Toward Resilient Wireless Sensor Networks: A Virtualized Perspective
Abstract
:1. Introduction
- We achieve the coordination of egress points (EPs) (i.e., gateways/edge routers), which perform the functionality of the IPv6 Backbone Router (6BBR) [6] as well as the DoDAG root.
- We use the Virtual DoDAG for the Fog Layer, which helps in the coordination among multiple DoDAG roots.
- We use the Fog Layer to increase scalability and help constrained devices achieve time-critical applications.
- We synchronize multiple EPs; furthermore, we ensure network services and claim that our architecture is more resilient.
2. Service Requirements
2.1. Availability
2.2. Scalability
2.3. Security
2.4. Management
2.4.1. Network Management
2.4.2. Network Security Management
3. Relevant Standards for IoT
- The wireless segment, in which devices use unreliable communication systems and are mostly resource-constrained, and
- The wired segment, where we can assume we are able to use high-speed, reliable, and secure networking technologies.
3.1. Neighbor Discovery Optimization
3.2. Network Routing
- IP-based routing: IP routing heavily depends on the type of network being considered. In the wired part, there are well-known protocols, such as RIP, OSPF, EIGRP, etc., whose resilience has been extensively studied. As a matter of fact, the resilience is in this case almost entirely dependent on the routing protocol convergence time.
- Wireless multihop networks require special routing protocols, as every node (not only the routers) actually participate in the forwarding scheme. Although many routing schemes has been proposed for multihop and ad-hoc networks, IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) [5] is a routing protocol built to fulfill the specific IoT scenarios. As a consequence, we will focus on RPL in the following discussion.
- In RPL, the network topology is oriented toward a sink (or, in RPL terms, a root node). All the paths are built to originate from the sink node, and its existence is central for the whole network (RPL enables also other kind of paths, but for the sake of brevity, we will not consider them in the present discussion). Although RPL builds redundant network paths to prevent node and link failures, and although the recovery time from network disruption is limited, the root node is a potential issue. It is possible to have multiple different RPL roots in an IoT network, but this is not usually a good solution, as it increases the network complexity and the memory requirements in the nodes.
- SDN forwarding: The SDN approach decouples the routing function from the forwarding function. In an SDN network, all the forwarding nodes only keep a forwarding table, which is built by a centralized controller. The controller creates the forwarding tables by having a complete topological knowledge of the network and possibly other data such as the switches’ queue occupancy, link resource utilization, etc.
- The SDN approach was initially proposed for wired networks, and it is now a well-known technology used in many scenarios. Due to the benefits offered by SDN, there have been several recent proposals to extend it to wireless links [12]. Nevertheless, one central requirement for SDN is to have a secure, reliable and fast link between any switching device and the SDN controller. This limitation makes its applicability in wide multi-hop networks quite problematic, if not entirely impossible.
4. Approaches to Resilience in IoT
Why Neither SDN or “Classical” Approaches Can Be the Solution (Alone)
5. Proposed Architecture
5.1. LLN Domain
5.2. Access Domain
- (1)
- A virtual 802.15.4 interface.
- (2)
- A reliable and secure link between the LLN node and the LLN root functions.
5.3. Fog Domain
5.3.1. Virtual PAN Coordinator
5.3.2. Virtual 6LBR
5.3.3. Virtual RPL Root
5.3.4. Virtual 6LoWPAN Backbone Router
5.4. Architecture Evaluation
6. Conclusions and Future Works
- Virtual DoDAG root: The RPL standard [5] has not described the detailed functionality of the VDR. There is a need to define its proper functionalities so that it can harmonize all attached DoDAG roots and their designated LLNs.
- Optimal RPL: The RPL protocol convergence time is high due to the inherent features of the distance vector and source routing (non-storing mode); in contrast, the single DoDAG root has the ability to manage thousands of constrained nodes. However, the theoretical limit on a DoDAG root has not been defined yet. Similarly, there is no limit on VDR to maintain DoDAG roots. Thus, there are imperative limits necessary on both vital devices to obtain the optimal performance of the RPL protocol.
- Multiple backbone boarder routers (BBRs): Seamless integration and proper synchronization among 6BBRs is mandatory so that they can handle and provide services to their vicinity, such as mobility, but there is a need for a mechanism for recovery in the case of 6BBR failure.
- Mobility: 6LoWPAN-ND [3] does not support mobility for inter-LoWPAN en route over networks. Although standards [4,6] support the mobility requirements for a device moving from one LLN to the next, proper network management is required among 6BBRs for the registration of lifetimes against acquired addresses.
- Anycast address: Utilization of anycast addresses in 6LoWPAN-ND and RPL is challenging and requires the synchronization between DoDAG roots and 6BBRs.
- Traffic management: The primary 6BBR was responsible for all services at a time and became a bottleneck for the entire 6LoWPAN, because secondary 6BBRs worked as a back-up support in case of primary 6BBR failure [6]. Thus, there is a need for a proper traffic management mechanism for all 6BBRs.
Author Contributions
Funding
Conflicts of Interest
References
- Stallings, W. Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud; Addison-Wesley Professional: Crawfordsville, IN, USA, 2015. [Google Scholar]
- C/LM - LAN/MAN Standards Committee. IEEE Standard for Low-Rate Wireless Networks, IEEE Std 802.15.4™-2015 (Revision of IEEE Std 802.15.4-2011); IEEE: New York, NY, USA, 2016. [Google Scholar]
- Shelby, Z.; Chakrabarti, S.; Nordmark, E.; Bormann, C. Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs). RFC 6775, November 2012. Available online: http://www.rfc-editor.org/info/rfc6775 (accessed on 1 July 2020).
- Thubert, P.; Nordmark, E.; Chakrabarti, S.; Perkins, C. Registration Extensions for IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN). Neighbor DiscoveryRFC 8505, November 2018. Available online: http://www.rfc-editor.org/info/rfc8505 (accessed on 1 July 2020).
- Winter, T.; Thubert, P.; Brandt, A.; Hui, J.; Kelsey, R.; Levis, P.; Pister, K.; Struik, R.; Vasseur, J.; Alexander, R. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550 (Proposed Standard), March 2012. Available online: http://www.rfc-editor.org/info/rfc6550 (accessed on 1 July 2020).
- Thubert, P.; Perkins, C.E.; Levy-Abegnoli, E. IPv6 Backbone Router. Internet-Draft draft-ietf-6lo-backbone-router-20, Internet Engineering Task Force, March 2020. Work in Progress. Available online: https://datatracker.ietf.org/doc/draft-ietf-6lo-backbone-router/ (accessed on 1 July 2020).
- Callon, R. The Twelve Networking Truths. RFC 1925 (Informational), April 1996. Available online: http://www.rfc-editor.org/info/rfc1925 (accessed on 1 July 2020).
- Schneier, B. The Internet of Things Is Wildly Insecure-and Often Unpatchable. 2014. Available online: https://www.wired.com/2014/01/theres-no-good-way-to-patch-the-internet- of-things-and-thats-a-huge-problem/ (accessed on 1 July 2020).
- Montenegro, G.; Kushalnagar, N.; Hui, J.; Culler, D. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944, September 2007. Available online: http://www.rfc-editor.org/info/rfc4944 (accessed on 1 July 2020).
- Hui, J.; Thubert, P. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. RFC 6282, September 2011. Available online: http://www.rfc-editor.org/info/rfc6282 (accessed on 1 July 2020).
- Narten, T.; Nordmark, E.; Simpson, W.; Soliman, H. Neighbor Discovery for IP version 6 (IPv6). RFC 4861, September 2007. Available online: http://www.rfc-editor.org/info/rfc4861 (accessed on 1 July 2020).
- Galluccio, L.; Milardo, S.; Morabito, G.; Palazzo, S. SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 513–521. [Google Scholar] [CrossRef]
- Municio, E.; Latre, S.; Marquez-Barja, J. Extending Network Programmability to the Things Overlay using Distributed Industrial IoT Protocols. IEEE Trans. Ind. Inf. 2020. [Google Scholar] [CrossRef]
- Tom, R.J.; Sankaranarayanan, S.; de Albuquerque, V.H.C.; Rodrigues, J.J.P.C. Aggregator based RPL for an IoT-fog based power distribution system with 6LoWPAN. Chin. Commun. 2020, 17, 104–117. [Google Scholar] [CrossRef]
- Al-Kaseem, B.R.; Al-Dunainawi, Y.; Al-Raweshidy, H.S. End-to-End Delay Enhancement in 6LoWPAN Testbed Using Programmable Network Concepts. IEEE Internet Things J. 2019, 6, 3070–3086. [Google Scholar] [CrossRef] [Green Version]
- Fröhlich, A.A.; Scheffel, R.M.; Kozhaya, D.; Veríssimo, P.E. Byzantine Resilient Protocol for the IoT. IEEE Internet Things J. 2019, 6, 2506–2517. [Google Scholar] [CrossRef]
- Miladinovic, I.; Schefer-Wenzl, S. NFV enabled IoT architecture for an operating room environment. In Proceedings of the IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5–8 February 2018. [Google Scholar] [CrossRef]
- Kuo, Y.; Li, C.; Jhang, J.; Lin, S. Design of a Wireless Sensor Network-Based IoT Platform for Wide Area and Heterogeneous Applications. IEEE Sens. J. 2018, 18, 5187–5197. [Google Scholar] [CrossRef]
- Froiz-Míguez, I.; Fernández-Caramés, T.M.; Fraga-Lamas, P.; Castedo, L. Design, Implementation and Practical Evaluation of an IoT Home Automation System for Fog Computing Applications Based on MQTT and ZigBee-WiFi Sensor Nodes. Sensors 2018, 18, 2660. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Kalkan, K.; Zeadally, S. Securing Internet of Things with Software Defined Networking. IEEE Commun. Mag. 2018, 56, 186–192. [Google Scholar] [CrossRef]
- Benammar, M.; Abdaoui, A.; Ahmad, S.H.; Touati, F.; Kadri, A. A Modular IoT Platform for Real-Time Indoor Air Quality Monitoring. Sensors 2018, 18, 581. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Scazzoli, D.; Mola, A.; Silverajan, B.; Magarini, M.; Verticale, G. A redundant gateway prototype for wireless avionic sensor networks. In Proceedings of the IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017. [Google Scholar] [CrossRef]
- Kamgueu, P.O.; Nataf, E.; Djotio, T. Architecture for an efficient integration of wireless sensor networks to the Internet through Internet of Things gateways. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717744735. [Google Scholar] [CrossRef]
- Lee, H.; Min, S.D.; Choi, M.H.; Lee, D. Multi-Agent System for Fault Tolerance in Wireless Sensor Networks. Ksii Trans. Internet Inf. Syst. 2016. [Google Scholar] [CrossRef] [Green Version]
- Gonzalez, C.; Charfadine, S.M.; Flauzac, O.; Nolot, F. SDN-based security framework for the IoT in distributed grid. In Proceedings of the International Multidisciplinary Conference on Computer and Energy Science (SpliTech), Split, Croatia, 13–15 July 2016. [Google Scholar] [CrossRef]
- Lounis, A.; Hadjidj, A.; Bouabdallah, A.; Challal, Y. Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Future Gener. Comput. Syst. 2016, 55, 266–277. [Google Scholar] [CrossRef] [Green Version]
- Khan, I.; Belqasmi, F.; Glitho, R.; Crespi, N.; Morrow, M.; Polakos, P. Wireless sensor network virtualization: early architecture and research perspectives. IEEE Netw. 2015, 29, 104–112. [Google Scholar] [CrossRef] [Green Version]
- Singh, D.; Tripathi, G.; Jara, A. Secure layers based architecture for Internet of Things. In Proceedings of the IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 14–16 December 2015; pp. 321–326. [Google Scholar] [CrossRef]
- Luo, B.; Tang, S.; Sun, Z. Research of neighbor discovery for IPv6 over low-power wireless personal area networks. In Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE), Taipei, Taiwan, 19–20 August 2015. [Google Scholar] [CrossRef] [Green Version]
- Negash, B.; Rahmani, A.M.; Westerlund, T.; Liljeberg, P.; Tenhunen, H. LISA: Lightweight Internet of Things Service Bus Architecture. Procedia Comput. Sci. 2015, 52, 436–443. [Google Scholar] [CrossRef]
- Gia, T.N.; Rahmani, A.; Westerlund, T.; Liljeberg, P.; Tenhunen, H. Fault tolerant and scalable IoT-based architecture for health monitoring. In Proceedings of the 2015 IEEE Sensors Applications Symposium (SAS), Zadar, Croatia, 13–15 April 2015. [Google Scholar] [CrossRef]
- Luo, B.; Sun, Z. Enabling End-to-End Communication Between Wireless Sensor Networks and the Internet Based on 6LoWPAN. Chin. J. Electron. 2015, 24, 633–638. [Google Scholar] [CrossRef]
- Watteyne, T.; Thubert, P. Efficient 6LoWPAN Neighbor Discovery applied to Multilink IoT subnets. In Proceedings of the IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015. [Google Scholar] [CrossRef]
- Catarinucci, L.; de Donno, D.; Mainetti, L.; Palano, L.; Patrono, L.; Stefanizzi, M.L.; Tarricone, L. An IoT-Aware Architecture for Smart Healthcare Systems. IEEE Internet Things J. 2015, 2, 515–526. [Google Scholar] [CrossRef]
- Xua, R.; Yang, S.; Ping, Li.; Cao, J. IoT architecture design for 6LoWPAN enabled Federated Sensor Network. In Proceedings of the 11th World Congress on Intelligent Control and Automation, Shenyang, China, 29 June–4 July 2014. [Google Scholar] [CrossRef]
- Molina, B.; Palau, C.E.; Fortino, G.; Guerrieri, A.; Savaglio, C. Empowering smart cities through interoperable Sensor Network Enablers. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC), San Diego, CA, USA, 5–8 October 2014. [Google Scholar] [CrossRef]
- Ha, M.; Kwon, K.; Kim, D.; Kong, P. Dynamic and Distributed Load Balancing Scheme in Multi-gateway Based 6LoWPAN. In Proceedings of the IEEE International Conference on Internet of Things (iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), Taipei, Taiwan, 1–3 September 2014. [Google Scholar] [CrossRef]
- Cecchinel, C.; Jimenez, M.; Mosser, S.; Riveill, M. An Architecture to Support the Collection of Big Data in the Internet of Things. In Proceedings of the IEEE World Congress on Services, Anchorage, AK, USA, 27 June–2 July 2014. [Google Scholar] [CrossRef] [Green Version]
- Deru, L.; Dawans, S.; Ocaña, M.; Quoitin, B.; Bonaventure, O. Redundant border routers for mission-critical 6lowpan networks. In Real-World Wireless Sensor Networks; Springer: Como, Italy, 2014. [Google Scholar] [CrossRef] [Green Version]
- Scott-Hayward, S.; Natarajan, S.; Sezer, S. A Survey of Security in Software Defined Networks. IEEE Commun. Surv. Tutor. 2016, 18, 623–654. [Google Scholar] [CrossRef]
- Brandes, U.; Pich, C. Centrality estimation in large networks. Int. J. Bifurcation Chaos 2007, 17, 2303–2318. [Google Scholar] [CrossRef]
- Nizzi, F.; Pecorella, T.; Esposito, F.; Pierucci, L.; Fantacci, R. IoT Security via Address Shuffling: the Easy Way. IEEE Internet Things J. 2019, 6, 3764–3774. [Google Scholar] [CrossRef] [Green Version]
- Vasseur, J.; Kim, M.; Pister, K.; Dejean, N.; Barthel, D. Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks. RFC 6551, March 2012. Available online: http://www.rfc-editor.org/info/rfc6551 (accessed on 1 July 2020).
Paper | Year | Contribution | Av | Sc | Se | Ma | SPoF |
---|---|---|---|---|---|---|---|
[13] | 2020 | A central control that jointly manages end-to-end, both the wired segments and the Industrial IoT domain. | ○ | ◐ | ○ | ◐ | ○ |
[14] | 2020 | An aggregator based RPL for an IoT-Fog based power distribution system with 6LoWPAN. | ◐ | ● | ○ | ◐ | ◐ |
[15] | 2019 | SD-NFV based architecture to reduce the end-to-end delay and strengthen energy depletion in motes. | ○ | ○ | ○ | ◐ | ○ |
[16] | 2019 | Provide multi-gateway synchronization protocol ByzCast to increase data availability and improves fault and intrusion tolerance in WSNs. | ◐ | ◐ | ● | ◐ | ● |
[17] | 2018 | NFV based Operating room Innovation Center (OPIC) to investigate time and non-time critical applications. | ◐ | ◐ | ○ | ◐ | ◐ |
[18] | 2018 | Provide synchronization scheme for multiple gateways to increase network capacity and proposed a scheme to reduce the energy waste and TSCH enhancement. | ◐ | ● | ○ | ◐ | ◐ |
[19] | 2018 | Provide interoperability in home automation system for Fog computing applications based on MQTT and ZigBee-WiFi Sensor Nodes. | ○ | ◐ | ○ | ◐ | ○ |
[20] | 2018 | A role based security controller architecture to strengthen the security of IoT. | ○ | ○ | ● | ◐ | ○ |
[21] | 2018 | An end-to-end indoor air quality monitoring (IAQM) system provide interoperability and backup support in case of connection failure IP or radio. | ◐ | ◐ | ○ | ◐ | ○ |
[22] | 2017 | Provide synchronization algorithm for multiple gateways to increase the availability and reliability of critical applications. | ◐ | ◐ | ○ | ◐ | ◐ |
[23] | 2017 | Cost effective scheme for the selection of gateways and adaptation mechanism is used to increase the system capacity to cope dynamic change. | ◐ | ○ | ○ | ◐ | ○ |
[24] | 2016 | Provide energy-efficient services, fault tolerance, load balancing and resource management. | ◐ | ◐ | ◐ | ● | ○ |
[25] | 2016 | An hierarchical SDN approach provide security and handle communications between clusters by an SDN cluster head managed by an SDN controller. | ◐ | ● | ◐ | ● | ◐ |
[26] | 2016 | Cloud-based security architecture for medical WSNs, where Access Control supports complex and dynamic security policies. | ○ | ◐ | ◐ | ◐ | ○ |
[27] | 2015 | Overly architecture for WSN based fire monitoring system that relies on a constrained application protocol, where a single WSN is shared by multiple applications. | ○ | ◐ | ○ | ◐ | ○ |
[28] | 2015 | Secured cross layer architecture for IoT to improve security management by Adaptive Interface Translation Table (AITT). | ◐ | ○ | ● | ◐ | ○ |
[29] | 2015 | A new scheme that provide address configuration and context management and their distribution in 6LoWPAN-based architecture. | ◐ | ◐ | ○ | ◐ | ○ |
[30] | 2015 | Architecture facilitate interoperability, support low power operations, offers service discovery, registration and authentication mechanisms for IoT. | ○ | ◐ | ◐ | ◐ | ○ |
[31] | 2015 | Provide a mechanism for fault tolerance at gateway and provide traffic management to avoid gateway being a bottleneck. | ○ | ◐ | ○ | ◐ | ○ |
[32] | 2015 | A new design of gateway with the integration of 6LoWPAN adapter layer in a Network Adapter Driver (NAD) of computer. | ○ | ○ | ○ | ◐ | ○ |
[12] | 2015 | A stateful approach to make programmable sensor nodes by reducing the amount of information exchanged between sensors and SDN controllers. | ○ | ◐ | ○ | ◐ | ○ |
[33] | 2015 | Efficient-Neighbor Discovery that advertise reachability to a registered addresses and BBR solve the problem of node mobility. | ○ | ◐ | ○ | ◐ | ○ |
[34] | 2015 | An automatic monitoring and tracking system for patients, biomedical devices within hospitals, that provide visibility of the motes and perform information management. | ○ | ○ | ○ | ◐ | ○ |
[35] | 2014 | Analyzed different solutions for the integration of WSNs and Internet and provide Gateway solution for localization and tracking application. | ○ | ○ | ○ | ◐ | ○ |
[36] | 2014 | A model for an Area Sensor Network (ASN) that connects heterogeneous networks and provide interoperability & scalability. | ○ | ● | ○ | ◐ | ○ |
[37] | 2014 | Provide dynamic and distributed load balancing scheme for multiple gateways to achieve global load fairness, network capacity, and reliability. | ◐ | ◐ | ○ | ◐ | ◐ |
[38] | 2014 | Architecture for smart campuses and focused on data collection from sensors and its storage in the Cloud. | ○ | ◐ | ○ | ◐ | ○ |
[39] | 2014 | Architecture based on multiple GWs and improve ND proxy, routing support, mobility and reliability for data delivery in 6LoWPANs. | ● | ◐ | ○ | ● | ◐ |
Parameter Type | Value |
---|---|
Radio Range | About 100 m |
802.15.4 | Beaconless, always on |
Propagation Model | Log-Distance |
6LoWPAN Compression | IPHC - RFC 6282 |
RPL Constants | as per RFC 6550 |
Root | Sensor Nodes | ||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Time [s] | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 |
1 | 1 | - | - | 2 | - | - | - | - | - | - | - | 2 | - | - | 2 | - | - | - | - | - | - |
2 | 1 | 4 | - | 2 | 4 | 5 | 3 | 3 | 4 | - | 3 | 2 | - | - | 2 | 4 | 3 | 4 | 5 | - | - |
3 | 1 | 4 | - | 2 | 4 | 5 | 3 | 3 | 4 | - | 3 | 2 | - | - | 2 | 4 | 3 | 4 | 5 | - | - |
4 | 1 | 4 | - | 2 | 4 | 5 | 3 | 3 | 4 | - | 3 | 2 | - | 4 | 2 | 4 | 3 | 4 | 5 | - | - |
5 | 1 | 4 | - | 2 | 4 | 5 | 3 | 3 | 4 | - | 3 | 2 | - | 4 | 2 | 4 | 3 | 4 | 5 | - | - |
6 | 1 | 4 | - | 2 | 4 | 5 | 3 | 3 | 4 | 5 | 3 | 2 | - | 4 | 2 | 4 | 3 | 4 | 5 | - | - |
7 | 1 | 4 | - | 2 | 4 | 5 | 3 | 3 | 4 | 5 | 3 | 2 | - | 4 | 2 | 4 | 3 | 4 | 5 | - | - |
8 | 1 | 4 | - | 2 | 4 | 5 | 3 | 3 | 4 | 5 | 3 | 2 | - | 4 | 2 | 4 | 3 | 4 | 5 | - | - |
9 | 1 | 4 | 6 | 2 | 4 | 5 | 3 | 3 | 4 | 5 | 3 | 2 | 5 | 4 | 2 | 4 | 3 | 4 | 5 | 4 | 5 |
10 | 1 | 4 | 5 | 2 | 4 | 5 | 3 | 3 | 4 | 5 | 3 | 2 | 5 | 4 | 2 | 4 | 3 | 4 | 5 | 4 | 5 |
11 | 1 | 4 | 5 | 2 | 4 | 5 | 3 | 3 | 4 | 5 | 3 | 2 | 5 | 4 | 2 | 4 | 3 | 4 | 5 | 4 | 5 |
12 | 1 | 4 | 5 | 2 | 4 | 5 | 3 | 3 | 4 | 5 | 3 | 2 | 5 | 4 | 2 | 4 | 3 | 4 | 5 | 4 | 5 |
13 | 1 | 4 | 5 | 2 | 4 | 5 | 3 | 3 | 4 | 5 | 3 | 2 | 5 | 4 | 2 | 4 | 3 | 4 | 5 | 4 | 5 |
14 | 1 | 4 | 5 | 2 | 4 | 5 | 3 | 3 | 4 | 5 | 3 | 2 | 5 | 4 | 2 | 4 | 3 | 4 | 5 | 4 | 5 |
15 | 1 | 4 | 5 | 2 | 4 | 5 | 3 | 3 | 4 | 5 | 3 | 2 | 5 | 4 | 2 | 4 | 3 | 4 | 5 | 4 | 5 |
Root Node is Attacked | |||||||||||||||||||||
16 | 1 | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - |
17 | 1 | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - |
18 | 1 | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - |
Root | Sensor Nodes | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Time [s] | NFV | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 |
1 | 1 | 2 | 2 | 2 | - | - | - | - | - | 3 | - | - | 3 | - | - | 3 | 3 | - | 3 | - | - | - |
2 | 1 | 2 | 2 | 2 | 3 | - | 3 | - | - | 3 | - | - | 3 | - | - | 3 | 3 | - | 3 | - | - | - |
3 | 1 | 2 | 2 | 2 | 3 | - | 3 | 4 | - | 3 | 5 | 4 | 3 | - | 4 | 3 | 3 | 4 | 3 | 3 | 4 | - |
4 | 1 | 2 | 2 | 2 | 3 | - | 3 | 4 | - | 3 | 5 | 4 | 3 | - | 4 | 3 | 3 | 4 | 3 | 3 | 4 | - |
5 | 1 | 2 | 2 | 2 | 3 | - | 3 | 4 | - | 3 | 5 | 4 | 3 | - | 4 | 3 | 3 | 4 | 3 | 3 | 4 | - |
6 | 1 | 2 | 2 | 2 | 3 | - | 3 | 4 | - | 3 | 5 | 4 | 3 | - | 4 | 3 | 3 | 4 | 3 | 3 | 4 | - |
7 | 1 | 2 | 2 | 2 | 3 | 4 | 3 | 4 | - | 3 | 5 | 4 | 3 | - | 4 | 3 | 3 | 4 | 3 | 3 | 4 | 5 |
8 | 1 | 2 | 2 | 2 | 3 | 3 | 3 | 4 | - | 3 | 5 | 4 | 3 | - | 4 | 3 | 3 | 4 | 3 | 3 | 4 | 4 |
9 | 1 | 2 | 2 | 2 | 3 | 3 | 3 | 4 | 3 | 3 | 5 | 4 | 3 | - | 4 | 3 | 3 | 4 | 3 | 3 | 4 | 4 |
10 | 1 | 2 | 2 | 2 | 3 | 3 | 3 | 4 | 3 | 3 | 5 | 4 | 3 | - | 4 | 3 | 3 | 4 | 3 | 3 | 4 | 4 |
11 | 1 | 2 | 2 | 2 | 3 | 3 | 3 | 4 | 3 | 3 | 5 | 4 | 3 | 5 | 4 | 3 | 3 | 4 | 3 | 3 | 4 | 4 |
12 | 1 | 2 | 2 | 2 | 3 | 3 | 3 | 4 | 3 | 3 | 5 | 4 | 3 | 5 | 4 | 3 | 3 | 4 | 3 | 3 | 4 | 4 |
13 | 1 | 2 | 2 | 2 | 3 | 3 | 3 | 4 | 3 | 3 | 5 | 4 | 3 | 5 | 4 | 3 | 3 | 4 | 3 | 3 | 4 | 4 |
14 | 1 | 2 | 2 | 2 | 3 | 3 | 3 | 4 | 3 | 3 | 5 | 4 | 3 | 5 | 4 | 3 | 3 | 4 | 3 | 3 | 4 | 4 |
15 | 1 | 2 | 2 | 2 | 3 | 3 | 3 | 4 | 3 | 3 | 5 | 4 | 3 | 5 | 4 | 3 | 3 | 4 | 3 | 3 | 4 | 4 |
EP 2 is Attacked | ||||||||||||||||||||||
16 | 1 | 2 | 2 | 2 | 3 | - | - | - | - | - | - | 4 | - | - | - | - | - | - | 3 | - | - | - |
17 | 1 | 2 | 2 | 2 | 3 | - | - | - | - | - | 5 | 4 | - | - | 4 | - | - | - | 3 | - | 6 | - |
18 | 1 | 2 | 2 | 2 | 3 | - | - | - | - | - | 5 | 4 | 3 | - | 4 | - | - | - | 3 | - | 6 | - |
19 | 1 | 2 | 2 | 2 | 3 | 5 | 3 | - | 3 | - | 5 | 4 | 3 | - | 4 | - | 5 | 4 | 3 | - | 6 | - |
20 | 1 | 2 | 2 | 2 | 3 | 5 | 3 | - | 3 | - | 5 | 4 | 3 | 6 | 4 | - | 5 | 4 | 3 | - | 6 | - |
21 | 1 | 2 | 2 | 2 | 3 | 5 | 3 | - | 3 | - | 5 | 4 | 3 | 6 | 4 | - | 5 | 4 | 3 | - | 6 | - |
22 | 1 | 2 | 2 | 2 | 3 | 5 | 3 | - | 3 | 6 | 5 | 4 | 3 | 6 | 4 | 4 | 5 | 4 | 3 | 7 | 6 | 4 |
23 | 1 | 2 | 2 | 2 | 3 | 5 | 3 | 4 | 3 | 5 | 5 | 4 | 3 | 6 | 4 | 4 | 5 | 4 | 3 | 6 | 5 | 4 |
24 | 1 | 2 | 2 | 2 | 3 | 5 | 3 | 4 | 3 | 5 | 5 | 4 | 3 | 6 | 4 | 3 | 5 | 4 | 3 | 6 | 5 | 4 |
25 | 1 | 2 | 2 | 2 | 3 | 5 | 3 | 4 | 3 | 5 | 5 | 4 | 3 | 6 | 4 | 3 | 5 | 4 | 3 | 6 | 5 | 4 |
26 | 1 | 2 | 2 | 2 | 3 | 5 | 3 | 4 | 3 | 5 | 5 | 4 | 3 | 6 | 4 | 3 | 5 | 4 | 3 | 6 | 5 | 4 |
27 | 1 | 2 | 2 | 2 | 3 | 5 | 3 | 4 | 3 | 5 | 5 | 4 | 3 | 6 | 4 | 3 | 5 | 4 | 3 | 6 | 5 | 4 |
28 | 1 | 2 | 2 | 2 | 3 | 5 | 3 | 4 | 3 | 5 | 5 | 4 | 3 | 6 | 4 | 3 | 5 | 4 | 3 | 6 | 5 | 4 |
29 | 1 | 2 | 2 | 2 | 3 | 5 | 3 | 4 | 3 | 5 | 5 | 4 | 3 | 6 | 4 | 3 | 5 | 4 | 3 | 6 | 5 | 4 |
30 | 1 | 2 | 2 | 2 | 3 | 5 | 3 | 4 | 3 | 5 | 5 | 4 | 3 | 6 | 4 | 3 | 5 | 4 | 3 | 6 | 5 | 4 |
EPs 1 and 2 are Attacked | ||||||||||||||||||||||
31 | 1 | 2 | 2 | 2 | - | - | - | - | - | - | - | - | 3 | - | - | 3 | - | - | - | - | - | - |
32 | 1 | 2 | 2 | 2 | 3 | - | - | - | - | - | - | 4 | 3 | - | - | 3 | - | - | 5 | - | - | - |
33 | 1 | 2 | 2 | 2 | 3 | - | - | 4 | - | - | - | 4 | 3 | - | - | 3 | - | - | 5 | - | - | - |
34 | 1 | 2 | 2 | 2 | 3 | - | 6 | 4 | 4 | - | 6 | 4 | 3 | - | 5 | 3 | - | - | 5 | - | 5 | - |
35 | 1 | 2 | 2 | 2 | 3 | - | 6 | 4 | 4 | - | 6 | 4 | 3 | - | 5 | 3 | - | - | 5 | - | 5 | - |
36 | 1 | 2 | 2 | 2 | 3 | - | 6 | 4 | 4 | - | 6 | 4 | 3 | - | 5 | 3 | - | - | 5 | - | 5 | - |
37 | 1 | 2 | 2 | 2 | 3 | 5 | 6 | 4 | 4 | - | 6 | 4 | 3 | - | 5 | 3 | - | 4 | 5 | - | 5 | - |
38 | 1 | 2 | 2 | 2 | 3 | 5 | 6 | 4 | 4 | 6 | 6 | 4 | 3 | 6 | 5 | 3 | 5 | 4 | 5 | 7 | 5 | 6 |
39 | 1 | 2 | 2 | 2 | 3 | 5 | 6 | 4 | 4 | 6 | 6 | 4 | 3 | 6 | 5 | 3 | 5 | 4 | 5 | 7 | 5 | 6 |
40 | 1 | 2 | 2 | 2 | 3 | 5 | 6 | 4 | 4 | 5 | 6 | 4 | 3 | 6 | 5 | 3 | 5 | 4 | 5 | 6 | 5 | 6 |
41 | 1 | 2 | 2 | 2 | 3 | 5 | 6 | 4 | 4 | 5 | 6 | 4 | 3 | 6 | 5 | 3 | 5 | 4 | 5 | 6 | 5 | 6 |
42 | 1 | 2 | 2 | 2 | 3 | 5 | 6 | 4 | 4 | 5 | 6 | 4 | 3 | 6 | 5 | 3 | 5 | 4 | 5 | 6 | 5 | 6 |
43 | 1 | 2 | 2 | 2 | 3 | 5 | 6 | 4 | 4 | 5 | 6 | 4 | 3 | 6 | 5 | 3 | 5 | 4 | 5 | 6 | 5 | 6 |
44 | 1 | 2 | 2 | 2 | 3 | 5 | 6 | 4 | 4 | 5 | 6 | 4 | 3 | 6 | 5 | 3 | 5 | 4 | 5 | 6 | 5 | 6 |
45 | 1 | 2 | 2 | 2 | 3 | 5 | 6 | 4 | 4 | 5 | 6 | 4 | 3 | 6 | 5 | 3 | 5 | 4 | 5 | 6 | 5 | 6 |
EPs 0, 1, and 2 are Attacked | ||||||||||||||||||||||
46 | 1 | 2 | 2 | 2 | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - |
47 | 1 | 2 | 2 | 2 | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - | - |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Rashid, A.; Pecorella, T.; Chiti, F. Toward Resilient Wireless Sensor Networks: A Virtualized Perspective. Sensors 2020, 20, 3902. https://doi.org/10.3390/s20143902
Rashid A, Pecorella T, Chiti F. Toward Resilient Wireless Sensor Networks: A Virtualized Perspective. Sensors. 2020; 20(14):3902. https://doi.org/10.3390/s20143902
Chicago/Turabian StyleRashid, Adnan, Tommaso Pecorella, and Francesco Chiti. 2020. "Toward Resilient Wireless Sensor Networks: A Virtualized Perspective" Sensors 20, no. 14: 3902. https://doi.org/10.3390/s20143902
APA StyleRashid, A., Pecorella, T., & Chiti, F. (2020). Toward Resilient Wireless Sensor Networks: A Virtualized Perspective. Sensors, 20(14), 3902. https://doi.org/10.3390/s20143902