Documente Academic
Documente Profesional
Documente Cultură
RCTI Seminar Day Presentations Roshdy Hafez Thomas Kunz Marc St.-Hilaire Ionnis Lambadaris Richard Yu
Roshdy Hafez
Systems and Computer Engineering
Thomas Kunz
Professor and Director Technology Innovation Management Program
High-Level Architecture: multiple WSN, fixed Core (Examples: surveying multiple airports, border crossings, etc.)
Event collection & presentation
Wireless Sensor Networks: dynamic retasking, new sensor types/data, improved algorithms and protocols Fixed Networking: distribute sensor data to (different) recipients, discover sensors and their capabilities
sensor data collection and archive: information made available via web services
IP
IP Router Monitored Area
Sensor
Localization
Key requirements: high accuracy, no additional hardware (GPS, etc.), support fast deployment (minimum # of anchors), range-free or range-based Another important point: should work well for typical mission-critical deployments
10
10 10
8
8 6 4
8 6 4 2 0 5 10 0 0 5 10
2 0
(b )
(c)
10
(a)
M D S -M A P (P ,R ) C C A -M A P
10
30
0.4 M edian E rror (r) 0.3 0.2 0.1 0
10
30
10
15 20 C onnec tivity
25
30
10
15 20 C onnec tivity
25
30
Clock Synchronization
mutual, low overhead, compatible withWiFi, WiMax, Zigbee standards (i.e., based on periodic beacons) key idea: adjust slope of local clocks, rather than timestamp value -> converge over time
c.d.f of max time difference in a 5x5 network using the IEEE 802.11 TSF
Steps Forward
Defined and evaluated fundamental algorithms through simulations Plan to implement and evaluate them in a real testbed Additional research questions
Localization: Optimal anchor locations (non-trivial and non-obvious) Apply NN structure to track mobile sensors Reduce computational complexity Bound worst-case performance Synchronization: Use external clock references Reflect hierarchical network structure
Ongoing: work on fixed-network aspects, gateway to interconnect WSN and core, XML-based description and discovery, etc.
Marc St-Hilaire
School of Information Technology
Ioannis Lambadaris
Systems and Computer Engineering
Performance Analysis of Computer Communication Networks Congestion control of IP networks, Differentiated services and Quality of Service Resillient Packet Ring protocols and performance evaluation Resource allocation and Quality of Service in optical networks Real time packet content inspection engines Security Endpoint-Driven Intrusion Detection and Containment of Fast Spreading Worms in Enterprise Networks Mobile/Wireless Networks High Speed Downlink Packet Access (HSDPA) Sensor and Ad-Hoc Networks Zigbee/IEEE 802.15.4 networking Practical Design for wireless sensor nodes Design, performance analysis and prototyping of nodes based on popular wireless transceivers such as TI/Chipcon (CC1100, CC1110), Freescale semiconductors (MC13201-2-3 ), Cypress Semiconductors (CYRF69103, CYRF69213) Distinctions: Ontario Premiers Excellence Award 1999 -- Carleton Research Achievement Award 2000-01. Patents: 20060089113 - Radio control receiver system for multiple bands, frequencies and modulation protocol coverage.
Authors: John Lambadaris, A. Elahi and J. Perez
John Lambadaris Associate Professor Department of Systems and Computer Engineering Carleton University Ottawa, Ontario K1S 5B6 email: ioannis@sce.carleton.ca tel: (613) 520-2600 x1974
Topics to address:
High Speed Downlink Packet Access (HSDPA) systems Sensor/wireless ad-hoc networks -Node Location Estimation -Low Bit rate video for surveillance
Objective -To find the optimal scheduling policy that controls the allocation of the timecode resources. An optimal policy should be: -Fair; Divide the resources fairly between all the active users. -Maximize the overall cell throughput. -Provide channel aware (diversity gain) and high speed resource allocation.
-Realistic channel modeling -Packet retransmissions -Scalability issues -Extension to more than two users
Recent publications: Hussein Al-Zubaidy, Ioannis lambadaris, Code Allocation Policy Optimization in HSDPA Networks Using FSMC Channel Model, IEEE Wireless and Networking Conference (IEEE WCNC), March 31April3, 2008.
Anchors: Nodes that know their positions. Unknown sensors: Nodes that do not know their positions.
Sensor Location Estimation: Range-based and Range-free algorithms In order to study the sensor localization problem, researchers have proposed schemes that lie on one of the following categories: Range-based algorithms rely on computing point-topoint distance estimates. Range-free algorithms propose solutions without the availability of inter-distance measurements. Our hybrid approach: We will use a range-free approach coupled with a range-based refinement.
Step: 1. Generation of triangles. 3 combinations from the set of 4 audible anchors = 4 triangles -> {ABC,BCD,ACD,ABD}
A
RSSxA RSSxB RSSxC
3 4
a
RSSaA RSSaB RSSaC
P(x,y) A B C
RSSa
RSSx RSS1
(xA,yA) RSSaA RSSxA RSS1A (xB,yB) RSSaB RSSxB RSS2B (xC,yC) RSSaC RSSxC RSS3C
Sparse Networks
Random distribution
Dense networks
DOI (Degree of Irregularity) parameter Maximum path loss percentage variation per unit degree change in the direction of radio propagation. RIM Model Model that introduces the DOI parameter. Anisotropic model. Radio variations depend with both distance and direction.
DOI=0.7
Time varying interference patterns Extensions of the location algorithms to include obstacles (e.g. terrain irregularities) between nodes Complexity and scalability of the algorithms Extensions to include node/sensor mobility
Recent Publication: Ahmed Zainaldin, Ioannis Lambadaris, Bis Nandy Adaptive Rate Control MPEG4 Video Transmission over Wireless Zigbee Networks, IEEE International Conference on Communications (ICC), May 19-23 2008
MPEG-4 Encoder
Rate Controller
2.
3.
1
4.
Personnel: Faculty, graduate students, research associates and a group of professional contractors
Secure Wireless Biosensors Networking for Authentication and Life Support of Field Personnel
Richard Yu RCTI, Carleton University
Helen Tang and Peter Mason DRDC - Ottawa
Military tactical mobile ad hoc networks (MANETs) challenge security design. As the front line of defence, authentication is the core requirements for integrity, confidentiality and non-repudiation in networked centric warfare.
Biometrics from biosensors provide some promising solutions to the authentication problems.
Fingerprint
Iris
Face
Retina
Finger vein
Cardio-based
Voice
Sensor data Multimodal Biometrics Physiological status monitoring User authentication Encryption
Research: Wireless networking for biosensors, biometric-based authentication for tactical MANET, biosensor data processing, biosensor scheduling and management.