TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Implementation Of Byzantine Fault Tolerant Algorithm on WSN
1. IMPLEMENTING BYZANTINE ALGORITHM ON WIRELESS SENSOR NETWORKS Guided By:- Prof. GaurangRaval Presented By: Shatadru Chattopadhyay(07BIT005) Herat Gandhi(07BIT012) ShashankJuyal(07BIT017)
2. AGENDA Introduction Goals and Objectives Constraints Tools and Technologies used Concepts Byzantine Failure Byzantine fault tolerant Algorithm Deliverables Byzantine Implementation on Mesh Networks Byzantine Implementation on multi-hop networks Byzantine implementation on multi-hop networks using power based routing Comparison between algorithms Practical Demonstration Future Scope
3. INTRODUCTIONGoals and Objectives Implementation of Byzantine Fault Tolerance Algorithm Simulation of algorithm using TOSSIM Deployment over hardware motes Measuring time required by each mote and optimizing it Efficient utilization of resources on Hardware motes Power Efficient Algorithms
4. Introductionconstraints Interference along the 2.4 GHz ISM band since most wireless devices tend to use this band for communication. Noise Level across links should be known. TOSSIM cannot simulate for heterogeneous networks. Because it is developed in TinyOS 2.1.1 it is backward incompatible.
5. Introductionfunctionalities Detecting and Isolating faulty motes and keeping the network robust enough to communicate Maintaining power efficiency A power efficient routing protocol A client server simulator for analysts to analyze their networks and topologies Graphical Analysis and Report Generation
7. Conceptsbyzantine fault The term Byzantine was first used for the type of failure where faulty motes may exhibit completely unconstrained behavior. Derived from some traitorous generals of the Greek Byzantium Empire The Byzantine Problem assumes that the network is an n-mote connected undirected graph Each mote starts with an input from a fixed value set V . The goal is for the motes to eventually output decisions from the set V, with the possibility that a limited number (at most f) of motes might fail.
8. Conceptsbyzantine fault tolerant algorithm In order to broadcast (m, i, r) at round r, mote i sends a message (“init', m, i, r) to all motes at round r. If mote j receives an ("init", m, i, r) message from mote i at round r, it sends ("echo", m, i, r) to all motes at round r + 1. If, before any round r > r + 2, mote j has received ("echo", m, i, r) messages from at least f + 1 motes, then j sends an ("echo", m, i, r) message at round r (if it has not already done so). If, by the end of any round r > r + l, mote j has received ("echo", m, i, r) messages from at least n - f motes, then j accepts the communication at round r(if it has not already done so).
9.
10. conceptsCollection tree protocol(CTP) A collection protocol builds and maintains minimum cost trees to nodes that advertise themselves as tree roots. Two methods The first is data path validation using data packets to dynamically probe and validate the consistency of its routing topology. The second is adaptive beaconing, which extends the Trickle code propagation algorithm so it can be applied to routing control traffic. CTP uses expected transmissions (ETX) as its routing gradient. A root has an ETX of 0. The ETX of a node is the ETX of its parent plus the ETX of its link to its parent.
11. Conceptsdissemination Major Dissemination Protocols are DRIP-Each data item is independently advertised and disseminated. Metadata is not shared among data items DIP-It is a modification of the Drip protocol. Advertisement messages are used for a fixed data set meaning all nodes must agree on a fixed set of data item identifiers before dissemination. DHV-Advertisement messages are used for a fixed data set meaning all nodes must agree on a fixed set of data item identifiers before dissemination.
12. Deliverablesimplementation on mesh networks Stage 1: All stations send HELO packet to the base station Stage 2: Base Stations sends ‘n’-the number of motes in the network, to all stations Stage 3: A node sends an INIT packet to all other motes Stage 4: If having received INIT packet, motes send ECHO packet to all other motes Stage 5: If a mote has received ‘n-f’ ECHO packets, f being the number of faulty motes, then communication is successfully established
13. Implementation on mesh networksPacket structures HELO Packet- 16 bit packet Contains mote ID of the mote sending it INIT Packet- 32 bit packet Sent only once by a mote Consists sender`s mote ID ECHO Packet- 32 bit packet Sent in reply to receiving an INIT Consists of the mote ID of sender
17. deliverablesImplementation over multi-hop networks First stage: All motes send HELO packet to base station using CTP and base station finds total number of motes in network. Second stage: Base station sends “n (number of motes)” to all motes using Dissemination. Third stage:In this stage one node will be randomly selected and will disseminate INIT packet using the Drip algorithm in the network. Fourth stage: After receiving INIT packet, motes send ECHO packet. Motes keep counter of ECHO packets. Fifth stage: If any mote has received n-f ECHO packets in previous round then it establishes successful communication.
18. Implementation over multi-hop networksPacket structures HELO Packet- 16 bit packet Contains mote ID of the mote sending it INIT Value- Is a value disseminated over the network Value disseminated using DRIP If a value of 0 is received it is interpreted as INIT value ECHO Value- Is a value disseminated over the network Value disseminated using DRIP If a value other than 0 is received it is interpreted as ECHO
21. Deliverablesimplementation using power based routing First stage: All motes send HELO packet to base station using CTP and base station finds total number of motes in network. Second stage: Base station sends “n (number of motes)” to all motes using Dissemination. Third stage: Each mote sends HELO packet to its neighbor. Fourth stage: After receiving HELO packet from neighbor mote sends ACK packet to sender mote. After receiving ACK packet mote measures its RSSI value and stores all necessary information. Each mote also stores which mote can be selected as its parent. Continued……..
22. continued Fifth stage: Information collected from the previous stage is sent to base station using FRNDS packet and base station processes this information and creates routing table. Sixth stage: Base station sends pruned routing table to all motes. Seventh stage: In this stage one node will be randomly selected and will disseminate INIT packet using pruned routing table. Eighth stage: After receiving INIT packet, motes send ECHO packet. Motes keep counter of ECHO packets. Ninth stage: If any mote has received n-f ECHO packets in previous round then it establishes successful communication.
23. implementation using power based routingPacket structures HELO Packet- 16 bit packet Contains mote ID of the mote sending it INIT Value- Is a value disseminated over the network Value disseminated using DRIP If a value of 0 is received it is interpreted as INIT value ECHO Value- Is a value disseminated over the network Value disseminated using DRIP If a value other than 0 is received it is interpreted as ECHO FRNDS Packet- Contains neighbor information and power required to transmit to them
27. Simulator A client server based simulator It is aimed at network analysts to analyze topologies Can work for particular or a randomly generated topology Provides graphical analysis as well as reports for the topology and its energy consumption Works over the internet and TOSSIM needs to be installed only in the server hence saves from installing TinyOS.
32. Future scope Some improvements in the Algorithm can be done by using the routing table generated by the Base Station using power based routing in the implementation of Byzantine algorithm to make it more efficient and feasible over large network. This simulator performs all processing part on server and client can view result by communicating with server. This architecture can be extended to use cloud computing.
33. bibliography D Gay, P Levis, ‘The NesC language: A holistic approach to network embedded systems’, ACM 2003 Nancy Lynch, ‘Distributed Algorithms’, Morgan Kaufmann Inc. 1997br />Philip Levis, ‘TOSSIM: Accurate and Scalable simulation of entire TinyOS applications’. Enrico Perla, Art O Cathain, ‘PowerTOSSIM z: Realistic Energy Modeling for Wireless Sensor Network Environments’ Jessica Staddon, Dirk Balfanz and Glenn Durfee, ‘Efficient Tracing of Failed Nodes in Sensor Networks’, Palo Alto reasearch Center, October 1 2002. Thomas Clouqueur, ‘Fault Tolerance in Collaborative Sensor Networks for Target Detection, IEEE Conference, March 2004. Carolos Livadas and Nancy A. Lynch, ‘A Reliable Broadcast Scheme for Sensor Networks’. H.A. Ali, ‘An efficient relative broadcast algorithm in Adhoc networks based on Self-Pruning’, Egypt.