Wireless Sensor Networks

Similar documents
WSN Routing Protocols

Lecture 8 Wireless Sensor Networks: Overview

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Overview of Sensor Network Routing Protocols. WeeSan Lee 11/1/04

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

Wireless Sensor Networks CS742

Study on Wireless Sensor Networks Challenges and Routing Protocols

Wireless Sensor Networks --- Concepts and Challenges

Wireless Sensor Networks --- Concepts and Challenges

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Part I. Wireless Communication

CSMA based Medium Access Control for Wireless Sensor Network

Sensor Network Protocols

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Research Directions in Low-Power Wireless Networks

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

Ad Hoc Networks: Issues and Routing

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

Routing protocols in WSN

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Networking Sensors, I

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar

Robust Data Dissemination in Sensor Networks

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

UNIT 1 Questions & Solutions

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication

Ad Hoc Networks: Introduction

An Energy Efficient Cluster based Load Balance Routing for Wireless Sensor Network

Implementing Application Layer Algorithms to Improve Energy Efficiency of a Proprietary Wireless Sensor Network Routing Protocol

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Time Synchronization in Wireless Sensor Networks: CCTS

Subject: Adhoc Networks

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Resource management issues in mobile ad hoc networks (MANET)

References. The vision of ambient intelligence. The missing component...

Wireless Sensor Networks (WSN)

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

Routing in Ad-Hoc Networks

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks

Sl.No Project Title Year

Multipath Routing Algorithm for Wireless Sensor Networks

MAC Essentials for Wireless Sensor Networks

SENSOR-MAC CASE STUDY

Energy Efficient MAC Protocols Design for Wireless Sensor Networks

Wireless Sensor Networks

Chapter 2. Wireless Sensor Networks

Wireless Ad-Hoc Networks

Wireless LANs. ITS 413 Internet Technologies and Applications

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

Fig. 2: Architecture of sensor node

On the Scalability of Hierarchical Ad Hoc Wireless Networks

WP-PD Wirepas Mesh Overview

Energy Efficient Routing Protocols in Wireless Sensor Network

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

MAC LAYER. Murat Demirbas SUNY Buffalo

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

Integrated Routing and Query Processing in Wireless Sensor Networks

Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks

Event Driven Routing Protocols For Wireless Sensor Networks

Wireless and Sensor Networks - Routing. 3rd Class Deokjai Choi

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Major Design Challenges. Sensor Network Characteristics. Crosslayer Design in Sensor Networks. Energy-Constrained Nodes. Wireless Sensor Networks

HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Energy Efficient Collection Tree Protocol in Wireless Sensor Networks

A Study of Routing Protocols for Ad-hoc Sensor Network

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Presented by: Murad Kaplan

IJESRT. [Satheesh, 2(4): April, 2013] ISSN: Keywords: Bounded Relay Hop Method, Wireless Sensor Networks.

Wireless Sensor Networks

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis

Wireless Sensor Networks

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Evaluation of AODV and DSR Routing Protocols of Wireless Sensor Networks for Monitoring Applications

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Modeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Advanced Networking Technologies

Chapter 4: Routing in Wireless Sensor Networks

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Time Synchronization in Wireless Networks

A Review on Routing Protocols For Wireless Sensor Network

Information Brokerage

Transcription:

Wireless Sensor Networks School of Computer Science and Technology Beijing University of Posts and Telecommunications Luo, Hong Luoh@bupt.edu.cn

Content Introduction to Wireless Sensor networks (WSNs) Medium Access Control (MAC) Routing Protocols Deployment and Management In-network processing QoS and Security

Content Introduction to Wireless Sensor networks (WSNs) Medium Access Control (MAC) Routing Protocols Deployment and Management In-network processing QoS and Security

Architecture of wireless networks Architecture of wireless networks infrastructure-based networks; non-infrastructure networks Infrastructure-based networks : Cellular mobile communication system (need BSS,MSC etc.) WLAN (need AP) non-infrastructure networks: Ad hoc networks Wireless Sensor networks

The comparison of two types of wireless networks

Overview of WSNs WSN is a wireless network of a group of sensor nodes, connected with Ad-Hoc method. It is consisted of a large number of nodes, densely deployed within or near the detected region. The location of each sensor nodes is uncertainty in advance, usually randomly deployed in harsh and inhospitable physical environments. Sensor node Sensor Processor Communicator Disaster Response

Architecture of Sensor Node Low cost, low-power, multi-functional device Data collection module: (Sensors and A/D Convertor) Data processing and Control module: (CPU Memory and embedded OS) Communication module: (Wireless Communication System) Power supply module: (Power Unit) Location Finding System Mobilizer Power Generator;

Examples LWIM III UCLA, 1996 Geophone, RFM radio, PIC, star network UCB Mote, 2000 4 Mhz, 4K Ram 512K EEProm, 128K code, CSMA half-duplex RFM radio WINS NG 2.0 Sensoria, 2001 Node development platform; multisensor, dual radio, Linux on SH4,

Architecture of WSNs Internet & satellite sink Sensor field User Wireless links: distance limited Multi-hop communication Self organization Sensor nodes: Battery, power limited Active and sleep modes Can route adjacent sensor s data

WSN Applications (1) Military Characteristics of WSNs: rapid deployment, self-organization, fault tolerance Battlefield command system Intruder detection, Battlefield Surveillance Target (enemy) tracking, Equipments safeguarding, Forces monitoring

WSN Applications (2) Environmental monitoring Flood detection Forest fire detection Ecosystems mapping

Health Care WSN Applications (3) Detect abnormity (behavior of patients: fall) Identify potential health risks (heart rate, blood pressure) Automatically remind doctors and assistants Monitor health trends (long term and short term)

WSN Applications (4) Civilian construction SHM Environmental control

WSNs Protocol Stack Application Layer Transport Layer Network layer Data Link Layer Physical Layer Power Management Plane Mobility Management Plane Task Management Plane

WSNs vs. Other networks Target WSN is data-centric, not communication-oriented. Communication pattern Traditional networks put all the processing functions into terminals, the Intermediate nodes are just in charge of relaying data packages; while for the WSNs, all sensor nodes have to sense events; transmit, receive and relay information; and process information. Diversity of applications No one fits all solution in WSNs Energy Impossible to change battery (lifetime is critical) Reliability WSN nodes are more prone to failure

Performance Energy efficiency Network lifetime Tradeoff for energy, coverage, delay, accuracy. Robustness Vulnerability to node failure and environmental dynamics Reliability Measurement accuracy, transmission reliability Scalability Centralized vs. Distributed QoS Response time, probability of event detection, security The first objective is Energy Conservation

Key Technologies Energy aware and application aware algorithms and protocols Data aggregation (fusion) for accuracy & redundancy control Dynamic topology management and localization Dynamic routing discovery and maintenance Gathering, processing and analyzing massive sensory data in real time for prompt event detection and response Reliability and fault tolerance in data transmission Security, privacy, trust

Content Introduction to Wireless Sensor networks (WSNs) Medium Access Control (MAC) Routing Protocols Deployment and Management In-network processing QoS and Security

Medium Access Control Strategy Techniques Schedule-based TDMA access strategy Contention-based CSMA access strategy FDMA/CDMA-based access strategy Design Considerations Energy conservation: First Objective Scalability: Adaptive to the change of network size, node density and topology Network utility: Throughput, fairness, latency and bandwidth utilization

Schedule-based (TDMA) Allocate a time slot for each node to send and receive data, and node sleeps when not in an active period Features Collision free Low idle listening and overhearing overheads Heavily dependent on time sync and not robust to topology changes Low throughput and high latency even during low contention Typical Algorithm--Bluetooth IEEE 802.15.1 sleep Tx/Rx sleep Tx/Rx sleep Tx/Rx

Contention-based (CSMA) When a node needs to send data,it uses wireless channel through competition. If collision happens, nodes retransmit data by some algorithm till sending data successfully or giving up sending. Features Algorithms to avoid collisions or reduce probability Random back-off and carrier-sensing High idle listening and overhearing overheads High control overhead Typical Algorithm: IEEE 802.11 CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)

CSMA / TDMA Comparison

IEEE 802.15.4 Personal wireless network LR-WPAN standard Provide connection among lowpower, low-rate, low-cost devices in short distance Can be used in wireless sensor networks. Features Speed: 250, 40, and 20 kb/s network topology: star or point-topoint. CSMA / CA access low-power, low latency devices Upper Layers IEEE 802.2 LLC Other LLC IEEE 802.15.4 MAC IEEE 802.15.4 868/915 MHz PHY IEEE 802.15.4 2400 MHz PHY

ZigBee Union Based on an open global standard, make the stable, lowcost, low-power, wireless networking systems or products possible

Content Introduction to Wireless Sensor networks (WSNs) Medium Access Control (MAC) Routing Protocols Deployment and Management In-network processing QoS and Security

Routing Protocols in WSNs Features Energy priority Depending on local information of topology Data-centric

The Classification of Routing Protocols Data-centric Determine routes according to the data content Data transmission process goes with data aggregation SPIN Directed Diffusion Location-based Determine routes according to node location, do not use flood method GPSR GEAR Hierarchical Applied to the large networks Use data aggregation to reduce redundant data in transmission LEACH TTDD TEEN PEGASIS

Negotiation-based Routing SPIN Sensor Protocol for Information via Negotiation Applied to active data dissemination system Using metadata for negotiation before data transmission Metadata Data description of data Shorter than raw data Avoid redundant data transmission

SPIN 3-stage handshake Data source A sends ADV(Meta data) B sends REQ for data A sends DATA B could aggregate AB data, relay/ transmits ADV (Meta data of A/AB) Other nodes request data B directly responses the request of A data

Request-based Routing Directed Diffusion Applied to system where sink sends interests for request Data generated by sensor nodes is named by attributevalue pairs Sink publishes interests message Nodes satisfied interest send data back

Directed Diffusion Sink sends interests message in flooding way Build initiate gradients when sending request message Source nodes transmit data back to the sink along with the gradients. During data sending back,data with same interest can be aggregated

Location-based Routing GPSR Applied to networks with constantly changing topology Exchange location info and remaining energy info through Hello message Greedy forwarding: taking the neighbor nearest to the sink as the next hop Source node sink

Cluster-based routing LEACH Low Energy Adaptive Clustering Hierarchy protocol Divide sensor nodes into clusters,every node sends data to its cluster-head,the cluster-head sends data to the sink after data aggregation. Adjacent nodes automatically form clusters sink Some nodes become clusterheads Other nodes choose a cluster to join Randomization election is used to balance energy load Cluster-head

Content Introduction to Wireless Sensor networks (WSNs) Medium Access Control (MAC) Routing Protocols Deployment and Management localization topology control coverage Synchronization In-network processing QoS and Security

Localization Importance: locating the monitored events in target tracking Foundation of location-based routing Network management, use location information to construct network topology Traditional localization Global Positioning System GPS High precision, strong anti-interference capability Suitable for outdoor environment, high energy consumption

Localization Localize each node with the beacon location Range-based: using ranging techniques for distance estimate or angle estimate in location calculation Range-free: depending only on the received message content S S S S S S B B S Beacon Challenge: precision of estimated location S S S S S B S B S node S S

Topology Control Targets: Minimize the energy consumption of each sensor node while ensuring network connectivity Restrict the neighbor set of a given node to reduce the channel interference Methods: Node power control: adjust transmission power sleep/wake-up mechanism Hierarchical topology: clustering mechanism coordination mechanism

Power Control Each node in the network uses the best transmission power depending on the node degree algorithm All the nodes in the network use the same transmission power Challenge: how to get the best power?

Hierarchical topology Nodes are divided into backbone nodes and ordinary nodes. Backbone nodes construct a connected network responsible for routing of data. Two-tier topology TTDD Cluster topology LEACH Multi-layer cluster topology sink Cluster-head

Coverage and Sensing Model Ensure that any point or any sub-region in the network can be monitored by sensors. K-coverage Each location is at least covered (monitoring) by k nodes, so as to guarantee the reliability of sensing. Boolean sensing model Events within sensing range are detected reliably and events outsides cannot be detected at all General sensing model Sensing capability degrades as distance increases

Importance Time Synchronization Ensure the cooperative work between nodes Complete TDMA schedule mechanism Complete the data aggregation of multiple sensors Assist localization process Synchronization technology In-network exchange and adjustment RBS (Reference Broadcast Synchronization) hierarchical synchronization structure TPSN (Timing-sync Protocol for Sensor Networks)

Content Introduction to Wireless Sensor networks (WSNs) Medium Access Control (MAC) Routing Protocols Deployment and Management In-network processing QoS and Security

Need for Data Fusion/Aggregation Data-centric Individual sensor readings are of little use The collection of readings from different sensors produce the big picture Coverage of sensor nodes is overlapped Sensory data is highly correlated Common data analysis operation Forwarding raw information is expensive Scarce energy and bandwidth In-network processing Data fusion/aggregation A B

Data aggregation routing structure How can the aggregation tree be formed? Where should aggregation point be placed? How long should a node wait for data from its children?

Content Introduction to Wireless Sensor networks (WSNs) Medium Access Control (MAC) Routing Protocols Deployment and Management In-network processing QoS and Security Reliability Real-time Security Fault-tolerance

Reliability Reliability Sink to source nodes: query, task planning, and other command. need 100% reliable data transmission. Source nodes to the sink: Sensory data. reliable collection of information --- data from nearby nodes are highly relevant, instead of guaranteeing single sensed data, network should provide effective information that users care. Reliability technology Single data -- reliable routing mechanism Collection of information -- redundant transmission

Reliable Routing Protocol Multi-path routing technique Main/backup multi-path First, build a main path from source node to the sink, then build multiple backup paths. The main path transmits data, backup paths transmit maintenance data. If the main path fails, choose a new one from backup paths. Simultaneous multi-path Build paths from source to sink according to some metric Send data on all paths simultaneously Challenge: How many paths are needed? ReInForM

Real-time in WSNs Real-time applications Intrusion monitoring disaster alarm,. Delay in WSNs CSMA-based MAC will bring random delay, TDMAbased MAC has constant delay. Active/sleep mode can save energy, but bring in delay of monitoring and transmission During data aggregation, aggregating node needs to wait for the data from children to complete the aggregation, further intensifies the delay.

Real-time in WSNs Consider real-time in each layer MAC layer: Choose suitable MAC mechanism, reduce retransmission. flexible wakeup mechanism, reduce waiting time Network layer: Choose small delay links to construct routes Proactive routing vs. reactive routing reactive routing needs time to build routes. Transmission layer: Multi-path vs. retransmission mechanism multi-path routing: switch between main/backup multi-path vs. simultaneous multi-path Application layer:aggregation? No aggregation?

Security Goals in WSNs Confidentiality (privacy) accessible to only authorized parties Integrity only authorized parties can modify the data Availability reliable delivery of data against denial of service Authentication data is really sent by the claimed sender Freshness data is current and fresh (not replayed by adversary) Security management key distribution and management mechanism

Security Challenges in WSNs Limited storage capability and computing capability Impractical to use public key cryptosystems Limited bandwidth and communication capability Need light-weight and distributed security protocols No centralized control Over-reliance on base station the problem of single point failure Physical security of the region can not be guaranteed Compromised nodes may lead to high security risks In-network processing integrity and confidentiality

Fault Tolerance Causes of errors Measurement errors of sensor Transmission errors Loss of information since lossy compression Interference brought in by compromised nodes Attacks

Fault-tolerant request Fault Tolerance Network can identify, filter the wrong message Ensure the end-user to make the correct decision Fault-tolerant strategy For data errors at nodes Improving the accuracy of measurement, dense deployment, data aggregation For transmission problems reliable transmission Against various attacks establishing a security framework to resist all kinds of attacks

Summary Wireless sensor network is a brand new kind of network, the demand for the applications accelerates its research. Researchers have done a lot of studies in deployment, networking, data querying, and routing. Many experimental systems have been applied now. There are still many challenges in WSNs, such as power supplies, security, fault-tolerance, cross layer design, and standardization. Breakthrough of these issues can significantly promote the practicability of WSNs.

References M. Ilyas and I. Mahgoub, Handbook of Sensor Networks: Compact of wireless and wired sensing systems, CCR Press LLC, 2005. Main related work teams: IPSN (information processing in sensor networks); SenSys; EWSN (European workshop on wireless sensor networks); SNPA (sensor network protocols and applications); WSNA (wireless sensor networks and applications) Related international conferences: ICC, Globecom, INFOCOM, MobiCom, MobiHoc

Thank you! Q&A