In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection



Similar documents
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

Growth Codes: Maximizing Sensor Network Data Persistence

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Secure Network Coding via Filtered Secret Sharing

Image Compression through DCT and Huffman Coding Technique

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Binary Search Trees. Data in each node. Larger than the data in its left child Smaller than the data in its right child

LOAD BALANCING MECHANISMS IN DATA CENTER NETWORKS

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Linear Codes. Chapter Basics

ECE/CS 372 introduction to computer networks. Lecture 13

Functional-Repair-by-Transfer Regenerating Codes

Approximation Algorithms

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

How To Encrypt Data With A Power Of N On A K Disk

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

A binary heap is a complete binary tree, where each node has a higher priority than its children. This is called heap-order property

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Network Monitoring in Multicast Networks Using Network Coding

Social Media Mining. Graph Essentials

Coding and decoding with convolutional codes. The Viterbi Algor

Decentralized Utility-based Sensor Network Design

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Plaxton Routing. - From a peer - to - peer network point of view. Lars P. Wederhake

Sublinear Algorithms for Big Data. Part 4: Random Topics

query enabled P2P networks Park, Byunggyu

Practical Graph Mining with R. 5. Link Analysis

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik

How To Balance Network Load In A Wireless Sensor Network

3/25/ /25/2014 Sensor Network Security (Simon S. Lam) 1

KDDCS: A Load-Balanced In-Network Data-Centric Storage Scheme for Sensor Networks

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Path Selection Methods for Localized Quality of Service Routing

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

Proactive Prioritized Mixing of Scalable Video Packets in Push-Based Network Coding Overlays

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

VEHICLE ROUTING PROBLEM

Group Testing a tool of protecting Network Security

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

Data Caching in Networks with Reading, Writing and Storage Costs

Network Coding for Security and Error Correction

vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

Load Balancing. Load Balancing 1 / 24

Broadcasting in Wireless Networks

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Gossip Algorithms. Devavrat Shah MIT

Polarization codes and the rate of polarization

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

CMPSCI611: Approximating MAX-CUT Lecture 20

Social Media Mining. Data Mining Essentials

D1.1 Service Discovery system: Load balancing mechanisms

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.

A Novel Routing and Data Transmission Method for Stub Network of Internet of Things based on Percolation

NEW applications of wireless multi-hop networks, such

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

Development and Evaluation of Point Cloud Compression for the Point Cloud Library

Algorithmic Techniques for Big Data Analysis. Barna Saha AT&T Lab-Research

Routing in packet-switching networks

EPL 657 Wireless Networks

Quality of Service Routing Network and Performance Evaluation*

Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring

In-network Outlier Cleaning for Data Collection in Sensor Networks

Content Delivery Networks. Shaxun Chen April 21, 2009

Transcription:

In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection Michele Albano Jie Gao Instituto de telecomunicacoes, Aveiro, Portugal Stony Brook University, Stony Brook, USA

Data collection Gather sensor data to a base station Traditional approach: Build aggregation tree rooted at the sink E.g., TinyDB family. Problem: Sensors near sink are overloaded. Sink disconnected from the network prematurely. Our approach: mobile sink, or, data mule.

Data collection using mules Network of n nodes, with k of them have data. Data mules tour around to pick up data. Challenge #1: path planning TSP or multi-tsp problem, NP-hard. Random walk. Coupon collection O(n 2 ) hops to cover all nodes.

Data collection using mules Network of n nodes, with k of them have data. Data mules tour around to pick up data. Challenge #2: information brokerage Challenge #2: information brokerage Mule is not aware of the data nodes. In any predetermined scheme, mule may visit many nodes without data. Need data processing, i.e., data nodes initiate certain actions

Our approach: in-network coding Sensor data are stored in encoded format in the network. Original data: symbols s 1,s 2,, s k. Coded data: codewords w 1,w 2,, w n. We use random linear coding: Codeword = random linear combination of symbols, w j = k i=1 s i λ ij. Every node keeps a different codeword.

Data mule collection and decoding Data mule visit anyk nodes and collect k codewords If the coefficient matrix is full rank, the symbols can be recovered. [ ] s[λ ij ]=w Main focus: how to build codewords in distributedand communication efficient manner?

Gossip algorithms In a round, each node: Selects another node randomly Exchanges information via multi-hop routing Repeats every round Simple Distributed Robust to link dynamics, transmission errors 7

Types of gossip Uniform/Geographic gossip Select a node q uniformly randomly and gossip [Dimakis, Sarwate, Wainwright, IPSN 06] Spatial Gossip Select a node q at distance r with probability 1/r α. [Kempe, Kleinberg, Demers, STOC 01] 8

Communication cost Uniform/Geographic gossip Cost per step ~ O(n n) # rounds for a message to reach everyone ~ O(logn) Spatial Gossip Prob=1/r 2, cost per step ~O(n n) Prob=1/r 3, cost per step ~O(nlogn) # rounds for a message to reach everyone ~ O(logn) 9

Spatial gossip for in-network coding Nodes proceed in synchronous rounds Each node p: 1. Multiply its current data by a random coefficient; 2. Send it to node q chosen by spatialdistribution; 3. Store linear combination of all data received. Use total O(log 3.4 n) rounds. Total communication cost = O(n log 4.4 n)

Theorems Theorem: The codeword at each node has a non-zero coefficient for any symbol w.h.p. Theorem: Any k codewords can decode for the original symbols with prob 1 if n. Mule can successfully decode by picking up any k codewords!

Simulations 700 nodes in a square region Compare 4 schemes: Uniform gossip v.s. spatial gossip Disseminate codewords v.s. symbols. Major metrics to evaluate: Decoding success rate Communication cost

Frequency of correct reconstruction Spatial coded gossip

Routing cost in hops Spatial coded gossip

Frequency of correct reconstruction # gossip rounds for correct reconstruction: Uniform non-coded 230 rounds Uniform coded 10 rounds Spatial coded 20 rounds Spatial non-coded Too many rounds Total routing cost for correct reconstruction: Uniform non-coded 353,000 hops Uniform coded 90,000 hops Spatial coded 30,000 hops Spatial non-coded too high

Online reconstruction Decode symbols as soon as possible. Each round is composed of ONE gossip round ONE data collection step of the mule Degree of a codeword: # symbols with nonzero coefficients. grows exponentially in spatial gossip. For online construction, degree should grow much slower.

Our heuristic for codeword degree

Collected codewordsvs reconstructed symbols

Conclusions & Future Work Combining spatial gossip with coding results in an efficient data collection mechanism It is possible to implement online data reconstruction What is the best threshold for code degree for online collection?

Thank you! Questions and comments?