Module-based Courseware and Laboratory Development for Teaching Secure Wireless Sensor Networks

Ø  Return to the main page of module evaluation

 

The Initial WSN Modules (before the initial formative evaluation)

(Last updated: 10/18/2009)

Module 1. Introduction to Wireless Sensor Networks

Module 2. Tiny OS

Module 3. Energy Management

Module 4. Radio and Medium Access Control

Module 5. Wireless Link Estimation

Module 6. Data Collection and Dissemination

Module 7. Security of Wireless Sensor Networks

Module 8. Localization and Secure Localization

Module 9. Aggregation and Secure Aggregation

 

·      Module 1. Introduction to Wireless Sensor Networks

This module introduces the basic principles and characteristics of wireless sensor networks. Specifically, we start with real world examples to explain WSNs and their operational challenges, including energy efficiency, limited storage and computation, low bandwidth and high error rates, etc. MicaZ motes and TelosB motes are used as hardware platforms to give students more concrete examples.
PowerPoint slides: ppt

Ø  Return to the top of the page

·      Module 2. Tiny OS

This module introduces the dominant open source operating system for WSNs - TinyOS. TinyOS differs from traditional operating systems in that it is designed as a lightweight operating system for achieving high efficiency in embedded systems, and therefore has no heavyweight kernel, no process management, and no virtual memory.

Our designed module takes sample codes from the TinyOS 2.x kernel to illustrate important ideas. These ideas include how TinyOS is designed to support different hardware platforms (MicaZ, Mica2, TelosB, Iris, etc.), how TinyOS is designed to support different hardware chips (MCU, radio, etc.) for a specific platform, how the data link protocol for ChipCon.s CC2420 and CC1000 chips are designed and implemented, how the timer system is designed and implemented, and how the serial communication is designed and implemented.

We further adopt several representative WSN applications (BaseStation-Listen-BlinkToRadio, Oscilloscope, MultiHopOscilloscope, MViz, and Octopus) and plot different network topologies for each application and use them in this course module.

PowerPoint slides: ppt

Ø  Return to the top of the page

·      Module 3. Energy Management

Energy is the most stringent resource in WSNs, because sensor nodes are typically battery powered, especially when they are deployed in remote or hard-to-reach locations. To facilitate the application development and to avoid the explicit invocation of power control operations from the applications, TinyOS 2.x has integrated power management into its device drivers. Virtualized, dedicated, and shared are three main resource arbitration models for important resources like timer, bus, memory, and Analog-to-Digital Converter (ADC). We also use CC2420, Atmegal 128 Analog to Digital Converter, and MTS 300 as the example chips to illustrate these important ideas.
PowerPoint slides: ppt

Ø  Return to the top of the page

·      Module 4. Radio and Medium Access Control

WSNs demonstrate unique radio communication patterns, including radio irregularity, anisotropic signal strength, and anisotropic packet loss ratio. All these factors have dramatic impact on higher layer protocols like MAC and their design and implementation. In our course modules, we use detailed experimental data to illustrate the relevant concepts.

We start with the introduction to some basic concepts about wireless communications, including signal, dB, dBm, Received Signal Strength Indicator (RSSI), Link Quality Indicator (LQI), and noise floor. These concepts are frequently used in many WSN papers. We then introduce MAC protocols which coordinate nodes to access shared wireless channels. The essential requirements of MAC protocols are energy efficiency, effective collision avoidance, efficient channel utilization, and scalability. We present a classification of MAC protocols in order for students to have a high-level conception. We focus on the introduction of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA) protocols. Finally we introduce the details of B-MAC, which is a core module implemented in TinyOS. We focus on important concepts including Clear Channel Access (CCA) and Sleep/Wake scheduling using Low Power Listening (LPL), which are unique to WSN design.

PowerPoint slides: ppt

Ø  Return to the top of the page

·      Module 5. Wireless Link Estimation

In this module, we first introduce why wireless link estimation is necessary by showing details of the time varying nature of a wireless channel. The data we use come from the experiments with a real world WSN, which vividly demonstrate the relevant features of a wireless link.

We then introduce state-of-the-art link estimation techniques. First, we focus on ETX . Expected Transmission Count, whose purpose is to choose routes with high end-to-end throughout and find paths with the fewest expected number of transmissions. Secondly, we focus on four-bit wireless link estimation. In this estimation, information from the physical layer, the data link layer, and the network layer are all integrated to estimate the quality of a link.

PowerPoint slides: ppt

Ø  Return to the top of the page

·      Module 6. Data Collection and Dissemination

Previously introduced modules lay the foundation for important WSN applications. Data collection and dissemination turn out to be the most basic and important applications promised by WSNs. Many collection and dissemination protocols have been proposed. However, most of the proposals typically show merely basic ideas and analysis of complexity and overhead of the proposed protocol, lacking details about the implementation.

When designing lab projects for the WSN course modules, we select the Collection Tree Protocol (CTP) as the data collection protocol, which is a very popular tree-based protocol implemented in TinyOS. CTP has received a lot of discussion in the TinyOS email list. We then introduce a data forwarding scheme which is tailored for extremely low duty-cycle data forwarding applications. Regarding data dissemination protocol, we select Trickle. Like CTP, Trickle is one of the most commonly used protocols and has been implemented in TinyOS.

We also introduce a data collection protocol for extremely low-duty-cycle WSNs.

PowerPoint slides: ppt

Ø  Return to the top of the page

·      Module 7. Security of Wireless Sensor Networks

Similar to other types of networks, wireless sensor networks are subject to various types of threats and attacks. Because security has become one of the major concerns to deploy WSNs in the real world, WSN course modules are not complete without modules focusing on WSN security. We start with the introduction of major attack models targeted at WSNs. We then focus on the TinySec protocol, which aims at providing message integrity and confidentiality at the data link layer. TinySec has also become an implemented module in TinyOS. Our course module introduces the details with respect to how TinySec is designed and implemented.
PowerPoint slides: ppt

Ø  Return to the top of the page

·      Module 8. Localization and Secure Localization

Localization is an important service for WSNs, because many WSN applications require location information of the sensor nodes. Furthermore, localization turns out to be a challenging task for WSNs.

We first give a high-level picture of localization and a classification of existing localization protocols - range-based and range-free localization. We then introduce a Minimum Mean Square Estimation (MMSE) based localization solution, because MMSE based solutions can summarize the basic ideas of most localization schemes. In the course modules, we use simple mathematics to show basic ideas of MMSE.

Based on MMSE, we then introduce the secure localization problem and one popular solution to provide correct location given malicious attacks. We show how to derive a set of consistent location references and illustrate how to retrieve a set of good location references.

PowerPoint slides: ppt

Ø  Return to the top of the page

·      Module 9. Aggregation and Secure Aggregation

Data aggregation has been proven to be an important method to reduce communication overhead and to save energy for WSNs. To address this need, we first introduce why we need aggregation - to suppress redundant messages and save energy. To illustrate this idea, we use a detailed example - counting how many nodes exist in a large-scale WSN; the example was taken from the Tiny AGgregation Service (TAG) approach. We then move to general aggregation primitives - minimum, average, sum, and maximum - and explain their usage in real world applications.

We further present why we need secure aggregation - compromised sensor nodes can manipulate the result of aggregated values without limit, causing false information to be delivered to the base station. We then present the details involved in using a lightweight block cipher to provide an aggregation service which can provide confidentiality, integrity, and authenticity. Our module skips the complex mathematical analysis and focuses on high-level ideas.

Powerpoint slides: ppt

Ø  Return to the top of the page