Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks Faranak Heidarian Julien Schmaltz Frits Vaandrager.

Slides:



Advertisements
Similar presentations
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Advertisements

Christoph Lenzen Philipp Sommer Philipp Sommer Roger Wattenhofer Roger Wattenhofer Optimal Clock Synchronization in Networks.
Causal Delivery (Thomas) Matt Guinn CS523, Spring 2006.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Automatic Verification Book: Chapter 6. What is verification? Traditionally, verification means proof of correctness automatic: model checking deductive:
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
1 Modeling Clock Synchronization in the Chess gMAC WSN Protocol Mathijs Schuts Feng Zhu Faranak Heidarian Julien Schmaltz Frits Vaandrager QFM’09 FM’09.
1 Modeling Clock Synchronization in the Chess gMAC WSN Protocol Mathijs Schuts Feng Zhu Faranak Heidarian Frits Vaandrager QFM’09.
5/5/20151 Mobile Ad hoc Networks COE 549 Transmission Scheduling II Tarek Sheltami KFUPM CCSE COE
1 Modeling Clock Synchronization in the Chess gMAC WSN Protocol Mathijs Schuts Feng Zhu Faranak Heidarian Frits Vaandrager To appear in Proceedings QFM’09.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
AdHoc Probe: Path Capacity Probing in Wireless Ad Hoc Networks Ling-Jyh Chen, Tony Sun, Guang Yang, M.Y. Sanadidi, Mario Gerla Computer Science Department,
CIS 540 Principles of Embedded Computation Spring Instructor: Rajeev Alur
Broadcasting Protocol for an Amorphous Computer Lukáš Petrů MFF UK, Prague Jiří Wiedermann ICS AS CR.
Time Synchronization for Wireless Sensor Networks
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology.
Fast Distributed Algorithm for Convergecast in Ad Hoc Geometric Radio Networks Alex Kesselman, Darek Kowalski MPI Informatik.
Verification of Chess TDMA for a Simple Fully Connected Wireless Sensor Network Faranak Heydarian Frits Vaandrager Radboud University Nijmegen.
© Honglei Miao: Presentation in Ad-Hoc Network course (19) Minimal CDMA Recoding Strategies in Power-Controlled Ad-Hoc Wireless Networks Honglei.
Distributed Sensing and Data Collection Via Broken Ad Hoc Wireless Connected Networks Mobile Robots By Alan FT Winfield Presented By Navpreet Bawa.
Chess Review May 11, 2005 Berkeley, CA Closing the loop around Sensor Networks Bruno Sinopoli Shankar Sastry Dept of Electrical Engineering, UC Berkeley.
Performance Comparison of Existing Leader Election Algorithms for Dynamic Networks Mobile Ad Hoc (Dynamic) Networks: Collection of potentially mobile computing.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 13th Lecture Christian Schindelhauer.
AdHoc Probe: Path Capacity Probing in Wireless Ad Hoc Networks Ling-Jyh Chen, Tony Sun, Guang Yang, M.Y. Sanadidi, Mario Gerla Computer Science Department,
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
The Rare Glitch Project: Verifying Bus Protocols for Embedded Systems Edmund Clarke, Daniel Kroening Carnegie Mellon University.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
“SDJS: Efficient Statistics in Wireless Networks” Albert Krohn, Michael Beigl, Sabin Wendhack TecO (Telecooperation Office) Institut für Telematik Universität.
Project Introduction 이 상 신 Korea Electronics Technology Institute.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
Leslie Luyt Supervisor: Dr. Karen Bradshaw 2 November 2009.
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
Analysis of a Protocol for Dynamic Configuration of IPv4 Link Local Addresses Using Uppaal Miaomiao Zhang Frits W. Vaandrager Department of Computer Science.
Multi-hop-based Monte Carlo Localization for Mobile Sensor Networks
EBAS: An Energy-Efficient Event Boundary Approximated Suppression Algorithm in Wireless Sensor Networks Longjiang Guo Heilongjiang University
Timed I/O Automata: A Mathematical Framework for Modeling and Analyzing Real-Time Systems Frits Vaandrager, University of Nijmegen joint work with Dilsun.
A Mechanized Model for CAN Protocols Context and objectives Our mechanized model Results Conclusions and Future Works Francesco Bongiovanni and Ludovic.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Enhanced Slotted Aloha Protocols for Underwater Sensor Networks with Large Propagation Delay Kai Chen † Jianhua He § Yi Zhou ‡ Haibing Guan ‡ †School of.
Fasika Assegei Segal’s Law A man with a watch knows what time it is. A man with two watches is never sure.
RFID E STIMATION P ROBLEM Lee, Gunhee S URVEY. R EFERENCES Energy Efficient Algorithms for the RFID Estimation Problem –Tao Li, Samuel Wu, Shigang Chen.
Secure In-Network Aggregation for Wireless Sensor Networks
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
Memory-Efficient Algorithms for the Verification of Temporal Properties C. Courcoubetis Inst. Of Comp. Sci. FORTH, Crete, Greece M. Verdi IBM Almaden P.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfaq Khokhar ECE Department, University.
1 Segal’s Law A man with a watch knows what time it is. A man with two watches is never sure.
A New Link Scheduling Algorithm for Concurrent Tx/Rx Wireless Mesh Networks Author: Kwan-Wu Chin University of Wollongong, Australia From: ICC 2008 Speaker:
An SSCOP-based Link Layer Protocol for Wireless LANs Haoli Wang and Aravind Velayutham IEEE Global Telecommunications Conference 1-5 December, 2003 San.
Shinya Umeno Nancy Lynch’s Group CSAIL, MIT TDS seminar September 18 th, 2009 Machine-Assisted Parameter Synthesis of the Biphase Mark Protocol Using Event.
By: Aaron Dyreson Supervising Professor: Dr. Ioannis Schizas
Global Clock Synchronization in Sensor Networks Qun Li, Member, IEEE, and Daniela Rus, Member, IEEE IEEE Transactions on Computers 2006 Chien-Ku Lai.
ECE/CS 584: Verification of Embedded Computing Systems Model Checking Timed Automata Sayan Mitra Lecture 09.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor Networks IEEE ICNP 2010 (18.2%) Youngtae Noh, Mario Gerla (UCLA, CS) Paul.
Broadcast-and-select networks. Each node is usually attached to two fibers: one to transmit, one to receive W WDM channels are available Tx and Rx operate.
Time Synchronization in Ad Hoc Networks Kay R¨omer MobiHOC 2001 Speaker : hsiwei.
AN EFFICIENT TDMA SCHEME WITH DYNAMIC SLOT ASSIGNMENT IN CLUSTERED WIRELESS SENSOR NETWORKS Shafiq U. Hashmi, Jahangir H. Sarker, Hussein T. Mouftah and.
1 Power-efficient Clustering Routing Protocol Based on Applications in Wireless Sensor Network Authors: Tao Liu and Feng Li Form:International Conferecnce.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Chapter 7 – Aloha-Based Protocol
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
Internet of Things A Process Calculus Approach
Estimating Networks With Jumps
Tony Sun, Guang Yang, Ling-Jyh Chen, M. Y. Sanadidi, Mario Gerla
Presentation transcript:

Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks Faranak Heidarian Julien Schmaltz Frits Vaandrager

Outline  Introduction  Synchronization Algorithm  Time Model  UPPAAL Model  Error Scenarios  Clique Topology  Line Topology  Conclusion 2

Introduction 3

Flower Auction 4 Use Case I : asset management theft detection and resolving ownership disputes Use Case II : supply chain management real-time awareness (track and trace)

Theft Detection 5 Active tag ad-hoc network topology is shown in blue Observation nodes can be connected to fixed local infrastructure When the network detects a node is lost, alarm is raised. Dynamic Topology

Time Model 6 TXRX idle Time is considered as a sequence of Time Frames. A time frame is composed of a fixed number, say C, of Time Slots. In a time slot the hardware clock of the sensor node ticks a fixed number, say k 0, of times. A Time Frame tsn

Guard Time 7 TX Time Slot SENDING RX Time Slot g t

Uppaal Model 8

Synchronization  Definition. A network is synchronized if and only if for all reachable states ( ∀ i, j ∈ Nodes)(SENDING i and neighbor(i,j) ⇒ csn[i] = csn[j]) TX Collision A A B B C C

Conditions of Protocol Synchronization clique topology  Theorem. A wireless sensor network with clique topology is synchronized if and only if three conditions hold: 10 M : the maximum distance between two consecutive active slots

Fast Receiver- Slow Sender, during transmission Proving Necessity  To exclude this scenario, the following condition should be satisfied: 11

Proving Sufficiency  Hand-proof 1000 lines of formulae Complex large invariants Needs some history variables  Formal proof Isabelle/HOL theorem prover About 5,000 lines Needs a proof for every single step! 12

Some Invariants 13

Different Topologies 14 g = 2g = 3 g = 4g = 3 ρ = 29/30 ρ = 58/59 ρ =38/39 ρ = 58/59 ρ = 48/49

Line Topology  We claim that for a line network of size N, the guard time g should be at least N. We consider only networks with perfect clocks, in which clock drift is zero. 15

An Error Scenario 16

Conclusion  We proved the correctness of model of Chess algorithm under some assumptions; however, the current implementation has flaws.  Model checking helped us to find the error scenarios and parameter constraints for our model.  Invariant proof is complicated.  Using Isabelle/HOL,we did not discover any mistakes in the hand proof. However, there was some places that needed some expansion (1 line of hand proof can be equivalent to 100 lines in Isabelle). These places were the core places explaining some details of the protocol. 17

Future Work  Correcting/Improving the Protocol and Proving its correctness.  Adding a gain factor  Using Kalman filter (Assegei, 2008)  Using algorithm of Lenzen, Locher & Wattenhofer (2008)  Adapting the algorithm of Pussente & Barbosa (2009) (Usually, it is easy to adapt our Uppaal model.)  Using Parametric Timed Automata (Hune et al, 2002)  Using “Event Order Abstraction” (Umeno, 2008)  There are many Probabilistic Challenges 18

Thank You 19