Wireless Sensor Network Performance Monitoring



Similar documents
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

Distributed Self Fault Diagnosis in Wireless Sensor Networks using Statistical Methods. Meenakshi Panda

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Maximizing return on plant assets

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April ISSN

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

Monitoring Traffic manager

Wireless Sensor Network: Improving the Network Energy Consumption

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University

Customer Specific Wireless Network Solutions Based on Standard IEEE

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS

Prediction of DDoS Attack Scheme

Embedded Systems Lecture 9: Reliability & Fault Tolerance. Björn Franke University of Edinburgh

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks

WIRELESS SENSOR NETWORKs (WSNs) have been

Proactive, Resource-Aware, Tunable Real-time Fault-tolerant Middleware

The Problem: Automotive safety recalls, Control Systems Diagnostics, Stability Control, Traction Control, Anti-lock Braking, Adaptive Cruise Control

pc resource monitoring and performance advisor

Wireless Video Best Practices Guide

Load Balancing ContentKeeper With RadWare

High Availability and Clustering

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Partition-based Network Load Balanced Routing in Large Scale Multi-sink Wireless Sensor Networks

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Experimentation driven traffic monitoring and engineering research

A self-managing fault management mechanism for wireless sensor networks

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE

Monitoring behavior-based Intrusion Detection System for 6loWPAN networks

Dynamic Trust Management for the Internet of Things Applications

High Availability Design Patterns

Failure Mode and Effect Analysis. Software Development is Different

ISO Introduction

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

SPAN Port or TAP? TAP is the only viable data access technology for today s business critical networks

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

Avaya Stress Testing Service. Providing Confidence and Assurance for Every Deployment

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

Demystifying Wireless for Real-World Measurement Applications

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

Portable Wireless Mesh Networks: Competitive Differentiation

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Monitoring QNAP NAS system

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

Wireless Sensor Network: Challenges, Issues and Research

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements

Optimization Problems in Infrastructure Security

SureSense Software Suite Overview

EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks

An experimental test bed for the evaluation of the hidden terminal problems on the IEEE standard

How To Test For Elulla

Analysis of Denial of Service Attack Using Proposed Model

Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Using WebLOAD to Monitor Your Production Environment

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

A very short history of networking

Dependability in Web Services

Real-time Monitoring Platform to Improve the Drinking Water Network Efficiency

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

SmartDiagnostics Application Note Wireless Interference

Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks

Network Management in Wireless Sensor Networks

LoRa FAQs. 1 of 4 Semtech. Semtech Corporation LoRa FAQ

HomeReACT a Tool for Real-time Indoor Environmental Monitoring

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Spectral Clustering Approach to Validating Sensors via Their Peers in Distributed Sensor Networks

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

}w!"#$%&'()+,-./012345<ya

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Product Datasheet P MHz RF Powerharvester Receiver

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

mlab: A Mobile Ad Hoc Network Test Bed

Highlights of CAMS. Service Health Manager

Research Article An Automatic Decision-Making Mechanism for Virtual Machine Live Migration in Private Clouds

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

High Performance Cluster Support for NLB on Window

How To Create A Multi Disk Raid

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

Edge Gateway and virtualization for IoT connectivity

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

Mac Protocols for Wireless Sensor Networks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video

STRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY

An Overview of ZigBee Networks

Transcription:

Wireless Sensor Network Performance Monitoring Yaqoob J. Al-raisi & David J. Parish High Speed Networks Group Loughborough University MSN Coseners 12-13th 13th July 2007

Overview The problem we are trying to solve and why it is exist. How it has been solved by others and solutions limitations. The proposed algorithm characteristics, novelty and function. Empirical and simulation experimental results. Conclusion and future work.

Wireless Sensor Networks (WSNs( WSNs)

Characteristics Small, disposal, low power consumption network nodes. Reduce network and deployment cost. Enable network to be deployed in any terrain. Extend the virtual functionality of traditional networks. Increase the reliability of network collected data.

Challenges Limited energy and communication resources. No dominant protocols for all network applications. Frequent changes in connectivity, link failure and the change node status. Unbalanced network traffic. Change the degree of network s s tolerance to data changes and losses.

Deviation of nodes operation impact Use more network resources and reduce network lifetime. Reduce the reliability of collected data.

Related work Fault-Tolerant Tools Data Cleaning Tools Diagnosis tools Performance monitoring/measuring Tools Used only one level parameter Definition of outlier/fault Used method (either complex or not considering loss) Consume resources in packet exchange Clear data without indicating the confidence level Map of common neighbourhood function

Main method limitations The impact on network lifetime Tracking of crash faults. Tracking of either application- or communication-level parameters. The generated warning packets.

Main study objective To develop a low resource usage tool that tracks network nodes operation deviation on-line before they degrade collected data reliability and network lifetime.

Algorithm

Algorithm Characteristics and novelty The utilization of all neighbour nodes information in range. The extraction of its metrics from network protocols stored parameters. The use of a simple statistical method with tolerance to loss. The definition of tracked deviation. The relation between high and low network levels by testing the distortion. The test of possible communication available. The positive tracking of neighbour detection and control of warning packet release.

Algorithm event detection Node malfunction. Neighbourhood malfunction. Coverage problem. Inefficient power consumption. Communication problem.

Algorithm performance evaluation Lightweight operation (energy consumption, algorithm analysis) Robustness (tested under different packet loss, deviated nodes, deviated measurements, dead nodes) Adaptability and responsiveness (empirical experiments in single and multi-hop configuration). Scalability.

Algorithm Detection 100 90 80 Average positive false detection Average deviated nodes detected Average non detected deviated nodes 70 Detection percentage 60 50 40 30 20 10 0 0 10 20 30 40 50 60 70 80 90 Percentage of faulty nodes

P e r c e n t a g e 120 100 80 60 40 20 0 10 20 30 40 50 60 Neighbours Fault Percentage 4% 8% 13% 16% 22% 25% 30%

Percentage of change 10 9 8 7 6 5 4 Permanent deviation Temporal deviation Coverage problem Threshold value Node1 Node 2 Node 3 Node 4 Node 5 Node 6 Node 7 Node 8 Node 9 Node10 Node 11 3 2 1 0 0 1000 2000 3000 4000 5000 6000 7000 8000

Conclusion and future work The experiments showed the efficiency of the passive proposed algorithm in detecting the deviations and low power consumption. The experiments detect degradation of the algorithm functionality in very small networks. Solve this limitation by cause and effect diagram. Test the algorithm in different network applications other than environment monitoring. Test the effect of node mobility on the proposed algorithm performance.

Many Thanks

Why it exists Low manufacturing material quality and process. Limited usage of fault-tolerant tolerant and diagnosis techniques. Harsh environment the nodes operate in. Direct coupling with monitored phenomenon. Usage of wireless medium.

Type of deviation Systematic: affect the operation cautiously until the problem is solved such as calibration, reduction in operating power. Transient: affect the operation until the effect disappears such as random environmental effects and unstable characteristics of hardware.

Effect on the quality and quantity Direct effect Indirect effect Sensor node measurement such as biased, drift and stuck. Dropping exchange packets. Reboot or stop node function. Usage of more resources. Reduce the quality or quantity of collected data.

The problem we are trying to solve Maintain the large scale Wireless Sensor Network s s collected data quality and quantity at acceptable level.

Listening and filtering module Integrate the algorithm functionality into network application flow process. Use network application s existing parameters. Filter the high deviated parameters.

Data analysis and threshold test Test median value validity Calculate the residual of each neighbour in neighbourhood. Test each residual value to predefined threshold. Test the validity of data. module

Decision confidence control module Calculate the frequency of deviation existence with the tolerance of the network application protocol Request from module 4 to send warning message.

Warning packet exchange module Test if any neighbour sends the same message. Test received neighbour warning message. Send warning detection message Control packet releasing Request the protocols to reconfigure the node setting.

Percentage of change 100 80 60 40 20 Figure 1: Performance Net. pref. Reding pref. Percentage of change 1 0.5 0-0.5 Figure 2: Percentage of networtk losses Per. of loss 0 0 2000 4000 6000 8000-1 0 2000 4000 6000 8000 30 Figure 3: Median median 100 Figure 4: Residual changes Degrees centigrade 25 20 15 Percentage of change 80 60 40 20 10 0 2000 4000 6000 8000 0 0 2000 4000 6000 8000

Percentage of change 100 80 60 40 20 Figure 1: Performance Net. pref. Reding pref. Percentage of change 1 0.5 0-0.5 Figure 2: Percentage of networtk losses Per. of loss 0 0 2000 4000 6000 8000-1 0 2000 4000 6000 8000 30 Figure 3: Median median 40 Figure 4: Residual changes Degrees centigrade 25 20 15 Percentage of change 30 20 10 10 0 2000 4000 6000 8000 0 0 2000 4000 6000 8000

100 Figure 1: Performance 40 Figure 2: Percentage of networtk losses Per. of loss Percentage of change 80 60 40 20 Net. pref. Reding pref. 0 0 2000 4000 6000 8000 Percentage of change 30 20 10 0 0 2000 4000 6000 8000 30 Figure 3: Median median 50 Figure 4: Residual changes Degrees centigrade 25 20 15 Percentage of change 40 30 20 10 10 0 2000 4000 6000 8000 0 0 2000 4000 6000 8000

Percentage of change 100 80 60 40 20 Figure 1: Performance Net. pref. Reding pref. Percentage of change 100 80 60 40 20 Figure 2: Percentage of networtk losses Per. of loss 0 0 2 4 6 8 10 x 10 4 0 0 2 4 6 8 10 x 10 4 150 Figure 3: Median median 10 Figure 4: Residual changes Degrees centigrade 100 50 Percentage of change 8 6 4 2 0 0 2 4 6 8 10 x 10 4 0 0 2 4 6 8 10 x 10 4

Relating the high and low parameters 140 120 100 Value in degrees centigrade 80 60 40 20 0 6 6.1 6.2 6.3 6.4 6.5 6.6 6.7 x 10 4

Method 1

Method 2

Algorithm warning packet