Application Specific Large Scale Sensor Networks

Similar documents
Outline. Overview of ad hoc wireless networks (I) Overview of ad hoc wireless networks (II) Paper presentation Ultra-Portable Devices.

Parvathinathan Venkitasubramaniam, Student Member, IEEE, Srihari Adireddy, Student Member, IEEE, and Lang Tong, Senior Member, IEEE

Ad Hoc Networks: Introduction

Energy Efficient Clustering in Sensor Networks with Mobile Agents

Wireless Ad-Hoc Networks

What is an Ad Hoc Network?

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

MAC in /20/06

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

Lang Tong. Education. Employment. Honors and Awards

Subject: Adhoc Networks

Lecture 8 Wireless Sensor Networks: Overview

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Ad Hoc & Sensor Networks

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

Multiple Access Links and Protocols

The MAC layer in wireless networks

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

ISA100.11a. Pengfei Ren.

Multichannel Outage-aware MAC Protocols for Wireless Networks

NEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Integrated Routing and Query Processing in Wireless Sensor Networks

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

Ad Hoc Networks: Issues and Routing

/99/$10.00 (c) 1999 IEEE

Resource management issues in mobile ad hoc networks (MANET)

Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Medium Access Control

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

UNIT 1 Questions & Solutions

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

CSMA based Medium Access Control for Wireless Sensor Network

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

Design and Simulation of an Underwater Acoustic Local Area Network

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Wireless Medium Access Control Protocols

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Part I. Wireless Communication

Link Estimation and Tree Routing

Impact of IEEE n Operation on IEEE Operation

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Wireless Networking & Mobile Computing

Application-Oriented Multimedia Streaming over Wireless Multihop Networks

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Mobility-Aware Real-Time Scheduling for Low-Power Wireless Networks

Spectrum Management in Cognitive Radio Networks

A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN

within unicast packets that are organized into multicast data when they reach their destination. I.INTRODUCTION

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

The MAC layer in wireless networks

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Revision of Previous Lectures

A Review paper on Routing Protocol Comparison

Minimizing the Routing Delay in Ad Hoc Networks through Route-Cache TTL Optimization

Improved QoS Optimization Approach in Sensor Network using Convolutional Encoding

WSN Routing Protocols

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication

Lecture 16: QoS and "

Luca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007

Energy-efficient routing algorithms for Wireless Sensor Networks

Principles of Wireless Sensor Networks

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

Some problems in ad hoc wireless networking. Balaji Prabhakar

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

An Implementation of Fog Computing Attributes in an IoT Environment

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

An Energy-Balanced Cooperative MAC Protocol in MANETs

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Collisions & Virtual collisions in IEEE networks

Reducing End to End per Packet Energy Consumption

The Internet of Things. Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Dr. Ahmed K. Sadek 2. Experience

Distributed Call Admission Control for Ad Hoc Networks

IEEE s Multihop MAC. Mateusz Wielgosz

Cisco Cooperative Project. Coexistence of WiFi and LAA: Detection Thresholds. Students: Li Li Advisors: Len Cimini, Chien-Chung Shen

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Introduction. Communication Systems Simulation - I. Monte Carlo method. Simulation methods

Co-existence of WiFi and ZigBee

Tarek Sheltami. CCSE COE 3/8/2008 1

Transcription:

c 2005 Cornell Sensor Network Workshop 1 Application Specific Large Scale Sensor Networks Architecture, Energy Efficient Protocols, and Signal Processing Lang Tong Adaptive Communications and Signal Processing Group School of Electrical and Computer Engineering Cornell University, Ithaca, NY 14853 http://people.ece.cornell.edu/ltong This work is supported in part by the the Army Research Laboratory CTA on Communication and Networks, Army Research Office, Office of Naval Research Office, and National Science Foundation.

c 2005 Cornell Sensor Network Workshop 2 The Internet and Layered Architecture WAN PSfrag LAN replacements Application WAN LAN Transport Network Data Link MAC LAN Physical Objectives Millions of users Thousands of applications A growing variety of devices. The need of layered approaches: Partition network functions into layers Design each layer separately

c 2005 Cornell Sensor Network Workshop 3 Sensor Networks are Application Specific Weather Environment Military Seismic Network with purposes. Unconventional design metrics Harsh design constraints What should be the appropriate design paradigm?

c 2005 Cornell Sensor Network Workshop 4 Large Scale Sensor Networks Applications Target detection and tracking. Surveillance Environmental monitoring Low-power low-cost sensors Random deployment Large number of nodes. Internet Design Challenges Architecture Physical Layer Design Protocols Network Maintenance. Security and Trust.

c 2005 Cornell Sensor Network Workshop 5 Outline Architecture Sensor Networks with Mobile Access (SENMA) Experimental Testbed. Energy Efficient Protocols Opportunistic Random Access Energy Efficient Adaptive Routing Communication and Signal Processing How many sensors are alive and for how long? Cooperative network with misinformed nodes Nonparametric event change detection and localization. Target detection and tracking in SENMA.

c 2005 Cornell Sensor Network Workshop 6 Sensor Network Architectures Multi-hop Sensor Network Stationary sensors and gateway nodes. Multi-hop to/from gateway nodes. Sensors talk to sensors. Asymmetric and correlated traffic.

c 2005 Cornell Sensor Network Workshop 7 Sensor Network Architectures Multi-hop Sensor Network Stationary sensors and gateway nodes. Multi-hop to/from gateway nodes. Sensors talk to sensors. Asymmetric and correlated traffic. Mobile Access Points Sensor Network with Mobile Access Mobile APs + stationary nodes. Sensors talk directly to APs. Stationary sensors driven by mobile APs. Asymmetric resources. Sensor Networks

c 2005 Cornell Sensor Network Workshop 8 SENMA: SEnsor Network with Mobile Access Mobile Access Points Sensor Networks Mobile access points can be UAV, UGV, submarine, doves, dogs... Mobile access points are not energy constrained. Suitable for clock-driven and query-driven applications. L. Tong, Q. Zhao, and S. Adireddy, Sensor Networks with Mobile Agents (SENMA), Proc. IEEE MILCOM, Oct., 2003.

c 2005 Cornell Sensor Network Workshop 9 Acoustic SENMA: System Configuration Mobile Access Point Sound Processing/ Network Performance Analysis Sensor Field

c 2005 Cornell Sensor Network Workshop 10 Outline Architecture Sensor Networks with Mobile Access (SENMA) Experimental Testbed. Energy Efficient Protocols Opportunistic Random Access Energy Efficient Adaptive Routing Communication and Signal Processing How many sensors are alive and for how long? Cooperative network with misinformed nodes Nonparametric event change detection and localization. Target detection and tracking in SENMA.

c 2005 Cornell Sensor Network Workshop 11 Opportunistic Communications and Networking γ1(t) γ2(t) γ1 γ2 r t Mobile AP Sensors Only user 1 Only user 2 Opportunistic Communications Design Rationale Mobility of AP induces fading. Fading leads to channel fluctuations. Wait for chances. Save power Act when opportunities arise.

c 2005 Cornell Sensor Network Workshop 12 Opportunistic Communications and Networking γ1(t) γ2(t) γ1 γ2 r t Mobile AP Sensors Only user 1 Only user 2 Opportunistic Communications Design Rationale Mobility of AP induces fading. Fading leads to channel fluctuations. Wait for chances. Save power Act when opportunities arise.

c 2005 Cornell Sensor Network Workshop 13 Opportunistic Medium Access Control Distributed Opportunistic MAC γ F (γ) Channel Acquisition Estimate γ from beacon. Opportunistic ALOHA Transmit with probability s(γ). Opportunistic CSMA Sense carrier with backoff τ(γ). Slot t Data Advantages Simplicity. Scalability. Beacon Energy Efficiency. P. Venkitasubramaniam, S. Adireddy and L. Tong Sensor Networks with Mobile Access: Optimal Random Access and Coding, To appear in IEEE JSAC: Special Issue on Sensor Networks Q. Zhao and L. Tong, Distributed Opportunistic Information Retrieval in Sensor Networks: CSI-Based Carrier Sensing, ICASSP 04, Also submitted to IEEE Trans. Wireless Communications.

c 2005 Cornell Sensor Network Workshop 14 Opportunistic Medium Access Control Distributed Opportunistic MAC γ F (γ) Channel Acquisition Estimate γ from beacon. Opportunistic ALOHA Transmit with probability s(γ). Opportunistic CSMA Sense carrier with backoff τ(γ). Slot t Data Advantages Simplicity. Scalability. Beacon Energy Efficiency. P. Venkitasubramaniam, S. Adireddy and L. Tong Sensor Networks with Mobile Access: Optimal Random Access and Coding, To appear in IEEE JSAC: Special Issue on Sensor Networks Q. Zhao and L. Tong, Distributed Opportunistic Information Retrieval in Sensor Networks: CSI-Based Carrier Sensing, ICASSP 04, also submitted to IEEE Trans. Wireless Communications.

c 2005 Cornell Sensor Network Workshop 15 Energy Efficient Adaptive Routing S D R r 10 2 10 1 5 10 15 20 25 30 35 40 45 λ Total energy consumption R=1000,N=30k,Bm=500,τ=300,p o =0.01 proactive reactive hybrid S D R r Q. Zhao and L. Tong, Energy Efficiency of Ad Hoc Networks: An Analysis of Proactive, Reactive, and Hybrid Networking Strategies, submitted to IEEE INFOCOM, July, 2004.

c 2005 Cornell Sensor Network Workshop 16 Outline Architecture Sensor Networks with Mobile Access (SENMA) Experimental Testbed. Energy Efficient Protocols Opportunistic Random Access Energy Efficient Adaptive Routing Communication and Signal Processing How many sensors are alive and for how long? Cooperative network with misinformed nodes. Nonparametric event change detection and localization. Target detection and tracking in SENMA.

Problem : Estimate the number of operating sensors and the histogram of the energy distribution using the information in the received packets. Power level [%] 0 0.2 0 0.2 0.4 0.6 0.8 1 1.2 Number of nodes [%] 5 10 dead hidden observed 15 Power level distribution Operating Sensors and Energy Distribution c 2005 Cornell Sensor Network Workshop 17

c 2005 Cornell Sensor Network Workshop 18 Two Approaches in Monitoring Wireless Sensor Networks Counting via Scheduled Interrogation Ask each sensor transmit and count the number of successes Central scheduling is needed. Mobile AP must address sensors individually. Requiring at least O(N) and more if channel has fading and interferences. Counting via Random Collection Collect packets randomly and count the number of successes. Distributed transmission with simple medium access. For such a method to be effective, it requires N log N + O(N) successfully received transmissions. Example: N = 1000, on the order of 10, 000 successful receptions are needed.

c 2005 Cornell Sensor Network Workshop 19 Two Approaches in Monitoring Wireless Sensor Networks The Estimation Approach In network monitoring, the exact values of the network parameters are not required. Estimate the number of operating sensors using the statistical properties of the received samples. Question: Can we estimate accurately using less than N log N + O(N) samples? C. Budianu, S. Ben-David and L. Tong, Estimation of the Number of Operating Sensors in Large Scale Sensor Networks, ICASSP 2004, also submitted to IEEE Trans. Signal Proc., June, 2004.

c 2005 Cornell Sensor Network Workshop 20 Cooperative SENMA with Misinformed Sensors q(y x) q(y x) In cooperative sensor networks, sensors may not agree with each other. What is the maximum rate of information retrieval with the presence of misinformed sensors? Z. Yang and L. Tong, Cooprative Sensor Networks with Misinformed Sensors, Proc. of the 38th Annual Conference on Information Sciences and Systems (CISS 04), Princeton, NJ, March 2004. To be submitted to IEEE Trans. Information Theory, July, 2004. Z. Yang and L. Tong, The effect of fading on the achievable rate of cooperative sensor networks with misinfomred sensors, to appear in IEEE 2004 GLOBECOM,

c 2005 Cornell Sensor Network Workshop 21 Nonparametric Event Change Detection and Localization First data collection Second data collection Is there a change in the distributions of red and green? where? Can we guarantee detection precision? What is the computation complexity? S. Ben-David, T. He and L. Tong, Non-Parametric Approach to Change Detection and Estimation in Large Scale Sensor Networks, Proc. of the 38th Annual Conference on Information Sciences and Systems (CISS 04), Princeton, NJ, March 2004.

c 2005 Cornell Sensor Network Workshop 22 Stepping Stone Attack Detection of Stepping Stone Attack The attacker uses a chain of compromised hosts to construct a sequence of interactive attacks Quickest Attack Detection Detect possible stepping-stone attack pairs based on statistical properties of incoming and outgoing traffic. T. He and L. Tong, Detection of Encrypted Interactive Stepping Stone Attack: Algorithms and Performance, to be submitted to IEEE Trans. Signal Processing.

c 2005 Cornell Sensor Network Workshop 23 Target Detection and Tracking Mobile Access Points Control Center Sensor Networks Sensors perform low quality DoA estimation and target classification. The fusion center estimates the field parameters. Develop optimal detection, estimation, and fusion algorithms.

c 2005 Cornell Sensor Network Workshop 24 Related Projects National Science Foundation Signal Processing for Random Access: A Cross Layer Approach. SENSORS: The Reachback Channel in Wireless Sensor Networks. (Servetto (PI)) NET-NOSS: Ultra Low-Power Self-Configuring Wireless. (Wicker (PI)) TRUST: Team for Research in Ubiquitous Secure Technology (Wicker (PI)) Office of Naval Research Channel and QoS Adaptive Multimedia Wireless Ad-Hoc Networks (with Haas, Hemami, Manohar, Wicker, Proakis, Nahrstedt). DARPA Connectionless Networking. Army Research Laboratory Signal Processing for Sensor Networks. Cross Layer Design for Wireless Networks. Direction of Arrival Estimation with Networked Sensors.