Contaminated Areas Monitoring via Distributed Rateless Coding with Constrained Data Gathering Cedomir Stefanovic, Vladimir Crnojevic, Dejan Vukobratovic,

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

COPYRIGHT © 2011 ALCATEL-LUCENT. ALL RIGHTS RESERVED. INFORM: a dynamic INterest FORwarding Mechanism for Information Centric Networking Raffaele Chiocchetti,
Correctness of Gossip-Based Membership under Message Loss Maxim GurevichIdit Keidar Technion.
Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
高度情報化社会を支えるネットワーキング技術 (大阪大学 工学部説明会資料)
A Survey of Web Cache Replacement Strategies Stefan Podlipnig, Laszlo Boszormenyl University Klagenfurt ACM Computing Surveys, December 2003 Presenter:
The Capacity of Wireless Networks
Degree Distribution of XORed Fountain codes
Differential Forms for Target Tracking and Aggregate Queries in Distributed Networks Rik Sarkar Jie Gao Stony Brook University 1.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
The Small World Phenomenon: An Algorithmic Perspective Speaker: Bradford Greening, Jr. Rutgers University – Camden.
Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Gagan Raj Gupta Post-Doctoral Research Associate with the Parallel.
1 ECE 776 Project Information-theoretic Approaches for Sensor Selection and Placement in Sensor Networks for Target Localization and Tracking Renita Machado.
Exploring Energy-Latency Tradeoffs for Broadcasts in Energy-Saving Sensor Networks AUTHOR: MATTHEW J. MILLER CIGDEM SENGUL INDRANIL GUPTA PRESENTER: WENYU.
Multirate adaptive awake-sleep cycle in hierarchical heterogeneous sensor network BY HELAL CHOWDHURY presented by : Helal Chowdhury Telecommunication laboratory,
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Data Persistence in Sensor Networks: Towards Optimal Encoding for Data Recovery in Partial Network Failures Abhinav Kamra, Jon Feldman, Vishal Misra and.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
1 Rateless Packet Approach for Data Gathering in Wireless Sensor Networks Dejan Vukobratovic, Cedomir Stefanovic, Vladimir Crnojevic, Francesco Chiti,
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
An Adaptive Probability Broadcast- based Data Preservation Protocol in Wireless Sensor Networks Liang, Jun-Bin ; Wang, Jianxin; Zhang, X.; Chen, Jianer.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
Rateless Codes with Optimum Intermediate Performance Ali Talari and Nazanin Rahnavard Oklahoma State University, USA IEEE GLOBECOM 2009 & IEEE TRANSACTIONS.
Lifetime and Coverage Guarantees Through Distributed Coordinate- Free Sensor Activation ACM MOBICOM 2009.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Reducing Traffic Congestion in ZigBee Networks: Experimental Results th International Wireless Communications and Mobile Computing Conference (IWCMC)
Related Works of Data Persistence in WSN htchiu 1.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Andrew Liau, Shahram Yousefi, Senior Member, IEEE, and Il-Min Kim Senior Member, IEEE Binary Soliton-Like Rateless Coding for the Y-Network IEEE TRANSACTIONS.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
Selection and Navigation of Mobile sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan and Kee-Chaing Chua National University of.
Bounded relay hop mobile data gathering in wireless sensor networks
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh ( 謝坤穎 ) Dept. of Computer Science and Information Engineering National.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
1 On Improving Data Accessibility in Storage Based Sensor Networks Tan Apaydin, Serdar Vural and Prasun Sinha IEEE International Conference on Mobile Adhoc.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Prof. Yu-Chee Tseng Department of Computer Science
Salah A. Aly ,Moustafa Youssef, Hager S. Darwish ,Mahmoud Zidan
Computing and Compressive Sensing in Wireless Sensor Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Presentation transcript:

Contaminated Areas Monitoring via Distributed Rateless Coding with Constrained Data Gathering Cedomir Stefanovic, Vladimir Crnojevic, Dejan Vukobratovic, Lorenzo Niccolai, Francesco Chiti and Romano Fantacci ACM IWCMC(International Wireless Communications and Mobile Computing Conference)

Outlines Introduction Distributed rateless coding for contaminated area monitoring Simulation results Conclusions 2

Introduction Wireless Sensor Networks (WSNs) represent a key technology for environmental monitoring, emergency detection…. This paper presents a data gathering protocol specifically designed for an emergency monitoring WSN. It is based on distributed implementation of rateless codes [5] being suitable to devices with low computational capabilities. The encoded data is dispersed to the perimeter of the monitored area (boundary zone), where it is collected by a Mobile Collector(MC) The encoding and data dispersion is a modification of the scheme introduced in [6], well-suited for decentralized WSNs deployed in inaccessible locations with no infrastructure support and where SNs are prone to failures due to harsh operating conditions. The proposed scheme ensures data persistence and allows for efficient distributed data storage and data gathering. 3

4 Figure 1: Reference scenario.

5 Rateless packet Rateless packets are generated from sensor measurements stored as equal-length sensor data packets in each of N sensor nodes. – Generation ID : the period when the data were measured, – Sensor IDs : the sensors whose data packets are encoded in the data field, – Degree Counter and Mixing-Time Counter fields control the encoding process.

6 Rateless packet The process of creating rateless packets consists of 3 phases: initialization, encoding and dispersion of the rateless packets. 1) the initialization phase – bN rateless packets are initialized across N sensor nodes of the WSN. – Every sensor node generates b rateless packets, copies its current sensor data packet in the rateless packet data field and puts its ID in the sensor IDs header field. – To each of b rateless packets, sensor independently associates a degree d drawn randomly from a selected degree distribution Ω(d). – As the rateless packet content is initialized with the local sensor data packet, the degree counter is set to value d 1, which is the remaining degree to be collected. – Finally, the mixing-time counter is set to the chosen (global) mixing-time value τ.

7 Rateless packet 2) the encoding phase – the task of each rateless packet is to add to its content the remaining d1 sensor datapackets selected uniformly at random by performing random walk across the WSN. – The probabilities p ij of selecting sensor node j from the set N(i) are obtained locally by each sensor node i. – While performing a random walk, every rateless packet is processed by every sensor node on the path using the following simple rule. If the mixing-time counter 0 – the sensor node only updates the rateless packet header – the mixing-time counter - 1 – forward the rateless packet to the next random hop If the mixing-time counter = 0 – the sensor node adds its sensor data packet to the rateless packet content, – degree counter - 1 – puts its Sensor ID in the list of Sensor IDs, – resets the mixing-time counter to its initial value τ – forwards the rateless packet to the next random hop. Finally, upon collecting d sensor data packets the rateless packet completes its encoding phase.

8 Rateless packet 3) the dispersion phase – The goal of the dispersion phase is to place the rateless packet in its final random position in the network. – To prevent any correlation between the content of the rateless packet and the node where it is finally stored, each rateless packet continues its random walk for another τ hops.

9 Fig. 3. Example of rateless packet initialization, encoding and dispersion phase.

Boundary Detection Identify all the SNs that are within certain distance from the outer network bound; in particular, those that are within the communication range of the Mobile Collector(MC) that is moving around the network perimeter (see Fig. 1) There are 3 classes of boundary detection algorithms, depending on the type of information used for node separation[9]: – 1) geometric algorithms Geometric algorithms exploit the geographical information of node locations – 2) topological algorithms Topological algorithms make use of the node connectivity information, provide low-complexity distributed solutions [10], but are tailored for detection of the nodes that form network borders. – 3) statistical algorithms Statistical algorithms use the statistical properties of the underlying network graph with an aim to derive rule for node classification. The algorithm presented in [11] assumes a uniform random node distribution and exploits the fact that nodes on boundaries have lower average degrees than interior nodes, thus determines a threshold that is used for node separation. 10

Boundary-Zone Detection We assume a uniform random SN distribution over the monitored area and employ a statistical approach. – For the sake of simplicity, we assume that the network is dense enough to have no interior bounds (i.e., there are no holes within the network) we employed a statistical node separation method, but instead of node degree, we used 2-hop neighbor count as the separation criterion. The former requires a very dense network (average node degree of 100 or more), The drawback of the method is that the threshold has to be determined experimentally, i.e., the knowledge of the shape of the monitored area has to be known in advance. Figure 2: Boundary-zone detection, N = 1000, r = 0.1. where the threshold is set to 54.

Distributed rateless coding Assume – N sensor nodes – each SN initializes b copies of its own information packet and assigns independently and randomly to each initial rateless packet a degree d drawn from Ω(d) – The random walk mixing time τ M – The encoded packets are first let to randomly walk over the network for dispersion time τ D number of hops, after which the walks are constrained to end in the boundary-zone nodes. 12

Distributed rateless coding The average number of hops h that a rateless packet makes during the encoding and the subsequent dispersion – d is average packet degree – h BZ is the average number of hops needed to reach the boundary-zone nodes 13

Distributed rateless coding The total number of hops per original data packet, which is an indicator of energy- expenditure of the scheme 14

Simulation results Setting – Distributed rateless coding is started and b · N rateless packets are created, encoded, and dispersed toward the boundary-zone – Rateless packets degrees are selected either according to RS or Bounded-Degree RS (BDRS) degree distribution with maximum degree 66[8]. – Random walks are designed using Metropolis- Hastings algorithm. 15 [8] A. Shokrollahi. Raptor Codes. IEEE Transation on Information Theory, 52(6):2551–2567, June 2006.

16 Figure 3: Average number of packets N avg needed for successful decoding, N = 500, r = 0.12, b = 3 The graph shows that a scheme using RS degree distribution is better then its corresponding BDRS version; however, this comes at the price of an increased energy-expenditure. An increase in both τ M and τ D decreases N avg, where the former improves the performance of distributed encoding and the latter makes data gathering more efficient. The average degrees of employed degree distributions are d RS 8.37 and d BDRS 4.87, meaning that a rateless packet on average makes approximately 3.5 · τ M hops more in the case of RS degree distribution.

17 Figure 4: Average no. of packets N avg needed for successful decoding, N = 500, r = 0.12 Encoding a larger number of rateless packets when τ M and τ D are small increases the chances of collecting packets that are only partially innovative. This result is advantageous as a smaller number of rateless packets in the network decreases both N avg and the overall energy-expenditure.

18 Figure 5: Average no. of packets N avg needed for successful decoding, N = 1000, r = 0.1 The increase in τ M /τ D improves the performance, and for short τ M /τ D the performance is better for smaller number of encoded packets 2

Conclusions We presented a solution for network perimeter data gathering based on distributed rateless codes. The proposed scheme is suitable for emergency monitoring applications via WSNs deployed in partially inaccessible locations. The use of rateless codes provides low complexity encoding/ decoding and ensures data persistence despite node failures. 19

References [6] D. Vukobratovic, C. Stefanovic, V. Crnojevic, F. Chiti, and R. Fantacci, Rateless Packet Approach for Data Gathering in Wireless Sensor Networks, IEEE Journal on Selected Areas in Communications, vol. 28, no. 7, Sep [8] A. Shokrollahi. Raptor Codes. IEEE Transation on Information Theory, 52(6):2551–2567, June [9] Y. Wang, J. Gao, and J. S. B. Mitchell. Boundary Recognition in Sensor Networks by Topological Methods. In Proc. of ACM MobiCom 2006, Los Angeles, CA, USA, September [10] S. Funke and C. Klein. Hole Detection or: How Much Geometry Hides in Connectivity?. In Proc. of ACM SCG06, Sedona, AZ, USA, Jun [11] S. P. Fekete, A. Kr¨oller, D. Pfisterer, S. Fischer, and C. Bushmann. Neighborhood-Based Topology Recognition in Sensor Networks. In Proc. Of ALGOSENSORS04, Turku, Finland, July [12] D. Vukobratovic, C. Stefanovic, and V. Stankovic, Fireworks: A random linear coding scheme for distributed storage in wireless sensor networks, in Proc. of IEEE ITW 2010, Dublin, Ireland, Sep [13] S. Acedanski, S. Deb, M. Medard, and R. Koetter, How good is random linear coding based distributed networked storage, in Proc. of NETCOD 2005 Workshop, Riva dal Garda, Italy, Apr