Robust Communications for Sensor Networks in Hostile Environments Ossama Younis and Sonia Fahmy Department of Computer Sciences, Purdue University Paolo.

Slides:



Advertisements
Similar presentations
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
Advertisements

Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Reporting Stephan Olariu Department.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Presented by Rick Skowyra
Sensor network Routing protocol A study on LEACH protocol and how to improve it.
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
Infocom'04Ossama Younis, Purdue University1 Distributed Clustering in Ad-hoc Sensor Networks: A Hybrid, Energy-Efficient Approach Ossama Younis and Sonia.
A novel Energy-Efficient and Distance- based Clustering approach for Wireless Sensor Networks M. Mehdi Afsar, Mohammad-H. Tayarani-N.
1 An Energy-Efficient Unequal Clustering Mechanism for Wireless Sensor Networks Chengfa Li, Mao Ye, Guihai Chen State Key Laboratory for Novel Software.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering A Sensibility-Based Sleeping Configuration Protocol for Dependable Wireless Sensor.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Globecom 2004 Energy-Efficient Self-Organization for Wireless Sensor Networks: A Fully Distributed approach Liang Zhao, Xiang Hong, Qilian Liang Department.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
EWSN 04 – Berlin, Jan. 20, 2004 Silence is Golden with High Probability: Maintaining a Connected Backbone in Wireless Sensor Networks Paolo Santi* Janos.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Optimizing Lifetime for Continuous Data Aggregation With Precision Guarantees in Wireless Sensor Networks Xueyan Tang and Jianliang Xu IEEE/ACM TRANSACTIONS.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle IEEE INFOCOM 2003.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Efficient and Robust Query Processing in Dynamic Environments Using Random Walk Techniques Chen Avin Carlos Brito.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
Steady and Fair Rate Allocation for Rechargeable Sensors in Perpetual Sensor Networks Zizhan Zheng Authors: Kai-Wei Fan, Zizhan Zheng and Prasun Sinha.
Does Packet Replication Along Multipath Really Help ? Swades DE Chunming QIAO EE Department CSE Department State University of New York at Buffalo Buffalo,
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Presentation By Deniz Özsoyeller
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Effect of Redundancy on Mean Time to Failure of Wireless Sensor Networks Anh Phan Speer, Ing-Ray Chen Paper Presented by: Misha, Neha & Vidhya CS 5214.
SoftCOM 2005: 13 th International Conference on Software, Telecommunications and Computer Networks September 15-17, 2005, Marina Frapa - Split, Croatia.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Wireless Sensor Network Protocols Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
Minimum Average Routing Path Clustering Problem in Multi-hop 2-D Underwater Sensor Networks Presented By Donghyun Kim Data Communication and Data Management.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Gennaro Cordasco - How Much Independent Should Individual Contacts be to Form a Small-World? - 19/12/2006 How Much Independent Should Individual Contacts.
A Novel Mechanism for Flooding Based Route Discovery in Ad Hoc Networks Jian Li and Prasant Mohapatra GlobeCom’03 Speaker ︰ CHUN-WEI.
Improving Routing in Sensor Networks with Heterogeneous Sensor Nodes Xiaojiang Du & Fengjing Lin Vehicular Technology Conference,2005 Spring,Volume 4.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
An Energy-Efficient Voting-Based Clustering Algorithm for Sensor Networks Min Qin and Roger Zimmermann Computer Science Department, Integrated Media Systems.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
A Method for Distributed Computation of Semi-Optimal Multicast Tree in MANET Eiichi Takashima, Yoshihiro Murata, Naoki Shibata*, Keiichi Yasumoto, and.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Distributed Clustering in Ad-hoc Sensor Networks: A Hybrid, Energy-Efficient Approach Mulmedia and Mobile communications Laboratory 2004 / 4 / 20 박건우.
Routing and Clustering Xing Zheng 01/24/05. References Routing A. Woo, T. Tong, D. Culler, "Taming the Underlying Challenges of Reliable Multihop Routing.
Self-stabilizing energy-efficient multicast for MANETs.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
KAIS T Sensor Deployment Based on Virtual Forces Reference: Yi Zou and Krishnendu Chakarabarty, “Sensor Deployment and Target Localization Based on Virtual.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
An Application-Specific Protocol Architecture for Wireless Microsensor Networks 컴퓨터 공학과 오영준.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
Distributed Algorithms for Mobile Sensor Networks
Distributed Energy Efficient Clustering (DEEC) Routing Protocol
Net 435: Wireless sensor network (WSN)
Distributed Clustering for Scalable, Long-Lived Sensor Networks
Introduction Wireless Ad-Hoc Network
Optimizing Energy Consumption in Wireless Sensor
Presentation transcript:

Robust Communications for Sensor Networks in Hostile Environments Ossama Younis and Sonia Fahmy Department of Computer Sciences, Purdue University Paolo Santi Instituto di Informatica e Telematica, CNR, Italy

IWQoS 2004 Ossama Younis, Purdue University 2 In this work We propose a distributed clustering algorithm (REED) that builds a k-connected sensor network when the network is dense REED uses different transmission ranges for intra-cluster and inter-cluster communications Rationale:  Clustering → scalability and longevity  K-connectivity → robustness in case of unexpected failures, and multi-path communication

IWQoS 2004 Ossama Younis, Purdue University 3 Outline Motivation System model Requirements Approach Analysis Simulation results Conclusions

IWQoS 2004 Ossama Younis, Purdue University 4 Motivation In hostile environments, such as military fields or volcanic areas, sensor nodes may fail unexpectedly. Thus, higher degree of connectivity is desirable Sensor nodes have limited batteries and are left unattended. Thus, energy efficiency is essential for longer network lifetime

IWQoS 2004 Ossama Younis, Purdue University 5 Goals Clustering the sensor network to provide communication scalability and longer network lifetime Building k-connected (k-fault tolerant) networks for robust communications our goal is to construct a clustered, fault-tolerant sensor network

IWQoS 2004 Ossama Younis, Purdue University 6 System model A set of n sensor nodes are dispersed uniformly and independently in a hostile field ad-hoc, left unattended, and does not necessarily have any infrastructure quasi-stationary, equally significant, location un-aware, and each possesses a fixed number of transmission power levels Nodes may fail unexpectedly Network Application Nodes

IWQoS 2004 Ossama Younis, Purdue University 7 Requirements Design a clustering protocol that has the following properties:  Constructs a k-connected network at both the intra-cluster and inter-cluster levels  Uses two different transmission ranges for cluster formation and inter-cluster communications  Converges in O(1) time with low message and processing overhead  Considers network longevity and load-balancing

IWQoS 2004 Ossama Younis, Purdue University 8 Approach We propose the REED (Robust, Energy- Efficient, Distributed) clustering protocol REED is distributed:  Every node only uses information from its 1-hop neighbors (within cluster range) REED provides robustness:  A k-connected network is constructed (asymptotically almost surely) for dense networks REED is energy-efficient:  Elects cluster heads that are rich in residual energy  Re-clustering results in distributing energy consumption

IWQoS 2004 Ossama Younis, Purdue University 9 Basic ideas Every node should have k distinct cluster heads Every cluster head should be able to communicate with at least k other cluster heads REED approach: Construct k distinct (node-disjoint) cluster head overlays

IWQoS 2004 Ossama Younis, Purdue University 10 REED – Clustering parameters Consider energy-efficiency as well as robustness Parameters for electing cluster heads  Primary parameter: residual energy (E r )  Secondary parameter: communication cost (used to break ties) i.e., maximize energy and minimize cost Nodes autonomously elect to become cluster heads with probability CH prob = f(E r /E max )

IWQoS 2004 Ossama Younis, Purdue University 11 The REED protocol at node v Initialization Main processing Finalization Discover neighbors within cluster range Compute the initial CH prob = f(E r /E max ) Repeat while CH prob ≤ 1  Arbitrate among received cluster head messages to select min cost heads (one for each cluster head overlay CS i, 1 ≤ i ≤ k)  If v does not have a cluster head for CS i, elect to become a cluster head for CS i with CH prob.  CH prob = min(CH prob * 2, 1) Continue listening to messages For every CS i, if a cluster head is found, then join its cluster. Otherwise, elect to become a cluster head for CS i,

IWQoS 2004 Ossama Younis, Purdue University 12 REED in action (k = 2) (2) Compute CH prob and cost (3) Select your cluster head or elect to become cluster head for overlay c1 then c2 (4) Elect to become cluster head if one is not found (0.2) (0.4) (0.2) (0.1) (0.35) (0.4) (0.25) (0.8) (0.2) (0.6) (0.4) (0.1) (0.9) (0.3) (0.2) c1 (1) Discover neighbors within cluster range c1 c2

IWQoS 2004 Ossama Younis, Purdue University 13 Analysis The interleaved clustering process is Ω(k), and k is a constant. Let p min = constant (minimum E r /E max ) Message overhead: O(k) per node Processing overhead: O(kn) per node

IWQoS 2004 Ossama Younis, Purdue University 14 Connectivity Assumptions:  n nodes are dispersed in an area A=[0,L] 2.  A is divided into N square cells, each of side  R t denotes the inter-cluster communication range  A cluster head overlay is connected if R t ≥ 6R c (Younis and Fahmy, Infocom’04)  Let η(n,N) be a random variable that denote the minimum number of nodes in a cell Requirement:  What is the necessary condition(s) to (asymptotically) have lim n,N→∞ η(n,N) → k ?

IWQoS 2004 Ossama Younis, Purdue University 15 Connectivity (cont d ) Theorem:  For any fixed arbitrary k > 0, assume that n nodes are dispersed uniformly and independently in an area A=[0,L] 2. Assume A is divided into N square cells (as defined above). If R c 2 n=aL 2 lnN, for some a≥2, R c >1, then lim n,N→∞ E(η(n,N)) → k, iff k ≈ ln N Proof sketch:  (Kolchin’78): A minimally occupied cell has h or h+1 nodes a.a.s. if lim n/(N ln N) → 1, as n,N → ∞, and h is chosen such that h < α (α = n/ln N), and Np h (α) → λ, where p h (α) = (α h /h!) x e α.

IWQoS 2004 Ossama Younis, Purdue University 16 Evaluation Connectivity and cluster head uniqueness  Network area = 100 m x 100 m  Cluster range = 10 m

IWQoS 2004 Ossama Younis, Purdue University 17 Evaluation (cont d ) Fault tolerance properties Multi-hop communication between border nodes Single-hop communication with a base station

IWQoS 2004 Ossama Younis, Purdue University 18 Additional advantage For sufficiently large density:  Each cluster head overlay is a connected component that can route among any pair of nodes in the network  Each set of cluster heads in cluster head overlays has distinct nodes Therefore, there is an opportunity for multi- path communication This is useful, e.g., for security protocols.

IWQoS 2004 Ossama Younis, Purdue University 19 Related work Previous research on fault-tolerance in ad- hoc networks suffers from limitations when applied to sensor networks, e.g.,  Centralized approaches, such as Hajiaghayi et al., 03, are not suitable for large-scale networks  Complexity (e.g., solving LP problem, Cheriyan et al., 02), is critical for sensors with limited processors  Requirement of special equipment (e.g., CBTC, Wattenhofer et al., 01) is not always feasible for sensor nodes

IWQoS 2004 Ossama Younis, Purdue University 20 Conclusions We have presented, REED, a distributed clustering protocol for constructing k-fault tolerant sensor networks REED can be constructed on top of other clustering protocols, such as LEACH For future work, we will investigate:  How to adapt REED to changing node density  How REED performs under different node distributions  How to exploit the independent cluster head overlays to secure sensor communications, e.g., for symmetric key distribution