Localization with witnesses

Slides:



Advertisements
Similar presentations
Cooperative Transmit Power Estimation under Wireless Fading Murtaza Zafer (IBM US), Bongjun Ko (IBM US), Ivan W. Ho (Imperial College, UK) and Chatschik.
Advertisements

Dept. of computer Science and Information Management
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Communication Systems Simulation - I Harri Saarnisaari Part of Simulations and Tools for Telecommunication Course.
Teaching material based on Distributed Systems: Concepts and Design, Edition 3, Addison-Wesley Copyright © George Coulouris, Jean Dollimore, Tim.
He Huang Introduction:The Flooding Time Synchronization Protocol.
Time Synchronization Murat Demirbas SUNY Buffalo.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 13th Lecture Christian Schindelhauer.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
Power saving technique for multi-hop ad hoc wireless networks.
Timing-sync Protocol for Sensor Networks (TPSN) Presenter: Ke Gao Instructor: Yingshu Li.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Time of arrival(TOA) Prepared By Sushmita Pal Roll No Dept.-CSE,4 th year.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Cross-Layer Optimization in Wireless Networks under Different Packet Delay Metrics Chris T. K. Ng, Muriel Medard, Asuman Ozdaglar Massachusetts Institute.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Multiple Sequence Alignment Vasileios Hatzivassiloglou University of Texas at Dallas.
Chapter 3: The Data Link Layer –to achieve reliable, efficient communication between two physically connected machines. –Design issues: services interface.
Localization by TDOA ©Thomas Haenselmann – Department of Computer Science IV – University of Mannheim Lecture on Sensor Networks Historical Development.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Pedro Moreira CERN BE-CO-HT
Data Link Layer.
Ad Hoc Radio Networks Radio Network is a collection of transmitter-receiver devices (denoted as notes). Each node can transmit data to nodes which exist.
Introduction to Wireless Sensor Networks
Wireless LANs Wireless proliferating rapidly.
Topology Control –power control
Distributed Computing
Layered Architectures
Chapter 6: Transport Layer (Part I)
CSE 486/586 Distributed Systems Time and Synchronization
Understanding the OSI Reference Model
Lei Chen and Wendi B. Heinzelman , University of Rochester
Net 435: Wireless sensor network (WSN)
Location of Mobile Device
Congestion Control, Internet transport protocols: udp
Wireless Communication Co-operative Communications
CS412 Introduction to Computer Networking & Telecommunication
Wireless Communication Co-operative Communications
The Capacity of Wireless Networks
Ethernet – CSMA/CD Review
Secure Verification of Location Claims
Net 323 D: Networks Protocols
Wireless Mesh Networks
Wireless Sensor Networks and Internet of Things
Physical clock synchronization
Protocols.
Overview: Chapter 4 Infrastructure Establishment
TCP: Transmission Control Protocol Part II : Protocol Mechanisms
CSE 486/586 Distributed Systems Time and Synchronization
Watermarking with Side Information
Data Link Layer. Position of the data-link layer.
Information Sciences and Systems Lab
Protocols.
Presentation transcript:

Localization with witnesses Arun Saha, Mart Molle University of California, Riverside 9/19/2018 University of California, Riverside

Position Verification Other nodes(s) verify the position claimed by the prover, relative to: Global co-ordinate system e.g. GPS, or Local co-ordinate system Proximity to a designated point Position verification is orthogonal to Identity verification. Finding the position of a node is known as Localization 9/19/2018 University of California, Riverside

Range-based localization Range-based localization finds distance bounds between nodes. Distance bounding is the process by which the verifier entity establishes an upper bound on the distance to the prover entity. Multiple distance bounds are geometrically combined to constrain the prover’s location. 9/19/2018 University of California, Riverside

“Timed Echo” Distance Bounding The message RTT is converted to distance bound: Verifier sends a random number and starts a timer, Prover echoes the number back to verifier Verifier receives the response and stops timer. Limitations to accuracy: Measurement error at the verifier, Variability in the response delay at prover ECHO protocol Challenge – Response Paradigm 9/19/2018 University of California, Riverside

Conflict between required and achievable timing accuracy To localize objects within a room or building distance errors must be in meters timing errors must be in tens of nanoseconds. Such fine grained time measurement is impossible in software. There are delays in the layers of the protocol stack. Experiment with sending 1 byte payload in TCP/IP over local LAN [ZBcF05] Sending latency = 8.39 microsecond Receiving latency = 19.25 microsecond Informal experiment “ping –c 1000 localhost” gives 1000 packets transmitted, 1000 received, 0% packet loss, time 999410ms rtt min/avg/max/mdev = 0.034/0.056/0.100/0.010 ms. 9/19/2018 University of California, Riverside

Wireless Localization Model A group of nodes in an ad-hoc or sensor network Mutually trusted Mutually co-operative A new node in the neighborhood, not in the network yet, i.e. untrusted The group of nodes want to find out the location of the new node If there are (at least) three independent distance measurements to the prover, then the location of the prover can be found as the intersection of the three curves. 9/19/2018 University of California, Riverside

Localization via time-difference of arrival with multiple verifiers Multilateration: Time-Differences of signal arrival from a single source (prover) to multiple known locations (verifiers) can localize the source of the signal. Existing solutions: Assume verifiers are already time synchronized, and can record the Time-of-Arrival for a particular signal Our solution: Verifiers get time synchronized by acquiring the clock rate of the challenge signal, and can record the time difference between a pair of consecutive signals 9/19/2018 University of California, Riverside

One dimensional localization with witnesses 9/19/2018 University of California, Riverside

Messages between the lead-verifier and the prover 9/19/2018 University of California, Riverside

Difference of Distances Known difference of distance lead to Hyperbola with foci At W and W’ Note that the hyperbola does not depend on Response Delay tau_U 9/19/2018 University of California, Riverside

University of California, Riverside Realizations Any verifier-pair can form the locus of the prover Any verifier-triplet can localize the prover The location found by the triplet is independent of the response delay (tau_U) at the prover 9/19/2018 University of California, Riverside

University of California, Riverside Tackling Delays Measurement Delay takes place at the verifier. The PHY of verifier helps to minimize measurement delay as: Start a timer as soon as the SFD (or SSD) of the challenge frame is transmitted Stop the timer as soon as the SFD (or SSD) of the subsequent frame, i.e. the response frame, is received. Response Delay happens at the prover. A verifier cannot expect co-operation from an untrusted Prover Even a honest prover cannot maintain or report exact delay! As a result of combining results from multiple witnesses, the locus of the prover does not depend on the Response Delay  As a matter of fact, 9/19/2018 University of California, Riverside

University of California, Riverside Measuring tau_W The witnesses measure the delay in three steps: The lead-verifier sends a DummyChallenge; the witnesses “acquire” the transmission clock rate and locks to that, transceiver is kept in “ready-to-receive” state. The lead-verifier sends the (real) challenge; the witnesses starts a timer on reception of SFD of the challenge The prover sends the response; The witness stops the timer on reception of SFD of the subsequent frame i.e. the response The witnesses report (through some application specific protocol) the delay measured at the timer to the lead-verifier. The delay measured at the lead-verifier itself is stored in the PHY, and reported when requested from higher layer localization application. 9/19/2018 University of California, Riverside

Measurement Errors in tau_W If there are no errors in measurement of tau_W’s, then all hyperbolas will intersect at the true location of the prover. There might be other intersection points too. However, if there are errors, the intersection points will not exactly be at the true location of the prover If the measurement errors are like random noise with zero mean, then the intersection points will be clustered around the true location point. 9/19/2018 University of California, Riverside

An over-determined system Let there be n verifiers: There will be h = (n choose 2) hyperbolas There will be approx. N = (h choose 2) intersection points. How can we combine the N solution points into one single estimate? 9/19/2018 University of California, Riverside

Combining multiple solution points 2D median of the solution points: Peel Off the outermost points forming the minimum enclosing convex hull Imagine all solution points are different measurements of the same signal and use them to make the final estimate One way to do that is Kalman filtering We obtained all solution points by pairwise solving all hyperbolas Then we passed the solution points one-by-one through the Kalman Filter After sufficient number of steps, the solution converges. 9/19/2018 University of California, Riverside

Results from Kalman Filtering The order in which we different solution points are considered significantly effect the final estimate. The same set of solution points processed in different order by the filtering algorithm produces different final estimate. Some solution points are more significant than others Points should be processed in decreasing order of significance. If the solution point is inside the triangle formed by the corresponding verifier triplet, then it is more significant than others which are outside The solution point whose sum of normal distances to all hyperbolas is minimum is the most significant one. 9/19/2018 University of California, Riverside

Sensitivity w.r.t. to verifier triplet If the solution point lies outside the verifier triplet, then it is more sensitive to measurement errors 9/19/2018 University of California, Riverside

University of California, Riverside Error Sensitivity 9/19/2018 University of California, Riverside

Regions of uncertainty around Prover location 9/19/2018 University of California, Riverside

Regions are greater for Provers located out of the verifier triangle 9/19/2018 University of California, Riverside

(Selected) References 9/19/2018 University of California, Riverside

Thanks for your presence and patience Questions?