1 Sniper Detection Using Wireless Sensor Networks Joe Brassard Wing Siu EE-194WIR: Wireless Sensor Networks Presentation #4: April 14th, 2005.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Energy-efficient distributed algorithms for wireless ad hoc networks Ramki Gummadi (MIT)
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
1 Pattern-Oriented Composition and Synthesis of Middleware Services for NEST PI: Akos Ledeczi – Miklos Maroti – Ken Frampton Affiliation: Vanderbilt University.
Introduction to Wireless Sensor Networks
A Survey on Tracking Methods for a Wireless Sensor Network Taylor Flagg, Beau Hollis & Francisco J. Garcia-Ascanio.
PERFORMANCE MEASUREMENTS OF WIRELESS SENSOR NETWORKS Gizem ERDOĞAN.
1 Sniper Detection Using Wireless Sensor Networks Joe Brassard Wing Siu EE-194WIR: Wireless Sensor Networks Presentation #1: February 10, 2005.
Sensor Network-Based Countersniper System Gyula S, Gyorgy B, Gabor P, Miklos M, Branislav K, Janos S, Akos L, Andras N, Ken F Presented by Vikram Reddy.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Dec 6, 2007CS573: Network Protocols and Standards1 Transparent Bridging Network Protocols and Standards Winter
He Huang Introduction:The Flooding Time Synchronization Protocol.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
The Flooding Time Synchronization Protocol
Time Synchronization Murat Demirbas SUNY Buffalo.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Generic Sensor Platform for Networked Sensors Haywood Ho.
Radio Stack Iteration How to improve the CC1000 Joe Polastre January 15, 2004 NEST Retreat.
Georouting in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
Energy Aware Directed Diffusion for Wireless Sensor Networks Jisul Choe, 2Keecheon Kim Konkuk University, Seoul, Korea
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Copyright © Vanderbilt University Dr. Akos Ledeczi Institute for Software Integrated Systems Vanderbilt University Network Embedded Systems Technology.
The Zone Routing Protocol (ZRP)
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Broadcast & Convergecast Downcast & Upcast
CS450 Network Embedded Sensing Systems Week 11: Time Synchronization and Reconstruction Jayant Gupchup.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Crowd Management System A presentation by Abhinav Golas Mohit Rajani Nilay Vaish Pulkit Gambhir.
1 Transparent Bridging Advanced Computer Networks.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Circuit & Packet Switching. ► Two ways of achieving the same goal. ► The transfer of data across networks. ► Both methods have advantages and disadvantages.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Tufts University. EE194-WIR Wireless Sensor Networks. March 3, 2005 Increased QoS through a Degraded Channel using a Cross-Layered HARQ Protocol Elliot.
Multicast Routing Protocols. The Need for Multicast Routing n Routing based on member information –Whenever a multicast router receives a multicast packet.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Minimizing Energy Consumption in Sensor Networks Using a Wakeup Radio Matthew J. Miller and Nitin H. Vaidya IEEE WCNC March 25, 2004.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
Topic 2: Communications (Short Lecture) Jorge J. Gómez.
1 Sniper Detection Using Wireless Sensor Networks Joe Brassard Wing Siu EE-194WIR: Wireless Sensor Networks Presentation #3: March 17, 2005.
1 Copyright © 2004 Vanderbilt University Sensor Network-Based Countersniper System Akos Ledeczi Senior Research Scientist Institute for Software Integrated.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Active Message Application: CONNECT Presented by Xiaozhou David Zhu Oommen Regi July 6, 2001.
An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim, Dept. of Electrical & Electronic Eng., Yonsei University;
Sniper Detection Using Wireless Sensor Networks
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
Introduction to Wireless Sensor Networks
VANET.
ODMRP Enhancement.
Net 435: Wireless sensor network (WSN)
Research: algorithmic solutions for networking
Ajay Vyasapeetam Brijesh Shetty Karol Gryczynski
Data-Centric Networking
Greedy Distributed Spanning tree routing (gdstr)
Collection Tree Protocol
Presentation transcript:

1 Sniper Detection Using Wireless Sensor Networks Joe Brassard Wing Siu EE-194WIR: Wireless Sensor Networks Presentation #4: April 14th, 2005

2 Presentation #4 PinPtr In Action DFRF Review Improvements Spanning Tree Convergecast Power Management Issues Implicit Time Synchronization Hardware Improvements Questions

3 PinPtr ScreenShots

4 PinPtr Video

5 DFRF Redux Each node contains an “engine” that determines what to do with received packets, according to a policy Policies determined by application Broadcast Gradient Spanning Tree

6 DFRF Message Each message contains information about its data type, its rank, and the actual data it contains Rank indicates packet’s position towards its goal

7 The DFRF State Machine Message handling can be represented in terms of a state machine Each message has a priority value (0 – 255, stored internally) Priority value indicates status Odd, keep but don’t transmit Even, transmit 0, new 255, old, discard Varies according to application

8 Gradient Convergecast DFRF This method was tested out in PinPtr Data is forwarded to a root node Data packets transmitted up to three times Fast, robust, but can generate lots of overhead

9 Fat Spanning Tree Convergecast (FAST) Instead of using the entire path to send message, flood a small “neighborhood” with data Neighborhood is defined using a spanning tree

10 A FAST Node Knows the node ID of its parent, grandparent, and great- grandparent Assigns packets rank of grandparent Based on this information, received packets with sender ID [rank] of: Parent – this node is closer. Give higher priority Grandparent – same. Ignore. Great-grandparent – node is further away. Give lower priority. Other – not involved. Ignore. State diagram is similar to that of gradient convergecast

11 Convergecast: Gradient vs. FAST

12 Power Management Issues Keeping PinPtr on continuously drastically reduces lifespan of network How to decrease costs? Incorporate power management More efficient, cheaper hardware

13 Power Management, I Time Synchronization is a very important step, but is continuous time synch. necessary? Implicit time synchronization can be realized during message routing Adding an “age” field to data packets adds little overhead but allows integrated time synch, or RITS

14 Power Management, II Routing Integrated Time Synchronization

15 Power Management, III RITS Advantages: Eliminates continuous, extraneous radio messages for time synch Enables power management (i.e., “light sleep” and “deep sleep” modes among motes) Can now use analog comparators to “wake” the mote when an acoustic event is recorded Very low overhead imposed on original message routing protocol

16 Power Management, IV PinPtr system was designed and tested using the Mica2 mote Searched for other motes with lower operating power and/or cheaper cost Found Tmote Sky mote

17 Power Management, V Mica2 Versus Tmote Sky

18 Power Management, VI Mica2: COM (Serial) Interface TX max = 35mA Outdoor range ~500ft $200 per mote No standard encryption 16 pin expansion support Tmote Sky USB Interface TX max = 19.5mA Outdoor range ~420ft $130 per mote Hardware link-layer encryption 16 Pin expansion support Faster wake up time than Mica2 (<6us)

19 References  Tmote Sky  Mica2 Ledeczi, “Pattern Oriented Composition and Synthesis of Middleware Services for NEST”, Vanderbilt Maroti, “The Directed Flood Routing Framework”, Vanderbilt Simon, et. Al., “Sensor Network Based Countersniper System”, Vanderbilt