Detecting Cuts in Sensor Networks Subhash Suri UC Santa Barbara (Joint work with N. Shrivastava and C. Toth)

Slides:



Advertisements
Similar presentations
Using Network Virtualization Techniques for Scalable Routing Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton University.
Advertisements

Path Splicing with Network Slicing
Challenges in Making Tomography Practical
Path Splicing with Network Slicing Nick Feamster Murtaza Motiwala Santosh Vempala.
1 A Static-Node Assisted Adaptive Routing Protocol in Vehicular Networks Yong Ding, Chen Wang, Li Xiao {dingyong, wangchen, Department.
6.896: Topics in Algorithmic Game Theory Lecture 21 Yang Cai.
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
VC Dimension – definition and impossibility result
Jennifer Tour Chayes Joint work with N. Berger, C. Borgs, A. Ganesh, A. Saberi, D. B. Wilson Controlling the Spread of Viruses on Power-Law Networks.
Scalable and Dynamic Quorum Systems Moni Naor & Udi Wieder The Weizmann Institute of Science.
Distributed Assignment of Encoded MAC Addresses in Sensor Networks By Curt Schcurgers Gautam Kulkarni Mani Srivastava Presented By Charuka Silva.
Exploring Energy-Latency Tradeoffs for Broadcasts in Energy-Saving Sensor Networks AUTHOR: MATTHEW J. MILLER CIGDEM SENGUL INDRANIL GUPTA PRESENTER: WENYU.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Chapter 4.2 Collision Detection and Resolution. 2 Collision Detection Complicated for two reasons 1. Geometry is typically very complex, potentially requiring.
Introduction to Algorithms
Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks Computer Science Department, UCLA International Computer Science Institute,
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Cooperative Multiple Input Multiple Output Communication in Wireless Sensor Network: An Error Correcting Code approach using LDPC Code Goutham Kumar Kandukuri.
SASH Spatial Approximation Sample Hierarchy
Data Transmission and Base Station Placement for Optimizing Network Lifetime. E. Arkin, V. Polishchuk, A. Efrat, S. Ramasubramanian,V. PolishchukA. EfratS.
Distributed Regression: an Efficient Framework for Modeling Sensor Network Data Carlos Guestrin Peter Bodik Romain Thibaux Mark Paskin Samuel Madden.
Minimalism in Sensor Networks Subhash Suri UC Santa Barbara and ETH Zurich.
PROXY FOR CONNECTIVITY We consider the k shortest edge disjoint paths between a pair of nodes and define a hyperlink, whose ‘connectivity’ is defined as:
Before start… Earlier work single-path routing in sensor networks
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
Rendezvous Planning in Mobility- assisted Wireless Sensor Networks Guoliang Xing; Tian Wang; Zhihui Xie; Weijia Jia Department of Computer Science City.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
The Small World Phenomenon: An Algorithmic Perspective by Anton Karatoun.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Distributed Combinatorial Optimization
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Network Topologies.
Data Selection In Ad-Hoc Wireless Sensor Networks Olawoye Oyeyele 11/24/2003.
Online Detection of Change in Data Streams Shai Ben-David School of Computer Science U. Waterloo.
Target Tracking with Binary Proximity Sensors: Fundamental Limits, Minimal Descriptions, and Algorithms N. Shrivastava, R. Mudumbai, U. Madhow, and S.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
1 Next Few Classes Networking basics Protection & Security.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Models in I.E. Lectures Introduction to Optimization Models: Shortest Paths.
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
1 Gossip-Based Ad Hoc Routing Zygmunt J. Haas, Joseph Halpern, LiLi Cornell University Presented By Charuka Silva.
Arrangements and Duality Motivation: Ray-Tracing Fall 2001, Lecture 9 Presented by Darius Jazayeri 10/4/01.
Using local geometry for Topology Construction in Wireless Sensor Networks Sameera Poduri Robotic Embedded Systems Lab(RESL)
به نام خدا سيد عليرضا كارداني مجتبي اميرخاني Path Set Selection in Mobile Ad Hoc Networks زمستان 1382.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
On Optimal Geographic Routing in Wireless Networks with Holes and Non-Uniform Traffic Sundar Subramanian, Sanjay Shakkottai and Piyush Gupta INFOCOM 2007.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
Arrangements and Duality Supersampling in Ray Tracing.
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Common Intersection of Half-Planes in R 2 2 PROBLEM (Common Intersection of half- planes in R 2 ) Given n half-planes H 1, H 2,..., H n in R 2 compute.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
1 Power Efficient Monitoring Management in Sensor Networks A.Zelikovsky Georgia State joint work with P. BermanPennstate G. Calinescu Illinois IT C. Shah.
Prof. Yu-Chee Tseng Department of Computer Science
CS 457 – Lecture 12 Routing Spring 2012.
Depth Estimation via Sampling
Coverage and Connectivity in Sensor Networks
Detecting Denial-of-Service Attacks against Sensor Networks
Presentation transcript:

Detecting Cuts in Sensor Networks Subhash Suri UC Santa Barbara (Joint work with N. Shrivastava and C. Toth)

Sensor Networks Wirelessly networked devices that sense, compute, actuate. Instrumentation of real world. Applications in surveillance, tracking, habitat monitoring. Virtual "eyes and ears" for remote monitoring.

Motivation Operational conditions often severe and hostile. Devices physically exposed and more vulnerable than wired Internet. Communication medium fragile. How can we ensure that any significant damage to our remote eyes-and- ears is quickly and reliably detected?

Network Cuts We focus on a particular kind of failure: network partition by a linear cut.  -cut: network partition where  -fraction of sensors cut off from the base station. Linear  -cut: partition defined by a line. Two equivalent views: physical disabling of sensors, or communication disruption along the cut. Linear  -cut

Resource Constraints Continuously polling each and every sensor is infeasible. Communication is the largest source of power drain. Sensors have limited on-board power. Bandwidth is also limited, as multi-hop routing requires several other nodes to forward a packet. Need for a low overhead, low latency, high confidence, cut detection scheme.

A Model of Monitoring The base station knows the locations of all sensors. A small subset of nodes is designated as sentinels. Each live sentinel node sends a heartbeat message to the base station per epoch. No message from the dead sentinels. The live/dead signature vector at the base station is sufficient to decide if an  -cut has occurred. Sentinels monitoring using Sentinel Set

Related Work The sentinel model is inspired by work of Kleinberg. His setting is a wired network: detect an  -cut that results from cutting off at most k edges in the graph. Designate O(poly(k), 1/  ) nodes as sentinels, who engage in pairwise communication.

Geometric Cuts Spatially correlated cuts are more natural in sensor networks. Geometric cut complexity (linear, circular etc.) more meaningful than edge failures. A major drawback of Kleinberg scheme is the presence of False Positive. With high probability, it catches all  -cuts, but many of the reported cuts can be quite small (False Alarms). In remotely deployed sensor networks, checking a false alarm is expensive. A sensor field Linear  -cut

Sampling Methods By the  -net theory, an O( 1/  log 1  ) size random sample of nodes can act as a detection set. But this scheme has a large rate of false positives.  -approximation sample eliminates the false positives, but it requires too large a sentinel set. For instance, with  = 0.1 and  = 0.05, the  -approximation has size is at least 10,000

 -cuts and approximation guarantees Cuts must be defined as a fraction of the network size. Otherwise, catching all cuts of size k requires at least n/k detection nodes. Sharp threshold impossible as well: catch all  -cuts, but no cuts of size <  n. Such a sharp cutoff requires at least n/2 detection nodes. Our Result: A detection set of size O(1/  ) that detects every  -cut, and every reported cut has size at least  n/ n-1 n-2 k

Geometry of Network Cuts Think of sensors as points in the plane. A linear cut is a line that partitions the point set. The point-line duality: point (a,b)  line (y = ax - b) L L* It preserves above/below relationship: point p above line L  point L* above line p*.

Geometry of Network Cuts A line L is an  -cut if the dual point L* lies above  n dual lines. Thus, the set of all linear  -cuts is the region above the  n level (symmetrically, below the (n -  n) level). Imagine a polygonal curve (separator) made up of dual lines that lies between  n/2 and  n levels. Then, the primal points corresponding to these lines form a detection set. Two issues:  Is there such a separator using just a few lines?  We don't know the cut line L. How will we decide that L* lies above the separator? L L*

Complexity of a Separator A level can have  (nlogn) segments. Average complexity of a level is  (n). We want a separator of size roughly 1/  (independent of n!). We construct a zig-zag path between levels  n/2 and  n.  Start at left, follow the edge until top level hit.  Reflect and follow until bottom level hit, reflect and continue. Claim: At least one zigzag separator path has O(1/  ) segments. It lies between  n/2 and  n levels.

Complexity of Separator Zig zag paths are edge-disjoint. Total number of bends at most the number of vertices in the top and bottom levels. We choose two levels that each have O(n) vertices, and are  (  n) levels apart. By the averaging argument, at least one zigzag path will have O(1/  ) segments. The dual points of these lines are our sentinels.

Detecting Cuts from Sentinels For each dead (live) sensor, we know that the dual of the cut L* must be above (below) the line. In this example, w1, w3, w4 are dead; others alive. The intersection of these halfspaces gives a convex cell. If this cell is above the separator, we declare an  n. Otherwise, it's a false alarm. Base station computes the dual of the sentinel nodes only. (The arrangement formed by the separator lines.) Base station learns the dead/alive bit of each sentinel.

Sample Sentinel Sets Uniform N = 5000,  = 0.01 No. of sentinels = 14 US-census data N = 5000,  = 0.01 No. of Sentinels = 12 Non-uniform N = 5000,  =0.01 No. of sentinels = 14

Scalability with Network Size  

Scalability with  N = 5000

Sentinels vs. Random Sampling Two natural random sampling schemes. Choose as many random nodes as our sentinel schemes. Random Sampling  k nodes chosen uniformly at random.  Report if more than  k sentinels dead. Radial Sampling  k directions chosen at random, and for each choose the  n extreme vertex.  Report if any of these k dies. k-random directions

False Positives Generated 250 cuts by picking points randomly between levels 1 and  n/2 These cuts are all below the appr threshold, and should not be reported. Random and radial sampling schemes misreport some of them as cuts. No False Positives in Sentinel Set

False Negatives 250 cuts by picking points randomly between level  n and 2  n These are all above the approximation threshold, and so should be reported. Random and radial sampling schemes failed to report some of them as cuts. No False Negatives in Sentinel Set

Extensions, Future Directions Robustness to random sensor failures  Make c independent sentinel sets, take the majority vote to detect cuts  Fast randomized algorithm to find sentinel set Future work  More flexible cut definitions: More complex shape. Majority but not all sensors destroyed.  Distributed detection.