Nothing Special   »   [go: up one dir, main page]

Skip to main content

Online Protocol Verification in Wireless Sensor Networks via Non-intrusive Behavior Profiling

  • Conference paper
Wireless Algorithms, Systems, and Applications (WASA 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7405))

  • 1627 Accesses

Abstract

Wireless communication protocols are centric to Wireless Sensor Network (WSN) applications. However, WSN protocols are prune to defects, even after their field deployments. A convenient tool that can facilitate the detection of post-deployment protocol defects is of great importance to WSN practitioners. This paper presents Probe-I (sensor network Protocol behavior Inspector), a novel tool to obtain, visualize, and verify the behaviors of WSN protocols after their field deployments. Probe-I collects the protocol behaviors in a non-intrusive manner, i.e., via passively listening to the packet exchanges in the target network. Then with a role-oriented behavior modeling approach, Probe-I models the protocol behaviors node by node based on the sniffed packets, which well reflects how the target protocol performs in each node. This allows the WSN practitioners to readily see if the target protocol behaves as intended by simply verifying the correctness of the behavior metrics in a simple, baseline test. Finally, the verified metrics allow Probe-I to automatically check the protocol behaviors from time to time during the network lifetime. The suggested behavior discrepancy can unveil potential protocol defects. We apply Probe-I to verify two WSN data collection protocols, and find their design defects. It shows that Probe-I can substantially facilitate WSN protocol verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Barrenetxea, G., Ingelrest, F., Schaefer, G., Vetterli, M.: The hitchhiker’s guide to successful wireless sensor network deployments. In: Proc. of ACM SenSys (2008)

    Google Scholar 

  2. Werner-Allen, G., Lorincz, K., Johnson, J., Lees, J., Welsh, M.: Fidelity and yield in a volcano monitoring sensor network. In: Proc. of OSDI (2006)

    Google Scholar 

  3. Luo, L., He, T., Zhou, G., Gu, L., Abdelzaher, T.F., Stankovic, J.A.: Achieving repeatability of asynchronous events in wireless sensor networks with EnviroLog. In: Proc. of the IEEE INFOCOM (2006)

    Google Scholar 

  4. Cao, Q., Abdelzaher, T., Stankovic, J., Whitehouse, K., Luo, L.: Declarative tracepoints: A programmable and application independent debugging system for wireless sensor networks. In: Proc. of ACM SenSys (2008)

    Google Scholar 

  5. Google Inc.: Android operating system, http://www.android.com

  6. TinyOS Community Forum: TinyOS: An open-source OS for the networked sensor regime, http://www.tinyos.net

  7. Gnawali, O., Fonseca, R., Jamieson, K., Moss, D., Levis, P.: Collection tree protocol. In: Proc. of the ACM SENSYS, pp. 1–14 (November 2009)

    Google Scholar 

  8. Greenwood, P.E., Nikulin, M.S.: A Guide to Chi-Squared Testing. Wiley (1996)

    Google Scholar 

  9. Gnawali, O., Fonseca, R., Jamieson, K., Moss, D., Levis, P.: Collection tree protocol. In: Proc. of ACM SenSys (2009)

    Google Scholar 

  10. Chipara, O., Lu, C., Bailey, T.C., Roman, G.C.: Reliable clinical monitoring using wireless sensor networks: Experiences in a step-down hospital unit. In: Proc. of ACM SenSys (2010)

    Google Scholar 

  11. Levis, P., Lee, N., Welsh, M., Culler, D.: TOSSIM: Accurate and scalable simulation of entire tinyos applications. In: Proc. of the ACM SenSys (2003)

    Google Scholar 

  12. Titzer, B., Lee, D., Palsberg, J.: Avrora: Scalable sensor network simulation with precise timing. In: Proc. of the IEEE IPSN, pp. 477–482 (May 2005)

    Google Scholar 

  13. Li, P., Regehr, J.: T-Check: Bug finding for sensor networks. In: Proc. of IPSN (2010)

    Google Scholar 

  14. Sasnauskas, R., Landsiedel, O., Alizai, M.H., Weisez, C., Kowalewskiz, S., Wehrle, K.: KleeNet: Discovering insidious interaction bugs in wireless sensor networks before deployment. In: Proc. of the ACM/IEEE IPSN (2010)

    Google Scholar 

  15. Zhou, Y., Chen, X., Lyu, M., Liu, J.: Sentomist: Unveiling transient sensor network bugs via symptom mining. In: Proc. of the IEEE ICDCS (2010)

    Google Scholar 

  16. Stojmenovic, I.: Simulations in wireless sensor and ad hoc networks: matching and advancing models, metrics, and solutions. IEEE Comm. 46(12), 102–107 (2008)

    Article  Google Scholar 

  17. Khan, M.M.H., Luo, L., Huang, C., Abdelzaher, T.: SNTS: Sensor network troubleshooting suite. In: Proc. of the IEEE DCOSS (2007)

    Google Scholar 

  18. Liu, K., Li, M., Liu, Y., Li, M., Guo, Z., Hong, F.: Passive diagnosis for wireless sensor networks. In: Proc. of the ACM SENSYS (2008)

    Google Scholar 

  19. Ramanathan, N., Chang, K., Kapur, R., Girod, L., Kohler, E., Estrin, D.: Sympathy for the sensor network debugger. In: Proc. of the ACM SENSYS (2005)

    Google Scholar 

  20. Rmer, K., Ma, J.: PDA: Passive distributed assertions for sensor networks. In: Proc. of IPSN (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, Y., Chen, X., Lyu, M.R., Liu, J. (2012). Online Protocol Verification in Wireless Sensor Networks via Non-intrusive Behavior Profiling. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2012. Lecture Notes in Computer Science, vol 7405. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31869-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31869-6_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31868-9

  • Online ISBN: 978-3-642-31869-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics