{"title":"Robust Compressive Data Gathering in Wireless Sensor Networks with Linear Topology","authors":"Mohammadreza Mahmudimanesh, N. Suri","doi":"10.1109/DCOSS.2014.26","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.26","url":null,"abstract":"Wireless Sensor Networks (WSNs) are deployed in a variety of topologies and configurations depending on specific applications and requirements. In this paper, we study a simple and yet very important class of the WSN topologies, the linear or chain topology in which the Sensor Nodes (SNs) are connected in a series and gather the sensed data at a single base station or sink at the end of the chain. WSNs with linear topology have many practical applications, e.g., in infrastructure monitoring and surveillance of civil constructions. There is a large body of research on efficient data gathering techniques to transmit the sensed data over WSNs' limited communication bandwidth. In particular for linear topology, data collection technique has to put a balanced load on all SNs to avoid breakage of the chain at the exhausted nodes. Compressed Sensing (CS) is an efficient data collection technique for WSNs that fulfills these requirements. In a failure-free scenario, CS avoids exhausted nodes by balancing the communication and processing load on the SNs. In this paper, we examine the performance of a special implementation of CS for WSNs, called Compressive Data Gathering (CDG) when a SN in a chain WSN encounters a failure and cannot forward messages to the next hop. We propose a method to enhance the robustness of CDG in such failure scenarios by transmitting the messages to the next healthy node and excluding the failed samples from CS signal recovery mechanism. Evaluations show that our method effectively withstands the failures without sacrificing the accuracy of the collected data.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127815939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In Sensors We Trust -- A Realistic Possibility?","authors":"Mani Srivastava","doi":"10.1109/DCOSS.2014.65","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.65","url":null,"abstract":"Sensors of diverse capabilities and modalities, carried by us or deeply embedded in the physical world, have invaded our personal, social, work, and urban spaces. Our relationship with these sensors is a complicated one. On the one hand, these sensors collect rich data that are shared and disseminated, often initiated by us, with a broad array of service providers, interest groups, friends, and family. Embedded in this data is information that can be used to algorithmically construct a virtual biography of our activities, revealing intimate behaviors and lifestyle patterns. On the other hand, we and the services we use, increasingly depend directly and indirectly on information originating from these sensors for making a variety of decisions, both routine and critical, in our lives. The quality of these decisions and our confidence in them depend directly on the quality of the sensory information and our trust in the sources. Sophisticated adversaries, benefiting from the same technology advances as the sensing systems, can manipulate sensory sources and analyze data in subtle ways to extract sensitive knowledge, cause erroneous inferences, and subvert decisions. The consequences of these compromises will only amplify as our society increasingly complex human-cyber-physical systems with increased reliance on sensory information and real-time decision cycles.Drawing upon examples of this two-faceted relationship with sensors in applications such as mobile health and sustainable buildings, this talk will discuss the challenges inherent in designing a sensor information flow and processing architecture that is sensitive to the concerns of both producers and consumer. For the pervasive sensing infrastructure to be trusted by both, it must be robust to active adversaries who are deceptively extracting private information, manipulating beliefs and subverting decisions. While completely solving these challenges would require a new science of resilient, secure and trustworthy networked sensing and decision systems that would combine hitherto disciplines of distributed embedded systems, network science, control theory, security, behavioral science, and game theory, this talk will provide some initial ideas. These include an approach to enabling privacy-utility trade-offs that balance the tension between risk of information sharing to the producer and the value of information sharing to the consumer, and method to secure systems against physical manipulation of sensed information.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121955364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hole Approximation-Dissemination Scheme for Bounded-Stretch Routing in Sensor Networks","authors":"Phi-Le Nguyen, Khanh-Van Nguyen","doi":"10.1109/DCOSS.2014.17","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.17","url":null,"abstract":"The routing stretch in a sensor network with a large hole can be controlled if the network nodes have certain information about the hole location and shape, possibly by using some mechanism for hole boundary approximation and information dissemination. However, a finer approximation (for smaller stretch) leads to higher cost of dissemination, which could be unaffordable for the sensors. We provide an insightful analysis to this fundamental trade-off of the hole approximation problem, using a geometric model. Based on this we discuss an efficient approximation-dissemination scheme using a natural, heuristic approximation technique. For reasonable conditions (network is dense enough apart from the hole), we assure that the routing stretch is under a predefined threshold > 1 while the dissemination cost is also under tight control. Our initial experiment results also confirm that our approach is significantly more efficient and economical, compared to existing proposals.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134210506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-Physical Systems Attestation","authors":"J. Valente, C. Barreto, A. Cárdenas","doi":"10.1109/DCOSS.2014.61","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.61","url":null,"abstract":"Cyber-Physical Systems (CPS) are monitored and controlled by a wide variety of sensors and controllers. However, it has been repeatedly demonstrated that most of the devices interacting with the physical world (sensors and controllers) are extremely fragile to security incidents. One particular technology that can help us improve the trustworthiness of these devices is software attestation. While software attestation can help a verifier check the integrity of devices, it still has several drawbacks that have limited their application in the field, like establishing an authenticated channel, the inability to provide continuous attestation, and the need to modify devices to implement the attestation procedure. To overcome these limitations, we propose CPS-attestation as an attestation technique for control systems to attest their state to an external verifier. CPS-attestation enables a verifier to continuously monitor the dynamics of the control system over time and detect whether a component is not behaving as expected or if it is driving the system to an unsafe state. Our goal in this position paper is to initiate the discussion on the suitability of applying attestation techniques to control systems and the associated research challenges.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134448838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. M. Marinho, E. P. Freitas, J. Costa, Rafael Timóteo de Sousa Júnior
{"title":"Sensor Localization via Diversely Polarized Antennas","authors":"M. A. M. Marinho, E. P. Freitas, J. Costa, Rafael Timóteo de Sousa Júnior","doi":"10.1109/DCOSS.2014.54","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.54","url":null,"abstract":"Wireless sensor networks (WSNs) are currently employed in a vast number of different applications ranging from home automation and health care to military systems. Although their application may vary greatly, WSNs share a common set of characteristics such as a limited energy supply and simple hardware. A common issue related with the application of WSNs is sensor localization, for some types of applications it is important that the sensors know the relative or absolute position of other sensors in the network, such as surveillance of monitoring networks. If sensors are randomly placed they may resort a wide range of methods such as Global Navigation Satellite Systems (GNSS) or received signal strength indicators (RSSI). In this work we present an alternative to relative sensor localization by employed a crossed dipole antenna in the reception and a known polarization in the transmission. The accuracy of the proposed methods is measured trough numerical simulations and results are presented.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130933165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michal Gregorczyk, Tomasz Pazurkiewicz, K. Iwanicki
{"title":"On Decentralized In-network Aggregation in Real-World Scenarios with Crowd Mobility","authors":"Michal Gregorczyk, Tomasz Pazurkiewicz, K. Iwanicki","doi":"10.1109/DCOSS.2014.8","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.8","url":null,"abstract":"Recently proposed applications for monitoring the behavior of real-world crowds with wireless sensor nodes rely on decentralized in-network aggregation. Although some of the aggregation algorithms for wireless sensor networks seem appealing for such applications, we are not aware of any deployments of these algorithms in real-world scenarios with crowd mobility. As a step toward filling this gap, we thus discuss our experiences with decentralized in-network aggregation from a few such deployments involving up to 177 nodes. We compare two main classes of algorithms for basic aggregates. We show that algorithms based on probabilistic, order- and duplicate-insensitive sketches outperform algorithms based on gradual variance reduction. To this end, however, they have to be adapted considerably to minimize the traffic, latency, and errors of the aggregation process, and to account for some real-world issues. In short, while the algorithms do have a potential for the envisioned crowd-monitoring applications, deploying them is not trivial.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123688859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. R. Zema, E. Natalizio, M. Poss, G. Ruggeri, A. Molinaro
{"title":"Healing Wireless Sensor Networks from Malicious Epidemic Diffusion","authors":"N. R. Zema, E. Natalizio, M. Poss, G. Ruggeri, A. Molinaro","doi":"10.1109/DCOSS.2014.15","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.15","url":null,"abstract":"Leveraging the concept of controlled node mobility in this paper we develop an algorithm for tracking and controlling proximity malware propagation in Wireless Sensor Networks (WSN). Our proposal aims at: (i) notifying the nodes of malwarepropagation, (ii) leading a flying robot along a path in the WSNthat guarantees the minimum recovery time to (iii) heal the infected nodes. We formulate the targeted curing problem as a binary integer problem and determine the optimal solution by a central solver. We use the analytical result as a benchmark to evaluate the recovery time of the proposed solution. The achieved results show a satisfactory performance in terms of tracking the presence of an ongoing epidemic and healing the nodes.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128705548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Orod Raeesi, Juho Pirskanen, A. Hazmi, J. Talvitie, M. Valkama
{"title":"Performance Enhancement and Evaluation of IEEE 802.11ah Multi-Access Point Network Using Restricted Access Window Mechanism","authors":"Orod Raeesi, Juho Pirskanen, A. Hazmi, J. Talvitie, M. Valkama","doi":"10.1109/DCOSS.2014.18","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.18","url":null,"abstract":"Internet of Things (IoT) and Machine-to-Machine (M2M) applications are typically characterized by moderate investment costs to the M2M devices and infrastructure, in addition to the high reliability and energy efficiency requirements. The new Sub-1 GHz WiFi standard, namely the IEEE802.11ah, is being introduced to address these requirements deploying its recently specified MAC and PHY features and mechanisms. In this paper, we present an extensive analysis office 802.11ah network performance by means of realistic system level simulations. In particular, we focus on realistic performance evaluation and enhancement study of the IEEE 802.11ah network when multi-access points (multi-APs) with relatively high number of associated stations (STAs) are considered. The performance evaluation of the multi-AP IEEE 802.11ah network considers one of the main proposed MAC enhancement schemes for collision reduction, namely, the Restricted Access Window (RAW) mechanism. The analysis results confirm the importance of this novel mechanism to improve substantially the overall system performance from both network throughput and energy efficiency perspectives. Overall, the technical findings reported in this article strengthen the prospects of IEEE 802.11ah as one of the key enabling technologies for wide-scale low-cost and energy-efficient M2M deployments and IoT applications in the future.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126443280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siyu Gu, Chenji Pan, Hengchang Liu, Shen Li, Shaohan Hu, Lu Su, Shiguang Wang, Dong Wang, Md. Tanvir Al Amin, R. Govindan, C. Aggarwal, R. Ganti, M. Srivatsa, A. Bar-Noy, Peter Terlecky, T. Abdelzaher
{"title":"Data Extrapolation in Social Sensing for Disaster Response","authors":"Siyu Gu, Chenji Pan, Hengchang Liu, Shen Li, Shaohan Hu, Lu Su, Shiguang Wang, Dong Wang, Md. Tanvir Al Amin, R. Govindan, C. Aggarwal, R. Ganti, M. Srivatsa, A. Bar-Noy, Peter Terlecky, T. Abdelzaher","doi":"10.1109/DCOSS.2014.34","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.34","url":null,"abstract":"This paper complements the large body of social sensing literature by developing means for augmenting sensing data with inference results that \"fill-in\" missing pieces. Unlike trend-extrapolation methods, we focus on prediction in disaster scenarios where disruptive trend changes occur. A set of prediction heuristics (and a standard trend extrapolation algorithm) are compared that use either predominantly-spatial or predominantly-temporal correlations for data extrapolation purposes. The evaluation shows that none of them do well consistently. This is because monitored system state, in the aftermath of disasters, alternates between periods of relative calm and periods of disruptive change (e.g., aftershocks). A good prediction algorithm, therefore, needs to intelligently combine time-based data extrapolation during periods of calm, and spatial data extrapolation during periods of change. The paper develops such an algorithm. The algorithm is tested using data collected during the New York City crisis in the aftermath of Hurricane Sandy in November 2012. Results show that consistently good predictions are achieved. The work is unique in addressing the bi-modal nature of damage propagation in complex systems subjected to stress, and offers a simple solution to the problem.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114466672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Fuzzy Logic Mobility Management for WSN","authors":"Z. Zinonos, V. Vassiliou, C. Chrysostomou","doi":"10.1109/DCOSS.2014.40","DOIUrl":"https://doi.org/10.1109/DCOSS.2014.40","url":null,"abstract":"Mobility management is a crucial problem for wireless mobile communication, especially in industrial wireless sensor networks. Our mobility approach resides on the fact we need to adaptively combine globally available information in order to produce a successful handoff. In this paper, we propose an adaptive fuzzy logic mobility system to support the handoff procedure in industrial wireless sensors. The results clearly show that the proposed adaptive fuzzy logic mobility controller performs better compared to the non-adaptive fuzzy logic controller, in terms of packet loss, power consumption, and on-time triggering.","PeriodicalId":351707,"journal":{"name":"2014 IEEE International Conference on Distributed Computing in Sensor Systems","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126847161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}