Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu

Slides:



Advertisements
Similar presentations
KANSEI TESTBED OHIO STATE UNIVERSITY. HETEREGENOUS TESTBED Multiple communication networks, computation platforms, multi-modal sensors/actuators, and.
Advertisements

Chris Karlof and David Wagner
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Declarative sensor networks David Chu Computer Science Division EECS Department UC Berkeley DBLunch UC Berkeley 2 March 2007.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Impala: A Middleware System for Managing Autonomic, Parallel Sensor Systems Ting Liu and Margaret Martonosi Princeton University.
TOSSIM A simulator for TinyOS Presented at SenSys 2003 Presented by : Bhavana Presented by : Bhavana 16 th March, 2005.
Exercises for Chapter 19: Mobile and Ubiquitous Computing
Context-based Information Sharing and Authorization in Mobile Ad Hoc Networks Incorporating QoS Constraints Sanjay Madria, Missouri University of Science.
DOT3 Radio Stack Sukun KimJaein Jeong A DOT3 Mote Design & Implementation Motivation Evaluation MICA is not enough for large scale applications. DOT3 is.
1 Constructing Locally Centralized Applications by Mobile Agents in Wireless Sensor Networks 2008/05/14 Shunichiro Suenaga* (Nihon Unisys Ltd./The Graduate.
The Meraka Indoor wireless mesh test bed A new multi hop routing benchmarking tool David Johnson Senior Researcher Wireless Africa Programme Meraka CSIR.
Generic Sensor Platform for Networked Sensors Haywood Ho.
UNIVERSITY OF SOUTHERN CALIFORNIA Embedded Networks Laboratory 1 Wireless Sensor Networks Ramesh Govindan Lab Home Page:
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
SensIT PI Meeting, April 17-20, Distributed Services for Self-Organizing Sensor Networks Alvin S. Lim Computer Science and Software Engineering.
Versatile low power media access for wireless sensor networks Joseph PolastreJason HillDavid Culler Computer Science Department University of California,Berkeley.
Distributed Structural Health Monitoring A Cyber-Physical System Approach Chenyang Lu Department of Computer Science and Engineering.
Mobile Agents in Wireless Sensor Networks Ivan Vukasinovic Zoran Babovic Goran Rakocevic.
Intelligent Shipping Container Project IMPACT & INTEL.
DESIGN & IMPLEMENTATION OF SMALL SCALE WIRELESS SENSOR NETWORK
Robot Autonomous Perception Model For Internet-Based Intelligent Robotic System By Sriram Sunnam.
Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
Implementation of Decentralized Damage Localization in Wireless Sensor Networks Fei Sun Master Project Advisor: Dr. Chenyang Lu.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Evaluation of Agent Teamwork High Performance Distributed Computing Middleware. Solomon Lane Agent Teamwork Research Assistant October 2006 – March 2007.
1 Towards a Flexible Global Sensing Infrastructure Chien-Liang Fok, Gruia-Catalin Roman, and Chenyang Lu.
Heavy and lightweight dynamic network services: challenges and experiments for designing intelligent solutions in evolvable next generation networks Laurent.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Understanding Code Mobility A Fuggetta, G P Picco and G Vigna Presenter Samip Bararia.
Computer Science Lecture 7, page 1 CS677: Distributed OS Multiprocessor Scheduling Will consider only shared memory multiprocessor Salient features: –One.
Systems Wireless EmBedded Wireless Sensor Nets Turning the Physical World into Information David Culler Electrical Engineering and Computer Sciences University.
Mobile Agents For Mobile Computing Department Of Computer Science – Dartmouth College Robert Gray David Kotz Saurab Nog Daniela Rus George Cybenko.
Egocentric Context-Aware Programming in Ad Hoc Mobile Environments Christine Julien Gruia-Catalin Roman Mobile Computing Laboratory Department of Computer.
Software Deployment and Mobility. Introduction Deployment is the placing of software on the hardware where it is supposed to run. Redeployment / migration.
July 12th 1999Kits Workshop 1 Active Networking at Washington University Dan Decasper.
Xiong Junjie Node-level debugging based on finite state machine in wireless sensor networks.
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
Autonomous prototype sensors (motes) 4 MHz, 8bit MCU, 4 KB RAM, 8KB ROM short-range (1-10ft.) radio light and other sensors LED and serial port outputs.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Software Reliability in Wireless Sensor Networks (WSN) -Xiong Junjie
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
Third International Workshop on Networked Appliance 2001 SONA: Applying Mobile Agent to Networked Appliance Control S.Aoki, S.Makino, T.Okoshi J.Nakazawa.
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin 1 Pasd Putthapipat 1 Deng Pan 1 Niki Pissinou 1.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Software Architecture of Sensors. Hardware - Sensor Nodes Sensing: sensor --a transducer that converts a physical, chemical, or biological parameter into.
Sensor network routing protocol for underground robot remote control Demonstration picture (IDF)
Supporting Fault-Tolerance in Streaming Grid Applications
Mobile ad hoc networking: imperatives and challenges
Mobile Agents.
Presentation by Andrew Keating for CS577 Fall 2009
TCP/IP Protocol Suite: Review
Distributed Control Applications Within Sensor Networks
REED : Robust, Efficient Filtering and Event Detection
Resource Allocation for Distributed Streaming Applications
Protocols.
Process/Code Migration and Cloning
Task Manager & Profile Interface
Protocols.
Presentation transcript:

Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu Mobile Computing Laboratory Distributed Object Computing Laboratory Department of Computer Science and Engineering

MURI Motivation  Software development for sensor networks is hard  Limited resources  Difficult to debug  Large & highly dynamic network  Existing software lacks flexibility  Entire network runs just one application  Cannot adapt to changes in the environment user requirements

MURI Motivating Example  Three applications: 1) Environmental Monitoring, 2) Fire Detection, 3) Fire Tracking

MURI Agilla: A Flexible Middleware for Sensor Networks Env. monitoring agent Fire detection agent Fire tracking agent  Sensor network as a shared computing resource  Flexible application deployment

MURI Agilla’s System Architecture TinyOS (1,1) Tuplespace Agilla Middleware Agents TinyOS (2,1) Tuplespace Agilla Middleware Agents migrate remote access Neighbor List Middleware Services

MURI Agilla’s Computational Model Clone or Migrate Code Stack Heap Condition Codes PC Two variants of each: 1) Strong (code + state) 2) Weak (code only)

MURI Location-Base Addressing  Nodes are addressed by location (3,1)(3,2) (3,3) (2,2) (1,1) (1,3) clone to (3,3) clone to (3,1) Fire Detection Agent

MURI Tuple Space-Based Coordination  Content-addressable shared memory  Tuple – A set of data fields  Template – A pattern that matches particular tuples  Provides spatiotemporal decoupling “out” “rout” “in” Tuplespace “in”

MURI Implementation on TinyOS  Agilla 1.x is available for Mica2 and MicaZ motes  4 agents/node  Agent Injector  Written in Java  Remote Injection via RMI  Key Challenges:  Memory: ROM: 54.7KB of 128KB RAM: 3.5KB of 4KB  Message loss

MURI Agilla 1.x Test Bed  6x9 Mica2 Mote Test Bed  Multi-hop Grid  One base station Base Station

MURI Performance Evaluation: migration vs. remote tuple space access Migration instructions are more reliable because of hop-by-hop acknowledgements… …but remote tuplespace operations have less overhead

MURI Agilla Instruction Execution Times Local Operations Remote Operations

MURI Application Experiences  Fire Detection & Tracking  Presented at MURI 3-Year Review and IPSN 2005  Efficient Network Exploration  In collaboration with UCI  Presented at MURI 3-Year Review  Intruder Detection and Tracking  Yuling Liang’s CS 521S Class Project  Cargo Tracking  In collaboration with  Robot Navigation Around Fires  In collaboration with the Media Machines Lab

MURI Intruder Detection and Tracking Base Station Tracker sends back a heartbeat. Base station re-deploys tracker if heartbeat goes away.

MURI Cargo Tracking  7 million containers arrive annually into the US  Impossible to check every container  Existing container security devices are limited: Requires line-of-sight with satellite Low-bandwidth (six 9B msgs/day) $500/device, $34.95/mo

MURI AgiTrack: Cargo Tracking using Agilla base station base station Internet Manifest Security Flags Find Cargo Load Manifest Find Intrusions

MURI Dynamic Context Discovery & Multi- Hop Network Formation Ship Dock base station base station PDA

MURI Agilla 2.0  Supports multiple base stations  Allows nodes to move (physical mobility)  Integrates wireless sensor networks with IP networks Agilla Network Agilla Network Agilla Tuple Space Limone Tuple Space Limone Network (IP) Limone Service Registry Limone agent encapsulates Agilla agent

MURI Systematic Network Traversal

MURI Robot Navigation  Mobile agents guide robot safely around the fires

MURI Robot Navigation Videos Without sensor network dataWith sensor network data

MURI System Challenges  Multi-Hop Routing  No geographic routing implementation available for Mica 2  Not enough memory on Mica2 motes for Agilla & Mint  Indoor localization  Cricket motes use a different radio packet and don’t have enough memory to run Agilla  Use Cricket & Mica 2 platforms  Outdoor localization  Least Squares Scaling (LSS)  UIUC

MURI Conclusions  Mobile agent middleware simplifies application deployment & increases network flexibility  Empirical results show that deploying sensor network applications via mobile agents is reliable and efficient  There are many applications for mobile agents in wireless sensor networks  Fire detection  Intruder detection  Cargo tracking  Robot navigation

MURI Agilla URL: Source Code Documentation Tutorials Experience Reports Thank you!