Topic 3: Sensor Networks and RFIDs

Post on 05-Jan-2016

17 views 0 download

description

Northwestern University MITP 491: Selected Topics in Information Technology. Topic 3: Sensor Networks and RFIDs. Part 6 Instructor: Randall Berry e-mail: rberry@ece.northwestern.edu. Networking Issues. MAC layer issues Topology control Routing. Routing. - PowerPoint PPT Presentation

Transcript of Topic 3: Sensor Networks and RFIDs

Topic 3: Sensor Networks and RFIDs

Part 6

Instructor: Randall Berrye-mail: rberry@ece.northwestern.edu

Northwestern UniversityMITP 491: Selected Topics in Information Technology

Networking Issues

• MAC layer issues• Topology control• Routing

Routing

• In multi-hop networks, a routing algorithm needed to specify how packets reach destinations.

Routing Challenges

• Algorithm must be adaptive to topology changes.– Due to mobility, node failures, etc.

• Limiting routing overhead is required due to energy considerations.

• Nodes may also have limited memory for routing tables.

Routing considerations

• Types of flows:– Unicast, multicast, broadcast, geocast.

• Type of topology:– Tree, mesh.

• Routing metrics:– Shortest paths, minimum energy, maximum

lifetime.

• Availability of location information.

Unicast Routing(Mesh topology)

• Many approaches:– Flooding, Gossiping.– Proactive routing (Table-based).– Reactive routing (on-demand).– Geographic routing.

Flooding

• Simplest type of routing• Send any new packet to all neighbors (except one

received from)– “Wireless broadcast advantage” can help.

• Usually some type of expiration for each packet.• Minimal memory requirements/control traffic.• But excessive number of transmissions to reach

destination.– Topology control can help here

Flooding/Gossiping

• Flooding can be useful for broadcast data.– Still can result in excessive transmissions/collisions.

• Gossip algorithms attempt to reduce this – Two variations:

1. Randomly pick one node to forward to.2. Each node only forwards a new packet with some

probability p.

– Cost?

Proactive/Reactive Routing

• Both require nodes to keep a routing table.

• Difference is when table is updated.– Proactive schemes attempt to always have an

up-to-date table.– Reactive schemes only update tables “on

demand” i.e. when traffic to send.– Trade-offs?

Proactive/Reactive Routing

• The routing algorithms used in the internet are an example of proactive routing.– Periodically routers exchange distance vectors or link states.

– Every router has a routing table with up-to-date routes.

• An example of a reactive protocol is the AODV (Ad hoc On demand Distance Vector) protocol– routing option for Zigbee mesh networks.

• Various hybrids also exist.

AODV

• In AODV nodes do not exchange any routing info.

• To establish a route to a new destination a node broadcasts a route request (RREQ) packet to all neighbors.

• RREQ contains destination address, source address, hop count, broadcast id, and source and destination sequence numbers.

AODV

• When node receives a RREQ:– If already seen – does nothing.– If new and no route to destination - increments hop

count, forwards RREQ, and stores routing entry to source.

– If knows route to destination – then responds with a route reply (RREP) containing source/dest id, hop cnt and lifetime.

• Route replies return along reverse path – nodes update routing tables to destination. – After “lifetime” routes will be dropped from memory.

AODV

Variations:– Route maintenance: neighbors send “hello” messages

and propagate route error messages when links break.– Other route metrics: replace hop cnt with some other

metrics.– Limited flooding: include max. hop cnt in RREQ.

Geographic routing

• When nodes have location-information can use this to facilitate routing.– Information may be from GPS, in-network localization,

or given at deployment.

• Geographic routing algorithms route only using location-information (I.e. no node ID’s)

• Natural correspondence to location-based queries.

Geographic routing

• Simplest approach – “greedy forwarding”– Always send packet to neighbor who is closest to the

destination.

– Several variants:• E.g. nearest neighbor with forward progress.

– Problem?

Geographic routing

• Getting around “dead-ends:”– “Face routing:” use a right-hand rule when stuck.

• Greedy perimeter stateless routing (GPSR) is an algorithm that uses these ideas.– Greedy routing until “stuck”

– Then face routing until “un-stuck”

Data centric routing

• In many sensor network applications do not want to send data to specific nodes, but rather to any node that knows “x”.

• Traditional approach to such problems.– Add “higher layer names” for data of interest.– Somehow bind those names to the nodes which have that

data (e.g. thru a directory service)

• This leads to several levels of indirection, each which add overhead to the sensor network.– Moreover, since most sensor networks are application

specific, it is not clear this is needed.

Data-centric routing

• Main idea: implement network operations directly using content names.

• Requires having a system for content-based addressing.– E.g. [Temperature, location, time].

• Need mechanisms for advertising & requesting content – Publish/subscribe model– Push vs. pull.

Directed Diffusion

• One broad data centric routing approach is directed diffusion.– Inspired by ants.

• “Pull” algorithm – sinks transmit interests for certain types of data.– Interests are flooded through network.

• Other nodes cache the interest, and create a gradient towards the source – direction plus value.

Directed Diffusion

• When a node obtains data that matches an interest it sends it along gradient direction– Rate (probability) proportional to gradient

value.

• Sink reinforces particular route(s)– Increase rate of gradient– Reinforcements propagate back to source.

Directed Diffusion

• Quite general algorithm.– Probabilities can depend on energy/delay.– Multi-path version possible.– Also “push”-based versions.

Outline

• Discuss applications in HW.• Loose ends from last time• Networking issues:

– MAC protocols– Topology formation– Routing

• Security• Future trends

Security Concerns

• Access control

• Message integrity

• Message confidentiality

• Replay protection

• Denial of service protection– Jamming, energy depletion, etc.

Security Concerns

• Access control

• Message integrity

• Message confidentiality

• Replay protection

• Denial of service protection

Addressed as optionsin 802.15.4/Zigbee

Zigbee Security solutions

• Access control – coordinator maintains access list.

• Message integrity.– Include a message authentication code with

each (MAC layer) packet.– Cryptographic checksum– 4/8/16 byte options.

Zigbee Security solutions

• Message confidentiality.– Encrypt message.

• Replay protection.– Include a sequence number in each packet.

Today

• Discuss applications in HW.• Loose ends from last time• Networking issues:

– MAC protocols– Topology formation– Routing

• Security• Future trends

Future Trends

• Markets

• Challenges

Markets

“By 2008, there could be 100 million wireless sensors in use, up from about 200,000 today. The worldwide market for wireless sensors, will grow from $100 million this year to more than $1 billion by 2009.”

– Harbor research, 2006

Markets

Many companies are positioning themselves at several different points in the sensor network “value chain”: – Component suppliers (e.g. chips, mini-controllers, sensors)

• Freescale, Intel, TI (Chipcon), ….

– Network technology companies (e.g. motes, access points)• Crossbow, Millennial Nets, Dust Networks,…

– System integrators (installation services, applications)• Intel, IBM, HP,…

– Data management/analysis (what to do with all this data)• Oracle, SAP, Microsoft,…

– Also Companies with specialized Apps.• Home automation, toys, …

Markets

• RFID is already seeing widespread deployment.• Some Zigbee products are also becoming available

for applications such as home automation.• Markets for other sensor net applications are also

emerging.• However, some of the more exotic apps are still

not feasible.– Large deployments of low power nodes, with multi-hop

routing and long-lifetimes.

Challenges

• Reliability (lifetimes).– Made a lot of progress here, but improvements still

needed in some areas.

– As we have seen, some will come from Moore’s law - others will require new solutions.

• Security/Privacy– Societal implications of widespread use of

sensors/RFIDs

– Privacy/regulation/societal acceptance.