Byzantine Resilient Protocol for the IoT

Wireless sensor networks (WSNs), often adhering to a single gateway architecture, constitute the communication backbone for many modern cyber-physical systems (CPSs). Consequently, fault-tolerance in CPS becomes a challenging task, especially when accounting for failures (potentially malicious) that incapacitate the gateway or disrupt the nodes-gateway communication, not to mention the energy, timeliness, and security constraints demanded by CPS domains. This paper aims at ameliorating the fault-tolerance of WSN-based CPS to increase system and data availability. To this end, we propose a replicated gateway architecture augmented with energy-efficient real-time Byzantine-resilient data communication protocols. At the sensors level, we introduce fault-tolerant trustful space-time protocol, a geographic routing protocol capable of delivering messages in an energy-efficient and timely manner to multiple gateways, even in the presence of voids caused by faulty and malicious sensor nodes. At the gateway level, we propose a multigateway synchronization protocol, which we call ByzCast, that delivers timely correct data to CPS applications, despite the failure or maliciousness of a number of gateways. We show, through extensive simulations, that our protocols provide better system robustness yielding an increased system and data availability while meeting CPS energy, timeliness, and security demands.

[1]  Antônio Augusto Fröhlich,et al.  Speculative Precision Time Protocol: Submicrosecond clock synchronization for the IoT , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[2]  Moyses M. Lima,et al.  Geographic routing and hole bypass using long range sinks for wireless sensor networks , 2017, Ad Hoc Networks.

[3]  Antônio Augusto Fröhlich,et al.  A decentralized location system for sensor networks using cooperative calibration and heuristics , 2006, MSWiM '06.

[4]  S. Yasotha,et al.  Multi-sink Optimal Repositioning for Energy and Power Optimization in Wireless Sensor Networks , 2016, Wirel. Pers. Commun..

[5]  Brad Karp,et al.  GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.

[6]  Chenyang Lu,et al.  SPEED: a stateless protocol for real-time communication in sensor networks , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[7]  Radek Fujdiak,et al.  Implementation of Elliptic Curve Diffie Hellman in ultra-low power microcontroller , 2015, 2015 38th International Conference on Telecommunications and Signal Processing (TSP).

[8]  Daniel J. Bernstein,et al.  The Poly1305-AES Message-Authentication Code , 2005, FSE.

[9]  Yudhi Aditya,et al.  ANALISIS KINERJA TEKNOLOGI LAN (TOKEN RING &FDDI) MENGGUNAKAN OMNET++ (OBJECTIVE MODULAR NETWORK TESTBED IN C++) , 2015 .

[10]  Antônio Augusto Fröhlich,et al.  A cross-layer approach to trustfulness in the Internet of Things , 2013, 16th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2013).

[11]  Anis Laouiti,et al.  Fault-Tolerant and Constrained Relay Node Placement in Wireless Sensor Networks , 2016, 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[12]  Antônio Augusto Fröhlich,et al.  Design rationale of a cross-layer, Trustful Space-Time Protocol for Wireless Sensor Networks , 2015, 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA).

[13]  Ru-chuan Wang,et al.  QoS-Aware Routing for Multi-Sink WMSNs , 2016 .

[14]  Danny Dolev,et al.  The Byzantine Generals Strike Again , 1981, J. Algorithms.

[15]  Silviu S. Craciunas,et al.  SMT-based Task- and Network-level Static Schedule Generation for Time-Triggered Networked Systems , 2014, RTNS.

[16]  Enqing Dong,et al.  A Virtual Coordinate-Based Bypassing Void Routing for Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[17]  Hamid Aghvami,et al.  Enhancing the performance of RPL using a Receiver-Based MAC protocol in lossy WSNs , 2011, 2011 18th International Conference on Telecommunications.

[18]  Satyajayant Misra,et al.  BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[19]  Petru Eles,et al.  Schedulability-Driven Communication Synthesis for Time Triggered Embedded Systems , 1999, Proceedings Sixth International Conference on Real-Time Computing Systems and Applications. RTCSA'99 (Cat. No.PR00306).

[20]  Sila Ozen,et al.  Adaptive sink selection for WSNs using forwarder set based dynamic duty cycling , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking Workshops (SECON Workshops).

[21]  Antônio Augusto Fröhlich,et al.  TSTP MAC: A Foundation for the Trustful Space-Time Protocol , 2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES).

[22]  Abdelhamid Mellouk,et al.  A novel approach for void avoidance in wireless sensor networks , 2010, International Journal of Communication Systems.

[23]  Ernesto López-Mellado,et al.  A localized multi-sink multi-hop algorithm for wireless sensor networking , 2015, 2015 Global Information Infrastructure and Networking Symposium (GIIS).

[24]  Xiaowei Li,et al.  FT-SPEED: A Fault-Tolerant, Real-Time Routing Protocol for Wireless Sensor Networks , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.