internet connection with wireless sensor networks n.
Skip this Video
Loading SlideShow in 5 Seconds..
Internet Connection with Wireless Sensor Networks PowerPoint Presentation
Download Presentation
Internet Connection with Wireless Sensor Networks

Internet Connection with Wireless Sensor Networks

318 Views Download Presentation
Download Presentation

Internet Connection with Wireless Sensor Networks

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Internet Connection with Wireless Sensor Networks Lixia Zhang The Croucher Foundation Advanced Study Institute Wireless Sensor Networks December 6, 2006

  2. Disclaimer • Personal view • Sharing my own experience from 25 years with TCP/IP development • PHTYMH Potentially harmful to your mental health ASI

  3. Waves of research efforts • A new direction is proposed • Center of research gravity shifted • Many efforts devoted to the new topic • And . . . • Are we pushing the frontier of science, engineering, or technology? ASI

  4. Why talking the connection between Internet and sensor networking ? • Understand what we have learned • How our past result may guide our future effort ASI

  5. What is the "connection" ? Between the Internet and wireless sensor networks? • Sensors will be connected to the Internet! ASI

  6. But the most important connection The similarities between the two • Sensor networks: a new technology emerging on the horizon today • That's where the Internet was 30 years ago • Today's Internet: a global scale communication infrastructure • Sensor networking: Expected to succeed as the Internet has • and growing into large-scale deployment ASI

  7. Why multi-scale distributed sensor-networking will transform ecology Radioastronomy Computing Field ecology Supercomputers Single Telescopes Individual observations … because it has done so over and over again Very Large Array Internet NEON D. Estrin, keyntote@3rd IMUA Conf

  8. The second similarity • Both are man-built artifacts • A fundamental question: Have we mastered the principles for designing successful large-scale distributed systems? • Where to find these principles? ASI

  9. Here's what a famous scientist had to say • "The principle of science, the definition, almost, is the following: the test of all knowledge is experiment. Experiment is the sole judge of scientific 'truth'. " ASI

  10. "But what is the source of knowledge? Where do the laws that are to be tested come from? • Experiment, itself, helps to produce these laws, in the sense that it gives us hints." ASI

  11. The best way to find/learn the design principles • Is to build a sensor network • then one can learn from the successes, and more importantly from the lessons • We do not have to start from a blank sheet of paper • The Internet: real-world example of the largest system human ever built • Learn from a critical examination of the successes and lessons of the Internet ASI

  12. Programs H/W-/W Platforms /Publications LWIM Paper (ACM ISLPED) DARPA DSN Under-sea Networks Ubiquitous Computing Distributed Tracking Robotic Ecology (DARPA ISAT 1999) DARPA LWIM LWIM-III (UCLA) SmartDust, Diffusion (MobiCom 1999) DARPA AWAIRS TinyOS (OSDI 2000) WINS(UCLA/ROckwell) Embedded Everywhere (NRC Report 2001) DARPA SensIT MICA(Berkeley) ACM SenSys and ACM/IEEE IPSN DARPA PACC MICA2(Berkeley/Crossbow) NSF CENS STC ACM TOSN DARPA NEST NSF CASA ERC HelioMote Telos NSF NeTS-NOSS Cyclops NSF Cyber Physical Systems? Illumimote LEAP A Walk Through History 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 D. Estrin, keyntote@3rd IMUA Conf

  13. Brief History of the Internet • 1968 - DARPA (Defense Advanced Research Projects Agency) contracts with BBN (Bolt, Beranek & Newman) to create ARPAnet • 1970 - First five nodes: • UCLA • Stanford • UC Santa Barbara • U of Utah, and • BBN • 1974 - TCP specification by Vint Cerf • 1984 – On January 1, the Internet with its 1000 hosts converts en masse to using TCP/IP for its messaging from William F. Slater, III Chicago Chapter of the Internet Society ASI

  14. aren't there big enough differences Between Internet and sensor networking • That would make the Internet experience irrelevant? e.g. • Wireless bandwidth is intrinsically limited • But see the progress in WiFi speed over the last few years • "a fundamental challenge in wireless sensors is the energy problem" ASI

  15. ASI

  16. The fundamental challenge • Lies on discovering the principles for large scale systems • Technologies can, and will, be moving forward to meet whatever the market needs ASI

  17. Network Design in Practice • The initial packet switchted network design and validation were done while the system was small • Focus: solving the functional problems to get the system up and running • TCP/IP: delivering packets across networks made of different networking technologies • Early experiments necessarily done in a small setting that can be understood and controlled • ARPAnet started with a few nodes, then grew to dozens of nodes. ASI

  18. Scalability Consideration during the design phase: • Designs explicitly assumes that the network would grow large • Larger number of nodes getting connected • Larger number of route table entries; • Larger volume of data traffic • More types of new applications • And with different performance requirements ASI

  19. Internet scaling up • A success design in enabling growth to large-scale. • The Internet now faces new challenges resulted from its growth • Many new (unforeseen) problems popped up from practice • Many open challenges • Take a look at a real large scale distributed network ASI

  20. The Internet as a Large System • Expected impact of larger size • More users • Larger traffic volume • Bigger routing tables • Wider range of heterogeneity in networking technology the Internet has grown both in size and in importance ASI

  21. 1. Growing Large Includes:Changes in User Community • Small-scale: a close-nit, friendly research community • Large-scale open system: facing brutal real world • Expected user population growth • Unexpected changes in types of users: diverse interest • Millions of users contribute and gain from the Internet • Spammers, phishing, DDoS ASI

  22. Dangerous Financial Phish Phishing ASI

  23. DDoS Example: ASI

  24. could sensors possibly be abused? • In day-1 of Internet, no one thought it could possibly be abused either • What bad things can be done to sensor networking? • Military applications? • Terrorists? • Bottom line: When sensor networks start providing valuable services to some people, there will be some others who have a different interest ASI

  25. Small, knowledgeable, close-knit research community 2. Growing Large Includes:Changes in Operational Community • Small-scale: knowledgeable operators committed to growth and promotion of system • Collaboration toward the common goal. • Large-scale: diverse operators with competing agendas • Highly diverse levels of expertise • Competition instead of collaboration  Large operator community with different degrees of expertise ASI

  26. Operational Errors: an example • Operational errors have been the cause of most major outages so far • One common configuration error: route leak-out Global Internet regional ISP ASI

  27. A few route leak-out cases • Apr. 25, 1997 At 11:30 am EST, a router in AS7007 accidentally advertised to its peers 73,000+ routes. A large number of networks became unreachable as a result. This incident was partly aggravated by some BGP implementations’ inability to remove the false routes; even after AS7007 disconnected their router, the false routes still persisted for at least seven hours • Apr. 7, 1998 AS8584 announced over 11,000 prefixes belonging to other networks …… • Apr. 7, 1999 AS7374 leaked many routes via the Internet exchange point CIX (AS1280). It appears to be announcing routes for most of the Internet ... • Apr. 6, 2001 Cable and Wireless (AS3561) had a configuration error that caused it to propagate route announcements from a downstream customer AS15412…. • ........ • December 2004 AS9121 announced routes to almost all the Internet destinations, successfully hijacked a large number of prefixes hosted by tier-1 ISPs such as ATT and UUNET ASI

  28. Persistent existence "Understanding BGP Misconfiguration", SIGCOMM 2002 ASI

  29. NS NS NS A A A NS NS NS A A A Another example: DNS misconfiguration DNS stores all data in Resource Records (RR) • NS Resource Record: • Provides the names of a zone’s authoritative servers • Stored both at the parent and at the child zone com • A Resource Record • Associated with a NS resource record • Stored at the parent zone (glue A record) ASI

  30. Common config. error: Lame Delegation NS NS A A com 1) Non-existing server foo 2) Non-authoritative 3) Useless referral ASI

  31. Lame Delegation: how bad is it? ASI

  32. Internet Microsoft DNS servers Major incidents due to config. errors “Microsoft's websites were offline for up to 23 hours -- the most dramatic snafu to date on the Internet --because of an equipment misconfiguration” -- Wired News, Jan 2001 ASI

  33. 3. Growing Large Includes: unforeseen protocol impl. consequence • We are not talking about implementation bugs here • Though it is a serious problem • i.e. all the viruses/worms resulted from exploitation of bugs (in either OS or applications) • The problem: protocol implementors do not understand the consequence of specific protocol implementation decisions ASI

  34. Benign implementation  security threat • In spring'03 U. Wisc experienced sudden increase in incoming traffic: potential DDoS? • Notified the ISP and blocked the attack traffic • The traffic did not stopped ASI

  35. The culprit ASI

  36. What happened? • Several popular Netgear products "relied on a separate NTP-based time source to set the current date and time, as it did not have an internal battery and clock. The product is hard-coded with specific NTP time sources that are accessible through the public Internet." • "The Candidate Firewall Product met all the criteria elements in the Baseline and Residential modules and therefore has attained ICSA Labs Firewall Certification." These home routers: send 1 NTP query per second! ASI

  37. ISP 4. Growing Large Includes: unforeseen protocol design consequence • In designing a protocol: exactly what information should/not be carried in the protocol message? • One common view: the more the better • One design case: BGP aggregator attribute Aggr=R1 R3 R1 R2 ASI

  38. AS Path= <568>,AG=R1 AS Path= <209, 268>, R1 AS Path= <568>,AG=R2 AS Path= <209,568>, R2 subtle design issues show up at worst time • R1 and R2 connect to the upstream ISP. • AS X: local decision to prefer R1 or R2 as entry point. • AGG value differs depending on choice of R1 or R2. • During a worm attack: wild route fluctuationglobal flood of updates AS209 R1 R2 We are here Local instability  global overhead ASI

  39. 5. Growing Large Includes: unforeseen component behaviors • Routing protocols are designed with quick reactions to all topological changes • Unforeseen: started seeing small number of unstable edge networks • Inevitable in large scale • Global impact C Internet D A B X Y E ASI

  40. Let's fix it: BGP Damping Design • Use penalty to track route instability • Increase upon receiving an update • Otherwise decay exponentially • Suppress the route if penalty is over the cutoff threshold • Reuse when the penalty drops below the reuse threshold ASI

  41. Expected BGP Damping Behavior C Internet D damped … A B X Y E C Internet D  A B X Y E ASI

  42. "Route Flap Damping Exacerbates Internet Routing Convergence" • "We analyze a previously not well-studied interaction between BGP's route withdrawal process and its route flap damping mechanism for ensuring the overall stability of the Internet routing system. • "This interaction can, depending upon the topology, suppress up to one hour the propagation of a route that has been withdrawn once and re-announced." ASI

  43. C Internet D A  BA XBA A B another flap! X Y E 6. Growing Large Includes: unforeseen dynamics in large scale C Internet XCBA D XDBA W XEBA W XDCBA … W A B damped! X Y E ASI

  44. Secondary Charge Path exploration Secondary charging ASI

  45. 7. Growing Large Includes:Growth in value and importance! • Value and importance of the Internet attract malicious attacks • There exists an underground economy that is driving all the bad traffic in the Internet today • Using our network, our technology to attack us • This was not expected • Thus the original Internet protocol design and implementation were vulnerable in face of these attacks ASI

  46. ? Answer: A Authority: NS Additional: A = 8. Growing Large Includes:Trust Exploited By Attackers Original DNS design: information piggybacking  performance improvement Google DNS server UCLA Caching Server Query UCLA Laptop ASI

  47. = Query DNS cache poisoning byattracting servers to bad place Response A NS NS A A UCLA Caching Server DNS server Query UCLA Laptop Remote attacker ASI

  48. ? answer Answer: A Authority: NS Additional: A = Query DNS cache poisoning by Exploiting weakness in protocol design NS A A Google DNS server UCLA Caching Server UCLA Laptop ASI

  49. Putting the Problems in Context • The above is only a small sample set of observed problems due to growing large • The original protocol design/implementation enabled Internet growth to large scale, but are not well suited to maintain it at large scale ASI