SlideShare une entreprise Scribd logo
1  sur  42
Senso LAB

SENSO LAB is one of the most advanced wireless sensor
network labs., hosting hundreds of heterogeneous motes that
are deployed around Middlesex University.

More than 20 members
                                            Prof Orhan Gemikonakli
                                            Dr Enver Ever
                                            Dr Leonardo Mostarda
                                            Krishna Doddapaneni

www.eis.mdx.ac.uk/staffpages/leonardom/WSN/index.php
ENERGY AWARE PERFORMANCE
   EVALUATION OF WSNS

              Krishna Doddapaneni
           Krishna Doddapaneni
      School of Science and Technology
   School of Engineering and Information Sciences
Overview

• Wireless sensor networks

• Evaluation methods

• Modeling Framework

• Unequal clustering algorithm – UHEED

• IDS in WSN

• PlaceLife

• Present work

• Future work

• Castalia
What are they and where are they used


 • A large number of small-sensing self-powered nodes gathering
   information

 • Communicating in a wireless fashion with an end-goal to hand their
   processed data to a base-station

 • Key elements: Sensing, Processing & Communication



 • Main area of focus - Body Sensors (Hospitals), Bio-Medical, Large-
   Scale Sport Fields, Industrial Automation
Oil spills

• Gulf oil spill
• No monitoring (use of faulty concrete plugs)

• Mesh-based wireless sensor networks for constant monitoring
 of the rigs

• Nigerian government funding
 • WSN for monitoring oil spills
 • The project went through several stages
 • The notification is in November
 • Equipment-provided
and more…

• Bridge Monitoring


• In California, 13% of the 23,000 bridges have been deemed structurally
  deficient, while 12% of the nation's 600,000 bridges share the same rating


• Structural health monitoring (SHM) is a sensor-based pre-emptive approach


• New York may be the first state with a 24/7 wireless bridge monitoring
  system


• Another application in India: Bri-Mon (Monitoring Railway bridges)
Crucial Factors

• Life time of sensor node:



1. Microprocessor

2. Sensing module

3. Wireless transmitter/receiver.


Existing studies consider these modules for best deployment, topology,
protocol selection, etc.
Energy consumption in a sensor node can be attributed
      to either “useful” or “wasteful” sources.



Useful energy consumption:          Wasteful energy consumption:

• Transmitting/receiving data.       • Idle listening.

• Processing query requests.         • Retransmissions.

• Forwarding queries/ data to        • Overhearing.
  neighbouring nodes.
                                     • Generating/handling control
                                       packets.
Evaluation Methods
Modeling Framework
Path loss



• Attenuation in power density of an electromagnetic wave as it
  propagates.

• Path loss is effected by free-space loss, refraction, diffraction,
  reflection, coupling loss, absorption, propagation medium…..

• Path loss effects should be considered for a more realistic
  evaluation
Case study
Simulation
              Path loss calculation




             Where,
             Lp is path loss between 2 points
             Lo is path loss in Open space
             mtype is number of objects of same type
             wtype is loss in decibels attributed to
             that object
             d is distance between the points
Energy: with and without path loss.
Clustering
• Achieve high energy efficiency
                                          Why clustering
• Increase the network scalability

• Each cluster has a coordinator(CH) & number of nodes

• Nodes only communicate to their CH.

• Data aggregation, rotation of CH
                                              Advantages
• Distribution of load across all nodes



                                Member node

                                Cluster head CH
Multihop Communication
 • Data travels from the source to the destination node
   via more than two hops.
 • Increase the range of the network by a significant
   margin


                           Thank you !




                                   b
                  c


                                              a
                               d
Uniformly distributed




   It is ineffective to balance loads
 among cluster heads to avoid hot spots
   problem, if the cluster heads are
  uniformly distributed, like in HEED.
Unequal clustering algorithm (UHEED)

 • Clustering, Multihop Communication,

 • Mitigates Hotspots !

 • UHEED combine HEED and EEUC
  • The leader election is performed according to HEED
  • The radius size is calculated according to EEUC



 • Improves network life time.
Unequal sized clusters




Equal sized clusters
UHEED mechanism


• Unequal sized clusters are based on the distance from
  a cluster head to the base station and energy level.

• The further a cluster head is located from the BS,
  the larger its competition radius is, and hence the size
  of the cluster.

• Unequal sized clusters reduce intra-cluster traffic for
  CH nearer to BS.
Competition radius




Where,

          is maximum competition radius, predefined.

         and        are max. and min. distances.

  C is constant coefficient between 0 and 1.

 The life time of CH closer to BS is more critical, the clusters
   further away have larger sizes compared to closer ones.
IDS in WSN
                        Enhances security
- Watchdog                         - Agreement Based
- Promiscuous mode – radio
                                   - Monitoring based on pre-
  continuously on, to check the
                                     defined agreement.
  correct behaviour of other
  nodes.                           - Byzantine oral solution/
                                     signed messages algorithms.
- Hence, lifetime decreases.
                                   - It is also expensive in terms
- Not really suitable for
                                     of no of messages sent and
  eventtriggered sensing.
                                     time.

Hence, a need for new approaches, improve Agreement based IDS
The Byzantine Generals Problem
                                   Attack!
                                  No, wait!
                                 Surrender!
                     Wait…


   Attack!




                                 Attack!



             Wait…
Oral Message Algorithm
Simulation and Results


                                     2
                              1             3

                         10                           4


                         9                            5

                              8              6
                                     7


                              Case study considered
Radio always On (promiscuous mode)




Byzantine oral message solution

No IDS
Our Frame work
PlaceLife


Software Architecture Modelling Language
• Set of components that exchange messages
• Components have variables manipulated by the behaviour
• Behaviour is represented by a list of events, conditions and actions
PlaceLife

Node Modelling Language
• Operating system, implemented MAC protocols, routing protocols
• Hardware specification
PlaceLife

Environment Modelling Language
• The physical environment in which the WSN nodes are deployed
• Obstacles, material….
PlaceLife
Weaving models
  • Mapping Modelling Language
  • Deployment Modelling Language

This approach provides a clear separation between software components, WSN
nodes and the physical environments, thus promoting the reuse of models.
PlaceLife
Present work!


• Expressiveness of Languages : Precision of our abstraction



• Improvise the path loss model
                                              The one we used in our
                                              earlier work

Now,


                            Where,
Path loss data

• With the formula, we calculate the path loss between two
  nodes.

• With this data, we explicitly set our path loss map. (its like a
  matrix, representing the path loss values between the nodes
  on the network).

• This is done through the SN.wirelessChannel.pathLossMapFile
  parameter, in Castalia

• Example : 0>1:56,2:40,3:59,4:54,5:58

• This means that when node 0 is transmitting, node 1 is
  experiencing 56dB path loss, node 2 is experiencing 40dB loss,
  node 3 a 59dBm loss, etc.
Wireless sensors networks for health care.
And more….
Future work: optimal deployment


                 Smoke                 Sprinkler   Smoke


                                                                Temp


                                Temp
                                                      Smoke




                         Temp
                                                           Sprinkler

•   Which one is the optimum deployment to improve the network lifetime?
Future work: optimal deployment


              Smoke                 Sprinkler   Smoke


                                                                Temp


                             Temp
                                                   Smoke




                      Temp
                                                           Sprinkler

•   Here we avoid obstacles but nodes must act as routes
Castalia

     A simulator for Wireless Sensor Networks and Body Area
              Networks, Partly enabled by OMNeT++

For Testing Distributed algorithms, Protocols @ realistic node
behaviour, especially relating to access the radio.

Main features include :
                      Advanced channel model
                      Advanced radio model
                      Extended sensing modelling provisions
                      Node clock drift
                      MAC and routing protocols available.
                      Designed for adaptation and expansion
Hierarchical relations
Grazie mille!

Contenu connexe

Tendances

Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumCSCJournals
 
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 AudioNovel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audioinventy
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
 
Video Quality Evaluation of MPEG-4 Using (MOS) Mean Opinion Score in NS-2
Video Quality Evaluation of MPEG-4 Using (MOS) Mean Opinion Score in NS-2Video Quality Evaluation of MPEG-4 Using (MOS) Mean Opinion Score in NS-2
Video Quality Evaluation of MPEG-4 Using (MOS) Mean Opinion Score in NS-2IRJET Journal
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...ijma
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
 
An Effective Approach for Colour Image Transmission using DWT Over OFDM for B...
An Effective Approach for Colour Image Transmission using DWT Over OFDM for B...An Effective Approach for Colour Image Transmission using DWT Over OFDM for B...
An Effective Approach for Colour Image Transmission using DWT Over OFDM for B...IJMTST Journal
 
Analysis of PEAQ Model using Wavelet Decomposition Techniques
Analysis of PEAQ Model using Wavelet Decomposition TechniquesAnalysis of PEAQ Model using Wavelet Decomposition Techniques
Analysis of PEAQ Model using Wavelet Decomposition Techniquesidescitation
 
PAPR Reduction using Tone Reservation Method in OFDM Signal
PAPR Reduction using Tone Reservation Method in OFDM SignalPAPR Reduction using Tone Reservation Method in OFDM Signal
PAPR Reduction using Tone Reservation Method in OFDM SignalIJASRD Journal
 
Restructuring Campus CI -- UCSD-A LambdaCampus Research CI and the Quest for ...
Restructuring Campus CI -- UCSD-A LambdaCampus Research CI and the Quest for ...Restructuring Campus CI -- UCSD-A LambdaCampus Research CI and the Quest for ...
Restructuring Campus CI -- UCSD-A LambdaCampus Research CI and the Quest for ...Larry Smarr
 

Tendances (17)

Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
 
H010234144
H010234144H010234144
H010234144
 
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 AudioNovel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
 
1 6
1 61 6
1 6
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
G0523444
G0523444G0523444
G0523444
 
L06_Link2.ppt
L06_Link2.pptL06_Link2.ppt
L06_Link2.ppt
 
YSChen: Dissertation Defense
YSChen: Dissertation DefenseYSChen: Dissertation Defense
YSChen: Dissertation Defense
 
Video Quality Evaluation of MPEG-4 Using (MOS) Mean Opinion Score in NS-2
Video Quality Evaluation of MPEG-4 Using (MOS) Mean Opinion Score in NS-2Video Quality Evaluation of MPEG-4 Using (MOS) Mean Opinion Score in NS-2
Video Quality Evaluation of MPEG-4 Using (MOS) Mean Opinion Score in NS-2
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...
 
An Effective Approach for Colour Image Transmission using DWT Over OFDM for B...
An Effective Approach for Colour Image Transmission using DWT Over OFDM for B...An Effective Approach for Colour Image Transmission using DWT Over OFDM for B...
An Effective Approach for Colour Image Transmission using DWT Over OFDM for B...
 
241 250
241 250241 250
241 250
 
Analysis of PEAQ Model using Wavelet Decomposition Techniques
Analysis of PEAQ Model using Wavelet Decomposition TechniquesAnalysis of PEAQ Model using Wavelet Decomposition Techniques
Analysis of PEAQ Model using Wavelet Decomposition Techniques
 
PAPR Reduction using Tone Reservation Method in OFDM Signal
PAPR Reduction using Tone Reservation Method in OFDM SignalPAPR Reduction using Tone Reservation Method in OFDM Signal
PAPR Reduction using Tone Reservation Method in OFDM Signal
 
Restructuring Campus CI -- UCSD-A LambdaCampus Research CI and the Quest for ...
Restructuring Campus CI -- UCSD-A LambdaCampus Research CI and the Quest for ...Restructuring Campus CI -- UCSD-A LambdaCampus Research CI and the Quest for ...
Restructuring Campus CI -- UCSD-A LambdaCampus Research CI and the Quest for ...
 

Similaire à Energy Aware performance evaluation of WSNs.

Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackJyotiVERMA176
 
Synched E Harvesting Wireless Sensors For Sensors Expo 2009 Dist
Synched E Harvesting Wireless Sensors For Sensors Expo 2009 DistSynched E Harvesting Wireless Sensors For Sensors Expo 2009 Dist
Synched E Harvesting Wireless Sensors For Sensors Expo 2009 Distswarms_2009
 
Final year WSN Project ppt final updated.pptx
Final year WSN Project ppt final updated.pptxFinal year WSN Project ppt final updated.pptx
Final year WSN Project ppt final updated.pptxDivankerSaxena1
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...ambitlick
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...ambitlick
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxABYTHOMAS46
 
Routing protocol for effective interoperability
Routing protocol for effective interoperabilityRouting protocol for effective interoperability
Routing protocol for effective interoperabilityvenkateshphd15
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfABYTHOMAS46
 
Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksambitlick
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Dcn invited ecoc2018_short
Dcn invited ecoc2018_shortDcn invited ecoc2018_short
Dcn invited ecoc2018_shortShuangyi Yan
 

Similaire à Energy Aware performance evaluation of WSNs. (20)

Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attack
 
Synched E Harvesting Wireless Sensors For Sensors Expo 2009 Dist
Synched E Harvesting Wireless Sensors For Sensors Expo 2009 DistSynched E Harvesting Wireless Sensors For Sensors Expo 2009 Dist
Synched E Harvesting Wireless Sensors For Sensors Expo 2009 Dist
 
Final year WSN Project ppt final updated.pptx
Final year WSN Project ppt final updated.pptxFinal year WSN Project ppt final updated.pptx
Final year WSN Project ppt final updated.pptx
 
1.CN-PPT.ppt
1.CN-PPT.ppt1.CN-PPT.ppt
1.CN-PPT.ppt
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
What is 3d torus
What is 3d torusWhat is 3d torus
What is 3d torus
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
Routing protocol for effective interoperability
Routing protocol for effective interoperabilityRouting protocol for effective interoperability
Routing protocol for effective interoperability
 
Andrea Sini Thesis
Andrea Sini ThesisAndrea Sini Thesis
Andrea Sini Thesis
 
LEACH Protocol
LEACH ProtocolLEACH Protocol
LEACH Protocol
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdf
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
 
Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Sem
SemSem
Sem
 
Dcn invited ecoc2018_short
Dcn invited ecoc2018_shortDcn invited ecoc2018_short
Dcn invited ecoc2018_short
 
wsn
wsnwsn
wsn
 
Senslab - open hardware - fossa2010
Senslab - open hardware - fossa2010Senslab - open hardware - fossa2010
Senslab - open hardware - fossa2010
 

Dernier

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Dernier (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Energy Aware performance evaluation of WSNs.

  • 1. Senso LAB SENSO LAB is one of the most advanced wireless sensor network labs., hosting hundreds of heterogeneous motes that are deployed around Middlesex University. More than 20 members Prof Orhan Gemikonakli Dr Enver Ever Dr Leonardo Mostarda Krishna Doddapaneni www.eis.mdx.ac.uk/staffpages/leonardom/WSN/index.php
  • 2. ENERGY AWARE PERFORMANCE EVALUATION OF WSNS Krishna Doddapaneni Krishna Doddapaneni School of Science and Technology School of Engineering and Information Sciences
  • 3. Overview • Wireless sensor networks • Evaluation methods • Modeling Framework • Unequal clustering algorithm – UHEED • IDS in WSN • PlaceLife • Present work • Future work • Castalia
  • 4. What are they and where are they used • A large number of small-sensing self-powered nodes gathering information • Communicating in a wireless fashion with an end-goal to hand their processed data to a base-station • Key elements: Sensing, Processing & Communication • Main area of focus - Body Sensors (Hospitals), Bio-Medical, Large- Scale Sport Fields, Industrial Automation
  • 5.
  • 6. Oil spills • Gulf oil spill • No monitoring (use of faulty concrete plugs) • Mesh-based wireless sensor networks for constant monitoring of the rigs • Nigerian government funding • WSN for monitoring oil spills • The project went through several stages • The notification is in November • Equipment-provided
  • 7. and more… • Bridge Monitoring • In California, 13% of the 23,000 bridges have been deemed structurally deficient, while 12% of the nation's 600,000 bridges share the same rating • Structural health monitoring (SHM) is a sensor-based pre-emptive approach • New York may be the first state with a 24/7 wireless bridge monitoring system • Another application in India: Bri-Mon (Monitoring Railway bridges)
  • 8. Crucial Factors • Life time of sensor node: 1. Microprocessor 2. Sensing module 3. Wireless transmitter/receiver. Existing studies consider these modules for best deployment, topology, protocol selection, etc.
  • 9. Energy consumption in a sensor node can be attributed to either “useful” or “wasteful” sources. Useful energy consumption: Wasteful energy consumption: • Transmitting/receiving data. • Idle listening. • Processing query requests. • Retransmissions. • Forwarding queries/ data to • Overhearing. neighbouring nodes. • Generating/handling control packets.
  • 12. Path loss • Attenuation in power density of an electromagnetic wave as it propagates. • Path loss is effected by free-space loss, refraction, diffraction, reflection, coupling loss, absorption, propagation medium….. • Path loss effects should be considered for a more realistic evaluation
  • 14. Simulation Path loss calculation Where, Lp is path loss between 2 points Lo is path loss in Open space mtype is number of objects of same type wtype is loss in decibels attributed to that object d is distance between the points
  • 15. Energy: with and without path loss.
  • 16. Clustering • Achieve high energy efficiency Why clustering • Increase the network scalability • Each cluster has a coordinator(CH) & number of nodes • Nodes only communicate to their CH. • Data aggregation, rotation of CH Advantages • Distribution of load across all nodes Member node Cluster head CH
  • 17. Multihop Communication • Data travels from the source to the destination node via more than two hops. • Increase the range of the network by a significant margin Thank you ! b c a d
  • 18. Uniformly distributed It is ineffective to balance loads among cluster heads to avoid hot spots problem, if the cluster heads are uniformly distributed, like in HEED.
  • 19. Unequal clustering algorithm (UHEED) • Clustering, Multihop Communication, • Mitigates Hotspots ! • UHEED combine HEED and EEUC • The leader election is performed according to HEED • The radius size is calculated according to EEUC • Improves network life time.
  • 21. UHEED mechanism • Unequal sized clusters are based on the distance from a cluster head to the base station and energy level. • The further a cluster head is located from the BS, the larger its competition radius is, and hence the size of the cluster. • Unequal sized clusters reduce intra-cluster traffic for CH nearer to BS.
  • 22. Competition radius Where, is maximum competition radius, predefined. and are max. and min. distances. C is constant coefficient between 0 and 1. The life time of CH closer to BS is more critical, the clusters further away have larger sizes compared to closer ones.
  • 23. IDS in WSN Enhances security - Watchdog - Agreement Based - Promiscuous mode – radio - Monitoring based on pre- continuously on, to check the defined agreement. correct behaviour of other nodes. - Byzantine oral solution/ signed messages algorithms. - Hence, lifetime decreases. - It is also expensive in terms - Not really suitable for of no of messages sent and eventtriggered sensing. time. Hence, a need for new approaches, improve Agreement based IDS
  • 24. The Byzantine Generals Problem Attack! No, wait! Surrender! Wait… Attack! Attack! Wait…
  • 26. Simulation and Results 2 1 3 10 4 9 5 8 6 7 Case study considered
  • 27. Radio always On (promiscuous mode) Byzantine oral message solution No IDS
  • 29. PlaceLife Software Architecture Modelling Language • Set of components that exchange messages • Components have variables manipulated by the behaviour • Behaviour is represented by a list of events, conditions and actions
  • 30. PlaceLife Node Modelling Language • Operating system, implemented MAC protocols, routing protocols • Hardware specification
  • 31. PlaceLife Environment Modelling Language • The physical environment in which the WSN nodes are deployed • Obstacles, material….
  • 32. PlaceLife Weaving models • Mapping Modelling Language • Deployment Modelling Language This approach provides a clear separation between software components, WSN nodes and the physical environments, thus promoting the reuse of models.
  • 34. Present work! • Expressiveness of Languages : Precision of our abstraction • Improvise the path loss model The one we used in our earlier work Now, Where,
  • 35. Path loss data • With the formula, we calculate the path loss between two nodes. • With this data, we explicitly set our path loss map. (its like a matrix, representing the path loss values between the nodes on the network). • This is done through the SN.wirelessChannel.pathLossMapFile parameter, in Castalia • Example : 0>1:56,2:40,3:59,4:54,5:58 • This means that when node 0 is transmitting, node 1 is experiencing 56dB path loss, node 2 is experiencing 40dB loss, node 3 a 59dBm loss, etc.
  • 36. Wireless sensors networks for health care.
  • 38. Future work: optimal deployment Smoke Sprinkler Smoke Temp Temp Smoke Temp Sprinkler • Which one is the optimum deployment to improve the network lifetime?
  • 39. Future work: optimal deployment Smoke Sprinkler Smoke Temp Temp Smoke Temp Sprinkler • Here we avoid obstacles but nodes must act as routes
  • 40. Castalia A simulator for Wireless Sensor Networks and Body Area Networks, Partly enabled by OMNeT++ For Testing Distributed algorithms, Protocols @ realistic node behaviour, especially relating to access the radio. Main features include : Advanced channel model Advanced radio model Extended sensing modelling provisions Node clock drift MAC and routing protocols available. Designed for adaptation and expansion

Notes de l'éditeur

  1. The Italian Connection!
  2. 2 parts : my work , our workIn my work, path loss, clustering and ids.Our work : evolution of better path loss model, placelife, case study.
  3. In general, self powered nodes. That sense and gather info.How do they communicate?....multihop? With an end goal to send data to BS.Main area of focus: Body sensors in Hoslpitals, large sport fields and industrial automation
  4. It is very obvious that wsns have a wide spectrumof applications. From Homeautomation: to Tracking the object. (logistics)Home automation : temp, smoke, fire alarm, turning on lights, ac, heating, windows open close, tv, etc….Intelligent Structural Health Monitoring System( Monitor mechanical stress after earthquakes…bridges…)Monitoring health conditionsof a patient in hospitals…(BAN)
  5. Some more details……BP oil disater on the coast of mexico, 2 yrs ago! 4.9 million gallons of oil. And Damage to wildlife habitat.
  6. Cracks on the walls, bridges and health of the heritage buildings can be monitored,2006, Bri-Mon is on its way!! For 120000 bridges.
  7. Recent studies have also considered the monitoring and evaluation of the path loss caused by environmental factors
  8. One solution put forward by the researchers to save energy is CLUSTERING.
  9. Due to inherent complexity and diverse nature of WSNs (topology, channel characteristics, density), Analytical methods become inappropriate due to certain simplifications, which may lead to inaccurate results.Experimental studies- not practical : difficulties in deploying of real systems.(10s or 100s of nodes), programing and monitoring them in physical environment. Costly instrumentation etc…And we all know that in benchmarking, the results in many cases cannot be extrapolated to suit the changes in the system or environmentHence, testing & performance evaluation of WSNs through analytical modelling, real deployment and test beds can become complex, inaccurate, time consuming and costly.We opt for simulators.
  10. A generic framework supporting development of wsns.Data from SA model, Positioning model and Path loss modesl are fed as input to the simulation framework (castalia) to find the performance parameters, life time and then by reconfiguring, v can find out the optimum results.I Wil not go very depth in to this now, but later in our present work we give more details.
  11. Reduction in tx signal strength as a function of distance, considering freq.When path loss is not considered, therefore the retransmission caused are also ignored. Hence it becomes too optimistic.There fore, we must consider path loss for more realistic evaluation.
  12. Consider fire alarm system. Temp and smoke detectors are distributed inside the building, with 5 areas, (5 rooms) and different obstacles/objects with diff attenuationsT is temp, sm is smoke, sp is sprinlerwhen t sensor reads a value higher than threshold, sends a mesh to smoke to verify smoke. If smoke, sprinkler is activated.Also, a Central heating system: t every 30 sec.we consider indoor environment and the dependant path loss modelThe path loss behaviour is dependent on the distance between nodes and the attenuationfactor added by the objects.attenuation can vary based on construction materials and object size
  13. Castalia provides a good low level simulation platformThe user provides the path loss related parameters
  14. It is clearly evident that the lifetime of the nodes is heavily dependent on the impact of the path loss, Node 3 consumes 13 joules of more energy due to path loss, when compared toThe case when there is no path loss.Because of the retransmissions, more energy is consumed by the nodes
  15. If nodes are separated by a large distance, they cannot communicate directly due to transmission range.However, in MULTHOP Communications there exits HOT SPOT problems.!!!!!!!
  16. When the load balancing id ineffective, HOTSPOT problem exists!
  17. To mitigate hot spot problem,
  18. The further a cluster head is located from the BS, the larger its competition radius reduce intra-cluster traffic and hence can handle more relay trafficHow to calculate the size of the clusters.
  19. C is environment dependant constant coefficient specified by the application.
  20. For WSNs, while the IDS enhances security, it can shorten the lifetime of the WSN since the IDS may require to run in promiscuous mode .More precisely in promiscuous mode, each IDS can continuously eavesdrop the radio in order to check the correct behaviour of all other nodes.Hence, a need for new approach, the agreement based IDS can be improved further…..We consider both these cases and run our experiments.
  21. The by. general's problem describes a problem where 1 commander and n-1 lieutenant's communicate with each other.It is an abstraction of the problem of reaching an agreement in a system where the nodes may exhibit arbitrary behaviour. (say a node sends faulty data)Lamppost and dole introduced algorithms (oral messages and signed messages algorithms) to overcome this problem,How ever, the number of messages exchanged is very large.And boos of the energy limitations in wans, such solutions would prove very expensive in terms of both number of messages and time.So, we tried to find out how expensive it would prove, if such a problem arise in wans.
  22. To cope up wth m traitors, lamport proposed a solutipon that works for 3m+1 or more leiutanants. Each commander sends an order/value to n - 1 lieutenants. And based on obtain the same value majority of times, the leuitanant decides what to do!
  23. Case study considered is a home automtionsystm. (fire alarm system, composed of various temp and smoke sensors, connected to an actuator to sprinkle wate in case of fire)When temp sensor reads a value exceeding the threshold, it sends mesg to smoke detector to check for smoke. If yes, then actuator is activated for water.We run the experiment for 3 cases.Fire alarm system with out any idsFire alarm system based on byzantine oral message soultionFire alarm system in which the ids is distributed on each node and runs in promiscuous mode.We use castalia simulation package.
  24. to check cost of two different intrusion detection systems (watch dog, byzantine oral solution)Results presented are given up for up to 100 nodes60% of the nodes are temperature sensors, 30% for smoke and 10% are sprinkler actuatorsResults show that the energy consumed coz of byzantine oralmesg solution increases as the number of nodes increase.Also, if we consider only 10 nodes, the avg delay for round trip time is 40ms
  25. We propose a generic frame work that supports the development of wsns. It is generic as it is independent from programing languages, hardware, and neteorkr topology independent.Architecturing modeling frame work is used to model behaviour of each kind of node and how it interacts with other nodes.Env modeling framework is used to model the phy environment where the application is deployed in, The main aim is to create a realistic representation of the env, of the application.Code genrtation frame work will manage the repositories of code generation enginesAnalysis framework is very similar to code generation one but is in charge in managing analysis engines for wsn,like coverage, connectivity , energy etc,
  26. In our approach, model driven techniques are used to modlsoftwr and hardwr architecture of wsn nodes. We have the main building blocks.Behavioural description of events, conditions, actions etc which together describes the control flow with in the components from abstract point of view.From our case study, ie home automation Conditions and actions such as tem threshold, smoke sensing, activating sprinkler etc….Tmp>40,Smoke ?Sprinlr on?
  27. For low level detailsof each type of node….Os such as tinyos, contokietc can be used. MAC protocols such as smac, tmac, 802154, tunable mac etcRoutin protocols such as bypass and multipathRadio parameters, energy source details etc can be specified. For our case study…….tmac, 3aa, multipath routing etc….
  28. Designer can specify physical env..2d or 3d. Rep of env. And also the obstacles can be placed.For our case study, we consider a home auto mation system with 5 rooms ,….various obstacles etc…. With diff attenuation factors.
  29. Mapml and depml are weaving models. For mapping Saml and nodeml…..mapml..This approach provides a clear separation between software components, wsn nodes and phyenv,promoting the reuse of models.
  30. Its a transformation tool which allows developers to automatically obtain Castalia simulation scripts from our modeling languagesPlacelife lends itself as a flexible and efficient tool which provides a more realistic approach for analysing WSNs and evaluating the performance in terms of energy efficiencyPlace life is our tool, part of our mde, model driven engine.Using graphical Editor: environment editor allows to specify physical envi. (Includes diff. sensors, diff obstacles)App model defines behaviour of node. From this…. Transmission and sensing rates can be derived.Other layer info such as network, data and physical layer.Obstacles and sensor position together computes the pathloss.We feed it to the simulator.
  31. Pr: The received signal powerPt: The transmited signal powerK: Pathloss factor calculate using the second formula: Path loss exponent, take from the tables for 2.4 GHz which is 4-6 for our cased0:is typically 1-10m indoors 10-100m outdoors we will use indoors
  32. In general health care systems, like in NHS UK, we have the following scenario, where data acquisition take splace using these meters and labs.Then , we have interpretation using the reports And then a descision is made by the expert.
  33. Instead, using WSNs, we can do this easily with out any delays and mistakes of humans !!!