Abstract
Wireless sensor networks (WSNs) are increasingly being adopted in critical applications. In these networks undesired events may undermine the reliability level; thus their effects need to be properly assessed from the early stages of the development process onwards to minimize the chances of unexpected problems during use. In this paper we propose two heuristic strategies: what-if analysis and robustness checking. They allow to drive designers towards optimal WSN deployment solutions, from the point of view of the connection and data delivery resiliency, exploiting a formal approach based on the event calculus formal language. The heuristics are backed up by a support tool aimed to simplify their adoption by system designers. The tool allows to specify the target WSN in a user-friendly way and it is able to elaborate the two heuristic strategies by means of the event calculus specifications automatically generated. The WSN reliability is assessed computing a set of specific metrics. The effectiveness of the strategies is shown in the context of three case studies.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Arivubrakan, P., Dhulipala, V.: Energy consumption heuristics in wireless sensor networks. In: 2012 International Conference on Computing, Communication and Applications (ICCCA), pp. 1–3 (2012). doi:10.1109/ICCCA.2012.6179194
Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11–33 (2004)
Blum, J., Magill, E.: Telecare service challenge: conflict detection. In: 2011 5th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth), pp. 502–507 (2011)
Boonma, P., Suzuki, J.: Moppet: A model-driven performance engineering framework for wireless sensor networks. Comput. J. 53(10), 1674–1690 (2010)
Bromuri, S., Stathis, K.: Distributed agent environments in the ambient event calculus. In: Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, DEBS ’09, pp. 12:1–12:12. ACM, New York (2009). doi:10.1145/1619258.1619275
Chen, Z., Zhang, D., Zhu, R., Ma, Y., Yin, P., Xie, F.: A review of automated formal verification of ad hoc routing protocols for wireless sensor networks. Sensor Lett. 11(5):752–764 (2013). doi:10.1166/sl.2013.2653, http://www.ingentaconnect.com/content/asp/senlet/2013/00000011/00000005/art00002
Chiasserini, C.F., Garetto, M.: Modeling the performance of wireless sensor networks. In: INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 231 (2004). doi:10.1109/INFCOM.2004.1354496
Chipara, O., Lu, C., Bailey, T.C., Roman, G.C.: Reliable clinical monitoring using wireless sensor networks: experiences in a step-down hospital unit. In: Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems, SenSys ’10, pp. 155–168. ACM, New York (2010). doi:10.1145/1869983.1869999
Cinque, M., Coronato, A., Testa, A.: Dependable services for mobile health monitoring systems. IJACI 4(1), 1–15 (2012a)
Cinque, M., Martino, C.D., Testa, A.: Analyzing and modeling the failure behavior of wireless sensor networks software under errors. In: IWCMC, pp. 1136–1141 (2012b)
Cinque, M., Coronato, A., Testa, A., Martino, C.D.: A survey on resiliency assessment techniques for wireless sensor networks. In: Proceedings of the 11th ACM International Symposium on Mobility management and Wireless Access (MobiWac ’13), pp. 73–80 (2013)
Coronato, A., De Pietro, G.: Formal design of ambient intelligence applications. Computer 43(12), 60–68 (2010). doi:10.1109/MC.2010.335
Di Martino, C., Cinque, M., Cotroneo, D.: Automated generation of performance and dependability models for the assessment of wireless sensor networks. IEEE Trans. Comput. 61(6), 870–884 (2012). doi:10.1109/TC.2011.96
El Abdellaoui, S., Debbah, M., Fakhri, Y., Aboutajdine, D., et al.: Increasing network lifetime in an energy-constrained wireless sensor network. Int. J. Sens. Netw. (IJSNET) 13(1), 44–56 (2013)
Elleuch, M., Hasan, O., Tahar, S., Abid, M.: Formal analysis of a scheduling algorithm for wireless sensor networks. In: Qin, S., Qiu, Z. (eds.) ICFEM. Lecture Notes in Computer Science, vol. 6991, pp. 388–403. Springer, Heidelberg. http://dblp.uni-trier.de/db/conf/icfem/icfem2011.htmlElleuchHTA11 (2011)
Elliott, E.O.: Estimates of error rates for codes on burst-noise channels. Bell Syst. Tech. J. 42, 1977–1997 (1963)
Fehnker, A., Fruth, M., Mciver, A.K.: Chapt graphical modelling for simulation and formal analysis of wireless network protocols. In: Butler, M.J., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Methods, Models and Tools for Fault Tolerance, pp. 1–24. Springer-Verlag, Berlin, Heidelberg (2009). doi:10.1007/978-3-642-00867-2_1
Hande, A., Polk, T., Walker, W., Bhatia, D.: Self-powered wireless sensor networks for remote patient monitoring in hospitals. Sensors 6(9), 1102–1117 (2006)
Hao, Y., Foster, R.: Wireless body sensor networks for health-monitoring applications. Physiol. Meas. 29(11), R27–R56 (2008). doi:10.1088/0967-3334/29/11/R01
Jawhar, I., Mohamed, N., Shuaib, K., Kesserwan, N.: Monitoring linear infrastructures using wireless sensor networks*. In: Miri, A. (ed.) Wireless Sensor and Actor Networks II, pp. 185–196, Springer, Boston (2008)
Katelman, M., Meseguer, J., Hou, J.: Redesign of the lmst wireless sensor protocol through formal modeling and statistical model checking. In: Proceedings of the 10th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, FMOODS ’08, pp. 150–169. Springer-Verlag, Berlin, Heidelberg (2008). doi:10.1007/978-3-540-68863-1_10
Ko, J., Lim, J.H., Chen, Y., Musvaloiu-E, R., Terzis, A., Masson, G.M., Gao, T., Destler, W., Selavo, L., Dutton, R.P.: Medisn: medical emergency detection in sensor networks. ACM Trans Embed Comput Syst 10(1):11:1–11:29 (2010). doi:10.1145/1814539.1814550
Kowalski, R., Sergot, M.: A logic-based calculus of events. New Gen. Comput. 4(1), 67–95 (1986). doi:10.1007/BF03037383
Laprie, J.C.: From dependability to resilience. In: 38th IEEE/IFIP International Conference on Dependable Systems and Networks, Anchorage, Alaska, June 2008, Sup vol. pp. G8–G9 (2008)
Lee, J.J., Krishnamachari, B., Kuo, C.C.J.: Impact of energy depletion and reliability on wireless sensor network connectivity. In: Proceedings of the SPIE Defense and Security (2004)
Levis, P., Lee, N., Welsh, M., Culler, D.: Tossim: accurate and scalable simulation of entire tinyos applications. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys ’03, pp. 126–137. ACM, New York (2003). doi:10.1145/958491.958506
Man, K., Vallee, T., Leung, H., Mercaldi, M., van der Wulp J., Donno M., Pastrnak M.: Tepawsn—A Tool Environment for Wireless Sensor Networks. In: 4th IEEE Conference on Industrial Electronics and Applications, 2009. ICIEA 2009, pp. 730–733 (2009). doi:10.1109/ICIEA.2009.5138301
Miller, R., Shanahan, M.: Reasoning about discontinuities in the event calculus. In: Proceedings of the Fifth International Conference on Principles of Knowledge Representation and Reasoning (KR’96, Morgan Kaufmann) pp. 63–74 (1996)
Mueller, E.T.: Decreasoner. http://decreasoner.sourceforge.net (2005)
Ölveczky, P.C., Thorvaldsen, S.: Formal modeling and analysis of the ogdc wireless sensor network algorithm in real-time maude. In: Proceedings of the 9th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, FMOODS’07, pp. 122–140. Springer-Verlag, Berlin, Heidelberg. http://dl.acm.org/citation.cfm?id=1772150.1772161 (2007)
Santos, A., Duhamel, C., Belisário, L., Guedes, L.: Strategies for designing energy-efficient clusters-based WSN topologies. J. Heuristics 18(4), 657–675 (2012). doi:10.1007/s10732-012-9202-x
Shanahan, M.: The Event Calculus Explained. In: Lecture Notes in Computer Science, vol. 1600, pp. 409–430. Springer, Heidelberg. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.3267 (1999)
Testa, A., Coronato, A., Cinque, M., Augusto, J.C.: Static verification of wireless sensor networks with formal methods. In: 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems (SITIS), pp. 587–594. IEEE, Piscataway (2012)
Titzer, B.L., Lee, D.K., Palsberg, J.: Avrora: scalable sensor network simulation with precise timing. In: Proceedings of the 4th international symposium on Information processing in sensor networks, IPSN ’05. IEEE Press, Piscataway. http://dl.acm.org/citation.cfm?id=1147685.1147768 (2005)
Xu, N., Rangwala, S., Chintalapudi, K.K., Ganesan, D., Broad A., Govindan, R., Estrin, D.: A wireless sensor network for structural monitoring. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys ’04, pp. 13–24. ACM, New York (2004). doi:10.1145/1031495.1031498
Yu, C., Fiske, R., Park, S., Kim, W.T.: Many-to-one communication protocol for wireless sensor networks. Int. J. Sens. Netw. 12(3), 160–170 (2012). doi:10.1504/IJSNET.2012.050454
Yuan, D., Hollick M.: Tree-based multi-channel convergecast in wireless sensor networks. In: 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–9 (2012). doi:10.1109/WoWMoM.2012.6263713
Zhang, J., Li, W., Cui, D., Zhao, X., Yin, Z.: The ns2-based simulation and research on wireless sensor network route protocol. In: 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009, WiCom ’09, pp. 1–4 (2009). doi:10.1109/WICOM.2009.5302699
Zoumboulakis, M., Roussos, G.: Complex Event Detection in Extremely Resource-Constrained Wireless Sensor Networks, pp. 194–213. Kluwer Academic Publishers, Hingham, MA (2011). doi:10.1007/s11036-010-0268-0
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Testa, A., Cinque, M., Coronato, A. et al. Heuristic strategies for assessing wireless sensor network resiliency: an event-based formal approach. J Heuristics 21, 145–175 (2015). https://doi.org/10.1007/s10732-014-9258-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10732-014-9258-x