Sensor Coordination using Active Dataspaces Steven Cheung NSF NOSS PI Meeting October 18, 2004.

Slides:



Advertisements
Similar presentations
Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
Advertisements

Directed Diffusion for Wireless Sensor Networking
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Group #1: Protocols for Wireless Mobile Environments.
Introduction to Wireless Sensor Networks
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
1 Routing Techniques in Wireless Sensor networks: A Survey.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
A Data Fusion Approach for Power Saving in Wireless Sensor Networks Reporter : Chi-You Chen.
Naming in Wireless Sensor Networks. 2 Sensor Naming  Exploiting application-specific naming and in- network processing for building efficient scalable.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
Building Efficient Wireless Sensor Networks with Low-Level Naming Presented by Ke Liu CS552, Fall 2002 Binghamton University J. Heidemann, F. Silva, C.
Matching Data Dissemination Algorithms to Application Requirements John Heidermann, Fabio Silva, Deborah Estrin Presented by Cuong Le (CPSC538A)
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Applied Cryptography for Network Security
SensIT PI Meeting, April 17-20, Distributed Services for Self-Organizing Sensor Networks Alvin S. Lim Computer Science and Software Engineering.
Wireless Sensor Network Security Anuj Nagar CS 590.
ZigBee. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion Topics.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Sensor Networks Storage Sanket Totala Sudarshan Jagannathan.
NAME: NASIRAHMADPROGRAM: B.S TELECOMSEMESTER: 7THREG#: SU/ PRESENTED TO: ENGR. GUL ZAMEEN KHANDATE: UNIVERSITY: SARHAD UNIVERSITY.
Sensor Coordination using Role- based Programming Steven Cheung NSF NeTS NOSS Informational Meeting October 18, 2005.
Ch 1. Mobile Adaptive Computing Myungchul Kim
FI-WARE – Future Internet Core Platform FI-WARE Interface to Networks and Devices (I2ND) July 2011 High-level description.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Protocols for Self-Organization of a Wireless Sensor Network K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie IEEE Personal Comm., Oct Presented.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
A Framework for Energy- Saving Data Gathering Using Two-Phase Clustering in Wireless Sensor Networks Wook Chio, Prateek Shah, and Sajal K. Das Center for.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Ohio State University Department of Computer Science and Engineering 1 Cyberinfrastructure for Coastal Forecasting and Change Analysis Gagan Agrawal Hakan.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Routing and Data Dissemination. Outline Motivation and Challenges Basic Idea of Three Routing and Data Dissemination schemes in Sensor Networks Some Thoughts.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Cryptography and Network Security (CS435) Part One (Introduction)
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
High-integrity Sensor Networks Mani Srivastava UCLA.
A Survey on Sensor Networks Hussein Alzoubi Rami Alnamneh
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Collaborative Broadcasting and Compression in Cluster-based Wireless Sensor Networks Anh Tuan Hoang and Mehul Motani National University of Singapore Wireless.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
By: Gang Zhou Computer Science Department University of Virginia 1 Medians and Beyond: New Aggregation Techniques for Sensor Networks CS851 Seminar Presentation.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
MIT Lincoln Laboratory Dynamic Declarative Networking Exploiting Declarative Knowledge To Enable Energy Efficient Collaborative Sensing Daniel J. Van Hook.
Building Wireless Efficient Sensor Networks with Low-Level Naming J. Heihmann, F.Silva, C. Intanagonwiwat, R.Govindan, D. Estrin, D. Ganesan Presentation.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
On Efficient Clustering of Wireless Sensor Networks Mohamed Younis, Poonam Munshi, Gaurav Gupta, and Sameh M. Elsharkawy Dependability and Security in.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
In the name of God.
Overview of Wireless Networks:
Intrusion Tolerance for NEST
Data Dissemination and Management - Topics
Presentation transcript:

Sensor Coordination using Active Dataspaces Steven Cheung NSF NOSS PI Meeting October 18, 2004

Outline Motivation/Problem –Characteristics of sensor networksCharacteristics of sensor networks –Techniques for building sensor network applicationsTechniques for building sensor network applications –Why sensor network programming hard?Why sensor network programming hard? –Need: High-level programming abstractionNeed: High-level programming abstraction Our approach –Active dataspace (ADS)Active dataspace (ADS) –Features of ADSFeatures of ADS –Tuples on demandTuples on demand Example scenario –Vehicle detection: SetupVehicle detection: Setup –Event sequence: BootstrappingEvent sequence: Bootstrapping –Event sequence: Detection phaseEvent sequence: Detection phase

Characteristics of sensor networks Resource constraints –Energy reserve –Computation power –Memory Unpredictable communication links –Intermittent connectivity –Asymmetric links and radio directionality Node failure –Exposed to harsh environment and attacks –Battery depletion Possibly large number of nodes Possibly difficult deployment environment

Techniques for building sensor network applications General resource conservation –In-network processing –Localized algorithms –Hibernation (e.g., sentry service) Optimizations for key communication patterns –Tree-based aggregation scheme (many-1) –Firecracker protocol (1-many) Adaptive protocols –Protocols that adaptively optimize communication based on local information and feedback (e.g., directed diffusion and PARC’s CB-LRTA*) Exploiting redundancy and broadcast medium

Why sensor network programming hard? Hibernation Deploying new or additional sensors Intermittent end-to-end connectivity Scalability Locality Data aggregation Limited CPU power and memory Attacks Applications Sensor nodes

Need: High-level programming abstraction Applications Sensor nodes Focus of this project Hibernation Deploying new or additional sensors Intermittent end-to-end connectivity Scalability Locality Aggregation Optimizing CPU & memory use Security Naming

Active dataspace (ADS) ADS is an active data repository that provides associative operations for data access Inspired by the tuple space model [Gelernter 85], developed for parallel computing Every data tuple (or record) contains a list of fields Basic TS operations: –in is used to remove tuples from TS –rd to read tuples –out to create data tuples –eval to create “active” tuples

Features of ADS Data-centric model Time-uncoupling: Data consumers and producers do not need to be active at the same time Identity-uncoupling: Endpoints do not need to know each other’s identities Stable network paths between endpoints need not exist Virtual tuples support data generation on demand Tuple set operator and cardinality constraint to facilitate in-network aggregation Search constraint for specifying the scope and preferences for tuple selection to exploit locality

Tuples on demand Motivation: To enable sensor nodes to conserve energy and other resources during time intervals in which their work is not needed A virtual tuple represents the capability of a node to generate a certain type of tuple specified by the virtual tuple When a tuple request matches a virtual tuple, the corresponding node will be contacted to produce the data on demand Use of virtual tuple is transparent to data consumers

Vehicle detection: Setup Sensors deployed in a region for vehicle detection 2 types of sensor nodes Type 1 (Sensors A, B, and C) : –Low-cost to operate –less accurate –has a shorter range –cannot classify vehicles Type 2 (Sensor X): –Expensive to use –more accurate –have a longer range –can distinguish different classes of vehicles

Event sequence: Bootstrapping A B C X Sensors put virtual tuples in ADS, which represent their detection capabilities Sensor X hibernates Sensors A, B, & C take turn being active (i.e., the sentry) outv(type1,?,{A,B,C}) outv(type2,?,X)

Event sequence: Detection phase (1) A B C X outv(type1,?,{A,B,C}) outv(type2,?,X) 1.A detects a vehicle 2.A requests other type1 sensor data 3.ADS matches the request with B’s and C’s virtual tuples 4.B and C produce sensor reading tuples 5.A confirms detection with B’s and C’s input in(type1,?,≠A) out(type1,+ve) 2 3 4

Event sequence: Detection phase (2) A B C X outv(type1,?,{A,B,C}) outv(type2,?,X) 1.A requests type2 sensor data 2.ADS matches the request with X’s virtual tuple 3.X is awaken for vehicle detection in(type2,?,≠A) 2 1 3

Expected results High-level programming model and language to ease sensor network programming for a wide range of application domains Architecture and techniques to implement a resource-efficient, adaptive, and trustworthy ADS system