Professional Documents
Culture Documents
Icinfa 2006 374140
Icinfa 2006 374140
Abstract- In this paper we discuss classic concepts of possible to apply such algorithms to reduce influence of faulty
Byzantine Failure Tolerance that can be applied in fault-tolerant sensors or disturbances only to a small group of sensor. It is
system design. Through replication of services (algorithmic possible that using the Byzantine algorithms may cause greater
computations) in a Wireless Sensors Network, the system can power consumption and hardware usage, however in this work
operate in a reasonably correct manner even in presence of we aim to propose efficient algorithms that can manage these
errors (e.g. faults). In distributed systems similar to Wireless disadvantages and offer more reliable solutions for WSN based
Sensors Networks - local disturbances or distortion problems can systems.
be resolved locally without involving the whole infrastructure.
Our proposition is to demonstrate suitability of variants of The research presented in this paper does not correspond to
Byzantine Algorithms based on additional information flow for any safety features or fault tolerance of a single sensor. We
solving such problems locally. By using Byzantine Algorithms we tried to focus on using the Byzantine Algorithms to solve local
can ensure reduction of disturbances and fake or invalid alarms distortion problems (detecting fake or false events). In our
in a sensors field as well limit their range to a minimum. Whole future work however we intend to extend our field of interests
problem is presented using a simulator that shows this algorithms to other system-wide issues..
during operation.
Keywords-component, formatting, style, styling, insert (key II. BYZANTINE GENERALS PROBLEM
words) Lamport, Shostak and Pease first introduced the concept of
the Byzantine Failure or the Byzantine Generals Problem in
I. INTRODUCTION 1982 in their "The Byzantine Generals Problem" research work
Over the past few years distributed wireless sensor [6][8].
networks (WSN) have been the focus of considerable research Figure 1. Byzantine Generals Problem
for both civil and military applications. Sensors are generally
constrained in on-board energy supply therefore efficient
management of the network is crucial to extend the life of the Generai 1
system. Failures and disturbance are inevitable in sensor
networks executing in hostile environments and due to their General 2
unattended deployment [1]. Faulty sensors or data distortion
can cause network infrastructure to needlessly transfer
erroneous or even totally false information through the entire
system. Such events usually cost additional power consumption |3 Genral 3
of key elements of WSN (e.g. Cluster Heads). The main aim of
this project is to explore and propose innovative computational
algorithmic solutions that can produce agreeable results in
presence of uncertainties thus reducing influence of sensors In a fault-tolerant distributed computing system, a
that work incorrectly or sensors which capture fake events due Byzantine failure is defined as an arbitrary fault that occurs
to disturbance or other environmental factors [8][3]. The during the execution of an algorithm by a distributed system. It
explored algorithms are based on general concepts used in the encompasses classes of faults that are commonly referred to as
Byzantine Fault Tolerance. Locally, a Wireless Sensors "crash failures" or/and "send and omission failures." When a
Network can be treated like a set of replicas; hence it is Byzantine failure occurs, the element of a system may respond
Page 320
zEm063g-F'W4ext1;H>jwNM.,5i!ECr&D@zIev6-B;l3*N
Sending information to HQ Sending information to HO
(let's call it the Agreement Range - Ar ) as depicted in Figure
4.
Sending information to CH
Sending information to CH I?
Byzantine Algorithms
X A sensor in a network should be able to find other In the following step sensor waits some time T for answer
sensors in same given radius from other sensor and gathers received information in some
Adding Byzantine Algorithms to Wireless Sensors Network table (lets call it agreement matrix AM), if there is no answer -
should provide a local tolerance for disturbances, distortions from a sensor it means there is no detection of an object or
event. A sensor also has knowledge about quantity of sensors
and false alarms. This requirement is essential in distributed in his Agreement Range (Ar) so after using a majority function
systems, as it enables to reduce spread of fake or invalid it can decide what to do. If a majority of sensors detects an
information through the entire network. Since decisions are event then information will be send to the cluster head and then
made locally then only small part of network actively take part to the base. If this is not the case then no information will be
in communication. Our rime objective is to solve problems
with local disturbances and thus increase the system reliability send through the network. In our model, we introduce an
at the local level. Additionally, by addressing local issues at the
additional requirement that only sensors with highest energy
local level, without involving global mechanisms that usually level can send information to cluster head (see Figure 5). This
require usage of additional resources we are able to generate allows reduction of the communication load.
significant savings. .....
6'i3 i'8
3
i'
i''
Page 321
IV. DESCRIPTION OF THE ALGORITHM
The algorithm that we that we have used to perform
simulation in Matlab environment can described as follows:
1) Wait for: sensor detected an event or received information --
else go to step 4
2) Find sensors in Agreement Range Ar, go to step 3
3) For each sensor found in step 2: send an information
about an event and about power level; go to step 4
4) While (timeout < T) receive information from other
sensors and put them to Agreement matrix Ama; go to step
5
5) Majority(Ama); go to step 6 //decide if an event has
occurr ed using basic majority function
6) Find sensor in Am with highest energy level, if sensor's
ID ==current ID send information to Cluster Head
Figure 6. Main simulator's window
The most important thing in this algorithm is to set optimal B. Simulation Results
value of Agreement Range and optimal majority function. The
majority function depends on several factors like density of The main problem and risk is situation in which an true
deployment of sensors, type of information send by sensors, event will by recognized as fake. In our simulation we tried to
detection range of sensors. set parameters in such a value that will guaranty that real event
will be corr ectly detected. During simulation using some fixed
Setting an Agreement range is a great deal, if it is to large value of Agreement and Sensor's Range there was no situation
there will be too much additional communication and too many in which true event was incorr ectly recognized. We suggest
sensors will be taking part in an agreement. If it is too small it that ratio of Agreement and Sensor's Range should be about
is possible that sensors will not find any nearby sensors. Our 0,5-0,6. That guaranties proper work of sensors without high
proposition is to set this value to a half of detecting sensors' increase of additional communication. During test using such
range, but the density of deployment of sensor should by settings we noticed that:
enough.
11 Non of the true events were recognized incorrectly
We should also add that this algorithm does not depend on
routing and clustering, it is based on a different layer of 11 Only about lOOo of fake events ware treated as true
abstraction. Working of Byzantine Algorithms is transparent events and spread across the network.
for clustering and routing algorithms. There is no problem if Below we presented some of simulation results. The bigger
sensors that are taking part in Byzantine Agreement belong to circle shows the detection range (Sensors Range) of Sensors,
different clusters. and the smaller one shows an Agreement Range. The chart
below an picture of simulation show an decision process for
V. SIMULATION chosen sensor.
A. About the Simulator An fake event has been recognized correctly
In this chapter an simulation results are shown. Simulator
was written using Matlab environiment. The main simulator
window is presented.
As it is seen on the figure 6, simulator has numerous ---------------------------------
----------- -------------------
--------- ---------
Page 322
Incorrect recognition of a fake event.
a) An event
a) recognized
Co as tru e
(U ----------------------------
a)
0
U1) An event --------- --------- -------------------
Co recognized as
fake
a)
(I)
-------------
U)
01 60 ------------------
---------------------------------------------------------- An event
a)
recognized
---------------------------- U1) as true
recognized as
a)
-------------------
U1)
fake
a)
----------------------------
- --
0 1A
------------------- --------- --------- -----------------------------------------
Sensors that haven't detected an event
Sensors that haven't detected an event of confidence that we are on a right track however further real-
life experiments are requires. In our future work we are
Figure 9. Detection of true event thinking about adding some additional requirements for our
Page 323
algorithmic solutions. For example, by passing some additional [4] B. Liskov, R. Rodrigues, "Tolerating Byzantine Faulty Clients in a
infornation about information reliability i.e. confidence levels Quorum System", ICDCS'06, Lisbon, 2006
of intelligence or by building reliability maps of sensors. We [5] V. Drabkin, R. Friedman, Marc Segal, "Efficient Byzantine Broadcast in
are continuously working on reducing of additional Wireless Ad-Hoc Networks", DSN'05, Israel, 2005
communication and power consumption levels. [6] L. Lamport, R. Shostak, M. Pease, "The Byzantine Generals Problem."
ACM Transactions on Programming Languages and Systems, 1982.
[7] C. Liskov, "Practical Byzantine Fault Tolerance". In OSDI: Symposium
VII. REFERENCES on Operating Systems Design and Implementation (1999), USENIX
[1] Z. Chaczko,F. Ahmad, "Wireless Sensor Network Based System for Fire
Association, Co-sponsored by IEEE TCOS and ACM SIGOPS.
Endangered Areas", ICITA 2005, Sydney, July 2005. [8] M. Pease, R Shostak, and L. Lamport,"Reaching Agreement in Presence
[2] Z. Chaczko, S. Sinha, "SAFE Model Approach to Construction of of Faults," JACM, vol. 27, no. 2, pp. 228234, April 1980.
Intelligent Security Systems", ICITA 2005, Sydney, July 2005.
[3] S.C. Wang K.Q. Yan H.C. Hsieh, "The Byzantine Agreement under
Mobile Network", International Conference on Networking, Sensing &
Control ,Taipei. Taiwan. March 2004
Page 324