Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

Similar documents
Wireless Network Security Spring 2015

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks

Subject: Adhoc Networks

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Fault-Tolerant and Secure Data Transmission Using Random Linear Network Coding

Unit 2 Packet Switching Networks - II

Hop-by-Hop Cooperative Detection of Selective Forwarding Attacks in Energy Harvesting Wireless Sensor Networks

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science

Secure Routing and Transmission Protocols for Ad Hoc Networks

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Wireless and Mobile Networks

World Journal of Engineering Research and Technology WJERT

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Keywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree.

Rate Adaptation in

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.

A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows

Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Incentive-Aware Routing in DTNs

Evaluation of Communication Overheads in Wireless Sensor Networks

Wireless Network Security Spring 2016

LTE and IEEE802.p for vehicular networking: a performance evaluation

Optimal Internal Congestion Control in A Cluster-based Router

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Energy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing

Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1.

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information

MULTI-LAYER VIDEO STREAMING WITH HELPER NODES USING NETWORK CODING

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

ADAPTIVE ROUTING IN COMMUNICATION NETWORKS USING CELL BREATHING BASED BACKPRESSURE ALGORITHM

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

Spectrum Management in Cognitive Radio Networks

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

Some Optimization Trade-offs in Wireless Network Coding

On Demand secure routing protocol resilient to Byzantine failures

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

A Distributed Framework for Correlated Data Gathering in Sensor Networks

Lecture 9. Quality of Service in ad hoc wireless networks

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

A New Combinatorial Design of Coded Distributed Computing

Comparison of Shaping and Buffering for Video Transmission

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani

UNIT 1 Questions & Solutions

Packet-Level Diversity From Theory to Practice: An based Experimental Investigation

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ad Hoc Networks: Introduction

BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks

Heterogeneity Increases Multicast Capacity in Clustered Network

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Wireless Network Security Spring 2011

A Study on Issues Associated with Mobile Network

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Sybil Attack Detection and Prevention Using AODV in VANET

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

A Scheme of Multi-path Adaptive Load Balancing in MANETs

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks

Protecting Network Quality of Service Against Denial of Service Attacks

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

CS 268: Computer Networking. Taking Advantage of Broadcast

IN mobile wireless networks, communications typically take

Energy Management Issue in Ad Hoc Networks

Computation of Multiple Node Disjoint Paths

Routing protocols in WSN

Abstract. Wireless ad-hoc networks (WANETs) are innately different from the well-known wired

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks

Networking Sensors, II

CSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture

Energy Management Issue in Ad Hoc Networks

Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng

Sl.No Project Title Year

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang

On the Scalability of Hierarchical Ad Hoc Wireless Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Energy-aware Fault-tolerant and Real-time Wireless Sensor Network for Control System

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren

Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE Classes

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Greed Considered Harmful

Transcription:

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado Technical University 1

Outline Motivation Challenges and opportunities Model and problem formulation (FC) 2 R algorithm Simulation results Related work Conclusion

Motivation Wireless sensor networks are capable of communicating with each other and cooperating to relay traffic throughout the network via multiple hops; vulnerable to channel impairments, failure, interference and fading, etc. Some nodes may become misbehaving nodes / faulty nodes. The performance of the entire network will significantly degrade: Effective network throughput (receive-throughput at the destination nodes); Fairness among different users.

Challenges and Opportunities Wireless sensor networks are highly redundant there exist multiple paths between source and destination. Multi-Path Routing Each source node chooses multiple paths; Each path is allocated with different traffic amount (how to control the rate of each flow?) Each path has different probabilities to be affected by faulty nodes(how to measure this?) Goal: Efficiently allocate the traffic to maximize the overall throughput. 4

Challenges and Opportunities --Misbehavior Assumptions Nodes in WSNs are prone to be failure due to various unknown causes hardware failure, communication link errors, malicious attacks, energy depletions and so on ; outsider / insider ; static / dynamic. nondeterministic and dynamic Misbehavior Assumptions Byzantine faulty behavior in routing and forwarding ; The impact of fault links can be characterized as probabilistic from the perspective of the network. 5

Challenges and Opportunities Fully disjoint multi-path routing --Misbehavior Assumptions A theoretical limit on the security-performance tradeoff of fully disjoint multi-path routing in the presence of fault nodes [1]; Lack of scalability; High overhead. Some works relax the disjointness requirement [2] [3]; Assume that some non-disjoint nodes exist on the paths from one source or multiple sources; S D S D How to measure the impact of the correlation of these paths on the effective throughput? 6

Network Model The set of all the available paths of source s : The rate of source s on the path R s,n : The total source rate The path rate vectors of source s : Users contend for the channel Random access protocols The set of links in the ωth contention clique consisting of link l : The sum of all transmission probabilities in a clique must be less than 1 :

Faulty Node Model The impact of faults is probabilistic from the perspective of the network; The behavior of node v is formulated as a random variable H(v): The effective throughput received at the destination node is lower than the throughput at the source node; A path p = [v 1, v 2,..., v p ] can also be formulated as a random variable T(p): 8

Flow Control for Multipath Routing Link l transmits data with a persistence probability p l to contend for the channel resource in its clique; The total flow rate over link l should be no more than the average capacity; NUM for cross-layer rate control with the MAC resource constraint : Appealing to the Lagrangian dual method, update form for flow control : 9

(FC) 2 R Algorithm Estimate Local Packet Success Ratios The ratio of packets successfully delivered over link l(i, j) : Each node estimates the packet delivery probability : Updates the estimation through iterations : The end-to-end packet success ratio for the path l : The mean of random variable g s,n : The capacity constraint on the average data rate, imposed by faults the correctly received data ratio at the intermediate node i

(FC) 2 R Algorithm Fault-Correlation between multiple Paths How to measure the correlation between non-disjoint routing paths? There are common nodes between paths, the random variable g s,n may not be independent. The variance of two paths R s,n and R s,m This correlation means that any packet loss in a set of correlated paths sharing the faulty nodes may decrease the effective throughput. The cost function 11

(FC) 2 R Algorithm (FC) 2 R Approach with Multiple paths Each flow s has a utility function associated with the effective rate and the cost from the variance between correlated paths; The principle objective is to maximize the overall effective network utility 12

(FC) 2 R Algorithm Change of Variables Let where 13

(FC) 2 R Algorithm The Lagrangian function is Lagrange Dual Approach Then, the Lagrange dual function is The dual problem is given by 14

(FC) 2 R Algorithm The source rates are updated by Distributed Primal-dual Alg. The shadow prices are updated by The persistence probabilities are updated by 15

(FC) 2 R Algorithm Prevent Oscillations To improve the convergence speed and eliminate the effect of oscillation The update formulation of source rate is slightly modified 16

Simulation Setup The average data rate of each link : 1 Mbps The step size γ : 0.01 Each fault parameter h i,j : independent beta random variables and 17

Simulation Results (FC) 2 R yields higher effective rates (FC) 2 R yields better fairness b e t t e r f a i r n e s s 18

Simulation Results Higher effective throughput 19

Simulation Results The oscillation is observed 20

Related work [1] L. Chen and J. Leneutre, On multipath routing in multihop wireless networks: security, performance, and their tradeoff. [2] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, Highlyresilient, energy-efficient multipath routing in wireless sensor networks. [3] Y. Yang, C. Zhong, Y. Sun, and J. Yang, Network coding based reliable disjoint and braided multipath routing for sensor networks. 21

Conclusion We formulate the problem of flow control for multipath routing in MSNs in the presence of faulty links as the optimization of wireless flows along leaky paths. We measure the degree of packet loss on leaky paths, according to the probabilistic characterization of faulty links. We design a cost function to describe the uncertainty and variation failure-correlation between non-disjoint routing paths. The function is used in our solution to the above optimization problem. We propose a novel distributed algorithm, (FC) 2 R, which generates the optimal effective rate allocation across multiple wireless paths. The numerical results indicate that higher effective throughput and better fairness among effective flow rates can be achieved by the (FC) 2 R algorithm than the standard OFC with multipath routing. 22

Thank you! 23