Identifying defective nodes in wireless sensor networks

Wireless sensor networks (WSNs) have become ubiquitous, e.g., in logistics, smart manufacturing, smart city infrastructures or vehicular ad-hoc networks. WSNs tend to rely on ad-hoc infrastructures that are prone to a wide range of different defects, e.g., communication failures, faulty sensors or nodes that have been tampered with. Additionally, dealing with defects is challenging, as defects might occur only occasionally. In this paper, we introduce SEDEL, our approach for Sensor nEtwork DEfect Localization. SEDEL helps the WSN operator to pinpoint defective nodes in the routing topology of a WSN. In particular, we let the operator store graph representations of the routing topology, together with information if the WSN has produced errors. Based on this information, SEDEL assigns each WSN node a suspiciousness score that is correlated with the defect probability. Thus, our approach can be used with any kind of defect, and the kind does not have to be known, as long as the operator can decide if a certain processing is correct or not. We have evaluated SEDEL with a real sensor-node deployment. Our evaluation shows that the defective node is assigned a high probability in the vast majority of the experiments.

[1]  Pietro Michiardi,et al.  Security in ad hoc networks , 2003 .

[2]  Yong Yao,et al.  The cougar approach to in-network query processing in sensor networks , 2002, SGMD.

[3]  Deborah Estrin,et al.  Directed diffusion for wireless sensor networking , 2003, TNET.

[4]  Wei Hong,et al.  TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.

[5]  Klemens Böhm,et al.  Processing continuous join queries in sensor networks: a filtering approach , 2010, SIGMOD Conference.

[6]  Michael I. Jordan,et al.  Bug isolation via remote program sampling , 2003, PLDI '03.

[7]  Tomonari Furukawa,et al.  Defect Identification by Sensor Network Under Uncertainties , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

[8]  Gunter Saake,et al.  Piggyback Meta-Data Propagation in Distributed Hash Tables , 2005, WEBIST.

[9]  S. Sitharama Iyengar,et al.  A new architecture for distributed sensor integration , 1993, Proceedings of Southeastcon '93.

[10]  Klemens Böhm,et al.  A Wavelet Transform for Efficient Consolidation of Sensor Relations with Quality Guarantees , 2009, Proc. VLDB Endow..

[11]  Andreas Zeller,et al.  Predicting component failures at design time , 2006, ISESE '06.

[12]  Konstantinos N. Plataniotis,et al.  Detecting the defective nodes in wireless sensor networks , 2010, 2010 25th Biennial Symposium on Communications.

[13]  Chao Liu,et al.  Mining Behavior Graphs for "Backtrace" of Noncrashing Bugs , 2005, SDM.

[14]  Klemens Böhm,et al.  Mining Edge-Weighted Call Graphs to Localise Software Bugs , 2008, ECML/PKDD.

[15]  Chao Liu,et al.  Mining Control Flow Abnormality for Logic Error Isolation , 2006, SDM.

[16]  Felix C. Freiling,et al.  Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption , 2010, Ad Hoc Sens. Wirel. Networks.

[17]  Pascal Frossard,et al.  Distributed group testing detection in sensor networks , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[18]  Vesa Karpijoki Security in Ad Hoc Networks , 2001 .

[19]  Andreas Zeller,et al.  Mining metrics to predict component failures , 2006, ICSE.

[20]  Abraham Bernstein,et al.  Predicting defect densities in source code files with decision tree learners , 2006, MSR '06.

[21]  Klemens Böhm,et al.  Software-Defect Localisation by Mining Dataflow-Enabled Call Graphs , 2010, ECML/PKDD.

[22]  Abdel Aitouche,et al.  Optimal design of fault tolerant sensor networks , 2000, Proceedings of the 2000. IEEE International Conference on Control Applications. Conference Proceedings (Cat. No.00CH37162).

[23]  Pascal Frossard,et al.  Distributed sensor failure detection in sensor networks , 2011, Signal Process..

[24]  Giuseppe Di Fatta,et al.  Discriminative pattern mining in software fault detection , 2006, SOQUA '06.

[25]  Tomonari Furukawa,et al.  Stochastic identification of defects under sensor uncertainties , 2012 .

[26]  Jiawei Han,et al.  CloseGraph: mining closed frequent graph patterns , 2003, KDD '03.

[27]  Ian F. Akyildiz,et al.  Energy efficiency based packet size optimization in wireless sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..