Research overview Murat Demirbas SUNY Buffalo CSE Dept.

Slides:



Advertisements
Similar presentations
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Advertisements

Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Teaser - Introduction to Distributed Computing
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Distributed Systems Overview Ali Ghodsi
Presented by : Poorya Ghafoorpoor Yazdi Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern Mediterranean.
Introduction to Wireless Sensor Networks
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Robcast: A singlehop reliable broadcast protocol for WSNs Murat Demirbas Srivats Balachandran University at Buffalo, SUNY.
Transact: A Transactional Framework for Programming Wireless Sensor-Actor Networks Murat Demirbas, Onur Soysal, Muzammil Hussain SUNY Buffalo.
Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast Gregory Chockler Murat Demirbas Seth Gilbert Nancy Lynch Calvin Newport Tina Nolte.
Lightweight Key Establishment and Management Protocol (KEMP) in Dynamic Sensor Networks draft-qiu-6lowpan-secure-router-01 Ying QIU, Jianying ZHOU, Feng.
Murat Demirbas Youngwhan Song University at Buffalo, SUNY
Scalable Tracking & Querying for Wireless Sensor Networks Murat Demirbas SUNY Buffalo CSE Dept.
He Huang Introduction:The Flooding Time Synchronization Protocol.
Peer-to-Peer Spatial Queries in Sensor Networks Murat Demirbas Hakan Ferhatosmanoglu The Ohio State University.
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks (WSNs) Murat Demirbas, Xuming Lu Dept of Computer Science and Engineering, University.
Control over Networks. The Coming Revolution  Electronics advances Moore’s law Computing/memory  Metrology advances MEMS  Communication advances Layered.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Murat Demirbas SUNY Buffalo CSE Dept. Transact Transact: A Transactional Programming Framework for Wireless Sensor/Actor Networks optimistic concurrency.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 4 – Consensus and reliable.
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks (WSNs) Murat Demirbas, Xuming Lu Dept of Computer Science and Engineering, University.
Autonomous Virtual Mobile Nodes Shlomi Dolev Seth Gilbert Elad Schiller Alex Shvartsman Jennifer Welch.
Glance: A lightweight querying service for wireless sensor networks Murat Demirbas SUNY Buffalo Anish Arora, Vinod Kulathumani Ohio State Univ.
Composition Model and its code. bound:=bound+1.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
GS 3 GS 3 : Scalable Self-configuration and Self-healing in Wireless Networks Hongwei Zhang & Anish Arora.
Undergraduate Poster Presentation Match 31, 2015 Department of CSE, BUET, Dhaka, Bangladesh Wireless Sensor Network Integretion With Cloud Computing H.M.A.
Authors: Joaquim Azevedo, Filipe Santos, Maurício Rodrigues, and Luís Aguiar Form : IET Wireless Sensor Systems Speaker: Hao-Wei Lu sleeping zigbee networks.
Presented by Amira Ahmed El-Sharkawy Ibrahim.  There are six of eight turtle species in Ontario are listed as endangered, threatened or of special concern.
Challenges & Opportunities in Monitoring of Buildings with Wireless Sensor Networks Murat Demirbas University at Buffalo, SUNY Computer Science & Engineering.
Distributed Algorithms – 2g1513 Lecture 9 – by Ali Ghodsi Fault-Tolerance in Distributed Systems.
Clock Synchronization in Sensor Networks for Civil Security Farnaz Moradi Asrin Javaheri.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Research overview Murat Demirbas University at Buffalo, SUNY CSE Dept. iComp.
Data Mining Algorithms for Large-Scale Distributed Systems Presenter: Ran Wolff Joint work with Assaf Schuster 2003.
04/06/2016Applied Algorithmics - week101 Dynamic vs. Static Networks  Ideally, we would like distributed algorithms to be: dynamic, i.e., be able to.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Lecture 8: Wireless Sensor Networks
Chap 15. Agreement. Problem Processes need to agree on a single bit No link failures A process can fail by crashing (no malicious behavior) Messages take.
Chapter 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University Building Dependable Distributed Systems.
DISTIN: Distributed Inference and Optimization in WSNs A Message-Passing Perspective SCOM Team
Several sets of slides by Prof. Jennifer Welch will be used in this course. The slides are mostly identical to her slides, with some minor changes. Set.
Revisiting failure detectors Some of you asked questions about implementing consensus using S - how does it differ from reaching consensus using P. Here.
AD HOC NETWORKS BY: Bhagyashree Fulzele 03 Sneha Ghosh 23 Yamini Kothe 27 Namrata Nitnawre 12.
CS 542: Topics in Distributed Systems Self-Stabilization.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
EEC 688/788 Secure and Dependable Computing Lecture 9 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Hwajung Lee.  Technique for spontaneous healing.  Forward error recovery.  Guarantees eventual safety following failures. Feasibility demonstrated.
Superstabilizing Protocols for Dynamic Distributed Systems Authors: Shlomi Dolev, Ted Herman Presented by: Vikas Motwani CSE 291: Wireless Sensor Networks.
Wireless Sensor Networks
ITEC452 Distributed Computing Lecture 15 Self-stabilization Hwajung Lee.
Computer Science 425/ECE 428/CSE 424 Distributed Systems (Fall 2009) Lecture 20 Self-Stabilization Reading: Chapter from Prof. Gosh’s book Klara Nahrstedt.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Fundamentals of Fault-Tolerant Distributed Computing In Asynchronous Environments Paper by Felix C. Gartner Graeme Coakley COEN 317 November 23, 2003.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Chapter 8 Fault Tolerance. Outline Introductions –Concepts –Failure models –Redundancy Process resilience –Groups and failure masking –Distributed agreement.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Introduction to Wireless Sensor Networks
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Distributed Transactions
Project suggestions.
Protocols.
EEC 688/788 Secure and Dependable Computing
Self-Managed Systems: an Architectural Challenge
Protocols.
Presentation transcript:

Research overview Murat Demirbas SUNY Buffalo CSE Dept.

2 Personal computing ? PC processors are only 2% of all processors Where do the rest of the processors go?  Automotive industry, e.g., new car has dozens of microprocessors  Communications, e.g., cell-phones  Consumer electronics, e.g., microwaves, washing machines  Industrial equipment, e.g., factory floor robots

3 Ubiquitous computing ! Instead of us interacting with the computers in the virtual world, the computers should interact with us in our physical world Technology is now available via MEMS, CMOS, CMOS radios Real-world deployments have already started:  Environmental monitoring  Precision agriculture  Asset management  Military surveillance

4 Wireless sensor networks (WSNs) A sensor node (mote)  8K RAM, 4Mhz processor  magnetism, heat, sound, vibration, infrared  wireless (radio broadcast) communication up to 100 feet  costs ~$10 (right now costs ~$100)

5 Challenges in WSN Scalability  Thousands of nodes collaborate; for achieving scalability distributed & local algorithms are needed  Distributed algorithms are notoriously difficult to design Fault-tolerance  Wireless communication is unreliable due to collisions  Consensus is impossible to achieve  Nodes fail due to adverse environmental conditions and software bugs  Maintenance of infrastructures are costly and difficult

6 Research statement Developing distributed, robust,resilientWSN services Developing distributed, robust, resilient WSN services  Distributed: decentralized  Robust: strong, durable  Resilient: able to adapt and recover from hazards This requires work on several layers of the WSN protocol stack

7 Research overview 1.MAC layers for robust single-hop communication 2.Geometric infrastructures for resilient WSN services 3.Programming abstractions for robust computing 4.Real-world deployments of robust WSN 5.Theory of self-stabilization

8 1. MAC layers for robust communication Coordinated attack problem  Two armies are waiting to attack a city  They need to attack together to win  Each army coordinates with a messenger  Messenger may be captured by the city Can generals reach agreement?  Agreement is impossible in the presence of unreliable channel Wireless communication is unreliable due to collisions  Hidden node problem

9 RCD Receiver-side collision detection (RCD) RCD circumvents the impossibility result  RCD enables coping with undetectable message loss RCD is easily implementable in WSNs  Receiver side monitoring and notification of collisions  No info wrt # of lost messages or identities of senders  Classification of RCDs  Completeness: Ability to detect collisions  Accuracy: Ability to avoid false positives Synchronized rounds to convey negative feedbackSynchronized rounds to convey negative feedback  Collisions of negative feedback imply at least one negative feedback

10 Vote-Veto Vote-Veto algorithm Two phases: vote and veto  Vote phase:  Every active node sends out its vote  If a node hears no collision, the node updates its vote to min of received votes  If a node hears collision or different votes, it decides to veto  Veto phase:  If no veto messages are received or collisions detected, then a node can decide, else nodes continue to next round  Intuition: By having a dedicated veto phase, effects of collision is detectable RobcastBEMARobcast and BEMA MAC protocols for robust broadcast  They eliminate the hidden terminal problem and improve throughput

11 2. Geometric infrastructures for resilient WSN services For scalability, local operations are needed over global structures By exploiting the geometry of WSNs, we can design efficient, minimal, and resilient infrastructures GlanceDQTPeeR-treeQuerying structures: Glance, DQT, PeeR-tree  O(d) time for querying, where d is the distance to the nearest answer  Graceful resilience to the face node failures via simplicity of design StalkTrailTracking structures: Stalk, Trail  O(d) time for querying  O(m*logm) for update, where m is the distance the evader moved containment wave stretch-factor  Local self-healing via containment wave idea & stretch-factor idea

12 Geometric infrastructures for mobile WSN Mobility improves coverage and, hence, resilience Mobile base-station for efficient data aggregation –Relocating the base-station in response to varying data rates Deployment and relocation of mobile WSN –Sensor nodes relocate to provide dynamic coverage by following the interest gradient –Even though neighbors can change for each node, the network should stay connected –What are local rules to maintain such a mobile WSN ?

13 3. Programming abstractions for robust computing Transact Transact: A transactional framework for programming WSANs Effectively managing concurrent execution is a big challenge  Concurrency needs to be tamed to prevent unintentional nondeterministic executions  Concurrency needs to be boosted for achieving timeliness Transactional, optimistic concurrency control framework  enables understanding of a system execution as a single thread of control,  while permitting the deployment of actual execution over multiple threads distributed on several nodes  By exploiting the properties of wireless broadcast communication, we provide a distributed and local conflict detection and serializability

14 4. Real-world deployments of robust WSN Line In The Sand In OSU, we developed a surveillance service for DARPA-NEST  Detect, track, and classify trespassers as car, soldier, civilian  LiteS: 100 nodes in 2003, ExScal: 1000 nodes in Dec 2004 Thick Entry Line A S S E T 1 km 250 m

15 4. Real-world deployments of robust WSN… INSIGHT INSIGHT: INternet Sensor InteGration for HabitaT monitoring –Single-hop network –Basestation serves webpage –To circumvent firewalla replica is established via XML query – Elvis Elvis: In-building personnel localization

16 5. Theory of self-stabilization Self-stabilization is the ability of a system to recover within bounded steps from arbitrary states to states from where the system exhibits desired behavior Arbitrary state corruption provides a clean abstraction of how many systems are perturbed by their diverse environments  Self-stabilization provides a viable method to deal with state corruption  Case-by-case analysis of faults and recovery is shunned in favor of a uniform mechanism Self-stabilizing systems do not need any initialization  Self-configuring!

17 5. Theory of self-stabilization… l egitimate states from where safety and liveness are satisfied illegitimate states reached possibly due to faults Closure: Set of legitimate states is closed under system execution Convergence: Starting from any system state, every system computation eventually reaches a legitimate state

18 5. Theory of self-stabilization… Graybox self-stabilizationGraybox self-stabilization  Improves over the whitebox and blackbox approaches tried so far Compositional reasoning for self-stabilizationCompositional reasoning for self-stabilization  Modular design and verification of self-stabilization Syntax-based design of self-stabilization  Use programming patterns to achieve self-stabilization Probabilistic & model-based verification of self-stabilization  Improves over strictly deterministic design and verification of self-stabilization

19 Research group: Current PhD students  Muzammil Hussain  Xuming Lu  Dola Saha  Onur Soysal Several MS students are involved (via CSE 646) Closely related research groups  Chunming Qiao : networking  Jan Chomicki, Michalis Petropoulos : database management iComp

20 Questions ? 1.MAC layers for robust single-hop communication 2.Geometric infrastructures for resilient WSN services 3.Programming abstractions for robust computing 4.Real-world deployments of robust WSN 5.Theory of self-stabilization

21 3. Abstractions for robust computing… Virtual Infrastructure (VI)  Robustness in spite of mobility of nodes Static or mobile virtual nodes  Applications in traffic monitoring, and regulation (MIT’s CarTel platform)