Data Fusion in Sensor Networks Asheq Khan. Oct 28, 2004Asheq Khan Outline Introduction Key concepts Three schemes –Cluster based data fusion –Synchronization.

Slides:



Advertisements
Similar presentations
Distributed Assignment of Encoded MAC Addresses in Sensor Networks By Curt Schcurgers Gautam Kulkarni Mani Srivastava Presented By Charuka Silva.
Advertisements

A Hierarchical Multiple Target Tracking Algorithm for Sensor Networks Songhwai Oh and Shankar Sastry EECS, Berkeley Nest Retreat, Jan
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Introduction to Wireless Sensor Networks
Low-Energy Adaptive Clustering Hierarchy An Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks M. Aslam hayat.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Xinran Wang, Sencun Zhu and Guohong Cao The Pennsylvania State University MobiHoc’ 06.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Joint work with Xinran Wang, Sencun Zhu and Guohong Cao Dept. of Computer Science &
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
IC-29 Security and Cooperation in Wireless Networks 1 Secure and Robust Aggregation in Sensor Networks Parisa Haghani Supervised by: Panos Papadimitratos.
Investigating Mac Power Consumption in Wireless Sensor Network
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
An Efficient Clustering-based Heuristic for Data Gathering and Aggregation in Sensor Networks Wireless Communications and Networking (WCNC 2003). IEEE,
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Energy Aware Directed Diffusion for Wireless Sensor Networks Jisul Choe, 2Keecheon Kim Konkuk University, Seoul, Korea
Vikramaditya. What is a Sensor Network?  Sensor networks mainly constitute of inexpensive sensors densely deployed for data collection from the field.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Efficient Algorithms for Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks Selected from Elsevier: Computer Networks Konstantinos.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Wireless Sensor Network Protocols Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Practical Byzantine Fault Tolerance
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Distributed Coordination Framework for Wireless Sensor and Actor Networks Tommaso Melodia, Dario Pompili, Vehbi C.Gungor, Ian F.Akyildiz (MobiHoc 2005)
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
 Tree in Sensor Network Patrick Y.H. Cheung, and Nicholas F. Maxemchuk, Fellow, IEEE 3 rd New York Metro Area Networking Workshop (NYMAN 2003)
Collaborative Broadcasting and Compression in Cluster-based Wireless Sensor Networks Anh Tuan Hoang and Mehul Motani National University of Singapore Wireless.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Energy-Efficient Wake-Up Scheduling for Data Collection and Aggregation Yanwei Wu, Member, IEEE, Xiang-Yang Li, Senior Member, IEEE, YunHao Liu, Senior.
A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye, and B. Sikdar Department of Electrical, Computer and systems Engineering.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Wireless sensor and actor networks: research challenges
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
MAC Protocols for Sensor Networks
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
MAC Protocols for Sensor Networks
Wireless Sensor Network Architectures
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Investigating Mac Power Consumption in Wireless Sensor Network
Aggregation.
Edinburgh Napier University
Presentation transcript:

Data Fusion in Sensor Networks Asheq Khan

Oct 28, 2004Asheq Khan Outline Introduction Key concepts Three schemes –Cluster based data fusion –Synchronization among nodes –Resistance against attacks Conclusion

Oct 28, 2004Asheq Khan Introduction A sensor network comprises of sensor nodes and a base station. Each sensor node is battery powered and equipped with: –Integrated sensors –Data processing capabilities –Short-range radio communications Due to their limited power and shorter communication range, sensor nodes perform in-network data fusion.

Oct 28, 2004Asheq Khan Data Fusion Process A data fusion node collects the results from multiple nodes. It fuses the results with its own based on a decision criterion. Sends the fused data to another node/base station. Advantages: –Reduces the traffic load. –Conserves energy of the sensors.

Oct 28, 2004Asheq Khan Key Concepts in Data Fusion Three questions needs to be addressed: First, at what instance does a node report a sensed event? Second, how does a node fuse multiple reports into a single one? Third, what data fusion architecture to use?

Oct 28, 2004Asheq Khan Reporting Periodical reporting: Sensor nodes periodically send reports to the base station. Base station inquiry response reports: the BS queries sensors in specific regions for current sensed information. Event triggered reports: The occurrence of a certain event can trigger reports from sensors in that particular region.

Oct 28, 2004Asheq Khan Fusion Decision Voting: the oldest and most widely used fusion decision method. Fusion node arrives at a consensus by a voting scheme like: –Majority voting –Complete Agreement –Weighted voting The popularity of voting arises from its simplicity and accuracy. Other fusion decision algorithms include probability-based Bayesian Model and stack generalization.

Oct 28, 2004Asheq Khan Fusion Architecture Centralized: –Simplest –A central processor fuses the reports collected by all other sensing nodes. –Advantage: Erroneous report(s) can be easily detected. –Disadvantage: inflexible to sensor changes and the workload is concentrated at a single point.

Oct 28, 2004Asheq Khan Fusion Architecture (2) Decentralized : –Data fusion occurs locally at each node on the basis of local observations and the information obtained from neighboring nodes. –No central processor node. –Advantages: scalable and tolerant to the addition or loss of sensing nodes or dynamic changes in the network.

Oct 28, 2004Asheq Khan Fusion Architecture (3) Hierarchical: –Nodes are partitioned into hierarchical levels. –The sensing nodes are at level 0 and the BS at the highest level. –Reports move from the lower levels to higher ones. –Advantage: Workload is balanced among nodes

Oct 28, 2004Asheq Khan Cluster Based Data Fusion

Oct 28, 2004Asheq Khan Problem Due to their energy constraints, sensors need to perform efficient data fusion to extend the lifetime of the network. Lifetime of a sensor network is the number of rounds of data fusion it can perform before the first sensor drains out. This is known as the “Maximum Lifetime Data Aggregation” (MLDA) problem.

Oct 28, 2004Asheq Khan Goal Given: the location & energy of each sensor and the BS. Find an efficient manner to collect & aggregate reports from the sensors to the BS. [Dasgupta, WCNC’03] propose a cluster based heuristic (CMLDA) to solve the problem.

Oct 28, 2004Asheq Khan System Model n sensor nodes(1..n) Base station(n+1) Fixed data packet size: k bits Initial energy of a sensor i: ε i Receive energy, RX i = ε elec * k Transmission energy, TX i,j = ε elec *k + ε amp *d 2 i,j *k

Oct 28, 2004Asheq Khan Algorithm Two phases. Phase 1: –Sensors are grouped into clusters called “super-sensors”. –Each super sensor consists of a minimum no. of sensors. – The energy of a super sensor is the sum of the energy of all the sensors within it. –Distance between two super sensors is the maximum distance between two sensors where, each reside in a different super sensor. –Apply the MLDA algorithm.

Oct 28, 2004Asheq Khan MLDA Algorithm ILP is employed to find a near- optimal admissible flow network. Objective: maximize the lifetime of network (T) under the energy constraints. Generate schedule(s) from the admissible flow network.

Oct 28, 2004Asheq Khan Example Schedule 1 25 Schedule 2

Oct 28, 2004Asheq Khan Algorithm (2) Phase Two: 1.Initialize {Aggregation Schedule} = Ø 2.Life Time, T = 0 3.Choose a Scheduler from phase 1 4.Initialize Aggregation tree, A with the BS 5.Visit each super clusters and add the nodes to the tree such that, the residual energy at each edge is maximized. 6.Add A to the Aggregation Scheduler 7.Increment T by 1 8.Repeat steps 3-7 until a node drains out.

Oct 28, 2004Asheq Khan Comments Provides a set of data fusion schedules that maximize the lifetime of the network. Clustering of nodes reduces the time needed to solve the ILP.

Oct 28, 2004Asheq Khan Synchronization Among Nodes

Oct 28, 2004Asheq Khan Problem During data fusion, internal nodes at each level wait for a certain period of time before they fuse the received reports. If nodes at each level wait for the same period of time then an internal node may timeout before receiving reports from all of its children. With insufficient reports, the credibility of a sensed event is questionable.

Oct 28, 2004Asheq Khan Example EF B D C Level 0 Level 1 Level 2 Level 3 Base Station TIMEOUT Senses T =.5 sec Report D

Oct 28, 2004Asheq Khan Solution An efficient data fusion protocol with following characteristics: –Synchronizes the nodes at different levels. –Nodes at higher levels wait longer before fusing data. –A fixed time period is assigned from the sensing of an event to the time it is received by the base station. –Provide a balance between latency & accuracy.

Oct 28, 2004Asheq Khan Multi-level Fusion Synchronization (MFS) Protocol [Yuan,GLOBECOM’03] propose the MFS protocol. The parameters: –MAX: time BS waits before fusing the received data –Δ: difference in waiting period at consecutive levels –K: the distance (in hops) from the sink

Oct 28, 2004Asheq Khan Algorithm Upon detection of an event, a leaf node reports to its parent node. This triggers the timer of the parent node. Then the parent node sends a START message to trigger the timer of its neighboring nodes. The timer at a node expires after (MAX – K*Δ) seconds.

Oct 28, 2004Asheq Khan An Example EF B DC Level 0 Level 1 Level 2 Level 3 Base Station Max = 1 sec Δ = 0.2sec Senses T = (1-(2*0.2)) = 0.6 sec START T = (1-(1*0.2)) = 0.8 sec T = 1.0 sec Senses Report C+D

Oct 28, 2004Asheq Khan Latency Best case: –Assuming: –START messages do not collide –No propagation delay in triggering the timer –MAX Worst case: –Assuming: –None of the internal nodes receive the START message –L = ∑ (MAX – j*Δ) = D*MAX – ((D-1)*D*Δ)/2 {D = depth of propagation tree} D-1 j=0

Oct 28, 2004Asheq Khan Setting the parameters If the BS knows the depth of the fusion tree then it can compute the values of MAX and Δ. Otherwise, in a learning phase, the BS queries the sensors with different values of MAX and Δ. And adjust the values based on the reports credibility and application requirements.

Oct 28, 2004Asheq Khan Result: No. of reports vs. Δ Similar performance with both BFS (balanced tree) & ODMRP (unbalanced tree). Very small or large Δ performs worst. MAX=1.2s

Oct 28, 2004Asheq Khan Result(2): Latency vs. Δ Small Δ incurs large waiting period whereas large Δ incurs small waiting period. In BFS, latency for each Δ < 2* MAX.

Oct 28, 2004Asheq Khan Pros and Cons Pros: –Synchronizes nodes at different levels. –MAX and Δ can be tuned Cons: –Reports arriving after timeout is discarded. –Collision if START messages will cause a latency greater than MAX.

Oct 28, 2004Asheq Khan Resistance Against Attacks

Oct 28, 2004Asheq Khan Problem Previously, it is assumed that the nodes conducting the data fusion are secured. But, a malicious data fusion node can send bogus reports to the BS. The BS is incapable of detecting the bogus information since the sensor nodes do not directly send the reports to the BS.

Oct 28, 2004Asheq Khan Witness Based Data Assurance [Du GLOBECOM’03] present a witness based scheme to ensure that the BS accepts only valid data fusion results. To prove the validity of a report, the fusion node is required to provide proofs from several witnesses. A witness is a node that also performs data fusion but does not send its report to the BS.

Oct 28, 2004Asheq Khan Algorithm 1.Let there be m witnesses + 1 data fusion node. 2.Each witness w i share an unique key with the BS, k i 3.After receiving reports from the sensor nodes, each witness performs data fusion and obtains the result r i. 4.It then sends a MAC (Message Authentication Code) to the data fusion node: MAC i = MAC(r i, w i, k i ) 5.The data fusion node computes its result and sends its MAC key with its witnesses to the BS. 6.The BS exercises a voting scheme to determine the validity of the report. 7.If the report is corrupted, the BS discards it and polls one of the witness nodes for the correct report.

Oct 28, 2004Asheq Khan Voting Schemes The Base Station can employ two voting schemes to determine the validity of the fused report. –m+1 out of m+1: the result is valid if supported by all the witnesses. –n out of m+1: (1=<n<=m+1) the result is valid if supported by at least n witness.

Oct 28, 2004Asheq Khan m+1 out of m+1 voting scheme 1.After receiving all the MAC’s from the witness nodes, the data fusion node computes: MAC F = MAC(S F,F,K F, MAC 1 xor …xor MAC m ) 2.F then sends (S F,F, w 1,.., w m, MAC F ) to the BS. 3.The BS then computes the MAC i = MAC(S F, w i, k i ) for each w 4.Finally computes: MAC’ F = MAC(S F,F,K F, MAC 1 xor …xor MAC m ) 5.If (MAC F = MAC’ F ) then accepts the report

Oct 28, 2004Asheq Khan n out of m+1 voting scheme The disadvantage of the previous approach is that a corrupt witness node can always send invalid MAC and achieve Denial of service attack. To prevent that, F should not merge all the MAC i ’s but instead forward them all: R = (S F,F, MAC F, w 1, MAC 1,..w m,MAC m ) If at least n out of m+1MAC’s match, then the result S F is accepted. Otherwise the result is dropped.

Oct 28, 2004Asheq Khan Pros & Cons Pros –Provides a scheme that ensures that only valid reports are accepted by the BS. Cons –Redundancy: multiple copies of similar reports are fused by the witnesses. –No energy efficient

Oct 28, 2004Asheq Khan Conclusion This talk attempted to give an overview of the data fusion process in sensor networks. Different data fusion architectures, voting schemes architecture are presented. Three important aspects of efficient data fusion are presented: energy efficiency, synchronization among sensors and resistance against attacks. Obviously, an ideal data fusion will be one that can incorporate all the three characteristics.

Oct 28, 2004Asheq Khan References K. Dasgupta, K. Kalpakis and P. Namjoshi, “An Efficient Clustering-based Heuristic for Data Gathering and Aggregation in Sensor Networks,” IEEE WCNC, K. Kalpakis, K. Dasgupta and P. Namjoshi, “Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks,” IEEE ICN, Wei Yuan, Srikanth V. Krishnamurthy, and Satish K. Tripathi, “Synchronization of Multiple Levels of Data Fusion in Wireless Sensor Networks,” In Proceedings of GLOBECOM, W. Du, J. Deng, Y. S. Han and P. K. Varshney, “A Witness- Based Approach for Data Fusion Assurance in Wireless Sensor Networks,” In Proceedings of GLOBECOM, 2003.