WiCop: Engineering WiFi Temporal White-Space for Safe Operations of Wireless Body Area Networks in Medical Applications Yufei Wang, Qixin Wang, Zheng Zeng,

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

SoNIC: Classifying Interference in Sensor Networks Frederik Hermans et al. Uppsala University, Sweden IPSN 2013 Presenter: Jeffrey.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Transmission Power Control in Wireless Sensor Networks CS577 Project by Andrew Keating 1.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
A Transmission Control Scheme for Media Access in Sensor Networks Lee, dooyoung AN lab A.Woo, D.E. Culler Mobicom’01.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Enabling Coexistence of Heterogeneous Wireless Systems: Case for ZigBee and WiFi The University of Michigan Kang G. Shin Xinyu Zhang.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
RT-WiFi: Real-Time High-Speed Communication Protocol for Wireless Cyber-Physical Control Applications Ramyaa & Malak.
Investigating Mac Power Consumption in Wireless Sensor Network
Jun Huang 1,  Guoliang Xing 1,  Gang Zhou 2, Ruogu Zhou 1  
1/24 Passive Interference Measurement in Wireless Sensor Networks Shucheng Liu 1,2, Guoliang Xing 3, Hongwei Zhang 4, Jianping Wang 2, Jun Huang 3, Mo.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
Resilience To Jamming Attacks
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Analysis of the Performance of IEEE for Medical Sensor Body Area Networking ECE 5900 Computer Engineering Seminar Instructor: Dr. Chigan Huaming.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
James Hou, Benjamin Chang, Dae-Ki Cho, Mario Gerla BodyNets 2009 April 1, 2009.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Tamer Nadeem Dept. of Computer Science Lec #7: MAC Multi-Rate.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
CWNA Guide to Wireless LANs, Second Edition
Support WiFi and LTE Co-existence
Potential for Intra- Vehicle Wireless Automotive Sensor Networks Presented by: Kiana Karimpoor.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
Fundamentals of Computer Networks ECE 478/578
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks Bonhyun Koo Lei Tang*, Yanjun Sun †, Omer Gurewitz.
How Bad Are The Rogues’ Impact on Enterprise Network Performance ? Kaixin Sui, Dan Pei, Youjian Zhao, Zimu Li Tsinghua University.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
A Reliable Transmission Protocol for ZigBee-Based Wireless Patient Monitoring IEEE JOURNALS Volume: 16, Issue:1 Shyr-Kuen Chen, Tsair Kao, Chia-Tai Chan,
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
A Reliability-oriented Transmission Service in Wireless Sensor Networks Yunhuai Liu, Yanmin Zhu and Lionel Ni Computer Science and Engineering Hong Kong.
Doc.: IEEE /0877r0 Submission July 2013 James Wang (MediaTek)Slide 1 HEW Beamforming Enhancements Date: Authors:
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
On Mitigating the Broadcast Storm Problem with Directional Antennas Sheng-Shih Wang July 14, 2003 Chunyu Hu, Yifei Hong, and Jennifer Hou Dept. of Electrical.
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks ACM MobiHoc 2011 (Best Paper Award) Lei Tang 1, Yanjun Sun 2,
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laborartory.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
LECTURE 13 CT1303 LAN. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL CSMA\CA Carrier Sense Multiple Access\Collision Avoidance CSMA\CA Each station will sense.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Frame counter: Achieving Accurate and Real-Time Link Estimation in Low Power Wireless Sensor Networks Daibo Liu, Zhichao Cao, Mengshu Hou and Yi Zhang.
WiFi Networks: IEEE b Wireless LANs
Goal Control the amount of traffic in the network
28 October, 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Beacon-based Multi-Channel MAC for.
Wireless LAN Simulation IEEE MAC Protocol
Investigating Mac Power Consumption in Wireless Sensor Network
WiFi Networks: IEEE b Wireless LANs
Presentation transcript:

WiCop: Engineering WiFi Temporal White-Space for Safe Operations of Wireless Body Area Networks in Medical Applications Yufei Wang, Qixin Wang, Zheng Zeng, Guanbo Zheng, Rong Zheng Dept. of Computing, The Hong Kong Polytechnic Univ. Dept. of Computer Science UIUC Dept. of Computer Science, Univ. of Houston

Table of Contents Demand Proposed Framework Evaluation Related work

Demand

Crisis of wired BAN Cause frequent falling off of medical sensors Limit the movement of patients Make medical unit untidy

Advantage of WBAN WBAN solves the problem of wired BAN Sensors unlikely fall off Patient feel more comfortable Medical units are more tidy

Medical WBAN Features Low duty cycle Low data rate ~500Kbps Typical sampling rate < 300Hz Wakeup on demand Low data rate ~500Kbps Low transmit power <1mW Disparate delay requirements ECG: <500ms Body temperature monitoring: several seconds Single-Hop centralized WBAN is the preferred architecture

WiFi Co-Channel Interference WiFi Co-channel inference is a major threat to WBAN ZigBee channels vs. 802.11b WiFi channels

WiFi Co-Channel Interference Power asymmetry Typical WiFi power ≈ 30mW Typical ZigBee (Bluetooth, IEEE 802.15.6) power ≤ 1mW MAC asymmetry Many WiFi device use Carrier Sense (CS) based Clear Channel Assessment (CCA). Such WiFi devices do not back off to ZigBee. Many ZigBee uses Energy Detection (ED) CCA to assess the channel. ZigBee backs off to WiFi.

The existing Solutions Operate WBAN over RF channels sufficiently away from the active WiFi RF channels limits the RF spectrum that WBANs can use Revise current WBAN or WiFi standards adding intelligent coexistence schemes Hard to use Commercially-Off-The-Shelf (COTS) Try to spatially separate WBANs from WiFi networks via careful configuration-time planning Often difficult as WiFi networks may not be under the same administration domain as WBANs Cause spurious outages in WBANs by unintended usage of mobile WiFi devices

The treat of WiFi to WBANs

The treat of WiFi to WBANs Monitor: Base station Polling period: 100ms Electrode: Client 250 samples/sec (4ms/sample) 25 samples/chunk (100ms/chunk) 3chunks/packet, i.e. each chunk is retransmitted 3 times (COTS≤4ms to send a packet)

The treat of WiFi to WBANs monitor: Base station polling period: 100ms electrode: Client 250 samples / sec 25 samples / chunk 3 chunks / packet, i.e., each chunk is retransmitted 3 times Failure: a chunk fails all of its retransmissions. a chunk fails all 𝑁𝑟𝑒 = 3 retransmissions.

Performance metrics 𝑴𝑻𝑻𝑭= 𝑻 𝒑𝒐𝒍𝒍𝒊𝒏𝒈 (𝟏−𝑷𝑹𝑹) 𝑵𝒓𝒆 Packet Reception Rate (PRR) Mean Time To Failure (MTTF) 𝑴𝑻𝑻𝑭= 𝑻 𝒑𝒐𝒍𝒍𝒊𝒏𝒈 (𝟏−𝑷𝑹𝑹) 𝑵𝒓𝒆

Proposed Framework

Proposed Framework “Engineer” temporal white-spaces between WiFi transmissions to allow WBAN transmissions Busy WiFi leaves no room for WBAN Goal: create temporal white-spaces in WiFi traffic for WBAN

Proposed Framework Policing: prohibit the transmissions of WiFi interferers in a well-controlled manner Shield WBAN transmissions in space and time The basic idea is to exploit the WiFi CCA mechanisms; sending WiFi compliant signals to refrain WiFi stations from transmitting.

WiCop Effectively controlling the temporal white-spaces (gaps) between consecutive WiFi transmissions Two mechanisms: Utilizing the carrier sensing mechanisms in WiFi Fake-PHY-Header DSSS Nulling

It is claims a fake WiFi packet with duration Fake-PHY-Header Temporal Scheme It is claims a fake WiFi packet with duration = WBAN active interval

Continuously repeated DSSS Preambles DSSS-Nulling Repeated DSSS preamble Continuously repeated DSSS Preambles

Band-rejection filtered DSSS-Nulling policing signal Spectrum illustration of interferer, policing and Zigbee signal

Evaluation

Evaluation The policing node implements the two policing mechanisms

Temporal white-spaces due to WiCop Without Policing With Policing (5ms temporal white-space/10ms)

Moderate Impact on WiFi traffic WBAN MTTF under different WiFi interference source end data rates

Related Work

WBAN and WiFi coexistence Huang [11] argued that the performance degradation of ZigBee in the WiFi interference is caused by two main reasons. Namely power asymmetry Carrier sense based CCA Hou [4] uses the duration field of the RTS MAC header to reserve time. Before broadcasting a beacon, a ZigBee base station first send an RTS packet to reserve a channel. Hou’s approach requires sending a whole packet to reserve the channel.

DoS attack to WLAN Thuente [29] studied several intelligent jamming methods with the requirement of Low power Low detection probability Including DIFS waiting jamming ACK corruption jamming Fake RTS jamming

Experimental Evaluation in Medical Environments Garudadri [32] applied Compressed Sensing to ECG. This approach uses the redundancy in periodic ECG trace, to mitigate distortion under high packet losses. This approach is orthogonal to WiCop and can be used in conjunction with WiCop to further improve the robustness of ECG monitoring.

Experiment layout

Conclusion WiCop significantly improves WBAN performance Controlled impact on WiFi DSSS-Nulling is more effective than Fake-PHY-Header in improving MTTF, mainly due to repeated transmissions of DSSS preamble Fake-PHY-Header incurs much less overhead than DSSS-Nulling