NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization.

Slides:



Advertisements
Similar presentations
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Advertisements

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Introduction to Wireless Sensor Networks
1 An Energy-Efficient Unequal Clustering Mechanism for Wireless Sensor Networks Chengfa Li, Mao Ye, Guihai Chen State Key Laboratory for Novel Software.
An Energy-Efficient Data Storage Scheme for Multi- resolution Query in Wireless Sensor Networks 老師 : 溫志煜 學生 : 官其瑩.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
1-1 Topology Control. 1-2 What’s topology control?
By Antonio Ruzzelli MANAGEMENT ISSUES FOR WIRELESS SENSOR NETWORKS, AN OVERVIEW:
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Talha Naeem Qureshi Joint work with Tauseef Shah and Nadeem Javaid
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
1 Y-MAC: An Energy-efficient Multi-channel MAC Protocol for Dense Wireless Sensor Networks Youngmin Kim, Hyojeong Shin, and Hojung Cha International Conference.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
Protocols for Self-Organization of a Wireless Sensor Network K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie IEEE Personal Comm., Oct Presented.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
A Framework for Energy- Saving Data Gathering Using Two-Phase Clustering in Wireless Sensor Networks Wook Chio, Prateek Shah, and Sajal K. Das Center for.
A Multi-Channel MAC Protocol for Wireless Sensor Networks Chen xun, Han peng, He qiu-sheng, Tu shi-liang, Chen zhang-long The Sixth IEEE International.
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
Mobile Ad hoc Networks Sleep-based Topology Control
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Lei Tang∗ Yanjun Sun† Omer Gurewitz‡ David B. Johnson∗
Wireless Sensor Network Protocols Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
TDMA Slot Reservation in Cluster-Based VANET Ph.D. Gathering By Mohammad S. Almalag Advisor Michele C. Weigle Department of Computer Science Old Dominion.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfaq Khokhar ECE Department, University.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Fast Join and Synchronization Schema in the IEEE e MAC
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
Enhancement of the S-MAC Protocol for Wireless Sensor Networks Faisal Hamady Mohamad Sabra Zahra Sabra Ayman Kayssi Ali Chehab Mohammad Mansour IEEE ©
1/8/2016 Wireless Sensor Networks COE 499 Sleep-based Topology Control I Tarek Sheltami KFUPM CCSE COE
TDMA scheduling algorithms for WSN Speaker: Chan-Yu Tsai Advisor: Dr. Ho-Ting Wu Date: 2015/5/6.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Energy-Efficient Wake-Up Scheduling for Data Collection and Aggregation Yanwei Wu, Member, IEEE, Xiang-Yang Li, Senior Member, IEEE, YunHao Liu, Senior.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Delivery ratio-maximized wakeup scheduling for ultra-low duty-cycled WSNs under real-time constraints Fei Yang, Isabelle Augé-Blum National Institute of.
Turkmen Canli ± and Ashfaq Khokhar* Electrical and Computer Engineering Department ± Computer Science Department* The University of Illinois at Chicago.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
1 Grid-Based Access Scheduling for Mobile Data Intensive Sensor Networks C.-K. Lin, V. Zadorozhny and P. Krishnamurthy IEEE International Conference on.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
2005/8/2NTU NSLAB1 Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfag Khokhar ECE/CS.
Power-Efficient Rendez- vous Schemes for Dense Wireless Sensor Networks En-Yi A. Lin, Jan M. Rabaey Berkeley Wireless Research Center University of California,
Energy Efficient Data Management in Sensor Networks Sanjay K Madria Web and Wireless Computing Lab (W2C) Department of Computer Science, Missouri University.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
MAC Protocols for Sensor Networks
Net 435: Wireless sensor network (WSN)
Investigating Mac Power Consumption in Wireless Sensor Network
Protocols.
Protocols.
Presentation transcript:

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization of Sensor Networks Chutima Boonthum, Irwin Levinstein, Stephan Olariu, Lan Wang, Qingwen Xu {cboont, ibl, olariu, walng_l, Department of Computer Science, Old Dominion University Norfolk, VA USA

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 2 Background & Motivation Wireless Sensor Networks (WSNs) have been widely used in various applications Securing WSNs has become a major issue and has number of proposed solutions Yet, none of these addresses the issue on information assurance Therefore, we explored various aspects related to “information assurance in WSNs”

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 3 Agenda WSNs overview Sensors and sensor networks Information assurance System longevity Securing individual sensors Self-organization Assurance-awareness

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 4 Sensors & Sensor Networks Sensor fundamental constraints 1.Sensors are anonymous 2.Modest non-renewable power 3.Sleep most of the time 4.Work unattended 5.Modest transmission range WSNs are multi-hop, limited no of sensors, and unknown topology

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 5 Information Assurance Network survivability Ability to function for a long period of time Information survivability Ability to have uninterrupted and secure access to information on network Network security Basic security services at network level Information security Secure information flow

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 6 System Longevity Appropriate sleep-wake schedules To save the energy Optimal workforce To provide results satisfying a number of quality of service requirements Topology and coverage control To enhance the effective functional lifetime of the network

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 7 Securing individual sensors Tampering/ Tamper resistance Trying to force open an individual sensor Blanking out memory, or Configuring the security service using frequency hopping and cryptographic keys. Physically removing sensors from the deployment area Establishing Signature Array (SA) of sensor’s neighborhood using signal strengths, immediately after deployment. If the sensor do not anymore receive the signals correspond with those in SA, then blank out memory

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 8 Assurance-aware Self-Organization A powerful multi-hop communication network capable of utilizing the limited resources of sensors in adaptive and efficient way Energy efficiency sensors need to sleep most of the time Adaptivity Virtual infrastructure adapts to network size, topology, density, and application requirement Multi-hop system Virtual infrastructure supports efficient multi-hop communication

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 9 Leader Election When sensor wakes up, it starts to listen for a beacon frame time period. If it has not received, that itself becomes a leader and start sending the “Beacon Packet” If it does, it then becomes a member of that cluster. T: sleeping period F: beacon frame length

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 10 Beacon Frame Beacon slot (B) – sending time of each beacon frame Collision slot (C) – reserved for member to report potential collision Wakeup slot (W) – reserved for member to wake up leaders Member slots (M) – for member to send messages to the cluster leader

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 11 Collision Resolution When a sensor receives some short beacon packets that are close to cause the collision problem, it sends a collision packet at its leader’s Collision slot and reset its listening timer. If a leader hears anything in its Collision slot, it selects another time to send its beacon packet.

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 12 Competing for slots A member randomly chooses a slot from “free” Member slots in the beacon frame and send a report packet twice (at Wakeup slot and at the chosen slot). The leader will confirm if the package arrive; otherwise, a member will choose another “free” a lot and resend the packet. If two members sent data on the same M-slot, the leader will receive no packet at that slot due to noises.

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 13 Maintaining the virtual infrastructure Every sensor needs to listen for a beacon frame once in a while Old leaders may fail and new leaders may show up When a leader dies, a part of network needs to be reorganized. Hence, leader reelection is triggered.

NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems 14 Conclusion We surveyed number of issues related to setting up the infrastructure that leveraged by information assurance Leader election, Beacon frame, Collision resolution, Competing for slots, Maintain the virtual infrastructure Research toward a solution is ongoing.