Cross-Layer Designs for Energy-Saving Sensor and Ad hoc Networks Matthew J. Miller Preliminary Exam July 22, 2005.

Slides:



Advertisements
Similar presentations
Exploring Energy-Latency Tradeoffs for Broadcasts in Energy-Saving Sensor Networks AUTHOR: MATTHEW J. MILLER CIGDEM SENGUL INDRANIL GUPTA PRESENTER: WENYU.
Advertisements

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Practical Exploitation of the Energy-Latency Tradeoff for Sensor Network Broadcast Matthew J. Miller (Cisco Systems) Indranil Gupta (Univ. of Illinois-Urbana)
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
Using Channel Diversity to Improve Security for Wireless Sensor Networks Matthew J. Miller University of Illinois at Urbana-Champaign.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Investigating Mac Power Consumption in Wireless Sensor Network
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Power saving technique for multi-hop ad hoc wireless networks.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Debate 1 - Defense Joseph Camp Anastasios Giannoulis.
Efficient MAC Protocols for Wireless Sensor Networks
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
On-Demand Traffic-Embedded Clock Synchronization for Wireless Sensor Networks Sang Hoon Lee.
BMAC - Versatile Low Power Media Access for Wireless Sensor Networks.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
Lei Tang∗ Yanjun Sun† Omer Gurewitz‡ David B. Johnson∗
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Improving Power Save Protocols Using Carrier Sensing for Dynamic Advertisement Windows Matthew J. Miller Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Minimizing Energy Consumption in Sensor Networks Using a Wakeup Radio Matthew J. Miller and Nitin H. Vaidya IEEE WCNC March 25, 2004.
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
ELECTIONEL ECTI ON ELECTION: Energy-efficient and Low- latEncy sCheduling Technique for wIreless sensOr Networks Shamim Begum, Shao-Cheng Wang, Bhaskar.
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
Adaptive Energy- Saving for Multihop Wireless Networks Matthew J. Miller University of Illinois at Urbana-Champaign.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
SEA-MAC: A Simple Energy Aware MAC Protocol for Wireless Sensor Networks for Environmental Monitoring Applications By: Miguel A. Erazo and Yi Qian International.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
Michael Buettner, Gary V. Yee, Eric Anderson, Richard Han
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Ad hoc Routing for Multilevel Power Saving Protocols Matthew J. Miller, Nitin H. Vaidya Ad Hoc Networks 2008 January University of Illinois at Urbana-Champaign,
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Exploring the Energy-Latency Trade-off for Broadcasts in Energy-Saving Sensor Networks Matthew J. Miller, Cigdem Sengul, Indranil Gupta Department of Computer.
Power-Efficient Rendez- vous Schemes for Dense Wireless Sensor Networks En-Yi A. Lin, Jan M. Rabaey Berkeley Wireless Research Center University of California,
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Data Collection and Dissemination
Net 435: Wireless sensor network (WSN)
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
Presentation by Andrew Keating for CS577 Fall 2009
Data Collection and Dissemination
Investigating Mac Power Consumption in Wireless Sensor Network
E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks
Exploring Energy-Latency Tradeoffs for Sensor Network Broadcasts
Presentation transcript:

Cross-Layer Designs for Energy-Saving Sensor and Ad hoc Networks Matthew J. Miller Preliminary Exam July 22, 2005

2 A Tale of Two Network Stacks Application Transport Network Data Link Physical Application Transport Network Data Link Physical It was the best of designs,… …it was the worst of designs.

3 Why not strict layering? Why shouldn’t wireless sensor and ad hoc networks use the principle that has worked so well for wireline networks?  Network usage  Network performance

4 Rethinking the Design: Network Usage Wireline/Internet Connection Oriented  The network gets data from point A to point B General purpose  Same architecture for , streaming video, and large file downloads Ad hoc/Sensor Task Oriented  The network performs specified task Specific usage  Habitat monitoring and intruder detection may have very different requirements at multiple layers

5 Rethinking the Design: A Lesson From Business? From Christensen and Raynor’s The Innovator’s Solution: “When products are not yet good enough, companies should set up a proprietary, in-house architecture to capture the most profits.”  Cross-layer interactions to improve performance “When products become more than good enough, commoditization sets in and activities should be outsourced.”  Modularization to focus on core component design

6 Rethinking the Design: Network Performance Wireline/Internet Relative performance is “good enough”  Modularization and cleaner interfaces Lower layer behavior well-defined  TCP timeouts  Link loss  Re-establishing route Ad hoc/Sensor Performance rarely “good enough”  Needs cross-layer interactions to improve performance Lower layer behavior unknown  Setting timeouts?  Differences in “links”?  How expensive is route discovery?

7 Our Contribution to Cross-Layer Design and Interactions Cross-layer design and interactions for energy efficient protocols  Link layer/physical layer designs  Link layer/network layer designs  Effects and tradeoffs on applications from energy saving protocols Application Transport Network Data Link Power Save Physical

8 Talk Outline Background on Energy Efficiency Link Layer/Physical Layer Design Link Layer/Routing Layer Design Cross-Layer Effects on Multihop Broadcast Cross-Layer Effects on Neighborhood Data Sharing Future Work

9 Talk Outline Background on Energy Efficiency Link Layer/Physical Layer Design Link Layer/Routing Layer Design Cross-Layer Effects on Multihop Broadcast Cross-Layer Effects on Neighborhood Data Sharing Future Work

10 Decreasing Interest in Energy Efficient Protocol Research Unfortunately, a significant portion of sensor and ad hoc network research ignores the issue  Promiscuous listening  Frequent “Hello” messages  Latency of network-wide flooding Citations for PAMAS paper by Year (from Citeseer)

11 Is Energy Efficiency Research Really Important? YES!!! It is a real world problem that affects wireless users every day Must be addressed for untethered ubiquitous wireless networks to become a reality

12 Won’t Moore’s Law Save Us? NO!!! From “Thick Clients for Personal Wireless Devices” by Thad Starner in IEEE Computer, January x 393 x 128 x 18 x 2.7 x Log Scale

13 Energy Consumption Breakdown Solution spans multiple areas of research: networking, OS, architecture, and applications (e.g., GRACE project) Our work focuses on the networking component While applicable to laptops, our work is most beneficial to small/no display devices like sensors From Vodafone Symposium Data Traffic (Laptop) Voice Traffic (Cell Phone) Display45%2% TX5%24% RX/Idle10%37% CPU40%37%

14 How to Save Energy at the Wireless Interface Sleep as much as possible!!! Fundamental Question: When should a radio switch to sleep mode and for how long?  Many similarities in power save protocols since all are variations of these two design decisions Radio ModePower Consumption (mW) TX81 RX/Idle30 Sleep0.003 Specs for Mica2 Mote Radio

15 Our Contribution to Cross-Layer Design and Investigation Application Transport Network Data Link Power Save Physical Reducing Energy Consumption using Carrier Sensing (Chap. 3) Multilevel Power Save Routing (Chap. 4) Latency and Reliability Tradeoffs for Multihop Broadcast Dissemination (Chap. 5) Quality of Decision Tradeoffs for Neighborhood Data Sharing (Chap. 6)

16 Talk Outline Background on Energy Efficiency Link Layer/Physical Layer Design Link Layer/Routing Layer Design Cross-Layer Effects on Multihop Broadcast Cross-Layer Effects on Neighborhood Data Sharing Future Work

17 Common Design Used by Power Save Protocols T 1 < T 2 Even with no traffic, node is awake for T 1 / (T 1 +T 2 ) fraction of the time T 1 is on the order of the time to receive a packet Data Link Power Save Physical T1T1 T2T2 LISTEN SLEEP Listen for Wakeup Signal Sleep Until Timer Fires to Start BI

18 Proposed Technique #1 Decrease T 1 using physical layer carrier sensing (CS) If carrier is sensed busy, then stay on to receive packet Typically, CS time << packet transmission time  E.g., compliant hardware CS time ≤ 15 μs Data Link Power Save Physical T1T1 T2T2 LISTEN SLEEP Carrier Sense for Wakeup Signal

19 Another Observation T 1 is fixed regardless of how many wakeup signals are received Ideally, nodes stay on just long enough to receive all wakeup signals sent by their neighbors  If no signals are for them  return to sleep Data Link Power Save Physical T1T1 T2T2 LISTEN SLEEP

20 Proposed Technique #2 Using physical layer CS, we dynamically extend the listening period for wakeup signals While previous work has proposed dynamic listening periods for power save, ours is the first for single radio devices in multihop networks Data Link Power Save Physical LISTEN SLEEP = Wakeup Signal TiTi TiTi

21 Related Work Carrier Sensing (Concurrent Work)  B-MAC [Polastre04SenSys]: Make the packet preamble as large as the duty cycle  WiseMAC [ElHoiydi04Algosensors]: Send the packet preamble during the receiver’s next scheduled CS time  We apply CS to synchronous or out-of-band protocols Dynamic Listening Periods  T-MAC [VanDam03SenSys]: Extends S-MAC to increase the listen time as data packets are received  DPSM/IPSM [Jung02Infocom]: Extends for dynamic ATIM windows in single-hop environments  We use physical layer CS to work in multihop environments without inducing extra packet overhead Data Link Power Save Physical

22 Our Work We demonstrate how Technique #1 (Carrier Sensing for Signals) can be applied to two different types of power save protocols We show an application of Technique #2 (Dynamic Listening Period) can be combined with Technique #1 to create an energy efficient protocol Data Link Power Save Physical

23 Background: IEEE Power Save Mode (PSM) A N1 N2 N3 T AW T BI DCC AD T AW A = ATIM Pkt D = Data Pkt C = ACK Pkt CC N2N1N3

24 Background: IEEE PSM Nodes are assumed to be synchronized  In our protocols, we assume that time synchronization is decoupled from PSM Every beacon interval (BI), all nodes wake up for an ATIM window (AW) During the AW, nodes advertise any traffic that they have queued After the AW, nodes remain active if they expect to send or receive data based on advertisements; otherwise nodes return to sleep until the next BI Data Link Power Save Physical

25 Applying Technique #1 to PSM Data Link Power Save Physical N1 N2 N3 T AW T BI A = ATIM Pkt D = Data Pkt C = ACK Pkt AD CC T BI T CS = “Dummy” Pkt

26 Applying Technique #1 to PSM Each beacon interval, nodes carrier sense the channel for T CS time, where T CS << T AW If the channel is carrier sensed busy, nodes remain on for the remainder of the AW and follow the standard PSM protocol If the channel is carrier sensed idle, nodes return to sleep without listening during the AW Node with data to send transmits a short “dummy” packet during T CS to signal neighbors to remain on for AW Data Link Power Save Physical

27 Observations When there are no packets to be advertised, nodes use significantly less energy Average latency is slightly longer  Packets that arrive during the AW are advertised in PSM, but may not be with our technique  First packet cannot be sent until T CS +T AW after beginning of BI instead of just T AW False positives may occur when nodes carrier sense the channel busy due to interference Can be adapted to other types of power save protocols (e.g., TDMA) Data Link Power Save Physical

28 Background: RX Threshold vs. CS Threshold RX Threshold: received signal strength necessary for a packet to be correctly received CS Threshold: received signal strength to consider the channel busy We assume that usually CS range ≥ 2*RX range  If this is not true, our technique gracefully degrades to a fixed AW scheme Data Link Power Save Physical Hello World A B C HeXXX XorXX RX Range CS Range

29 Applying Technique #2 to PSM Data Link Power Save Physical ABCDEF t0t0 C TX t1t1 B TX t2t2 A TX t3t3 t4t4 t5t5 t6t6 t7t7 BI Begins t 3 = t 0 +T i = Listen + TX = Listen Only = End AW t 5 = t 1 +T i t 6 = t 2 +T i t 7 = t 4 +T i TiTi TiTi TiTi TiTi

30 Applying Technique #2 to PSM: Listening Data Link Power Save Physical T AW BI Start TiTi TiTi TiTi TiTi TiTi Sleep according to PSM rules = TX, RX, or CS busy event T i = = Max Contention Time = ATIM/ATIM-ACK Handshake Time

31 Applying Technique #2 to PSM: Listening At the beginning of each BI, listen for T i time (T CS < T i < T AW ) When a packet is sent or received OR the channel is carrier sensed busy, extend listening time by T i Set maximum on how long the listening time can be extended since the beginning of the BI Data Link Power Save Physical

32 Applying Technique #2 to PSM: Sending Node with packets to advertise  If a packet has been received above the RX Threshold within T i time, all neighbors are assumed to be listening  Otherwise, the node conservatively assumes that its intended receiver(s) is sleeping and waits until the next beacon interval to advertise the packet T i is set such that a sender can lose one MAC contention and its receiver will continue listening Data Link Power Save Physical

33 Combining Technique #1 and Technique #2 First CS period indicates whether an AW is necessary Second CS period indicates whether AW size should be fixed or dynamic according to Technique #2  If a sender repeatedly fails using a dynamic AW, this is a fallback to the original protocol Data Link Power Save Physical CS1: Do AW if busy CS2: Do static AW if busy AW: If CS1 was busy. Size determined by CS2 feedback BI Start

34 Summary of Results Data Link Power Save Physical Energy Latency Joules/Bit ms Beacon Interval (ms), AW = 20 ms PSM No PSM #1 #1+# PSM #1 #1+#2 Latency Increase: (1) Additional CS periods, (2) Packets arriving during AW, (3) For Technique #2, postponed advertisements 30-60% Improvement 7-15 ms Increase

35 Application to Other Power Save Protocols Out-of-band power save protocols use an external mechanism for wakeup signaling Our thesis also presents the application of Technique #1 to an out-of-band (OOB) power save protocol (Section 3.2) Analysis and simulation show significant gains when OOB protocol does not already use some form of carrier sensing Data Link Power Save Physical

36 Summary Application of physical layer CS to synchronous power save protocol to reduce listening interval Physical layer CS for dynamic listening interval for single radio devices in multihop networks Application of physical layer CS to further improve OOB power save protocol Data Link Power Save Physical

37 Talk Outline Background on Energy Efficiency Link Layer/Physical Layer Design Link Layer/Routing Layer Design Cross-Layer Effects on Multihop Broadcast Cross-Layer Effects on Neighborhood Data Sharing Future Work

38 Utility of Cross-Layer Design at the Network Layer Network Data Link Power Save ABC ABCABC Isolated Power Save: A—B and B—C make decisions independently Cross-Layer Power Save: A—B and B—C can coordinate decisions

39 Related Work: Cross-Layer Power Save Routing ODPM [Zheng03Infocom]: Nodes on an active route turn off power save while all other nodes use PSM TITAN [Sengul05MC2R]: Extends ODPM; route discovery modified to favor routes that are already active Route discovery is limited to two choices:  Low latency, high energy paths  High latency, low energy paths Our work exposes a wider range of energy- latency tradeoffs during route discovery Network Data Link Power Save

40 Our Work Routing protocols designed for nodes using multiple levels of power save  Protocol to discover paths with acceptable power save-induced latency while reducing energy consumption  Source-to-sink routing protocol to reduce latency while increasing network lifetime Network Data Link Power Save

41 Multilevel Power Save: PSM Example Network Data Link Power Save PS0 PS1 PS2 PS3

42 Multilevel Power Save Each level presents a different energy-latency tradeoff (i.e., higher energy  lower latency) PSM  Nodes are synchronized to a reference point  T BI for i-th power level: T BI (i) = 2 i-1 * BI base i > 0 and T BI (1) = BI base Other PS protocols such S-MAC and WiseMAC can be modified similarly Network Data Link Power Save

43 Latency-Aware Routing Goal: Create path: 1.With end-to-end power save induced latency less than L 2.That requires the lowest increase in energy consumption for nodes on the path L can be given by application requesting path Route replies include the power save state of each node on a path to allow the source to calculate the end- to-end latency Choose lowest cost (e.g., hop count) path if routes exist with a latency less than L Network Data Link Power Save

44 Latency-Aware Routing Network Data Link Power Save A B C F DE G = PS1 = PS2 = PS3 PS1 > PS2 > PS3 Where “X > Y” means X has higher energy and lower latency than Y A—E requires lower latency than B—G

45 Latency-Aware Routing If no path with latency less than L exists, choose the path that requires the smallest increase in energy consumption and send a packet with the PS states for the route Piggyback these PS states on every data packet sent along the path Nodes remain in lowest energy PS state that maintains an acceptable latency for all flows traveling through it Network Data Link Power Save

46 Network Lifetime-Aware Routing Designed for source-to-sink routing (e.g., sensor and hybrid networks) Goal: Increase network lifetime while reducing latency despite asymmetric per node loads Based on observation that nodes closer to the sink use more energy forwarding packets Network Data Link Power Save

47 Network Lifetime-Aware Routing Beacon intervals are length T bi Nodes use T w time each interval listening for wakeup signals Nodes use T f time per interval forwarding packets (i.e., TX, RX, MAC contention) Fraction of time spent in non-sleep mode, F ns = (1/T bi ) * (T w + T f ) Latency = sum of T bi ’s at each hop on path Network Data Link Power Save

48 Network Lifetime-Aware Routing F ns = (1/T bi ) * (T w + T f ) Latency = sum of T bi ’s at each hop on path  Node lifetime varies inversely with F ns  T w fixed for all nodes  T f is greater for nodes closer to sink Adjust T bi per node such that F ns is constant for all nodes on a path Thus, all nodes have the same lifetime and nodes farther from the sink reduce the end- to-end latency with shorter duty cycles Network Data Link Power Save

49 Summary Proposed the concept of multilevel power save as a cross-layer design technique between the link layer and network layer Introduced routing protocol with fine-grain control for creating paths with acceptable latency while reducing energy consumption Proposed routing protocol to balance energy consumption while reducing latency in source-to-sink networks where the load is unbalanced Future Work  Simulate and evaluate both routing protocols  Integrate multilevel routing with physical layer carrier sensing Network Data Link Power Save

50 Talk Outline Background on Energy Efficiency Link Layer/Physical Layer Design Link Layer/Routing Layer Design Cross-Layer Effects on Multihop Broadcast Cross-Layer Effects on Neighborhood Data Sharing Future Work

51 Multihop Broadcast Applications Broadcast is a common means of disseminating and querying data in multihop wireless networks Example Applications  On-demand route discovery  Code distribution  Querying for sensor data What cross-layer effects arise in such applications as a result of power save?  Latency  Reliability Application Data Link Power Save

52 Energy-Latency Options Energy Latency Application Data Link Power Save

53 Our Work Design a protocol that gives network administrators control over the energy- latency tradeoff for multihop broadcast applications Characterize the achievable latency and reliability performance for such applications that results from using power save protocols Application Data Link Power Save

54 Sleep Scheduling Protocols Nodes have two states: active and sleep At any given time, some nodes are active to communicate data while others sleep to conserve energy Examples  IEEE Power Save Mode (PSM) Most complete and supports broadcast Not necessarily directly applicable to sensors  S-MAC/T-MAC  STEM Application Data Link Power Save

55 Protocol Extreme #1 A N1 N2 N3 D A = ATIM Pkt D = Data Pkt N2N1N3 A D A Application Data Link Power Save

56 Protocol Extreme #2 N1 N2 N3 D A = ATIM Pkt D = Data Pkt D D A N2N1N3 Application Data Link Power Save

57 Probabilistic Protocol N1 N2 N3 D A = ATIM Pkt D = Data Pkt D DA N2 N1 N3 w/ Pr=q w/ Pr=(1-q) w/ Pr=p w/ Pr=(1-p) Application Data Link Power Save

58 Probability-Based Broadcast Forwarding (PBBF) Introduce two parameters to sleep scheduling protocols: p and q When a node is scheduled to sleep, it will remain active with probability q When a node receives a broadcast, it sends it immediately with probability p  With probability (1-p), the node will wait and advertise the packet during the next AW before rebroadcasting the packet Application Data Link Power Save

59 Observations p=0, q=0 equivalent to the original sleep scheduling protocol p=1, q=1 approximates the “always on” protocol  Still have the ATIM window overhead Effects of p and q on metrics: EnergyLatencyReliability p ↑---↓ if q > 0 ↓ if q < 1 q ↑↑↓ if p > 0 ↑ if p > 0 Application Data Link Power Save

60 Summary of Results: Reliability Phase transition when: pq + (1-p) ≈ Larger than bond percolation threshold  Boundary effects  Different metric Still shows phase transition q p=0.25 p=0.37 p=0.5 p=0.75 Fraction of Broadcasts Received by 99% of Nodes Application Data Link Power Save

61 Summary of Results: Energy-Latency Tradeoff Joules/Broadcast Average Per-Hop Broadcast Latency (s) Achievable region for reliability ≥ 99% Application Data Link Power Save

62 Summary Shown the effects of energy-saving protocols on latency and reliability of applications that disseminate data via multihop broadcast Designed protocol that allows wide range of tradeoffs for such applications Future Work  Study impact of PBBF on route discovery  Consider per-broadcast PBBF where parameters are set by the source for each individual broadcast Acknowledgements: Joint work done with Cigdem Sengul and Indranil Gupta Application Data Link Power Save

63 Talk Outline Background on Energy Efficiency Link Layer/Physical Layer Design Link Layer/Routing Layer Design Cross-Layer Effects on Multihop Broadcast Cross-Layer Effects on Neighborhood Data Sharing Future Work

64 Neighborhood Data Sharing Applications Sharing data in a node’s local neighborhood is a common method by which applications make decisions Example Applications  Proactive route updates  Cluster formation  Choosing keys for communication with neighbors What cross-layer effects arise in such an application as a result of power save?  “Quality” of a decision is application dependent  We focus on “quality of security” for a key distribution application Application Data Link Power Save

65 Sensor Network Security Key distribution is an important application for sensors  Eavesdropping relatively easy  Deployment may be in hostile territory Challenges  Resource constraints Use symmetric keys Use little memory for keying material  Scalability  Uncontrolled topology Application Data Link Power Save

66 Sensor Network Key Distribution Applications All nodes share one key  Minimal memory usage  If one node is compromised, all links are compromised Separate key for each node pair  If one node is compromised, no other links are compromised  Each node must store N keys Goal: sensors share a secret pairwise key with each one-hop neighbor instead of every sensor Application Data Link Power Save

67 Related Work: Sensor Key Distribution Key Predistribution [Eschenauer02CCS] [Chan03S&P]  Each sensor preloaded with a random subset of keys from a global key pool  Sensors with shared keys can communicate  Relatively low connectivity and each compromised sensor exposes more of global key pool to the adversary [Anderson04ICNP]  Each neighbor pair does a plaintext handshake over the broadcast channel to establish a shared key  Assumes attackers are very sparse (e.g., < 3% of nodes)  Weaker than our protocol; does not use channel diversity Application Data Link Power Save

68 Our Work Present novel protocol where each node stores one key per neighbor and each key is secret (w.h.p.) after short initialization First to propose leveraging channel diversity for sensor network key distribution Characterize the energy-security tradeoffs possible with our application Application Data Link Power Save

69 E C, E C, D, E Basic Idea of Application Application Data Link Power Save AB D C E Nodes that know all of A and B’s keys: Ø = Channel 1 = Channel 2

70 Phase 1: Predeployment Each sensor is given α keys by a trusted source  Keys are unique to sensor and not part of global pool  α presents a tradeoff between initialization overhead and security Given N sensors, the trusted source also loads O(lg N) Merkle tree hashes needed to authenticate a sensor’s keys  Discussed in detail in the proposal document Application Data Link Power Save

71 Phase 2: Initialization Each sensor follows two unique non- deterministic schedules:  When to switch channels (chosen uniformly at random among c channels)  When to broadcast each of its α keys Thus, each of a sensor’s α keys is overheard by 1/c neighbors on average and a different subset of neighbors overhears each key Sensors store their α keys along with every overheard key Application Data Link Power Save

72 Phase 3: Key Discovery Goal: Discover a subset of stored keys known to each neighbor All sensors switch to common channel and broadcast Bloom filter with η of their stored keys  Bloom filters described in detail in proposal document Sensors keep track of the subset of keys they believe they share with each neighbor  May be wrong due to Bloom filter false positives Application Data Link Power Save

73 Phase 4: Key Establishment Application Data Link Power Save 1. Generate link key: k uv = hash(k 1 || k 2 || k 3 ) 2. Generate Bloom filter for k uv : BF(k uv ) 3. Encrypt random nonce (RN) with k uv : E(RN, k uv ) 1. Find keys in BF(k uv ) 2. Use keys from Step 1 to generate k uv 3. Decrypt E(RN, k uv ) 4. Generate E(RN+1, k uv ) η = 3: k 1, k 2, k 3 uv E(RN, k uv ) || BF(k uv )E(RN+1, k uv ) k uv

74 Phase 4: Key Establishment Goal: Establish one link key with each neighbor based on subset of shared keys For u to form a link key with v, it first creates key k uv, formed from the η keys that u believes it shares with v u then sends a Link Request to v with a random nonce encrypted by k uv and a Bloom filter of the keys that make up k uv v replies with a Link Reply if it is able to correctly decrypt the random nonce and k uv is established as the link key Application Data Link Power Save

75 Summary of Results Application Data Link Power Save c=2 c=7 c=12 % Links Connected and Secure Avg. Power (J/s) Number of Channels % Links Connected and Secure α =25 α =50 α =75 α =100 One extra channel greatly improves security For c=2, small energy increase greatly improves security when % less than about 0.85 ≈ 0.85

76 Summary Designed key distribution application for sensor networks that is resilient to compromise and has relatively low memory requirements Unlike other protocols, we leverage channel diversity as part of the protocol design Characterized the cross-layer security-energy tradeoffs that arise when sensors use power save with the application Application Data Link Power Save

77 Talk Outline Background on Energy Efficiency Link Layer/Physical Layer Design Link Layer/Routing Layer Design Cross-Layer Effects on Multihop Broadcast Cross-Layer Effects on Key Distribution Future Work

78 Future Thesis Work: Routing Simulate and evaluate proposed latency- aware routing protocol Simulate and evaluate proposed network- lifetime aware routing protocol Integrate these protocols with proposed physical layer CS protocol

79 Future Thesis Work: Multihop Broadcast Study impact of PBBF on route discovery  Effect on quality of routes since nodes receive less route requests Study per-broadcast PBBF  Parameters are set by the source of each individual broadcast rather than using the same values for every network broadcast

80 Thank You!!!

81 Analysis in Our Work Developed equations to model energy consumption of all 4 OOB protocols in the physical layer CS chapter Analysis for key distribution protocol to determine the probability that a pairwise key is secret Co-authors for PBBF used percolation theory to model energy consumption, latency, and reliability

82 Properties of Preamble Sampling No synchronization necessary  We require synchronization Larger preambles increase chance of collisions  We restrict CS signals to a time when data is not being transmitted  In our technique, interference is tolerable between CS signals Broadcasts require preamble size be as long as a BI  Exacerbates broadcast storm  We do not require extra overhead for broadcast Only one sender can transmit to a receiver per BI  We allow multiple senders for a receiver per BI

83 Is time synchronization a problem? Motes have been observed to drift 1 ms every 13 minutes [Stankovic01Darpa] The Flooding Time Synchronization Protocol [Maróti04SenSys] has achieved synchronization on the order of one microsecond Synchronization overhead can be piggybacked on other broadcasts (e.g., routing updates) GPS may be feasible for outdoor environments Chip scale atomic clocks being developed that will use mW of power [NIST04]

84 Transition Costs Depend on Hardware [Polastre05IPSN/SPOTS] Mote Radio Model Wakeup Time (ms) TX/RX/ Sleep (mW) Bitrate (kbps) TR1000 ( ) /12/ ASK CC1000 ( ) 242/29/ FSK CC2420 (2004-now) /38/ O-QPSK

85 Sensor Application #1 Code Update Application  E.g., Trickle [Levis et al., NDSI 2004] Updates Generated Once Every Few Weeks  Reducing energy consumption is important  Latency is not a major concern Here is Patch #27 Application Data Link Power Save

86 Sensor Application #2 Short-Term Event Detection  E.g., Directed Diffusion [ Intanagonwiwat et al., MobiCom 2000] Intruder Alert for Temporary, Overnight Camp  Latency is critical  With adequate power supplies, energy usage is not a concern Look For An Event With These Attributes Application Data Link Power Save