Chapter 12
Chapter 12
Outline
12.1 Introduction 12.2 Sensor Network Architecture 12.3 Data Dissemination 12.4 Data Gathering 12.5 MAC Protocols for Sensor Networks 12.6 Location Discovery 12.7 Quality of a Sensor Network 12.8 Evolving Standards 12.9 Other Issues
12.1 Introduction
Sensor networks are highly distributed networks of small, lightweight wireless node, deployed in large numbers to monitor the environment or system. Each node of the sensor networks consist of three subsystem:
Sensor subsystem: senses the environment Processing subsystem: performs local computations on the sensed data Communication subsystem: responsible for message exchange with neighboring sensor nodes
Using in nature
Forest fire, flood detection, habitat exploration of animals
Using in health
Monitor the patients heart rate or blood pressure, and sent regularly to alert the concerned doctor, provide patients a greater freedom of movement
Using in warehouse
Improve their inventory control system by installing sensors on the products to track their movement
Real-time communication over sensor networks must be supported through provision of guarantees on maximum delay, minimum bandwidth, or other QoS parameters. Provision must be made for secure communication over sensor networks, especially for military applications which carry sensitive data.
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
MAC protocol
During the data transmission phase, the distributed TDMA receiver oriented channel (DTROC) assignment MAC protocol is used. Two steps of DTROC :
Channel allocation : Each node is assigned a reception channel by the BS, and channel reuse is such that collisions are avoided. Channel scheduling : The node schedules transmission slots for all its neighbors and broadcasts the schedule. This enables collision-free transmission and saves energy, as nodes can turn off when they are not involved on a send/receive operation.
Routing protocol
Downlink from the BS is by direct broadcast on the control channel. Uplink from the sensor nodes to BS is by multi-hop data forwarding. The node to which a packet is to be forwarded is selected considering the remaining energy of the nodes. This achieves a higher network lifetime.
UNPF-R
Optimize the network performance by make the sensor nodes adaptively vary their transmission range. Because while a very small transmission range cause network partitioning, a very large transmission range reduce the spatial reuse of frequencies. The optimal range (R) is determined by simulated annealing
Objective function :
N : the total number of sensors n : the number of nodes in layer one : the energy consumption per packet d : the average packet delay
UNPF-R
If no packet is received by the BS from any sensor node for some interval of time, the transmission range increase by . Otherwise, the transmission range is either decrease by with probability 0.5 x ( n / N ), or increase by with probability [ 1 0.5 x ( n / N ) ]. If , then the transmission range R is adopt. Otherwise, R is modified to R with probability
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
P : the percentage of nodes which are cluster-heads r : the current round G : the set of nodes that has not been cluster-heads in the past 1/P rounds
After selection, the cluster-heads advertise their selection to all nodes. All nodes choose their nearest cluster-head by signal strength (RSSI). The cluster-heads then assign a TDMA schedule for their cluster members.
Steady phase : data transmission takes place based on the TDMA schedule, and the cluster-heads perform data aggregation/fusion. After a certain period of time in the steady phase, cluster-heads are selected again through the setup phase.
12.3.1 Flooding
Each node which receives a packet (queries/data) broadcasts it if the maximum hop-count of the packet is not reached and the node itself is not the destination of the packet. Disadvantages :
Implosion : this is the situation when duplicate messages are send to the same node. This occurs when a node receives copies of the same messages from many of its neighbors. Overlap : the same event may be sensed by more than one node due to overlapping regions of coverage. This results in their neighbors receiving duplicate reports of the same event. Resource blindness : the flooding protocol does not consider the available energy at the nodes and results in many redundant transmissions. Hence, it reduces the network lifetime.
12.3.2 Gossiping
Modified version of blooding The nodes do not broadcast a packet, but send it to a randomly selected neighbor. Avoid the problem of implosion It takes a long time for message to propagate throughout the network. It does not guarantee that all nodes of network will receive the message.
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
SAR minimizes the average weighted QoS metric over the lifetime of the network.
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
Query
Type = vehicle /* detect vehicle location interval = 1 s /* report every 1 second rect = [0,0,600,800] /* query addressed to sensors within the rectangle timestamp = 02:30:00 /* when the interest was originated expiresAt = 03:00:00 /* till when the sink retain interest in this data
Report
Type = vehicle /* type of intrusion seen instance = car /* particular instance of the type location = [200,250] /* location of node confidence = 0.80 /* confidence of match timestamp = 02:45:20 /* time of detection
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
t : constant n : loss exponent indicating the loss of power with distance from transmitter d(u,v) : the distance between u and v
Suppose the path between u (i.e. u0) and v (i.e. uk) is represented by r = (u0, u1, uk), each (ui, ui+1) is edge in G
The total power consumed for the transmission is
SMECN uses only the ME paths from G for data transmission, so that the overall energy consumed is minimized.
12.4.2 Power-Efficient Gathering for Sensor Information Systems PEGASIS based on the assumption that all sensor nodes know the location of every other node. Any node has the required transmission range to reach the BS in one hop, when it is selected as a leader. The goal of PEGASIS are as following
Minimize the distance over which each node transmit Minimize the broadcasting overhead Minimize the number of messages that need to be sent to the BS Distribute the energy consumption equally across all nodes
To construct a chain of sensor nodes, starting from the node farthest from the BS. At each step, the nearest neighbor which has not been visited is added to the chain. It is reconstructed when nodes die out.
At every node, data fusion or aggregation is carried out. A node which is designated as the leader finally transmits one message to the BS. Leadership is transferred in sequential order. The delay involved in messages reaching the BS is O(N)
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
12.5.1 Self-Organizing MAC for Sensor Networks and Eavesdrop and Register
Self-Organizing MAC for sensor (SMACS) networks and eavesdrop and register (EAR) are two protocols which handle network initialization and mobility support, respectively. In SMACS
neighbor discovery and channel assignment take place simultaneously in a completely distributed manner. A communication link between two nodes consists of a pair of time slots, at fixed frequency. This scheme requires synchronization only between communicating neighbors, in order to define the slots to be used for their communication. Power is conserved by turning off the transceiver during idle slots.
In EAR protocol
Enable seamless connection of nodes under mobile and stationary conditions. This protocol make use of certain mobile nodes, besides the existing stationary sensor nodes, to offer service to maintain connections. Mobile nodes eavesdrop on the control signals and maintain neighbor information.
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
A mathematical technique called multi-dimensional scaling (MDS), an O(n3) algorithm, is used to assign location to node such that the distance constraints are satisfied. To obtain the shortest distance between each pair of node. If the actual positions of any three nodes in the network are known, then the entire network can be normalize.
12.7.1 Coverage
Coverage is a measure of how well the network can observe or cover an event. The worst-case coverage defines area of breach, where coverage is the poorest. This can used to improve the deployment of network. The best-case coverage defines the areas of best coverage. A path along the areas of best coverage is called maximum support path or maximum exposure path. The coverage problem defined as follows:
A : a field with a set of sensors S : {s1, s2, , sn}, where for each sensor si in S (xi, yi) : location coordinate I : initial locations of an intruder traversing F: final locations of an intruder traversing
Worst-case
The problem is to identify PB, the maximal breach path from I to F. PB is defined as the locus of points p in the region A, where p is in PB if the distance from p to the closest sensor is maximized. Voronoi diagram : partitioning the plane into a set of convex polygon such that all points inside a polygon are closest to the site (sensor) enclosed by the polygon. The algorithm to find the breach path PB is:
Generate the Voronoi diagram Create a weighted graph, the weight of each edge in the graph is the minimum distance from all sensors in S. Determine the maximum cost path from I to F, using BFS.
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
Best-case
The problem is to identify PS, the maximum support path from I to F. Delaunay triangulation, which obtain from Voronoi diagram by connecting the sites whose polygons share a common edge. The algorithm to find the breach path PS is:
Generate the Voronoi diagram Generate the Delaunay triangulation Create a weighted graph, the weight of each edge in the graph is the line segment lengths. Determine the maximum cost path from I to F, using BFS.
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
12.7.2 Exposure
Exposure is defined as the expected ability of observing a target in the sensor field. The sensing power of a node s at point p is modeled as
The exposure during travel of an event along a path p(t) is defined by the exposure function
is the elemental arc length, and t1,t2 are the time instance between which the path is traversed. For conversion from Cartesian coordinates (x(t),y(t)),
In the simplest case of having one sensor node at (0,0) in a unit field, the breach path or minimum exposure path (MEP) from (-1,-1) to (1,1) .
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
It can also be proved that for a single sensor s in a polygonal field, with vertices v1,v2,..,vn, the MEP between two vertices vi and vj can be determined as follows. The edge (vi,vi+1) is tangent to the inscribed circle at ui. MEP = edge (vi,ui) + arc (ui,uj) + edge (uj,vj)
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
For the generic exposure problem of determining the MEP for randomly placed sensor node in the network, the network is tessellated with grid points To construct an n x n grid of order m, each side of a square is divided into m equal parts, creating (m+1) vertices on the edge. Determined the edge weights, and the MEP is defined as the shortest path by Dijkstras Algorithm.
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
In network level : The computation-communication trade-off determines how much local computation is to be performed at each node and what level of aggregated data should be communicated to neighbor node or BSs. Traffic distribution and topology management algorithms use the redundancy in the number of sensor nodes to use alternate routes so that energy consumption all over the network is nearly uniform.
12.9.2 Synchronization
Two major kinds of synchronization algorithms :
Long-lasting global synchronization , (for entire network lifetime) Short-lived synchronization, (only for an instant)
Synchronization protocols typically involve delay measurements of control packets. The delay experienced during a packet transmission can be split into four major components :
Send time : sender to construct message Access time : taken by the MAC layer to access the medium Propagation time : taken by the bit to be physically transmitted through the medium over the distance separating the sender and receiver Receive time : receiver receive the message from the channel
post facto
A low-power synchronization scheme The clocks of the nodes are normally unsynchronized When event is observed, a synchronization pulse( ) is broadcast by a beacon node Offer short-lived synchronization, creating only an instant of synchronization among the nodes which are within transmission range of the beacon node. The propagation delay of the synchronization pulse is assumed to be the same for all nodes.
Resynchronization
Dynamic network Take place in situations such as the merging of two partition due to mobility, where all clock in a partition may need to be updated to match the leader of the other partition.
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
Control frame
Transmit control information
Data frame
TDMA time slots contain data
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
A positive shift is defined as the transmission of a data packet at an absolute time later than slot in the current frame structure. A negative shift is defined as advancing the start of a superframe to transmit the data packet earlier than the start of transmission in the current frame structure.
Some data frame will be lost Buffer
But neighboring links may suffer collision when they follow different clock. Hence, as the resynchronization proceeds radially from the new leader, there is data loss along the head of the resynchronization wave.
Out-of-band synchronization
Separate control channel for sending claim and beacon packets Collision are reduced but the available bandwidth for data transmission is reduced The cost of the mobile nodes increase because of the need for an additional radio interface
In-band synchronization
"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
Pump
Disseminates data to all target nodes, perform flow control, and localizes loss by ensuring caching at intermediate nodes Hence, the errors on one link are corrected locally without propagating them down the entire path
Fetch
If receiver detect the loss of sequence numbers, it goes into fetch mode It requests a retransmission from neighbor nodes Many message losses are batched into a single fetch, which is especially suit for bursty losses.
Report
The farthest target node initiates its report on reverse path of data, and all intermediate nodes add their report Hence, PSFQ ensure that data segment are delivery to all intended receiver in a scalable and reliable manner
Required reliability :
The desired number of packets for the event to be successfully track
If observed reliability < required reliability ,ESRT increase report freq Otherwise, decrease the reporting freq for saving energy
12.9.4 Security
The Sybil attack
When a single node presents itself as multiple entities to the network. This can affect the fault tolerance of the network and mislead geographic routing algorithms.
Sinkhole attack
A node act as BS or a very favorable to the routing And do not forward any of messages it receive
Wormhole attack
Make the traffic through a very long path by giving false information to the node about the distance between them. Increase latency
A common initial key is loaded into each node before deployment. Each node obtain a master key by common key and unique ID. Nodes then exchange hello message, which authenticated by receiver. Compute the neighbors master key (by their ID and common key). Compute the shared key based on their master key. Clear the common key in all node after the establishment.
Since no one can get the common key, it is impossible to inject false data or decrypt the earlier exchange message. Also, no node can later forge the master key of any other node. In this way, pairwise shared key are generated between all immediate neighbors. The cluster key is established by a node after the pairwise key establishment. Then group key is established by cluster key.
INSENS has two phase: route discovery and data forwarding Route discovery phase:
BS send a request message to all node in the network by multi-hop Any node receiving a request, record the Id of sender. The nodes respond with their local topology by sending feedback The messages is protected using shared key mechanism. BS calculates forwarding table for all node
SNEP
Provide data authentication, protection from replay attack Semantic encrypted, the same message is encrypted differently at different instance in time Message integrity and confidentiality are maintained using a message authentication code (MAC)
mTESLA
The MAC keys are obtained from a chain of key and one-way function All nodes have an initial key K0, which is some key in the key-chain K0=F(K1), K1=F(K2),, Ki=F(Ki+1) , and given K0Ki it is impossible to compute Ki+1
SPEED
Provide real-time packet transmission Do not require routing table Distributes traffic and load equally across the network SPEED require periodic beacon transmission between neighbor Use two on-demand beacons for delay estimation and congestion detection. Routing of packets is performed by stateless non-deterministic geographic forwarding (SNGF). Using geographic information, packet are forwarded only to the nodes which are closer to the destination. Among the closer nodes, the ones which have least delay have a higher probability of being chosen. If there is no nodes that satisfy the delay constraint, the packet is dropped. And reduce the sending rate to avoid congestion, until the delay is below the average.
RAP
The application layer program in the BS can specify the kind of event information required, the area to which the query is address, and the deadline within which information is required. The underlying layers of RAP ensure that the query is sent to all nodes in the specified area, and results are sent back to the BS. Consist of location address protocol (LAP) , velocity monotonic scheduling (VMS) LAP use location to address nodes instead of IP. It supports three kind of communication: unicast, area multicast, area anycast. VMS is based on the concept of packet-requested velocity, which reflect both the timing and the distance constraint. The velocity of a packet is calculated as the ratio of the geographic distance between sender and receiver.