Remote Deployment of Sensor Networks Case Study: Monitoring the mountains of Afghanistan.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Trust relationships in sensor networks Ruben Torres October 2004.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
TDMA Scheduling in Wireless Sensor Networks
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Cooperative Multiple Input Multiple Output Communication in Wireless Sensor Network: An Error Correcting Code approach using LDPC Code Goutham Kumar Kandukuri.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
A Data Fusion Approach for Power Saving in Wireless Sensor Networks Reporter : Chi-You Chen.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Before start… Earlier work single-path routing in sensor networks
4/30/031 Wireless Sensor Networks for Habitat Monitoring CS843 Gangalam Vinaya Bhaskar Rao.
August 7, 2003 Sensor Network Modeling and Simulation in Ptolemy II Philip Baldwin University of Virginia Motivation With.
Wireless Sensor Network Security Anuj Nagar CS 590.
Sensor Networks Lecture 7. Sensor Networks Special case of the general ad hoc networking problem Much more resource constrained than a network of PDAs.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Potential for Intra- Vehicle Wireless Automotive Sensor Networks Presented by: Kiana Karimpoor.
Maximum Lifetime Routing in Wireless Sensor Networks by Collins Adetu Nicole Powell Course: EEL 5784 Instructor: Dr. Ming Yu.
Distributed Monitoring and Aggregation in Wireless Sensor Networks INFOCOM 2010 Changlei Liu and Guohong Cao Speaker: Wun-Cheng Li.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
A Distributed Coordination Framework for Wireless Sensor and Actor Networks Tommaso Melodia, Dario Pompili, Vehbi C.Gungor, Ian F.Akyildiz (MobiHoc 2005)
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Wireless Sensor Mote (TelosB) Ultra low-power wireless module –for sensor networks, monitoring app, rapid prototyping Key Features –2.4GHz radio,
A Survey on Sensor Networks Hussein Alzoubi Rami Alnamneh
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Evaluating Wireless Network Performance David P. Daugherty ITEC 650 Radford University March 23, 2006.
Human Alive Detection and Locating the Detection Area Using GPS and XBee Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Support for Multimedia Traffic in Mobile, Distributed, Multiple-Hop Wireless Networks Steven Boyd S.U.R.E. Program 2003.
SEA-MAC: A Simple Energy Aware MAC Protocol for Wireless Sensor Networks for Environmental Monitoring Applications By: Miguel A. Erazo and Yi Qian International.
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Wireless sensor and actor networks: research challenges
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Wireless Sensor Networks
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
BORDER SECURITY USING WIRELESS INTEGRATED NETWORK SENSORS (WINS) By B.S.Indrani (07841A0406) Aurora’s Technological and Research Institute.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
A Straightforward Path Routing in Wireless Ad Hoc Sensor Networks
Net 435: Wireless sensor network (WSN)
TRUST:Team for Research in Ubiquitous Secure Technologies
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
An Overview of Security Issues in Sensor Network
Presentation transcript:

Remote Deployment of Sensor Networks Case Study: Monitoring the mountains of Afghanistan

Context Military monitoring of Oppositional Forces in remote, inaccessible areas like the mountains of Afghanistan and Pakistan using wireless sensor networks. The deployment and uplink methods in this application are largely unexplored

Kyber Pass – One of the more accessible roadways in this part of the world, rarely used by guerilla fighters

Main Problems Wireless sensor networks still require (in most applications): Manual (even if random) placement of nodes Infrastructure at head end These obstacles must be overcome to deploy a monitoring network readily in the target environment

Issues outlined today Distribution method (hands-off) Data aggregation, sensor configuration Uplink strategy (no infrastructure) Network management Energy optimization Security Final Goals

Distribution: Methods Air-scatter, Air-drop Likely conducted at night to avoid detection Multiple Launch Rocket System GOOD: Takes ground personnel out of dangerous or hostile-controlled terrain BAD: Result in very poorly-behaved, random distributions: wind currents or terrain features may cause many sensors to channel into a ravine, or river Ballistics and delivery will not be a main focus of this research

Distribution: Package Smart Dust or bigger motes could be dropped at altitude as a bundle with parachute… then scattered at low altitude to control distribution area Smart dust is great for military applications because it is small (appx 1mm), difficult to detect, can be dropped at high altitude Motes could be disguised as rocks…

Data, Sensors: The Target Seismic, audio, heat, visual, chemical, electromagnetic signatures Trucks, horses, pedestrians

Data, Sensors: Sensor Devices Heterogeneous approach: multiple types of sensors, nodes Since life of network is dependent on functionality of many types of nodes, lifetime and failure calculations become more complex

Data, Sensors: Sensor Devices Use passive or low power sensors as first- responders (piezoelectrics like audio, seismic) The first-responder sensors will wake up neighboring nodes with other sensors (thermal, visual, electromagnetic, chemical, radiological, etc) Power-hungry sensors should sleep as much as possible

Uplink: Heterogeneous Nodes Connect to military satellite constellation Uplink nodes will be different from sensor nodes: larger, more battery, more power Uplink nodes form some small % of all nodes

Uplink: Initialization How to initialize the network when the head is seen as being in multiple places? How to avoid partitioning? This will be researched and protocol developed. ?

Network: Expendable Uplinks Active

Network: Expendable Uplinks Active POWER LOW TAKE OVER

Network: Expendable Uplinks Active One can see this rerouting may be computation intensive, and is in fact similar to MANET routing when nodes fail. The main difference here: the network can still be operational if it is partitioned.

Network: Protocols A significant undertaking of the project is to develop and simulate the protocol which reassigns the network head in an energy efficient manner for various configurations Important to optimize whole network power consumption

Network: Protocols Routing must transition to avoid periods of downtime or routing confusion Current head node must select its successor to eliminate routing confusion

Energy: Lifetime Network needs to be operational for at least a few months at a time: otherwise satellite monitoring becomes preferable in some circumstances The heterogeneous nodes will have to adapt to over-stimulus to keep network alive. i.e. if animals constantly pass by the network and trip seismic sensors, they should be able to be ignored in favor of reliable detectors like electromagnetic

Security Primary risk is detection of presence not data decoding Spread spectrum, noise-like signals should be used “Chatter” must be kept to minimum Alert uplinks are okay

Security The network may be compromised by several means: Stimulate for false positives, perhaps rapidly depleting the network of energy Compromise the uplink signal/device Jamming

Security: Countermeasures Detect, isolate, ignore false-positive flood input Encode uplink transmission Spread spectrum jam resistant communications links

Goals Develop basic application proposal for DARPA SBIR Identify one narrow topic within the system which needs research and development, write a paper on that topic Current candidate for narrow research: protocol to identify, shift network head- ends

Conclusions Next lecture will involve the analysis of key challenges, quantitative approaches, and outline of the draft proposal for DARPA