{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:17Z","timestamp":1750307897441,"version":"3.41.0"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2007,9,1]],"date-time":"2007-09-01T00:00:00Z","timestamp":1188604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Auton. Adapt. Syst."],"published-print":{"date-parts":[[2007,9]]},"abstract":"<jats:p>\n            This article presents a hierarchical approach for detecting faults in wireless sensor networks (WSNs) after they have been deployed. The developers of WSNs can specify \u201cinvariants\u201d that must be satisfied by the WSNs. We present a framework, Hierarchical SEnsor Network Debugging (H-SEND), for lightweight checking of invariants. H-SEND is able to detect a large class of faults in data-gathering WSNs, and leverages the existing message flow in the network by buffering and piggybacking messages. H-SEND checks as closely to the source of a fault as possible, pinpointing the fault quickly and efficiently in terms of additional network traffic. Therefore, H-SEND is suited to bandwidth or communication energy constrained networks. A specification expression is provided for specifying invariants so that a protocol developer can write behavioral level invariants. We hypothesize that data from sensor nodes does not change dramatically, but rather changes gradually over time. We extend our framework for the invariants that includes values determined at run-time in order to detect data trends. The value range can be based on information local to a single node or the surrounding nodes' values. Using our system, developers can write invariants to detect data trends without prior knowledge of correct values. Automatic value detection can be used to detect anomalies that cannot be detected in existing WSNs. To demonstrate the benefits of run-time range detection and fault checking, we construct a prototype WSN using CO\n            <jats:sub>2<\/jats:sub>\n            and temperature sensors coupled to Mica2 motes. We show that our method can detect sudden changes of the environments with little overhead in communication, computation, and storage.\n          <\/jats:p>","DOI":"10.1145\/1278460.1278462","type":"journal-article","created":{"date-parts":[[2007,10,14]],"date-time":"2007-10-14T12:41:11Z","timestamp":1192365671000},"page":"8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking"],"prefix":"10.1145","volume":"2","author":[{"given":"Douglas","family":"Herbert","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Vinaitheerthan","family":"Sundaram","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Yung-Hsiang","family":"Lu","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Saurabh","family":"Bagchi","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Zhiyuan","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]}],"member":"320","published-online":{"date-parts":[[2007,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986877"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.368136"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.588622"},{"key":"e_1_2_1_5_1","first-page":"294","article-title":"Demand-controlled ventilation in a multi-zone office building","volume":"37","author":"Emmerich S.","year":"1996","unstructured":"Emmerich , S. 1996 . Demand-controlled ventilation in a multi-zone office building . Fuel and Energy Abstracts 37 , 4, 294 -- 294 . Emmerich, S. 1996. Demand-controlled ventilation in a multi-zone office building. Fuel and Energy Abstracts 37, 4, 294--294.","journal-title":"Fuel and Energy Abstracts"},{"key":"e_1_2_1_6_1","unstructured":"Erdmann C. A. Stiener K. C. and Apte M. G. 2002. Indoor carbon dioxide concentrations and sick building syndrome symptoms in the base study revisited: Analysis of the 100 building dataset. In Indoor Air. 443--448.  Erdmann C. A. Stiener K. C. and Apte M. G. 2002. Indoor carbon dioxide concentrations and sick building syndrome symptoms in the base study revisited: Analysis of the 100 building dataset. In Indoor Air. 443--448."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094841"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/09593339209385162"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108792.1108806"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581377"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"e_1_2_1_13_1","first-page":"1","article-title":"Energy-efficient communication protocol for wireless microsensor networks","volume":"2","author":"Heinzelman W. R.","year":"2000","unstructured":"Heinzelman , W. R. , Chandrakasan , A. , and Balakrishnan , H. 2000 . Energy-efficient communication protocol for wireless microsensor networks . In Hawaii International Conference on System Sciences. 2 , 1 -- 10 . Heinzelman, W. R., Chandrakasan, A., and Balakrishnan, H. 2000. Energy-efficient communication protocol for wireless microsensor networks. In Hawaii International Conference on System Sciences. 2, 1--10.","journal-title":"Hawaii International Conference on System Sciences."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2006.55"},{"volume-title":"IEEE International Conference on Dependable Systems and Networks.","author":"Herbert D.","key":"e_1_2_1_15_1","unstructured":"Herbert , D. , Modelo-Howard , G. , Perez-Toro , C. , and Bagchi , S . 2007. Fault tolerant ARIMA-based aggregation of data in sensor networks . IEEE International Conference on Dependable Systems and Networks. Herbert, D., Modelo-Howard, G., Perez-Toro, C., and Bagchi, S. 2007. Fault tolerant ARIMA-based aggregation of data in sensor networks. IEEE International Conference on Dependable Systems and Networks."},{"volume-title":"American Industrial Hygiene Conference and Expo. 163","author":"Herbert D.","key":"e_1_2_1_16_1","unstructured":"Herbert , D. , Sundaram , V. , Albin , L. , Lu , Y.-H. , Bagchi , S. , and Li , Z . 2007. Pervasive carbon dioxide and temperature monitoring utilizing large numbers of low-cost wireless sensors . American Industrial Hygiene Conference and Expo. 163 . Herbert, D., Sundaram, V., Albin, L., Lu, Y.-H., Bagchi, S., and Li, Z. 2007. Pervasive carbon dioxide and temperature monitoring utilizing large numbers of low-cost wireless sensors. American Industrial Hygiene Conference and Expo. 163."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.1134340"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031506"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.17"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.58"},{"volume-title":"IEEE International Conference on Security and Privacy in Communication Networks.","author":"Khalil I.","key":"e_1_2_1_21_1","unstructured":"Khalil , I. , Bagchi , S. , and Shroff , N. B . 2006. MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks . In IEEE International Conference on Security and Privacy in Communication Networks. Khalil, I., Bagchi, S., and Shroff, N. B. 2006. MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks. In IEEE International Conference on Security and Privacy in Communication Networks."},{"volume-title":"International Symposium on Reliable Distributed Systems. 18--30","author":"Khanna G.","key":"e_1_2_1_22_1","unstructured":"Khanna , G. , Varadharajan , P. , and Bagchi , S . 2004. Self checking network protocols: A monitor based approach . In International Symposium on Reliable Distributed Systems. 18--30 . Khanna, G., Varadharajan, P., and Bagchi, S. 2004. Self checking network protocols: A monitor based approach. In International Symposium on Reliable Distributed Systems. 18--30."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108792.1108801"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958506"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2005.00663.x"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2002.1036066"},{"key":"e_1_2_1_28_1","unstructured":"Lynch N. A. 1996. Distributed Algorithms. Morgan Kaufmann.   Lynch N. A. 1996. Distributed Algorithms. Morgan Kaufmann."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/323596.323618"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/128733.128735"},{"volume-title":"IEEE ASILOMAR Conference on Signals, Systems and Computers.","author":"Medidi S. R.","key":"e_1_2_1_32_1","unstructured":"Medidi , S. R. , Medidi , M. , and Gavini , S . 2003. Detecting packet-dropping faults in mobile ad-hoc networks . In IEEE ASILOMAR Conference on Signals, Systems and Computers. Medidi, S. R., Medidi, M., and Gavini, S. 2003. Detecting packet-dropping faults in mobile ad-hoc networks. In IEEE ASILOMAR Conference on Signals, Systems and Computers."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1034\/j.1600-0668.2000.010004212.x"},{"volume-title":"International Conference on VLSI Design. 205--210","author":"Min R.","key":"e_1_2_1_34_1","unstructured":"Min , R. , Bhardwaj , M. , Cho , S.-H. , Shih , E. , Sinha , A. , Wang , A. , and Chandrakasan , A . 2001. Low-power wireless sensor networks . In International Conference on VLSI Design. 205--210 . Min, R., Bhardwaj, M., Cho, S.-H., Shih, E., Sinha, A., Wang, A., and Chandrakasan, A. 2001. Low-power wireless sensor networks. In International Conference on VLSI Design. 205--210."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1404592"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1164\/rccm.200306-760OC"},{"volume-title":"International Symposium on Parallel Architectures, Algorithms and Networks. 63--68","author":"Nakano K.","key":"e_1_2_1_37_1","unstructured":"Nakano , K. and Olariu , S . 2002. A survey on leader election protocols for radio networks . In International Symposium on Parallel Architectures, Algorithms and Networks. 63--68 . Nakano, K. and Olariu, S. 2002. A survey on leader election protocols for radio networks. In International Symposium on Parallel Architectures, Algorithms and Networks. 63--68."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011426611520"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029901"},{"volume-title":"Conference on Australasian Computer Science.","author":"Pirzada A. A.","key":"e_1_2_1_40_1","unstructured":"Pirzada , A. A. and McDonald , C. Establishing trust in pure ad hoc networks . In Conference on Australasian Computer Science. Pirzada, A. A. and McDonald, C. Establishing trust in pure ad hoc networks. In Conference on Australasian Computer Science."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098946"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1034\/j.1600-0668.2003.00189.x"},{"key":"e_1_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Seppanen O. A. Fisk W. J. and Mendell M. J. 1999. Association of ventilation rates and CO2 concentrations with health and other responses in commercial and institutional buildings. Indoor Air. 226--252.  Seppanen O. A. Fisk W. J. and Mendell M. J. 1999. Association of ventilation rates and CO2 concentrations with health and other responses in commercial and institutional buildings. Indoor Air. 226--252.","DOI":"10.1111\/j.1600-0668.1999.00003.x"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.491576"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/523975.830483"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.365"},{"volume-title":"Topics in Distributed Algorithms","author":"Tel G.","key":"e_1_2_1_47_1","unstructured":"Tel , G. 1991. Topics in Distributed Algorithms . Cambridge University Press , Chapter 3: Assertional Verification. Tel, G. 1991. Topics in Distributed Algorithms. Cambridge University Press, Chapter 3: Assertional Verification."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.6"},{"volume-title":"IEEE International Conference on Computer Design.","author":"Wang J. Yi.","key":"e_1_2_1_49_1","unstructured":"Wang , J. Yi. , Shue , Y.-S. , Vijaykumar , T. N. , and Bagchi , S . 2006. Pesticide: Using SMT processors to improve performance of pointer bug detection . In IEEE International Conference on Computer Design. Wang, J. Yi., Shue, Y.-S., Vijaykumar, T. N., and Bagchi, S. 2006. Pesticide: Using SMT processors to improve performance of pointer bug detection. In IEEE International Conference on Computer Design."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.910857"},{"volume-title":"IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems. 129--136","author":"Younis M.","key":"e_1_2_1_51_1","unstructured":"Younis , M. , Youssef , M. , and Arisha . K. Energy-aware routing in cluster-based sensor networks . In IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems. 129--136 . Younis, M., Youssef, M., and Arisha. K. Energy-aware routing in cluster-based sensor networks. In IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems. 129--136."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMoa032867"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1061267.1061269"},{"volume-title":"International Conference on Dependable Systems and Networks. 763--772","author":"Zulkernine M.","key":"e_1_2_1_54_1","unstructured":"Zulkernine M. and Seviora , R. E . 2002. A Compositional approach to monitoring distributed systems . In International Conference on Dependable Systems and Networks. 763--772 . Zulkernine M. and Seviora, R. E. 2002. A Compositional approach to monitoring distributed systems. In International Conference on Dependable Systems and Networks. 763--772."}],"container-title":["ACM Transactions on Autonomous and Adaptive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1278460.1278462","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1278460.1278462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:29Z","timestamp":1750258049000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1278460.1278462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,9]]}},"alternative-id":["10.1145\/1278460.1278462"],"URL":"https:\/\/doi.org\/10.1145\/1278460.1278462","relation":{},"ISSN":["1556-4665","1556-4703"],"issn-type":[{"type":"print","value":"1556-4665"},{"type":"electronic","value":"1556-4703"}],"subject":[],"published":{"date-parts":[[2007,9]]},"assertion":[{"value":"2007-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}