Understanding Node Localizability of Wireless Ad-hoc Networks

Zheng Yang and Yunhao Liu Hong Kong University of Science and Technology

Outline † † † † † †

Introduction Network Localizability Node Localizability Conditions for Node Localizability Performance Evaluation Conclusions and Future Work

Localization † Determine the locations of wireless devices in a network

Why locations are important? † Location-aware computing „ Wireless sensor networks † Environmental monitoring, object tracking, … † “Sensing data without knowing the sensor location is meaningless.” [IEEE Computer, Vol. 33, 2000]

„ Mobile computing † Mobile p2p streaming

„ Pervasive computing † Smart space

Why is Localization a Non-Trivial Problem? † Manual configuration „ Unscalable and sometimes impossible

† Why not use GPS? „ Hardware requirements „ Obstructions to GPS satellites † Indoor † Underground „ GPS accuracy (10-20 feet) poor for short range sensors

Network Localization † Network Localization „ Beacons † special nodes at known locations

„ Non-beacon nodes † Distance ranging

Distance Measuring † Ranging techniques „ Radio Signal Strength (RSS) „ Time Difference of Arrival (TDoA)

† Ranging systems

Yale XYZ mote

UCLA medusa mote

MIT Cricket mote

Distance Graph Model † Distance graph GN of a wireless network N

„ Vertices: wireless devices (e.g., laptops, PDAs, or sensor nodes) „ Edges: an edge connecting two vertices (i and j) if the distance d(i,j) between corresponding nodes can be measured

d(i,j)

Outline † † † † † †

Introduction Network Localizability Node Localizability Conditions for Node Localizability Performance Evaluation Conclusions and Future Work

Network Realization Definition A realization of a graph G is a function p that maps the vertices of G to points in a Euclidean space. Generally, realizations are referred to the feasible ones that respect the pairwise distance constraints

Localizability Definition A network is localizable if it has a unique realization in some metric space.

Localizability † Localizability V.S Localization „ If a network is NOT localizable, by no means it can be localized. „ If a network is localizable, it can be localized in theory (but may be computationally infeasible).

Why Localizability is Important? † Being aware of localizability helps:

Localizability and Graph Rigidity Solution: G must be rigid.

G must be 3-connected.

b

e

c

f

b d

a c

a d

e f

G must be redundantly rigid: It must remain rigid upon removal of any single edge.

Localizability and Graph Rigidity Global rigidity (by Jackson and Jordan, 2003) A graph is generically globally rigid in 2D plane iff. it is 3-connected and redundantly rigid.

The necessary and sufficient condition for localizability. Network localizability (Eren, 2004) A network is uniquely localizable iff. its distance graph is globally rigid and it contains at least three beacons.

Localizability Test Algorithm † Network localizability can be tested „ Polynomial time to the graph size † Rigidity: O(n2) by the pebble game algorithm by Jacobs and Hendrickson (1997) † Redundant rigidity: O(n2) algorithm by Hendrickson (1991) † 3-connectivity: O(n) algorithm by Tarjan (1972)

† So far, it seems …

Outline † † † † † †

Introduction Network Localizability Node Localizability Conditions for Node Localizability Performance Evaluation Conclusions and Future Work

Node Localizability Observations Almost all the time the network is NOT entirely localizable. A large portion, on average nearly 80%, of nodes are actually localizable.

Node Localizability † Node localizability „ To answer the question that whether a particular node has a unique location. „ Single node V.S entire network

Why Node Localizability is Important? † Partially localizable networks

„ They are not localizable. „ A portion of nodes have unique locations while others do not.

† Application

„ A portion of nodes draw remarkable attentions

Node Localizability † Which one is harder?

Network Localizability

Node Localizability

Why Node Localizability Is Difficult? † A straight-forward solution „ Find a sub-network that is localizable „ Identify all nodes in the sub-network localizable

† Correct? YES, BUT…

Why Node Localizability Is Difficult? † Missing localizable nodes „ G is not 3-connected „ u is localizable Some conditions essential to network localizability are no longer necessary for node localizability.

Outline † † † † † †

Introduction Network Localizability Node Localizability Conditions for Node Localizability Performance Evaluation Conclusions and Future Work

Conditions for Node Localizability † Necessity

„ Degree = 3 „ 3 vertex-disjoint paths to 3 distinct beacons [Goldenberg, 2005]

† Sufficiency

„ Trilateration „ Localizable sub-network [Goldenberg, 2005] . „ Implicit edge [Eren, 2005]

Previous work

Necessity

Degree

Disjoint paths

Sufficiency

Implicit edge

Sufficient and Necessary condition

RRT3B

Tri.

Necessary Conditions † 3 vertex-disjoint paths (3P) „ Goldenberg, 2005

† Redundant Rigidity (RR) „ In this study, 2009 „ If a vertex is localizable, it is included in the redundantly rigid component of beacon nodes.

Necessary Conditions † Necessity „ The combination of 2 necessary conditions is also a necessary condition RR RR-3P 3P Theorem In a distance graph G = (V, E) with a set B⊂V of k ≥ 3 vertices at known locations, if a vertex is localizable, it is included in the redundantly rigid component that contains B and has 3 vertexdisjoint paths to 3 distinct vertices in B.

Necessary Conditions † RR-3P is NOT sufficient

Sufficient Conditions † RR3P condition Theorem In a distance graph G = (V, E) with a set B⊂V of k ≥ 3 vertices at known locations, a vertex is localizable if it belongs to the redundantly rigid component of B in which it has 3 vertex-disjoint paths to 3 distinct vertices in B.

Summary (1) Necessity

Sufficiency

RR-3P

RR3P

p1 p2 p3

p1 B

p2 p3

B

All paths are strictly included

Summary (2)

Necessity

Degree

Sufficiency

Disjoint paths

Implicit edge

RR-3P

RR3P

RRT3B

Tri.

Outline † † † † † †

Introduction Network Localizability Node Localizability Conditions for Node Localizability Performance Evaluation Conclusions and Future Work

System Description † Sea monitoring WSN „ 100 wireless sensors „ Environmental Data † temperature, humidity, illumination…

„ Localization: Trilateration

Observation (1) † Observations „ Almost all the time the network is NOT entirely localizable. „ A large portion, on average nearly 80%, of nodes are actually localizable „ Specifically, 90% of network topologies have at least 60% of nodes localizable

† The importance of node localizability.

Observation (2)

Simulations † Metrics

„ the number of nodes that can be identified

† Comparison

„ Necessary conditions † 3P V.S. RR-3P „ Sufficient conditions † TRI V.S. RR3P

Results(1) Non-localizable

Very small gap!

Unknown Localizable

3P and TRI

RR-3P and RR3P

Results(2) † network with a “Z” hole „ Blue: non-localizable „ Red: localizable „ Grey: unknown

3P and TRI

RR-3P and RR3P

Results(3)

Outline † † † † † †

Introduction Network Localizability Node Localizability Conditions for Node Localizability Performance Evaluation Conclusions and Future Work

Conclusion † Limitations of network localizability † Node localizability † Necessary and sufficient conditions

Graph Rigidity Theory

Node Localizability Application

Future Work † Localizability under noisy ranging „ Localizable ??? † perfect ranging † noisy ranging

„ Robustness of localizability testing

Thanks. Any questions?

Understanding Node Localizability of Wireless Ad-hoc ...

Understanding Node. Localizability of Wireless Ad-hoc. Networks. Zheng Yang and Yunhao Liu. Hong Kong University of Science and. Technology ...

1MB Sizes 1 Downloads 168 Views

Recommend Documents

Understanding Node Localizability of Wireless Ad-hoc ...
Why is Localization a Non-Trivial. Problem? □ Manual configuration. ▫ Unscalable and sometimes impossible. □ Why not use GPS? ▫ Hardware requirements. ▫ Obstructions to GPS satellites. □ Indoor. □ Underground. ▫ GPS accuracy (10-20 fe

The Next Generation of Sensor Node in Wireless Sensor Networks
good choice for a battery-limited device likes sensor node. This paper ... Index Terms—Wireless sensor network, Dynamic Partial Reconfigurable, FPGA.

Effect of Black Hole Attack in AODV Protocol of Adhoc Wireless Networks
black hole attack, a malicious node impersonates a destination node by sending a ... writing a new AODV protocol using C++, to simulate the Black Hole attack.

Effect of Black Hole Attack in AODV Protocol of Adhoc Wireless Networks
Periodically updating route tables keeps the nodes awake and quickly exhausts their batteries,. • Many redundant route entries to the specific destination needlessly take place in .... discovery process and influence the network integrity in a wide

The Deaf Node Problem in Wireless Networks
We plan to work on these problems in ..... as construction sites and disaster-torn areas, wireless networks are often the only op- ...... the recovery is very slow. Also .... Two consecutive packets (for example, DATA and ACK) are separated by a.

TWIN Node, A Flexible Wireless Sensor Network Testbed - EWSN
node via a Raspberry Pi. • WiFi based back channel that replaces active USB ca- bles. • Performance evaluation of battery and USB powered wireless sensor nodes. • Remote programming and monitoring of wireless sen- sor nodes. 237. International

pdf-92\wireless-networking-understanding-internetworking ...
Page 1 of 11. WIRELESS NETWORKING: UNDERSTANDING INTERNETWORKING. CHALLENGES BY JACK L. BURBANK,. JULIA ANDRUSENKO, JARED S. EVERETT,. WILLIAM T.M. KASCH. DOWNLOAD EBOOK : WIRELESS NETWORKING: UNDERSTANDING. INTERNETWORKING CHALLENGES BY JACK L.

A Rural Implementation of a 52 Node Mixed Wireless Mesh Network ...
A Rural Implementation of a 52 Node Mixed Wireless Mesh Network in Macha, Zambia, AfriComm 2009.pdf. A Rural Implementation of a 52 Node Mixed ...

typedef struct node
6. 5. 7. 4. 2. 9. 8. Root. Leaves ... bool search(node* root, int val). { if root is NULL return false. if root->n is val return true. if val is less than root->n search left child.

Node Security.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Node Security.

National Institute of Technology Calicut Recruits Adhoc Junior ...
National Institute of Technology Calicut Recruits Adhoc Junior Engineers.pdf. National Institute of Technology Calicut Recruits Adhoc Junior Engineers.pdf.

Adhoc promotions against vacancies.PDF
The Federation has. insisted ... The Federation therefore, has. urged that ... PDF. Adhoc promotions against vacancies.PDF. Open. Extract. Open with. Sign In.

Letter-Adhoc-Panel-2014.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.

Guaranteed Node Overage
Every renewal period our customers purchase a certain number of nodes that their subscription covers. However, with changes in your organization such as new employees, PC refresh projects, or acquisitions – your node count increases and you incur o

A REVIEW PAPER ON SECURITY IN MOBILE ADHOC NETWORK_IJ ...
A REVIEW PAPER ON SECURITY IN MOBILE ADHOC NETWORK_IJ.pdf. A REVIEW PAPER ON SECURITY IN MOBILE ADHOC NETWORK_IJ.pdf. Open.

Factors Influencing QoS in Mobile Adhoc Networks - IJRIT
Abstract—The major constraint in MANETs is to maintain the Quality of Service. ... Load balancing. This is scenario where, the load traffic is balanced in all the possible routes. Unbalanced network traffic may influence the high power ... followin

NCLAS Application form for Adhoc Training Course in Laboratory ...
NCLAS Application form for Adhoc Training Course in Laboratory Animal Sciences.pdf. NCLAS Application form for Adhoc Training Course in Laboratory Animal ...

Improving the Readability of Clustered Social Networks using Node ...
Index Terms—Clustering, Graph Visualization, Node Duplications, Social Networks. 1 INTRODUCTION. Social networks analysis is becoming increasingly popular with online communities such as FaceBook, MySpace or Flickr, where users log in, exchange mes

node in human heart. Location and vascular supply of sinus
Receive free email alerts when new articles cite this article -. Notes .... seen particularly where the large bulk of muscle making up to the crista terminalis was ...

Secure Adhoc Routing Protocol for Privacy Preservation - IJRIT
In this particular paper, we define stronger privacy requirements relating to ..... “Rumor riding: anonymizing unstructured peer-to-peer systems,” IEEE Trans.

Encouraging Node Cooperation through Payment Incentive ... - IJRIT
The extensive use of digital signature operations for both the data and the ACK packets ... Sprite, the source node appends its signature to each packet and each ...