Adaptive Wireless Sensor Networks. Professor Jack Stankovic Department of Computer Science University of Virginia October 12, 2003

Similar documents
RT-QoS for Wireless ad-hoc Networks of Embedded Systems

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Mac Protocols for Wireless Sensor Networks

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Introduction to Wireless Sensor Network Security

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Security for Ad Hoc Networks. Hang Zhao

Optimized Load Balancing Mechanism Using Carry Forward Distance

Security in Ad Hoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Energy Efficiency of Load Balancing in MANET Routing Protocols

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Tranzeo s EnRoute500 Performance Analysis and Prediction

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Towards Efficient Routing in Vehicular Ad Hoc Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

IJMIE Volume 2, Issue 7 ISSN:

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

High-Frequency Distributed Sensing for Structure Monitoring

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Wireless Sensor Network: Improving the Network Energy Consumption

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

Configuring PROFINET

Denial of Service in Sensor Networks

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Energy Consumption analysis under Random Mobility Model

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Quality of Service Support in Mobile ad-hoc IP Networks *

Customer Specific Wireless Network Solutions Based on Standard IEEE

Remote Home Security System Based on Wireless Sensor Network Using NS2

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Securing MANET Using Diffie Hellman Digital Signature Scheme

Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks

Halmstad University Post-Print

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Wireless Mesh Networks under FreeBSD

Real-Time (Paradigms) (51)

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

Intelligent Transportation System for Vehicular Ad-Hoc Networks

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Road-Based Routing Protocol for Vanet Using Sumo and Move

-MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks

AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE S BASED CAMPUS MESH NETWORKS

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

Attacks on neighbor discovery

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

LIST OF FIGURES. Figure No. Caption Page No.

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

Protocol Design for Neighbor Discovery in AD-HOC Network

Internet of Things. Exam June 24

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

6LoWPAN Technical Overview

Location-Aided Routing (LAR) in mobile ad hoc networks

A Stream-Oriented Power Management Protocol for Low Duty Cycle Sensor Network Applications

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Data Management in Sensor Networks

Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA)

Wireless Clinical Scale!

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Advanced Transportation Management Systems

Energy Optimal Routing Protocol for a Wireless Data Network

TOPOLOGIES NETWORK SECURITY SERVICES

Wireless LAN Concepts

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

CHAPTER 1 INTRODUCTION

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

EETS 8316 Wireless Networks Fall 2013

Gossiping using the Energy Map in Wireless Sensor Networks

Transcription:

Adaptive Wireless Sensor Networks Professor Jack Stankovic Department of Computer Science University of Virginia October 12, 2003

Outline Characteristics of WSN Middleware services act as the OS Next Generation RTS An application (built and demonstrated a WSN) Stress the need for adaptation Adaptation Using Feedback Controllers Routing Packet Aggregation Summary

Wireless Sensor Networks Sensors Actuators CPUs/Memory Radio

Characteristics of WSNs Self-configuring (self-*) Dynamic topology changes Unattended operation High degree of faults, lost messages, etc. Limited resources (especially power) 4 MHz cpu; 128 KB memory; 40 Kbps Operate in (un) or limited controlled environments Operate in real-time environment with real-time constraints A new real-time system type!

Adaptive Power Management 4. Hidden sensor (camera), activated via mote network detects target 5. Repeater exfiltrates target info to base. 1. UAV deploys motes Zzz... 0. Carefully emplaced sensor 3. Ad hoc network detects vehicle and wakes up remote sensor 2. Motes establish ad hoc network, form a coordinate grid, and create sentry service

Experimental Setup Deployed in outdoor swampy area Placed by hand 70 Berkeley motes (MICA IIs) Spread across 300 feet Laptop that emulated SOCOM relay 2 video cameras that emulated SOCOM devices Actual remote (still) camera activated ½ mile away Display

Goals Power management (extend the lifetime of the system) Adapt to current power levels and alive nodes Real-Time Tracking Adapt to speeds Adapt to false alarm rates Modify functionality of the system

Protocols Implemented Estimation And Tracking Display Middleware Layer Set Param. Time Syn Group Management Sentry Service Network Layer Routing Localization Data Link Layer MAC Protocol

Demo Scenario Phase I - Initialization clock synchronization and system parameter settings (adaptive) (sensor and false alarm thresholds; size of forward area; etc.) location discovery (used fixed values replaced by location service) neighbor discovery sentry selection (adaptive) reliability of route to relays/base stations backbone creation backbone commit power management (adaptive) sleep/wakeup cycles; rotation period report status (awake, sentry, sleep)

SBPM Cycles and Phases Start SBPM Critical times, everybody is awake time Stop SBPM Cycles Neighbor Discovery Backbone Creation Phases in a cycle Time Synchronization Sentry Selection Surveillance and Power Management < 2 minutes ~1 day

Initialization/Spanning Tree

Demo Scenario Phase II - Detect and Track Entity Vehicle enters mote field Wake up first video camera Wake up remote camera (1/2 mile away) Tracking confidence level (adaptive) of track shown (forwarding area is function of speed) As vehicle moves out of range turn on second camera and shut down the first one

Waking Up -Tracking

Group Management IR Camera

Tracking Adaptive adjust size of follower area IR Camera

Demo Scenario Phase III Don t Detect Person Person walks through the area Original goal detect vehicles so do not detect this person Send vehicle back through the area detect and turn on cameras

Demo Scenario Phase IV - Sentry Rotation After 1 day (5 minutes in demo) or if power drops too much (adaptive) rotate sentries to balance energy consumption

Sentry Power

Demo Scenario Phase V - Detect Person Wireless download of new mission functionality (system adapting to new missions) Person walks through the area and is now detected Turn on cameras Vehicles still detected

Adaptive Parameters Times of rounds Sleep/wakeup times Confidence levels for false alarm processing Thresholds for sensors Communication ranges Power savings policies (awake, idle, sleep, ) Active density required Forwarding range on group management Etc.

Sensor Net Adaptive Routing Destination End-to-end Real-time Collisions Congestion Source Assumption: Nodes know location

Sensor Network Routing Current solutions DSDV needs routing tables the size of the network Most use single path to destination (DSR, AODV, ) Many use path finding beacons - bad for real-time SPEED (first to deal with soft real-time in WSN) local (neighbor) tables only utilize multiple paths no set-up beacons needed

SPEED Protocol API (and last mile processing) Neighbor Beacon Exchange Delay Estimation Scheme Neighborhood Feedback Loop (NFL) Maintains single hop relay speed Semi-Stateless Non-deterministic Geographic Forwarding (SNGF) Back-pressure Re-routing Void Avoidance

API (Last Mile Processing) Destination AreaMulticast AreaAnyCast Unicast Source

USE VELOCITY SPEED

RAP Velocity Monotonic Scheduling (HVF) Static compute velocity at source and maintain throughout every hop Dynamic change velocity at each hop depending on the current time and distance Source V1 V1 V1 V1 V1 Source V1 V2 V3 V4 V5 Destination Destination

Nondeterministic Forwarding Example 1: ID Position 9 ( 1,6) 7 (3,4) 3 (4,7) 2 (7,8) Delay 5 3 3 1 Compute Speed RP: Relay probability ID Position RP 2 (7,8) 100% Destination 7 9 s 2 3

Nondeterministic Forwarding Example 2: ID Position 9 ( 1,6) 7 (3,4) 3 (4,7) 2 (7,8) Delay 2 6 1 3 Compute Speed RP: Relay probability ID Position RP 9 ( 1,6) 50% 2 (7,8) 50% 7 Destination 9 s 2 3

Nondeterministic Forwarding Example 3: Example: Overload situation ID 9 7 3 2 Position ( x,y) (3,4) (4,7) (7,8) Delay 1 4 5 2 Compute Speed ID 7 3 Drop Position (3,4) (4,7) RP 45% 40% 15% Drop ratio is computed according to the Neighborhood feedback control loop

Feedback Control Collect miss ratio from neighbors MISO P controller Calculate the relay ratio Activated only when no valid next hop

Back-pressure Re-routing When all available forwarding nodes are congested, the sending node will drop packets, which is perceived by previous nodes. Route changes. ID 9 7 3 2 Position ( 1,6) (3,4) (4,7) (7,8) Delay 1 2 2 2 3 M 7 DROP Congestion Area 9 2

Evaluation 6 CBR flows on right side of terrain send to one base station on right side of terrain average number of hops (8-9) 90% CI (within 2-10% of mean) Under heavy congestion added flows in center of terrain Transient performance

Evaluation Delay (MS) 290 240 190 140 90 40 AODV DSR SPEED Rate (P/S) 0 10 20 30 40 50 60 70 80 90 100 (Added Congestion) Energy consumption (mwhr) E2E Delay Energy Consumption 40 35 30 25 20 15 10 5 0 AODV DSR SPEED GF SPEED-S SPEED-T Rate (P/S) 0 10 20 30 40 50 60 70 80 90 100

300 300 250 250 E2E Delay (MS) 200 150 E2E Delay (MS) 200 150 100 100 50 0 20 40 60 80 100 120 140 160 180 200 time(s) 300 Figure A. E2E delay profile of DSR 50 0 20 40 60 80 100 120 140 160 180 200 time(s) 300 Figure B. E2E delay profile of AODV 250 250 E2E Delay (MS) 200 150 E2E Delay (MS) 200 150 100 100 50 0 20 40 60 80 100 120 140 160 180 200 time(s) 50 0 20 40 60 80 100 120 140 160 180 200 time(s) Figure C. E2E delay profile of GF Figure D E2E delay profile of SPEED

Application Independent Data Aggregation Expensive to acquire the channel Small data packets Group data packets into 1 MAC packet Works in addition to other data aggregation techniques which are based on semantics

Major Architectural Difference

DYNAMIC/Adaptive FC Adaptive choice of N Take into account the output Queue delay Delay is used to adjust the output queue push rate and degree of aggregation

0.012 0.01 0.008 0.006 0.004 0.002 0 None FIX ONDEM AND DYN 0.6 1.8 3 4.2 5.4 6.6 Traffic ( #packet/second CBR flow) Figure 17: Energy per unit delivered (many-to-one) 50% reduction

0.012 0.01 0.008 0.006 0.004 0.002 0 None FIX ONDEM AND DYN 0.5 2.1 3.7 5.3 6.9 8.5 Traffic ( #packet/second CBR flow) Figure 18: Energy per unit delivered (many-to-many) 50% reduction

Evaluation 9000 8000 7000 6000 5000 None FIX ONDEM AND DYN 4000 3000 2000 1000 0 0.6 1.8 3 4.2 5.4 6.6 Traffic ( # packet/second per CBR flow) E2E Delay 80% reduction

Summary WSN need to be highly adaptive in many dimensions Use FC for some solutions Next generation real-time system Just scratching the surface with respect to realtime constraints OS Middleware

Publications SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks, T. He, J. Stankovic, C. Lu, and T. Abdelzaher, IEEE International Conference on Distributed Systems, May 2003. 1 of 5 nominated for best paper award (407 submissions). AIDA: An Adaptive Application Independent Data Aggregation Protocol,T. He, B. Blum, J. Stankovic, T. Abdelzaher, to appear ACM Transactions on Embedded Computing Systems (special issue). Range-Free Localization Schemes for Large Scale Sensor Networks, T.He, C. Huang, B. Blum, J. Stankovic, and T. Abdelzaher, In Mobicom, Sept. 2003. RAP: A Real-Time Communication Architecture for large Scale Wireless Sensor Networks, C. Lu, B. Blum, T. Abdelzaher, J. Stankovic, and T. He, RTAS, June 2002.

Publications Differentiated Surveillance for Sensor Networks, T. Yang, T. He and J. Stankovic, Sensys 2003, to appear. JAM: A Mapping Service for Wireless Sensor Networks, A. Wood, J. Stankovic and S. Son, RTSS 2003, to appear. Envirotrack: Towards an Environmental Computing Paradigm for Distributed Sensor Networks, T. Abdelzaher, et. al., submitted for publication.