skip to main content
10.1145/570738.570756acmconferencesArticle/Chapter ViewAbstractPublication PageswsnaConference Proceedingsconference-collections
Article

Efficient tracing of failed nodes in sensor networks

Published:28 September 2002Publication History

ABSTRACT

In sensor networks, nodes commonly rely on each other to route messages to a base station. Although this practice conserves power it can obscure the cause of a measurement outage in a portion of the network. For example, when a base station ceases to receive measurements from a region of nodes it can't immediately determine whether this is because of the destruction of all the nodes in that region (due to an enemy attack, for example) or merely the result of the failure of a few nodes bearing much of the routing load. Previous solutions to this problem typically consist of re-running the route-discovery protocol, a process that can be quite expensive in terms of the number of messages that must be exchanged. We demonstrate that the topology of the network can be efficiently conveyed to the base station allowing for the quick tracing of the identities of the failed nodes with moderate communication overhead. Our algorithms work in conjunction with the existing functions of the network, requiring the nodes to send no additional messages.

References

  1. Omer Berkman, Michal Parnas, and Jiri Sgall. Efficient dynamic traitor tracing. In Proc. 2000 Symp. on Discrete Algorithms, pages 586--595, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. Buonadonna, J. Hill, and D. Culler. Active message communication for tiny networked sensors. In Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'01), April 2001.Google ScholarGoogle Scholar
  3. A. Cerpa and D. Estrin. Ascent: Adaptive self-configuring sensor networks topologies. In Proceedings of the 21th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'02), New York, NY, June 2002.Google ScholarGoogle ScholarCross RefCross Ref
  4. D. Du and F. Hwang. Combinatorial Group Testing and its Applications. World Scientific Publishing, Singapore, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  5. Amos Fiat and Tamir Tassa. Dynamic traitor tracing. Journal of Cryptology, 14(3):211--223, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In HICSS, 2000.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister. System architecture directions for network sensors. In Proceedings of ASPLOS, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Yih-Chun Hu, Adrian Perrig, and David~B. Johnson. Wormhole detection in wireless ad hoc networks. Technical Report TR01-384, Rice University Department of Computer Science, June 2002.Google ScholarGoogle Scholar
  9. Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM-00), pages 56--67, N. Y., August~6--11 2000. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104: HMAC: Keyed-hashing for message authentication, February 1997. Status: INFORMATIONAL. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Q. Li, J. Aslam, and D. Rus. Hierarchical power-aware routing in sensor networks. In Proceedings of the DIMACS Workshop on Pervasive Networking, May 2001.Google ScholarGoogle Scholar
  12. A. Manjeshwar and D. P. Agrawal. Teen: A routing protocol for enhanced efficiency in wireless sensor networks. In 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing (IPDPS), April 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (Mobicom '2000), pages 255--265, Boston, MA, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. J. (Alfred~J.) Menezes, Paul~C. Van Oorschot, and Scott~A. Vanstone. Handbook of applied cryptography. The CRC Press series on discrete mathematics and its applications. CRC Press, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. Tygar. Spins: Security protocols for sensor networks. In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (Mobicom '2001), 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Efficient tracing of failed nodes in sensor networks

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                WSNA '02: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
                September 2002
                146 pages
                ISBN:1581135890
                DOI:10.1145/570738

                Copyright © 2002 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 28 September 2002

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                WSNA '02 Paper Acceptance Rate15of60submissions,25%Overall Acceptance Rate15of60submissions,25%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader