skip to main content
10.1145/1860093.1860117acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Data preservation under spatial failures in sensor networks

Published:20 September 2010Publication History

ABSTRACT

In this paper, we address the problem of preserving generated data in a sensor network in case of node failures. We focus on the type of node failures that have explicit spatial shapes such as circles or rectangles (e.g., modeling a bomb attack or a river overflow). We consider two different schemes for introducing redundancy in the network, by simply replicating data or by using erasure codes, with the objective to minimize the communication cost incurred to build such data redundancy. We prove that the problem is NP-hard using either replication or coding. We design Oα-approximation centralized and distributed algorithms for the two redundancy schemes, where α is the "fatness" of the potential node failure events. Using erasure codes, data distribution can be handled in an efficient distributed manner. Simulation results show that by exploiting the spatial properties of the node failure patterns, one can substantially reduce the communication cost compared to the resilient data storage schemes in the prior literature.

References

  1. }}Acedanski, S., Deb, S., Medard, M., and Koetter., R. How good is random linear coding based distributed networked storage. In Proceedings of the IEEE International Symposium on Network Coding (NetCod)(2005).Google ScholarGoogle Scholar
  2. }}Aly, S. A., Kong, Z., and Soljanin, E. Fountain codes based distributed storage algorithms for large scale wireless sensor networks. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN) (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. }}Bollobas, B. Modern graph theory. Springer, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  4. }}Bollobas, B. Random graphs. Cambridge University Press, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  5. }}Bondy, J., and Murty, U. Graph theory. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}Cook, W., and Rohe, A. Computing minimum weight perfect matchings. INFORMS Journal on Computing (JOC)(1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}Dimakis, A., Prabhakaran, V., and Ramchandran, K. Decentralized erasure codes for distributed networked storage. IEEE/ACM Transactions on Networking (2006).Google ScholarGoogle Scholar
  8. }}Garey, M. R., and Johnson, D. S. Computers and Intractability: A Guide to NP-Completeness. W. H. Freeman & Co., New York, NY, USA, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. }}Ibe, O. C. Fundamentals of applied probability and random processes. Academic Press, 2005.Google ScholarGoogle Scholar
  10. }}Kahn, J., Katz, R., and Pister, K. Next century challenges: Mobile networking for smart dust. In Proceedings of The International Conference on Mobile Computing and Networking (MobiCom) (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. }}Kamra, A., Misra, V., Feldman, J., and Ruben stein, D. Growth codes: maximizing sensor network data persistence. SIGCOMM Comput. Commun. Rev. 36, 4 (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. }}Kuhn, F., Wattenhofer, R., and Zollinger, A. Ad hoc networks beyond unit disk graphs. Wireless Networks 14, 5 (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. }}Lin, Y., Liang, B., and Li, B. Data persistence in large-scale sensor networks with decentralized fountain codes. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM) (2007).Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}Lin, Y., Liang, B., and Li, B. Geometric random linear codes in sensor networks. In Proceedings of the International Communications Conference (ICC) (2008).Google ScholarGoogle ScholarCross RefCross Ref
  15. }}Navas, J. C., and Imielinski, T. Geocast: geographic addressing and routing. In Proceedings of The International Conference on Mobile Computing and Networking (MobiCom)(1997). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Data preservation under spatial failures in sensor networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiHoc '10: Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
        September 2010
        272 pages
        ISBN:9781450301831
        DOI:10.1145/1860093

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 September 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate296of1,843submissions,16%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader