."
Abstract
-
Cited by 64 (3 self)
- Add to MetaCart
Sensor networks are being deployed at massive scales, containing a range of platforms. Programming paradigms for sensor networks should meet the attendant challenges of scale and heterogeneity. Researchers have considered virtual machines as a means to address these challenges. However, in order to satisfy the resource limitations of sensor nodes, they export only a minimal set of services to the application programmer. This makes applications of even moderate complexity difficult to implement. We present VM --- a framework for building resource-efficient virtual machines that scale and export comprehensive service suites on a per-application basis. We advocate the use of fine-grained software synthesis to build resource-efficient system software, and facilitate both application changes and system software upgrades at runtime through an efficient incremental update scheme. We have used our framework to build virtual machines on the Mica platform and describe how virtual machines are effective in meeting the difficult demands of heterogeneity and reprogrammability.
Reprogramming wireless sensor networks: Challenges and approaches
- IEEE Network
, 2006
"... Wireless sensor networks need an efficient and reliable reprogramming service to facilitate management and maintenance tasks. In this article we first outline a framework to examine different functions in reprogramming, followed by an analysis of reprogramming challenges. We then provide a comprehen ..."
Abstract
-
Cited by 51 (0 self)
- Add to MetaCart
(Show Context)
Wireless sensor networks need an efficient and reliable reprogramming service to facilitate management and maintenance tasks. In this article we first outline a framework to examine different functions in reprogramming, followed by an analysis of reprogramming challenges. We then provide a comprehensive survey of the state-of-the-art reprogramming systems, and discuss different approaches to address these challenges. Finally we explore performance, protocol behavior, and the impact of several design factors. A typical wireless sensor network (WSN) consists of a large number of small-sized battery-powered sensor nodes that integrate sensing, computing, and communication capabilities. WSN applications include geophysical/structural/habitat monitoring, security surveillance, disaster area or battlefield information collection,
Leakage-Aware Energy Synchronization for Wireless Sensor Networks. MobiSys ’09
"... To ensure sustainable operations of wireless sensor systems, environmental energy harvesting has been regarded as the right solution for long-term applications. In energy-dynamic environments, energy conservation is no longer considered necessarily beneficial, because energy storage units (e.g., bat ..."
Abstract
-
Cited by 50 (9 self)
- Add to MetaCart
(Show Context)
To ensure sustainable operations of wireless sensor systems, environmental energy harvesting has been regarded as the right solution for long-term applications. In energy-dynamic environments, energy conservation is no longer considered necessarily beneficial, because energy storage units (e.g., batteries or capacitors) are limited in capacity and leakageprone. In contrast to legacy energy conservation approaches, we aim at energy synchronization for wireless sensor devices. The starting point of this work is TwinStar, which uses ultra-capacitor as the only energy storage unit. To efficiently use the harvested energy, we design and implement leakage-aware feedback control techniques to match local and network-wide activity of sensor nodes with the dynamic energy supply from environments. We conduct system evaluation under three typical real-world settings — indoor, outdoor, and mobile backpack under a wide range of system settings. Results indicate our leakage-aware control can effectively utilize energy that could otherwise leak away. Nodes running leakage-aware control can enjoy 70% more energy than the ones running non-leakage-aware control and application performance (e.g., event detection) can be improved significantly.
t-kernel: Providing reliable OS support to wireless sensor networks
- In Proc. of the 4th ACM Conf. on Embedded Networked Sensor Systems (SenSys
, 2006
"... The development of a reliable large-scale wireless sensor networks (WSNs) is very difficult because of their stringent resource constraints, harsh energy budget, and demanding application requirements. We identify that three OS features – OS protection, virtual memory, and preemptive scheduling – wi ..."
Abstract
-
Cited by 50 (4 self)
- Add to MetaCart
(Show Context)
The development of a reliable large-scale wireless sensor networks (WSNs) is very difficult because of their stringent resource constraints, harsh energy budget, and demanding application requirements. We identify that three OS features – OS protection, virtual memory, and preemptive scheduling – will significantly improve the reliability of WSN systems and facilitate developing complex WSN software. However, due to the limitation of hardware, it is impossible to implement these features with traditional OS design techniques. To solve this problem, we design a new OS kernel, the tkernel, to perform extensive load-time code modification and enhance the system abstraction visible to programmers. After the modification, the application and OS work in a collaborative way supporting the aforementioned features. Having implemented the t-kernel on MICA2 motes with an 8-bit processor and 4KB RAM, we evaluate its performance by measuring the overhead and execution speed. We analyze the CPU utilization in sensor network applications, and verify that, though CPU-bound computation tasks may slow down 0.5–4 times, the performance of applications under typical workloads does not degrade. The t-kernel significantly enhances developers ’ ability to design sophisticated applications and protects WSNs from accidental programming errors. To the authors ’ best knowledge, the t-kernel is unique in the follow ways: it performs efficient binary translation on highly resource constrained sensor nodes with only 4KB RAM, it provides software based virtual memory without repeatedly writable swapping devices, and it protects OS from application error without memory protection or privileged execution hardware. 1
An energy-aware resource-centric RTOS for sensor networks.
- In RTSS ’05: Proceedings of the 26th IEEE International Real-Time Systems Symposium
, 2005
"... Abstract ..."
(Show Context)