exposure in wireless ad-hoc sensor networks seapahn meguerdichian computer science department...

20
Exposure In Exposure In Wireless Ad-Hoc Wireless Ad-Hoc Sensor Networks Sensor Networks Seapahn Meguerdichian Seapahn Meguerdichian Computer Science Department University of California, Los Angeles Farinaz Koushanfar Farinaz Koushanfar Department of EE and CS University of California Berkeley Gang Qu Gang Qu Electrical and Computer Engineering Department University of Maryland Miodrag Potkonjak Miodrag Potkonjak Computer Science Department University of California, Los Angeles Presented by John Sweeney. Slides courtesy of the author

Upload: mildred-chapman

Post on 27-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Exposure In Wireless Exposure In Wireless Ad-Hoc Sensor Ad-Hoc Sensor

NetworksNetworks

Seapahn MeguerdichianSeapahn MeguerdichianComputer Science Department

University of California, Los Angeles

Farinaz KoushanfarFarinaz KoushanfarDepartment of EE and CS

University of California Berkeley

Gang QuGang QuElectrical and Computer Engineering Department

University of Maryland

Miodrag PotkonjakMiodrag PotkonjakComputer Science Department

University of California, Los Angeles

Presented by John Sweeney. Slides courtesy of the author.

Sensor CoverageSensor Coverage Given:Given:

Field Field AA NN sensors sensors

How well can the field be observed ?How well can the field be observed ?

Closest Sensor (minimum distance) onlyClosest Sensor (minimum distance) only Worst Case Coverage: Worst Case Coverage: Maximal Breach PathMaximal Breach Path Best Case Coverage: Best Case Coverage: Maximal Support PathMaximal Support Path

Multiple Sensors: speed and path consideredMultiple Sensors: speed and path considered

Minimal Exposure PathMinimal Exposure Path

Maximal Breach PathMaximal Breach Path

By construction, each line-segment maximizes distance from the nearest point (sensor).

Consequence: Path of Maximal Breach of Surveillance in the sensor field lies on the Voronoi diagram lines.

Voronoi DiagramVoronoi Diagram

Graph-Theoretic Graph-Theoretic FormulationFormulation

Given: Voronoi diagram D with vertex set V and line segment set L and sensors S

Construct graph G(N,E): • Each vertex viV corresponds

to a node ni N

• Each line segment li L

corresponds to an edge ei E

• Each edge eiE, Weight(ei) = Distance of li from closest sensor sk S

Formulation: Is there a path from I to F which uses no edge of weight less than K?

Maximal Support PathMaximal Support Path

Given: Delaunay Triangulation

of the sensor nodes

Construct graph G(N,E): The graph is dual to the Voronoi

graph previously described

Formulation: what is the path from which the agent can best be observed while moving from I to F? (The path is embedded in the Delaunay graph of the sensors)

Solution: Similar to the max breach algorithm, use BFS and Binary Search to find the shortest path on the Delaunay graph.

I F

PS

Exposure - SemanticsExposure - Semantics Likelihood of detection by sensors Likelihood of detection by sensors

function of time interval and distance function of time interval and distance from sensors.from sensors.

Minimal exposure paths indicate the Minimal exposure paths indicate the worst case scenarios in a field:worst case scenarios in a field: Can be used as a metric for coverage Can be used as a metric for coverage

Sensor detection coverageSensor detection coverage Wireless (RF) transmission coverageWireless (RF) transmission coverage

For RF transmission, exposure is a For RF transmission, exposure is a potential measure of quality of potential measure of quality of service along a specific path.service along a specific path.

Preliminaries: Sensing Preliminaries: Sensing ModelModel

[ ]KpsdpsS

),(),(

λ=

Sensing model Sensing model SS at an arbitrary point at an arbitrary point p p for for a sensor a sensor s s ::

where where d(s,p)d(s,p) is the Euclidean distance between is the Euclidean distance between the sensor the sensor ss and the point and the point pp, and positive , and positive constants constants and and K K are technology- and are technology- and environment-dependent parameters.environment-dependent parameters.

Preliminaries: Intensity Preliminaries: Intensity Model(s)Model(s)

Effective sensing intensity at point Effective sensing intensity at point pp in field in field F F ::

∑=n

iA psSpFI1

),(),(

),(),(

),(),(

min

min

psSpFI

SspsdpsdSss

C

mm

=

∈∀≤∈=

All All SensorsSensors

Closest Closest SensorSensor

KK Closest Sensors Closest SensorsK=3K=3 for Trilateration for Trilateration

Definition: ExposureDefinition: Exposure

The The ExposureExposure for an object for an object OO in the in the sensor field during the interval [sensor field during the interval [tt11,t,t22]] along along

the path the path p(t)p(t) is: is:

( ) ( )∫Δ

=2

1

)()(, ,),( 21

t

t

dtdt

tdptpFItttpE

Exposure – Coverage Problem Exposure – Coverage Problem FormulationFormulation

Given:Given: Field Field AA NN sensors sensors Initial and final points Initial and final points II and and FF

Problem:Problem:

Find the Find the Minimal Exposure Path Minimal Exposure Path PPminEminE in in AA, starting in , starting in I I and ending in and ending in FF..

PPminE minE is the path in is the path in A,A, along which the along which the exposure is the smallest among all paths exposure is the smallest among all paths from from II to to FF..

Special Case – One SensorSpecial Case – One Sensor

pS =(1,-1)

s = (0,0) x

y

pD =(-1,1)

Minimal exposure path for one sensor in a Minimal exposure path for one sensor in a square field:square field:

General Exposure General Exposure ComputationsComputations Analytically intractable.Analytically intractable.

Need efficient and scalable methods to Need efficient and scalable methods to approximate exposure integrals and search approximate exposure integrals and search for Minimal Exposure Paths.for Minimal Exposure Paths.

Use a grid-based approach and Use a grid-based approach and numerical methods to approximate numerical methods to approximate Exposure integrals.Exposure integrals.

Use existing efficient graph search Use existing efficient graph search algorithms to find Minimal Exposure algorithms to find Minimal Exposure Paths.Paths.

Minimal Exposure Path Minimal Exposure Path AlgorithmAlgorithm Use a grid to approximate path exposures.Use a grid to approximate path exposures.

The exposure (weight) along each edge of The exposure (weight) along each edge of the grid approximated using numerical the grid approximated using numerical techniques.techniques.

Use Dijkstra’s Single-Source Shortest Path Use Dijkstra’s Single-Source Shortest Path Algorithm on the weighted graph (grid) to Algorithm on the weighted graph (grid) to find the find the Minimal Exposure PathMinimal Exposure Path. .

Can also use Floyd-Warshall All-Pairs Can also use Floyd-Warshall All-Pairs Shortest Paths Algorithm to find Shortest Paths Algorithm to find PPminEminE between arbitrary start and end points.between arbitrary start and end points.

Generalized GridGeneralized Grid

(a) n=2, m=1 (b) n=2, m=2 (c) n=2, m=3

Generalized Grid – 1Generalized Grid – 1stst order, 2 order, 2ndnd order, 3 order, 3rdrd order …order …More movement freedom More movement freedom more accurate more accurate resultsresults

Approximation quality improves by increasing grid divisionsApproximation quality improves by increasing grid divisionswith higher costs of storage and run-time. with higher costs of storage and run-time.

Minimal Exposure Path Algorithm Minimal Exposure Path Algorithm ComplexityComplexity

Single Source Shortest Path Single Source Shortest Path (Dijkstra)(Dijkstra) Each point is visited once in the worst case.Each point is visited once in the worst case. For an nxn grid with m divisions per edge:For an nxn grid with m divisions per edge:

nn22(2m-1)+2nm+1 total grid points.(2m-1)+2nm+1 total grid points. Worst case search: Worst case search: O(nO(n22m)m) Dominated by grid construction.Dominated by grid construction. 1GHz workstation with 256MB RAM requires less 1GHz workstation with 256MB RAM requires less

than 1 minute for n=32, m=8 grids. than 1 minute for n=32, m=8 grids.

All-Pairs Shortest Paths All-Pairs Shortest Paths (Floyd-Warshall)(Floyd-Warshall) Has a average case complexity of O(pHas a average case complexity of O(p33).). Dominated by the search: Dominated by the search: O((nO((n22m)m)33)) Requires large data structures to store paths.Requires large data structures to store paths.

PPminEminE – Uniform Random – Uniform Random DeploymentDeployment

Minimal exposure path for 50 randomly deployed sensors Minimal exposure path for 50 randomly deployed sensors using the All-Sensor intensity model (using the All-Sensor intensity model (IIAA).).

8x8 m=18x8 m=1Exposure:Exposure: 0.70790.7079Length:Length: 1633.91633.9

16x16 m=216x16 m=2Exposure:Exposure: 0.69760.6976Length:Length: 1607.71607.7

32x32 m=832x32 m=8Exposure:Exposure: 0.69450.6945Length:Length: 1581.01581.0

Exposure – Statistical Exposure – Statistical BehaviorBehavior

20 52 84 116 1480.05

0.1

0.15

0.2

0.25

0.3

Number of Sensors

Relative Std. Dev.

Exposure(d-2 Sensor Model)

Closest

All

20 52 84 116 1480.2

0.4

0.6

0.8

1.0

1.2

1.4

1.6

1.8

2Exposure

(d-4 Sensor Model)

Number of Sensors

Relative Std. Dev.All

Closest

Diminishing relative standard deviation in exposure for 1/d2 and 1/d4 sensor models.

PPminEminE – Deterministic – Deterministic DeploymentDeployment

Minimal exposure path under the All-Sensor intensity model Minimal exposure path under the All-Sensor intensity model ((IIAA) and deterministic sensor deployment schemes. ) and deterministic sensor deployment schemes.

CrossCross SquareSquare TriangleTriangle HexagonHexagon

Exposure LevelExposure Level(compared to Square)(compared to Square) 1.5x1.5x1.5x1.5x30x30x~120~120

1.5x1.5x3x3x6x6x~20~20HexagonHexagonTriangleTriangleCrossCrossSensorsSensors

Exposure – Research Exposure – Research DirectionsDirections Localized implementationsLocalized implementations

Performance and cost studies subject toPerformance and cost studies subject to Wireless Protocols (MAC, routing, etc)Wireless Protocols (MAC, routing, etc) Errors in measurementsErrors in measurements

LocationingLocationing SensingSensing Numerical errorsNumerical errors

Computation based on incomplete Computation based on incomplete informationinformation

Not every node will know the exact position and Not every node will know the exact position and information about all other nodesinformation about all other nodes

SummarySummary Exposure:Exposure:

DefinitionDefinition Efficient AlgorithmEfficient Algorithm Centralized ImplementationCentralized Implementation

Algorithm:Algorithm: Generalized grid approximationGeneralized grid approximation Application of graph search algorithmsApplication of graph search algorithms

Ad-hoc wireless sensor networks:Ad-hoc wireless sensor networks: CoverageCoverage Quality of ServiceQuality of Service

Research:Research: Numerous interesting open problemsNumerous interesting open problems