Handling Memory Corruption Faults In Sensor Networks

نویسندگان

  • Ram Kumar
  • Florin Sultan
  • Kiran Nagaraja
  • Srimat Chakradhar
  • Mani Srivastava
چکیده

Typical sensor nodes use resource constrained micro-controllers where user level applications, operating system components, device drivers, etc., reside within a single address space with no form of memory protection. A programming error in an application can easily corrupt the state of the operating system and other software components on the node. To protect against such errors, we propose a two tier software scheme that achieves: (i) coarse grained memory protection of the operating system state, and (ii) fine grained detection of memory corruption and subsequent recovery of application components. Coarse grained memory protection is provided by creating and enforcing an application fault domain that restricts the memory accesses made by an application to a portion of the address space. The operating system state is stored outside the application fault domain and is therefore protected from memory corruption. Fine grained memory corruption detection and recovery is provided within the application fault domain. Memory corruption faults are detected by a run-time integrity verifier. The associated recovery mechanism restarts only the affected application module thereby achieving a low recovery time. We have implemented our scheme in the SOS operating system and tested it on a network of MicaZ nodes. Our evaluation shows that the scheme effectively handles memory corruption faults while having negligible impact on the performance and lifetime of real sensor network systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Routing Hole Handling Techniques for Wireless Sensor Networks: A Review

A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensi...

متن کامل

Stabilizing inter-domain routing in the Internet

This paper reports the first self-stabilizing Border Gateway Protocol (BGP). BGP is the standard inter-domain routing protocol in the Internet. Self-stabilization is a technique to tolerate arbitrary transient faults. The routing instability in the Internet can occur due to errors in configuring the routing data structures, the routing policies, transient physical and data link problems, softwa...

متن کامل

A Two Tier Approach To Building Dependable Middleware Services

1. Introduction We consider the problem of building middleware that facilitates service replication over a wide area network (e.g., the Internet) where service replicas are typically placed in different, geographically wide-apart locations. Several group communication protocols have been proposed in the literature, some have even been implemented ([C98, DM96, Moser96, VKM96]). However, many of ...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Semiotics of Collective Memory of the Iran-Iraq War (Holy Defence): A Case Study of the Shared Images in Virtual Social Networks

This study aims to achieve a semiotic understanding of collective memory of the Iran-Iraq war. For this purpose, samples of images in virtual social networks shared in response to the news of discovery and return of the bodies of more than 175 divers have been analyzed. Visual signs in photographs, cartoons, graphic designs, prints, paintings and posters, in methods of historical pictures and f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006