CenWits: A Sensor-Based Loosely Coupled Search and Rescue System Using Witnesses Jyh-How Huang Saqib Amjad Shivakant Mishra Dept. of Computer Science,

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

Design of a reliable communication system for grid-style traffic light networks Junghoon Lee Dept. of Computer science and statistics Jeju National University.
Localization for Mobile Sensor Networks ACM MobiCom 2004 Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Trust relationships in sensor networks Ruben Torres October 2004.
ZebraNet Rolf Kristensen & Torben Jensen s s
Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet Presented by Eric Arnaud Makita
2  Definition  Features  Architecture  Prototypes  Communication  Security  Benefits and Concerns  Conclusion.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
Introduction to Wireless Sensor Networks
Impala: A Middleware System for Managing Autonomic, Parallel Sensor Systems Ting Liu and Margaret Martonosi Princeton University.
Geo – Routing in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Enhancing Source-Location Privacy in Sensor Network Routing P.Kamat, Y. Zhang, W. Trappe, C. Ozturk In Proceedings of the 25th IEEE International Conference.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Target Tracking Algorithm based on Minimal Contour in Wireless Sensor Networks Jaehoon Jeong, Taehyun Hwang, Tian He, and David Du Department of Computer.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Snow as a conducting media for Temperature Jyh-How Huang Winter Ecology – Spring 2006 Mountain Research Station – University of Colorado, Boulder.
CS Dept, City Univ.1 Research Issues in Wireless Sensor Networks Prof. Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Sidewinder A Predictive Data Forwarding Protocol for Mobile Wireless Sensor Networks Matt Keally 1, Gang Zhou 1, Guoliang Xing 2 1 College of William and.
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
Project Introduction 이 상 신 Korea Electronics Technology Institute.
ZebraNet Hardware Design Experiences in ZebraNet Presented by Zuhal Tepecik.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering POWER-SPEED A Power-Controlled Real-Time Data Transport Protocol for Wireless Sensor-Actuator.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
CENS Seminar, Dec 2007 (1) Alberto Cerpa © UCM Human in the loop: From Search and Rescue to Smart Buildings Alberto Cerpa Assistant Professor Computer.
1 EnviroStore: A Cooperative Storage System for Disconnected Operation in Sensor Networks Liqian Luo, Chengdu Huang, Tarek Abdelzaher John Stankovic INFOCOM.
Tony McGregor RIPE NCC Visiting Researcher The University of Waikato DAR Active measurement in the large.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Presentation by Stephanie Reese Authors Peng Zhuang, Qingguo Wang, Yi Shang, Honchi Shi, and Bei Hua.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
Adversary models in wireless security Suman Banerjee Department of Computer Sciences Wisconsin Wireless and NetworkinG Systems (WiNGS)
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Weight-Based Clustering Multicast Routing Protocol for Mobile Ad Hoc Networks Chun-Chieh Huang, Ruay-shiung Chang and Ming-Huang Guo National Dong-Hwa.
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication David K. Y. Yau Purdue University Department of Computer Science.
Ching-Ju Lin Institute of Networking and Multimedia NTU
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Jingbin Zhang( 張靜斌 ) †, Gang Zhou †, Chengdu Huang ‡, Sang H. Son †, John A. Stankovic † TMMAC: An Energy Efficient Multi- Channel MAC Protocol for Ad.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Nov. 29, 2006GLOBECOM /17 A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Sensor network routing protocol for underground robot remote control Demonstration picture (IDF)
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Enabling QoS Multipath Routing Protocol for Wireless Sensor Networks
Ting Liu Christopher M. Sadler Pei Zhang Margaret Martonosi
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Energy-Efficient Computing for Wildlife Tracking
CenWits Bahadir Ismail Aydin
Efficient Flooding Techniques for Mobile Ad Hoc Networks
Edinburgh Napier University
Presentation transcript:

CenWits: A Sensor-Based Loosely Coupled Search and Rescue System Using Witnesses Jyh-How Huang Saqib Amjad Shivakant Mishra Dept. of Computer Science, University of Colorado at Boulder Presented by: Yi Zhang Most slides taken from Jyh-How Huang’s slides at

Introduction Goal: To build a search and rescue system that can pinpoint missing person ’ s last seen point in wilderness areas Lost hikers, stranded climbers, injured skiers, … Difficult because of lack of timely information about the current location “ Last seen point ” is critical for search and rescue actions 2

Last Seen Point 3

Current Search and Rescue Technologies The Old School Way – Ask Personal GPS receiver and Satellite transmitter – Power greedy; Must operate manually to send your location Localization system and GSM transmitter – Need GSM network coverage Avalanche beacon/RFID reflector – Limited usage Need a better, cheaper, reliable system 4

Design Goals Self-Operate, long life time Small and light weight Non intrusive; no infrastructure needed Power and memory efficient Cheap($20~$50) Meets security and privacy requirements 5

CenWits A Connection-less Sensor-Based Tracking System Using Witnesses Comprised of RF sensors GPS receivers Access points Location points Control center 6

How it Works (I) Node IDCoordinateTime 10 3 Node IDCoordinateTime

How it Works (II) Node IDCoordinateTime x3, y3, z316: Node IDCoordinateTime … 6 x1, y1, z112:31 … … 6 x2, y2, z214:09 … 6 x3, y3, z316:58 8

How it Works (III) Hiker 6 is reported missing at 23:59 Node IDCoordinateTime … 6 x1, y1, z112:31 … … 6 x2, y2, z214:09 … 6 x3, y3, z316:58 x1, y1, z1 x2, y2, z2 x3, y3, z3 Inferred location at 23:59 Hot Search Zone 9

System Architecture Witness Search & Rescue TeamControl Center 10

Current Loosely Coupled Systems ZebraNet At each scan for neighbors if node(I am) is within range of BS send data to BS and delete this data else send data to all neighbors 12 Node ID CoordinateTime3 … CoordinateTime3 … 3 …

Memory Management MAX RECORD COUNT Replace the old record with new one of the same node and keep the total records # of a node less than MAX_RECORD_COUNT MAX HOP COUNT Don’t forward a packet that has high probability of reaching AP already MIN RECORD GAP When 2 records are recorded in a time gap < MIN_RECORD_GAP, replace the old one with new one. 12

Power Management Beacon frequency adjustment based on speed, time of day, etc. 4-phase hand shake protocol Only transmit as much as the receiver is willing to take 13

Grouping to Save Energy  One active leader at any time; others sleep  Leadership time-multiplexed 14

More Memory Management  Partitions: sub-groups containing >= 2 nodes  Each of the K partitions receives/sends 1/K of total data  When nodes dies: split large partition or merge with small partition 15

Prototype Implementation MICA2 sensors 900 MHz; 4 KB SDRAM; 128 KB flash; and KB EEPROM Mantis OS 0.9.1b MTS420CA GPS module Successfully conducted a number of experiments in a indoor environment 16

Experiment 1 (Direct Contact): One hiker starts from A, goes to B and C, and returns to A 17

Experiment 2 (Indirect Inference): Hiker 1: A to B and beyond Hiker 2: Does not come in contact with any AP Hiker 3: C to B and beyond Path of hiker 2 is drawn successfully

Hiker 1 to 5 walk on designated trails while hiker 6 does a random walk. We successfully depict path of hiker 6 Experiment 3 (Identifying Hot Search Areas) 19

Conclusions CenWits has several advantages over other search and rescue systems No need for a connected network of any kind Power and storage efficiency Cost effective Non intrusive Suitable for deployment in wilderness areas Applications: Hiking; skiing; wildlife monitoring; vehicular network 20

Discussion (1) Simplistic approach to the resource/inference quality tradeoff How to set memory management parameters? What’s the impact on inference quality? Ultimate goal is not to save energy/memory, but lives! 21

Discussion (2) Energy really saved by transmitting as much as needed? 4-phase hand shake protocol itself is an overhead Or maybe 3-phase? (piggyback) Lack of analysis/quantification Transmission energy when changing group/partition leader? Energy/memory costs in experiments? Security and privacy issues 22

Comments? Thanks! 23