Data-Driven Processing in Sensor Networks Adam Silberstein, Rebecca Braynard, Gregory Filpus, Gavino Puggioni, Alan Gelfand, Kamesh Munagala, Jun Yang.

Slides:



Advertisements
Similar presentations
Data and Computer Communications
Advertisements

Cryptography and Data Security: Long-Term Challenges Burt Kaliski, RSA Security Northeastern University CCIS Mini Symposium on Information Security November.
Towards a Sensor Network Architecture: Lowering the Waistline Culler et.al. UCB.
Approaches to EJB Replication. Overview J2EE architecture –EJB, components, services Replication –Clustering, container, application Conclusions –Advantages.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Information Dissemination in Highly Dynamic Graphs Regina O’Dell Roger Wattenhofer.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
SIGMOD 2006University of Alberta1 Approximately Detecting Duplicates for Streaming Data using Stable Bloom Filters Presented by Fan Deng Joint work with.
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Approximating Sensor Network Queries Using In-Network Summaries Alexandra Meliou Carlos Guestrin Joseph Hellerstein.
Distributed Regression: an Efficient Framework for Modeling Sensor Network Data Carlos Guestrin Peter Bodik Romain Thibaux Mark Paskin Samuel Madden.
1 On Handling QoS Traffic in Wireless Sensor Networks 吳勇慶.
Security Issues In Sensor Networks By Priya Palanivelu.
Tributaries and Deltas: Efficient and Robust Aggregation in Sensor Network Streams Amit Manjhi, Suman Nath, Phillip B. Gibbons Carnegie Mellon University.
Approximate data collection in sensor networks the appeal of probabilistic models David Chu Amol Deshpande Joe Hellerstein Wei Hong ICDE 2006 Atlanta,
Exploiting Correlated Attributes in Acquisitional Query Processing Amol Deshpande University of Maryland Joint work with Carlos Sam
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Many-to-Many Aggregation for Sensor Networks Adam Silberstein and Jun Yang Duke University 6/25/20151.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Model-Driven Data Acquisition in Sensor Networks - Amol Deshpande et al., VLDB ‘04 Jisu Oh March 20, 2006 CS 580S Paper Presentation.
1 Securing Information Transmission by Redundancy Jun LiPeter ReiherGerald Popek Computer Science Department UCLA NISS Conference October 21, 1999.
A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks Adam Silberstein Rebecca Braynard Carla Ellis Kamesh Munagala Jun Yang Duke University.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Winter Retreat Connecting the Dots: Using Runtime Paths for Macro Analysis Mike Chen, Emre Kıcıman, Anthony Accardi, Armando Fox, Eric Brewer
SIGMOD'061 Energy-Efficient Monitoring of Extreme Values in Sensor Networks Adam Silberstein Kamesh Munagala Jun Yang Duke University.
Collecting Correlated Information from a Sensor Network Micah Adler University of Massachusetts, Amherst.
Dynamic control of sensor networks with inferential ecosystem models Jim Clark, Environm, Biol, Stat Pankaj Agarwal, Comp Sci David Bell, Environment Carla.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Routing and Network Design: Algorithmic Issues Kamesh Munagala Duke University.
J.H.Saltzer, D.P.Reed, C.C.Clark End-to-End Arguments in System Design Reading Group 19/11/03 Torsten Ackemann.
CS3502: Data and Computer Networks Local Area Networks - 4 Bridges / LAN internetworks.
Let’s ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking Zhenkai Zhu Alexander Afanasyev (presenter) Tuesday, October 8,
Multi-Resolution Spatial and Temporal Coding in a Wireless Sensor Network for Long-Term Monitoring Applications You-Chiun Wang, Member, IEEE, Yao-Yu Hsieh,
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
CP Summer School Modelling for Constraint Programming Barbara Smith 2. Implied Constraints, Optimization, Dominance Rules.
Computer Networks Group Universität Paderborn TANDEM project meeting Protocols, oversimplification, and cooperation or: Putting wireless back into WSNs.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Energy-Efficient Monitoring of Extreme Values in Sensor Networks Loo, Kin Kong 10 May, 2007.
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
An approach to dynamic control of sensor networks with inferential ecosystem models James S. Clark, Pankaj Agarwal, David Bell, Carla Ellis, Paul Flikkema,
November 17, 2015Department of Computer Sciences, UT Austin1 SDIMS: A Scalable Distributed Information Management System Praveen Yalagandula Mike Dahlin.
1 Sniper Detection Using Wireless Sensor Networks Joe Brassard Wing Siu EE-194WIR: Wireless Sensor Networks Presentation #3: March 17, 2005.
Data-Driven Processing In Sensor Networks Jun Yang Duke University January 16, 2007.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Analyzing wireless sensor network data under suppression and failure in transmission Alan E. Gelfand Institute of Statistics and Decision Sciences Duke.
IEEE j Relay-Based Wireless Access Networks VASKEN GENC, SEAN MURPHY, YANG YU, AND JOHN MURPHY, UNIVERSITY COLLEGE DUBLIN SCHOOL OF COMPUTER SCIENCE.
DISTIN: Distributed Inference and Optimization in WSNs A Message-Passing Perspective SCOM Team
1 Compression and Storage Schemes in a Sensor Network with Spatial and Temporal Coding Techniques You-Chiun Wang, Yao-Yu Hsieh, and Yu-Chee Tseng IEEE.
By: Gang Zhou Computer Science Department University of Virginia 1 Medians and Beyond: New Aggregation Techniques for Sensor Networks CS851 Seminar Presentation.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Repeated Game Modeling of Multicast Overlays Mike Afergan (MIT CSAIL/Akamai) Rahul Sami (University of Michigan) April 25, 2006.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
1 Constraint-Chaining: On Energy -Efficient Continuous Monitoring in Sensor Networks Adam Silberstein Rebecca Braynard Jun Yang Duke University.
Masking Failures Using Anti Entropy and Redundant Independent Paths Rebecca Braynard and Amin Vahdat Internet Systems and Storage Group Duke University.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Energy-Efficient Protocol for Cooperative Networks.
MAC Protocols for Sensor Networks
SPIN: Sensor Protocols for Information via Negotiation
Yong Yao Johannes Gehrke Jie Li Nov. 20, 2008 CS662 Paper Presentation.
Delay-Tolerant Networks (DTNs)
Introduction to Wireless Sensor Networks
Peer-to-peer networking
Data Collection and Dissemination
Net 435: Wireless sensor network (WSN)
Kevin Lee & Adam Piechowicz 10/10/2009
Data Collection and Dissemination
ACHIEVEMENT DESCRIPTION
Presentation transcript:

Data-Driven Processing in Sensor Networks Adam Silberstein, Rebecca Braynard, Gregory Filpus, Gavino Puggioni, Alan Gelfand, Kamesh Munagala, Jun Yang Duke University

Forest Monitoring

Data Acquisition Goal: Understand forest growth One query: continuous SELECT * –Not amenable to in-network aggregation Existing solutions –Continuous reporting Too much radio transmission –Model-driven acquisition [Deshpande et al. VLDB 04] Do not initially have a model we trust to substitute for the actual data

Data-Driven Approach Insight: Use models, but don’t count on them –E.g., use models to optimize data collection, but not at the expense of correctness Model quality Better Worse Efficiency Correctness

Outline Issues in data-driven processing –In-network suppression based on models –Coping with failure –App./comm. layer interaction Goals for this talk –Introduce basic data-driven techniques –Expose the trade-offs we can control in a principled way

Suppression Scheme Scheme = graph of suppression links Each is an agreement between an updater and an observer to synch a set of values over time –Function f enc at updater dictates what, if any, report is sent –Function f dec at observer specifies how to update values with each report (or lack thereof) if (|x t — x t’ | >  ): transmit r t à x t — x t’ x t’ à x t # else report suppressed Root (observer) if r t received: x * t à x * t-1 + r t else: x * t à x * t-1 f enc f dec Node (updater) rtrt E.g: value-based temporal suppression: a link between each node and root syncs time series of x t (value) and x* t (copy) such that |x t – x* t | · 

Failure Failure adds ambiguity to suppression –Is missing report a suppression or failure? How can we cope with failure? System-level: e.g., re-transmit Application-level: e.g., add redundancy for temporal suppression –Counter : append report number –Timestamp : append last n report times –History : append last n report times+readings

An Observation Goal of suppression was to remove redundancy If we now add redundancy back in, what is the point of suppression? Naturally-occurring redundancy No control of cost-reliability tradeoff Explicit redundancy Possible control of cost-reliability tradeoff vs.

Failure Example Temporal suppression with  = 0.3 {x 1, x 2, x 3, x 4 } = {–2.5, –3.5, –3.7, –2.7} Root receives {–2.5, ?, ?, –2.7} x2x2 x3x3 ??? x2x2 x3x3 x2x2 x3x3 x2x2 x3x3 x2x2 Model-based reconstruction: root assumes data is from a known AR(1) Just data No knowledge of suppression Knowledge of suppression + Timestamp redundancy x 3 2 [x 2 – 0.3, x ] x 2 2 [-3.0, -2.2]

Limiting reliance on models When publishing sensor data Don’t just publish results of model- based reconstruction –Incorrect model will lead to wrong results Publish actual data received AND publish suppression schemes –Translate to hard bounds on missing data –Suppression can be model-based, but here incorrect model won’t lead to wrong data

Coordinating Efforts System-level Application-level Lower cost Better failure coping OverkillReasonableInsufficient

App./Comm. Interaction Applications want more control over communication –Benefit: reduced message size & number –Cost: more restrictive routes, & more vulnerability to intermediate node failures Milestone optimization framework –Set milestone nodes where messages must go through (and converge) –Comm. layer has freedom routing between

Milestones No milestones (e.g. only node-to-root messages) All milestones (i.e. compile- time fixed routing tree) ? ? ? More milestones More application control/opt. opportunities Less communication flexibility

Conclusion Data-driven processing for continuous data collection –With the data as ground truth –Without continuous transmission Techniques & issues –Model-based suppression –Coping with failure –Managing interaction between app./comm. Take-away points –Use models in a controlled way –Expose tradeoffs to enable flexible design

Suppression & Models Soil Moisture Model How do we incorporate into suppression schemes? Model: x t =  t x t-1 +  t Synchronize: X = {x t,  t,  t }; X * = {x * t,  * t,  * t } f enc : Choose from (1) suppress, (2) parameter update, (3) value update f dec : Choose from (1) make prediction, (2) update model & make prediction, (3) store outlier Exponential Regression

Conch SS Root f dec f enc f dec

Sample SS Graph h functions produce outgoing X vectors h’s define dependencies between suppression links

Redundancy Naturally-occurring redundancy –Single node transmitting same/correlated readings repeatedly over time –Multiple nodes transmitting same/correlated readings at same time –No Control! Explicit Redundancy –Trade-off redundancy, energy cost –Separately tune redundancy level in each part of network

Trade-off Whatever failure-coping strategy is used, coordinate effort between layers