Wireless Sensor Networks: Perimeter Security By Jeremy Prince, Brad Klein, Brian Wang, & Kaustubh Jain.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0881r0 Submission July 2012 Anna Pantelidou, Renesas Mobile CorporationSlide 1 PS Mode Enhancements with Timing Indication Date:
Advertisements

Exploring Energy-Latency Tradeoffs for Broadcasts in Energy-Saving Sensor Networks AUTHOR: MATTHEW J. MILLER CIGDEM SENGUL INDRANIL GUPTA PRESENTER: WENYU.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
1 Routing Techniques in Wireless Sensor networks: A Survey.
PERFORMANCE MEASUREMENTS OF WIRELESS SENSOR NETWORKS Gizem ERDOĞAN.
Wireless ABS system By: Srej Balázs Pereira Raymond Alejandro Escalada Arto Toppinen Anssi Suhonen Savonia Polytechnic.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
1-1 Topology Control. 1-2 What’s topology control?
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
Energy-Efficient Design Some design issues in each protocol layer Design options for each layer in the protocol stack.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Topology Control.
Radio-Triggered Wake-Up Capability for Sensor Networks Soji Sajuyigbe Duke University Slides adapted from: Wireless Sensor Networks Power Management Prof.
RF Wakeup Sensor – On-Demand Wakeup for Zero Idle Listening and Zero Sleep Delay.
IGMP and MLD Optimization in Wireless and Mobile Networks 1 draft-liu-multimob-igmp-mld-wireless-mobile-00.
Achieving Long-Term Surveillance in VigilNet Pascal A. Vicaire Department of Computer Science University of Virginia Charlottesville, USA.
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Project Introduction 이 상 신 Korea Electronics Technology Institute.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Sluzek 142/MAPLD Development of a Reconfigurable Sensor Network for Intrusion Detection Andrzej Sluzek & Palaniappan Annamalai Intelligent Systems.
ZebraNet Hardware Design Experiences in ZebraNet Presented by Zuhal Tepecik.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
Chapter 6 – Connectivity Devices
Tufts University. EE194-WIR Wireless Sensor Networks. March 3, 2005 Increased QoS through a Degraded Channel using a Cross-Layered HARQ Protocol Elliot.
Tracking Irregularly Moving Objects based on Alert-enabling Sensor Model in Sensor Networks 1 Chao-Chun Chen & 2 Yu-Chi Chung Dept. of Information Management.
Minimizing Energy Consumption in Sensor Networks Using a Wakeup Radio Matthew J. Miller and Nitin H. Vaidya IEEE WCNC March 25, 2004.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
ELECTIONEL ECTI ON ELECTION: Energy-efficient and Low- latEncy sCheduling Technique for wIreless sensOr Networks Shamim Begum, Shao-Cheng Wang, Bhaskar.
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling Olaf Landsiedel 1, Euhanna Ghadimi 2, Simon Duquennoy 3, Mikael Johansson 2 1 Chalmers University.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Energy-Efficient Wake-Up Scheduling for Data Collection and Aggregation Yanwei Wu, Member, IEEE, Xiang-Yang Li, Senior Member, IEEE, YunHao Liu, Senior.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Delivery ratio-maximized wakeup scheduling for ultra-low duty-cycled WSNs under real-time constraints Fei Yang, Isabelle Augé-Blum National Institute of.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
Simulation of DeReClus Yingyue Xu September 6, 2003.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Smart Sleeping Policies for Wireless Sensor Networks Venu Veeravalli ECE Department & Coordinated Science Lab University of Illinois at Urbana-Champaign.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
COMMUNICATING VIA FIREFLIES: GEOGRAPHIC ROUTING ON DUTY-CYCLED SENSORS S. NATH, P. B. GIBBONS IPSN 2007.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Power-Efficient Rendez- vous Schemes for Dense Wireless Sensor Networks En-Yi A. Lin, Jan M. Rabaey Berkeley Wireless Research Center University of California,
Interconnecting Cisco Networking Devices Part 1 Pass4sureusa Pass4sure.
Luis E. Palafox and J.Antonio Garcia-Macias CICESE – Research Center 2009 Proceedings of the 4 th international conference on Wireless pervasive computing.
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
Energy Efficiency Energy consumption is the most important factor to determine the life of sensor network. since sensors networks has low power resources,
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
CMS:Children Monitoring System
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing Zigbee Standard Dr.
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Vidur Nayyar Xueting Wang Weicong Zhao
Coverage and Connectivity in Sensor Networks
Overview: Chapter 2 Localization and Tracking
Presentation transcript:

Wireless Sensor Networks: Perimeter Security By Jeremy Prince, Brad Klein, Brian Wang, & Kaustubh Jain

Project Description Track and monitor intruders within the network. Both camera sensors and motion sensors will be used. Motion sensors are deployed in the whole area we are interested. Camera sensors are only deployed in the security area. The interested area is divided into layers for the sake of energy efficiency.

Use Case Diagram

Detect Description: The motion sensors realize a person in within the network, or the camera sensors take picture Primary Actors: Operator Pre-Conditions: The sensor has been woken up by its neighbor, and the person is within its detection range. The threshold for motion sensors is pre-configured. Flow of Events: – The motion sensor receives the IR signal of the object and processes it. If the signal exceeds the pre-defined threshold, then the object is considered to be a person. – The motion sensor transitions to the Active Mode. – The motion sensor notifies its neighbors. – The motion sensor generates the packet with the location of the person and sends the packet toward the Operator. – Sensors receiving the packet destined for the Operator wake up, resend the packet, and the goes back to sleep. The sensor receiving both wakeup signal and packet, stays in standby. – The camera sensor takes the picture – The camera sensor generates the packet with the picture of the person and sends the packet to the Control Center/Operator. Alternate Flow of Events: None Post Conditions: The packet has been sent to the Control Center. The neighbors of the motion sensor have switched to the Standby Mode (motion sensor) or the Active Mode (camera sensor) Assumptions: – Quality of the picture will depend on the environment (time of day, air quality, etc.). – Even if the intruder has moved out of the frame / field of view, a picture will be taken. – The wake-up time for sensors should be short enough (negligible compared to the movement of the person). – Waking up to send packet requires minimal power (negligible) – Each sensor knows who its neighbors are, and processes the packets accordingly. New Requirements: – The camera sensor has enough local memory to store the picture. – The threshold results in low missed detections and low false detections. – The sensor has an appropriate re-detection rate – The location has lights for night time.

Sensor Requirements

Block Diagram for Sensor Network

Parametric Diagram for Link

Detect Activity Diagram

Track Activity Diagram

State Diagram

State Diagram – Camera Sensor

Trade-Off Analysis Performance Metrics - Probability of Missed Detection, Energy Consumption and Costs. Design Parameters - Number of sensors, time the sensors stay awake once woken-up. Trade-offs – Increasing the time sensors stay awake decreases the probability of missed detections, but increases energy consumption. – Increasing the number of sensors will decrease the probability of missed detection, but increase the costs. Data Sheet – Antenna (CC2420) Standby mode: 426 uA * 3.6 V Sleep mode: 20 uA * 3.6 V Transmit mode: 17.4 mA * 3.6 V Receive mode: 19.7 mA * 3.6 V Transmit Bit Rate: 256 kbps P = 0 dBm cost: $ 100 CPU (PXA 271)

Trade-off Analysis Table

R = Redundancy Factor A = Camera Sensor Field of View Angle St = Stand By Time P = Transmit Power of Antenna

Test and Validation Use UPPAAL to verify the state transitions for the motion and camera sensors with timing information and that there are no deadlocks. Verify by inspection that the component level-requirements are met. Verify each sensor is individually working properly – motion sensor senses motion in its vicinity; the detection threshold is set appropriately. – camera sensor captures good quality picture. – sensors change their states according to proper timing or event-triggers. Test functionality of subsystems – alarm subsystem generates alarm. – database stores pictures and responds to queries by the controller. – controller properly authenticates a picture of a authorized personnel captured by one of the camera sensors. Test system level requirements by trial runs with a dummy intruder. – The system detects the entry – Sensors send and forward messages appropriately – Sensors change state properly – The controller correctly tracks the motion of the intruder – Camera sensors capture picture. Testing of sensor failure scenarios (security and resilience to failure) – Sensors generate low battery signal appropriately. – Other sensors detect loss of neighboring sensors, notify the controller and modify their functionalities accordingly. – Controller keeps track of failed sensors – Controller analyzes data to identify malicious sensor. – Controller sends alarm if too many sensor nodes compromised. Verifying performance requirements are met through analysis – Using parametric diagrams, and solvers like Mathematica and Matlab, compute the performance metrics and verify the margin of error from performance requirements.