Fair Coalitions for Power- Aware Routing ARO Review April 2004 Carl A. Gunter University of Pennsylvania Joint with Ratul Guha and Saswati Sarkar.

Slides:



Advertisements
Similar presentations
Security and Sensor Networks By Andrew Malone and Bryan Absher.
Advertisements

Mobile and ubiquitous computing Chapter 16 Distributed systems, concepts and design, 4th edition, 2005, Coulouris et al Ylva-Li Lindh Gabriella Hammarin.
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
TOPOLOGIES FOR POWER EFFICIENT WIRELESS SENSOR NETWORKS ---KRISHNA JETTI.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
1 ENERGY: THE ROOT OF ALL PERVASIVENESS Anthony Ephremides University of Maryland April 29, 2004.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Progress Report Wireless Routing By Edward Mulimba.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
1 SOWER: Self-Organizing Wireless Network for Messaging Márk Félegyházi {mark.felegyhazi, srdan.capkun, Srdjan Čapkun Jean-Pierre.
研 究 生:蔡憲邦 指導教授:柯開維 博士 Design of Efficient and Secure Multiple Wireless Mesh Network 具安全性及自我組織能力的 無線網狀網路.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
Challenge: Securing Routing Protocols Adrian Perrig
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
Hierarchical Cooperation Achieves Linear Scaling in Ad Hoc Wireless Networks David Tse Wireless Foundations U.C. Berkeley AISP Workshop May 2, 2007 Joint.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
1 Reasoning about Concurrency for Security Tunnels Alwyn E. Goodloe University of Pennsylvania Carl A. Gunter University of Illinois Urbana-Champaign.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
1 Mobility Increases the Capacity of Ad-hoc Wireless Networks Matthias Grossglauser, David Tse IEEE Infocom 2001 (Best paper award) Oct 21, 2004 Som C.
Overview of Research Activities Aylin Yener
Minimum Average Routing Path Clustering Problem in Multi-hop 2-D Underwater Sensor Networks Presented By Donghyun Kim Data Communication and Data Management.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Copyright: NOMAD IST NOMAD Integrated Networks for Seamless and Transparent Service Discovery.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication David K. Y. Yau Purdue University Department of Computer Science.
Data Transmission Mechanism for Multiple Gateway System Xuan He, Yuanchen Ma and Mika Mizutani, 6th International Conference on New Trends in Information.
Computer Science and Engineering 1 Mobile Computing and Security.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Computer Networks CSC September 23,
A Novel Coalitional Game Model for Security Issues in Wireless Networks Xiaoqi LiMichael Lyu Computer Science and Engineering Department The Chinese University.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Wireless Control of a Multihop Mobile Robot Squad UoC Lab. 임 희 성.
Presented by Edith Ngai MPhil Term 3 Presentation
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Ad-hoc Networks.
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Location Cloaking for Location Safety Protection of Ad Hoc Networks
NSF CSR PI Meeting Breakout Session: Integrated Networked Systems and Internet of Things Saurabh Bagchi Purdue University.
Chi Zhang, Yang Song and Yuguang Fang
Reducing Total Network Power Consumption
Protocols.
Multi-Level Hierarchies for Scalable Ad hoc Routing
Protocols.
Presentation transcript:

Fair Coalitions for Power- Aware Routing ARO Review April 2004 Carl A. Gunter University of Pennsylvania Joint with Ratul Guha and Saswati Sarkar

Overview of Projects Secure and Open Embedded Devices Secure and Open Embedded Devices –Designing software for smart cards Models and protection measures for DoS and network resource management Models and protection measures for DoS and network resource management –DoS prevention –Power management Privacy and Access Control Privacy and Access Control –Secure web services –Workflow –Location Based Services Secure Tunnels Secure Tunnels –Ipsec and symbolic simulation Carl Gunter Alwyn Goodloe Michael McDougall

Benefits of Power-Aware Routing Sharing between wireless nodes has well- proven benefits Sharing between wireless nodes has well- proven benefits –Routing can yield two orders of magnitude in power savings Some sharing can be achieved by direct design Some sharing can be achieved by direct design Other sharing can be achieved by adapting to context and exploiting ad hoc opportunities for mutual benefit Other sharing can be achieved by adapting to context and exploiting ad hoc opportunities for mutual benefit

Reason for Savings from Routing Power costs for wireless transmission are proportional to a power of the distance over which the transmission must occur Power costs for wireless transmission are proportional to a power of the distance over which the transmission must occur Transmitting a packet a distance of d is proportional to d 4 Transmitting a packet a distance of d is proportional to d 4

Example d e f e 4 + 2f 4 < d 4

Benefit Region B C A benefits by routing through B but not by routing through C

Default Routing (-2,0) (-1,0) (0,0) (2,.5) (1,1) Cost for red: 20 Cost for brown: 19

Optimal Power Aware Routing (-2,0) (-1,0) (0,0) (2,.5) (1,1) Cost for red: 9 Benefit for red: 20-9=11 Cost for brown: 3.6 Benefit for brown: =15.4 Benefit for network: =26.4

Coalitions Sharing between individual nodes may be beneficial because of a relationship between the nodes Sharing between individual nodes may be beneficial because of a relationship between the nodes –Common owner –Common purpose Given a group of sharing nodes, when is it worthwhile to collaborate with another group? Given a group of sharing nodes, when is it worthwhile to collaborate with another group? We refer to a sharing arrangement between two or more groups as a coalition We refer to a sharing arrangement between two or more groups as a coalition

Coalitions do Not Benefit Pairs of One-Member Groups Only the red group can benefit from shared routing!

Multi-Member Groups May Benefit from Coalitions This routing allows both groups to benefit from shared routing.

This Benefit Can Be Substantial 50 nodes randomly located and randomly formed into groups

But it May Not be Equal This routing allows both groups to benefit from shared routing, but the red nodes have more opportunity to benefit.

Optimal Routing Provides Greatest Benefit to the Network at the Expense of Fairness Units are in watts. Each axis represents the benefit for a group

But What is Fair? How should groups that can benefit from forming a coalition share the mutual benefit? How should groups that can benefit from forming a coalition share the mutual benefit? Approach: use max-min fairness, an idea from fair routing developed for wireline networks. Approach: use max-min fairness, an idea from fair routing developed for wireline networks.

Max-Min Fairness A benefit vector is a pair (x 1,…,x n ) where x i is a benefit to party i. A benefit vector is a pair (x 1,…,x n ) where x i is a benefit to party i. A benefit vector is feasible if it can be realized by a possible sharing. A benefit vector is feasible if it can be realized by a possible sharing. A feasible benefit vector (x 1,…,x n ) is max-min fair if for each i, x i cannot be increased while maintaining feasibility without decreasing x j for some j for which x j  x i. A feasible benefit vector (x 1,…,x n ) is max-min fair if for each i, x i cannot be increased while maintaining feasibility without decreasing x j for some j for which x j  x i. A fair coalition routing is a routing that induces a max-min fair benefit vector. A fair coalition routing is a routing that induces a max-min fair benefit vector.

Theorem The following properties hold for fair coalition routing for any collection of groups: 1.There is always a unique max-min fair benefit vector. 2.This vector can be calculated efficiently using linear programming techniques. 3.When there are two groups, the components of the benefit vector are equal.

Max-Min Fair Geometry Max-Min Fair Benefit VectorFeasible Benefit Vectors

Fair Coalition Routing (-2,0) (-1,0) (0,0) (2,.5) (1,1) Cost for red: 9 Opt Benefit for red: 20-9=11 Cost for brown: 3.6 Opt Benefit for brown: =15.4 Opt Benefit for network: =26.4 Fair benefit for red: 11.9 Fair benefit for brown: 11.9 Fair benefit for the network: 23.8 Cost of fairness: =

How Much Does Fairness Cost? Average cost is 18% compared to the average benefit of 46%

Two Counter-Intuitive Observations There are instances where three groups can form a beneficial coalition even when no pair of the groups can. There are instances where three groups can form a beneficial coalition even when no pair of the groups can. Fairness sometimes entails routing away from the access point. Fairness sometimes entails routing away from the access point.

Three but Not Two

Routing Away from the Access Point (-2,0) (-1,0) (0,0) (2,.5) (1,1)

Trust Issues Groups must be able to economically enforce routing for their members and trusted coalition partners. Groups must be able to economically enforce routing for their members and trusted coalition partners. How much does this cost? How much does this cost? Experiment with IPSec on laptops Experiment with IPSec on laptops

Future Work Negotiation and middleware. Negotiation and middleware. Mobility (incremental re-routing). Mobility (incremental re-routing). Families of sensors. Families of sensors. Other forms of sharing Other forms of sharing –Memory

Fresh Perspectives on Design Power efficiency and routing are central concepts. Power efficiency and routing are central concepts. New paradigms involve significant architectural latitude. New paradigms involve significant architectural latitude. Game-theoretic and economic perspectives provide foundations for scalability and measurement. Game-theoretic and economic perspectives provide foundations for scalability and measurement.