Skip to main content
Erschienen in: Distributed and Parallel Databases 4/2016

01.12.2016

Identifying defective nodes in wireless sensor networks

verfasst von: Christopher Oßner, Erik Buchmann, Klemens Böhm

Erschienen in: Distributed and Parallel Databases | Ausgabe 4/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks (WSNs) have become ubiquitous, e.g., in logistics, smart manufacturing, smart city infrastructures or vehicular ad-hoc networks. WSNs tend to rely on ad-hoc infrastructures that are prone to a wide range of different defects, e.g., communication failures, faulty sensors or nodes that have been tampered with. Additionally, dealing with defects is challenging, as defects might occur only occasionally. In this paper, we introduce SEDEL, our approach for Sensor nEtwork DEfect Localization. SEDEL helps the WSN operator to pinpoint defective nodes in the routing topology of a WSN. In particular, we let the operator store graph representations of the routing topology, together with information if the WSN has produced errors. Based on this information, SEDEL assigns each WSN node a suspiciousness score that is correlated with the defect probability. Thus, our approach can be used with any kind of defect, and the kind does not have to be known, as long as the operator can decide if a certain processing is correct or not. We have evaluated SEDEL with a real sensor-node deployment. Our evaluation shows that the defective node is assigned a high probability in the vast majority of the experiments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bestehorn, M., Benenson, Z., Buchmann, E., Jawurek, M., Böhm, K., Freiling, F.: Query dissemination in sensor networks—predicting reachability and energy consumption. In: AHSWN (2009) Bestehorn, M., Benenson, Z., Buchmann, E., Jawurek, M., Böhm, K., Freiling, F.: Query dissemination in sensor networks—predicting reachability and energy consumption. In: AHSWN (2009)
2.
Zurück zum Zitat Buchmann, E., Apel, S.: Piggyback meta-data propagation in distributed hash tables. In: WEBIST05 (2005) Buchmann, E., Apel, S.: Piggyback meta-data propagation in distributed hash tables. In: WEBIST05 (2005)
3.
Zurück zum Zitat Di Fatta, G., Leue, S., Stegantova, E.: Discriminative pattern mining in software fault detection. In: 3rd International Workshop on Software Quality (SOQUA) (2006) Di Fatta, G., Leue, S., Stegantova, E.: Discriminative pattern mining in software fault detection. In: 3rd International Workshop on Software Quality (SOQUA) (2006)
4.
Zurück zum Zitat Eichinger, F., Böhm, K., Huber, M.: Mining edge-weighted call graphs to localise software bugs. In: ECML PKDD (2008) Eichinger, F., Böhm, K., Huber, M.: Mining edge-weighted call graphs to localise software bugs. In: ECML PKDD (2008)
5.
Zurück zum Zitat Eichinger, F., Krogmann, K., Klug, R., Böhm, K.: Software-defect localisation by mining dataflow-enabled call graphs. In: 10th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD) (2010) Eichinger, F., Krogmann, K., Klug, R., Böhm, K.: Software-defect localisation by mining dataflow-enabled call graphs. In: 10th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD) (2010)
6.
Zurück zum Zitat European Parliament and the Council of the European Union: Directive 2008/50/EC of the European Parliament and of the Council of 21 May 2008 on ambient air quality and cleaner air for Europe. Official Journal L 152, 11/06/2008, p. 01 (2008) European Parliament and the Council of the European Union: Directive 2008/50/EC of the European Parliament and of the Council of 21 May 2008 on ambient air quality and cleaner air for Europe. Official Journal L 152, 11/06/2008, p. 01 (2008)
7.
Zurück zum Zitat Furukawa, T., Cheng, J., Lim, S.H., Xu, F., Shioya, R.: Defect identification by sensor network under uncertainties. In: International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010, pp. 155–158 (2010) Furukawa, T., Cheng, J., Lim, S.H., Xu, F., Shioya, R.: Defect identification by sensor network under uncertainties. In: International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010, pp. 155–158 (2010)
8.
Zurück zum Zitat Furukawa, T., Lim, S.H., Michopoulos, J.G.: Stochastic identification of defects under sensor uncertainties. Int. J. Numer. Methods Eng. 90, 135–151 (2012)MathSciNetCrossRefMATH Furukawa, T., Lim, S.H., Michopoulos, J.G.: Stochastic identification of defects under sensor uncertainties. Int. J. Numer. Methods Eng. 90, 135–151 (2012)MathSciNetCrossRefMATH
9.
Zurück zum Zitat Hoblos, G., Staroswiecki, M., Aitouche, A.: Optimal design of fault tolerant sensor networks. In: International Conference on Control Applications, pp. 467–472 (2000) Hoblos, G., Staroswiecki, M., Aitouche, A.: Optimal design of fault tolerant sensor networks. In: International Conference on Control Applications, pp. 467–472 (2000)
10.
Zurück zum Zitat Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed diffusion for wireless sensor networking. IEEE/ACM Trans. Netw. 11(1), 2–16 (2003)CrossRef Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed diffusion for wireless sensor networking. IEEE/ACM Trans. Netw. 11(1), 2–16 (2003)CrossRef
11.
Zurück zum Zitat Kärpijoki, V.: Security in Ad Hoc Networks. Helsinki University of Technology, Espoo (2000) Kärpijoki, V.: Security in Ad Hoc Networks. Helsinki University of Technology, Espoo (2000)
12.
Zurück zum Zitat Knab, P., Pinzger, M., Bernstein, A.: Predicting defect predicting defect densities in source code files with learners. In: International Workshop on Mining Software Repositories (MSR) at ICSE, pp. 119–125 (2006) Knab, P., Pinzger, M., Bernstein, A.: Predicting defect predicting defect densities in source code files with learners. In: International Workshop on Mining Software Repositories (MSR) at ICSE, pp. 119–125 (2006)
13.
Zurück zum Zitat Liblit, B., Aiken, A., Zheng, A.X., Jordan, M.I.: Bug bug isolation via remote program sampling. ACM SIGPLAN Not. 38, 141–154 (2003)CrossRef Liblit, B., Aiken, A., Zheng, A.X., Jordan, M.I.: Bug bug isolation via remote program sampling. ACM SIGPLAN Not. 38, 141–154 (2003)CrossRef
14.
Zurück zum Zitat Liu, C., Yan, X., Yu, H., Han, J., Yu, P.S.: Mining behavior graphs for “Backtrace” of noncrashing bugs. In: 5th SIAM International Conference on Data Mining (2005) Liu, C., Yan, X., Yu, H., Han, J., Yu, P.S.: Mining behavior graphs for “Backtrace” of noncrashing bugs. In: 5th SIAM International Conference on Data Mining (2005)
15.
Zurück zum Zitat Liu, C., Yan, X., Han, J.: Mining control flow abnormality for logic error isolation. In: 6th SIAM International Conference on Data Mining (SDM) (2006) Liu, C., Yan, X., Han, J.: Mining control flow abnormality for logic error isolation. In: 6th SIAM International Conference on Data Mining (SDM) (2006)
16.
Zurück zum Zitat Madden, S.R., Franklin, M.J., Hellerstein, J.M., Hong, W.: TinyDB: an acquisitional query processing system for sensor networks. ACM Trans. Database Syst. 30(1), 122–173 (2005)CrossRef Madden, S.R., Franklin, M.J., Hellerstein, J.M., Hong, W.: TinyDB: an acquisitional query processing system for sensor networks. ACM Trans. Database Syst. 30(1), 122–173 (2005)CrossRef
17.
Zurück zum Zitat Nadig, D., Iyengar, S., Jayasimha, D.: A new architecture for A new architecture for distributed sensor integration. In: Southeastcon, p. 8 (1993) Nadig, D., Iyengar, S., Jayasimha, D.: A new architecture for A new architecture for distributed sensor integration. In: Southeastcon, p. 8 (1993)
18.
Zurück zum Zitat Nagappan, N., Ball, T., Zeller, A.: Mining metrics to predict component failures. In: 28th International Conference on Software Engineering (ICSE), pp. 452–461. ACM Press, New York (2006) Nagappan, N., Ball, T., Zeller, A.: Mining metrics to predict component failures. In: 28th International Conference on Software Engineering (ICSE), pp. 452–461. ACM Press, New York (2006)
19.
Zurück zum Zitat Nikjoo, M., Plataniotis, K.: Detecting the defective nodes in wireless sensor networks. In 2010 25th Biennial Symposium on Communications (QBSC), pp. 72–75 (2010) Nikjoo, M., Plataniotis, K.: Detecting the defective nodes in wireless sensor networks. In 2010 25th Biennial Symposium on Communications (QBSC), pp. 72–75 (2010)
20.
Zurück zum Zitat Sankarasubramaniam, Y., Akyildiz, I., McLaughlin, S.: Energy efficiency based packet size optimization in wireless sensor networks. In: First International Workshop on Sensor Network Protocols and Applications, pp. 1–8 (2003) Sankarasubramaniam, Y., Akyildiz, I., McLaughlin, S.: Energy efficiency based packet size optimization in wireless sensor networks. In: First International Workshop on Sensor Network Protocols and Applications, pp. 1–8 (2003)
21.
Zurück zum Zitat Schröter, A., Zimmermann, T., Zeller, A.: Predicting component predicting component failures at design time. In: 5th International Symposium on Empirical Software (2006) Schröter, A., Zimmermann, T., Zeller, A.: Predicting component predicting component failures at design time. In: 5th International Symposium on Empirical Software (2006)
22.
Zurück zum Zitat Stern, M., Buchmann, E., Böhm, K.: A wavelet transform for efficient consolidation of sensor relations with quality guarantees. In: 35th International Conference on Very Large Data Bases (VLDB 2009) (2009) Stern, M., Buchmann, E., Böhm, K.: A wavelet transform for efficient consolidation of sensor relations with quality guarantees. In: 35th International Conference on Very Large Data Bases (VLDB 2009) (2009)
23.
Zurück zum Zitat Stern, M., Böhm, K., Buchmann, E.: Processing continuous join queries in sensor networks: a filtering approach. In: Proceedings of the 29th International Conference on Data (SIGMOD’10) (2010) Stern, M., Böhm, K., Buchmann, E.: Processing continuous join queries in sensor networks: a filtering approach. In: Proceedings of the 29th International Conference on Data (SIGMOD’10) (2010)
24.
25.
Zurück zum Zitat Yan, X., Han, J.: CloseGraph: mining closed frequent graph patterns. In: KDD (2003) Yan, X., Han, J.: CloseGraph: mining closed frequent graph patterns. In: KDD (2003)
26.
Zurück zum Zitat Yao, Y., Gehrke, J.: The cougar approach to in-network query processing in sensor networks. SIGMOD Rec. 31(3), 9–18 (2002)CrossRef Yao, Y., Gehrke, J.: The cougar approach to in-network query processing in sensor networks. SIGMOD Rec. 31(3), 9–18 (2002)CrossRef
Metadaten
Titel
Identifying defective nodes in wireless sensor networks
verfasst von
Christopher Oßner
Erik Buchmann
Klemens Böhm
Publikationsdatum
01.12.2016
Verlag
Springer US
Erschienen in
Distributed and Parallel Databases / Ausgabe 4/2016
Print ISSN: 0926-8782
Elektronische ISSN: 1573-7578
DOI
https://doi.org/10.1007/s10619-015-7189-7

Weitere Artikel der Ausgabe 4/2016

Distributed and Parallel Databases 4/2016 Zur Ausgabe