Wireless Sensor Networks: From Science to Reality. Kay Römer ETH Zurich

Similar documents
Generic Role Assignment for Wireless Sensor Networks

Deployment of Sensor Networks: Problems and Passive Inspection. Matthias Ringwald, Kay Römer (ETH Zurich)

Lecture 8 Wireless Sensor Networks: Overview

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Wireless Embedded Systems ( x) Ad hoc and Sensor Networks

Wireless Sensor Networks

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Wireless Sensor Networks CS742

References. The vision of ambient intelligence. The missing component...

Wireless Sensor Networks (WSN)

Passive Distributed Assertions for Sensor Networks

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl

Time Synchronization in Wireless Sensor Networks: CCTS

Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks

TAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS

Rumor Routing Algorithm

WSN Routing Protocols

Ad hoc and Sensor Networks Chapter 3: Network architecture

Part I. Wireless Communication

CSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Presented by Viraj Anagal Kaushik Mada. Presented to Dr. Mohamed Mahmoud. ECE 6900 Fall 2014 Date: 09/29/2014 1

Designing a ZigBee Network

Chapter 7: Naming & Addressing

Reservation Packet Medium Access Control for Wireless Sensor Networks

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

BTnodes. Scaling it up. Networking using the BTnode Platform. Jan Beutel. Computer Engineering and Networks Laboratory

The PermaSense Project Wireless Sensor Networks for Extreme Environments. Jan Beutel ETH Zurich

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Wireless Sensor Networks

Sabareesan M, Srinivasan S*,John Deva Prasanna D S

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

CSE 461: Wireless Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks

4/22 A Wireless Sensor Network for Structural Health Monitoring. Gregory Peaker

SENSOR-MAC CASE STUDY

Wireless Sensor Networks

Routing protocols in WSN

CSMA based Medium Access Control for Wireless Sensor Network

Wireless Sensor Networks

By Nick Giannaris. ZigBee

QoS-Enabled Video Streaming in Wireless Sensor Networks

Wireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO

Celtic-Plus Award winning projects present their results CIER

Introduction to Mobile Ad hoc Networks (MANETs)

CONCLUSIONS AND SCOPE FOR FUTURE WORK

CS 268: Computer Networking. Taking Advantage of Broadcast

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Overview of Sensor Network Routing Protocols. WeeSan Lee 11/1/04

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis

Ad hoc and Sensor Networks Chapter 3: Network architecture

Ad hoc and Sensor Networks Chapter 3: Network architecture

Deployment, Test and Validation of Sensor Networks

WSN WIRELESS WSN WSN WSN. Application agriculture SENSOR. Application geophysical. Application agriculture NETWORK: 11/30/2016

Real-Time (Paradigms) (47)

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 2: ANATOMY OF A SENSOR NODE Anna Förster

AIM: To create a project for implement a wireless communication protocol on an embedded system- ZigBee.

Principles of Wireless Sensor Networks

A Study on Systems Beyond IMT-2000 in Korea

Mobile Communications. Ad-hoc and Mesh Networks

WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

15-441: Computer Networking. Wireless Networking

Sensor Networks. Part 3: TinyOS. CATT Short Course, March 11, 2005 Mark Coates Mike Rabbat. Operating Systems 101

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

Collecting and processing data from wireless sensor networks

Routing for Wireless Multi Hop Networks Unifying and Distinguishing Features

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

DASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN. public

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

An Active Tracking System Using IEEE Based Ultrasonic Sensor Devices

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

Prianka.P 1, Thenral 2

Addressing Unique M2M Challenges with Converged Gateways

Presented by: Murad Kaplan

RANtoCoreTM. Delivering the most realistic test environments

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

PDA: Passive Distributed Assertions for Sensor Networks

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Sleep/Wake Aware Local Monitoring (SLAM)

Visibility: A New Metric for Protocol Design

CS551 Ad-hoc Routing

ECE 586 Advanced Topics: Wireless Networking

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

WIRELESS SENSOR NETWORK S LIFE TIME ENHANCEMENT WITH AID OF DATA FUSION, LEACH-C AND SPREADING TECHNIQUES

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

Introduction to Networked Embedded Systems and Course Description. Song Han Office: ITEB 355

Sensor Networks for Structural Monitoring: Status, Plans, Problems. Ananth Grama

CSC 774 Advanced Network Security

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

An Efficient Low Power Transmission Over Long Range in Wireless Sensor Networks for environmental studies

A Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

TDMH-MAC: Real-time and multi-hop in the same wireless MAC

Mobile Ad-hoc Networks. Computer Networks

Robust Multi-Hop Time Synchronization in Sensor Networks

Transcription:

Wireless Sensor Networks: From Science to Reality Kay Römer ETH Zurich

Sensor Networks Ad hoc network of sensor nodes Perceive (sensors) Process (microcontroller) Communicate (radio) Autonomous power supply power module cc2250 transceiver Zigbee transceiver 3D accelerometer flash modularization miniaturization 2

D. Culler [Berkeley] Application Visions 3

Reality #1 Micro climate in Redwoods 44 days 50 nodes per tree UC Berkeley 4

Reality #2 Bridge vibrations due to wind / seismic Days 59 nodes UC Berkeley 5

Reality #3 Volcanic eruptions 4 days 10 nodes Harvard 9 km 6

Reality #4 Sniper localization Days 60 nodes Vanderbilt 7

Vision = Reality? Scientific experiments Developed and deployed by experienced computer scientists Small scale, short term Supervised operation (Almost) no real-world applications Developed and deployed by application domain experts Large scale, long term Unattended operation 8

Why? Source: OnWorld WSN Report 9

Ease of Use / Robustness Some exemplary citations from people who developed and deployed sensor networks Depends on individual skill of developers [Cerpa01] Many iterations of system design / implementation required [Mainwaring02] Involves significant manpower [Hemingway04] Involves a certain amount of luck [Szewczyk04] Everything that could go wrong did go wrong [Langendoen06] 10

What is different? Worst of distributed and embedded worlds Dynamic, unreliable networks Links come and go Nodes come and go Mobility Constrained resources Simple OS System-centric programming Many competing optimization goals Limited visibility Application development and deployment very difficult! 11

WSN Application Lifecycle High-level application idea Write code Install and verify correctness: Real world setting Large scale Vision Design Implementation Test Deployment Operation Devise / chose HW/SW Platform System architecture Protocols Algorithms Verify correctness: Lab setting Small scale 12 Use and maintenance

high Level of abstraction Abstraction High-level application functionality Application QoS requirements Application low Node-level resource management Link-level communication aspects System Vision Design Implementation Test Deployment Operation Isolated solutions for lifecycle phases Low and varying level of abstraction 13

An Integrated Approach Level of abstraction high High-level Application Specification compilation low Execution Verification Vision Design Implementation Test Deployment Operation A single high-level application specification drives Implementation Test Deployment 14

High-level Specification High-level Application Specification compilation Execution Verification 15

Desirable Languages Declarative Specify desired application behavior Not: how to achieve this behavior Node ensembles Specify behavior of a group of nodes or whole network Not: individual nodes # neighbors with a temperature sensor 1. Send request containing... 2. Wait 10 seconds 3. Perhaps retransmit 4. Count distinct replies 16

Example: Role Assignment Support for self-configuration Initially, all nodes are (more or less) identical Nodes take on specific functions Examples Clustering: HEAD, SLAVE, GATEWAY Coverage: ON, OFF Aggregation: SOURCE, AGGREGATOR 17

Generic Role Assignment Supports automatic assignment of roles to sensor nodes Maintain valid assignment as network changes Declarative role specifications Definition of roles Definition of rules (constraints) for assignment Rules refer to node properties 18 battery = 80% pos = (12.3, 3.4) role = ON

Coverage [cf. PEAS] ON :: { battery >= threshold && count(1 hop) { role == ON && dist(pos, super.pos) < R } == 0 } OFF :: else count(scope) { pred } Counts nodes matching pred within scope super.x equals property x of referring node 19

Clustering [cf. Passive Clustering] CLUSTERHEAD :: { count(1 hop) { role == CLUSTERHEAD } == 0 } GATEWAY :: { cheads == retrieve(1 hop, 2) { role == CLUSTERHEAD } && count(2 hops) { role == GATEWAY && cheads == super.cheads } == 0 } SLAVE :: else retrieve(scope, num) { pred } == cheads At least num nodes in scope must fulfil pred Bind the 2 nodes to cheads 20

Execution High-level Application Specification compilation Execution Verification Map high-level application functionality to node-level behavior Resource constraints Network dynamics 21

Distributed Algorithm Property propagation Derive scope Scoped broadcast Rule evaluation Evaluate all rules locally Assign first matching role Re-propagate changed properties Scheduling ON :: { count(1 hop) { role == ON } == 0 } OFF :: else Random delays to break synchronization Notification Notify application of stable roles Distributed fix-point iteration In practice very few iterations (see paper) 22

Role Initialization Base algorithm All nodes start with role UNDEFINED Probabilistic role initialization Guess initial roles for each node Repair wrong guesses with base algorithm Goal: faster convergence Two variants Use only static information Use runtime information (see paper) 23

Static Initialization Basic approach Given: role specification, network density N Compute: P[r] = P[node assumes role r] Role init.: according to probabilities Translate spec. to equation system P[ON] = P[no neighbors are ON] = (1 P[ON]) N P[OFF] = 1 P[ON] Solve for P[ON], P[OFF] ON :: { count(1 hop) { role == ON } == 0 } OFF :: else 24

Verification High-level Application Specification compilation Execution Verification Verify system behavior against highlevel specification Resource constraints Limited visibility of network state 25

Verification Challenges Not a binary YES/NO answer If NO, what and where is the problem? Verification of deployed network Behavior differs to lab setting due to radio channel, sensor input, physical strain Key challenge: limited visibility of the network state Once deployed, how can we access the state of nodes? Limited resources: no space/bandwidth for verification Heisenberg effect: measurement changes system behavior 26

Passive Verification Wireless traffic reveals parts of network state Message contents (e.g., node role) Message timing Approach: overhear network traffic Pro: No modification of sensor network Con: Additional hardware, incomplete information 27

A Stethoscope for WSN A tool to support passive verification of sensor networks Co-deployed with WSN Only active during deployment Plentiful resources / energy Removed after deployment Reuse for other deployments 28

Stethoscope Architecture WSN radio communication Sniffer Node state Verification Visualization captures and decodes packets infer node state from packets of node states with high-level specification of node states and verification results 29

Sniffer Additional node with compatible radio Always on to capture all packets without participating in MAC protocol (e.g., sleep scheduling) Placed next to WSN Forward packet stream to base station For centralized evaluation 30

Sniffer Network Single sniffer cannot observe complete WSN Network of sniffer nodes (synchronized) Sniffer nodes have a second radio High-bandwidth, robust (Bluetooth, WLAN, cable,...) Free of interference with WSN radio DB 31

Node State Inference Infer relevant state of individual nodes from overheard messages E.g., role of each node, network neighbors Also basic node state Node death: no messages Node reboot: seq number reset Key problem: incomplete information Message loss Missing information in WSN protocol 32

Incomplete Information Missing information (e.g., neighbors) Generation of protocols from high-level spec under our control We are free to include information in protocol as long as it is small enough Message loss Cannot be avoided, but detected! Sequence number in each message (received n, but not n-1) Timing irregularities (expected transmission at t not received) 33

Fundamental Trade-Offs Main parameters of state inference Accuracy (correctness of inferred state) Latency (delay of state inference) Message loss (number of sniffer nodes) InAccuracy Latency [factor] 34 Message loss [%]

Verification Map high-level specification to checker Deal with incomplete information Distinguish errors and potential errors Verification easy compared with execution Centralized instead of distributed Checking instead of producing a role assignment 35

Visualization Node state Correctness at node level OK, Warning, Error 36

Summary Gap between application visions and reality Two reason: ease of use / robustness WSN application lifecycle Low level of abstraction Isolated solutions An integrated approach Single high-level application specification drives implementation, test, and deployment Example: Generic role assignment Declarative specification language Role assignment algorithms Passive verification 37

Thanks! More details: Algorithms for Generic Role Assignment in Sensor Networks, Sensys 2005. Passive Inspection of Sensor Networks, DCOSS 2007. 38