Lab 3 Routing in Sensor Networks

Slides:



Advertisements
Similar presentations
Security and Sensor Networks By Andrew Malone and Bryan Absher.
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
10 REASONS Why it makes a good option for your DB IN-MEMORY DATABASES Presenter #10: Robert Vitolo.
MiLAN: Middleware to Support Sensor Network Applications Wendi B. Heinzelman, Amy L. Murphy, Hervaldo S. Carvalho, Mark A. Perillo University of Rochester.
The 6th Scientific Conference - Healthy Animal for Safe Food 2013
1 Introduction to Wireless Sensor Networks. 2 Learning Objectives Understand the basics of Wireless Sensor Networks (WSNs) –Applications –Constraints.
Generic Sensor Platform for Networked Sensors Haywood Ho.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 A Dynamic Clustering and Scheduling Approach to Energy Saving in Data Collection from Wireless Sensor Networks Chong Liu, Kui Wu and Jian Pei Computer.
TinyOS Software Engineering Sensor Networks for the Masses.
Wireless Sensor Network Security Anuj Nagar CS 590.
CS Dept, City Univ.1 Research Issues in Wireless Sensor Networks Prof. Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
Key management in wireless sensor networks Kevin Wang.
Introduction To Wireless Sensor Networks Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting of spatially distributed.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Mobile cloud computing: survey 1. Introduction  In recent years, applications targeted at mobile devices havs started becoming abundant with applications.
Wireless Sensor Networks CS 4501 Professor Jack Stankovic Department of Computer Science Fall 2010.
MICA: A Wireless Platform for Deeply Embedded Networks
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
Ayan Banerjee & Karthik Thangavel. Project Goals Study of present state of security in Body Area Networks(BAN) Cyber-Physical security Resource Footprint.
KAIS T CS712 병렬처리 특강 - 차세대 무선네트워크 응용 및 보안 - Syllabus Network & Security Lab.
Introduction to Wireless Sensor Networks
Sensor Database System Sultan Alhazmi
한국기술교육대학교 컴퓨터 공학 김홍연 Habitat Monitoring with Sensor Networks DKE.
Wireless Sensor Networks for Habitat Monitoring Intel Research Lab EECS UC at Berkeley College of the Atlantic.
1 Extended Lifetime Sensor Networks Hong Huang, Eric Johnson Klipsch School of Electrical and Computer Engineering New Mexico State University December.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Ben Miller.  A distributed algorithm is a type of parallel algorithm  They are designed to run on multiple interconnected processors  Separate parts.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Based on slides from Andreas Larsson Table from CY Chong, SP Kumar, BA Hamilton - Proceedings of the IEEE, 2003.
Introduction to Wireless Sensor Networks
788.11J Presentation Volcano Monitoring Deploying a Wireless Sensor Network on an Active Volcano Phani Arava.
Computer Performance. Hard Drive - HDD Stores your files, programs, and information. If it gets full, you can’t save any more. Measured in bytes (KB,
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
Sensor Networks © M Jamshidi.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
Introduction to Wireless Sensor Networks
Salah A. Aly ,Moustafa Youssef, Hager S. Darwish ,Mahmoud Zidan
Overview of Wireless Networks:
Introduction to Wireless Sensor Networks
Introduction
Wireless Sensor Network (WSN)
Wireless Sensor Network Architectures
 ZigBee is a language that allows you to control the everyday devices around you.
Algorithms for Big Data Delivery over the Internet of Things
WISENET Wireless Sensor Network
Meng Cao, Xiangqing Sun, Ziyue Chen May 28th, 2014
Wireless Ad-Hoc Networking
Adhoc and Wireless Sensor Networks
SNoD Sensor Networks on Defense Team Members: Kaustubh Supekar Gaurav Sharma Deepti Agarwal Aditya Barve Brijraj Vaghani Seema Joshi Debashis Haldar.
Securing Wireless Sensor Networks
Lab 3 Routing in Sensor Networks
Lecture 3: Wireless Sensor Networks
Lab 3 Routing in Sensor Networks
RM3G: Next Generation Recovery Manager
From Prototype to Production Grid
Memento: Making Sliding Windows Efficient for Heavy Hitters
How New Hardware Has Affected Software Architecture
REED : Robust, Efficient Filtering and Event Detection
Protocols.
Lab 3 Routing in Sensor Networks
Overview: Chapter 2 Localization and Tracking
Protocols.
Presentation transcript:

Lab 3 Routing in Sensor Networks Based on slides from Andreas Larsson 2012

Part 1 Sensor Networks -- General * The idea of sensor networks - massive distributed system * Deployment * Setting up the network * The nodes themselves * Usage patterns of sensor networks * Examples of current uses

What is a sensor network? ”A sensor network, is a network of small computers placed in an area that we want to collect information from. The computers sense the environment and store, process and/or communicate this information” -------------- * The idea of sensor networks – A massive distributed system A general quick and easy introduction with some nice picture

Big Range of Sensor Nodes Table from CY Chong, SP Kumar, BA Hamilton - Proceedings of the IEEE, 2003

Deployment “Sensor networks may be deployed in many different ways. A good way to see it is deployment from the air” The “worst” case => The “general” case We don’t know: Where they end up Which nodes can communicate with each other Which nodes end up in the network Can die in the fall Can end up in a position where they cannot communicate with anyone Battery changes tor practical (many cases): Battery life is very important (Often) Need of refilling the network ------------------------- How sensor networks are deployed. Picture of nodes being thrown out from a helicopter or something like that. Stressing that in the general case we cannot control exactly where nodes end up.

Setting up the network “So after deployment we have nodes over an area without knowing exactly which node is where. Therefore it is up to the nodes to set up a network among themselves and initialize the application they are going to run.” ----------------------------- Sensor Network = Ad Hoc Network

MicaZ Sensor Node CPU 7MHz Program Memory 128 kB RAM 4 kB Storage Memory 512 kB Bandwidth 250 kBps Indoor Range 20-30 m Outdoor Range 75-100 m Battery Life Full operation at all times 50 h Sensor limitations: Limited computation capacity Limited memory capacity Limited storage capacity Limited battery capacity => Normal algorithms often unpractical Ffew fewfe

Usage patterns Sleeping The Main Task Data gathering Data aggregation Data communication Auxiliary Tasks Synchronization Security

Examples of uses Utility Structural health monitoring Agriculture Parking space guidance/monitoring Research Volcanos Permafrost Animal behavior

Permasense

COMMONSense Internet

The Stork Bridge Transition: These are not only general examples. Detecting volcano eruptions, earthquakes, tsunamis, problems with important infrastructure are significant for crisis management whether there is a malicious intent behind it or not.