1 / 22

Remote Object Query for Ad-hoc Computing Environment

Remote Object Query for Ad-hoc Computing Environment. CS851 Biologically Inspired Computing Presented By Qing Cao Computer Science Department UVA April 2003. Smart Sensor Node. Smart Sensor Node. Smart Sensor Node. Smart Sensor Node. Smart Sensor Node.

marie
Download Presentation

Remote Object Query for Ad-hoc Computing Environment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Remote Object Query for Ad-hoc Computing Environment CS851 Biologically Inspired Computing Presented By Qing Cao Computer Science Department UVA April 2003

  2. SmartSensorNode SmartSensorNode SmartSensorNode SmartSensorNode SmartSensorNode Background & Motivation • Large Ad-hoc Computing Environment such as Sensor Network, etc, has to be effectively controlled. Challenge: How to know where are the Targets and Control them? Target Target Target

  3. Overview of this research work • A quantitative approach and analysis of the design and deployment of sensor network, with Guiding Parameters and Results. • A novel, biologically inspired control mechanism for sensor networks event query based on the results. • Result: A service-client Control structure for Sensor networks, especially suitable for security. Research results have been simulated and evaluated and a prototype will be implemented on MICA2 motes.

  4. Story Begins: • You are a tourist. You are now in a forest. Now the forest is caught on FIRE! • So what kinds of tools can you use to • escape? • Helicopters? • Call for help? (cell phone) • And now , A single mote.

  5. The complete Scenario • The forest can be monitored. • The motes detect fire and deposit results. • The mote in your hand is used to retrieve the results. • You use the results to find path out of the forest.

  6. Main Challenge: • The query of the event in the network. • Problem: How to find the position of the events in a real time manner?

  7. Inspiration from the biological world Termites send out pheromone to notify other termites of its current location. • Such information is sent uniformly. Directed Information Sending might help.

  8. Inspiration from the biological world • Animals leave trails as the presence of themselves, such as bees or mice. Can we import this idea in large colony of computing units?

  9. My Method of such simulation

  10. Idea • Assumption: The communication range is larger than sensing range. • How this idea works… • Two different Algorithms. Single Node Relay. Lower possibility, less messages Multiple Node Relay Higher possibility, more messages

  11. Simulation Results • The density of motes to ensure coverage

  12. Simulation Results • Conclusion :Communication range percentage is the only reason that determines how many nodes we need.

  13. Simulation Results • The density of motes to ensure query

  14. Simulation Results • The density of motes to ensure query (cont.)

  15. Simulation Results • The effect of Arm Width

  16. So how do motes intersect with each other? • Lemma: If a query arm meets with a service arm and both arms keep unbroken, then at least one node in the query arm is bound to be able to communicate with at least one node in the service arm. (Proof omitted here) • As a result of this lemma, there are two kinds of intersections: • Direct Intersection and Indirect Intersection

  17. Direct Vs Indirect

  18. System Overview

  19. System Advantages • This is a secure system Since C/S Architecture is used, the user must be authenticated to use the service. Traditional Security methods, such as RSA can be used to defeat any possible attack.

  20. System Advantages • The structure is simple. • It is application independent. • It provides basic functions , such as query, count, etc, inherently.

  21. Now how you escape from the forest? • You have a mote with your user private key. • You send out the message which requests current fire locations. • Your request is authenticated by the sensor network, which is nearby, but you don’t need to know where they are. • The sensor system now monitoring the forest gives you the fire information. • The information is displayed on your PDA. • RUN, FOREST, RUN! • … from the movie Forrest Gump

  22. End of ShowFor CS851 University of Virginia Qing Cao Presents Conclusions This research work has proved that it is viable for large sensor networks to use the query arm and service arm mechanism for the discovery, query and even commanding of remote motes. We call here, uniformly, such events or motes objects. We have seen that this mechanism is especially suitable for the implementation of large secure and Client/Server architecture based sensor networks. I plan to implement this mechanism on MICA2, and a thorough study of the performance and evaluation of the whole system will come soon. Thank you!

More Related