761 research outputs found

    Monitoring wireless sensor network nodes with a low intrusion hybrid monitor

    Full text link
    [EN] This work presents an active hybrid monitor with low intrusion, to be applied on sensor network nodes. Intrusion caused to the sensor node has been evaluated on three aspects: time, additional code, and power consumption.[ES] Se presenta un monitor hĂ­brido activo de baja intrusiĂłn, aplicable a nodos de redes de sensores. La intrusiĂłn causada al nodo sensor ha sido evaluada en tres aspectos: tiempo, cĂłdigo adicional, y el consumo de energĂ­a.Navia Mendoza, MR. (2015). Monitoring wireless sensor network nodes with a low intrusion hybrid monitor. http://hdl.handle.net/10251/67823Archivo delegad

    HMP: A Hybrid Monitoring Platform for Wireless Sensor Networks Evaluation

    Full text link
    (c) 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.[EN] Wireless sensor networks (WSNs), as an essential part of the deployment of the Internet of Things paradigm, require an adequate debugging and monitoring procedures to avoid errors in their operation. One of the best tools for WSN supervision is the so-called Monitoring Platforms that harvest information about the WSN operation in order to detect errors and evaluate performance. Monitoring platforms for the WSN can be hardware or software implemented, and, additionally, they can work in active or passive mode. Each approach has advantages and drawbacks. To benefit from their advantages and compensate their limitations, hybrid platforms combine different approaches. However, very few hybrid tools, with many restrictions, have been proposed. Most of them are designed for a specific implementation of WSN nodes; many of them are lack of a real implementation, and none of them provides an accurate solution to synchronization issues. This paper presents a hybrid monitoring platform for WSN, called HMP. This platform combines both hardware and software, active and passive monitoring approaches. This hybridization provides many interesting capabilities; HMP harvests the information both actively (directly from the sensor nodes) and passively (by means of messages captured from the WSN), causing a very low intrusion in the observed network. In addition, HMP is reusable; it may be applied to almost any WSN and includes a suitable trace synchronism procedure. Finally, HMP follows an open architecture that allows interoperability and layered development.This work was supported by the Agencia Estatal de Investigacion from the Spanish Ministerio de Economia, Industria y Competitividad, through the project Hacia el hospital inteligente: Investigacion en el diseno de una plataforma basada en Internet de las Cosas y su aplicacion en la mejora del cumplimiento de higiene de manos, under Grant DPI2016-80303-C2-1-P. The project covers the costs of publishing in open access.Navia-Mendoza, MR.; Campelo Rivadulla, JC.; Bonastre Pina, AM.; Capella Hernández, JV.; Ors Carot, R. (2019). HMP: A Hybrid Monitoring Platform for Wireless Sensor Networks Evaluation. IEEE Access. 7:87027-87041. https://doi.org/10.1109/ACCESS.2019.2925299S8702787041

    Corl8: A System for Analyzing Diagnostic Measures in Wireless Sensor Networks

    Get PDF
    Due to an increasing demand to monitor the physical world, researchers are deploying wireless sensor networks more than ever before. These networks comprise a large number of sensors integrated with small, low-power wireless transceivers used to transmit data to a central processing and storage location. These devices are often deployed in harsh, volatile locations, which increases their failure rate and decreases the rate at which packets can be successfully transmitted. Existing sensor debugging tools, such as Sympathy and EmStar, rely on add-in network protocols to report status information, and to collectively diagnose network problems. Some protocols rely on a central node to initiate the diagnosis sequence. These methods can congest network channels and consume scarce resources, including battery power. In this thesis, we present Corl8, a system for analyzing diagnostic traces in wireless sensor networks. Our method relies on diagnostic data that is periodically transmitted to a network sink as a part of the standard sensor payload to enable fault diagnosis. Corl8 does not require any specific data to be present in the system, making it flexible. Our system provides an interactive environment for exploring correlated changes across different diagnostic measures within an individual node. It also supports processing on a batch level to automatically flag interesting correlations. The system\u27s flexibility makes it applicable for use in any wireless sensor network that transmits diagnostic measures. The analysis methods are user-configurable, but we suggest settings and analyze their performance. For our evaluation, we use data from five real-world deployments from the Intelligent River(R) project consisting of 36 sensor nodes

    Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things

    Full text link
    The interconnection of resource-constrained and globally accessible things with untrusted and unreliable Internet make them vulnerable to attacks including data forging, false data injection, and packet drop that affects applications with critical decision-making processes. For data trustworthiness, reliance on provenance is considered to be an effective mechanism that tracks both data acquisition and data transmission. However, provenance management for sensor networks introduces several challenges, such as low energy, bandwidth consumption, and efficient storage. This paper attempts to identify packet drop (either maliciously or due to network disruptions) and detect faulty or misbehaving nodes in the Routing Protocol for Low-Power and Lossy Networks (RPL) by following a bi-fold provenance-enabled packed path tracing (PPPT) approach. Firstly, a system-level ordered-provenance information encapsulates the data generating nodes and the forwarding nodes in the data packet. Secondly, to closely monitor the dropped packets, a node-level provenance in the form of the packet sequence number is enclosed as a routing entry in the routing table of each participating node. Lossless in nature, both approaches conserve the provenance size satisfying processing and storage requirements of IoT devices. Finally, we evaluate the efficacy of the proposed scheme with respect to provenance size, provenance generation time, and energy consumption.Comment: 14 pages, 18 Figure

    Active low intrusion hybrid monitor for wireless sensor networks

    Full text link
    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature.This research was supported by the Valencian Regional Government under Research Project GV/2014/012, the Polytechnic University of Valencia under Research Projects VLC/Campus UPV PAID-06-12, financed by the Ministerio de Educacion, Cultura y Deporte as part of the program Campus de excelencia internacional UPV SP20140730 and UPV SP20150050, and the Spanish government under projects CTM2011-29691-C02-01 and TIN2011-28435-C03-0.Navia, M.; Campelo Rivadulla, JC.; Bonastre Pina, AM.; Ors Carot, R.; Capella Hernández, JV.; Serrano Martín, JJ. (2015). Active low intrusion hybrid monitor for wireless sensor networks. Sensors. 15(9):23927-23952. https://doi.org/10.3390/s150923927S2392723952159Mahapatro, A., & Khilar, P. M. (2013). Fault Diagnosis in Wireless Sensor Networks: A Survey. IEEE Communications Surveys & Tutorials, 15(4), 2000-2026. doi:10.1109/surv.2013.030713.00062Rodrigues, A., Camilo, T., Silva, J. S., & Boavida, F. (2012). Diagnostic Tools for Wireless Sensor Networks: A Comparative Survey. Journal of Network and Systems Management, 21(3), 408-452. doi:10.1007/s10922-012-9240-6Schoofs, A., O’Hare, G. M. P., & Ruzzelli, A. G. (2012). Debugging Low-Power and Lossy Wireless Networks: A Survey. IEEE Communications Surveys & Tutorials, 14(2), 311-321. doi:10.1109/surv.2011.021111.00098FAQ—TinyOS Wikihttp://tinyos.stanford.edu/tinyos-wiki/index.php/FAQGarcia, F., Andrade, R., Oliveira, C., & de Souza, J. (2014). EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks. Sensors, 14(6), 10804-10828. doi:10.3390/s140610804Yunhao Liu, Kebin Liu, & Mo Li. (2010). Passive Diagnosis for Wireless Sensor Networks. IEEE/ACM Transactions on Networking, 18(4), 1132-1144. doi:10.1109/tnet.2009.2037497Information Technology—Open Systems Interconnection—Basic Reference Modelhttp://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?-csnumber=20269STM32F051R8 ARM Cortex-M0 MCUhttp://www.st.com/web/catalog/mmc/CMSIS-Cortex Microcontroller Software Interface Standardhttp://www.arm.com/products/processors/cortex-m/cortex-microcontroller-software-interface-standard.phpKeil MDK-ARM Version 5http://www2.keil.com/mdk5/34405A Digital Multimeter, 5½ digit | Keysight (Agilent)http://www.keysight.com/en/pd-686884-pn-34405A/Gharghan, S., Nordin, R., & Ismail, M. (2014). Energy-Efficient ZigBee-Based Wireless Sensor Network for Track Bicycle Performance Monitoring. Sensors, 14(8), 15573-15592. doi:10.3390/s140815573Molina-Garcia, A., Fuentes, J. A., Gomez-Lazaro, E., Bonastre, A., Campelo, J. C., & Serrano, J. J. (2012). Development and Assessment of a Wireless Sensor and Actuator Network for Heating and Cooling Loads. IEEE Transactions on Smart Grid, 3(3), 1192-1202. doi:10.1109/tsg.2012.2187542Lee, D.-S., Liu, Y.-H., & Lin, C.-R. (2012). A Wireless Sensor Enabled by Wireless Power. Sensors, 12(12), 16116-16143. doi:10.3390/s12121611

    Supporting the Specification and Runtime Validation of Asynchronous Calling Patterns in Reactive Systems

    Get PDF
    Wireless sensor networks (“sensornets”) are highly distributed and concurrent, with program actions bound to external stimuli. They exemplify a system class known as reactive systems, which comprise execution units that have “hidden” layers of control flow. A key obstacle in enabling reactive system developers to rigorously validate their implementations has been the absence of precise software component specifications and tools to assist in leveraging those specifications at runtime. We address this obstacle in three ways: (i) We describe a specification approach tailored for reactive environments and demonstrate its application in the context of sensornets. (ii) We describe the design and implementation of extensions to the popular nesC tool-chain that enable the expression of these specifications and automate the generation of runtime monitors that signal violations, if any. (iii) Finally, we apply the specification approach to a significant collection of the most commonly used software components in the TinyOS distribution and analyze the overhead involved in monitoring their correctness

    TrustMod: a trust management module for NS-3 simulator.

    Get PDF
    Trust management offers a further level of defense against internal attacks in ad hoc networks. Deploying an effective trust management scheme can reinforce the overall network security. Regardless of limitations, however, security researchers often use numerical simulations to prove the merits of novel methods. This is due to the lack of an adequate testbed to evaluate the proposed trust schemes. Therefore, there is a demanding need to develop a generic testbed that can be used to evaluate the trust relationship for different networks and protocols. This paper proposes TrustMod, an NS-3 module consisting of three main components to evaluate the different trust relationships: direct trust, uncertainty, and indirect trust. It is designed to meet usability, generalisability, flexibility, scalability and high-performance requirements. A series of experiments involving 1680 simulations were performed to prove the design and implementation accuracy of TrustMod. The performance results show that TrustMod's resource footprint is minimal, even for very large networks

    RPL Routing Protocol a case study: Precision agriculture

    Get PDF
    International audienceThe routing protocol for low power and lossy network (RPL) was designed in the ROLL working group at IETF since the year of 2008. Until the latest version of draft 19 released, this protocol algorithms and its four application scenario, such as home automation, industrial control, urban environment and building automation, have been nearly grounded. However, it is still very difficult to find effective approaches to simulate and evaluate RPL's behavior and other extensions of its application. In this paper, first we provide a brief presentation of the RPL protocol including two case studies ContikiRPL and TinyRPL, and an initial simulation experiment results obtained from the RPL capable COOJA simulator and its developed module. Second we then focus on the utilization of this protocol in the precision agriculture area and propose our dedicated instances hybrid network architecture to meet the specific requirement of this application. As a conclusion, we summarized our ongoing work and future solutions of the current technology issues

    Applying Formal Methods to Networking: Theory, Techniques and Applications

    Full text link
    Despite its great importance, modern network infrastructure is remarkable for the lack of rigor in its engineering. The Internet which began as a research experiment was never designed to handle the users and applications it hosts today. The lack of formalization of the Internet architecture meant limited abstractions and modularity, especially for the control and management planes, thus requiring for every new need a new protocol built from scratch. This led to an unwieldy ossified Internet architecture resistant to any attempts at formal verification, and an Internet culture where expediency and pragmatism are favored over formal correctness. Fortunately, recent work in the space of clean slate Internet design---especially, the software defined networking (SDN) paradigm---offers the Internet community another chance to develop the right kind of architecture and abstractions. This has also led to a great resurgence in interest of applying formal methods to specification, verification, and synthesis of networking protocols and applications. In this paper, we present a self-contained tutorial of the formidable amount of work that has been done in formal methods, and present a survey of its applications to networking.Comment: 30 pages, submitted to IEEE Communications Surveys and Tutorial
    • …
    corecore