FRSN
FRSN
FRSN
net/publication/224642575
CITATIONS READS
22 126
4 authors, including:
Sanjay Jha
UNSW Sydney
316 PUBLICATIONS 7,582 CITATIONS
SEE PROFILE
All content following this page was uploaded by Henry Le on 16 July 2014.
2 1
National ICT Australia (NICTA) University of NSW, Sydney
Australian Technology Park, Sydney Australia.
Australia.
Abstract— In this paper, we propose a framework for fault is unacceptable in some applications. Therefore, to overcome
repair in mobile sensor networks. A hierarchical structure which sensor node failure and to guarantee system reliability, faulty
consists of replacement module, management policy module, nodes should be detected and repaired promptly.
knowledge module, decision making module, and evaluation
module is adopted. We also propose a solution for faulty sensor On the other hand, in most cases faulty sensors can not
replacement problem. Through the numerical results, we show be easily replaced manually. Especially, in cases involving a
that our algorithm is more efficient and achieves higher energy polluted area or a hazardous chemical leak in a building [2],
savings than the greedy approach to sensor replacement. We it is too dangerous for a human to access the site for sensor
believe that the problem of faulty sensor nodes can be solved
replacement. Other applications such as military surveillance
efficiently through the cooperation and communication across
different modules, such as evaluation decision making, knowledge and smart homes may not only require maintaining the original
management, and replacement. sensing topology but also extending the existing sensing cov-
erage. In such cases, mobile sensors equipped with movement
I. I NTRODUCTION capabilities are a potential solution. For example, sensor nodes
may be placed at the entrance of the building, allowed to
In general, fault is the incorrect state of hardware or a proceed inside the building and find the desired position.
program as a consequence of a failure of a component [1]. However, the energy consumption for movement itself is
Permanent faults are the ones resulting from systems or costly. Hence, a method that minimizes such a cost is needed
communication hardware failure. For example, node may die to improve system utility.
due to battery depletion. An intermittent fault is one that This paper presents our preliminary ideas on a fault repair
has only incidental appearance due to unstable characteristic framework for mobile wireless sensor networks. We introduce
of the hardware. A transient fault is one that is the con- policy based management in conjunction with learning tech-
sequence of temporary environmental impact on otherwise niques. We also describe an off-line algorithm for replacement
correct hardware. For example, the change in environment may module of our architecture using Integer Linear Programming
cause incorrect sensor reading. In this paper we consider only formulation and numerical results to support our intuition.
permanent fault, which once activated remains continuous until The rest of the paper is organized as follows. We propose
it is detected and repaired. fault repair architecture for sensor network in Section II. In
One common characteristic of nodes in wireless sensor Section III, we describe an initial solution for replacement
networks is that they are prone to failure. Sensor nodes module of our proposed architecture and show some numerical
carry limited, generally irreplaceable, power sources. Nodes results. We discuss the related works in Section V. Section VI
in sensor networks can fail for many different due to several discuss some of the future works and concludes the paper.
reasons: their batteries may be depleted, they may be acciden-
tally destroyed, and a malicious adversary may deliberately II. FAULT R EPAIR A RCHITECTURE
incapacitate them. As time progresses, faults will occur more
often in sensor networks. Sensor network can continue to The objective of fault repair is to maintain the overall health
operate and provide services even with loss of some of the of a sensor network. The health of network here is the current
sensor nodes. However, the quality of offered services, such as sensing coverage. Assume that a sensor network is deployed
coverage, is greatly degraded upon loss of few core nodes. The to monitor a certain target area, which is divided into different
network loses utility when it does not provide the required cov- sections. It is likely that the coverage requirement is different
erage. Moreover, sensor failure may cause network topology in different sections of the area. There are major sections
changes and in extreme cases, network partitioning. Messages which may require high coverage, while other sections may
may still flow through the network despite these partitions. accept lower coverage. As sensor network is prone to failure,
However, the resulting paths may have a longer delay, which the major reason for coverage loss is faulty nodes. Therefore,
given a coverage distribution over the entire area, we want to Therefore, fault repair in sensor networks is more compli-
maintain adequate coverage of the network. cated and have different characteristics than in the traditional
Faults in sensor network have different characteristics than telecommunication network.
traditional networks. We discuss some of the distinguishing
characteristics of fault repair for wireless sensor networks here. A. Network Topology
We consider a randomly deployed sensor network that
1) Resource Limitation consists of a set of sensor S in a two dimensional area A.
S = {S1 , S2 , . . . , Sn }; (1)
Limited resources is a major issue for fault repair in
sensor networks. As the lifetime of a sensor node is Each sensor Si is located at coordinate (xi , yi ) inside A.
restricted to the limited battery power, an excessive Let the sensors be grouped into m cluster
communication burden on nodes to locate a faulty
sensor is certainly unacceptable. So, fault detection and C = {c1 , c2 , . . . , cm }; (2)
repair should spend as little energy as possible.
each consisting of at most c sensors.
The sensor network is hybrid, consisting of both static and
2) Response Time
mobile nodes. Mobile nodes are initially considered as re-
dundant nodes, not participating in the sensing/communication
To assure an application’s reliability, the faulty node
operation.
may need to be fixed quickly. For example, faulty
Each cluster maintains coverage above a certain coverage
sensors may reduce the coverage. As a result, the
threshold T C with tolerance rate tr. The coverage in a section
monitoring task may become unreliable. Faulty sensors
is thus to be maintained between the bounds given by Equation
should be replaced as soon as possible to guarantee
3.
continuing network performance. The response time for
CoverageBounds = T C − tr, T C + tr (3)
repair is thus also an important factor that should be
considered. In Figure 1, region A may be divided into four clusters
and each cluster may maintain different sensing coverage. For
3) Flexibility instance, cluster 1 may have T C = 70% and tr = 5%,
while cluster 2 may require T C = 30% and tr = 10%.
As sensor networks contain a large number of nodes, Coverage of cluster 1 is to be maintained between 65% and
the overall system behavior may not be affected 75%, and that of cluster 2 between 20% and 40%, respectively.
considerably in the presence of few faulty nodes. Thus, If sensing coverage requirement changes, e.g., environment
faults may not need to be repaired unless they do change, application requirement, etc, the sensing coverage
cause a problem. If faulty sensors are located in an threshold T C is re-evaluated.
unimportant region, they can be ignored. Similarly, if
faulty sensors have a minor impact on coverage, they
can also be ignored. So, the fault repair should be
smart enough to decide which nodes are eligible for
replacement.
4) Adaptive
B. Problem formulation 20
i1 0 5 51.9 20 0 42 84.7 11.3 63.3 66.2 40.9 26.6 0 33.3 25 99.2 0 44.8 0 82.6
i2 13.4 0 14.8 0 0 68 40.9 50.6 35.8 37.2 3.7 33.1 0 19.1 0 75.5 0 37.9 3.8 37.9
i3 15.3 0 18.9 0 0 60.3 0 0 4.7 0 0 42.8 3.4 0 2.7 19.9 0 76.3 7.8 12.5
i4 35.3 0 24.1 0 0 80 14.3 0 19.6 0 0 60.4 6.9 0 6.3 36.8 0 79.8 27.9 24.1
i5 1.5 0 71.7 35.3 0 47.9 62 0 58.6 39.7 19.3 40.4 25.4 7 48.2 73.2 13.4 67.9 0 77.5
i6 11.9 0 50.2 11.1 0 56 25.9 0 28.1 4.8 0 50.6 34.7 0 34 41.3 6.8 99.1 6.7 41
i7 41.9 0 26.5 0 0 92.5 34.1 20.9 38.1 21.6 0 61.5 0.3 0 5.6 61.6 0 64.7 33.6 38.4
i8 36.9 0 19 0 0 91.6 31.4 26.8 33.7 21.3 0 52.3 0 1 0 61.3 0 55.5 26.7 33.6
i9 18.8 0 57 18.8 0 64.2 46.1 0 49.7 26.1 2.1 58.9 31.5 0 37.3 63.1 22.9 8.5 13.9 58.4
i10 0 0 58.7 31.8 0 18.4 76.9 0 41.5 58.9 51 6.7 0 15.9 29.4 78.1 0 32 0 88.1
The replacement schedule is as follows: may work occasionally. If a sensor fault occurs in an important
section, it should be repaired soon. Therefore, each faulty
Assignment = [ 7 8 12 1 3 18 6 16 9 20 ] sensor has different time delay preference for replacement.
The management policy for this problem may be as follow:
This assignment matrix means the faulty sensor 1 will be If the redundant sensor response time is greater than the
replaced by redundant sensor 7; faulty sensor 2 is replaced response time acceptable for a faulty sensor, then do not move
redundant sensor 8, and so on. The following Figure describes that redundant sensor.
the movement schedule:
dij
≤ Ti (9)
vj
Where dij is the distance between redundant sensor j and
faulty sensor i, vj is velocity of redundant sensor j and Ti is
the response time required for faulty sensor i.
For our given network topology, we applied these manage-
ment policy rules and re-calculated the movement schedule
and the cost of movement (see Figure 6).
MOVEMENT SCHEDULE WITH MANAGEMENT POLICY
100
6 92
90
1 42 8
4 19 51
80 3 60 7 2
8
70 12
60
99
Fig. 5. Movement Schedule Without Management Policy 6
18
50 23
9
17 14
9 16
99
40 13
1
B. With simple management policy 30
5
102
72 7
650
correlation among neighboring sensor readings, faulty readings
are separated from event readings. The intuition behind the
600 approaches is that event readings are likely to be spatially
correlated. The confidence are computed statistically based on
550
the decision predicates from neighboring sensors. A different
500 approach to detect failed nodes through route discovery and
update is presented in [16]. A watchdog mechanism is used
450
10 12 14 16 18 20 22
Number of redundant sensor nodes
24 26 28 30
to identify misbehaving nodes and a path navigator is used
for supporting routing protocols to avoid them. In general
sensor readings are collected at a base station. An algorithm
Fig. 7. Increasing the No of Redundant Sensors
that is able to trace faulty nodes once these reading are
received at the base station is proposed in [17]. However, there
1000
has been a limited research on fault repair. While there are
900
several works on energy replacement by using mobile robots
our algorithm
800
greedy algorithm
to recharge sensor nodes [18] [19], these new technologies
have not been implemented yet. The author in [20] proposes
700
a framework for replacing faulty sensor nodes by relocating
600
Total
Energy
Remaining
mobile sensors. The framework consists of two phases, a Grid
500
Quorum solution that locates the closest redundant sensor
400
and the calculation of an efficient route for the relocation of
300
mobile sensors. Cascaded movement is used to achieve good
200 balance between energy efficiency and response time when
100 determining a sensor relocation path. In [21], an algorithm
0
0 2 4 6 8 10 12 14 16 18 20
called Coverage Fidelity maintenance algorithm (Co-Fi) uses
Number of faulty sensor nodes
mobility of sensor nodes for automated deployment and for
repairing of coverage loss in the monitoring area. One of the
Fig. 8. Increasing the No of Faulty Sensors limitations of these algorithms is that they are not able to
replace multiple faulty sensor nodes at a time. Hence, it is [13] M.Ding, D. Chen, K. Xing, and X. Cheng, “Localized fault-tolerant
obviously not suitable for a long term maintenance, where a event boundary detection in sensor networks,” in Infocom 05, March
2005.
number of faulty sensors can be significantly large. To the [14] B. Krishnamachari and S. Iyengar, “Distributed bayesian algorithms for
best of our knowledge, there is no existing fault repair archi- fault-tolerant event region detection in wireless sensor networks,” IEEE
tecture in sensor networks in the presence of numerous faulty Transactions on Computers, vol. 53, pp. 241–250, March 2004.
[15] M. Alanyali, S. Venkatesh, O. Savas, and S. Aeron, “Distributed
sensor nodes. Our proposed architecture provides robustness, bayesian hypothesis testing in sensor networks,” in American Control
adaptivity, and scalability. Conference, 2004.
[16] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior
in mobile ad hoc networks,” in Mobicom, 2000.
VI. C ONCLUSION AND F UTURE WORK [17] J. Staddon, D. Balfanz, and G. Durfee, “Efficient tracing of failed nodes
in sensor networks,” in ACM Workshop on Wireless Sensor Networks
In this paper, we proposed a fault repair architecture. and Applications WSNA ’02, September 2002.
[18] M. Rahimi, H. Shah, G. Sukhatme, J. Heidemann, and D. Estrin, “Study-
We introduce policy based management in conjunction with ing the feasibility of energy harvesting in a mobile sensor network,” in
learning techniques. As a starting point we provide some IEEE International Conference on Robotics and Automation (ICRA),
examples of the management policies and an offline algorithm 2003.
[19] A. LaMarca, D. Koizumi, M. Lease, S. Sigurdsson, G. Borriello,
for the replacement module of our architecture using Integer W. Brunette, K. Sikorski, and D. Fox, “Plantcare: An investigation in
Linear Programming formulation. We compare our ILP results practical ubiquitous systems,” Intel Research, vol. IRS-TR-02-007, 2002.
with greedy heuristics. Our results suggest that the greedy [20] G. Wang, G. Cao, T. Porta, and W. Zhang, “Sensor relocation in mobile
sensor networks,” in Infocom 05, March 2005.
algorithm performs very close to the optimal ILP results in [21] S. Ganeriwal, A. Kansal, and M. B. Srivastava, “Self aware actuation
terms of energy remaining. In its current stage our algorithm for fault repair in sensor networks,” in IEEE International Conference
is intended to be implemented at the Base Station and cluster on Robotics and Automation (ICRA), May 2004.
heads. We are also working on the distributed version of it at
the moment. Moreover, in this work we presented the empir-
ical evaluation of the replacement action in the replacement
module of architecture. We are currently extending our work
to include numerical and experimental evaluation of the entire
system. Our future work will develop all other modules of the
framework and provide experimental evaluation of a prototype
system.
R EFERENCES
[1] F.Koushanfar, M. Potkonjak, and A. Sangiovanni-Vincentelli, “Fault
tolerance in wireless ad hoc sensor networks,” IEEE Sensors, vol. 2,
pp. 1491–1496, June 2002.
[2] A. Howard, M. J. Mataric, and G. S. Sukhatme, “Mobile sensor network
deployment using potential fields:A distributed, scalable solution to the
area coverage problem,” in 6th International Symposium on Distributed
Autonomous Robotics Systems (DARS02), June 2002.
[3] M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized trust manage-
ment,” AT&T Research, 1996.
[4] P. F. D. Language, “draft-ietf-policy-framework-pfdl-00.txt,
http://www.ietf.org/proceedings/98dec/i-d/draft-ietf-policy-framework-
pfdl-00.txt.”
[5] T. Runarsson and S. Sigurdsson, “The learning methodology,
http://cerium.raunvis.hi.is/ tpr/courseware/svm/notes/chapter1.pdf.”
[6] E. Moore and C. Shannon, “Reliable circuits using less reliable relays,”
Franklin Institute, vol. 262, pp. 191–208, 1956.
[7] J. Neumann, “Probabilistic logics and the synthesis of reliable organisms
from unreliable components,” Automata Studies, pp. 43–98, 1956.
[8] D. Medhi, “Network reliability and fault tolerance,” in Wiley Encyclo-
pedia of Electrical & Electronics Engineering, University of Missouri,
1999.
[9] S. Iyengar, M. Sharma, and R. Kashyap, “Information routing and
reliability issues in distributed sensor network,” IEEE Transaction Signal
Processing, vol. 40, pp. 3012–3021, 1992.
[10] Q. Fang, J. Gao, and L. J. Guibas, “Locating and bypassing routing
holes in sensor networks,” in IEEE INFOCOM 2004, June 2004.
[11] V. Bychkovskiy, S. Megerian, D. Estrin, and M. Potkonjak, “A collab-
orative approach to in-place sensor calibration,” in 2nd International
Workshop on Information Processing in Sensor Networks IPSN ’03,
University of California, 2003.
[12] K. Whitehouse and D. Culler, “Calibration as parameter estimation in
sensor networks,” in ACM Workshop on Wireless Sensor Networks and
Applications WSNA ’02, September 2002.