globecom2012 slides
TRANSCRIPT
-
7/29/2019 Globecom2012 Slides
1/30
n eepwa eup c e u ngo
ofWirelessSensors
, ,SungSik Kwon1,andAlade O.Tokuta1
1NorthCarolina
Central
Universit
Durham
USA
2RenminUniversityofChina,Beijing,China
-
7/29/2019 Globecom2012 Slides
2/30
AgendaIntroduction
Pre iminaries
TwoApproaches
CaseStudy
Conclusion
-
7/29/2019 Globecom2012 Slides
3/30
-
7/29/2019 Globecom2012 Slides
4/30
WirelessSensor Network
Component
SensorDataProcessor
WirelessCommunicationModule
SmallSize
LowPower
-
7/29/2019 Globecom2012 Slides
5/30
Sleepwakeup Scheduling
Sensornetworkis
ener
deficient
randomdeploymentistypical,andthus
re un ancy
s
n er n
-
7/29/2019 Globecom2012 Slides
6/30
SensorNetwork
Coverage
Model
Applicationsofwirelesssensornetwork
Disasterrescue
environmental
monitorin
battlefieldsurveillance,intrusiondetection,etc.
Most
case,
need
to
cover
whole
area
of
interest,e.g.battlefieldsurveillance
-
7/29/2019 Globecom2012 Slides
7/30
BarrierCoverage Model
Some applicationsneedto
providea
partial
coverage,
e.g.intrusiondetection
Barriercoverage
model
Warning
Sleepwakeupschedulingisstillapplicableandimportant
Users
-
7/29/2019 Globecom2012 Slides
8/30
Summaryof
Contribution
Introduceasecurityproblem,thebarrier
breachproblem,
in
existing
sleep
wakeup
sc e u nga gor ms or emax mum e mebarriercoverageproblem
Provideasufficientconditiontopreventthispro em
Basedonthiscondition,tworemediesareproposedandcompared
-
7/29/2019 Globecom2012 Slides
9/30
-
7/29/2019 Globecom2012 Slides
10/30
barrier
coverage
IntroducedbyKumaretal.[1]
Com utin
barriercovers
Anyintruderwillbedetectedatleastktimes
SensorNetworkN overabeltre ion
-
7/29/2019 Globecom2012 Slides
11/30
Maximum LifetimeBarrier
coverageProblem
Stemsfrom barriercoverage
Once
k
node
disjoint
barriers
are
identified,
activate
StartusingtheonelocatedoutermostKumaretal.[2]proposedoptimalsleepwakeup
sc e u ing
a gorit ms,
Stint uni orm
remaining
energylevel)
and
Prahari (non
uniform)
=
-
7/29/2019 Globecom2012 Slides
12/30
StintStint : (Optimal) SleepwakeupAlgorithmforBarriercoverage
ofWireless
Sensors
with
Same
Remaining
Energy
Level
Step1)ComputeacoveragegraphG fromagiven
setN of
nodes,
G =
(V (G),
E (G))
ep2 ompu e emax mumnum ermo no edisjointpathsbetweenthevirtualnodessandt inG
Step3)Fromtheoutputofthesecondstep,findmnodedisjointpaths
-
7/29/2019 Globecom2012 Slides
13/30
Stint cont
ofnodes,G =(V (G),E (G))x
aa
c
d
c
t1g
sb
bs2g
ee
-
7/29/2019 Globecom2012 Slides
14/30
Stint cont
disjointpathsbetweenthevirtualnodessandt inG
a
d
ina
indouta
outd
c inc intoutt
outc
in
b
in
eoutb
out
e out
Applyamaxflow algorithm!!Flowalgorithmdoesnot
-
7/29/2019 Globecom2012 Slides
15/30
Stint cont
ep3 rom eou pu o esecon s ep,
find
mnode
disjoint
paths
1B
2
3B
5B
7B
-
7/29/2019 Globecom2012 Slides
16/30
-
7/29/2019 Globecom2012 Slides
17/30
Problem Description
xx
xAssumeanintruderfromxtoy
a a
c1g
c1g
c1g
b2 2
b2
e e
-
7/29/2019 Globecom2012 Slides
18/30
Problem Description cont
BothStintandPrahari suffersfromBarrierbreach
Barrierbreaches
may
exist
if
two
edges
in
two
differentbarrierscrosswitheachother
Amaxflowdoesnotconcernaboutthose
crossingedges
Thereexistsascheduleforasetofbarriercoverswhich
doesnot
allow
any
barrier
breach
between
any
pair
of
barriercoversifnotwobarriercoversinthesetare
crossingeachother
-
7/29/2019 Globecom2012 Slides
19/30
-
7/29/2019 Globecom2012 Slides
20/30
FirstSolution
AremedyontheoutputofStint
Giving
up
some
of
the
barrier
covers
barriercoversCanbeconvertedtomaximumindependentset
pro ema
ba
c
e
b
e
c
-
7/29/2019 Globecom2012 Slides
21/30
FirstSolution
cont
MaximumindependentsetproblemisNPhard
Bo ana andHalldrssons a roximation
algorithm[3]canbeapplied
ad
a d
b
c b
ec
e
-
7/29/2019 Globecom2012 Slides
22/30
SecondSolution
Planargraph
Notwo
ed es
are
crossin
with
each
other
Corollary1.
TheStint
always
generates
an
optimallifetimenonpenetrablebarriercoverage
ofsensorsifaG inducedfromasetN ofsensors
by
Step
1)
of
Stint
is
a
planar
graph
-
7/29/2019 Globecom2012 Slides
23/30
SecondSolution
cont
Idea
Eliminateedges
to
make
the
input
induced
graphplanar
AlgorithmIterativel identif andremoveaned ewhichiscrossingwiththemostnumberof
theother
edges
until
the
graph
becomes
planar
ApplyStint
-
7/29/2019 Globecom2012 Slides
24/30
-
7/29/2019 Globecom2012 Slides
25/30
Approach 1is
better
Approach1produces2nodedisjointpaths
A roach2
roduces
nodedis oint
aths
2v
1v
3v
4v 10v
9
11v
12v
13
2vs
1v
3v
4v
v
10v
9
11v
12v
13v
2v
s
1
3v
4v 10v
9
11v
12v
13
6v
8v
7v 14v
15v
16v 6v
8v
7v 14
15v
16v 6v
8v
7v 14v
15v
16v
(a) (b) (c)
-
7/29/2019 Globecom2012 Slides
26/30
Approach 2is
better
Approach1produces3nodedisjointpaths
A roach2
roduces2node
dis oint
aths
2v 2v 2v
1v
s3v
4v 1v
s3v
4v 1v
s3v
4v
6v
5v
7v
9
10v
11v12v
6v
9
10v
11v12v
6v
5v
7v
9
10v
v12v
(a) (b) (c)
-
7/29/2019 Globecom2012 Slides
27/30
-
7/29/2019 Globecom2012 Slides
28/30
ConclusionIntroduceanewsecurityproblem
The
barrier
breach
problem
Provideasufficientconditiontopreventthisproblem
Based
on
this
condition,
two
remedies
are
proposed
andcompared
rs one sapp e o eou pu o n
SecondoneisappliedtotheinputofStint
epen ngon
e
npu
grap ,
one
o
e
a gor m
worksbetterthantheother.
-
7/29/2019 Globecom2012 Slides
29/30
-
7/29/2019 Globecom2012 Slides
30/30
References[1]S.Kumar,T.H.Lai,andA.Arora,BarrierCoveragewithWirelessSensors,inProc.ofthe11thAnnualInternationalm),2005.
2 S.Kumar,T.H.La ,M.E.Posner,an P.S n a, Max m zng
the
Lifetime
of
a
Barrier
of
Wireless
Sensors,
IEEETran
sactionsonMobileCom utin TMC vol. no.8 Au ust2010.
.
. .
,
ximumIndependentSetsbyExcludingSubgraphs,BITNumericalMathematics,vol.32,no.2,pp.180196,1992.