120 research outputs found

    On random gossiping in wireless sensor networks

    Get PDF
    This thesis studies random gossiping in wireless sensor networks. Sensors in wireless sensor networks generate measurement data and communicate it with each other such that the desired aggregation involving the measurements of all sensors is achievable. Random gossiping is a decentralized communication paradigm for wireless sensor networks. When random gossiping is applied in the network, a sensor wakes up in a random manner and exchanges messages with its neighbor sensors. Critical problems of using random gossiping for the aggregation are the unmeasurable convergence, the bias of the aggregation, the convergence speed measured by the number of communications in the network, and the support of multiple applications, potentially. In this thesis, a sensor is modeled as the integration of sensing, transmission, computation, and storage. The enabling of the communications among sensors requires a cross-layer design to meet the efficiency and low power consumption requirements. To facilitate the cross-layer design, the concept of indicating-header is proposed. The indicating-header serves as the shared information containing the aggregation status of the measurement of a particular sensor in the message of another sensor. Therefore, a straightforward metric of the convergence is given. To overcome the bias of the aggregation, the storage capacity at each sensor is explored with the help of the indicating-headers. A sensor can use the previously received messages stored in the memory to cancel the bias in the aggregation. An improvement of the bias cancellation is shown to be achievable by selecting a subset of the neighbor sensors of a sensor to perform the communications. To improve the convergence speed, the indicating-headers are communicated in the random gossiping before the transmission of the messages containing the aggregation data. The information in the indicating-header enables the sensor to decide on the necessity of message communications. When it communicates with multiple neighbor sensors, the sensor uses the indicating-header to select only a subset of neighbor sensors for communications. A reduction in the number of communications is achieved while the efficiency of the aggregation is maintained. A further method to improve the convergence speed is proposed to coordinate sensors that are multiple hops away from the sensor in the random gossiping. When the constraint to the network topology is made that the sensor and its neighbor sensors remain static, the random gossiping can be improved by reducing the indicating-header communications. Moreover, when sensors are at topological bottle-neck positions of the network, these sensors may defer their message communications waiting for the groups of sensors that they are ”bridging” to have aggregation locally achieved. Such transmission deferment applied to these sensors reduces further the number of communications in the network. When multiple applications are running in the network, a difference in terms of the number of communications to perform shall be made between the sensors that are involved in a specific application and those that are not. A refinement of the random gossiping is proposed by considering six different scenarios with respect to the involvement of a sensor and its neighbor sensors in an application. The indicating-header is used to enable sensors to distinguish between the six different scenarios. The sensors which are not involved in the application require fewer communications after the refinement while more communications are performed by the sensors that are involved in the application. Meanwhile, the total number of communications in the network is maintained

    Analysis of Structured and Un-Structured Network Protocols for Data Aggregation Over Distributed Wireless Sensor Networks

    Get PDF
    The focus of this thesis is on design and evaluation of one-shot data aggregation protocols for static and mobile wireless sensor networks (WSNs). The goal in one-shot data aggregation is to compute a statistical summary of sensor data such as max, average, sum, count and min, when initiated by a special node such as the base station. WSNs have wide range of applications in both static and mobile/dynamic systems. Static sensor networks are especially useful when monitoring is required in harsh, inaccessible environments and when the region to be monitored is really large. Examples of static sensor network applications include environmental monitoring systems, monitoring of industrial control systems, monitoring of degradation in slagging gasifiers, distributed object detection and tracking. Example of mobile applications include vehicular ad-hoc networks and networks of personal radios used in emergency dispatch and battlefields.;For data aggregation in static networks with stable links, structured approaches such as spanning trees are generally preferred. This is because, once a data aggregation structure has been established, link topologies remain fixed and there is minimal need to actively maintain and change the routing structures. In this thesis, one such tree based data aggregation protocol has been designed and evaluated using simulations in networks ranging from 100-1000 nodes. The protocol has also been implemented at a smaller scale in the context of a smart refractory environment, where slag penetration in gasifiers is remotely monitored using smart bricks that are embedded with sensors. In mobile networks and networks with frequent link changes, topology driven structures are likely to be unstable and to incur a high communication overhead. Therefore, self-repelling random walks have been recently proposed as an attractive alternative for data aggregation in mobile systems. In this thesis, a brief overview of random walk based data aggregation has been presented and systematic evaluation of tree based and random walk based data aggregation protocols in networks ranging from 100-1000 nodes under varying degrees of node mobility has been done. The conditions under which unstructured protocols become more attractive in terms of convergence time and messaging efficiency as compared to tree based structured approaches have been quantified

    A survey of distributed data aggregation algorithms

    Get PDF
    Distributed data aggregation is an important task, allowing the decentralized determination of meaningful global properties, which can then be used to direct the execution of other applications. The resulting values are derived by the distributed computation of functions like COUNT, SUM, and AVERAGE. Some application examples deal with the determination of the network size, total storage capacity, average load, majorities and many others. In the last decade, many different approaches have been proposed, with different trade-offs in terms of accuracy, reliability, message and time complexity. Due to the considerable amount and variety of aggregation algorithms, it can be difficult and time consuming to determine which techniques will be more appropriate to use in specific settings, justifying the existence of a survey to aid in this task. This work reviews the state of the art on distributed data aggregation algorithms, providing three main contributions. First, it formally defines the concept of aggregation, characterizing the different types of aggregation functions. Second, it succinctly describes the main aggregation techniques, organizing them in a taxonomy. Finally, it provides some guidelines toward the selection and use of the most relevant techniques, summarizing their principal characteristics.info:eu-repo/semantics/publishedVersio

    EZ-AG: Structure-free data aggregation in MANETs using push-assisted self-repelling random walks

    Get PDF
    This paper describes EZ-AG, a structure-free protocol for duplicate insensitive data aggregation in MANETs. The key idea in EZ-AG is to introduce a token that performs a self-repelling random walk in the network and aggregates information from nodes when they are visited for the first time. A self-repelling random walk of a token on a graph is one in which at each step, the token moves to a neighbor that has been visited least often. While self-repelling random walks visit all nodes in the network much faster than plain random walks, they tend to slow down when most of the nodes are already visited. In this paper, we show that a single step push phase at each node can significantly speed up the aggregation and eliminate this slow down. By doing so, EZ-AG achieves aggregation in only O(N) time and messages. In terms of overhead, EZ-AG outperforms existing structure-free data aggregation by a factor of at least log(N) and achieves the lower bound for aggregation message overhead. We demonstrate the scalability and robustness of EZ-AG using ns-3 simulations in networks ranging from 100 to 4000 nodes under different mobility models and node speeds. We also describe a hierarchical extension for EZ-AG that can produce multi-resolution aggregates at each node using only O(NlogN) messages, which is a poly-logarithmic factor improvement over existing techniques

    Wireless Sensor Data Transport, Aggregation and Security

    Get PDF
    abstract: Wireless sensor networks (WSN) and the communication and the security therein have been gaining further prominence in the tech-industry recently, with the emergence of the so called Internet of Things (IoT). The steps from acquiring data and making a reactive decision base on the acquired sensor measurements are complex and requires careful execution of several steps. In many of these steps there are still technological gaps to fill that are due to the fact that several primitives that are desirable in a sensor network environment are bolt on the networks as application layer functionalities, rather than built in them. For several important functionalities that are at the core of IoT architectures we have developed a solution that is analyzed and discussed in the following chapters. The chain of steps from the acquisition of sensor samples until these samples reach a control center or the cloud where the data analytics are performed, starts with the acquisition of the sensor measurements at the correct time and, importantly, synchronously among all sensors deployed. This synchronization has to be network wide, including both the wired core network as well as the wireless edge devices. This thesis studies a decentralized and lightweight solution to synchronize and schedule IoT devices over wireless and wired networks adaptively, with very simple local signaling. Furthermore, measurement results have to be transported and aggregated over the same interface, requiring clever coordination among all nodes, as network resources are shared, keeping scalability and fail-safe operation in mind. Furthermore ensuring the integrity of measurements is a complicated task. On the one hand Cryptography can shield the network from outside attackers and therefore is the first step to take, but due to the volume of sensors must rely on an automated key distribution mechanism. On the other hand cryptography does not protect against exposed keys or inside attackers. One however can exploit statistical properties to detect and identify nodes that send false information and exclude these attacker nodes from the network to avoid data manipulation. Furthermore, if data is supplied by a third party, one can apply automated trust metric for each individual data source to define which data to accept and consider for mentioned statistical tests in the first place. Monitoring the cyber and physical activities of an IoT infrastructure in concert is another topic that is investigated in this thesis.Dissertation/ThesisDoctoral Dissertation Electrical Engineering 201

    Exploiting random walks for robust, scalable, structure-free data aggregation and routing in mobile ad-hoc networks (MANETs)

    Get PDF
    The focus of this thesis is on the design of scalable data aggregation protocols for Mobile Ad-hoc Networks (MANETs). Data aggregation Protocols that rely on network structures such as trees or backbones are not well suited for MANETs because the underlying topology of MANETs is constantly changing. On the other hand, unstructured techniques such as flooding and gossiping have a high messaging overhead and take a long time to finish. Therefore, in this thesis, we explore the use of random walks as a structure-free alternative for data aggregation in MANETs.;The basic idea is to introduce one or more tokens that successively visit each node in a MANET by executing a random walk and compute the aggregate state. While random walks are simple, robust and overhead-free, plain random walks tend to be slow in visiting all nodes because the token can get stuck in regions of already visited nodes. Therefore, we first introduce self-repelling random walks (SRRW) in which at each step, the token chooses a neighbor that has been visited the least number of times. While SRRW significantly speeds up random walks in the initial stages, towards the end a slowdown is observed when a significant fraction of nodes are already visited. To address this shortcoming, we then develop two complementary strategies that speed up data aggregation.;First, we introduce gradient biased random walks (a pull-based strategy) where short temporary multi-hop gradients are used to pull the tokens toward unvisited node. We prove that gradient biased random walks achieve a cover time of O(N) and message overhead of O(NlogN) where N is the number of nodes in the network. Next, we introduce a push-based strategy in which self-repelling random walks are complemented by a single step push phase before the random walk phase, in which each node broadcasts its information to its neighbors. We show that this small push goes a long way in speeding up data aggregation. Push based random walks finish data aggregation in O(N) message and time. Finally, we describe hierarchical extension of the push-based protocol which can produce multi-resolution aggregates at each node using only O(NlogN) messages.;All our results are validated using simulations in ns-3 in networks ranging from 100 to 4000 nodes under different network densities, node speed and mobility models

    GOSSIPKIT: A Unified Component Framework for Gossip

    Get PDF
    International audienceAlthough the principles of gossip protocols are relatively easy to grasp, their variety can make their design and evaluation highly time consuming. This problem is compounded by the lack of a unified programming framework for gossip, which means developers cannot easily reuse, compose, or adapt existing solutions to fit their needs, and have limited opportunities to share knowledge and ideas. In this paper, we consider how component frameworks, which have been widely applied to implement middleware solutions, can facilitate the development of gossip-based systems in a way that is both generic and simple. We show how such an approach can maximise code reuse, simplify the implementation of gossip protocols, and facilitate dynamic evolution and re-deployment

    Connectivity recovery in epidemic membership protocols

    Get PDF
    Epidemic protocols are a bio-inspired communication and computation paradigm for extreme-scale network system based on randomized communication. The protocols rely on a membership service to build decentralized and random overlay topologies. In a weakly connected overlay topology, a naive mechanism of membership protocols can break the connectivity, thus impairing the accuracy of the application. This work investigates the factors in membership protocols that cause the loss of global connectivity and introduces the first topology connectivity recovery mechanism. The mechanism is integrated into the Expander Membership Protocol, which is then evaluated against other membership protocols. The analysis shows that the proposed connectivity recovery mechanism is effective in preserving topology connectivity and also helps to improve the application performance in terms of convergence speed

    Privacy-enhancing Aggregation of Internet of Things Data via Sensors Grouping

    Full text link
    Big data collection practices using Internet of Things (IoT) pervasive technologies are often privacy-intrusive and result in surveillance, profiling, and discriminatory actions over citizens that in turn undermine the participation of citizens to the development of sustainable smart cities. Nevertheless, real-time data analytics and aggregate information from IoT devices open up tremendous opportunities for managing smart city infrastructures. The privacy-enhancing aggregation of distributed sensor data, such as residential energy consumption or traffic information, is the research focus of this paper. Citizens have the option to choose their privacy level by reducing the quality of the shared data at a cost of a lower accuracy in data analytics services. A baseline scenario is considered in which IoT sensor data are shared directly with an untrustworthy central aggregator. A grouping mechanism is introduced that improves privacy by sharing data aggregated first at a group level compared as opposed to sharing data directly to the central aggregator. Group-level aggregation obfuscates sensor data of individuals, in a similar fashion as differential privacy and homomorphic encryption schemes, thus inference of privacy-sensitive information from single sensors becomes computationally harder compared to the baseline scenario. The proposed system is evaluated using real-world data from two smart city pilot projects. Privacy under grouping increases, while preserving the accuracy of the baseline scenario. Intra-group influences of privacy by one group member on the other ones are measured and fairness on privacy is found to be maximized between group members with similar privacy choices. Several grouping strategies are compared. Grouping by proximity of privacy choices provides the highest privacy gains. The implications of the strategy on the design of incentives mechanisms are discussed
    • 

    corecore