Skip to main content

To Increase Survivability with Software Rejuvenation by Having Dual Base Station in WSN Environment

  • Conference paper
Frontiers of High Performance Computing and Networking ISPA 2007 Workshops (ISPA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4743))

Abstract

In a near future, our use of computer technology will increasingly depend on Wireless Sensor Network (WSN) system consists of plethora of nodes. This WSN’s survivability will depend most critically on base station that attaches WSN to outside network including Internet. The need for survivability is most pressing for mission critical systems. To increase the survivability, we show up the detection model with proactive rejuvenation and reactive recovery through a Continuous Time Markov Chain (CTMC) process, where it is designed to provide continued useful service in face of attacks, failures, or accidents and to prevent the intruders’ attempts in their tracks. Afterwards, we focus on downtime analysis. This is a general model which can be applicable to any nodes in a WSN environment. But this model can be more critically used for base station since base station is almost a single point of failure in a WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine, 102–114 (2002)

    Google Scholar 

  2. Bobbio, A., Sereno, M., Anglano, C.: Fine Grained Software Degradation Models for Optimal Software Rejuvenation Policies. Performance Evaluation 46, 45–62 (2001)

    Article  MATH  Google Scholar 

  3. Candea, G., Cutler, J., Fox, A.: Improving Availability with Recursive Microreboots: A Soft-State System Case Study. Performance Evaluation Journal 56 (2004)

    Google Scholar 

  4. Cankaya, H.C., Nair, V.S.S.: A Survivability Assessment Tool for Restorable Networks. In: 3rd IEEE Symposium on Application-Specific Systems and Software Engineering Technology, pp. 319–324. IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  5. Deng, J., Han, R., Mishra, S.: Enhancing Base Station Security in Wireless Sensor Networks, University of Colorado, Department of Computer Science Technical Report CU-CS-951-03 (2003)

    Google Scholar 

  6. Garg, S., Moorsel, A.V., Vaidyanathan, K., Trivedi, K.S.: A Methodology for Detection and Estimation of Software Aging. In: Proc. of the 9th Int. Symposium on Software Reliability Engineering, Paderborn, Germany, pp. 283–292 (1998)

    Google Scholar 

  7. Garg, S., Puliafito, A., Telek, M., Trivedi, K.S.: Analysis of Software Rejuvenation using Markov Regenerative Stochastic Petri net. In: Proc. of the 6th Int. Symposium on Software Reliability Eng., pp. 24–27. IEEE Computer Society Press, Los Alamitos (1995)

    Google Scholar 

  8. http://shannon.ee.duke.edu/Rejuv/software-rejuvenation.html

  9. Huang, Y., Kintala, C., Kolettis, N., Fulton, N.D.: Software Rejuvenation: Analysis, Module and Applications. In: Proc. of the 25th Symposium on Fault Tolerant Computer Systems, Pasadena, California, pp. 381–390 (1995)

    Google Scholar 

  10. Knight, J.C., Sullivan, K., Elder, M.C., Wang, C.: Survivability Architectures: Issues and Approaches. In: Proc. of the DARPA Information Survivability Conference and Exposition, Los Alamitos, California, pp. 157–171 (2000)

    Google Scholar 

  11. Park, J.S., Froscher, J.N.: A Strategy for information Survivability. In: 4th IEEE/CMU/SEI Information Survivability Workshop (ISW), Vancouver, Canada, pp. 18–20 (2002)

    Google Scholar 

  12. Tai, A.T., Alkalai, L., Chau, S.N.: On-Board Preventive Maintenance for Long-Life Deep Space Missions: A Model-Based Analysis. In: Proc. of the 3rd IEEE Int. Computer Performance and Dependability Symp, pp. 166–205. IEEE CS Press, Los Alamitos (1998)

    Google Scholar 

  13. Tai, A.T., Alkalai, L., Chau, S.N.: On-Board Preventive Maintenance: A Design-Oriented Analytic Study for Long-Life Applications. Performance Evaluation 35, 215–232 (1999)

    Article  MATH  Google Scholar 

  14. Varner, P.E., Knight, J.C.: Security Monitoring, Visualization, and System Survivability, A Position Paper for ISW-2001, Information Survivability Workshorp (2001)

    Google Scholar 

  15. Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer Magazine, 54–62 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Parimala Thulasiraman Xubin He Tony Li Xu Mieso K. Denko Ruppa K. Thulasiram Laurence T. Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Win, S.T., Thein, T., Park, J.S. (2007). To Increase Survivability with Software Rejuvenation by Having Dual Base Station in WSN Environment. In: Thulasiraman, P., He, X., Xu, T.L., Denko, M.K., Thulasiram, R.K., Yang, L.T. (eds) Frontiers of High Performance Computing and Networking ISPA 2007 Workshops. ISPA 2007. Lecture Notes in Computer Science, vol 4743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74767-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74767-3_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74766-6

  • Online ISBN: 978-3-540-74767-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics