SoNIC: Classifying Interference in 802.15.4 Sensor Networks Frederik Hermans et al. Uppsala University, Sweden IPSN 2013 Presenter: Jeffrey.

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
1 Understanding and Mitigating the Impact of RF Interference on Networks Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Xiaolong Zheng, Zhichao Cao, Jiliang Wang, Yuan He, and Yunhao Liu SenSys 2014 ZiSense Towards Interference Resilient Duty Cycling in Wireless Sensor Networks.
Transmission Power Control in Wireless Sensor Networks CS577 Project by Andrew Keating 1.
Surviving Wi-Fi Interference in Low Power ZigBee Networks Chieh-Jan Mike Liang, Nissanka Bodhi Priyantha, Jie Liu, Andreas Terzis Johns Hopkins University,
Enhancing Vehicular Internet Connectivity using Whitespaces, Heterogeneity and A Scouting Radio Tan Zhang ★, Sayandeep Sen†, Suman Banerjee ★ ★ University.
1 Wireless Sensor Networks Akyildiz/Vuran Administration Issues  Take home Mid-term Exam  Assign April 2, Due April 7  Individual work is required 
Experimental evaluation of TCP-L June 5, 2003 Stefan Alfredsson Karlstad University.
Presented at ICC 2012 – Wireless Network Symposium – June 14 th 2012.
Polymorphic blending attacks Prahlad Fogla et al USENIX 2006 Presented By Himanshu Pagey.
1 Multi-channel Interference Measurement and Modeling in Low-Power Wireless Networks Guoliang Xing 1, Mo Sha 2, Jun Huang 1 Gang Zhou 3, Xiaorui Wang 4,
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 11th Lecture Christian Schindelhauer.
Evaluating the Cost of Frequency Diversity in Communication and Routing Overview Jorge Ortiz* ♦ David Culler* Causes of Loss  Pairs of nodes sharing a.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
A Framework for Patient Monitoring A. L. Praveen Aroul, William Walker, Dinesh Bhatia Department of Electrical Engineering University of Texas at Dallas.
CC2420 Channel and RSSI Evaluation Nov/22/2006 Dept. of EECS, UC Berkeley C O nnect vityLab i.
Distributed Structural Health Monitoring A Cyber-Physical System Approach Chenyang Lu Department of Computer Science and Engineering.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Paper Presentation Wi-Fi (802.11b) and Bluetooth: Enabling Coexistence Jim Lansford, Ron Nevo, and Brett Monello CSC8900 Presented by: Tu Tran.
ZIGBEE Compared to BLUETOOTH
DOF: A Local Wireless Information Plane Stanford University Steven HongSachin Katti 1 August 17, 2011.
BMWnet Wshnt.kuas.edu.tw Mesh Networks Prof. W.S. Hwang.
Multimedia and Mobile communications Laboratory Augmenting Mobile 3G Using WiFi Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani Jimin.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo and David Culler University of California at Berkeley Intel Research ACM SIGMOBILE.
Qian Zhang and Christopher LIM Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE ICC 2009.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Understanding the Real-World Performance of Carrier Sense MIT Computer Science and Artificial Intelligence Laboratory Networks and Mobile Systems
RushNet: Practical Traffic Prioritization for Saturated Wireless Sensor Networks Chieh-Jan Mike Liang †, Kaifei Chen ‡, Nissanka Bodhi Priyantha †, Jie.
KARTIK DABBIRU Roll # EE
Dynamic channel allocation in wireless ad-hoc networks Anup Tapadia Liang Chen Shaan Mahbubani.
Support WiFi and LTE Co-existence
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point DSN 2010 Yimin Song, Texas A&M University Chao Yang, Texas A&M University.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Convergecast with MIMO Luoyi Fu, Yi Qin, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Xue Liu Department of Computer.
Tarun Bansal, Bo Chen and Prasun Sinha
Packet Dispersion in IEEE Wireless Networks Mingzhe Li, Mark Claypool and Bob Kinicki WPI Computer Science Department Worcester, MA 01609
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
RushNet: Practical Traffic Prioritization for Saturated Wireless Sensor Networks Chieh-Jan Mike Liang †, Kaifei Chen ‡, Nissanka Bodhi Priyantha †, Jie.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Branislav Kusy, Christian Richter, Wen Hu, Mikhail Afanasyev, Raja Jurdak, Michael Brunig, David Abbott,
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
mZig: Enabling Multi-Packet Reception in ZigBee
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
DEEJAM : Defeating Energy-Efficient Jamming in IEEE based Wireless Networks Paper Authors: Anthony D. Wood John A. Stankovic Gang Zhou Presented.
Doc.: IEEE /00144r0 Submission 3/01 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks Dialog with FCC Nada.
Defeating Energy-Efficient Jamming in IEEE based Wireless Networks By: y D. Wood, John A. Stankovic, and Gang Zhou, University of Virginia Presented.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained.
Doc.: IEEE /482r0 Submission October 2001 Steve Shellhammer, Symbol Technologies Slide 1 IEEE P Working Group for Wireless Personal Area.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
Overcoming the Sensing-Throughput Tradeoff in Cognitive Radio Networks ICC 2010.
Frame counter: Achieving Accurate and Real-Time Link Estimation in Low Power Wireless Sensor Networks Daibo Liu, Zhichao Cao, Mengshu Hou and Yi Zhang.
Dirk Grunwald Dept. of Computer Science, ECEE and ITP University of Colorado, Boulder.
Wireless Communication David Kopczyk. AM/FM Most current wireless tech utilizes FM Radio Transmission.
1 ICCCN 2003 Modelling TCP Reno with Spurious Timeouts in Wireless Mobile Environments Shaojian Fu School of Computer Science University of Oklahoma.
Error analysis and low-cost error correction for the crowded wireless 2.4 GHz band Mark Grossman ’11, Jens Mache Lewis & Clark College 1.
RushNet: Practical Traffic Prioritization for Saturated Wireless Sensor Networks Chieh-Jan Mike Liang†, Kaifei Chen‡, Nissanka Bodhi Priyantha†, Jie Liu†,
Aggressive Synchronous Transmissions with In-network Processing
Presentation transcript:

SoNIC: Classifying Interference in Sensor Networks Frederik Hermans et al. Uppsala University, Sweden IPSN 2013 Presenter: Jeffrey

Outline Introduction Classifying Corrupted Packets The SoNIC System Microbenchmarks Evaluation Augmenting A Mobile Sink With SoNIC Discussion Conclusion

Outline Introduction Classifying Corrupted Packets The SoNIC System Microbenchmarks Evaluation Augmenting A Mobile Sink With SoNIC Discussion Conclusion

Introduction Due to a rapid increase in the number of technologies and devices operating in the license- free 2.4 GHz band – Radio interference becomes an increasing problem for low-power wireless sensor networks It has been shown that interference from other devices reduces sensor network performance – as it causes packet loss, reduces throughput, increases delay, and drains the sensor nodes’ limited energy reserves

SoNIC Sensor Network Interference Classification (SoNIC) system Takes a novel path to interference detection Rather than actively sampling the spectrum A node using SoNIC detects interferers by – considering individual corrupted packets – packets that the node has received, but for which the received payload did not match the packet’s checksum

Fingerprint Through extensive measurements, it has been established that different interferers corrupt individual packets in distinct patterns – thereby leaving a “fingerprint” on the packet The interferer’s fingerprint becomes visible in – (i) how the signal strength varies during packet reception – (ii) in the link quality indication (LQI) associated with the packet – (iii) which bytes of the payload are corrupted

Retransmissions SoNIC exploits retransmissions to identify the corrupted parts of a packet By solely relying on corrupted packets from regular sensor network traffic – SoNIC does not incur additional communication costs

Outline Introduction Classifying Corrupted Packets The SoNIC System Microbenchmarks Evaluation Augmenting A Mobile Sink With SoNIC Discussion Conclusion

Outline Introduction Classifying Corrupted Packets The SoNIC System Microbenchmarks Evaluation Augmenting A Mobile Sink With SoNIC Discussion Conclusion

Outline Introduction Classifying Corrupted Packets The SoNIC System Microbenchmarks Evaluation Augmenting A Mobile Sink With SoNIC Discussion Conclusion

Memory Overhead SoNIC’s memory requirements are dominated by the need to store the decision tree in the sensor node’s RAM, which requires 1.8 KB SoNIC uses 1 KB to store corrupted packets in the FIFO buffer for later matching Furthermore, another static buffer of 128 bytes is used to store valid packets – so they can be matched after they have been processed by the network stack

Computational Overhead comprised of feature calculation and classification Select 1000 packets at random from the testing set Measure the time it takes to calculate features and classify them on a TelosB node

Computational Overhead Mean feature calculation time of 26.5 ms (σ = 7.0 ms) is dominated by normalizing the RSSI values – accounts for about 60% of the total calculation time – because it requires repeated 32-bit integer divisions One classification takes 1.2 ms on average (σ = 0.5 ms)

Accuracy of Decision Tree Classifier

Outline Introduction Classifying Corrupted Packets The SoNIC System Microbenchmarks Evaluation Augmenting A Mobile Sink With SoNIC Discussion Conclusion

Detection Results

Outline Introduction Classifying Corrupted Packets The SoNIC System Microbenchmarks Evaluation Augmenting A Mobile Sink With SoNIC Discussion Conclusion

Mitigation The mobile sink implements two exemplary mitigation strategies When WiFi interference is detected, the mobile sink switches communication to another channel, separated 30 MHz from the interfered channel In this way, it avoids a frequency overlap with the WiFi channel

Mitigation To mitigate microwave interference, the nodes time their transmission – so they do not coincide with the microwave emissions Microwave emissions are very regular in time, following a 10 ms on, 10 ms off pattern

Outline Introduction Classifying Corrupted Packets The SoNIC System Microbenchmarks Evaluation Augmenting A Mobile Sink With SoNIC Discussion Conclusion

Discussion SoNIC’s classifier distinguishes between – WiFi – Bluetooth – microwave oven interference – packets that are corrupted due to low TX power To add detection capabilities for a new interference type – suitable features must be defined – classifier needs to be retrained

Discussion Have not performed any explicit experiments with multiple interferers SoNIC is currently designed to identify the main interferer The voter chooses the most common class of packets in the window as the interfering state and passes this state to the application To address multiple interferers of different kinds, – Should change the voting algorithm to, for example, estimate the likelihood of the presence of a specific interferer

Outline Introduction Classifying Corrupted Packets The SoNIC System Microbenchmarks Evaluation Augmenting A Mobile Sink With SoNIC Discussion Conclusion

Sensor networks that use at 2.4 GHz face cross-technology interference from many other technologies operating in the same frequency band Previous research has shown that interference mitigation in sensor networks can be more effective if the type of interference is known This paper addressed the problem of classifying and detecting interference in a sensor network

Conclusion Introduced a novel approach to interference classification that considers individual, corrupted packets – rather than using costly continuous spectrum sampling Evaluation has shown that our implementation of the approach is sufficiently lightweight for use on resource-constrained sensor nodes It correctly detects the predominant interferer in an uncontrolled office environment

Comments Strength – Good writing – Logical structure – Best Paper Runner Up - SPOTS Track – Sensor Platforms, Tools and Design Methods (SPOTS) – Information Processing (IP) track Weakness – Is it really powerful?