Reliable, Robust Data Collection in Sensor Networks Murali Rangan Russell Sears Fall 2005 – Sensornet.

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
Project3 Malabika Das Prajna Setty Preeti Rao. Assumptions and Address Scheme Assumptions End hosts can only connect to one router and knows which router.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Towards a Sensor Network Architecture: Lowering the Waistline Culler et.al. UCB.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
1 Internet Networking Spring 2006 Tutorial 7 DVMRP.
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
KUASAR An efficient and light-weight protocol for routing and data dissemination in ad hoc wireless sensor networks David Andrews Aditya Mandapaka Joe.
More routing protocols Alec Woo June 18 th, 2002.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Tributaries and Deltas: Efficient and Robust Aggregation in Sensor Network Streams Amit Manjhi, Suman Nath, Phillip B. Gibbons Carnegie Mellon University.
A Survey of Wireless Sensor Network Data Collection Schemes by Brett Wilson.
Congestion Control and Fairness for Many-to-One Routing in Sensor Networks Cheng Tien Ee Ruzena Bajcsy Motivation Congestion Control Background Simulation.
Surge: A Network Analysis Tool Crossbow Technology.
Distributed Systems Fall 2009 Replication Fall 20095DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
Adaptive Topology Discovery in Hybrid Wireless Networks
A Topology Discovery Algorithm for Sensor Networks Go Suzuki CS691, SSNS Spring 2003.
Unlocking the demo…. Jason Hill. Data Aggregation  Reduce network bandwidth requirements by aggregating data close to the source.  Two types aggregation:
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
UC Berkeley, EECS Congestion Control and Fairness for Many-to-One Routing in Sensor Networks Cheng Tien Ee.
Daibo Liu 1 Daibo Liu 1, Zhichao Cao 2, Xiaopei Wu 2, Yuan He 2, Xiaoyu Ji 3 and Mengshu Hou 1 ICDCS, 2015, Columbus TeleAdjusting: Using Path Coding and.
Protocols for Self-Organization of a Wireless Sensor Network K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie IEEE Personal Comm., Oct Presented.
WAN technologies and routing Packet switches and store and forward Hierarchical addresses, routing and routing tables Routing table computation Example.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Overcast: Reliable Multicasting with an Overlay Network CS294 Paul Burstein 9/15/2003.
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Content-Based Routing in Mobile Ad Hoc Networks Milenko Petrovic, Vinod Muthusamy, Hans-Arno Jacobsen University of Toronto July 18, 2005 MobiQuitous 2005.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching (Wide Area Networks)
Benjamin AraiUniversity of California, Riverside Reliable Hierarchical Data Storage in Sensor Networks Song Lin – Benjamin.
Enhanced Interior Gateway Routing Protocol EIGRP 1.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
1 REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
CountTorrent: Ubiquitous Access to Query Aggregates in Dynamic and Mobile Sensor Networks Abhinav Kamra, Vishal Misra and Dan Rubenstein - Columbia University.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #7 DVMRP.
S& EDG: Scalable and Efficient Data Gathering Routing Protocol for Underwater Wireless Sensor Networks 1 Prepared by: Naveed Ilyas MS(EE), CIIT, Islamabad,
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Active Message Application: CONNECT Presented by Xiaozhou David Zhu Oommen Regi July 6, 2001.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Energy-Efficient Protocols for communication in Biosensor networks.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Muhammad Waseem Iqbal Lecture # 20 Data Communication.
Sensor Networks Katia Obraczka Winter 2005 MAC II
Delay-Tolerant Networks (DTNs)
(How the routers’ tables are filled in)
Packet Switching Datagram Approach Virtual Circuit Approach
Data Collection and Dissemination
RSVP: A New Resource ReSerVation Protocol
Networks and Communication Systems Department
Chapter 3: Open Systems Interconnection (OSI) Model
Aayush Patidar Ashwin Ramakrishnan Manoj Juneja
Viet Nguyen Jianqing Liu Yaqin Tang
Ajay Vyasapeetam Brijesh Shetty Karol Gryczynski
Routing Fundamentals and Subnets
Aggregation.
Presentation transcript:

Reliable, Robust Data Collection in Sensor Networks Murali Rangan Russell Sears Fall 2005 – Sensornet

Motivation Data collection apps like habitat monitoring  All of the logged data is valuable  Real time / in order delivery not important  In-network aggregation not required Current data collection mechanisms  Lose data during temporary network partitions  Or, store all data in each node Our goal  Reliable, robust scheme to collect ALL the data in a steady stream, without in order guarantees

Our approach Reliability  Link level, hop-by-hop acknowledgements  Introduce redundancy with k replicas of data  Replicas ensure their data reaches the base station, or pass responsibility to a parent. Take advantage of broadcast medium Take advantage of existing routing algorithms (like MintRoute) for parent selection Keep basic mechanism simple, add optimization on top

Algorithm overview Node with new data  Broadcasts request for k volunteers (for replicas)  Parent(s) agree to volunteer  Broadcasts data to volunteer(s)  Volunteer(s) broadcast hop ACK (HACK)  Once k volunteers are found, deletes data Volunteer transfers responsibility upstream  Repeats above process, seeking 1 volunteer  Once responsibility is transferred, deletes data Can volunteer for same data again!

Status and Future Work Basic algorithm details are fleshed out Implement and simulate using TOSSIM  Work in progress! Address the following challenges  How many replicas? Depends upon network density, reliability  Base station broadcasts ACK to remove replicas of collected data Use bloom filters to summarize? Limit broadcast to ‘interested’ nodes?  How to bound k replicas? Eavesdropping?  How do we deal with fan-in near the base station? Few parents / replicas share paths

Prerequisites Use any routing protocol that  Assigns ‘parent(s)’ to each mote  Adapts to changes in network topology Reliable link level delivery  Make use of broadcast medium  Transfer data from a child node to its parents  ACK’s transfer responsibility for a piece of data. (Dropped ACK’s lead to more replicas) Broadcast ACK from base station  Guarantees replicas are eventually deleted  Efficient, reliable broadcast? Bloom filters? Reverse path routing + eavesdropping?

Sketch of algorithm Inserting data into the network  Broadcast request for k volunteers  Broadcast data, volunteers (parents) ACK  Once k volunteers are found, node deletes data. Volunteers  request enough volunteers to create k replicas in network. (Usually, just create 1 volunteer)  Pass ACK’s to children after creating > 1 replica. Challenges  How many replicas?  What about fan-in? Replicas share < k parents Shared paths?  How can we optimize propagation?