Using Channel Diversity to Improve Security for Wireless Sensor Networks Matthew J. Miller University of Illinois at Urbana-Champaign.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Trust relationships in sensor networks Ruben Torres October 2004.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Investigating Mac Power Consumption in Wireless Sensor Network
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang (Kevin) Du, Jing Deng, Yunghsiang S. Han and Pramod K. Varshney Department.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Debate 1 - Defense Joseph Camp Anastasios Giannoulis.
Radio-Triggered Wake-Up Capability for Sensor Networks Soji Sajuyigbe Duke University Slides adapted from: Wireless Sensor Networks Power Management Prof.
Cross-Layer Designs for Energy-Saving Sensor and Ad hoc Networks Matthew J. Miller Preliminary Exam July 22, 2005.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
1 A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks Proceedings of the international conference on mobile technology,applications,and.
BMAC - Versatile Low Power Media Access for Wireless Sensor Networks.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
AN ENERGY CONSUMPTION ANALYTIC MODEL FOR WIRELESS SENSOR MAC PROTOCOL ERIC MAKITA SEPTEMBRE
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
Improving Power Save Protocols Using Carrier Sensing for Dynamic Advertisement Windows Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Minimizing Energy Consumption in Sensor Networks Using a Wakeup Radio Matthew J. Miller and Nitin H. Vaidya IEEE WCNC March 25, 2004.
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Adaptive Energy- Saving for Multihop Wireless Networks Matthew J. Miller University of Illinois at Urbana-Champaign.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
1 A Cross-Layer Architecture to Exploit Multi-Channel Diversity Jay A. Patel, Haiyun Luo, and Indranil Gupta Department of Computer Science University.
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication David K. Y. Yau Purdue University Department of Computer Science.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
SEA-MAC: A Simple Energy Aware MAC Protocol for Wireless Sensor Networks for Environmental Monitoring Applications By: Miguel A. Erazo and Yi Qian International.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Energy-Efficient, Application-Aware Medium Access for Sensor Networks Venkatesh Rajenfran, J. J. Garcia-Luna-Aceves, and Katia Obraczka Computer Engineering.
Smart Sleeping Policies for Wireless Sensor Networks Venu Veeravalli ECE Department & Coordinated Science Lab University of Illinois at Urbana-Champaign.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Exploring the Energy-Latency Trade-off for Broadcasts in Energy-Saving Sensor Networks Matthew J. Miller, Cigdem Sengul, Indranil Gupta Department of Computer.
Power-Efficient Rendez- vous Schemes for Dense Wireless Sensor Networks En-Yi A. Lin, Jan M. Rabaey Berkeley Wireless Research Center University of California,
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
MAC Protocols for Sensor Networks
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
MAC Protocols for Sensor Networks
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
Presentation by Andrew Keating for CS577 Fall 2009
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Investigating Mac Power Consumption in Wireless Sensor Network
E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks
Exploring Energy-Latency Tradeoffs for Sensor Network Broadcasts
Presentation transcript:

Using Channel Diversity to Improve Security for Wireless Sensor Networks Matthew J. Miller University of Illinois at Urbana-Champaign

2 “The number of WiFi hotspots in the United States increased from 3,400 to 21,500 between 2002 and 2004 […] that number is expected to grow […] to 64,200 by 2008, a 31.5 percent compound annual growth rate.” – David A. Gross, US Ambassador Bureau of Economic and Business Affairs “The number of RFID tags produced worldwide is expected to increase more than 25 fold between 2005 and 2010, reaching 33 billion, according to market research company In-Stat.” – EE Times “IDC now estimates there will be more than 100 million Bluetooth devices worldwide by the end of the year, and In-Stat/MDR expects a compound annual growth rate of 60 percent from 2003 to 2008.” – CNET.com TinyOS Sensor Operating System: Typically downloads per day – TinyOS Website Wireless Networking: It’s Kind of a Big Deal

3 Emerging Wireless Applications Copyright NCSA/UIUC

4 Why Use Multihop Wireless? Connectivity: Extend infrastructure at a low cost  Mesh and community Networks Ease of Deployment: Extend infrastructure quickly  Disaster scenarios  Sensor networks Performance: Increased capacity per node (W = Channel bitrate, N = Number of nodes)  Vehicular networks  Military operations Single Hop Network Multihop Network [Gupta00Capacity]

5 Some Research Challenges Improve performance  Exploit diversity (e.g., multiple channels, bitrates) Security and privacy  Resource constraints on cryptography  Tapping the channel to eavesdrop is much easier Energy efficiency  The power cable has proved remarkably resilient in this “wireless” world

6 Summary of My Work Exploiting channel diversity for secure key distribution in sensor networks Adaptive energy efficient protocols for wireless devices Protocol implementations  Power save broadcast on sensors (TinyOS)  User-level ad hoc routing protocol in Linux

7 Talk Outline Background on Wireless Sensor Network Key Distribution Leveraging Channel Diversity for Key Distribution Adaptive Energy-Saving Protocols Future Research

8 Talk Outline Background on Wireless Sensor Network Key Distribution Leveraging Channel Diversity for Key Distribution Adaptive Energy-Saving Protocols Conclusion

9 Key Distribution Problem Statement After deployment, a sensor needs to establish pairwise symmetric keys with neighbors it discovers for confidential and authenticated communication Applications  Secure aggregation  Exchanging hash chain commitments (e.g., for authenticated broadcast)

10 Design Considerations for Wireless Sensor Networks Resource constrained  Energy, computation, memory, bitrate Large scale deployments  May need thousands (or more) of devices Topology may be uncontrolled  Specific device’s location unknown in advance

11 Design Space Every sensor deployed with global key Minimal memory usage, incremental deployment is trivial  If one node is compromised, then all links are compromised Separate key for each sensor pair One compromised node does not affect the security of any other links  Required sensor storage scales linearly with network size

12 Outline of Solution Approaches Each sensor shares a secret key with a trusted device (T) [Perrig02Winet]  T used as intermediary for key establishment  T must be online and may become bottleneck Key Predistribution [Eschenauer02CCS]  Sensors pre-loaded with subset of keys from a global key pool  Tradeoff in connectivity and resilience to node compromise  Each node compromise reduces security of the global key pool

13 Outline of Solution Approaches Transitory key [Zhu03CCS]  Sensors use global key to establish pairwise key and then delete global key  Node compromise prior to deletion could compromise entire network Using public keys (e.g., Diffie-Hellman)  High computation cost  But, is it worth it when this cost is amortized over the lifetime of a long-lived sensor network?

14 Outline of Solution Approaches Broadcast plaintext keys [Anderson04ICNP]  If an eavesdropper is not within range of both communicating sensors, then the key is secure  Assumes very small number of eavesdroppers  No way to improve link security if eavesdroppers are in range  We propose using the underlying wireless channel diversity to greatly improve this solution domain

15 Talk Outline Background on Wireless Sensor Network Key Distribution Leveraging Channel Diversity for Key Distribution Adaptive Energy-Saving Protocols Future Research

16 Talk Outline Background on Wireless Sensor Network Key Distribution Leveraging Channel Diversity for Key Distribution Adaptive Energy-Saving Protocols Conclusion

17 Wireless Channel Diversity Radios typically have multiple non- interfering, half-duplex channels  b: 3 channels  a: 12 channels  Zigbee (used on Telos motes): 16 channels At any given time, an interface can listen to at most one channel

18 High Level View of Our Work Bob Alice Eve Channel 1 Channel 2

19 High Level View of Our Work Given c channels: Pr(Eve hears Bob’s packet | Alice hears Bob’s packet) = 1/c If Alice hears M of Bob’s packets, then the probability that Eve heard all of those packets is (1/c) M As (1/c) M → 0: The packets Alice heard can be combined to create Alice and Bob’s secret key

20 Threat Model Adversary’s primary objective is to learn pairwise keys  Can compromise node and learn its known keys  Can overhear broadcast keys Adversary’s radio capability is similar to that of sensors [Anderson04ICNP]  Receive sensitivity  One radio Multiple adversary devices may collude in their knowledge of overheard keys  Collusion in coordination of channel listening is future work Denial-of-Service is beyond the scope of our work

21 Protocol Overview Predeployment  Give each sensor a unique set of authenticatable keys Initialization  Broadcast keys to neighbors using channel diversity Key Discovery  Find a common set of keys shared with a neighbor Key Establishment  Use this set to make a pairwise key that is secret with high probability

22 Phase 1: Predeployment Each sensor is given λ keys by a trusted entity  Keys are unique to sensor and not part of global pool  λ presents a tradeoff between overhead and security The trusted entity also loads the Merkle tree hashes needed to authenticate a sensor’s keys  O(lg N) hashes using Bloom filter authentication  O(lg λ N) hashes using direct key authentication

23 Phase 2: Initialization Each sensor follows two unique non- deterministic schedules:  When to switch channels Chosen uniformly at random among c channels  When to broadcast each of its λ keys Thus, each of a sensor’s λ keys is overheard by 1/c neighbors on average  Different subsets of neighbors overhear each key Sensors store every overheard key

24 E C, E C, D, E Initialization Example AB D C E Nodes that know all of A and B’s keys: Ø = Channel 1 = Channel 2

25 Phase 3: Key Discovery Goal: Discover a subset of stored keys known to each neighbor All sensors switch to common channel and broadcast Bloom filter with β of their stored keys  Bloom filter for reduced communication overhead Sensors keep track of the subset of keys that they believe they share with each neighbor  May be wrong due to Bloom filter false positives

26 Key Discovery Example A B C A’s Known Keys B’s Known Keys C’s Known Keys A and C’s Shared Keys A and B’s Shared Keys

27 Phase 4: Key Establishment 1. Generate link key: k uv = hash(k 1 || k 2 || k 3 ) 2. Generate Bloom filter for k uv : BF(k uv ) 3. Encrypt random nonce (RN) with k uv : E(RN, k uv ) 1. Find keys in BF(k uv ) 2. Use keys from Step 1 to generate k uv 3. Decrypt E(RN, k uv ) 4. Generate E(RN+1, k uv ) u’s believed set of shared keys with v = {k 1, k 2, k 3 } uv E(RN, k uv ) || BF(k uv )E(RN+1, k uv ) k uv

28 Simulation Results Fraction of Links that are Secure One Channel Two Channels Number of Keys Preloaded per Node ( λ ) Just one extra channel significantly improves security

29 Simulation Results One Channel Two Channels ≥ 3 Channels Fraction of Nodes that are Compromised Resilient to large amount of node compromise Fraction of Links that are Secure

30 Using Path Diversity Path diversity can be used to get a small number of compromised links to zero Similar to multipath reinforcement proposed elsewhere  Node disjoint paths needed to combat node compromise  Only link disjoint paths needed to combat eavesdroppers AD B C = Secure Link = Compromised Link k1k1 k2k2 k AD = hash(k 1 || k 2 )

31 Simulation Results for Example Topology Number of Shared Neighbors Used Fraction of Links That are Compromised

32 Key Distribution Summary Many distinct solutions have been proposed  No “one size fits all” approach emerges Our work is the first to propose using channel diversity for key distribution  Results show significant security gains when even one extra channel is used Path diversity can further improve key security

33 Talk Outline Background on Wireless Sensor Network Key Distribution Leveraging Channel Diversity for Key Distribution Adaptive Energy-Saving Protocols Future Research

34 Talk Outline Background on Wireless Sensor Network Key Distribution Leveraging Channel Diversity for Key Distribution Adaptive Energy-Saving Protocols Conclusion

35 Won’t Moore’s Law Save Us? NO!!! From “Thick Clients for Personal Wireless Devices” by Thad Starner in IEEE Computer, January x 393 x 128 x 18 x 2.7 x Log Scale Necessitates Energy-Saving Protocol Design

36 Common Power Save Protocol Design L and S are static values regardless of traffic Design used in IEEE as well as sensor protocols (e.g., B-MAC and STEM) LS LISTEN SLEEP Sleep Until Timer Fires to Start Listening Check for Wake-Up Signal

37 Our Approach: Adaptive Energy- Saving Protocols Adapt listening (L) based on channel state Adapt sleeping (S) based on traffic arrivals and desired latency L1L1 S1S1 LISTEN SLEEP Check for Wake-Up Signal Sleep Until Timer Fires to Start Listening L2L2 S2S2 L3L3

38 Protocol Design Space Adaptive ListeningAdaptive Sleeping In-BandOur MASS 2005 paper Our multilevel routing work Out-of- Band Our in-band techniques are applicable Covered in this talk

39 Out-of-Band Protocol Example Sender Ctrl. Channel S Signal Receiver Ctrl. Channel Data Receiver Data Channel Data Sender Data Channel Idle Channel Busy Time Data Wake up in S time S L

40 How Do You Choose S? If energy is our only concern then S can be arbitrarily large  However, the queue may become large Since sensors are resource limited, we address this queue constraint  If a device’s queue reaches a threshold, Q, then it must start transmitting packets soon

41 Adaptive Sleeping Overview Sender and receiver schedule a future wake-up time based on the traffic rate If the sender’s queue reaches Q packets before a scheduled wake-up:  Then the sender wakes up the receiver via the out-of- band control channel All nodes periodically check control channel for wake-up signal  If signal detected  Turn on data radio  If data packet is for another node  Data radio returns to sleep

42 Adaptive Sleeping Example Sender Ctrl. Channel S Sig Receiver Ctrl. Channel D Receiver Data Channel Sender Data Channel Idle Channel Busy Time D D D D D D D < S Sender’s Queue Q = 2 t1t1 t2t2

43 Adaptive Sleeping Tradeoff: S Too Small Sender’s Packet Queue Arrivals S Receiver Data Channel Sender Data Channel Idle Channel Busy Time D D D Energy Wasted Checking for Data Packet SSS

44 Adaptive Sleeping Tradeoff: S Too Large Sender Ctrl. Channel S Sig Receiver Neighbor 1 Time Sender’s Queue Q = 2 t1t1 DDD Sig DD S Neighbor N t2t2 Energy Wasted Waiting for Receiver ID Data Channel

45 Adaptive Sleeping Tradeoff 05.5 Optimal Energy Consumption Goal: Adapt S based on traffic arrivals to minimize energy consumption Energy (Joules/bit) S value (seconds)

46 Adaptive Sleeping Analysis Based on analysis, we found that S is optimized according to the equation: S = γ (1/R) R = Packet arrival rate at sender  Can be estimated with a weighted moving average γ = Function of Q and the number of neighbors of the sender (nbrs)  Can be calculated offline when Q and nbrs are known

47 Adaptive Sleeping: Time-Varying Traffic Rate Results Optimal Energy (Joules/Bit) Frequency of Rate Changes More FrequentLess Frequent 0 Rate Estimation STEM S = ∞

48 Adaptive Sleeping: Multihop Topology Results Relative Energy (Joules/Bit) Sending Rate (Packets/Sec) STEM Rate Estimation S = ∞

49 Talk Outline Background on Wireless Sensor Network Key Distribution Leveraging Channel Diversity for Key Distribution Adaptive Energy-Saving Protocols Future Research

50 Talk Outline Background on Wireless Sensor Network Key Distribution Leveraging Channel Diversity for Key Distribution Adaptive Energy-Saving Protocols Conclusion

51 Future Research: Multihop Wireless Networks Performance  Efficient use of physical-layer diversity  Opportunistic channel usage  Integrating application knowledge in network protocol design Security and Privacy  Physical-layer diversity to counter attackers  Distributed detection of misbehavior

52 Future Research: Multihop Wireless Networks Experimental testbeds  Test protocols in a realistic setting  Address implementation issues  Prior experience Implementation in TinyOS on sensor hardware User-level routing protocol for hybrid networks limited to several hops from access point

53 Power save broadcast protocol in TinyOS on Mica2 motes User-level routing protocol for ad hoc networks limited to several hops from access point Implementation Experience

54 Research Summary Adaptive ListeningAdaptive Sleeping In-Band [IEEE MASS 2005]Multilevel routing [IEEE Broadnets 2004] Out-of- Band Our techniques are applicable [IEEE WCNC 2004, IEEE Trans. on Mobile Computing 2005] Energy-Latency Tradeoff for Broadcast Dissemination [IEEE ICDCS 2005] Implementation Experience in TinyOS (sensors) and Linux Secure Key Distribution [IEEE Infocom 2006] Adaptive Energy-Saving Protocols

55 Thank You! Acknowledgements to my adviser Prof. Nitin Vaidya, Prof. Indranil Gupta, Cigdem Sengul, and my research group

56 Sources (1/2) (Ordered by First Appearance) The Other Wireless Revolution by David A. Gross  Report: RFID production to increase 25 fold by 2010 in EE Times  CNET's quick guide to Bluetooth headsets on CNET.com  TinyOS Community Forum: Stats  NCSA/UIUC Internet Visualization Graphic 

57 Sources (2/2) Champaign-Urbana Community Wireless Network (CUWiN)  DakNet 

58 Properties of Preamble Sampling No synchronization necessary  We require synchronization Larger preambles increase chance of collisions  We restrict CS signals to a time when data is not being transmitted  In our technique, interference is tolerable between CS signals Broadcasts require preamble size be as long as a BI  Exacerbates broadcast storm  We do not require extra overhead for broadcast Only one sender can transmit to a receiver per BI  We allow multiple senders for a receiver per BI

59 Is time synchronization a problem? Motes have been observed to drift 1 ms every 13 minutes [Stankovic01Darpa] The Flooding Time Synchronization Protocol [Maróti04SenSys] has achieved synchronization on the order of one microsecond Synchronization overhead can be piggybacked on other broadcasts (e.g., routing updates) GPS may be feasible for outdoor environments Chip scale atomic clocks being developed that will use mW of power [NIST04]

60 Transition Costs Depend on Hardware [Polastre05IPSN/SPOTS] Mote Radio Model Wake-Up Time (ms) TX/RX/ Sleep (mW) Bitrate (kbps) TR1000 ( ) /12/ ASK CC1000 ( ) 242/29/ FSK CC2420 (2004-now) /38/ O-QPSK

61 How to Save Energy at the Wireless Interface Sleep as much as possible! Fundamental Question: When should a radio switch to sleep mode and for how long? Radio ModePower Consumption (mW) TX81 RX/Idle30 Sleep0.003 Specs for Mica2 Mote Radio

62 Related Work Carrier Sensing  B-MAC [Polastre04SenSys]: Make the packet preamble as large as the duty cycle  WiseMAC [ElHoiydi04Algosensors]: Send the packet preamble during the receiver’s next scheduled CS time  We apply CS to synchronous protocols Dynamic Listening Periods  T-MAC [VanDam03SenSys]: Extends S-MAC to increase the listen time as data packets are received  DPSM/IPSM [Jung02Infocom]: Extends for dynamic ATIM windows in single-hop environments  We use physical layer CS to work in multihop environments without inducing extra packet overhead

63 Adaptive Sleeping Results Simulated using ns-2 and Poisson traffic Rate Estimation  Proposed protocol with Q=2. Optimal  Optimal value of S which minimizes energy over a single hop S = ∞  No timeout triggered wake-ups. Out-of-band wake-ups occur when Q=2 packets are in the queue. STEM  Out-of-band protocol proposed in [Schurgers02Optimizing]. Special case of our protocol with S = ∞ and Q=1.

64 Other Research Adaptive Framework for Energy-Saving Broadcast [IEEE ICDCS 2005]  Probabilistic protocol gives flexibility to choose tradeoffs in energy, latency, reliability, and overhead for broadcast dissemination Routing using multiple power save states  Metrics to find energy-efficient states for nodes on a path while achieving a desired latency

65 Merkle Tree Authentication C = hash(O 1 ) A = hash(C || D) R = hash(A || B) Each sensor given R and O(lg N) other hashes O1O1 CDEF O2O2 O3O3 O4O4 AB R R = ?