The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.

Slides:



Advertisements
Similar presentations
N. Basilico, N. Gatti, F. Amigoni DEI, Politecnico di Milano Leader-Follower Strategies for Robotic Patrolling in Environments with Arbitrary Topology.
Advertisements

Coverage of Sensor Networks: fundamental limits Benyuan Liu joint work with Don Towsley.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Adaptively Learning Tolls to Induce Target Flows Aaron Roth Joint work with Jon Ullman and Steven Wu.
GAME THEORY.
Longest Common Subsequence
This Segment: Computational game theory Lecture 1: Game representations, solution concepts and complexity Tuomas Sandholm Computer Science Department Carnegie.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Effort Games and the Price of Myopia Michael Zuckerman Joint work with Yoram Bachrach and Jeff Rosenschein.
MIT and James Orlin © Game Theory 2-person 0-sum (or constant sum) game theory 2-person game theory (e.g., prisoner’s dilemma)
Guang Tan, Stephen A. Jarvis, and Anne-Marie Kermarrec IEEE Transactions on Mobile Computing, VOL. 8, NO.6, JUNE Yun-Jung Lu.
Movement-Assisted Sensor Deployment Author : Guiling Wang, Guohong Cao, Tom La Porta Presenter : Young-Hwan Kim.
Instructor: Mircea Nicolescu Lecture 13 CS 485 / 685 Computer Vision.
Maximal Lifetime Scheduling in Sensor Surveillance Networks Hai Liu 1, Pengjun Wan 2, Chih-Wei Yi 2, Siaohua Jia 1, Sam Makki 3 and Niki Pissionou 4 Dept.
1 Stochastic Event Capture Using Mobile Sensors Subject to a Quality Metric Nabhendra Bisnik, Alhussein A. Abouzeid, and Volkan Isler Rensselaer Polytechnic.
1 Maximizing Lifetime of Sensor Surveillance Systems IEEE/ACM TRANSACTIONS ON NETWORKING Authors: Hai Liu, Xiaohua Jia, Peng-Jun Wan, Chih- Wei Yi, S.
Jie Gao Joint work with Amitabh Basu*, Joseph Mitchell, Girishkumar Stony Brook Distributed Localization using Noisy Distance and Angle Information.
Mobility Improves Coverage of Sensor Networks Benyuan Liu*, Peter Brass, Olivier Dousse, Philippe Nain, Don Towsley * Department of Computer Science University.
Cache Placement in Sensor Networks Under Update Cost Constraint Bin Tang, Samir Das and Himanshu Gupta Department of Computer Science Stony Brook University.
Find a Path s A D B E C F G Heuristically Informed Methods  Which node do I expand next?  What information can I use to guide this.
AWESOME: A General Multiagent Learning Algorithm that Converges in Self- Play and Learns a Best Response Against Stationary Opponents Vincent Conitzer.
1 A Shifting Strategy for Dynamic Channel Assignment under Spatially Varying Demand Harish Rathi Advisors: Prof. Karen Daniels, Prof. Kavitha Chandra Center.
Achieving Minimum Coverage Breach under Bandwidth Constraints in Wireless Sensor Networks Maggie X. Cheng, Lu Ruan and Weili Wu Dept. of Comput. Sci, Missouri.
CS Dept, City Univ.1 Maximal Lifetime Scheduling for Wireless Sensor Surveillance Networks Prof. Xiaohua Jia Dept. of Computer Science City University.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
1 On the Agenda(s) of Research on Multi-Agent Learning by Yoav Shoham and Rob Powers and Trond Grenager Learning against opponents with bounded memory.
1 Target-Oriented Scheduling in Directional Sensor Networks Yanli Cai, Wei Lou, Minglu Li,and Xiang-Yang Li* The Hong Kong Polytechnic University, Hong.
Decentralised Coordination of Mobile Sensors School of Electronics and Computer Science University of Southampton Ruben Stranders,
MAKING COMPLEX DEClSlONS
Distributed Constraint Optimization Michal Jakob Agent Technology Center, Dept. of Computer Science and Engineering, FEE, Czech Technical University A4M33MAS.
Steady and Fair Rate Allocation for Rechargeable Sensors in Perpetual Sensor Networks Zizhan Zheng Authors: Kai-Wei Fan, Zizhan Zheng and Prasun Sinha.
The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
The Multiplicative Weights Update Method Based on Arora, Hazan & Kale (2005) Mashor Housh Oded Cats Advanced simulation methods Prof. Rubinstein.
SoftCOM 2005: 13 th International Conference on Software, Telecommunications and Computer Networks September 15-17, 2005, Marina Frapa - Split, Croatia.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering A Point-Distribution Index and Its Application to Sensor Grouping Problem Y. Zhou.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
Patrolling Games Katerina Papadaki London School of Economics with Alec Morton and Steven Alpern.
JWITC 2013Jan. 19, On the Capacity of Distributed Antenna Systems Lin Dai City University of Hong Kong.
Prof. Amr Goneid, AUC1 Analysis & Design of Algorithms (CSCE 321) Prof. Amr Goneid Department of Computer Science, AUC Part 8. Greedy Algorithms.
Game-Theoretic Analysis of Mobile Network Coverage David K.Y. Yau.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan and Kee-Chaing Chua National University of.
Bounded relay hop mobile data gathering in wireless sensor networks
APL: Autonomous Passive Localization for Wireless Sensors Deployed in Road Networks IEEE INFOCOM 2008, Phoenix, AZ, USA Jaehoon Jeong, Shuo Guo, Tian He.
1 Network Models Transportation Problem (TP) Distributing any commodity from any group of supply centers, called sources, to any group of receiving.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Murat Demirbas Onur Soysal SUNY Buffalo Ali Saman Tosun U. San Antonio Data Salmon: A greedy mobile basestation protocol for efficient data collection.
Design and Analysis of Optimal Multi-Level Hierarchical Mobile IPv6 Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
1 a1a1 A1A1 a2a2 a3a3 A2A Mixed Strategies When there is no saddle point: We’ll think of playing the game repeatedly. We continue to assume that.
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
MAIN RESULT: We assume utility exhibits strategic complementarities. We show: Membership in larger k-core implies higher actions in equilibrium Higher.
Community structure in graphs Santo Fortunato. More links “inside” than “outside” Graphs are “sparse” “Communities”
1 Bottleneck Routing Games on Grids Costas Busch Rajgopal Kannan Alfred Samman Department of Computer Science Louisiana State University.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
Distributed Algorithms for Dynamic Coverage in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver.
Announcements Deadline extensions –HW 1 dues May 17 (next Wed) –Progress report due May 24 HW 1 clarifications: –On problem 3 users can lower their power.
1 Maximum Flows CONTENTS Introduction to Maximum Flows (Section 6.1) Introduction to Minimum Cuts (Section 6.1) Applications of Maximum Flows (Section.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Prof. Yu-Chee Tseng Department of Computer Science
Graphs & Graph Algorithms 2
Normal Form (Matrix) Games
EMIS The Maximum Flow Problem: Flows and Cuts Updated 6 March 2008
Presentation transcript:

The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University (Joint work with J. C. Chin, Y. Dong, and W. K. Hon) David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University (Joint work with J. C. Chin, Y. Dong, and W. K. Hon)

Why Mobile?  The mouse  Evasion of detection  Nature of “mission”  The cat  Improved coverage with fewer sensors  Robustness against contingencies  Planned or random movement (randomness useful)  The mouse  Evasion of detection  Nature of “mission”  The cat  Improved coverage with fewer sensors  Robustness against contingencies  Planned or random movement (randomness useful)

Mobility Model  Four-tuple  N: network area  M: accessibility constraints -- the “map”  T: trip selection  R: route selection  Random waypoint model is a special case  Null accessibility constraints  Uniform random trip selection  Cartesian straight line route selection  Four-tuple  N: network area  M: accessibility constraints -- the “map”  T: trip selection  R: route selection  Random waypoint model is a special case  Null accessibility constraints  Uniform random trip selection  Cartesian straight line route selection

Problem Formulation  Two player game  Payoff is time until detection (zero sum)  Cat plays detection strategy  Stochastic, characterized by per-cell presence probabilities  Mouse plays evasion strategy  Knows statistical process of cat’s movement, but not necessarily exact routes (exact positions at given times)  Two player game  Payoff is time until detection (zero sum)  Cat plays detection strategy  Stochastic, characterized by per-cell presence probabilities  Mouse plays evasion strategy  Knows statistical process of cat’s movement, but not necessarily exact routes (exact positions at given times)

Best Mouse Play  Cat’s presence matrix given  Network region divided into 2D cells  P i,j gives probability for mouse to find cat in cell (i, j)  Expected detection time “long” compared with trip from point A to point B  Dynamic programming solution to maximize detection time  Local greedy strategy does not always work  Cat’s presence matrix given  Network region divided into 2D cells  P i,j gives probability for mouse to find cat in cell (i, j)  Expected detection time “long” compared with trip from point A to point B  Dynamic programming solution to maximize detection time  Local greedy strategy does not always work

Optimal Escape Path Formulation  For each cell j, mouse decides whether to stay or to move to a neighbor cell (and which one)  If stay, expected max time until detection is E j [T stay ]  If move to neighbor cell k, expected max time until detection is E j [T move(k) ]  For cell j, expected max time until detection, E j [T], is largest of E j [T stay ] and E j [T move(k) ] for each neighbor cell k of j  E j [T stay ] determined by cat’s presence matrix and expected cat’s sojourn time in each cell  Optimal escape path is sequence of safest neighbors to move to, until mouse decides to stay  How to compute E j [T] for each cell j?  For each cell j, mouse decides whether to stay or to move to a neighbor cell (and which one)  If stay, expected max time until detection is E j [T stay ]  If move to neighbor cell k, expected max time until detection is E j [T move(k) ]  For cell j, expected max time until detection, E j [T], is largest of E j [T stay ] and E j [T move(k) ] for each neighbor cell k of j  E j [T stay ] determined by cat’s presence matrix and expected cat’s sojourn time in each cell  Optimal escape path is sequence of safest neighbors to move to, until mouse decides to stay  How to compute E j [T] for each cell j?

Computing E j [T]  Initialize E j [T] as E j [T stay ]  Insert all the cells into heap sorted by decreasing E j [T]  Delete root cell 0 from heap  For each neighbor cell k of 0, update E k [T] as E k [T] := max(E k [T], E k [T move(0) ])  Reorder heap in decreasing E j [T] order  Repeat until heap becomes empty  Initialize E j [T] as E j [T stay ]  Insert all the cells into heap sorted by decreasing E j [T]  Delete root cell 0 from heap  For each neighbor cell k of 0, update E k [T] as E k [T] := max(E k [T], E k [T move(0) ])  Reorder heap in decreasing E j [T] order  Repeat until heap becomes empty

Example Optimal Paths Path when mouse moves slowly Path when mouse moves quickly

Comparison with Local Greedy Strategy Local greedy strategy: mouse will stay Dynamic programming strategy: mouse moves to cell with small probability of cat’s presence (0.0075) Current mouse position

If Cat Plays Random Waypoint Strategy  Highest presence probability at the center of the network area  Lowest presence probabilities at the corners and perimeters  Good “safe havens” for mouse to hide  Sum of presence probabilities is one  n cats  sum of probabilities  n  Equality for disjoint cats’ surveillance areas  Highest presence probability at the center of the network area  Lowest presence probabilities at the corners and perimeters  Good “safe havens” for mouse to hide  Sum of presence probabilities is one  n cats  sum of probabilities  n  Equality for disjoint cats’ surveillance areas

Distribution of Movement Direction in 150 m by 150 m Network Area

Cat’s Presence Matrix for Random Waypoint Movement

Cat’s Presence Matrix in 500  500 m Network for Random Waypoint Movement

Distribution of Movement Direction (a) Calculated probabilities of sensor moving towards the center cell from different current cells (b) Measured probabilities of sensor moving towards the center cell from different current cells

Analytical Cell Coverage Statistics (a) Expected number of trips before covering a cell (average = , maximum = ) (b) Expected time before covering a cell (average = s, maximum = s)

Measured Cell Coverage Statistics (b) Expected number of trips before covering a cell (average = , maximum = ) (b) Expected time before covering a cell (average = s, maximum = s)

Optimal Cat Strategy  Maximize minimum presence probability among all the cells  Eliminate safe haven  Achieved by equal presence probabilities in each cell  Will lead to Nash Equilibrium  Zero sum game  Pareto optimality  Maximize minimum presence probability among all the cells  Eliminate safe haven  Achieved by equal presence probabilities in each cell  Will lead to Nash Equilibrium  Zero sum game  Pareto optimality

Minimum Sensing Range for Expected Random Waypoint Coverage  Stationary mouse; cat in random waypoint movement  Expected coverage desired by given deadline  What is minimum sensing distance required?  Stochastic analysis of shortest distance between cat and mouse within deadline  Stationary mouse; cat in random waypoint movement  Expected coverage desired by given deadline  What is minimum sensing distance required?  Stochastic analysis of shortest distance between cat and mouse within deadline

Lower Bound Cat-mouse Distance Network divided into m by n cells; each has fixed size s by s D(i, j): Euclidean distance between cell i and cell j N sets of cells sorted by set’s distance to mouse Each set of cells denoted as S j, 0 ≤ j ≤ N - 1 Each cell in S j is equidistant from the mouse; distance is D S j Distances sorted in increasing order; i.e., D S j < D S j+1 Network divided into m by n cells; each has fixed size s by s D(i, j): Euclidean distance between cell i and cell j N sets of cells sorted by set’s distance to mouse Each set of cells denoted as S j, 0 ≤ j ≤ N - 1 Each cell in S j is equidistant from the mouse; distance is D S j Distances sorted in increasing order; i.e., D S j < D S j+1

Example Equidistant Sets of Cells Mouse located at center of network area

Correlation between Cells Visited P i : probability that cat may visit cell i P S j : probability that cat may visit any cell in set S j P i : probability that cat may visit cell i P S j : probability that cat may visit any cell in set S j

Shortest Distance Probability Matrix from Cell i to Cell j 3-D probability matrix B Each element b i,j gives cat’s shortest distance distribution from mouse after trip from cell i to j is a size N vector: b i,j [k] is the probability that the shortest distance during the trip is D S k

where is the probability that D S 0 is shortest distance for trip l, and is probability that D S n is shortest distance for the trip, 1 ≤ n ≤ N - 1 Let denote, then is calculated as: Shortest Distance Probability Matrix after l Trips B l is the shortest distance probability matrix after l trips Computed by * operator B l is the shortest distance probability matrix after l trips Computed by * operator Each element of B l is calculated as:

Expected shortest distance  The expected shortest distance between cat and mouse after l trips:

Approximate Expected Shortest Distance  Approximate expected shortest distance from mouse after cat has visited k cells:  P D j (k) is probability that after visiting k cells, a cell in S j is visited, but no cell in S i, i< j, is visited  Approximate expected shortest distance from mouse after cat has visited k cells:  P D j (k) is probability that after visiting k cells, a cell in S j is visited, but no cell in S i, i< j, is visited

Lower Bound Cat-mouse Distance for Random Waypoint Model (a) Expected speed = 5 m/s (b) Expected speed = 10 m/s(c) Expected speed = 25 m/s

Lower Bound Cat-mouse Distance for Indiana Map-based Model

Conclusions  Considered cat and mouse game between mobile sensors and mobile target  For random waypoint model, other coverage properties can be obtained analytically  Expected cell sojourn time, expected time to cover general AOI, number of sensors to achieve coverage by given deadline, …  Considered cat and mouse game between mobile sensors and mobile target  For random waypoint model, other coverage properties can be obtained analytically  Expected cell sojourn time, expected time to cover general AOI, number of sensors to achieve coverage by given deadline, …

Conclusions (cont’d)  Many extensions possible  Explicit account for plume explosion / dispersion models  Model for sensor (un)reliability, interference, etc  Explicit quantification of sensing uncertainty and its reduction  Validation with empirical data  Many extensions possible  Explicit account for plume explosion / dispersion models  Model for sensor (un)reliability, interference, etc  Explicit quantification of sensing uncertainty and its reduction  Validation with empirical data