Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.
-
date post
21-Dec-2015 -
Category
Documents
-
view
219 -
download
2
Transcript of Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.
![Page 1: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/1.jpg)
Towards Resilient and Practical Geometric Routing for WSNs
Ph.D. Proposal
By Ke Liu
09/07/2007
![Page 2: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/2.jpg)
Outline Background and
Motivation Wireless Sensor
Networks (WSN) Geographic Routing
Protocols Virtual Coordinates
System (VCS)
Contributions: Anomalies in VCS HGR: Hybrid
Geographic Routing AVCS: Aligned VCS Security Issues Other Contributions
Remaining Work Future Research
![Page 3: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/3.jpg)
Wireless Sensor Networks (WSNs) Sensor nodes:
Small, cheap and resource constrained sensing, processing, storage and radio
Wireless Sensor Networks: Multiple sensors collaborate as a network Large-Scale, fine-grain sensing Many applications: military, industrial, civilian,
medical, scientific, etc.
![Page 4: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/4.jpg)
WSNs properties Application driven Data-centric Limited Computing Capacity Limited Resources Communication Pattern: many-to-one Large Scale Real-time
![Page 5: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/5.jpg)
Mica2 Mote
128KB Instruction EEPROM
4KB Data RAM
Atmega 128Lmicroprocessor7.3827MHz
ChipcornCC1000Radio TranscieverMax 38Kbps- Lossy transmission
FlashMemory
128KB – 512KB
UART
51 pin expansionconnector
UART, ADC
![Page 6: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/6.jpg)
Typical Sensor Processor: MicaZ
![Page 7: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/7.jpg)
Typical Sensor Transceiver: MicaZ
![Page 8: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/8.jpg)
Typical Sensor: MicaZ
![Page 9: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/9.jpg)
System Organization of WSNs
![Page 10: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/10.jpg)
Routing is Important for WSNs Support the special communication pattern Large-scale and data-centric: traditional ID-
based (IP-based) protocol not a good fit Data-centric: care about collecting data, not
communication between ends Limited Resources Nodes often location aware
Location is needed context for the data
![Page 11: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/11.jpg)
Traditional Wireless Routing Routing table is commonly used: requiring
relatively large storage ID-centric Routing (not data-centric): does not
support the many-to-one communication patterns Before data traffic, the path between ends has to
be set up The network Dynamics may affect the
performance of routing. For Example, Moving node may cause failure of
forwarding paths going through it
![Page 12: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/12.jpg)
Routing Protocols for WSNs Flat Routing:
SPIN Directed Diffusion (actually, Shortest Path routing)
Hierarchical Routing LEACH (Cluster-based routing) Virtual Grid Architecture Routing
Geometric Routing GPSR GOAFR, GOAFR+
![Page 13: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/13.jpg)
Geographic Routing (GPSR)
Proposed by Karp et al (MobiCom 2000), know as Greedy and Perimeter Stateless Routing (GPSR)
Similar protocol proposed by Frey et al know as Greedy and Face routing (GFG)
Stateless: no path information, no (traditional) routing table. Only locations of neighbors are used.
GR is independent of the traffic pattern and topology Highly distributed and resilient: Only need to track
neighbor information-- resilient to network Dynamics
![Page 14: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/14.jpg)
GPSR Introduction 2 phases:
Greedy Forwarding (GF) Perimeter Routing (Face Routing in GFG)
When GF fails, used as a complementary algorithm
Based only on location Planar Graph Theory is used (discovered in
early 90’s) Note: It only works for 2-dimensional space
![Page 15: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/15.jpg)
Greedy Forwarding X is source’s closest
neighbor to sink Source node (or any
forwarding node) selects its closest neighbor to sink as the next hop
Neighborhood Physical Location
Euclidean Distance
![Page 16: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/16.jpg)
Void Problem X is a local minimum X does not have
neighbors closer to sink than itself
The best next hop of source to sink should be a, other than X
X is a void
![Page 17: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/17.jpg)
Void avoidance: Perimeter Routing
Note: borrow from GFG paper
![Page 18: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/18.jpg)
Why Planar Graph?
![Page 19: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/19.jpg)
Why Planar Graph? (Cont’) 3 Faces Along the faces’
perimeter, determinable
How Many Faces? 7 Faces non-determinable face
![Page 20: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/20.jpg)
Geographic Routing Limitations
Location Errors cause routing failures GPS is expensive for Sensors and does not work
indoors—use localization algorithms Localization algorithms inaccurate: 40% of range error
is common Location inaccuracy cause problems in both greedy and
complementary phases
Perimeter Routing is inefficient Paths can be orders of magnitude longer than best
available path
![Page 21: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/21.jpg)
Greedy Forwarding vs Perimeter Routing
GF PR on GG planar
![Page 22: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/22.jpg)
Physical Void Avoidance Physical Void is due to the lack of relay nodes on
the straight line between source and destination nodes
In the physical coordinates system (PCS), some part of the coordinate space is empty
If another coordinates system can set up a continuous space, the void can be avoided
Virtual Coordinates System (VCS) based only on nodes’ connectivity was proposed
![Page 23: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/23.jpg)
Virtual Coordinates System (VCS)
Idea: overlay virtual coordinates on nodes Forward to neighbor closer to destination (per
some geometric measure of distance) Typically coordinates are hop counts from
selected reference nodes (beacons) Based on communication connectivity:
Naturally bridges physical voids Immune to localization errors
![Page 24: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/24.jpg)
Physical Voids Avoided in VCS
Note: borrowed from LCR paper
![Page 25: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/25.jpg)
Voids happen in VCS All related works, such as VCap, LCR, BVR,
include backtracking algorithm to deal with the failure of greedy forwarding on VCS
But why Void happens in VCS was NOT analyzed Perimeter Routing can not be used in VCS
Recall that Planar graph theory works only for 2D VCS is typically 3+ Dimensional
Intuition: some part of the VCS is missing
![Page 26: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/26.jpg)
VCS Variants Most well-known VCS
Scoped FloodingManhattanN (>10, typically 80)
BVR (NSDI’05)
Universal RecordEuclidean4LCR (RTS 2004)
Random WalkEuclidean3Vcap (InfoCom 2005)
BacktrackingDistanceDimensionsVariant
![Page 27: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/27.jpg)
PCS vs VCS: path stretch
![Page 28: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/28.jpg)
PCS vs VCS (cont’)
![Page 29: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/29.jpg)
PCS vs VCS: Anomalies Ratio
![Page 30: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/30.jpg)
VCS Anomaly: Expanded VC Zone
VC Zone: The VC’s
of nodes are the same
![Page 31: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/31.jpg)
VCS Anomaly: Disconnected VC Zone
![Page 32: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/32.jpg)
VCS Anomaly: Forwarding Void It is possible
Dis(A, B) == Dis(A, C)
Packet arrives at A can not be forwarded to C, since B is as far as A to C
Even there is a path from A to C through B, forwarding would fail
![Page 33: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/33.jpg)
VCS Forwarding Void (Cont’)
![Page 34: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/34.jpg)
Why VCS Anomalies happen? In VCap, authors prove that if the network density is infinite, the VC Zone is
bounded What’s the difference between the proof and reality? – Density Quantization Error: Mapping loses the distance differences Quantization Error
Only number of hops is used for VC Nodes at different location receive the same VC Higher effects with higher density
Quantization Error can be bounded as below, where x = No. of Hops
![Page 35: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/35.jpg)
Quantization Error Distance Map
![Page 36: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/36.jpg)
Important Observations Physical Void and Virtual Void arise at different
places in network topology Side Observation: greedy forwarding is more efficient
than complementary routing (perimeter routing) Accordingly, I propose HGR
Quantization Error is the major reason of the Virtual Void Accordingly, I propose AVCS
![Page 37: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/37.jpg)
Second Contribution -- HGR
Addressing Anomalies in Virtual Coordinates for Geometric Routing in WSNs, IEEE Upstate New York Workshop 2006
Virtual Coordinate Backtracking for Void Traversal in Geographic Routing, Ad hoc Now 2006
![Page 38: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/38.jpg)
HGR: hybrid geometric routing Greedy Forwarding is efficient Impact of Localization Error on Perimeter
routing is tremendous—failure can occur Use VCS as complementary aglorithm: we
replace inefficient perimeter routing with greedy forwarding on VCS
HGR is more tolerant to localization errors since the complementary algorithm is VCS
![Page 39: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/39.jpg)
HGR Backtracking If VCS fails, backtracking is used Axis by Axis basis-- in current axis:
Packet is forwarded to node closer to sink (physical distance) among nodes with the same VC
When void reached, reverse the backtracking direction or skip to next axis
When all axes are tried, HGR fails (possibly) HGR may also fail (since it is still a greedy
forwarding) Can use other backtracking algorithms as well
such as those in LCR and BVR
![Page 40: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/40.jpg)
A Sample Path of HGR
![Page 41: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/41.jpg)
HGR Path Quality
![Page 42: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/42.jpg)
HGR: Impact of Localization Error
![Page 43: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/43.jpg)
Third Contribution--AVCS Aligned Virtual Coordinates for Greedy Routing
in WSNs, in Proc. Of IEEE MASS 2006 Aligned Virtual Coordinates for Greedy
Geometric Routing in Wireless Sensor Networks, (extension to IEEE MASS 2006 paper),International Journal on Sensor Networks (IJSNET)
![Page 44: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/44.jpg)
Aligned VCS (AVCS): Intuition Quantization Error: higher effect with higher
density VCS is set up based only on communication
connectivity, but not all connectivity information was used for VCS
Greedy Forwarding is used less with VCS than with PCS, leading to much more use of inefficient complementary routing (backtracking)
AVCS is immune to localization error, inheriting from VCS
![Page 45: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/45.jpg)
AVCS: Intuition (Cont’)
![Page 46: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/46.jpg)
AVCS: Alignment For Node A and all its Neighbors (N) in VCS, we have
The alignment function is used in AVCS as
The alignment is the average of virtual coordinates of the given node’s neighborhood.
Note: Different alignment functions have been studied, differences are trivial
![Page 47: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/47.jpg)
Related Work
Serve as Localization Algorithm: 2D Multiple Perimeter Nodes, knowing their physical location Central location initializes all other nodes Nodes average the location with neighbors Long convergence time, low accuracy
![Page 48: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/48.jpg)
AVCS avoids virtual voids
![Page 49: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/49.jpg)
AVCS: reduced quantization error
![Page 50: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/50.jpg)
AVCS Evaluation Scenario
A single hole is created in the center of the area, where all nodes are deployed into grids
![Page 51: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/51.jpg)
Evaluation of AVCS: greedy ratio
![Page 52: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/52.jpg)
Evaluation of AVCS: path stretch
![Page 53: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/53.jpg)
Fourth Contribution—Securing Geometric Routing Towards Resilient Geographic Forwarding in WSNs, Q2SWinet'05
(Workshop) Securing Geographic Routing in Wireless Sensor Networks, in Proc. of
Symposium on Information Assurance (SIA) 2006 Location verification and trust management for resilient geographic
routing Source, Journal of Parallel and Distributed Computing (JPDC), February 2007
An Application-Driven Perspective on Wireless Sensor Network Security, Q2SWinet'06 (Workshop)
Application-Driven Approach to Designing Secure Wireless Sensor Networks, Wireless Communications and Mobile Computing, to appear
TARMAC, under preparation
![Page 54: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/54.jpg)
Security of WSNs: introduction Unique characteristics of WSNs invite new modes
of attacks Sensor nodes are resource-limited and often
unattended easier to eavesdrop, capture, tamper with, and
carry on DoS Data sinks are more important than common nodes Vulnerability and Incentive Application dependent
![Page 55: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/55.jpg)
Security of GR GR critically dependent on location Malicious nodes may claim a fake location
Sybil attack: malicious node creates multiple locations (ID’s)
Black-hole attack: the fake location causes all its neighbours to forward packets to it, but it does not forward them
Selective attack: some of those packets are selected to be forwarded, avoiding detection
Traffic-analysis attack: through eavesdropping, the attacker can discover the location of data users (sink)
![Page 56: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/56.jpg)
Location verification: multi-equipment Sastry et al proposed: wireless signal and
ultrasonic are both used Verifier sends challenge to some node Upon receiving challenge, sensor node
reply through ultrasonic channel, with a nonce from the challenge
Location is verified by comparing the delay between wireless signal and the ultrasonic
![Page 57: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/57.jpg)
Problems Specific hardware: ultrasonic device Location of Verifiers should be accurate Single verification at a given time Immediate response may not always be
available: honest node may be hurt
![Page 58: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/58.jpg)
Localization Authentication Reverse the localization procedure: a non-
trusted sensor node is not allowed to generate its own location estimate
Can be used for triangulation-based localization methods
![Page 59: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/59.jpg)
Authentication Procedure Sensor node sends an authentication (localization)
request to multiple anchors Upon receiving request, anchors would exchange
this request, estimating the location of the sensor Anchors would send a location certificate back to
the querying sensor The certified location information is exchanged
among sensors securely
![Page 60: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/60.jpg)
How it works
Key observation: node will appear closer to, or further, from all anchors concurrently
Detectable when anchors exchange ranges Leads to Non-feasible location in all non-trivial
anchor placements
d2
d3
d1d2-dx
d3-dx
d1-dx
d2+dx
d3+dx
d1+dx
![Page 61: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/61.jpg)
Multiple Unicast Attack Attacker can still attack this authentication
by send multiple unicast requests to different anchors: Sequentially sending: can be prevented by
synchronizing anchors with a tolerance of a beacon packet length
Concurrently sending: the attacker needs to be equipped with multiple (directional) transceivers, which is hard
![Page 62: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/62.jpg)
Black-hole attack Attacker can still attack this system by
using the correct and certified location, but not to forward any incoming packets
Attacker can forward the incoming packet to a non-existing node
Meanwhile, packet may be dropped due to system reason: congestion, collision, etc.
A forwarding verification is needed
![Page 63: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/63.jpg)
Trust-management Monitoring the packet forwarding:
To favor well behaving honest nodes by giving them the credit for each successful packet forwarding
To penalize suspicious nodes that supposedly lie about or exaggerate their contribution to routing
Once a node lies its location, it is excluded immediately
It can also be used as a link-quality aware geographic routing protocol: node with bad link-quality may lose credit as a forwarding candidate
![Page 64: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/64.jpg)
Grading Function A sensor node initializes each neighbor with a trust level For each successfully forwarding, a neighbor’s trust level
is increased by
For each failed forwarding, trust level is decreased by
![Page 65: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/65.jpg)
Basic Study Scenarios
![Page 66: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/66.jpg)
Basic Study Evaluation
![Page 67: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/67.jpg)
Impact of t: delivery ratio
![Page 68: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/68.jpg)
Impact of t: Path Quality
![Page 69: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/69.jpg)
Impact of t: Energy
![Page 70: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/70.jpg)
Other Contributions Real-time Scheduling algorithm for WSNs:
Just-in-Time Scheduling (JiTS) New MAC Protocol possible for WSNs Link-quality insensitive GR
![Page 71: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/71.jpg)
JiTS My Master Thesis Work Most Existing Scheduling algorithms for WSNs
try to forward incoming packets as early as possible
JiTS tries to forward packets as LATE as possible – Just before missing the deadline
By scheduling the traffic with such delay, JiTS is capable to deal with more potential data flow
![Page 72: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/72.jpg)
JiTS related Publications Master Thesis JiTS: Just-in-Time-Scheduling for Real-
Time Sensor Data Dissemination, PerCom'06
JiTS: Queueing Delay Sensitive Scheduling for Real-Time Data Dissemination in WSNs, submitted to Real Time Systems Journal
![Page 73: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/73.jpg)
New MAC technology MicaZ adapts the IEEE 802.15.4 (actually,
the ZigBee) MAC protocol ZigBee is Low-Rate Wireless Personal Area
Network (LR-WPAN) protocol, 256kbps IEEE 802.15.3 (actually the UWB) MAC
protocol is also WPAN protocol, which is High Rate 54Mbps – 480 Mbps
![Page 74: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/74.jpg)
WPAN MAC protocols Low energy consumption: fit into WSNs Low cost: fit into WSNs Either low rate or high rate is available Drawback: transmission range is limited
![Page 75: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/75.jpg)
Working with WiMedia UWB MAC protocol
An industrial replacement of the IEEE 802.15.3 protocols
TDMA and Contention Based communication protocol
Fit for limited resources Fit for the Stateless routing protocols
![Page 76: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/76.jpg)
High Rate UWB performance Ex
Note: copyright reserved by Olympus
DRP Throughput with pkt size 1K
0
50
100
150
200
250
53.3 80 106.7 160 200 320
Data Rate (Mbps)
Th
rou
gh
pu
t (M
bp
s)
No Acc
Imm Ack
![Page 77: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/77.jpg)
Remaining Work Expanded Evaluation More Systematic Analysis GR with pure VCS Practical Hybrid GR
![Page 78: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/78.jpg)
Detailed Study with more scenarios
To discover more anomalies of VCS: other possible failures of Greedy forwarding on VCS
To design more detailed study of HGR: discover the failure of the HGR
Combination of AVCS and HGR
![Page 79: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/79.jpg)
The pure VCS is not Enough? Although the VCS was proposed to replace the
PCS, it may be not enough for pure greedy forwarding
The design goal of our geometric routing is to avoid the complementary routing as much as possible
PCS may be a necessary help for VCS To prove that: there is no VCS, which can provide
a consistent monotonic increasing (or decreasing) gradient between any given pair of nodes
![Page 80: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/80.jpg)
Practical Hybrid Geometric Routing Note: I would like to do so, but not promise The practical geometric routing demands
the hybrid coordinates: PCS with VCS Some proposed the practical GPSR, which
adapts broadcast to discover the planarizing failure under localization error, losing the stateless nature of GPSR
Planarizing under localization error can be corrected with VCS help.
![Page 81: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/81.jpg)
Demo: Visual GR Simulator Alpha Version Model Analysis tool, not Experiment Tool Showing:
Topology Planar graph GPSR: GF and Perimeter Routing GR on VCS and AVCS Anomalies on VCS
![Page 82: Towards Resilient and Practical Geometric Routing for WSNs Ph.D. Proposal By Ke Liu 09/07/2007.](https://reader036.fdocuments.in/reader036/viewer/2022062320/56649d5f5503460f94a400ef/html5/thumbnails/82.jpg)
Thank you
Questions ?