Mobile and Wireless Compu2ng CITS4419 Week 9 & 10: Holes in WSNs
|
|
- Damian Wright
- 5 years ago
- Views:
Transcription
1 Mobile and Wireless Compu2ng CITS4419 Week 9 & 10: Holes in WSNs Rachel Cardell-Oliver School of Computer Science & So8ware Engineering semester
2 MoBvaBon Holes cause WSN to fail its role Holes can be unintended (sensing, roubng) Holes can be caused by a malicious akacker
3 Topics What are WSN holes? Sensing holes RouBng holes Jamming holes Black hole holes Reading: The Holes Problem in WSNs A Survey, Ahmed et al, Mobile CompuBng and CommunicaBons Review, 1(2), 2005
4 WSNs and Holes
5 Sensing Holes
6 Sensing Coverage Unit Disk
7 Mobile Coverage Source: Flying Ad-Hoc Networks: A survey, Ad Hoc Networks 11(3) 2013
8 Coverage with Mobile Nodes Assume: Nodes are mobile so can adjust their posibon Assume: Nodes know their GPS locabon, or at least accurate distance to neighbours Approach (virtual forces): Each node adjusts its posibon to balance the distance to all neighbours Algorithms: DSS, VEC, IDCA (see Ahmed2005 for details)
9 StaBc Nodes: Graph Model The unit disk sensing model is unrealisbc and inflexible Instead, we can model network as a graph with edges from each node to the places it can measure Usually we aim for k-coverage with k >= 1 If more than k-nodes cover some place, then we can remove excess nodes, or rest them
10 Choosing nodes by Minimum Set Cover Algorithm 1. Let P be a set of predictor sensors and C the pool of candidate sensors for a sensor network S. 2. IniBally P = and C = S = U 3. For each iterabon, we chose a sensor s C that covers (i.e. is able to predict) the highest number of yet to covered sensors. 4. Add this chosen s to the set of permanent sensors and remove s and its ε-neighbors from the sets of candidate and uncovered sensors. 5. Repeat the sensor selecbon steps unbl all candidate sensors are exhausted with C =. 6. Since every sensor can, at worst, predict itself, this will always terminate. 7. The algorithm returns P the set of permanent sensors to be deployed and the virtual sensors are V = S \ P
11 BuildSense: Long-term, fine-grained building monitoring with minimal sensor infrastructure, Cardell-Oliver and Sarkar, BuildSys 2017
12 Sensing Coverage Graph
13 RouBng Holes
14 RouBng Holes Source: Babak Pazand, PhD thesis UWA 2008, LocaBon-free node scheduling schemes for energy efficient, fault tolerant and adapbve sensing in wireless sensor networks
15 RouBng Holes Node A communicates with B by a learned path, say C, D, E Suppose node D fails, then A s messages will no longer be delivered SoluBons: MulBpath roubng algorithms: Flooding (and variants) AdapBve roubng algorithms that idenbfy holes and relearn routes
16 Flooding Idea: sender broadcasts a packet, every receiver forwards it PRO: very robust to holes since every possible route will be followed CON: many redundant transmissions so slow and energy inefficient
17 Flooding Improved Gossiping = ProbabilisBc flooding Nodes forward with probability, p PROs Simple Fault Tolerant Load balanced CONS Assumes homogenous topology, does not allow for changes How to choose p?
18 Hole-Resistant Path RouBng CollecBon Tree Protocol A protocol that computes routes to one or more sinks Builds and maintains minimum cost tree(s) with the sinks as root Source for following slides: _marBn-lanter_collecBon.pdf
19 Collection Tree Protocol A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter
20 Collection Protocols Why do we need collection protocols? Collecting data at a base station is a common requirement of sensor network applications. The general approach used is to build one or more collection trees, each of which is rooted at a base station. When a node has data which needs to be collected, it sends the data up the tree, and it forwards collection data that other nodes send to it. [TinyOS TEP 119] Requirements 1. Reliability: > 90% of packets 2. Robustness 3. Efficiency: Use a minimum of transmissions 4. Hardware Independence
21 Collection Tree Protocol (CTP) Is a protocol that computes routes to one or more sinks Builds and maintains minimum cost tree(s) with the sink(s) as root
22 Challenges for CTP Link dynamics Wireless links can have coherence as small as 500 ms Routing Inconsistencies Inconsistencies/routing changes might lead to loops
23 How to find a route Minimize transmission costs ETX = Expected number of transmissions Every node maintains an estimate of the cost of a route to a collection point
24 Routing in CTP 3 hops 4 hops source sink
25 CTP Architecture Forwarts data packets Computes ETX and Route to sink Computes ETX to neighboors [Colesanti and Santini, 2010]
26 Parent Selection j i k sink l Link estimator: - ETX 1hop (i,j) - ETX 1hop (i,k) - ETX 1hop (i,l) Routing Engine: - ETX multihop (i,j) = ETX 1hop (i,j) + ETX multihop (j) - ETX multihop (i,k) = ETX 1hop (i,k) + ETX multihop (k) - ETX multihop (i,l) = ETX 1hop (i,l) + ETX multihop (l)
27 Link estimator Link estimator: - ETX 1hop (i,j) - ETX 1hop (i,k) - ETX 1hop (i,l)
28 Parent Selection j i k sink l Link estimator: - ETX 1hop (i,j) - ETX 1hop (i,k) - ETX 1hop (i,l) Routing Engine: - ETX multihop (i,j) = ETX 1hop (i,j) + ETX multihop (j) - ETX multihop (i,k) = ETX 1hop (i,k) + ETX multihop (k) - ETX multihop (i,l) = ETX 1hop (i,l) + ETX multihop (l)
29 Data vs. Control Traffic Data packets Unicast Control Beacons Broadcast [Colesanti and Santini, 2010]
30 Control Beacon Control beacon has Two fields: Parent and cost Two control bits: Pull bit (P) Congestion bit (C) [Colesanti and Santini, 2010] [Colesanti and Santini, 2010]
31 Link Dynamics Other protocols typically use periodic beacons to update network topology and link estimates Faster rates lead to higher cost Slower rates lead to misinterpretations But CTP uses adaptive beaconing!
32 Adaptive Beaconing CTP uses the Trickle Algorithm [Levis, 2004] In CTP: Start with lowest interval of 64 ms When interval expires double it up to 1 hour Node resets the interval if It is asked to forward a packet from a node whose ETX is lower or equal to its own Is routing cost degrees significantly It receives a packet with the P bit set
33 Data Plane Design Per-client Queuing One single outstanding packet per client (process) Hybrid Send Queue Route through- and locally-generated traffic buffer Transmit Timer Wait two packet times between transmissions Transmit Cache Avoid duplicates
34 Retransmission and Duplicates j k l [Colesanti and Santini, 2010] [Colesanti and Santini, 2010]
35 Evaluation CTP Others: - MultiHopLQI - Hyper - RBC - Dozer Others
36 References [TEP 119] R. Fonseca, O. Gnawali, K. Jamieson, S. Kim, P. Levis, and A. Woo. TEP 119: Collection Protocol, Feb [TEP 123] R. Fonseca, O. Gnawali, K. Jamieson, S. Kim, P. Levis, and A. Woo. TEP 123: The Collection Tree Protocol, Aug [Gnawali, 2009] Gnawali et al.: Collection Tree Protocol, [Colesanti and Santini, 2010] U. Colesanti, S. Santini. Tech report: A Performance Evaluation Of The Collection Tree Protocol Based On Its Implementation For The Castalia Wireless Sensor Networks Simulator. [Levis, 2004] P. Levis, N. Patel, D. Culler, and S. Shenker. Trickle: A selfregulating algorithm for code maintenance and propagation in wireless sensor networks. In Proc. of the USENIX NSDI Conf., San Francisco, CA, Mar [Fonseca, 2007] R. Fonseca, O. Gnawali, K. Jamieson, and P. Levis. Four Bit Wireless Link Estimation. In Hotnets-VI, Atlanta, GA, Nov
37 Summary: CTP roubng 2 principles for wire-less roubng protocols Datapath valida2on: data traffic quickly discovers and fixes roubng inconsistencies Adap2ve beaconing: extending the Trickle algorithm to roubng control traffic reduces route repair latency and sends fewer beacons Source: CollecBon Tree Protocol, Gnawali et al SenSys 2009
38 Next week: Jamming Holes Black Holes
39 Homework Reading The Holes Problem in WSNs A Survey, Ahmed et al, Mobile CompuBng and CommunicaBons Review, 1(2), 2005 See other references on the cits4419 schedule page
Collection Tree Protocol. A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter
Collection Tree Protocol A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter Collection Protocols Why do we need collection protocols? Collecting data at a base station is a
More informationRouting for IoT and Sensor Systems
Facoltà di Ingegneria dell Informazione, Informatica e Statistica Internet of Things A.Y. 2017/18 Routing for IoT and Sensor Systems Federico Ceccarelli PhD Student 1 The Collection Tree Protocol (CTP)
More informationCollection Tree Protocol
Collection Tree Protocol Omprakash Gnawali University of Southern California gnawali@usc.edu Rodrigo Fonseca Brown University & Yahoo! Research rfonseca@cs.brown.edu Kyle Jamieson University College London
More informationRouting: Collection Tree Protocol. Original slides by Omprakash Gnawal
Routing: Collection Tree Protocol Original slides by Omprakash Gnawal Collection Anycast route to the sink(s) collects data from the network to a small number of sinks network primitive for other protocols
More informationCollection Tree Protocol
Collection Tree Protocol Omprakash Gnawali Stanford University & University of Southern California gnawali@cs.stanford.edu Rodrigo Fonseca Brown University & Yahoo! Research rfonseca@cs.brown.edu Kyle
More informationWireless Sensor Networks
Wireless Sensor Networks Routing M. Schölzel Network in computer science Network is a graph G = (V,E) V set of all nodes E set of all edges: (v 1,v 2 ) E V 2 V = { A, B, C,... } E = { (A,B), (B,C), (C,F),...
More informationCollection. Abstract. 1. Introduction. Note. TEP: 119 Net2 Working Group
Collection TEP: 119 Group: Net2 Working Group Type: Documentary Status: Final TinyOS-Version: > 2.1 Author: Rodrigo Fonseca, Omprakash Gnawali, Kyle Jamieson, and Philip Levis Draft-Created: 09-Feb-2006
More informationCollection Tree Protocol
Collection Tree Protocol Technical Report SING-9-1 Omprakash Gnawali University of Southern California gnawali@usc.edu David Moss Rincon Labs dmm@rincon.com Rodrigo Fonseca UC Berkeley & Yahoo! Research
More informationCollection Tree Protocol
Collection Tree Protocol Omprakash Gnawali (Stanford University) with Rodrigo Fonseca (Brown University) Kyle Jamieson (University College London) David Moss (People Power Company) Philip Levis (Stanford
More informationA CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks
A CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks OMPRAKASH GNAWALI, University of Houston RODRIGO FONSECA, Brown University KYLE JAMIESON, University College
More informationCTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks
CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks OMPRAKASH GNAWALI, University of Houston RODRIGO FONSECA, Brown University KYLE JAMIESON, University College
More informationResearch Article Research on Dynamic Routing Mechanisms in Wireless Sensor Networks
e Scientific World Journal, Article ID 165694, 7 pages http://dx.doi.org/10.1155/2014/165694 Research Article Research on Dynamic Routing Mechanisms in Wireless Sensor Networks A. Q. Zhao, 1 Y. N. Weng,
More informationIntra-car Wireless Sensors Data Collection: A Multi-hop Approach
Intra-car Wireless Sensors Data Collection: A Multi-hop Approach Morteza Hashemi, Wei Si, Moshe Laifenfeld, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering, Boston University,
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationIntra-car Wireless Sensors Data Collection: A Multi-hop Approach
Intra-car Wireless Sensors Data Collection: A Multi-hop Approach Morteza Hashemi, Wei Si, Moshe Laifenfeld, David obinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering, Boston University,
More informationROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric
More informationMinimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks
Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationReliable Data Collection from Mobile Users with High Data Rates in Wireless Sensor Networks
Reliable Data Collection from Mobile Users with High Data Rates in Wireless Sensor Networks Lin Guo and Qi Han Department of Electrical Engineering and Computer Science Colorado School of Mines Email:{lguo,qhan}@mines.edu
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationEnergy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x
Energy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x Dhaval Patel, 1 Bijal Chawla, 2 Chandresh Parekh 3 12 PG Student, Department of Wireless Mobile Computing, Gujarat
More informationA Joint Power Control and Routing Scheme for Rechargeable Sensor Networks
A Joint Power Control and Routing Scheme for Rechargeable Sensor Networks Amitangshu Pal and Asis Nasipuri Electrical & Computer Engineering, The University of North Carolina at Charlotte, Charlotte, NC
More informationQuantitative Analysis and Evaluation of RPL with Various Objective Functions for 6LoWPAN
Indian Journal of Science and Technology, Vol 8(19), DOI: 10.17485/ijst/2015/v8i19/76696, August 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Quantitative Analysis and Evaluation of RPL with
More informationMobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More informationADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks
AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University
More informationEnd-To-End Delay Optimization in Wireless Sensor Network (WSN)
Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,
More informationA SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering
More informationPerformance Evaluation of Link Quality Estimation Metrics for Static Multihop Wireless Sensor Networks
Performance Evaluation of Link Quality Estimation Metrics for Static Multihop Wireless Sensor Networks Tao Liu, Ankur Kamthe, Lun Jiang and Alberto Cerpa Computer Science and Engineering, University of
More informationFigure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
More informationResearch Collection. Report. ETH Library. Author(s): Colesanti, Ugo; Santini, Silvia. Publication Date:
Research Collection Report A Performance Evaluation of the Collection Tree Protocol Based on its Implementation for the Castalia Wireless Sensor Networks Simulator Author(s): Colesanti, Ugo; Santini, Silvia
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationFault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network
Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network P.S Patheja, Akhilesh Waoo & Parul Shrivastava Dept.of Computer Science and Engineering, B.I.S.T, Anand Nagar,
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationA Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs
A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,
More informationRouting in packet-switching networks
Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call
More informationGenetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks
Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationReliable Data Collection from Mobile Users with High Data Rates in Wireless Sensor Networks
Reliable Data Collection from Mobile Users with High Data Rates in Wireless Sensor etworks Lin Guo and Qi Han Department of Electrical Engineering and Computer Science Colorado School of Mines 15 Illinois
More informationAd hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport
Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport Holger Karl Computer Networks Group Universität Paderborn Overview Dependability requirements Delivering single packets Delivering
More informationThe Emergence of Networking Abstractions and Techniques in TinyOS
The Emergence of Networking Abstractions and Techniques in TinyOS CS295-1 Paper Presentation Mert Akdere 10.12.2005 Outline Problem Statement & Motivation Background Information TinyOS HW Platforms Sample
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,
More informationChapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks
Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks Early studies shows that congestion avoid in wireless sensor networks (WSNs) is a critical issue, it will
More informationFig. 2: Architecture of sensor node
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce
More informationDRCS: A Distributed Routing and Channel Selection Scheme for Multi-Channel Wireless Sensor Networks
DRCS: A Distributed Routing and Channel Selection Scheme for Multi-Channel Wireless Sensor Networks Amitangshu Pal and Asis Nasipuri Electrical & Computer Engineering, The University of North Carolina
More informationClass Based Congestion Control method for Wireless Sensor Networks
1 Class Based Congestion Control method for Wireless Sensor Networks Abbas Ali Rezaee Ph.D Student, CE Department, Science and Research Branch,Islamic Azad University (IAU), Tehran, Iran. aa.rezaee@srbiau.ac.ir
More informationEVALUATING AND IMPROVING COLLECTION TREE PROTOCOL MOBILE WIRELESS SENSOR NETWORK. Dixit Sharma. A Thesis Submitted in Partial Fulfillment
EVALUATING AND IMPROVING COLLECTION TREE PROTOCOL IN MOBILE WIRELESS SENSOR NETWORK By Dixit Sharma A Thesis Submitted in Partial Fulfillment Of the Requirements for the Degree of Master of Applied Science
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More informationLink Estimation and Tree Routing
Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless
More informationBachelor thesis. Major Subject. End-to-end Delay Analysis and Measurements in Wireless Sensor Networks. Hao Chen
Bachelor thesis Major Subject End-to-end Delay Analysis and Measurements in Wireless Sensor Networks Hao Chen zerochords@gmail.com Abstract Wireless sensor networks have arrived because of further developments
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More informationViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing
ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,
More informationMobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad
More informationWireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013
Wireless Sensor Networks (WSN) Tanyar Pooyeh 2pooyeh@informatik.uni-hamburg.de Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Outline Multi-hop Wireless Networks MANETs, VANETs, WSNs Routing
More informationOn the Interdependence of Congestion and Contention in Wireless Sensor Networks
On the Interdependence of Congestion and Contention in Wireless Sensor Networks Mehmet C. Vuran Vehbi C. Gungor School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA
More informationSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc
More informationWireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization
Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks
ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks Hogil Kim and Eun Jung Kim Department of Computer Science Texas A&M University College Station,
More informationA Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN
A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN Sweta A.Kahurke M.Tech(IV) Wireless communication & Computing G.H.Raisoni College Of Engineering
More informationA Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality
Taming the Underlying Challenges of Reliable Routing in Sensor Networks Alec Woo, Terence Tong, and David Culler UC Berkeley and Intel Research Berkeley A Cross-Layer Perspective of Routing How to get
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More informationCatching BlackHole Attacks in Wireless Sensor Networks
Catching BlackHole Attacks in Wireless Sensor Networks Ashish M 1 and Mr. Jason Martis 2 1 M. Tech, Department Of ISE, NMAM Institute of Technology, Nitte 2 Asst. Prof, Department Of ISE, NMAM Institute
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationDRCS: A Distributed Routing and Channel Selection Scheme for Multi-Channel Wireless Sensor Networks
9th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing 213, San Diego (22 March 213) DRCS: A Distributed Routing and Channel Selection Scheme for Multi-Channel Wireless
More informationIntegrated Routing and Query Processing in Wireless Sensor Networks
Integrated Routing and Query Processing in Wireless Sensor Networks T.Krishnakumar Lecturer, Nandha Engineering College, Erode krishnakumarbtech@gmail.com ABSTRACT Wireless Sensor Networks are considered
More informationPerformance Analysis of Quasi-Random Deployment Strategy in Sensor Networks
Performance Analysis of Quasi- Deployment Strategy in Sensor Networks Itu Snigdh #1, Nisha Gupta* 2 # Dept. of Computer Science and Engg., BIT Mesra, India. 1 itusnigdh@bitmesra.ac.in * Dept. of Electronics
More informationAMRIS: A Multicast Protocol for Ad hoc Wireless Networks
of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast
More informationKapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types
Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.
More informationWSN NETWORK ARCHITECTURES AND PROTOCOL STACK
WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop
More informationA Novel Dynamic Data Collection Paradigm for Wireless Sensor Networks (WSNs) by Mobile Users
A Novel Dynamic Data Collection Paradigm for Wireless Sensor Networks (WSNs) by Mobile Users 1 Zara Sumaiya, 2 Rekha Patil 1 P.G.Student, Department of Computer Science & Engineering, VTU RO PG Centre,
More informationReliable Time Synchronization Protocol for Wireless Sensor Networks
Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu
More information#$% * #$%+ $ (% Enables community-centric applications: Military and law enforcement. Search and rescue applications.
Enables communitycentric applications: Military and law enforcement Search and rescue applications Foad Hamidi Amir Ali Ghadiri Online gaming Possibly email and file transfer! Limited radio propagation
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationLINKORD: Link Ordering-Based Data Gathering Protocol for Wireless Sensor Networks
Computing, March 2015, Vol. 97, Issue 3, pp 205-236 LINKORD: Link Ordering-Based Data Gathering Protocol for Wireless Sensor Networks Marjan Radi 1,, Behnam Dezfouli 1, K. A. Bakar 1, S. A. Razak 1, Malrey
More informationSelective-TCP for Wired/Wireless Networks
Selective-TCP for Wired/Wireless Networks Rajashree Paul rpaul2@cs.sfu.ca Communication Networks Laboratory Roadmap Motivation Background and related work Selective-TCP overview implementation Simulation
More informationSFM: An Energy Efficient Algorithm based on Reducing Control Messages in Wireless Sensor Networks
RESEARCH ARTICLE OPEN ACCESS SFM: An Energy Efficient Algorithm based on Reducing Control Messages in Wireless Sensor Networks M.Christina Ranjitham1, Mrs.M.Thiruchelvi2 1PG Scholar, Department of CSE,
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationProbabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS
, pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,
More informationRouting Protocols in Mobile Ad-Hoc Network
International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana
More informationAn Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks
An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks Abstract A substantial amount of research on routing in sensor networks has focused upon methods for constructing the best
More informationCompetent Broadcasting in MANET
Competent Broadcasting in MANET 1 Ms. K. Vijayalakshmi, 2 Mrs.S.Jeyanthi 1 M.E., Lecturer, CSE Dept., PSNA College of Engg. And Tech., Dindigul, Tamilnadu,India. 2 M.E., Lecturer, CSE Dept., PSNA College
More informationTowards Securing MintRoute in Wireless Sensor Networks
Towards Securing MintRoute in Wireless Sensor Networks Islam Hegazy Reihaneh Safavi-Naini Carey Williamson Department of Computer Science, University of Calgary, Calgary, AB, Canada {islam.hegazy,rei,carey}@ucalgary.ca
More informationImprovement on Gossip Routing Protocol using TOSSIM in Wireless Sensor Networks
Improvement on Routing Protocol using TOSSIM in Wireless Sensor Networks Raju Dutta Narula Institute of Technology Dept. of Mathematics Kolkata, West Bengal Shishir Gupta Indian School of Mines Dept. of
More informationStarburst SSD: An Efficient Protocol for Selective Dissemination
Starburst SSD: An Efficient Protocol for Selective Dissemination Tahir Azim Stanford University Stanford, California 9435 Email:tazim@cs.stanford.edu Qasim Mansoor National University of Sciences and Technology
More informationIEEE s ESS Mesh Networking
IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE
More informationFast, Efficient, and Robust Multicast in Wireless Mesh Networks
fast efficient and robust networking FERN Fast, Efficient, and Robust Multicast in Wireless Mesh Networks Ian Chakeres Chivukula Koundinya Pankaj Aggarwal Outline IEEE 802.11s mesh multicast FERM algorithms
More informationResearch Directions in Low-Power Wireless Networks
Research Directions in Low-Power Wireless Networks Behnam Dezfouli [ dezfouli@ieee.org ] November 2014 1 q OBSERVING AND CHARACTERIZING THE EFFECT OF ENVIRONMENT ON WIRELESS COMMUNICATIONS For example,
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationAn Industrial Employee Development Application Protocol Using Wireless Sensor Networks
RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni
More informationAn Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing
More informationPractical Network Coding in Sensor Networks: Quo Vadis?
Practical Network Coding in Sensor Networks: Quo Vadis? Thiemo Voigt 1, Utz Roedig 2, Olaf Landsiedel 3,4, Kasun Samarasinghe 1, Mahesh Bogadi Shankar Prasad 1 1 Swedish Institute of Computer Science (SICS),
More informationReducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability
Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability Sivakumar.P, Sivaranjani.R, Srilakshmi.G, Subashini.R Abstract: Mobile ad hoc networks (MANET) have been proposed
More informationDelay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks
Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,
More informationWireless Internet Routing. Learning from Deployments Link Metrics
Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data
More informationMobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]
192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer
More informationThe Emergence of a Networking Primitive in Wireless Sensor Networks
The Emergence of a Networking Primitive in Wireless Sensor Networks Philip Levis, Eric Brewer, David Culler, David Gay, Sam Madden, Neil Patel, Joe Polastre, Scott Shenker, Robert Szewczyk, and Alec Woo
More information