Algorithms for Wireless Sensor Networks Marcela Boboila, George Iordache Computer Science Department Stony Brook University.

Slides:



Advertisements
Similar presentations
Using Cramer-Rao-Lower-Bound to Reduce Complexity of Localization in Wireless Sensor Networks Dominik Lieckfeldt, Dirk Timmermann Department of Computer.
Advertisements

RADAR: An In-Building RF-based User Location and Tracking System.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Fault-Tolerant Target Detection in Sensor Networks Min Ding +, Dechang Chen *, Andrew Thaeler +, and Xiuzhen Cheng + + Department of Computer Science,
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
RADAR: An In-Building RF-based User Location and Tracking System Paramvir Bahl and Venkata N. Padmanabhan Microsoft Research.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks - Zang Li, Wade Trappe, Yanyong Zhang, Badri Nath Presented By: Vipul.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 17th Lecture Christian Schindelhauer.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
Collaborative Signal Processing CS 691 – Wireless Sensor Networks Mohammad Ali Salahuddin 04/22/03.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
Talha Naeem Qureshi Joint work with Tauseef Shah and Nadeem Javaid
Presented by: Xi Du, Qiang Fu. Related Work Methodology - The RADAR System - The RADAR test bed Algorithm and Experimental Analysis - Empirical Method.
WINLAB SCPL: Indoor Device-Free Multi-Subject Counting and Localization Using Radio Signal Strength Rutgers University Chenren Xu Joint work with Bernhard.
Speed and Direction Prediction- based localization for Mobile Wireless Sensor Networks Imane BENKHELIFA and Samira MOUSSAOUI Computer Science Department.
CSC 589 Lecture 22 Image Alignment and least square methods Bei Xiao American University April 13.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Sensor Positioning in Wireless Ad-hoc Sensor Networks Using Multidimensional Scaling Xiang Ji and Hongyuan Zha Dept. of Computer Science and Engineering,
Efficient Gathering of Correlated Data in Sensor Networks
SCPL: Indoor Device-Free Multi-Subject Counting and Localization Using Radio Signal Strength Chenren Xu†, Bernhard Firner†, Robert S. Moore ∗, Yanyong.
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
Architectures and Applications for Wireless Sensor Networks ( ) Localization Chaiporn Jaikaeo Department of Computer Engineering.
A Distributed Clustering Framework for MANETS Mohit Garg, IIT Bombay RK Shyamasundar School of Tech. & Computer Science Tata Institute of Fundamental Research.
Wireless Sensor Networks COE 499 Energy Aware Routing
Distributed Anomaly Detection in Wireless Sensor Networks Ksutharshan Rajasegarar, Christopher Leckie, Marimutha Palaniswami, James C. Bezdek IEEE ICCS2006(Institutions.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
RADAR: An In-Building RF-based User Location and Tracking System Presented by: Michelle Torski Paramvir Bahl and Venkata N. Padmanabhan.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
RADAR: An In-Building RF-based User Location and Tracking System.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
Localization and Secure Localization. The Problem The determination of the geographical locations of sensor nodes Why do we need Localization? –Manual.
Mathematical Models & Optimization?
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
RADAR: an In-building RF-based user location and tracking system
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
23 November Md. Tanvir Al Amin (Presenter) Anupam Bhattacharjee Department of Computer Science and Engineering,
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
Localization and Secure Localization. Learning Objectives Understand why WSNs need localization protocols Understand localization protocols in WSNs Understand.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Network Computing Laboratory 1 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published.
Jin Yan Embedded and Pervasive Computing Center
C. Savarese, J. Beutel, J. Rabaey; UC BerkeleyICASSP Locationing in Distributed Ad-hoc Wireless Sensor Networks Chris Savarese, Jan Beutel, Jan Rabaey.
Network/Computer Security Workshop, May 06 The Robustness of Localization Algorithms to Signal Strength Attacks A Comparative Study Yingying Chen, Konstantinos.
Xiaoyuan Liang, Jie Tian, Guiling Wang New Jersey Institute of Technology Deploying Mobile Survivability-Heterogeneous Sensor Networks for Barrier Coverage.
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
LEMON: An RSS-Based Indoor Localization Technique Israat T. Haque, Ioanis Nikolaidis, and Pawel Gburzynski Computing Science, University of Alberta, Canada.
Localization for Anisotropic Sensor Networks
Line Fitting James Hayes.
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors
Wireless Sensor Network Architectures
Lecture 7: Image alignment
Distributed Energy Efficient Clustering (DEEC) Routing Protocol
Net 435: Wireless sensor network (WSN)
Presented by Prashant Duhoon
A special case of calibration
Wireless Mesh Networks
RADAR: An In-Building RF-based User Location and Tracking System
Introduction to Sensor Interpretation
Introduction to Sensor Interpretation
RADAR: An In-Building RF-based User Location and Tracking System
Distributed Minimum-Cost Clustering for Underwater Sensor Networks
Survey on Coverage Problems in Wireless Sensor Networks - 2
Overview: Chapter 2 Localization and Tracking
Presentation transcript:

Algorithms for Wireless Sensor Networks Marcela Boboila, George Iordache Computer Science Department Stony Brook University

Presented paper [Li05] Zang Li, Wade Trappe, Yanyong Zhang, Badri Nath, Robust statistical methods for securing wireless localization in sensor networks, IPSN’05Robust statistical methods for securing wireless localization in sensor networks

The problem Location based services are exposed to malicious attacks => design localization algorithm that are robust to corrupted measurements Not concerned with accidental anomalies (i.e. open a door, someone passing by), but with intelligent, coordinated attacks

Attacks in wireless localization

Approach Mitigate the vulnerabilities instead of introducing countermeasures for every possible attack “Live with bad nodes instead of eliminating all possible bad nodes”

Proposed solutions Triangulation-based localization: Solution: switch from least squares (LS) estimation to least median squares (LMS) when attacked RF-based fingerprinting localization: Solution: use a median-based distance metric

Triangulation – Least Squares (LS) Method Gather a collection of (x, y, d) d = the distance from the wireless device to an anchor (x, y) Map values on a parabolic surface: minimum is the wireless device location Resolve an overdetermined system, for which we know and we determine

Triangulation - attack An intruder can perturb the distance d (i.e. alters hop count) A single perturbation can alter the result

General formulation of the LS N = total number of samples θ = the parameter to estimate (location) corresponds to corresponds to position (xi, yi) of the anchors

Solution: Least Median of Squares (LMS) The LMS estimator [P. J. Rousseeuw ’84] is among the most widely used robust linear statistical estimators The residue from LS: Minimize the medium of the residue squares:

LMS algorithm Choose a number of M subsets of size n from the N samples Applying LS, find the estimate, j=1,...,M for each subset Based on the median residual error assign a weight for each (i.e. weight=1 if the error is less than a threshold, or 0 otherwise) Compute weighted estimated

LMS algorithm LS – no attack: LMS – attack:

How choose n and M for LMS? Idea: at least one subset is “good” (no contamination) with probability: ε = contamination ratio => εN samples are outliers n=4 (3 would be minimum to decide a location) M=20 (depends on computational capabilities) P>=0.99 ε <=30%

How to get a location estimate from samples efficiently? Nonlinear LS: Linear LS:

How to get a location estimate from samples efficiently? Use linear LS – reduces computational complexity

Simulations The strength of the attack: N = 30 anchor nodes, 500 x 500 m 2 region

Simulations LMS: the error increases to a maximum, then decreases slightly and then stabilizes At low attacking strength, LS performs better than LMS With high contamination ratios, the system performs poorly

Simulations Why LS performs better than LMS at low attacking strength? linear regression: LMS detects well only when outlier and inlier are well separated

Simulations The variance indicates the distance between inliers and the outliers Establish threshold T If the variation (variance expansion due to outliers) > T, then apply LMS, else apply LS

Proposed solutions Triangulation-based localization: Solution: switch from least squares (LS) estimation to least median squares (LMS) when attacked RF-based fingerprinting localization: Solution: use a median-based distance metric

RF-based fingerprinting RADAR system – in buildings How it works: Setup phase: form a radio map with signal strengths (fingerprints) a mobile host broadcasts to base stations records are written in radio map on central base station and they have the format described below: (x, y) – mobile position - received signal strength at the ith base station Localization phase: nearest neighbor in signal space (NNSS)

RF-based fingerprinting - attack Corrupted signal strength at one base station (i.e. insert an absorbing barrier between mobile host and base station) Solution: use the median distance “nearest” neighbor: minimize

Observations What the paper does: Logical, well-structured paper, strengthened by graphical results Makes a classification of possible attacks in wireless sensor networks Employs previously developed statistical methods to minimize the effect of adversaries in the localization process, instead of eliminating it Proposes a lower-computational method (LMS), in comparison with a previous, related one (LS). The reduction in computational demands suggests that this method can be better integrated in sensor networks

Observations What the paper does not: It doesn’t study the effect over the whole system when the method is applied: computational complexity, energy consumption, feasibility, time for algorithm completion Doesn’t study a broader range of undesired interferences: arbitrary interferences with the signal information (weather conditions, etc.) accidental or malicious movement of sensors in places out of the scope of the application Not original - it adapts a method (LMS) which has already been applied in different areas (security, etc.) (see references)

Observations How to strengthen the paper: Comparison with other methods used to secure the localization process in sensor networks Results showing how well the global localization algorithm (more nodes, not only one, need to determine their position ) performs Results indicating overall energy consumption, computation, time costs, etc. Instead of simulation, employ a real situation