The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - March (2012 vol.11)
pp: 439-452
Bing Wang , University of Connecticut, Storrs
Wei Wei , University of Massachusetts, Amherst
Hieu Dinh , University of Connecticut, Storrs
Wei Zeng , University of Connecticut, Storrs
Krishna R. Pattipati , University of Connecticut, Storrs
ABSTRACT
Faulty components in a network need to be localized and repaired to sustain the health of the network. In this paper, we propose a novel approach that carefully combines active and passive measurements to localize faults in wireless sensor networks. More specifically, we formulate a problem of optimal sequential testing guided by end-to-end data. This problem determines an optimal testing sequence of network components based on end-to-end data in sensor networks to minimize expected testing cost. We prove that this problem is NP-hard, and propose a recursive approach to solve it. This approach leads to a polynomial-time optimal algorithm for line topologies while requiring exponential running time for general topologies. We further develop two polynomial-time heuristic schemes that are applicable to general topologies. Extensive simulation shows that our heuristic schemes only require testing a very small set of network components to localize and repair all faults in the network. Our approach is superior to using active and passive measurements in isolation. It also outperforms the state-of-the-art approaches that localize and repair all faults in a network.
INDEX TERMS
Wireless sensor networks, fault localization, sequential testing.
CITATION
Bing Wang, Wei Wei, Hieu Dinh, Wei Zeng, Krishna R. Pattipati, "Fault Localization Using Passive End-to-End Measurements and Sequential Testing for Wireless Sensor Networks", IEEE Transactions on Mobile Computing, vol.11, no. 3, pp. 439-452, March 2012, doi:10.1109/TMC.2011.98
REFERENCES
[1] A. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz, F.L. Presti, S. Moon, V. Paxson, and D. Towsley, “The Use of End-to-End Multicast Measurements for Characterizing Internal Network Behavior,” IEEE Comm. Magazine, vol. 38, no. 5, pp. 152-159, May 2000.
[2] M. Adler and B. Heeringa, “Approximating Optimal Binary Decision Trees,” Proc. Int'l Workshop Approximation, Randomization and Combinatorial Optimization: Algorithms and Techniques (APPROX/RANDOM '08), Aug. 2008.
[3] V.T. Chakaravarthy, V. Pandit, S. Roy, P. Awasthi, and M. Mohania, “Decision Trees for Entity Identification: Approximation Algorithms and Hardness Results,” Proc. 26th ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems, 2007.
[4] W. Dong, X. Liu, C. Chen, Y. He, G. Chen, Y. Liu, and J. Bu, “DPLC: Dynamic Packet Length Control in Wireless Sensor Networks,” Proc. IEEE INFOCOM, Mar. 2010.
[5] N. Duffield, “Network Tomography of Binary Network Performance Characteristics,” IEEE Trans. Information Theory, vol. 52, no. 12, pp. 5373-5388, Dec. 2006.
[6] D. Ganesan, B. Krishnamachari, A. Woo, D. Culler, D. Estrin, and S. Wicker, “Complex Behavior at Scale: An Experimental Study of Low-Power Wireless Sensor Networks,” Technical Report UCLA/CSD-TR 02-0013, Feb. 2002.
[7] M.R. Garey, “Optimal Binary Identification Procedures,” SIAM J. Applied Math., vol. 23, no. 2, pp. 173-186, Sept. 1972.
[8] C. Gruenwald, A. Hustvedt, A. Beach, and R. Han, “SWARMS: A Sensornet Wide Area Remote Management System,” Proc. Third Int'l Conf. Testbeds and Research Infrastructure for the Development of Networks and Communities (TridentCom), May 2007.
[9] G. Hartl and B. Li, “Loss Inference in Wireless Sensor Networks Based on Data Aggregation,” Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN), Apr. 2004.
[10] C.-F. Hsin and M. Liu, “A Distributed Monitoring Mechanism for Wireless Sensor Networks,” Proc. First ACM Workshop Wireless Security (WiSe), Sept. 2002.
[11] P. Jelenkovic and J. Tan, “Dynamic Packet Fragmentation for Wireless Channels with Failures,” Proc. ACM MobiHoc, May 2008.
[12] J. Korhonen and Y. Wang, “Effect of Packet Size on Loss Rate and Delay in Wireless Links,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), Mar. 2005.
[13] P.P. Lee, V. Misra, and D. Rubenstein, “Toward Optimal Network Fault Correction in Externally Managed Overlay Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 3, pp. 354-366, Mar. 2010.
[14] Y. Mao, F.R. Kschischang, B. Li, and S. Pasupathy, “A Factor Graph Approach to Link Loss Monitoring in Wireless Sensor Networks,” IEEE J. Selected Areas in Comm., vol. 23, no. 4, pp. 820-829, Apr. 2005.
[15] H.X. Nguyen and P. Thiran, “Using End-to-End Data to Infer Lossy Links in Sensor Networks,” Proc. IEEE INFOCOM, Apr. 2006.
[16] H.X. Nguyen and P. Thiran, “The Boolean Solution to the Congested IP Link Location Problem: Theory and Practice,” Proc. IEEE INFOCOM, May 2007.
[17] K.R. Pattipati and M.G. Alexandridis, “Application of Heuristic Search and Information Theory to Sequential Fault Diagnosis,” IEEE Trans. Systems, Man and Cybernetics, vol. 20, no. 4, pp. 872-887, July/Aug. 1990.
[18] V. Raghavan, M. Shakeri, and K.R. Pattipati, “Optimal and Near-Optimal Test Sequencing Algorithms with Realistic Test Models,” IEEE Trans. Systems, Man and Cybernetics, vol. 29, no. 1, pp. 11-26, Jan. 1999.
[19] N. Ramanathan, K. Chang, R. Kapur, L. Girod, E. Kohler, and D. Estrin, “Sympathy for the Sensor Network Debugger,” Proc. Third Int'l Conf. Embedded Networked Sensor Systems (SenSys), Nov. 2005.
[20] N. Reijers, G. Halkes, and K. Langendoen, “Link Layer Measurements in Sensor Networks,” Proc. IEEE Int'l Conf. Mobile Ad-Hoc and Sensor Systems (MASS), Oct. 2004.
[21] S. Rost and H. Balakrishnan, “Memento: A Health Monitoring System for Wireless Sensor Networks,” Proc. Third Ann. IEEE Comm. Soc. on Sensor and Ad Hoc Comm. and Networks (SECON), Sept. 2006.
[22] T. Schmid, H. Dubois-Ferriére, and M. Vetterli, “SensorScope: Experiences with a Wireless Building Monitoring,” Proc. Workshop Real-World Wireless Sensor Networks, June 2005.
[23] G. Tolle and D. Culler, “Design of an Application-Cooperative Management System for Wireless Sensor Networks,” Proc. Second European Workshop Wireless Sensor Networks (EWSN), Jan. 2005.
[24] M. Vuran and I. Akyildiz, “Cross-Layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks,” Proc. IEEE INFOCOM, Apr. 2008.
[25] B. Wang, W. Wei, W. Zeng, and K.R. Pattipati, “Fault Localization Using Passive End-to-End Measurement and Sequential Testing for Wireless Sensor Networks,” Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), June 2009.
[26] D.B. West, Introduction to Graph Theory, second ed. Prentice Hall, Sept. 2000.
[27] K. Whitehouse, G. Tolle, J. Taneja, C. Sharp, S. Kim, J. Jeong, J. Hui, P. Dutta, and D. Culler, “Marionette: Providing an Interactive Environment for Wireless Debugging and Development,” Proc. Fifth Int'l Conf. Information Processing in Sensor Networks (IPSN), Apr. 2006.
[28] A. Woo, T. Tong, and D. Culler, “Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks,” Proc. First Int'l Conf. Embedded Networked Sensor Systems (SenSys), Nov. 2003.
[29] J. Zhao, R. Govindan, and D. Estrin, “Residual Energy Scans for Monitoring Wireless Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), Mar. 2002.
[30] J. Zhao, R. Govindan, and D. Estrin, “Computing Aggregates for Monitoring Wireless Sensor Networks,” Proc. IEEE Int'l Workshop Sensor Network Protocols and Applications (SNPA), May 2003.
[31] G. Zhou, T. He, S. Krishnamurthy, and J.A. Stankovic, “Models and Solutions for Radio Irregularity in Wireless Sensor Networks,” ACM Trans. Sensor Networks, vol. 2, no. 2, pp. 221-262, May 2006.
[32] M. Zuniga and B. Krishnamachari, “An Analysis of Unreliability and Asymmetry in Low-Power Wireless Links,” ACM Trans. Sensor Networks, vol. 3, no. 2, June 2007.
34 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool