introduction to sensor networks

32
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University http://rabieramadan.org [email protected] 3

Upload: dyami

Post on 20-Jan-2016

18 views

Category:

Documents


0 download

DESCRIPTION

Introduction to Sensor Networks. Rabie A. Ramadan, PhD Cairo University http://rabieramadan.org [email protected] 3. Virtual grid architecture routing. Utilizes data aggregation and in-network processing to maximize the network lifetime - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Introduction to Sensor Networks

Introduction to Sensor Networks

Rabie A. Ramadan, PhDCairo University

http://rabieramadan.org

[email protected]

3

Page 2: Introduction to Sensor Networks

Virtual grid architecture routing Utilizes data aggregation and in-network

processing to maximize the network lifetime

Inside each zone, a node is optimally selected to act as CH.

Data aggregation is performed at two levels:• Local: the set of CHs performing local

aggregation• Global: the selection of global

aggregation points is NP-hard Strategies for the selection of MAs:

• Exact alg: ILP• Approximate algs: genetics-based, k-

means, greedy-based

Page 3: Introduction to Sensor Networks

Localization Techniques in WSNs

3

Page 4: Introduction to Sensor Networks

Why do I need localization ?

In sensor networks, nodes are deployed without priori knowledge about their locations.

Estimating spatial-coordinates of the node is referred to as localization.

4

Page 5: Introduction to Sensor Networks

LocalizationGPS

Global Positioning System (GPS) is an immediate solution.

There some factors against the usage of GPS:• GPS can work only outdoors.• GPS receivers are too expensive to unsuitable for

wide-range deployment. • It cannot work in the presence of obstructions.

Page 6: Introduction to Sensor Networks

Classifications of Localization Methods

Centralized vs Distributed Anchor-free vs Anchor-based Range-free vs Range-based Mobile vs Stationary

Page 7: Introduction to Sensor Networks

Centralized versus Distributed Localization Algorithms

In centralized algorithms,• nodes send data to a central location where

computation is performed and the location of each node is determined and sent back to the nodes.

Drawbacks • high communication costs • intrinsic delay

7

Page 8: Introduction to Sensor Networks

Centralized versus Distributed Localization Algorithms

In distributed algorithms,• each node determines its location by

communication with its neighboring nodes • robust and energy efficient

Drawback• Can be more complex to implement • At times may not be possible due to the limited

computational capabilities of sensor nodes

8

Page 9: Introduction to Sensor Networks

Anchor-Free vs Anchor-Based Anchor Nodes:

• Nodes that know their coordinates a priori • By use of GPS or manual placement• For 2D three and 3D four anchor nodes are needed

Anchor-free• Relative coordinates

Anchor-based• Use anchor nodes to calculate global coordinates

Page 10: Introduction to Sensor Networks

Range-Free vs Range-Based Range-Free

• Range-free techniques use connectivity information between neighboring nodes to estimate the nodes‟ position

• Local Techniques• Hop-Counting Techniques

Range-Based• Received Signal Strength Indicator (RSSI)

• Attenuation• RF signal

• Time of Arrival (ToA) • time of flight

• Time Difference of Arrival (TDoA)• requires time synchronization• electromagnetic (light, RF, microwave)• sound (acoustic, ultrasound)

• Angle of Arrival (AoA)• RF signal

Page 11: Introduction to Sensor Networks

Range-Based Techniques

Time of Arrival• All sensors transmit a signal with a predefined

velocity to their neighbors. • Then, the nodes each send a signal back to their

neighbors• by using the transmission and received times each

node estimates its distance to its neighbor

11

Page 12: Introduction to Sensor Networks

Range-Based Techniques

Received Signal Strength Indicator (RSSI) • The amount of power present in a received radio

signal. • Due to radio-propagation pathloss, received signal

strength (RSS) decreases as the distance of the radio propagation increases.

• The distance between two sensor nodes can be compared using the RSS value at the receiver, assuming that the transmission power at the sender is either fixed or known

12

Page 13: Introduction to Sensor Networks

Range-Based Techniques

TDOA (Time Difference of Arrival)• Transmit both radio and ultrasonic signals at the

same time to observe the arrival time difference.• Extra hardware, i.e., ultrasonic channel, is

required• Not only radio but also sound signals have

multipath effects affected by humidity, temperature, …

13

Page 14: Introduction to Sensor Networks

Range-Based Techniques

Angle of Arrival (AoA) • Gather data using either radio or microphone arrays.• Allow a receiving node determines the direction of a

transmitting node.• A single transmitted signal is heard by several spatially

separated microphones. • The phase or time difference between the signal‟s

arrival at different microphones is calculated and thus the AoA of the signal is found.

• Requires directional antennae

14

Page 15: Introduction to Sensor Networks

Anchor‐Based versus Anchor‐Free Localization Techniques

Anchor-based methods• Anchor nodes have GPS;• Other nodes derive their locations by trilateration.

Anchor-free methods.• Connectivity only;• Distance estimation for all communication links.• Node locations that reflect the position of the sensor

nodes relative to each other

15

Page 16: Introduction to Sensor Networks

Proximity base localization

Trilateration / Multilateration technique• Proximity based localization:

• Some nodes which can know their position through some technique (ex. GPS) broadcast their position information.

• Other nodes listen to these broadcast messages and calculate their own position.

• A simple method would be to calculate its position as the centroid of all the positions it has obtained.

• This method leads to accumulation of localization error.

Page 17: Introduction to Sensor Networks

5.LocalizationTrilateration Example

Trilateration• A is 5m from B• A is 10m from C• A is 8m from D

B

C

D

A

Page 18: Introduction to Sensor Networks

Range-Free Localization

DV-HOP• Similar to classical distance vector routing.• An anchor broadcasts a beacon to be flooded in the

area.

Page 19: Introduction to Sensor Networks

DV-Hop propagation method Each node maintains a table {Xi ,Yi ,hi} Updates only with its neighbors. Each landmark {Xi ,Yi}

• Computes a correction• And floods it into the network

Each node • Uses the correction from the closest landmark• Multiply its hop distance by the correction

jjih

YYXXc

i

jiji

i landmarks all , ,)()( 22

Page 20: Introduction to Sensor Networks

Corrections computed by the landmarksc1 c2 c3

Assume A gets its correction from L2

Its estimate distances to the three landmarks• To L1: 3×16.42• To L2: 2×16.42• To L3: 3×16.42

3 Hop

3 Hop2 Hop

L1L2: 2 hopL1L3: 6 hopL2L3: 5 hop

jjih

YYXXc

i

jiji

i landmarks all , ,)()( 22

Page 21: Introduction to Sensor Networks

Range-Free Localization

DV-hop • Advantages

• Simplicity• Dose not depend on measurement error

• Disadvantage• Only work for isotropic networks

Page 22: Introduction to Sensor Networks

APIT Overview

Anchors• Nodes equipped with high-

powered transmitter• Location information

obtained from GPS or other mechanism

Location estimation by isolating the environment into triangular regions between anchors

Page 23: Introduction to Sensor Networks

Location verification – SerLoc (Secure Range-independent

localization)

23

Page 24: Introduction to Sensor Networks

What is location verification?

Different assumptions from general localization• What if some malicious nodes lie about their location?• Sample attack scenario

• Claim to be very close to the sink• Attract many packets• Drop some or all of them• Very easy DoS attack especially for geographic routing protocols

Page 25: Introduction to Sensor Networks

25

• Secure Verification of Location Claims

[Sastry et al. WISE 2002].• Location Privacy

Privacy-aware Location Sensor Networks [Gruteser et al. USENIX 2003].

• Secure Localization: Ensure robust location estimation even in the presence of adversaries.

SeRLoc: [Lazos and Poovendran, WISE 2004].

S-GPS: [Kuhn 2004].

SPINE: [Capkun & Hubeaux, Infocom 2005].

Secure Location Services

Page 26: Introduction to Sensor Networks

26

• SeRLoc: SEcure Range-independent

LOCalization.

• SeRLoc features

• Passive Localization.

• No ranging hardware required.

• Decentralized Implementation, Scalable.

• Robust against attacks - Lightweight

security.

SeRLoc

Page 27: Introduction to Sensor Networks

27

Locators: Randomly deployed Known Location, OrientationDirectional Antennas

(X1, Y1)

(X3, Y3)

(X4, Y4)

(X5, Y5)

(X2, Y2)

N

S

EW

Two-tier network architectureSensors: Randomly deployed, unknown location

r

R

Locator range R

Beamwidth θ

θ

Omnidirectional AntennasSensor range r

Locator Sensor

Page 28: Introduction to Sensor Networks

28

Locator Sensor

L1

L4

L3

(0, 0)

s

L3

ROI

The Idea of SeRLoc

• Each locator Li transmits

information that defines the

sector Si, covered by each

transmission.

• Sensor defines the region of

intersection (ROI) from all

locators it hears.

sLH

iiSROI

1

Page 29: Introduction to Sensor Networks

How SerLoc works Node i claims its location is (x, y) Node i needs to send (x, y) a location verification request

msg to a nearby verifier• A verifier can be a normal sensor node

The verifier sends a random nonce to node i and start the clock

Node i has to immediately return the challenge through both radio and ultrasonic channels

The verifier measures the time for node i returning the challenge and take the difference between the radio & ultrasonic signal propagation. Based on this observation, verify the claimed location

Page 30: Introduction to Sensor Networks

Weakness of SerLoc

Requires extra hardware, i.e., ultrasonic channel Innocent victims may respond late due to backlog Not location verification but range verification

Verifier

M’s RealLocation

M’s claimedLocation

sink

Oops... Verifier cannot tellthe difference! Big trouble...

Page 31: Introduction to Sensor Networks

Possible Research Issues

Most localization work is mathematical and evaluated via (high level) simulations• More realistic work is needed

Indoor localization is harder• Look at CodeBlue project at Harvard

Location verification• Can’t trust sensors

Secure localization• Can’t trust anchors

Page 32: Introduction to Sensor Networks

Next time Security in WSN

32