Elsevier

Computer Networks

Volume 97, 14 March 2016, Pages 113-127
Computer Networks

Distributed Data Storage Systems for Data Survivability in Wireless Sensor Networks using Decentralized Erasure Codes

https://doi.org/10.1016/j.comnet.2016.01.008Get rights and content

Abstract

Achieving reliability in Wireless Sensor Networks (WSNs) is challenging due to the limited resources available. In this study, we investigate the design of data survivability schemes using decentralized storage systems in WSNs. We propose a data storage system design based on Decentralized Erasure Codes (DEC) that features a simple and decentralized construction of the target code. The proposed framework allows sensor nodes to cooperate to build an erasure code-based storage that can tolerate a given failure/erasure rate. Code construction and decoding can both be performed randomly allowing for a distributed operation with no prior setup or coordination between source nodes. Further, we present two approaches that utilize Random Linear Network Coding (RLNC) to enhance the proposed scheme in order to achieve energy efficiency. We present the theoretical basis of the schemes then validate and evaluate their performance through simulations.

Introduction

Wireless Sensor Network (WSN) technology is being increasingly deployed in a diverse range of applications. Intelligent Transportation Systems (ITSs) [1], Smart Grids [2], and the Internet of Things (IoT) [3] are just a few examples of technologies where WSNs are used. Generally, WSNs are comprised of sensor nodes that are equipped with one or multiple sensors, a processing unit, and a wireless communication module. Sensor nodes cooperate in monitoring a phenomenon of interest and in relaying the sensed data to a sink node for processing. When produced in large numbers, sensor nodes can be extremely inexpensive, and hence they can be deployed in greater numbers to build large scale networks. WSNs have stringent constraints, especially regarding power consumption and scalability. Furthermore, reliability becomes a key requirement for WSNs when deployed in unattended applications or under harsh working conditions.

To preserve the sensed data captured by sensor nodes, WSNs nodes can benefit from using Distributed Data Storage Systems (DDSSs) technology. Data storage systems represent an essential component of today’s networks and they have been researched for a long time. Lately, data storage technology is being revisited especially in the contexts of Content Centric Networking (CCN) [4] and cloud computing [2]. DDSSs utilize hardware redundancy and data replication to protect data in case of possible failures. More specifically, given a data packet, a DDSS replicates the packet over multiple physical storage devices, such that when a subset of these devices fails, the data packet can be retrieved from the surviving ones.

In this study, our goal is to design a DDSS that is tailored for WSNs data reliability applications. For that, we first introduce the notion of data survivability as a quantitative parameter that links the amount of redundancy required to the maximum failure that can be tolerated. We then show how data survivability can be useful by implementing a data survivability scheme, called Decentralized 30 Erasure Codes for Data Survivability (DEC-DS). DEC-DS is based on Decentralized Erasure Codes (DEC) [5], [6], [7]. Besides being decentralized, DEC has a predictable algebraic structure allowing for quantifiable performance. After that, we present two methods to enhance the energy efficiency of DEC-DS by exploiting Network Coding (NC). The two schemes are referred to as DEC Encode-and-Forward (DEC-EaF) and DEC Encode-and-Disseminate (DEC-EaD). NC [8] has emerged as an information-theoretic tool and has been shown to decrease energy consumption and complexity while increasing throughput and reliability [9]. Random Linear Network Coding (RLNC) [10] has been later proposed as a practical implementation of Network Coding. In this study, we utilize RLNC to increase the efficiency of the proposed storage system by reducing communication overhead and consequently energy requirements. The main contributions of this paper are introducing the notion of data survivability and presenting the three data storage schemes, DEC-DS, DEC-EaF, and DEC-EaD.

The remainder of the paper is organized as follows. In Section 2, we present some background material and review related work. The proposed data survivability framework is discussed in Section 3. Section 4 shows two schemes using RLNC to improve the efficiency of the proposed data survivability application. Experiments and results are discussed in Section 5. Finally, Section 6 concludes the paper. Some important results from the theory of random matrices over finite fields, which will be used in designing the codes, are presented in Appendix A.

Section snippets

Background and related work

Before we discuss the proposed schemes, we present the advantages and disadvantages of replication and encoding-based storage. We then present the concept of data survivability and how it differs from network survivability. We also present an overview of Fountain Codes and DEC; and survey related literature on DDSSs in WSNs.

Decentralized Erasure Codes for Data Survivability (DEC-DS)

The design of an erasure code in a centralized setup is quite different than that in a decentralized one. The difference is illustrated in Fig. 2. In a centralized code (Fig. 2(a)), all k native data blocks are available at a single encoder. Hence, when sampling a degree d from the degree distribution ρ(k), d can be exactly matched since all k native packets are available to the encoder. In other words, if the degree sampled from the distribution is d, the encoder has all the k data packets

Routing and energy efficiency

By restricting their role to pure routing/forwarding, relay nodes are not fully utilized by existing DEC schemes when disseminating data. So, following generating a source packet, choosing a set of candidate storage nodes, and forwarding the packet by source nodes, relay nodes help forward data packets to storage nodes without manipulating them. However, based on the argument that the cost of communication is generally much higher than processing on wireless nodes, we utilize the coding

Performance evaluation

As we stated earlier, our proposed schemes target resource limited networks. Therefore, they must achieve data survivability at a reasonable energy cost. We also conjectured that data survivability can be achieved using less redundancy than required by the original DEC. In this section we show through experimentation that DEC-DS can guarantee data survivability while reducing redundancy requirements. Note that redundancy reduction impacts the energy required for data dissemination and encoding.

Conclusion

In this paper, we introduce a DDSS for data survivability in WSNs based on DEC. The framework aims at determining the amount of redundancy in both storage and data, and the maximum level of failure that can be tolerated without losing in-network data. Compared to the original DEC which aim at reducing DO, the proposed schemes target achieving data survivability. Due to the random nature of the DEC-DS scheme, it can be implemented in a decentralized manner without coordination between the sensor

Louai Al-Awami is currently an Assistant Professor at the Computer Engineering Department, at King Fahd University of Petroleum and Minerals (KFUPM), Saudi Arabia. He earned his BSc and MSc in Computer Engineering from the Computer Engineering, at KFUPM, in 2002 and 2006, and his Ph.D. from the Electrical and Computer Engineering Department at Queen’s University, Canada, respectively. He has also taught many courses and laboratories while working as a lecturer at KFUPM. His research interest

References (39)

  • Q. Wang et al.

    Dependable and secure sensor data storage with dynamic integrity assurance

    ACM Trans. Sen. Netw.

    (2011)
  • S. Katti et al.

    Xors in the air: Practical wireless network coding

    IEEE/ACM Trans. Netw.

    (2008)
  • W. Wu et al.

    Distributed mutual exclusion algorithms for intersection traffic control

    IEEE Trans. Parallel Distrib. Syst.

    (2015)
  • S. Bera et al.

    Cloud computing applications for smart grid: A survey

    IEEE Trans. Parallel Distrib. Syst.

    (2015)
  • H. Ning et al.

    Aggregated-proof based hierarchical authentication scheme for the Internet of Things

    IEEE Trans. Parallel Distrib. Syst.

    (2015)
  • Z. Ren et al.

    CCN-WSN - A lightweight, flexible content-centric networking protocol for wireless sensor networks

    Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing

    (2013)
  • A.G. Dimakis et al.

    Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes

    Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN ’05), Piscataway, NJ, USA

    (2005)
  • A. Dimakis et al.

    Distributed data storage in sensor networks using decentralized erasure codes

    Proceedings of the Thirty-eighth Asilomar Conference on Signals, Systems, and Computers

    (2004)
  • A. Dimakis et al.

    Decentralized erasure codes for distributed networked storage

    IEEE Trans. Inf. Theory

    (2006)
  • R. Ahlswede et al.

    Network information flow

    IEEE Trans. Inf. Theory

    (2000)
  • C. Fragouli et al.

    Network coding: An instant primer

    ACM SIGCOMM Comput. Commun. Rev.

    (2006)
  • S.-Y.R. Li et al.

    Linear network coding

    IEEE Trans. Inf. Theory

    (2003)
  • H. Weatherspoon et al.

    Erasure coding vs. replication: A quantitative comparison

    Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’01)

    (2002)
  • S. Acedan’ski et al.

    How good is random linear coding based distributed networked storage

    Proceedings of the First Workshop on Network Coding, Theory, and Applications (NetCod 2005)

    (2005)
  • F.A. Kuipers

    An overview of algorithms for network survivability

    ISRN Commun. Netw.

    (2012)
  • J. Xu et al.

    Enhancing survivability in virtualized data centers: A service-aware approach

    IEEE J. Sel. Areas Commun.

    (2013)
  • J.W. Byers et al.

    A digital fountain approach to reliable distribution of bulk data

    Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM ’98)

    (1998)
  • I.S. Reed et al.

    Polynomial codes over certain finite fields

    J. Soc. Ind. Appl. Math.

    (1960)
  • M. Luby

    LT codes

    Proceedings of the Forty-third IEEE Annual Symposium on Foundations of Computer Science

    (2002)
  • Cited by (20)

    • Edge deduplication for LoRaWAN using network coding

      2023, Internet of Things (Netherlands)
    • Optimal defense of a distributed data storage system against hackers’ attacks

      2020, Reliability Engineering and System Safety
      Citation Excerpt :

      They have also become commercially attractive because of their large-scale data storage ability comparing with traditional data storage systems [4,5]. Distributed data storage systems have the potential to enhance data availability since multiple copies of a same data part can be made and allocated onto different computers to provide redundancy [6,7]. They are widely used in many fields such as financial transactions, military affairs and medical areas [8].

    • Fault tolerance in cloud computing environment: A systematic survey

      2018, Computers in Industry
      Citation Excerpt :

      c) Expected Transmission Time Computation- It generates a matrix representing the communication cost between any two nodes in the network. ( d) k-out-of-n Allocation- Data is partitioned into n fragments using erasure code algorithm [78] and stored in the network such that retrieving k fragments would consume minimum energy. ( e) k-out-of-n Processing- It creates a job consisting of m tasks and schedules them on n processing nodes such that energy consumption would be minimized.

    View all citing articles on Scopus

    Louai Al-Awami is currently an Assistant Professor at the Computer Engineering Department, at King Fahd University of Petroleum and Minerals (KFUPM), Saudi Arabia. He earned his BSc and MSc in Computer Engineering from the Computer Engineering, at KFUPM, in 2002 and 2006, and his Ph.D. from the Electrical and Computer Engineering Department at Queen’s University, Canada, respectively. He has also taught many courses and laboratories while working as a lecturer at KFUPM. His research interest include Wireless Sensor Networks data reliability; distributed storage systems, Network Coding and data dissemination, and information centric networking. He is actively engaged in the IEEE member since 2002.

    Hossam S. Hassanein is a leading authority in the areas of broadband, wireless and mobile networks architecture, protocols, control and performance evaluation. His record spans more than 500 publications in journals, conferences and book chapters, in addition to numerous keynotes and plenary talks in flagship venues. He has received several recognitions and best papers awards at top international conferences. He is also the founder and director of the Telecommunications Research Lab (TRL) at Queen’s University School of Computing, with extensive international academic and industrial collaborations. He is a senior member of the IEEE, and is a former chair of the IEEE Communication Society Technical Committee on Ad hoc and Sensor Networks (TC AHSN). He is an IEEE Communications Society Distinguished Speaker (Distinguished Lecturer 2008–2010).

    View full text