MAC Protocols and Security in Ad hoc and Sensor Networks

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Medium Access Issues David Holmer
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks 4th Week (Part I) Faisal Aslam.
CMPE280n An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin presented by Venkatesh Rajendran.
Investigating Mac Power Consumption in Wireless Sensor Network
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin -- Adapted the authors’ Infocom 2002 talk.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
An Energy-efficient MAC protocol for Wireless Sensor Networks
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Debate 1 - Defense Joseph Camp Anastasios Giannoulis.
Efficient MAC Protocols for Wireless Sensor Networks
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Medium Access Control in Ad hoc and Sensor Networks.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Instructor : Dr Yingshu Li Presented By : D M Rasanjalee Himali Paper.
Fakultät Informatik – Institut für Systemarchitektur – Professur Rechnernetze Sensor Medium Access Control (S-MAC) Robin Dunn Supervisor: Dr. Waltenegus.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
1 MAC Protocols that use Directional Antennnas. 2 Directional Antenna  Directional communication  Less Energy in the wrong direction Better Spatial.
Chapter 6 Multiple Radio Access
IEEE WLAN.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
SNU Mobile Networks Lab. S-MAC (Sensor-MAC) T-MAC (Timeout-MAC) Kae Won, Choi Kyoung hoon, Kim.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
A Power Control MAC Protocol for Ad Hoc Networks
EA C451 (Internetworking Technologies)
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Investigating Mac Power Consumption in Wireless Sensor Network
Presentation transcript:

MAC Protocols and Security in Ad hoc and Sensor Networks

A Power Control MAC (PCM) Protocol for Ad hoc Networks [Jung+ 2002] A power control MAC protocol allows nodes to vary transmit power level on a per-packet basis Earlier work has used different power levels for RTS-CTS and DATA-ACK, specifically, maximum transmit power is used for RTS-CTS and minimum required transmit power is used for DATA-ACK transmissions These protocols may increase collisions, degrade network throughput and result in higher energy consumption than when using IEEE 802.11 without power control Power saving mechanisms allow nodes to enter a doze state by powering off its wireless network interface whenever possible Power control schemes vary transmit power to reduce energy consumption

Power Control MAC (PCM) IEEE 802.11 MAC Protocol Specifies two MAC protocols: Point Coordination Function (PCF)  centralized Distributed Coordination Function (DCF) distributed Transmission range: When a node is in transmission range of a sender node, it can receive and correctly decode packets from sender node. Carrier Sensing Range: Nodes in carrier sensing range can sense the sender’s transmission. It is generally larger than transmission range. Both carrier sensing range and transmission range Depends on the transmit power level.

Power Control MAC (PCM) IEEE 802.11 MAC Protocol Carrier Sensing Zone: Nodes can sense the signal, but cannot decode it correctly. The carrier sensing zone does not include transmission range [Figure adapted from Jung+ 2002]

Power Control MAC (PCM) IEEE 802.11 MAC Protocol DCF in IEEE 802.11 is based on CSMA/CS (Carrier Sense Multiple Access with Collision Avoidance) Each node in IEEE 802.11 maintains a NAV (Network Allocation Vector) that indicates the remaining time of the on-going transmission sessions Carrier sensing is performed using physical carrier sensing (by air interface) and virtual carrier sensing (uses the duration of the packet transmission that is included in the header of RTS, CTS and DATA frames) Using the duration information in RTS, CTS and DATA packets, nodes update their NAVs whenever they receive a packet The channel is considered busy if either physical or virtual carrier sensing indicates that channel is busy Figure 2 shows how nodes in transmission range and the carrier sensing zone adjust their NAVs during RTS-CTS-DATA-ACK transmission

Power Control MAC (PCM) IEEE 802.11 MAC Protocol [Figure adapted from Jung+ 2002]

Power Control MAC (PCM) IEEE 802.11 MAC Protocol IFS is the time interval between frames and IEEE 802.11 defines four IFSs which provide priority levels for accessing the channel SIFS (short interframe space) PIFS (Point Coordination Function interframe space) DIFS (Distributed Coordination Function interframe space) EIFS (extended interframe space) SIFS is the shortest and is used after RTS, CTS, and DATA frames to give the highest priority to CTS, DATA and ACK respectively In DCF, when the channel is idle, a node waits for DIFS duration before transmitting Nodes in the transmission range correctly set their NAVs when receiving RTS/CTS Since nodes in carrier sensing zone cannot decode the packet, they do not know the duration of the packet transmission. So, they set their NAVs for the EIFS duration to avoid collision with the ACK reception at the source node

Power Control MAC (PCM) IEEE 802.11 MAC Protocol The intuition behind EIFS is to provide enough time for a source node to receive the ACK frame, meaning that duration of EIFS is longer than that of ACK transmission In PCM, nodes in the carrier sensing zone use EIFS whenever they can sense the signal but cannot decode it IEEE 802.11 does not completely prevent collisions due to the hidden terminal problem (nodes in the receiver’s carrier sensing zone, but not in the sender’s carrier sensing zone or transmission range, can cause a collision with the reception of a DATA packet at the receiver In Figure 3, suppose node C transmits packet to node D When C and D transmit an RTS and CTS respectively, A and F set their NAVs for EIFS duration During C’s data transmission, A defers its transmission due to sensing C’s transmission. However, since node F does not sense any signal during C’s transmission, it considers channel to be idle (F is in D’s carrier sensing zone, but not in D’s)

Power Control MAC (PCM) IEEE 802.11 MAC Protocol C’s carrier sensing range D’s carrier sensing range [Figure adapted from Jung+ 2002]

Power Control MAC (PCM) IEEE 802.11 MAC Protocol When F starts a new transmission, it can cause a collision with the reception of DATA at D Since F is outside of D’s transmission range, D may be outside of F’s transmission range; however, since F is in D’s carrier sensing zone, F can provide interference at node D to cause collision with DATA being received at D

Power Control MAC (PCM) BASIC Power Control Protocol Power control can reduce energy consumption Power control may bring different transmit power levels at different hosts, creating an asymmetric scenarios where a node A can reach node B, but node B cannot reach node A and collisions may also increase a result In Figure 4, suppose nodes A and B use lower power level than nodes C and D When A is transmitting to B, C and D may not sense the transmission When C and D transmit to each other using higher power, their transmission may collide with the on-going transmission from A to B [Figure adapted from Jung+ 2002]

Power Control MAC (PCM) BASIC Power Control Protocol As a solution to this problem, RTS-CTS are transmitted at the highest possible power level but DATA and ACK at the minimum power level necessary to communicate In Figure 5, nodes A and B send RTS and CTS respectively with highest power level such that node C receives the CTS and defers its transmission By using a lower power level for DATA and ACK packets, nodes can save energy [Figure adapted from Jung+ 2002]

Power Control MAC (PCM) BASIC Power Control Protocol In the BASIC scheme, RTS-CTS handshake is used to decide the transmission power for subsequent DATA and ACK packets which can be achieved in two different ways Suppose node A wants to send a packet to node B. Node A transmit RTS at power level pmax (maximum possible). When B receives the RTS from A with signal level pr, B calculates the minimum necessary transmission power level, pdesired. For the DATA packet based on received power level, pr, transmitted power level, pmax, and noise level at the receiver B. Node B specifies pdesired in its CTS to node A. After receiving CTS, node A sends DATA using power level pdesired. When a destination node receives an RTS, it responds by sending a CTS (at power level pmax). When source node receives CTS, it calculates pdesired based on received power level, pr, and transmitted power level (pmax) as Pdesired = (pmax / pr) x Rxthresh x c where Rxthresh is minimum necessary received signal strength and c is constant

Power Control MAC (PCM) BASIC Power Control Protocol The second alternative makes two assumptions: Signal attenuation between source and destination nodes is assumed to be the same in both directions Noise level at the receiver is assumed to be below some predefined threshold Deficiency of the BASIC Protocol In Figure 6, suppose node D wants to transmit to node E When nodes D and E transmits RTS and CTS respectively, B and C receives RTS and F and G receives CTS, therefore, these nodes defer their transmissions Since node A is in carrier sensing zone of node D, it sets its NAV for EIFS duration Similarly node H sets its NAV for EIFS duration when it senses transmission from E When source and destination decide to reduce the transmit power for DATA-ACK, not only transmission range for DATA-ACK but also carrier sensing zone is also smaller than RTS-CTS

Power Control MAC (PCM) Deficiency of the BASIC Protocol Thus, only C and F correctly receives DATA and ACK packets Since nodes A and H cannot sense the transmissions, they consider channel is idle and start transmitting at high power level which will cause collision with the ACK packet at D and DATA packet at E This results in throughput degradation and higher energy consumption (due to retransmissions) [Figure adapted from Jung+ 2002]

Power Control MAC (PCM) Proposed Power Control MAC Protocol Proposed Power Control MAC (PCM) is similar to BASIC scheme such that it uses power level, pmax, for RTS-CTS and the minimum necessary transmit power for DATA-ACK transmissions Procedure of PCM is as follows: Source and destination nodes transmit the RTS and CTS using pmax. Nodes in the carrier sensing zone set their NAVs for EIFS duration The source may transmit DATA using a lower power level Source transmits DATA at level of pmax, periodically, for enough time so that nodes in the carrier sensing zone can sense it and this would avoid collision with the ACK packets The destination node transmits an ACK using the minimum required power to reach the source node Figure 7 presents how the transmit power level changes during the sequence of RTS-CTS-DATA-ACK transmission

Power Control MAC (PCM) Proposed Power Control MAC Protocol The difference between PCM and BASIC scheme is that PCM periodically increases the transmit power to pmax during the DATA packet transmission. Nodes that can interfere with the reception of ACK at the sender will periodically sense the channel is busy and defer their own transmission. Since nodes reside in the carrier sensing zone defer for EIFS duration, the transmit power for DATA is increased once every EIFS duration PCM solves the problem posed with BASIC scheme and can achieve throughput comparable to 802.11 by using less energy PCM, like 802.11, does not prevent collisions completely [Figure adapted from Jung+ 2002]

An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) S- MAC protocol designed specifically for sensor networks to reduce energy consumption while achieving good scalability and collision avoidance by utilizing a combined scheduling and contention scheme The major sources of energy waste are: collision overhearing control packet overhead idle listening S-MAC reduce the waste of energy from all the sources mentioned in exchange of some reduction in both per-hop fairness and latency

S-MAC S- MAC protocol consist of three major components: periodic listen and sleep collision and overhearing avoidance Message passing Contributions of S-MAC are: The scheme of periodic listen and sleep helps in reducing energy consumption by avoiding idle listening. The use of synchronization to form virtual clusters of nodes on the same sleep schedule In-channel signaling puts each node to sleep when its neighbor is transmitting to another node (solves the overhearing problem and does not require additional channel) Message passing technique to reduce application-perceived latency and control overhead (per-node fragment level fairness is reduced) Evaluating an implementation of S-MAC over sensor-net specific hardware

Security in Wireless Ad hoc Networks [Buttyan+ 2002] Security in wireless ad hoc networks is difficult for many reasons: Vulnerability of channels Vulnerability of nodes Absence of infrastructure Dynamically changing topology The problem is broad and there is no general solution Different applications will have different security requirements Security aspects can be categorized into four groups: Trust and key management Secure routing and intrusion detection Availability Cryptographic protocols

References [Jung+ 2002] E.-S. Jung and N.H. Vaidya, A Power Control MAC Protocol for Ad hoc Networks, Proceedings of ACM MOBICOM 2002, Atlanta, Georgia, September 23-28, 2002. [Ye+ 2002] W. Yei, J. Heidemann and D. Estrin, Energy-Efficient MAC Protocol for Wireless Sensor Networks, Proceedings of the Twenty First International Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002), New York, NY, USA, June 23-27 2002. [Buttyan+ 2002] L. Buttyan and J.-P. Hubaux, Report on a Working Session on Security in Wireless Ad Hoc Networks, Mobile Computing and Communications Review, Volume 6, Number 4.