USING PROVENANCE IN SENSOR NETWORK APPLICATIONS FOR FAULT-TOLERANCE AND TROUBLESHOOTING - Position Paper

Gulustan Dogan, Theodore Brown

Abstract

Provenance is a rapidly progressing new field with many open research problems. Being related to data and processes, provenance research is at the cross-roads of research from several research communities. With the huge amount of information and processes available in sensor networks, provenance becomes crucial for understanding the creation, manipulation and quality of data and processes in this domain too. Sensors collaboratively carry out sensing tasks and forward their data to the closest data processing center, which may further forward it. Provenance provides the means to record the data flow and manipulate snapshots of the network. Consequently given enough data, provenance can be used in sensor network applications to find out causes of faulty behavior, to figure out the circumstances that will affect the performance of the sensor network, to produce trustworthy data after elimination of the causes, etc. In this position paper, we describe provenance work in the sensor network community to sketch a panoramic view of the recent research and give a provenance model of a binary target localization sensor network as a real life example to show how provenance can be used in sensor network applications for fault-tolerance and troubleshooting.

References

  1. Bal, M., Shen, W., and Ghenniwa, H. (2010). Collaborative signal and information processing in wireless sensor networks: a review. In 2009 IEEE International Conference on Systems, Man, and Cybernetics, pages 3240-3245.
  2. Barseghian, D., Altintas, I., Jones, M., Crawl, D., Potter, N., Gallagher, J., Cornillon, P., Schildhauer, M., Borer, E., and Seabloom, E. (2010). Workflows and extensions to the kepler scientific workflow system to support environmental sensor data access and analysis. Ecological Informatics, 5(1):42-50.
  3. Buneman, P. and Tan, W. (2007). Provenance in databases. In Proceedings of the 2007 ACM SIGMOD international conference on Management of data, pages 1171-1173. ACM.
  4. Cheney, J. (2010). Causality and the semantics of provenance. Arxiv preprint arXiv:1004.3241.
  5. Cheney, J., Chiticariu, L., and Tan, W. (2009). Provenance in databases: Why, how, and where. Foundations and Trends in Databases, 1(4):379-474.
  6. Crawl, D. and Altintas, I. (2008). A provenance-based fault tolerance mechanism for scientific workflows. International Provenance and Annotation Workshop (IPAW).
  7. Cui, Y., Widom, J., and Wiener, J. (2000). Tracing the lineage of view data in a warehousing environment. ACM Transactions on Database Systems (TODS), 25(2):179-227.
  8. Davidson, S. and Freire, J. (2008a). Provenance and scientific workflows: challenges and opportunities. In SIGMOD Conference, pages 1345-1350. Citeseer.
  9. Davidson, S. and Freire, J. (2008b). Provenance and scientific workflows: challenges and opportunities. In SIGMOD Conference, pages 1345-1350. Citeseer.
  10. Dogan, G., Brown, T., Govindan, K., Khan, M., Abdelzaher, T., Mohapatra, P., and Cho, J. (2011). Evaluation of network trust using provenance based on distributed local intelligence. MILCOM.
  11. Feng, T. and Lee, E. (2008). Real-time distributed discreteevent execution with fault tolerance. In IEEE RealTime and Embedded Technology and Applications Symposium, pages 205-214. IEEE.
  12. Freire, J., Koop, D., Santos, E., and Silva, C. (2008). Provenance for computational tasks: A survey. Computing in Science & Engineering, 10(3):11-21.
  13. Govindan, K., X., W., Khan, M., Dogan, G., Zeng, K. Powell, G., Brown, T., Abdelzaher, T., and Mohapatra, P. (2011). Pronet: Network trust assessment based on incomplete provenance. MILCOM.
  14. Khan, M., Abdelzaher, T., Han, J., and Ahmadi, H. (2009). Finding symbolic bug patterns in sensor networks. Distributed Computing in Sensor Systems, pages 131- 144.
  15. Le, Q. and Kaplan, L. (2010). Target localization using proximity binary sensors. In Aerospace Conference, 2010 IEEE, pages 1-8. IEEE.
  16. Ledlie, J., Ng, C., and Holland, D. (2005). Provenanceaware sensor data storage. IEEE Computer Society.
  17. Moreau, L. and Ludascher, B. (2007). The first provenance challenge. Concurrency and Computation: Practice and Experience.
  18. Moreau, L., Ludascher, B., Altintas, I., Barga, R., Bowers, S., Callahan, S., Chin, J., Clifford, B., Cohen, S., Cohen-Boulakia, S., et al. (2008). Special issue: The first provenance challenge. Concurrency and Computation: Practice and Experience, 20(5):409-418.
  19. Muniswamy-Reddy, K.-K. (2010). Foundations for Provenance-Aware Systems. PhD thesis, Harvard University, Massachusetts.
  20. Park, U. and Heidemann, J. (2008a). Provenance in sensornet republishing. Provenance and Annotation of Data and Processes, pages 280-292.
  21. Park, U. and Heidemann, J. (2008b). Provenance in sensornet republishing. In Freire, J., Koop, D., and Moreau, L., editors, Provenance and Annotation of Data and Processes, volume 5272 of Lecture Notes in Computer Science, pages 280-292. Springer Berlin / Heidelberg.
  22. Patni, H., Sahoo, S., Henson, C., and Sheth, A. (2010). Provenance Aware Linked Sensor Data. In 2nd Workshop on Trust and Privacy on the Social and Semantic Web, Co-located with ESWC2010, Heraklion Greece.
  23. Sabelfeld, A. and Myers, A. C. (2003). Language-based information-flow security. IEEE Journal on Selected Areas in Communications, 21.
  24. Stephan, E., Halter, T., and Ermold, B. (2010). Leveraging The Open Provenance Model as a Multi-Tier Model for Global Climate Research. In Proc. of 3rd International Provenance and Annotation Workshop (IPAW10), Troy, NY.
  25. Tan, W.-C. (2007). Provenance in databases : Past, current, and future. IEEE Data Engineering Bulletin, 30:”3- 12”.
  26. Tilak, S., Chiu, K., Abu-Ghazaleh, N., and Fountain, T. (2005). Dynamic resource discovery for sensor networks. Embedded and Ubiquitous Computing, pages 785-796.
  27. Wynbourne, M., Austin, M., Palmer, C., on Homeland Security, U. S. C. S. C., and Affairs, G. (2009). National Cyber Security Research and Development Challenges Related to Economics, Physical Infrastructure and Human Behavior: An Industry, Academic and Government Perspective. Institute for Information Infrastructure Protection.
  28. Zahedi, S., Szczodrak, M., Ji, P., Mylaraswamy, D., Srivastava, M., and Young, R. (2008). Tiered architecture for on-line detection, isolation and repair of faults in wireless sensor networks. In Military Communications Conference, 2008. MILCOM 2008. IEEE, pages 1-7. IEEE.
Download


Paper Citation


in Harvard Style

Dogan G. and Brown T. (2012). USING PROVENANCE IN SENSOR NETWORK APPLICATIONS FOR FAULT-TOLERANCE AND TROUBLESHOOTING - Position Paper . In Proceedings of the 1st International Conference on Sensor Networks - Volume 1: SENSORNETS, ISBN 978-989-8565-01-3, pages 47-52. DOI: 10.5220/0003803300470052


in Bibtex Style

@conference{sensornets12,
author={Gulustan Dogan and Theodore Brown},
title={USING PROVENANCE IN SENSOR NETWORK APPLICATIONS FOR FAULT-TOLERANCE AND TROUBLESHOOTING - Position Paper},
booktitle={Proceedings of the 1st International Conference on Sensor Networks - Volume 1: SENSORNETS,},
year={2012},
pages={47-52},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003803300470052},
isbn={978-989-8565-01-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Sensor Networks - Volume 1: SENSORNETS,
TI - USING PROVENANCE IN SENSOR NETWORK APPLICATIONS FOR FAULT-TOLERANCE AND TROUBLESHOOTING - Position Paper
SN - 978-989-8565-01-3
AU - Dogan G.
AU - Brown T.
PY - 2012
SP - 47
EP - 52
DO - 10.5220/0003803300470052