Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †

Slides:



Advertisements
Similar presentations
Scalable Content-Addressable Network Lintao Liu
Advertisements

Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
1 Routing Techniques in Wireless Sensor networks: A Survey.
BeamStar: A New Low-cost Data Routing Protocol for Wireless Sensor Networks Shiwen Mao and Y. Thomas Hou The Bradley Department of Electrical and Computer.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Small-world Overlay P2P Network
Haiyun Luo, Fan Ye, Jerry Cheng, Songwu Lu, Lixia Zhang
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Routing Protocols II.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Ad Hoc Wireless Routing COS 461: Computer Networks
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Fault-Tolerant Design for Mobile IPv6 Networks Jenn-Wei Lin and Ming-Feng Yang Graduate Institute of Applied Science and Engineering Fu Jen Catholic University.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Ubiquitous Networks WSN Routing Protocols Lynn Choi Korea University.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering POWER-SPEED A Power-Controlled Real-Time Data Transport Protocol for Wireless Sensor-Actuator.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Geographic Hash Table S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin and F. Yu.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
WEAR: A Balanced, Fault-Tolerant, Energy-Aware Routing Protocol for Wireless Sensor Networks Kewei Sha, Junzhao Du, and Weisong Shi Wayne State University.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
CarNet/Grid: Scalable Ad-Hoc Geographic Routing Robert Morris MIT / LCS
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfaq Khokhar ECE Department, University.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
A Load-Balanced Guiding Navigation Protocol in Wireless Sensor Networks Wen-Tsuen Chen Department of Computer Science National Tsing Hua University Po-Yu.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
Ben Miller.   A distributed algorithm is a type of parallel algorithm  They are designed to run on multiple interconnected processors  Separate parts.
Distributed Algorithms for Dynamic Coverage in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver.
EASE: An Energy-Efficient In-Network Storage Scheme for Object Tracking in Sensor Networks Jianliang Xu Department of Computer Science Hong Kong Baptist.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Structure-Free Data Aggregation in Sensor Networks.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
AUTO-ADAPTIVE MAC FOR ENERGY-EFfiCIENT BURST TRANSMISSIONS IN WIRELESS SENSOR NETWORKS Romain Kuntz, Antoine Gallais and Thomas No¨el IEEE WCNC 2011 Speaker.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Max do Val Machado Raquel A. F. Mini Antonio A. F. Loureiro DCC/UFMG DCC/PUC Minas DCC/UFMG IEEE ICC 2009 proceedings Advisor : Han-Chieh Chao Student.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
A Spatial-based Multi-resolution Data Dissemination Scheme for Wireless Sensor Networks Jian Chen, Udo Pooch Department of Computer Science Texas A&M University.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
Introduction to Wireless Sensor Networks
Sensor Network Routing
Overview: Chapter 3 Networking sensors
Presentation transcript:

Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker † Department of Computer Science, University of Denver † Department of Computer Science, Texas A&M University IEEE International Conference on Mobile Adhoc and Sensor Systems, MASS 2005 Shin-Wei Ho

Outline Introduction Related Works System Model And Assumptions The Protocol Experiments Conclusion

Introduction A wireless sensor node has limited resources runs on battery power has a very small memory space There is a need for an energy-efficient communication scheme to store and retrieve a vast amount of sensor data.

Introduction The networked sensor system The wireless sensors act as clients data sinks act as servers. The data sinks process the collected data and return feedback control data to the sensor nodes.

Introduction Data Sink

Introduction data storage and retrieval structure make the wireless sensing system fault- tolerant avoid the overhead of keeping routing tables The sensor system can be easily expanded by deploying new sensors and even adding new data sinks.

Related Works Directed Diffusion uses flooding of queries towards events and sets up reverse gradients for the best path designed for the single data sink scenario

Related Works Geographic Perimeter Stateless Routing its assumption that the locations of the sensor nodes are known to all nodes in the network

Related Works The authors designed a protocol based on ideas inspired by de Bruijn digraphs. De Bruijn Digraphs The de Bruijn digraph B(h, k) has vertex set V = {0, 1,..., h − 1} k There is an edge from vertex a = (a 1,..., a k ) to vertex b = (b 1,..., b k ) if and only if a i = b i +1 for all i in the range 1 ≤ i ≤ k − 1

Related Works Example: B(2, 2) Destination b = (b1,..., bk) Source a = (a1,..., aℓ, b1,..., bk−ℓ) Then the routing can be done by left- shifting the source address ℓ times.

System Model and Assumptions Wireless Sensor Network W(t, n) t replicated data sinks D = {d 1,..., d t } regularly deployed over the sensor field stationary n sensors S = {s 1,..., s n }. maintain neighbor information The unique identifiers (ID) are given to data sinks and every sensor node, such as MAC address.

The Protocol Initialization Routing Fault-Tolerance

The protocol -- Initialization The data sink servers start the initialization step by a dynamic address assignment procedure. Suppose that the data sink server i has h sensors within its one-hop radio range. The data sink server i assigns the h sensor nodes the addresses (i, 0), (i, 1),..., (i, h − 1).

The protocol -- Initialization Data sink i (i, 0) (i, 1) (i, 2) (i, 3) (i, 4) Data sink j (j, 0) If s already has a valid address of length ℓ, then it keeps it as an alias address. (i, 1, 0) (i, 2, 0) If s has a valid address of length ℓ′ > ℓ, then it deletes all its address aliases and keeps it as a new address. And it once again assigns each one-hop neighbor, except j. If s has a valid address of length ℓ′ > ℓ, then it deletes all its address aliases and keeps it as a new address. And it once again assigns each one-hop neighbor, except j. (i, 1, 1)

The protocol -- Initialization In this way, every sensor node that is reachable from a data sink will receive at least one address. The number of address aliases of a sensor node does not exceed the number of its one-hop neighbors. A sensor node informs its one-hop neighbors about its address aliases.

The protocol -- Initialization This simple address assignment scheme has some remarkable properties: If a sensor node has an address alias (a 1, a 2,..., a ℓ ), then there is a path of ℓ−1 hops to the data sink a 1, and there is no shorter path to a 1. This assignment scheme realizes the partitioning into cells.

The protocol -- Initialization If a sensor node s has address (a1, a2,..., aℓ−1, aℓ), then there exists a node p with address (a1, a2,..., aℓ−1). p is a predecessor of s, and s a successor of p. The associates of s are all one-hop neighbors of s that are neither predecessors nor successors.

The protocol -- Routing To Sink message From Sink Message Peer message

The protocol -- Routing To sink message randomly selecting one predecessor; this is done by right-shifting one randomly selected address alias. One possible path from the address (a 1,..., a ℓ ) is through the predecessors (a 1,..., a ℓ−1 ), (a 1,..., a ℓ−2 ),..., (a 1, a 2 ) to the data sink a 1.

The protocol -- Routing 131=130 wants to send a toSink message to a data sink. 131->13->1 310->31->3

The protocol -- Routing From sink message sending the message from the data sink to its successors each sensor node receiving such a message forwards it to all its successors

The protocol -- Routing Peer message forwards it to the one-hop neighbor that has an address alias with the longest common prefix If several one-hop neighbors qualify, then the one with the shortest address alias is chosen.

The protocol -- Routing 110 wants to send peer message to node >11->200->210

The protocol -- Routing 130 wants to send peer message to node >13->1->12 ->20->2->21->210

The protocol -- Routing The protocol makes typically multiple paths available while routing from sensor node to a data sink. ensure that the selected route is optimal A node simply needs to keep the address aliases of itself and of its one-hop neighbor

The protocol -- Fault-Tolerance If a sensor node or a data sink fails, then this can be easily detected by a simple acknowledgment scheme. Therefore, the authors assume that the one-hop neighbors of a failed node s become aware of the failure of s within a short amount of time.

The protocol -- Fault-Tolerance Sensor Node Failure A predecessor of s informs the data sink that the node s has failed. All associates of s delete the address aliases that belong to s from their lists. All successors of s make their address aliases invalid that have an address alias of s as a prefix, and they send a nodeFail(s) message to their successors.

The protocol -- Fault-Tolerance

Data Sink Failure

The protocol -- Fault-Tolerance

Experiments

Conclusion The authors proposed an energy-efficient communication protocol for data storage and retrieval in a wireless sensor network. achieves resilience against sensor node and data sink failures does not require any location information avoid the overhead of keeping routing tables to the memory constraints of sensor nodes

Thank you!