*** School of Information, Renmin University of China, China

Slides:



Advertisements
Similar presentations
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
Advertisements

Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
On Determining the Hamiltonicity of a graph from its all-pair-shortest-path matrix Shekh Ahammed Adnan Bashir Department of Computer Science and Engineering.
Scheduling Algorithms for Wireless Ad-Hoc Sensor Networks Department of Electrical Engineering California Institute of Technology. [Cedric Florens, Robert.
Connection Preemption in Multi-Class Networks Fahad Rafique Dogar Carnegie Mellon University, USA Collaborators: Laeeq Aslam and Zartash Uzmi (LUMS, Pakistan)
© Honglei Miao: Presentation in Ad-Hoc Network course (19) Minimal CDMA Recoding Strategies in Power-Controlled Ad-Hoc Wireless Networks Honglei.
CS541 Advanced Networking 1 Static Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/9/2009.
DAKNET Presented By: rreema.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad-hoc Networks
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
SOS: A Safe, Ordered, and Speedy Emergency Navigation Algorithm in Wireless Sensor Networks Andong Zhan ∗ †, Fan Wu ∗, Guihai Chen ∗ ∗ Shanghai Key Laboratory.
Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar.
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
HYBRID ROUTING PROTOCOL FOR VANET
Evgueni (Eugene) Khokhlov1 A Mobility-Centric Data Dissemination Algorithm for Vehicular Networks (MDDV) Evgueni (Eugene) Khokhlov.
Tonghong Li, Yuanzhen Li, and Jianxin Liao Department of Computer Science Technical University of Madrid, Spain Beijing University of Posts & Telecommunications.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Young-sam Kim / M.D Course School of Information Technology Dept. of Computer Engineering Korea University of Technology and Education Location Tracking.
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds Authors: Rasheed Hussain ∗, Fizza Abbas ∗, Junggab Son ∗,
How to Read Research Papers? Xiao Qin Department of Computer Science and Software Engineering Auburn University
Small-Scale and Large-Scale Routing in Vehicular Ad Hoc Networks Wenjing Wang 1, Fei Xie 2 and Mainak Chatterjee 1 1 School of Electrical Engineering and.
1 Deterministic Collision-Free Communication Despite Continuous Motion ALGOSENSORS 2009 Saira Viqar Jennifer L. Welch Parasol Lab, Department of CS&E TEXAS.
1 An Information Propagation Scheme for VANETs 學生: 簡志閔 彭彥能 黃尚文 Thomas D.C. Little, Senior Member, IEEE, and Ashish Agarwal,
Group 8: Denial Hess, Yun Zhang Project presentation.
Fall 2015 COMP 2300 Discrete Structures for Computation Donghyun (David) Kim Department of Mathematics and Physics North Carolina Central University 1.
TDMA Slot Reservation in Cluster-Based VANET Ph.D. Gathering By Mohammad S. Almalag Advisor Michele C. Weigle Department of Computer Science Old Dominion.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Topics Paths and Circuits (11.2) A B C D E F G.
UNIT 2 LESSON 6 CS PRINCIPLES. UNIT 2 LESSON 6 OBJECTIVES Students will be able to: Write an algorithm for solving the minimum spanning tree (MST) problem.
1 Covert Communication based Privacy Preservation in Mobile Vehicular Networks Rasheed Hussain*, Donghyun Kim**, Alade O. Tokuta**, Hayk M. Melikyan**,
UCLA ENGINEERING Computer Science RobustGeo: a Disruption-Tolerant Geo-routing Protocol Ruolin Fan, Yu-Ting Yu *, Mario Gerla UCLA, Los Angeles, CA, USA.
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
Artificial Intelligence Lecture No. 6 Dr. Asad Ali Safi ​ Assistant Professor, Department of Computer Science, COMSATS Institute of Information Technology.
Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central University 1 Chapter 7 Time Complexity Some slides are in courtesy.
Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh ( 謝坤穎 ) Dept. of Computer Science and Information Engineering National.
Wireless Ad Hoc Networks
David Stotts Computer Science Department UNC Chapel Hill.
Coverage and Scheduling in Wireless Sensor Networks Yong Hwan Kim Korea University of Technology and Education Laboratory of Intelligent.
1 Dynamic Speed and Sensor Rate Adjustment for Mobile Robotic Systems Ala’ Qadi, Steve Goddard University of Nebraska-Lincoln Computer Science and Engineering.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
4 Introduction Carrier-sensing Range Network Model Distributed Data Collection Simulation 6 Conclusion 2.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
Cost Effective Mobile and Static Road Side Unit Deployment for Vehicular Adhoc Networks Presenter: Yesenia Velasco (Senior in Computer Science) Department.
ParkNet: Drive-by Sensing of Road-Side Parking Statistics Irfan Ullah Department of Information and Communication Engineering Myongji university, Yongin,
Formal verification of distance vector routing protocols.
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
Abstract In this paper, the k-coverage problem is formulated as a decision problem, whose goal is to determine whether every point in the service area.
Extending wireless Ad-Hoc
Does Topology Control Reduce Interference?
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Secure Scheduling for Barrier Coverage
Introduction Secondary Users (SUs) Primary Users (PUs)
Analysis and design of algorithm
Wireless Ad Hoc Networks
The Coverage Problem in a Wireless Sensor Network
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
A Better Approximation for Minimum Total Routing Path Clustering Problem in 2-D Underwater Sensor Networks Wei Wang, Donghyun Kim, and Weili Wu, A Better.
Survey on Coverage Problems in Wireless Sensor Networks - 2
Strong Barrier Coverage of Wireless Sensor Networks Seung Oh Kang
Survey on Coverage Problems in Wireless Sensor Networks
Planning.
Presentation transcript:

*** School of Information, Renmin University of China, China Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search Donghyun Kim*, Junggab Son*, Wei Wang** , Deying Li***, Alade O. Tokuta*, Sunghyun Cho+ * Department of Mathematics and Physics, North Carolina Central University, Durham, NC, USA ** Schoo of Mathematics and Statistics, Xi'an Jiaotong University, Xi'an, China *** School of Information, Renmin University of China, China + Department of Computer Science and Engineering, Hanyang University, South Korea

Agenda Introduction Problem Formulation Abstraction of Metropolitan Area Topology Breach of Sensor Barriers Formal Definition of Problem Main Contribution – Polynomial Time Exact Algorithm Checking Integrity of a VANET Barrier Barrier-breach between Two VANET Barriers Scheduling Subsets for Breach-free Barrier Concluding Remarks

Image source: http://adrianlatorre.com/projects/pfc/img/vanet_full.jpg Introduction Vehicular Ad hoc NETwork (VANET) An adhoc network of highly mobile nodes, in particular vehicles travelling on the road Image source: http://adrianlatorre.com/projects/pfc/img/vanet_full.jpg

Introduction VANET applications Remote vehicle personalization and diagnostics Internet access Digital map downloading On-demand-basis real-time visual data collection Pics-on-wheel (POW): mobile cloud-based real-time street visual data collection system [2] Vehicle Witnesses as a Service (VWaaS): privacy enhanced version of POW [3] and many more.

Image source: http://humandrama.tistory.com/975 Introduction Q: Collecting Real-time Visual Images of Suspects Who Are Trying to Leave Area of Interest using VANET nodes? VANET nodes are expected to have visual sensors and wireless transceivers Image source: http://humandrama.tistory.com/975

Image source: http://ipvm.com/ Introduction People care their privacy Normally, reluctant to reveal their current locations and/or their future travel schedule Under urgent/emergent situation, e.g. Boston Bombing Previous experiences show many people may voluntarily disclose their locations and give up their privacy Image source: http://ipvm.com/

Introduction Still, the future trajectories of VANET nodes may not be controllable, but may provide their current locations and short-term future trajectories Asking all nodes to transmit real-time video would generate too much network traffic ? https://cleanenergydurham.wordpress.com/category/neighborhoods/trinity-park/

Agenda Introduction Problem Formulation Abstraction of Metropolitan Area Topology Breach of Sensor Barriers Formal Definition of Problem Main Contribution – Polynomial Time Exact Algorithm Checking Integrity of a VANET Barrier Barrier-breach between Two VANET Barriers Scheduling Subsets for Breach-free Barrier Concluding Remarks

Problem Formulation Problem Statement How to operate a subset of VANET nodes to provide (inside-out) barrier-coverage over an area of interest to detect fugitives leaving an area of interest during a given mission period Assume the area of interest is a huge metropolitan area, the mission period consists of a series of time slots, the travel schedule of each VANET node is known for next T time slots, each participating VANET node is with visual sensors and wireless connectivity to the central authority, and are either moving on the road and parked on a parking lot,

r (a) (b) Problem Formulation Abstraction of Metropolitan Area Topology Assume the shape of the map M of a metropolitan area is a rectangle Partition M into regular squares whose length and width are r Construct a topology graph G=(V, E) (a) (b) r

Problem Formulation Barrier coverage of a sensor network and breach [27]

(a) (b) (c) Problem Formulation Adoption of the Concept of Breach to Our Context (a) (b) (c)

(a) (b) Problem Formulation Seamless VANET barrier coverage problem (SVBCP) Given the location of each VANET node at each time slot in [0, T], find a VANET node operation schedule (a collection of subsets of nodes) which does not have two subsets at t-time slot and (t+1)-time slot, between which there exists a breach, and (b) the size of each subset does not exceed a network limit, b. (a) (b)

Problem Formulation Seamless VANET barrier coverage problem (SVBCP) Q: There might be more than one choice from one slot to the next slot – which one does not lead to the dead end?

Agenda Introduction Problem Formulation Abstraction of Metropolitan Area Topology Breach of Sensor Barriers Formal Definition of Problem Main Contribution – Polynomial Time Exact Algorithm Checking Integrity of a VANET Barrier Barrier-breach between Two VANET Barriers Scheduling Subsets for Breach-free Barrier Concluding Remarks

Main Contributions Three Key Questions Given a city map abstraction 𝐺=(𝑉,𝐸), the initial location 𝑝, and a subset of nodes 𝐵 𝑖 , the locations of participating VANET nodes at the 𝑖-th time slot, how to determine if 𝐵 𝑖 provides a (inside-out) barrier coverage over 𝐺 against 𝑝? Given 𝐺 and two barriers 𝐵 𝑖 and 𝐵 𝑖+1 , how to determine if there is no breach when 𝐵 𝑖 is replaced by 𝐵 𝑖+1 . How to design a polynomial time exact algorithm for SVBCP?

Checking Integrity of a VANET Barrier Given a city map abstraction 𝐺=(𝑉,𝐸), the initial location 𝑝, and a subset of nodes 𝐵 𝑖 , the locations of participating VANET nodes at the 𝑖-th time slot, how to determine if 𝐵 𝑖 provides a (inside-out) barrier coverage over 𝐺 against 𝑝? Step 1: modify 𝐺 to a directional graph Step 2: compute a path from 𝑝 to 𝑞 the existence of such path implies the existence of a covert path for the fugitive such that any incoming directional edge to a VANET node in 𝐵 𝑖 is removed

Barrier-breach between Two VANET Barriers In our context, a breach between two barriers is a node in 𝐺 such that used to reachable to 𝑝, but not reachable to 𝑞, but now, not reachable to 𝑝, but reachable to 𝑞 (outside the current barrier, and thus get to 𝑞 almost immeidately)

Scheduling Subsets for Breach-free Barrier For each i-th time slot find all possible configurations (a subset with size b) edge from one configuration at i-th time slot to another configuration at i+1 time slot find s-t path … … … … … …

Analysis Theorem 1 The proposed strategy solves the SVBCP correctly. The running time of the proposed algorithm is polynomial

Agenda Introduction Problem Formulation Abstraction of Metropolitan Area Topology Breach of Sensor Barriers Formal Definition of Problem Main Contribution – Polynomial Time Exact Algorithm Checking Integrity of a VANET Barrier Barrier-breach between Two VANET Barriers Scheduling Subsets for Breach-free Barrier Concluding Remarks

Concluding Remarks Proposed a polynomial exact algorithm for SVBCP Will Consider Smaller running time Less assumptions more sophisticated assumption for network bandwidth more practical VANET node mobility unpredictability