Download [slides] Sensor network applications

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Drift plus penalty wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Peering wikipedia , lookup

Deep packet inspection wikipedia , lookup

IEEE 1355 wikipedia , lookup

CAN bus wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Backpressure routing wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Airborne Networking wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Peer-to-peer wikipedia , lookup

Kademlia wikipedia , lookup

Dijkstra's algorithm wikipedia , lookup

Routing wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Routing in Sensor Networks
Why Routing?
– Routing means carrying data packets from a source node to a
destination node (usually called sinks in sensor networks
terminology)
– Such routing paths helps to create energy-efficient data
dissemination paths between sources (sensors) and sinks (global
processing unit or human interface devices)
– Two kinds of routing: single-path and multi-path
– Since energy efficiency is the most essential factor, routing
algorithms must be robust to failures and secure against the
compromised and malicious nodes to ensure data delivery without
impacting the lifetime of the network
Algorithm for Robust Routing in Volatile
Environments (ARRIVE)
[Karlof+, 2002]
–
Probabilistic algorithm and makes packet forwarding decisions based on
localized information
–
Based on a tree-like topology rooted at the sink of the network
–
Uses forward approach to contribute to end-to-end reliability
–
Avoids packet loss by sending multiple packets of the single event
–
Three sources of packets loss expected:

Isolated link

Patterned node failures

Malicious or misbehaving nodes
ARRIVE
[Karlof+, 2002]
Terminology
–
Event: Identified by [SourceID, EventID]
–
Level: Each node has unique level indicating distance from source to sink (in terms
of hops)
–
Parents: Nodes one level closer to the sink
–
Neighbors: Nodes on the same level and be able hear each other
–
Push: Push packet to one of the neighbors
–
Forward: Forward packet to one of the parents
–
Forwarding Probability: Included in the packet header and used to probabilistically
select whether to push or forward
–
Reputation History: Each node keeps this information for each of its parents and
neighbors
–
Convergence: Prevents multiple packets of the same event being sent to same
source of failure
ARRIVE
[Karlof+, 2002]
–
Achieves diversity in paths in two ways:

Upon receiving a packet, the next hop is selected probabilistically
based on link reliability and node reputation

When more than two or more packets of the same event are
processed, these packets are ensured to follow different outgoing links
–
Takes advantage of passive participation and needs to be used cautiously
–
Each nodes keeps the following information:

Level

Neighbors list

Parents list

Reputation history of neighbors and parents

Convergence history of specific events
ARRIVE
[Karlof+, 2002]
Assumptions
–
The networks is assumed to be dense enough that sufficient multiplicity of paths
between sources and sink for algorithm to perform well
–
The network is almost considered as a static network
–
Sensors are considered to have a low per-node cost
–
Routes used by the packets are unlikely to be optimal due to the probabilistic nature
of the algorithm
–
Messages flow from nodes to sink, not the other way around
–
There is only one sink available
Performance Metrics
–
Event delivery ratio
–
Three other metrics measuring the cost of deploying ARRIVE
ARRIVE
[Karlof+, 2002]
Algorithm Description
–
Bread first search rooted at sink is used to initialize level, parents, neighbors state
information at each node
–
When a nodes hears a packets, it checks to see if the packet is addressed for it
–
If so, threshold processing takes place. Nodes are filtered by their reputation and
convergence history of the neighbors and parents
–
A decision needs to be made to either to choose to forward the packet to a parent or
push it to one of its neighbors with the probability value found in the packet header.
This is randomly determined by the forwarding probability function Pr(f).
–
Each node is weighed by their reputation. The destination is randomly selected from
the rest of the nodes (since bad reputation nodes are eliminated)
–
If the the packet is forwarded to one of the parents, Pr(f) is not changed; however, its
value is increased
Algorithm for Robust Routing in Volatile
Environments (ARRIVE) [Karlof+, 2002]
Figure 0: Overview of ARRIVE
Adapted from [Karlof+ 2002]
ARRIVE
[Karlof+, 2002]
Advantages:
–
High end-to-end reliability
–
Provides security by eliminating the compromised or malicious nodes
–
By using multiple paths to forward the same event, the probability of the
event reaching sink is increased and this also ensures to avoid packets
being forwarded to the same broken link
–
Reputation history assists in establishing a reliable path
ARRIVE
[Karlof+, 2002]
Disadvantages:
–
Extra power consumption for inactive nodes (passive listeners) are not
considered
–
Better mechanism to take care problems caused by passive listening
–
There is only one sink, packets are sent from sources to sink and not the
other way around
–
Sensor may have storage problems due to maintaining information
about its neighbors and parents (reputation history)
–
Maintaining multiple paths requires more resources
ARRIVE
[Karlof+, 2002]
Suggestions/Improvements/Future Work:
–
Beneficial to measure how much passive listening affects energy use
–
Nodes can be mobile during the simulation instead of static
–
If there is a significant mobility, state information should be updated using a
better mechanism than flooding
–
Explanation of how multiple packets are generated
–
How much redundant data is sufficient to optimize the network
–
Energy-awareness needs to be taken into consideration
–
Possibly use energy level parameter in the decision making
–
Include probabilistic analysis of the algorithm
–
Study the tradeoff the communication cost of ARRIVE vs. its robustness
–
Consider load balancing issues such that nodes near the sink deplete their
resources sooner than nodes farther away
–
Lack of quantitative analysis of passive participation for security reasons
–
Experiment with larger number of events
Rumor Routing Algorithm for Sensor Networks
[Braginsky+ 2002]
Preliminaries
Each node has its neighbor list, and an events table, with forwarding
information to all the events it knows.
After a node witnesses an event, an agent may be created, which is a
long-lived packet and travels around the network. Each agent contains
an events table, including the routing information for all events it knows.
Since an event happens in a zone, composed of several or many
nodes, it’s possible more than one agents are created from the zone
and moving in the network.
Rumor Routing Algorithm for Sensor Networks
[Braginsky+ 2002]
Algorithm Description
 When a node observes an event, it will add the event to its event table
and may also create an agent
 An agent will travel in the network and its routing table will be updated if
there is a shorter path to an event within the routing table of the node it
is visiting
In a similar way, the routing table of the currently visited node will be
updated if its route to an event is more costly than the agent’s
 Any node may generate a query for a particular event. If it knows the
route to the event, it will transmit the query. Otherwise, the query will be
sent in a random direction, and this continues until the query reach a
node which has a route to the event
Rumor Routing Algorithm for Sensor Networks
[Braginsky+ 2002]
Adapted from [Braginsky+ 2002]
Rumor Routing Algorithm for Sensor Networks
[Braginsky+ 2002]
Figure 3: The agent modifies the exist path (left)
to a more optimal one (right)
Adapted from [Braginsky+ 2002]
Rumor Routing Algorithm for Sensor Networks
[Braginsky+ 2002]
Advantages:
Deliver queries to events in large networks with less average
cumulative hops and lower energy requirements than simple flooding.
The algorithm can handle node failure gracefully, degrading its delivery
rate linearly with the number of failed nodes.
Rumor Routing Algorithm for Sensor Networks
[Braginsky+ 2002]
Disadvantages:
 The path found by the agent sometimes is not the shortest and could be
unavailable if one of the links of the path is broken.
 The agent may carry lots of routing information of events even some events
have disappeared.
 No hints from the paper about the number of agents which should be created
from the event zone.
 Can the nodes make a query for an event if no such event is existing in the
network?
 It seems that each event should have an id, but no information is provided in the
paper.
 Optimization is not considered
References
[Braginsky+ 2002] D. Braginsky and D. Estrin, Rumor Routing Algorithm for Sensor Networks, First
Workshop on Sensor Networks and Applications (WSNA), September 28, 2002, Atlanta,
Georgia, pp. 22-31.
[De+ 2003] S. De, C. Qiao, and H. Wu, Meshed multipath routing with selective forwarding: an
efficient strategy in wireless sensor networks, Computer Networks, 43, Elsevier Journal, 2003,
pp. 481-497.
[Ganesan+ 2002] D. Ganesan, R. Govindan, S. Shenker and D. Estrin, Highly Resilient, Energy
Efficient Multipath Routing in Wireless Sensor Networks, Mobile Computing and
Communications Review (MC2R) Vol 1., No. 2. 2002.
[Intanagonwiwat + 2000] C. Intanagonwiwat, R. Govindan and D. Estrin, Directed Diffusion: A
Scalable and Robust Communication Paradigm for Sensor Networks, In Proceedings of the
Sixth Annual International Conference on Mobile Computing and Networks (MobiCOM 2000),
August 2000, Boston, Massachusetts.
[Karlof+ 2002] C. Karlof, Y. Li and J. Polastre, ARRIVE: Algorithm for Robust Routing in Volatile
Environments, UC Berkley, Tech Report, May 2002.
[Pottie+ 2000] G. Pottie, W. Kaiser, L. Clare, and H. Marcy, Wireless Integrated Sensor Networks,
Communications of the ACM, Vol. 43, No. 5, pp. 51-58, May 2000
[Weilian+ 2002] W. Su and I. Akyildiz, A Stream Enabled Routing (SER) Protocol for Sensor
Networks, Med-hoc-Net 2002, Sardegna, Italy, September 2002.