ncs-2006 march 29-31, 2006 chiang mai, thailand the iasted international conference on networks and...

14
NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self- organization of Sensor Networks Chutima Boonthum, Irwin Levinstein, Stephan Olariu, Lan Wang, Qingwen Xu {cboont, ibl, olariu, walng_l, xu_q}@cs.odu.edu Department of Computer Science, Old Dominion University Norfolk, VA 23529 USA

Upload: leonard-logan

Post on 13-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Assurance-aware Self-organization of Sensor Networks

Chutima Boonthum, Irwin Levinstein, Stephan Olariu, Lan Wang, Qingwen Xu{cboont, ibl, olariu, walng_l, xu_q}@cs.odu.eduDepartment of Computer Science, Old Dominion UniversityNorfolk, VA 23529 USA

Page 2: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

2NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Background & Motivation

Wireless Sensor Networks (WSNs) have been widely used in various applications

Securing WSNs has become a major issue and has number of proposed solutions

Yet, none of these addresses the issue on information assurance

Therefore, we explored various aspects related to “information assurance in WSNs”

Page 3: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

3NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Agenda

WSNs overviewSensors and sensor networksInformation assuranceSystem longevitySecuring individual sensors

Self-organizationAssurance-awareness

Page 4: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

4NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Sensors & Sensor Networks

Sensor fundamental constraints1. Sensors are anonymous

2. Modest non-renewable power

3. Sleep most of the time

4. Work unattended

5. Modest transmission range

WSNs are multi-hop, limited no of sensors, and unknown topology

Page 5: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

5NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Information Assurance

Network survivabilityAbility to function for a long period of time

Information survivabilityAbility to have uninterrupted and secure access to

information on network

Network securityBasic security services at network level

Information securitySecure information flow

Page 6: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

6NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

System Longevity

Appropriate sleep-wake schedulesTo save the energy

Optimal workforceTo provide results satisfying a number of quality of

service requirements

Topology and coverage controlTo enhance the effective functional lifetime of the

network

Page 7: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

7NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Securing individual sensors

Tampering/ Tamper resistanceTrying to force open an individual sensor

Blanking out memory, orConfiguring the security service using frequency hopping

and cryptographic keys.Physically removing sensors from the deployment

areaEstablishing Signature Array (SA) of sensor’s

neighborhood using signal strengths, immediately after deployment.

If the sensor do not anymore receive the signals correspond with those in SA, then blank out memory

Page 8: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

8NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Assurance-aware Self-Organization

A powerful multi-hop communication network capable of utilizing the limited resources of sensors in adaptive and efficient wayEnergy efficiency

sensors need to sleep most of the time

AdaptivityVirtual infrastructure adapts to network size, topology,

density, and application requirement

Multi-hop systemVirtual infrastructure supports efficient multi-hop

communication

Page 9: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

9NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Leader Election

When sensor wakes up, it starts to listen for a beacon frame time period.

If it has not received, that itself becomes a leader and start sending the “Beacon Packet”

If it does, it then becomes a member of that cluster.

T: sleeping periodF: beacon frame length

Page 10: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

10NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Beacon Frame

Beacon slot (B) – sending time of each beacon frame Collision slot (C) – reserved for member to report potential

collision Wakeup slot (W) – reserved for member to wake up leaders Member slots (M) – for member to send messages to the cluster

leader

Page 11: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

11NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Collision Resolution

When a sensor receives some short beacon packets that are close to cause the collision problem, it sends a collision packet at its leader’s Collision slot and reset its listening timer.

If a leader hears anything in its Collision slot, it selects another time to send its beacon packet.

Page 12: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

12NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Competing for slots

A member randomly chooses a slot from “free” Member slots in the beacon frame and send a report packet twice (at Wakeup slot and at the chosen slot).

The leader will confirm if the package arrive; otherwise, a member will choose another “free” a lot and resend the packet.

If two members sent data on the same M-slot, the leader will receive no packet at that slot due to noises.

Page 13: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

13NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Maintaining the virtual infrastructure

Every sensor needs to listen for a beacon frame once in a while

Old leaders may fail and new leaders may show up

When a leader dies, a part of network needs to be reorganized. Hence, leader reelection is triggered.

Page 14: NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization

14NCS-2006 March 29-31, 2006 Chiang Mai, ThailandThe IASTED International Conference on Networks and Communication Systems

Conclusion

We surveyed number of issues related to setting up the infrastructure that leveraged by information assuranceLeader election, Beacon frame, Collision resolution,

Competing for slots, Maintain the virtual infrastructure

Research toward a solution is ongoing.