2. Overview
⢠What is a sensor network?
â Sensing
â Microsensors
â Constraints, Problems, and Design Goals
⢠Overview of Research Issues and
Challenges
8. Objective
⢠Large-scale, fine-grained,
heterogeneous sensing
â 100s to 1000s of nodes providing high
resolution
â Spaced a few feet to 10s of meters apart
â In-situ sensing
â Hetegerogeneous sensors
9. Properties
⢠Wireless
â Easy to deploy: ad hoc deployment
â Most power-consuming: transmiting 1 bit â executing 1000
instructions
⢠Distributed, multi-hop
â Closer to phenomena
â Improved opportunity for LOS
â radio signal is proportional to 1/r4
â Centralized apporach do not scale
â Spatial multiplexing
⢠Collaborative
â Each sensor has a limited view in terms of location and sensor type
â Sensors are battery powered
â In-network processing to reduce power consumption and data
redundancy
10. Basic Terminology and
Concepts
⢠Phenomenon: the physical entity being
monitored
⢠Sink or base station: a collection point to
which the sensor data is disseminated
â Relatively resource rich node
⢠Sensor network periodically samples
phenomena in space and time
⢠Sink floods a query
12. Other variations
⢠Sensors mobile or not?
⢠Phenomena discrete or continuous?
⢠Monitoring in real-time or for replay
analysis?
⢠Ad hoc queries vs. long-running queries
15. Protocol Stack: Physical Layer
⢠Frequency selection
⢠Carrier frequency generation
⢠Signal detection
⢠Modulation
⢠Not the focus of this class
â We will focus on the link layer and above
16. Protocol Stack: Physical Layer
⢠Issues
â Hardware cost
⢠How do we get down to $1/node?
â Radio
⢠Ultrawideband?
â Very low powered, short pulse radio spread
over several GHz
â 40Mbps ~ 600Mbps
17. Protocol Stack: Physical Layer
⢠Radio (Cont.)
â Zigbee/IEEE 802.15.4
⢠2.4GHz radio band (= 802.11.b & Bluetooth)
⢠250Kbps
⢠Up to 30 meters
â Pico radio
⢠100Kbps
⢠Limit power consumption to 100 uW
â Other? (infra red, passive elements âŚ)
18. Protocol Stack: Data Link
Layer
⢠Multiplexing of data streams
⢠Data frame detection
⢠Medium access
⢠Error control
19. Data Link Layer
⢠Goals:
â Creation of the network infrastructure
â Fair and efficient sharing of of communication resources
between sensor nodes
⢠Existing solutions?
â Cellular: single hop network is impractical for sensor
networks
â Ad hoc MACs, e.g., 802.11 or Bluetooth: Power consuming
â Scale
â Data centric operation
â Security
⢠WEP for 802.11 is broken
20. Data Link Layer: Medium
Access Control
⢠Basic strategy: turn off radio
transceiver as much as possible, while
receiving and transmitting data
⢠Techniques: TDMA, application-layer
transmission scheduling, SMAC, ZMAC,
BMAC, ...
21. Protocol Stack: Network
Layer
⢠Design principles
â Power efficiency
â Data-centric
â Data aggregation when desired and possible
â Attribute-based addressing and location
awareness: no IP address
22. Minimum Energy Routing
⢠Maximum
power abailable
route
⢠Minimum
energy route
⢠Minimum hop
(MH) route
23. Directed Diffusion
⢠Route based on
attributes and
interests
⢠To be covered
later in the
semester
25. Transport Layer
⢠End-to-end Reliability
â Multi-hop retransmission: worth it?
â Congestion: relatively little related work
⢠End-to-end security
â Like SSL: authentication, encryption, data
integrity
â Good? What about data aggregation?
27. Other Important Issues
⢠Operating system
â TinyOS
â MANTIS OS
⢠Localization, Time Synchronization, and
Calibration
⢠Aggregation/Data Fusion
⢠Security
â Encryption
â Authentication
â Data integrity
â Availability: DOS attacks
⢠Privacy
28. Time and Space Problems
⢠Timing synchronization
⢠Node Localization
⢠Sensor Coverage
29. Time Synchronization
⢠Time sync is critical at many layers in sensor nets
â Aggregation, localization, power control
Ref: based on slides by J. Elson
30. Sources of time
synchronization error
⢠Send time
â Kernel processing
â Context switches
â Transfer from host to NIC
⢠Access time
â Specific to MAC protocol
⢠E.g. in 802.11, sender must wait for CTS (Clear To Send)
⢠Propagation time
â Dominant factor in WANs
⢠Router-induced delays
â Very small in LANs
⢠Receive time
⢠Common denominator: non-determinism
31. Conventional Approaches
⢠GPS at every node (around 10ns accuracy)
â doesnât work indoo
â cost, size, and energy issues
⢠NTP
â Primary time servers are synchronized via atomic clock
â Pre-defined server hierarchy
â Nodes synchronize with one of a pre-specified time servers
â Can support coarse-grain time synchronization
⢠Inefficient when fine-grain sync is required
â Sensor net applications, e.g., localization, beamforming, TDMA
â Discovery of time servers
â Potentially long and varying paths to time-servers
â Delay and jitter due to MAC and store-and-forward relaying
32. Localization
⢠Why each node should find its location?
â Data meaningless without context
â Geographical forwarding/addressing
⢠Why not just GPS at every node?
â Large size and expensive
â High power consumption
â Works only outdoors with LOS to satellites
â Overkill: Often only relative position is needed
33. What is Location?
⢠Absolute position on geoid
⢠Location relative to fixed beacons
⢠Location relative to a starting point
â e.g. inertial platforms
⢠Most applications:
â location relative to other people or objects,
whether moving or stationary, or the location
within a building or an area
34. Techniques for Localization
⢠Measure proximity to beacons
â Near a basestation in a room
⢠Active Badge for indoor localization
â Infrared basestations in every room
â Localizes to a room as room walls act as barriers
⢠Most commercial RF ID Tag systems
â Strategically located tag readers
â Beacon grid for outdoor localization
⢠Estrinâs system for outdoor sensor networks
â Grid of outdoor beaconing nodes with know position
â Position = centroid of nodes that can be heard
â Problem
⢠Not location sensing but proximity sensing
⢠Accuracy of location is a function of the density of
beacons
35. Localization
⢠Measure direction of landmarks
â Simple geometric relationships can be used to determine
the location by finding the intersections of the lines-of-
position
â e.g. Radiolocation based on angle of arrival (AoA)
⢠can be done using directional antennas or antenna
arrays
⢠need at least two measurements
BS
Ď2
BS
Ď1
MS
Ď3
BS
36. Localization: Range-based
⢠Measure distance to beacons
â Measure signal-strength or time-of-flight
â Estimate distance via received signal strength
⢠Mathematical model that describes the path loss attenuation
with distance
⢠Use pre-measured signal strength contours around fixed
beacon nodes
â Distance via Time-of-arrival (ToA)
⢠Distance measured by the propagation delay
â Distance = time * c
⢠Active vs. passive
â Active: receiver sends a signal that is bounced back so that the
receiver know the round-trip time
â Passive: receiver and transmitter are separate
Âť time of signal transmission needs to be known
â N+1 BSs give N+1 distance measurements to locate in N
dimensions
38. Many other issues
⢠What about errors? Collisions? No
LOS?
⢠If sensors are mobile, when should we
localize?
⢠Multi-hop localization?
39. Sensor Network Coverage
GATEWAY
MAIN SERVER
CONTROL
CENTER
⢠The Problem:
â Given:
⢠Ad hoc sensor field with some number of nodes with known location
⢠Start and end positions of an agent
â Want:
⢠How well can the field be observed?
⢠Example usage
â Commander
⢠Weakest path: what path is the enemy likely to take?
â Network manager
⢠Weakest path: where to deploy additional nodes for optimum coverage?
â Soldier in the battlefield
⢠Strongest path: what path to take for maximum coverage by my command?
⢠Weakest path: how to walk through enemy sensor net or through minefield?
Ref: based on slides by Seapahn Megerian
40. Exposure Model of Sensors
⢠Likelihood of detection by sensors is a function of time
interval and distance from sensors.
⢠Minimal exposure paths is worst case scenarios in a
field:
Ref: based on slides by Seapahn Megerian
41. Other Issues
⢠Coverage for continuous phenomena
⢠Role: Sensor as a source of information
and as a router
â What if we route through a critical node
and drain its energy compromising future
coverage?
42. Data Management Problems
sensors ⢠Observer interested in phenomena
with certain tolerance
â Accuracy, freshness, delay
⢠Sensors sample the phenomena
⢠Sensor Data Management
â Determining spatio-temporal
sampling schedule
observer
⢠Difficult to determine locally
â Data aggregation and fusion
phenomena
⢠Interaction with routing
â Network/Resource limitations
⢠Congestion management
⢠Load balancing
⢠QoS/Realtime scheduling
43. Spatio-Temporal Sampling
⢠How to express interests and translate into
actions
⢠How often should a given sensor report?
â Collected data should meet application goals at
reasonable load to the network
â Data/event driven
â Locally difficult to determine appropriate
sampling/reporting rate
â Collaboration needed to improve local estimate
44. Data Aggregation and Fusion
⢠Aggregate related data from multiple
sensors
â Reduce data size and overall load
â Provide more comprehensive estimate of
data importance to manage sensors better
⢠Support for effective data aggregation
â Routing and MAC support
â Sampling schedules should be coordinated
â Tradeoff between data quality and
resource demand should be exposed to the
application
45. Summary: Key Design Challenges
⢠Energy efficiency
â Sensor nodes should run for several years
without battery replacement
â Energy efficient protocols are required
â More efficient batteries
⢠But, efficient battery development is always
slower than processor/memory development
â Energy harvesting
46. Key Design Challenges
⢠Responsiveness
â Periodic sleep & wake-up can reduce the
responsiveness of sensors
⢠Important events could be missed
â In real-time applications, the latency
induced by sleep schedules should be kept
within bounds even when the network is
congested
47. Key Design Challenges
⢠Robustness
â Inexpensive sensors deployed in a harsh
physical environment could be unreliable
⢠Some sensor could be faulty or broken
â Global performance should not be sensitive
to individual sensor failures
â Graceful performance degradation when
there are faulty sensors
48. Key Design Challenges
⢠Synergy
â Mooreâs law apply differently
⢠Sensors may not become more powerful in terms of
computation and communication capability
⢠Cost reduction is the key to a large number of sensor
deployment
â A WSN as a whole needs to be much more capable
than a simple sum of the capabilities of the
sensors
⢠Extract information rather than raw data
â Also support efficient collaborative use of
computation, communication, and storage resources
49. Key Design Challenges
⢠Scalability
â 10,000 or more nodes for fine-granularity
sensing & large coverage area
â Distributed, localized communication
â Utilize hierarchical structure
â Address fundamental problems first
⢠Failure handling
⢠In-situ reprogramming, e.g., Deluge
⢠Network throughput & capacity limits?
50. Key Design Challenges
⢠Heterogenity
â Heterogeneous sensing, computation, and
communication capabilities
â e.g., a small number of devices of higher
computational capabilities & a large number of low
capability nodes -> two-tier WSN architecture
â Best architecture exist for all application?
â How to determine a right combination of
heterogeneous devices for a given application?
51. Key Design Challenges
⢠Self-configuration
â WSNs are unattended distributed systems
â Nodes have to configure their own network
topology;
⢠Localize, synchronize & calibrate; and
⢠Coordinate communications for themselves
52. Key Design Challenges
⢠Self-optimization & adaptation
â WSNs cannot be optimized a priori
â Environment is unpredictble, and may
change drastically
â WSN protocols should be adaptive & adapt
themseleves online
53. Key Design Challenges
⢠Systematic design
â Tradeoff btwn two alternatives
⢠(1) Fine-tuning to exploit application specific
characteristics to improve performance
⢠(2) More flexible, easy-to-generalize design
approaches sacrificing some performance
â Systematic design methodologies for reuse,
modularity & run-time adaptation are
required
54. Key Design Challenges
⢠Security & Privacy
â Security support for critical applications,
e.g., battlefield monitoring
â Avoid sabotage in, e.g., structural
monitoring
â Support privacy of medical sensor data
â Severe resource limitations, but challenging
security & privacy issues