SlideShare a Scribd company logo
1 of 66
Download to read offline
MOBILE NETWORKING SOLUTIONS
FOR FIRST RESPONDERS

     Klara Nahrstedt (klara@illinois.edu)
     Department of Computer Science
     University of Illinois at Urbana-
     Champaign


 1   Joint work with Dr. Ying Huang, Dr. Wenbo He, Dr. Yan
     Gao, Dr. Whay Lee
FIRST RESPONDER MOBILE
SYSTEMS (FRS)



                                               EMS
      Sep. 11’01




                                             Firefighter
     Katrina’05
                           First Responder



                                              Police       2

East Amarillo Complex’06
FIRST RESPONDER SYSTEM –
    NETWORK MODEL
   Extended Area Network
   Jurisdiction Area                                                     DB

    Network                                        911
                                                         Dispatch
                                                         Center
                                                                    JAN Police
   Incident Area Network
     Wireless communication system
      (MANET)                          IAN
                                                         IC
        Mobile devices, droppable
                                                                           EAN
         devices, vehicles                   PAN
     Incident command system
        Command center (CC) at a
         vehicle                                                                 JANEMS

   Personal Area Network
     Sensors, RFID, cameras,
      microphone, mobile devices
     Health/equipment monitoring
      and environmental surveillance
                                                                                     3
OUTLINE
 RelayPlacement In Unpredictable
 Environments
     Problem Description
        Polymorphic Networks

        Optimal Relay Placement

     Solutions
        Constrained Relay Placement

        Unconstrained Relay Placement

     Evaluation
 Brief
      Overview of other MONET
 group projects
                                         4
PROBLEM: CRITICALITY OF BASE STATION
CONNECTIVITY IN FR ENVIRONMENTS
    Goal: Interconnecting Base
     stations (BS) with Command
     Center (CC) to improve
     command coverage
        Reliable control channel
        Satellite, cellular, mesh,
         Internet portal

    Real-time data flow
                                                    DTN
        Monitor/Report from FRs
            Location tracking / health / voice    MANET
             / surveillance
        Control/Info from CC
            Resource data, coordination,
             command
                                                  control channel

    We need persistent Base
     Station (BS) connectivity.
                                                                    5
DISMAYED TRUTH
   D.C. emergency response officers quote:
       Their radio systems would not operate in the
        underground tunnels of the Metro system.


   Radio communication often falls out of range
       Mine, tunnel, caves
       High-rise buildings
       Cargo ships (metal)

   Signal Degradation
       Multipath fading
       Interference
       Obstacles
                                                       6
DISCONNECTED WIRELESS NETWORK
NUMERICAL RESULTS FROM SIMULATION
   Large incident area
   Small # of FRs
   Large-scale fading

   Being mission-oriented, FRs
    are
       Separately from others
       Disconnected from BSes

   BS connectivity metric at a
    sampled time t is the
    percentage of FRs, who have               c
    BS connectivity
    F(c) = Fraction of sampled
                                                    BS Connectivity

    time instances, when BS         For 80% time, less than 22%
    connectivity metric is lower   FRs have connectivity to BSes.
    than c                                                            7
DROPPABLE RELAYS TO IMPROVE
CONNECTIVITY
   Affordable wireless relays
       Communication devices,           bread crumbs

        whose exclusive function is to
        forward packets for
        terminals, base stations and
        other relays, whenever
        needed.
   Static relays

   No need to maintain BS
    connectivity for isolated
    relays.
                                                  8
OPTIMAL RELAY PLACEMENT SCHEME
   Relay placement scheme
       Dropped locations for relays  # of relays
   Optimal relay placement scheme
       Minimum number of relays

   Relays are resources. We need to concern about
       Number: A finite # in total
       Weight: A FR can only carry a small # of relays

   Optimal placement scheme is case by case
       BS connectivity for all snapshots of network topologies –
        polymorphic networks




                                                                    9
OPTIMAL RELAY PLACEMENT SCHEME
   Relay placement scheme
       Dropped locations for relays  # of relays
   Optimal relay placement scheme
       Minimum number of relays

   Relays are resources. We need to concern about
       Number: A finite # in total
       Weight: A FR can only carry a small # of relays

   Optimal placement scheme is case by case
       BS connectivity for all snapshots of network topologies –
        polymorphic networks




                                                                    10
USAGE OF TOPOLOGY-AWARE RELAY
PLACEMENT
   Offline - Analysis
       Input: Discrete-ized mobility traces
       Output: Performance reference for online algorithms

   Online - Incident preparation and planning phase
       Input: Critical topology snapshots to maintain
        connectivity
         Major events and dispatch commands
         FRs’ behavior coded by training

       Output: Relay placement scheme (+ movement)
       Predictability                             8:3
                                                   0
                                                         8:0
                                                         0
   Assumption: no hostile environment                   8:0
                                                         0
                                                               11
CONSTRAINED RELAY PLACEMENT (CRP)
   Relays are placed at a subset of candidate locations
       Safe distance between adjacent relays
           Region-correlated crash/failure (fire, flood)
       Forbidden areas
           Impenetrable areas, obstacles
   A deployment scheme: the set of candidate relay
    places


                                       RP



                                                                      12
                    Grid                                    Hexagon
GRAPH REPRESENTATION FOR CRP
   A graph per topology
       Vertex set
       Edge set




   For a terminal,
       finding a multi-hop path
        towards at least one BS    Equivalent
       finding a multi-hop path
        towards M.
                                                13
1-BS-CONNECTIVITY
   Node-weighted Steiner tree
       Unit weight for relays; 0 weight for other nodes
   Commodity flow from MC to terminals
       1 unit towards each terminal
       Place relays at places  commodities can flow via relays




                                                                   14
    Minimum node-weighted Steiner tree (8)
OPTIMIZATION FORMULATION (1)

   Single topology




                                       Flow conservation constraint



                                       Switch constraint

                      Place relay or not at location p
                      Flow amount on edge ij
                                                                 15
OPTIMIZATION FORMULATION (2)
   Multiple topologies


                             min    ∑y
                                   p∈
                                    RP
                                            p


                                  | T t |,   i=M
                                  
    s.t.    ∑t    xij − ∑ x tji =1,
                   t
                                    −        i ∈T t
           j:ij∈E       j: ji∈E t  0,      otherwise
                                  
               ∑          xtpj ≤ | T t | y p ,   ∀p ∈ RP
              j: pj∈E t

                                  y p ∈ {0,1}
                               xij ∈ [0, | T t |]
                                t




                                                           16
UNEVEN LOAD ON BASE STATIONS
 Cause congestion around heavily loaded BSes
 Waste connectivity around lightly loaded BSes




       Topology 1                       Topology 2   17
OPTIMIZATION FORMULATION (3)


                                 min    ∑y
                                       p∈
                                        RP
                                                p


                                     | T t |,   i=M
                                     
     s.t.    ∑t    xij − ∑ x ji =1,
                    t              t
                                       −        i ∈T t
            j:ij∈E       j: ji∈E t
                                      0,      otherwise
                                     
                       ∑      xtpj ≤ | T t | y p ,   ∀p ∈ RP
                  j: pj∈E t


             ∑         xij ≤ li | T t |,
                        t
                                              ∀i ∈ {T t , B, RP}   Load balance
                                                                   constraint
            j:ij∈E t

                                      y p ∈ {0,1}
                                   xij ∈ [0, | T t |]
                                    t
                                                                                  18
BALANCED LOAD

 li=0.5




           Topology 1   Topology 2

                                     19
SOLVING MIP (MIXED INTEGER
PROGRAMMING) EFFICIENTLY
 NP-hard
 Integer Programming Algorithm (IPA)
       Linear relaxation with sequential rounding
       Prune process


   Advantage of IPA
       Holistic view across topologies
       Load balance
       Environmental factors
           Obstacles, irregular transmission range, 2D to 3D
       Flexible cost defined for a candidate relay place
           Installation cost, reliability
                                                                20
UNCONSTRAINED RELAY PLACEMENT
   Relays are placed anywhere in
    network

   Steinerization approach
       1) Minimum spanning tree among
        terminals and BSes




       2) Steinerization
           Break edges into pieces with length of at
            most transmission range                     21
STITCH-AND-PRUNE ALGORITHM
   Steinerize each topology separately



                                 T1       T2


   Combine relays for all topologies




   Prune redundant ones

                                               22
PERFORMANCE EVALUATION (1)

   Square network area
   2 BSes
   TxRange = 100m (default)
   Constrained relay placement with regular grid (100m)

   Average over 20 randomly generated scenarios for each
    configuration


     IPA    Integer programming algorithm w.o. load
            balance
     IPALB Integer programming algorithm w.t. load
           balance
                                                            23
     SPA    Stitch-and-prune algorithm
PERFORMANCE EVALUATION (2)
   Number of relays

                                               Same density




         ������������(������) = 100������   ������������(������) = 200������
                                                         24
PERFORMANCE EVALUATION (3)
   Gain of global optimization over multiple topologies




                                                           25
CONCLUSION
   Relay placement for reliable base station
    communication
       Constrained relay placement
            Integer programming formulation based on network flow




                                                                              26
        

       Unconstrained relay placement
           Stitch-and-prune algorithm



Constrained        Model capability   Optimization overhead
(IPA)

Unconstrained Simple                  Cannot handle obstacles, load balance,
(SPA)         algorithm;              etc.
                                                                           Preli
                                                                             m
              Run fast                Local optimization; prune by redundancy
                                                                            Exa
                                                                             m,
                                                                            Nov
                                                                            16th
REFERENCES
   W. He, Y. Huang, K. Nahrstedt, W. C. Lee, “Mobi-Herald: Alert
    Propagation in Mobile Ad Hoc Networks”, ACM Mobicom 2007 (Poster
    Session), Montreal, Canada, Sept. , 2007
   Y. Huang, W. He, K. Nahrstedt, W. C. Lee, “Requirements and System
    Architecture Design Consideration for First Responder Systems”, IEEE
    Conference on Technologies for Homeland Security Conference,
    Waltham, MA, May 2007
   Y. Huang, W. He, K. Nahrstedt, W. Lee, “Incident Scene Mobility
    Analysis”, 2008 IEEE Int’l Conf. on Technologies for Homeland
    Security, Boston, MA, May 2008.
   Y. Huang, W. He, K. Nahrstedt, W. Lee, “CORPS: Event-Driven Mobility
    Model for First Responders in Incident Scene”, IEEE MILCOM 2008, San
    Diego, CA, November 2008
   Y. Huang, Y. Gao, K. Nahrstedt, “Relay Placement for Reliable Base
    Station Connectivity in Polymorphous Networks, IEEE SECON 2010
   T. Pongthawornkamol, S. Ahmed, A. Uchiyama, K. Nahrstedt, “Zero-
    knowledge Real-time Indoor Tracking via Outdoor Wireless Directional   27
    Antennas”, IEEE Percom’10 , Germany. March 2010
   (all papers are at http://cairo.cs.uiuc.edu/publications )
OUTLINE
 RelayPlacement In Unpredictable
 Environments

 Brief
      Overview of other MONET
 group projects




                                    28
MONET GROUP OVERVIEW
   Department of Computer Science, University of
    Illinois at Urbana-Champaign
       http://cs.illinois.edu
   MONET Group Website
       http://cairo.cs.uiuc.edu
       8 PhDs in Fall 2011
       3 Master Students in Fall 2011
   Active Research Areas
       Mobile Systems
           Mobile learning communities
           First responders system
           Mobility patterns and data dissemination in P2P mobile systems
       3D Tele-immersive Systems
           View-casting
           Monitoring and diagnosis in 3DTI
           Multi-sender/multi-receiver synchronization
           H-media – holistic multi-stream resource management for distributed
            immersive applications
       Trustworthy Critical Infrastructures
           QoS systems and protocols in SCADA systems
           Jamming and security in SCADA systems
MOBILE SYSTEMS - JYOTISH
Characterizing and Leveraging Movement of
People
PERVASIVE MOBILE ENVIRONMENTS
AND COMMUNITIES
HOW DO WE MEASURE, CHARACTERIZE
AND LEVERAGE PEOPLE MOVEMENT

1.    Decide on Tracking Methodology
2.    Determine Tracking Parameters
3.    Collect Tracking Measurements
      (Mobility Traces)
4.    Characterize Mobility Patterns
5.    Leverage Mobility for
     1. Mobility Prediction
     2.   Content Distribution
1. DECIDE ON TRACKING METHODOLOGIES

 Surveys/Questionnaires
 Surveillance
             via Video Cameras
 New Tracking Methods via
  mobile devices such as
  Cellular Device Monitoring
  WiFi Device Monitoring
  Bluetooth Device Monitoring
  Sound Monitoring


 Combination    of Tracking methods
2. DETERMINE TRACKING PARAMETERS
   Contact Parameters
       Probability of contact (encounter)
       Duration of contact
       Frequency of contact

   Environment Parameters
       Tracking number of days
       Period of scanning (accuracy of tracked data)
       Homogeneity of mobility patterns

   Mobile Device Parameters
       Speed of person carrying mobile device
       Density of mobile devices
3. COLLECT TRACE
EXAMPLE: TRACKING VIA UIM


                                                    University Campus
                                                     UIM – University of
                                                     Illinois Movement




   Collects MAC addresses of Wifi APs and Bluetooth-
    enabled devices
        Wifi AP MACs are used to infer location information
        Bluetooth MACs are used to infer social contact

 Deployed on Android phones carried by professors, staff,
  and students from March to August 2010
 UIM trace available online!!!!
  http://dprg.cs.uiuc.edu/downloads
4. CHARACTERIZING PEOPLE MOVEMENT
FOUND IN UIM TRACE (1)
 Location is regular if person visits location at the same
  time slot for at least half number of days
 People visit regular locations (plot is from 50
  participants)
5. LEVERAGE (1): UIM-BASED CONSTRUCTION
METHOD OF PREDICTIVE MODEL (JYOTISH)
PERFORMANCE OF TOP-K CONTACT
   PREDICTOR

     If at least one
      contact is
      predicted
      correctly, top-k
      contact predictor
      is correct


         With k=5, 60% of participants have more than 75% of
          correct contact predictions

L. Vu, Q. Do, K. Nahrstedt, “Jyotish: A Novel Framework for Constructing Predictive Model of People
Movement from Joint Wifi/Bluetooth Trace”, IEEE Percom 2011 (Mark Weiser Best Paper)
5. LEVERAGE (2): COMMUNITY-BASED                             DATA
ROUTING/FORWARDING PROTOCOL
(COMFA)
 Observation         from UIM traces
     People make regular social contacts in their daily
      activities and form social communities and share
      interests such as music or sports
 Approach
      PROPHET                                3R

              0.3                    0.1           0.1           0.9


                0.5                    0.7           0.5            0.15
        0.4                   0.2            0.8           0.1
              0.2                    0.2           0.2           0.3




                       time         slot1          slot2    slot3      time
3R RESULTS: DELIVERY RATIO
•   Settings
    •       100 senders/receivers via
            9 phones carried by
            MONET research group
            members from March 01
            to March 20, 2010
    •        Message delay deadline
            12 hours
        •     Each node has 20 days
             of trace
                                              3R   PROPHET   EPIDEMIC


             Epidemic performs best due to its flooding nature
             Epidemic outperforms 3R by 10%

             3R outperforms Prophet by 9%
TEEVE – -ENVIRONMENTS FOR
EVERYBODY
3D Tele-immersion
HIGH-LEVEL VISION – MAKING DISTANCE IRRELEVANT                AND
TELE-IMMERSION FOR EVERYBODY (TEEVE)




 4
                                  Photo courtesy of Prof. Ruzena Bajcsy.
 2
Static Immersive Spaces for
       Physiotherapy




                              43
MULTI-PARTY TELE-IMMERSIVE
               D
                 ACTIVITY SYSTEMS     D
                                         C

                                                                     C
             C
                                                                 C
                                                 SG
                      SG

     session                    Internet
    controller
                                                     SG
                                                                 D
                  D        SG
                                    SG
          C
                                                             D
         C                                  D
                      D              C
              C                            C

4
4      SG service gateway       D   3D display   C   3D camera
VIEW-AWARE STREAM DIFFERENTIATION

    3D capturing                              3D rendering
                   3D camera
         8                                          8
                       less important
                       streams

6                  2     transmission   6                    2




         4                                          4
streams contributing
more to user view                           user view
VIEW-CASTING                     V2
                                           U2




                                                  session
                                                 controller


         V1                           V3        U3
                     U4.w

              U3.w
  U2.w




                            V4        U4

                                                     user
                                                     view
TRUST IN SCADA SYSTEMS
Trustworthy Cyber Infrastructure for Power Grid
(TCIPG) Research at University of Illinois,
Urbana-Champaign
TCIPG SUMMARY
   TCIPG – premier center in USA in the area of trust-
    worthy cyber-infrastructure for power-grid
    infrastructures
   Trustworthy cyber-infrastructure research for power-
    grid is now going on
     Previous 5 years (NSF) – wealth of knowledge,
      experiences, scientific results
     New 5 years (DOE)
   World-leading experts in power engineering are
    part of TCIPG (Prof. Sauer, Overbye, Gross, Thomas)
   World-leading experts in reliability, security and real-
    time are part of TCIPG (Prof. Sanders, Gunter, Nicol,
    Nahrstedt, Campbell, Smith, Hauser, Bakken,
    Khurana, and other experts)

                                                          48
THE CHALLENGE: PROVIDING TRUSTWORTHY SMART GRID
OPERATION IN POSSIBLY HOSTILE ENVIRONMENTS


   Trustworthy
     A system which does
      what is supposed to do,
      and nothing else
     Availability, Security,
      Safety, …
   Hostile Environment
     Accidental Failures
     Design Flaws
     Malicious Attacks
   Cyber Physical
       Must make the whole
        system trustworthy,
        including both physical
        & cyber components, and
        their interaction.
                                                  49
SMART POWER GRID OF TOMORROW:
TRANSMISSION GRID WITH SYNCHROPHASOR SENSORS
•   NASPI Initiative, funded
    by DOE and industry, to
    investigate putting
    Phasor Measurement
    Units (PMUs) throughout
    physical power
    infrastructure

•   Need significant changes
    in power cyber
    infrastructure to support
    PMUs

•    “Class A” service
    requires low latency,
    data integrity &
    availability (“no gaps”)

                                               50
SMART POWER GRID OF TOMORROW: CONTROL OF ELECTRICAL
EQUIPMENT AND AN OPEN GRID

                                 Consumer Portal:
                                 • Security issues are huge
                                    – Privacy, billing integrity,
                                      Mischief, vandalism,
                                      intrusion, Consumer
                                      manipulation of system
                                 Demand Response:
                                 • Extends the Control Loop
                                    – Links distribution and
                                      transmission
                                    – Increases real time
                                      requirements
                                    – Provides bigger surface for
Who is responsible for security?      security violations
• Consumer? Utility?
                                                   51
(MONET RESEARCH) NEED FOR SECURE
WIRELESS NETWORKS
                       No wireless network
                        deployed broadly today in
                        Power Grid (some early
                        adapters – nuclear industry)
                       EPRI recommendations for
                        usage of wireless technology
                        in substation network
                        architecture (Report, Jan.
                        2009)
                       ISA100 standard efforts
                        leveraging other standards,
                        as appropriate, to produce a
                        relevant result in as short a
                        time frame as possible
                           ISA99 – Security
                           IEEE 1451 – Smart sensor
                           FIPS 140-2 – Security
                           ISO/OSI 7-layer model for network
                            connectivity
52
ALIBI: CONTAINMENT OF JAMMING ATTACKS
        Goal                      •        Attack Model
            Containment of            •     Taking into account one jammer
             jamming attacks                   with “inside” knowledge
                                            Knows shared hopping pattern
         Requirements
                                       1.

                                      2.   Knows any systems’ protocol
            Detecting &               3.   Uses listen-n-jam strategy
             Identifying one
             jammer in the
             single-hop wireless                                     5
             network with time-
                                                      1

             slotted
             communication                                    BS
                                                      2                    4


                                                              3



53
CONCLUSIONS
   FRs move in very challenging unstructured environments
       FRs with mobile devices represent a challenging mobile ad hoc
        network that needs to communicate with commanders connected
        via wireless infrastructure network brought by FRs
   Challenges: Deployment of ad hoc and BS communication
    infrastructure on the incident scene
       Placement algorithms needed (offline and online)


   Exciting Projects in MONET group exploring
        QoS-issues and security issues in critical infrastructures, mobile
        infrastructures, and 3D multimedia infrastructures



                                                                         54
ACKNOWLEDGMENTS
   The work on first responders is funded by
    Vodafone fellowship, and Motorola Center and
    Illinois-Boeing Center funding grants.

   The work on Characterizing and Leveraging
    People Movement is funded by the Illinois-Boeing
    Center funding grant.

   The work on Tele-immersive Systems is funded by
    the National Science Foundation (NSF).

   The work on Trustworthy Communication in           55
    SCADA networks is funded by the NSF and
    Department of Energy (DOE).
Missing part

Problem: Efficient                                              in mobile ad
                                                                hoc networks

   Alert Service
                                      Detection     Alert Propagation     Reaction

   Efficient Alert Message
    Distribution                      Watch Dog                            Pathrater

        Relatively small
                                          FR Environment:
    
        communication overhead        

       Capable to handle                    Mobile Ad-hoc
        temporary network                     Networks
        partition                        Problem:
       In spite of mobility,                How to trigger the
        majority of the network can           defense against
        be aware of the alert.                malicious attacks in the
   Against Collusive                         whole network after
    Slander Attacks                           malicious behavior is
                                              detected locally? 
       Slanderers can issue a DoS            Alert Propagation
        attack easily by defaming
        other nodes.                     Solution:
                                              Mobility Assisted
                                                                               56
                                          
                                              Alert Propagation
MOBI-HERALD ARCHITECTURE

                        Confirm alert
  Threshold-based        message m         Alert Propagation
    Verification                             Management
                    Report received                    Control alert
                    alert messages                     propagation


       Mobility-assisted Epidemic Routing

    Receive alert                       Periodically propagate
     messages                              alert message m




                                                                       57
MOBILITY ASSISTED EPIDEMIC ROUTING:
            ADVANTAGES
  Mobility-assisted epidemic routing is able to deliver a
   message to almost all the nodes even under intermittent
   network partitions. Flooding protocol cannot deliver
   message to the whole network if a mobile network is
   partitioned.
  In mobility-assisted epidemic routing, transmissions can
   be more efficient.
                                             Mobility assisted
                                             epidemic routing
                                    A
                A
                      B

                                              B

                    Flooding                                     58
EXAMPLE

                  (2) t=t0+T
  (1) t=t0




(3) t=t0+2T
                       (4)
                    t=t0+3T




                               59
MOBI-HERALD EPIDEMIC ROUTING:
             PROTOCOL
  A mobile node retransmits a message periodically
 A node suppresses transmission if it hears the
  transmission in the same period (within ∆ time slot).




                   Retransmissions of a message



                                                      time
               T              T                   T

                                                             60
QUORUM-BASED VERIFICATION
   Assuming k is the number
    of collusive slanders, a
    node does not actively
    forward the received alert
                                                               Unaware

    message before it received                                Listening to alert
    Q (Q>k) copies of the alert




                                                      ag py




                                                                                   De havi
                                                                  messages




                                                   ess t co
                                                        em




                                                                                     tec or
                                                                                     be
    message.




                                               rt m firs




                                                                                        ted dir
                                            ale he




                                                                                           ma ectl
                                        an d t




                                                                                             lic y
                                      of eive




                                                                                                iou
                                          c




                                                                                                    s
                                AlertedRe                                                        Confirmed
                                                    Received Q alert messages m
                                Listening to                                                       Periodically
                                                    (assuming Quorum size is Q)
                               more copies of                                                     propagate the
                                   the m                                                         alert message m


                    Received less than Q copies of m

                                                                                                               61
ALERT PROPAGATION MANAGER

 Balance reliability and efficiency
  A parameter “Times-to-send (TTS)” is attached in the
  message header, which indicates how many times an
  alert should be retransmitted by a mobile herald.
      Large TTS  large message overhead
      Small TTS  Small coverage of message delivery
 Balance end-to-end delay of alert propagation
  and efficiency
  Period of alert propagation “T”
      Large T  large end-to-end delay
      Small T  less efficiency of retransmissions
                                                         62
SELECTION OF T



 r
         Moving direction
 Location of            Location of
  previous                current
transmission           transmission

               T




                       2r
Preferably         T=
                      vavg            63
SIMULATION RESULTS
 Wesimulate Mobi-herald alert
 propagation protocol under Random
 Waypoint mobility pattern.

 Evaluation    Metrics
     End-to-end alert message delivery delay
     Coverage of an alert message




                                                64
END-TO-END ALERT MESSAGE DELIVERY
                            DELAY (REAL-TIME ALERT)
                                                   Threshold Q=1                                                                          Threshold Q=3
                                      10                                                                                       35
Delay of alert propagation (minute)




                                                                                         Delay of alert propagation (minute)
                                                                    average degree = 2                                                                       average   degree   =   2
                                      9                             average degree = 4                                                                       average   degree   =   4
                                                                                                                               30
                                                                    average degree = 9                                                                       average   degree   =   9
                                      8                             average degree =14                                                                       average   degree   =   14

                                      7                                                                                        25


                                      6
                                                                                                                               20
                                      5
                                                                                                                               15
                                      4

                                      3                                                                                        10

                                      2
                                                                                                                               5
                                      1

                                      0                                                                                        0
                                           20               30                40                                                    20              30                 40
                                                Transmission range (meter)                                                               Transmission rage (meter)



                                                                                                                                                                         65
COVERAGE OF MESSAGE DELIVERY
                                                Flooding                                                                  Mobi-Herald
                                     N=264     N=442       N=884    N=1326                                        N=264      N=442       N=884       N=1326
Coverage of message delivery




                                                                             Coverage of message delivery
                                     (d=2)     (d=4)       (d=9)    (d=14)                                        (d=2)      (d=4)       (d=9)       (d=14)

                                1                                                                            1



                               0.8                                                                          0.8



                               0.6                                                                          0.6



                               0.4                                                                          0.4



                               0.2                                                                          0.2



                                0                                                                            0
                                     1                 2            3                                             1                  2           3
                                         Confirmation threshold Q                                                     Confirmation threshold Q



                                                                                                                                                      66

More Related Content

What's hot

Thesis L Leyssenne - November 27th 2009 - Part2
Thesis L Leyssenne - November 27th 2009 - Part2Thesis L Leyssenne - November 27th 2009 - Part2
Thesis L Leyssenne - November 27th 2009 - Part2Laurent Leyssenne
 
ASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & SurveillanceASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & SurveillanceFiretide
 
Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...
Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...
Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...IDES Editor
 
Military Communications Systems
Military Communications SystemsMilitary Communications Systems
Military Communications SystemsSpontane_IT
 
OFDM (Orthogonal Frequency Division Multiplexing)
OFDM (Orthogonal Frequency Division Multiplexing)OFDM (Orthogonal Frequency Division Multiplexing)
OFDM (Orthogonal Frequency Division Multiplexing)Ameya Vijay Gokhale
 
Ad hoc routing
Ad hoc routingAd hoc routing
Ad hoc routingits
 
HFC Architecture In The Making
HFC Architecture In The MakingHFC Architecture In The Making
HFC Architecture In The MakingXiaolin Lu
 
Cable Infrastructure Evolution
Cable Infrastructure EvolutionCable Infrastructure Evolution
Cable Infrastructure EvolutionXiaolin Lu
 
Concept of Flip OFDM and its applications
Concept of Flip OFDM and its applicationsConcept of Flip OFDM and its applications
Concept of Flip OFDM and its applicationsDarshan Bhatt
 

What's hot (20)

Thesis L Leyssenne - November 27th 2009 - Part2
Thesis L Leyssenne - November 27th 2009 - Part2Thesis L Leyssenne - November 27th 2009 - Part2
Thesis L Leyssenne - November 27th 2009 - Part2
 
Dq31784792
Dq31784792Dq31784792
Dq31784792
 
ASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & SurveillanceASIS CCCT Workshop: Wireless Security & Surveillance
ASIS CCCT Workshop: Wireless Security & Surveillance
 
Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...
Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...
Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...
 
OFDM Basics
OFDM BasicsOFDM Basics
OFDM Basics
 
Military Communications Systems
Military Communications SystemsMilitary Communications Systems
Military Communications Systems
 
OFDM (Orthogonal Frequency Division Multiplexing)
OFDM (Orthogonal Frequency Division Multiplexing)OFDM (Orthogonal Frequency Division Multiplexing)
OFDM (Orthogonal Frequency Division Multiplexing)
 
Ad hoc routing
Ad hoc routingAd hoc routing
Ad hoc routing
 
HFC Architecture In The Making
HFC Architecture In The MakingHFC Architecture In The Making
HFC Architecture In The Making
 
Cable Infrastructure Evolution
Cable Infrastructure EvolutionCable Infrastructure Evolution
Cable Infrastructure Evolution
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Ofdm(tutorial)
Ofdm(tutorial)Ofdm(tutorial)
Ofdm(tutorial)
 
115 118
115 118115 118
115 118
 
OFDM Final
OFDM FinalOFDM Final
OFDM Final
 
37 44
37 4437 44
37 44
 
Concept of Flip OFDM and its applications
Concept of Flip OFDM and its applicationsConcept of Flip OFDM and its applications
Concept of Flip OFDM and its applications
 
OFDM for LTE
OFDM for LTEOFDM for LTE
OFDM for LTE
 
Ipmc003 2
Ipmc003 2Ipmc003 2
Ipmc003 2
 
Dw24779784
Dw24779784Dw24779784
Dw24779784
 
Omd dibg 2
Omd dibg 2Omd dibg 2
Omd dibg 2
 

Viewers also liked

Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networkingparmsidhu
 
Manual quali poc test description rf-scanning v10 6
Manual   quali poc test description rf-scanning v10 6Manual   quali poc test description rf-scanning v10 6
Manual quali poc test description rf-scanning v10 6Victor Alfonso Salas Salazar
 
Mobile telecommunication industry
Mobile telecommunication industryMobile telecommunication industry
Mobile telecommunication industryjanuar siregar
 
Mobile Network Testing
Mobile Network TestingMobile Network Testing
Mobile Network TestingJuris Grantins
 
Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networkingparmsidhu
 
Evolution of the generations of mobile Communication system.
Evolution of the generations of mobile Communication system.Evolution of the generations of mobile Communication system.
Evolution of the generations of mobile Communication system.Musfiqur Rahman
 
Evolution of wireless technology 1 g 5g1 (2)
Evolution   of   wireless   technology   1 g   5g1 (2)Evolution   of   wireless   technology   1 g   5g1 (2)
Evolution of wireless technology 1 g 5g1 (2)Adarsh Kumarmn
 

Viewers also liked (9)

Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networking
 
Manual quali poc test description rf-scanning v10 6
Manual   quali poc test description rf-scanning v10 6Manual   quali poc test description rf-scanning v10 6
Manual quali poc test description rf-scanning v10 6
 
Mobile telecommunication industry
Mobile telecommunication industryMobile telecommunication industry
Mobile telecommunication industry
 
Mobile Network Testing
Mobile Network TestingMobile Network Testing
Mobile Network Testing
 
Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networking
 
Evolution of the generations of mobile Communication system.
Evolution of the generations of mobile Communication system.Evolution of the generations of mobile Communication system.
Evolution of the generations of mobile Communication system.
 
5G
5G5G
5G
 
Evolution of wireless technology 1 g 5g1 (2)
Evolution   of   wireless   technology   1 g   5g1 (2)Evolution   of   wireless   technology   1 g   5g1 (2)
Evolution of wireless technology 1 g 5g1 (2)
 
5 g technology
5 g technology5 g technology
5 g technology
 

Similar to Mobile Networking Solutions for First Responders

Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
 
Performance of spread spectrum system
Performance of spread spectrum systemPerformance of spread spectrum system
Performance of spread spectrum systemNanhen Verma
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...JPINFOTECH JAYAPRAKASH
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackJyotiVERMA176
 
November 9, Planning and Control of Unmanned Aircraft Systems in Realistic C...
November 9, Planning and Control of Unmanned Aircraft Systems  in Realistic C...November 9, Planning and Control of Unmanned Aircraft Systems  in Realistic C...
November 9, Planning and Control of Unmanned Aircraft Systems in Realistic C...University of Colorado at Boulder
 
Habibullah cdmabased
Habibullah cdmabasedHabibullah cdmabased
Habibullah cdmabasedhinalala
 
Wireless Sensor Networks with emphasis on DSR
Wireless Sensor Networks with emphasis on DSRWireless Sensor Networks with emphasis on DSR
Wireless Sensor Networks with emphasis on DSRAmrita Biswas
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless networkTeced Ce
 
Transportation of MIMO Radio Signals over RoF-Distributed Antenna System and ...
Transportation of MIMO Radio Signals over RoF-Distributed Antenna System and ...Transportation of MIMO Radio Signals over RoF-Distributed Antenna System and ...
Transportation of MIMO Radio Signals over RoF-Distributed Antenna System and ...奈良先端大 情報科学研究科
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateDon Norwood
 

Similar to Mobile Networking Solutions for First Responders (20)

Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
Performance of spread spectrum system
Performance of spread spectrum systemPerformance of spread spectrum system
Performance of spread spectrum system
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
 
Dq24746750
Dq24746750Dq24746750
Dq24746750
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attack
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
November 9, Planning and Control of Unmanned Aircraft Systems in Realistic C...
November 9, Planning and Control of Unmanned Aircraft Systems  in Realistic C...November 9, Planning and Control of Unmanned Aircraft Systems  in Realistic C...
November 9, Planning and Control of Unmanned Aircraft Systems in Realistic C...
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
3gwireless
3gwireless3gwireless
3gwireless
 
Habibullah cdmabased
Habibullah cdmabasedHabibullah cdmabased
Habibullah cdmabased
 
Wireless Sensor Networks with emphasis on DSR
Wireless Sensor Networks with emphasis on DSRWireless Sensor Networks with emphasis on DSR
Wireless Sensor Networks with emphasis on DSR
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
Transportation of MIMO Radio Signals over RoF-Distributed Antenna System and ...
Transportation of MIMO Radio Signals over RoF-Distributed Antenna System and ...Transportation of MIMO Radio Signals over RoF-Distributed Antenna System and ...
Transportation of MIMO Radio Signals over RoF-Distributed Antenna System and ...
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
 

More from Förderverein Technische Fakultät

The Digital Transformation of Education: A Hyper-Disruptive Era through Block...
The Digital Transformation of Education: A Hyper-Disruptive Era through Block...The Digital Transformation of Education: A Hyper-Disruptive Era through Block...
The Digital Transformation of Education: A Hyper-Disruptive Era through Block...Förderverein Technische Fakultät
 
Engineering Serverless Workflow Applications in Federated FaaS.pdf
Engineering Serverless Workflow Applications in Federated FaaS.pdfEngineering Serverless Workflow Applications in Federated FaaS.pdf
Engineering Serverless Workflow Applications in Federated FaaS.pdfFörderverein Technische Fakultät
 
The Role of Machine Learning in Fluid Network Control and Data Planes.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdfThe Role of Machine Learning in Fluid Network Control and Data Planes.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdfFörderverein Technische Fakultät
 
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...Förderverein Technische Fakultät
 
East-west oriented photovoltaic power systems: model, benefits and technical ...
East-west oriented photovoltaic power systems: model, benefits and technical ...East-west oriented photovoltaic power systems: model, benefits and technical ...
East-west oriented photovoltaic power systems: model, benefits and technical ...Förderverein Technische Fakultät
 
Advances in Visual Quality Restoration with Generative Adversarial Networks
Advances in Visual Quality Restoration with Generative Adversarial NetworksAdvances in Visual Quality Restoration with Generative Adversarial Networks
Advances in Visual Quality Restoration with Generative Adversarial NetworksFörderverein Technische Fakultät
 
Industriepraktikum_ Unterstützung bei Projekten in der Automatisierung.pdf
Industriepraktikum_ Unterstützung bei Projekten in der Automatisierung.pdfIndustriepraktikum_ Unterstützung bei Projekten in der Automatisierung.pdf
Industriepraktikum_ Unterstützung bei Projekten in der Automatisierung.pdfFörderverein Technische Fakultät
 

More from Förderverein Technische Fakultät (20)

Supervisory control of business processes
Supervisory control of business processesSupervisory control of business processes
Supervisory control of business processes
 
The Digital Transformation of Education: A Hyper-Disruptive Era through Block...
The Digital Transformation of Education: A Hyper-Disruptive Era through Block...The Digital Transformation of Education: A Hyper-Disruptive Era through Block...
The Digital Transformation of Education: A Hyper-Disruptive Era through Block...
 
A Game of Chess is Like a Swordfight.pdf
A Game of Chess is Like a Swordfight.pdfA Game of Chess is Like a Swordfight.pdf
A Game of Chess is Like a Swordfight.pdf
 
From Mind to Meta.pdf
From Mind to Meta.pdfFrom Mind to Meta.pdf
From Mind to Meta.pdf
 
Miniatures Design for Tabletop Games.pdf
Miniatures Design for Tabletop Games.pdfMiniatures Design for Tabletop Games.pdf
Miniatures Design for Tabletop Games.pdf
 
Distributed Systems in the Post-Moore Era.pptx
Distributed Systems in the Post-Moore Era.pptxDistributed Systems in the Post-Moore Era.pptx
Distributed Systems in the Post-Moore Era.pptx
 
Don't Treat the Symptom, Find the Cause!.pptx
Don't Treat the Symptom, Find the Cause!.pptxDon't Treat the Symptom, Find the Cause!.pptx
Don't Treat the Symptom, Find the Cause!.pptx
 
Engineering Serverless Workflow Applications in Federated FaaS.pdf
Engineering Serverless Workflow Applications in Federated FaaS.pdfEngineering Serverless Workflow Applications in Federated FaaS.pdf
Engineering Serverless Workflow Applications in Federated FaaS.pdf
 
The Role of Machine Learning in Fluid Network Control and Data Planes.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdfThe Role of Machine Learning in Fluid Network Control and Data Planes.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdf
 
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
 
Towards a data driven identification of teaching patterns.pdf
Towards a data driven identification of teaching patterns.pdfTowards a data driven identification of teaching patterns.pdf
Towards a data driven identification of teaching patterns.pdf
 
Förderverein Technische Fakultät.pptx
Förderverein Technische Fakultät.pptxFörderverein Technische Fakultät.pptx
Förderverein Technische Fakultät.pptx
 
The Computing Continuum.pdf
The Computing Continuum.pdfThe Computing Continuum.pdf
The Computing Continuum.pdf
 
East-west oriented photovoltaic power systems: model, benefits and technical ...
East-west oriented photovoltaic power systems: model, benefits and technical ...East-west oriented photovoltaic power systems: model, benefits and technical ...
East-west oriented photovoltaic power systems: model, benefits and technical ...
 
Machine Learning in Finance via Randomization
Machine Learning in Finance via RandomizationMachine Learning in Finance via Randomization
Machine Learning in Finance via Randomization
 
IT does not stop
IT does not stopIT does not stop
IT does not stop
 
Advances in Visual Quality Restoration with Generative Adversarial Networks
Advances in Visual Quality Restoration with Generative Adversarial NetworksAdvances in Visual Quality Restoration with Generative Adversarial Networks
Advances in Visual Quality Restoration with Generative Adversarial Networks
 
Recent Trends in Personalization at Netflix
Recent Trends in Personalization at NetflixRecent Trends in Personalization at Netflix
Recent Trends in Personalization at Netflix
 
Industriepraktikum_ Unterstützung bei Projekten in der Automatisierung.pdf
Industriepraktikum_ Unterstützung bei Projekten in der Automatisierung.pdfIndustriepraktikum_ Unterstützung bei Projekten in der Automatisierung.pdf
Industriepraktikum_ Unterstützung bei Projekten in der Automatisierung.pdf
 
Introduction to 5G from radio perspective
Introduction to 5G from radio perspectiveIntroduction to 5G from radio perspective
Introduction to 5G from radio perspective
 

Recently uploaded

Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 

Recently uploaded (20)

Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 

Mobile Networking Solutions for First Responders

  • 1. MOBILE NETWORKING SOLUTIONS FOR FIRST RESPONDERS Klara Nahrstedt (klara@illinois.edu) Department of Computer Science University of Illinois at Urbana- Champaign 1 Joint work with Dr. Ying Huang, Dr. Wenbo He, Dr. Yan Gao, Dr. Whay Lee
  • 2. FIRST RESPONDER MOBILE SYSTEMS (FRS) EMS Sep. 11’01 Firefighter Katrina’05 First Responder Police 2 East Amarillo Complex’06
  • 3. FIRST RESPONDER SYSTEM – NETWORK MODEL  Extended Area Network  Jurisdiction Area DB Network 911 Dispatch Center JAN Police  Incident Area Network  Wireless communication system (MANET) IAN IC  Mobile devices, droppable EAN devices, vehicles PAN  Incident command system  Command center (CC) at a vehicle JANEMS  Personal Area Network  Sensors, RFID, cameras, microphone, mobile devices  Health/equipment monitoring and environmental surveillance 3
  • 4. OUTLINE  RelayPlacement In Unpredictable Environments  Problem Description  Polymorphic Networks  Optimal Relay Placement  Solutions  Constrained Relay Placement  Unconstrained Relay Placement  Evaluation  Brief Overview of other MONET group projects 4
  • 5. PROBLEM: CRITICALITY OF BASE STATION CONNECTIVITY IN FR ENVIRONMENTS  Goal: Interconnecting Base stations (BS) with Command Center (CC) to improve command coverage  Reliable control channel  Satellite, cellular, mesh, Internet portal  Real-time data flow DTN  Monitor/Report from FRs  Location tracking / health / voice MANET / surveillance  Control/Info from CC  Resource data, coordination, command control channel  We need persistent Base Station (BS) connectivity. 5
  • 6. DISMAYED TRUTH  D.C. emergency response officers quote:  Their radio systems would not operate in the underground tunnels of the Metro system.  Radio communication often falls out of range  Mine, tunnel, caves  High-rise buildings  Cargo ships (metal)  Signal Degradation  Multipath fading  Interference  Obstacles 6
  • 7. DISCONNECTED WIRELESS NETWORK NUMERICAL RESULTS FROM SIMULATION  Large incident area  Small # of FRs  Large-scale fading  Being mission-oriented, FRs are  Separately from others  Disconnected from BSes  BS connectivity metric at a sampled time t is the percentage of FRs, who have c BS connectivity F(c) = Fraction of sampled BS Connectivity  time instances, when BS For 80% time, less than 22% connectivity metric is lower FRs have connectivity to BSes. than c 7
  • 8. DROPPABLE RELAYS TO IMPROVE CONNECTIVITY  Affordable wireless relays  Communication devices, bread crumbs whose exclusive function is to forward packets for terminals, base stations and other relays, whenever needed.  Static relays  No need to maintain BS connectivity for isolated relays. 8
  • 9. OPTIMAL RELAY PLACEMENT SCHEME  Relay placement scheme  Dropped locations for relays  # of relays  Optimal relay placement scheme  Minimum number of relays  Relays are resources. We need to concern about  Number: A finite # in total  Weight: A FR can only carry a small # of relays  Optimal placement scheme is case by case  BS connectivity for all snapshots of network topologies – polymorphic networks 9
  • 10. OPTIMAL RELAY PLACEMENT SCHEME  Relay placement scheme  Dropped locations for relays  # of relays  Optimal relay placement scheme  Minimum number of relays  Relays are resources. We need to concern about  Number: A finite # in total  Weight: A FR can only carry a small # of relays  Optimal placement scheme is case by case  BS connectivity for all snapshots of network topologies – polymorphic networks 10
  • 11. USAGE OF TOPOLOGY-AWARE RELAY PLACEMENT  Offline - Analysis  Input: Discrete-ized mobility traces  Output: Performance reference for online algorithms  Online - Incident preparation and planning phase  Input: Critical topology snapshots to maintain connectivity  Major events and dispatch commands  FRs’ behavior coded by training  Output: Relay placement scheme (+ movement)  Predictability 8:3 0 8:0 0  Assumption: no hostile environment 8:0 0 11
  • 12. CONSTRAINED RELAY PLACEMENT (CRP)  Relays are placed at a subset of candidate locations  Safe distance between adjacent relays  Region-correlated crash/failure (fire, flood)  Forbidden areas  Impenetrable areas, obstacles  A deployment scheme: the set of candidate relay places RP 12 Grid Hexagon
  • 13. GRAPH REPRESENTATION FOR CRP  A graph per topology  Vertex set  Edge set  For a terminal,  finding a multi-hop path towards at least one BS Equivalent  finding a multi-hop path towards M. 13
  • 14. 1-BS-CONNECTIVITY  Node-weighted Steiner tree  Unit weight for relays; 0 weight for other nodes  Commodity flow from MC to terminals  1 unit towards each terminal  Place relays at places  commodities can flow via relays 14 Minimum node-weighted Steiner tree (8)
  • 15. OPTIMIZATION FORMULATION (1)  Single topology Flow conservation constraint Switch constraint Place relay or not at location p Flow amount on edge ij 15
  • 16. OPTIMIZATION FORMULATION (2)  Multiple topologies min ∑y p∈ RP p | T t |, i=M  s.t. ∑t xij − ∑ x tji =1, t  − i ∈T t j:ij∈E j: ji∈E t  0, otherwise  ∑ xtpj ≤ | T t | y p , ∀p ∈ RP j: pj∈E t y p ∈ {0,1} xij ∈ [0, | T t |] t 16
  • 17. UNEVEN LOAD ON BASE STATIONS  Cause congestion around heavily loaded BSes  Waste connectivity around lightly loaded BSes Topology 1 Topology 2 17
  • 18. OPTIMIZATION FORMULATION (3) min ∑y p∈ RP p | T t |, i=M  s.t. ∑t xij − ∑ x ji =1, t t  − i ∈T t j:ij∈E j: ji∈E t  0, otherwise  ∑ xtpj ≤ | T t | y p , ∀p ∈ RP j: pj∈E t ∑ xij ≤ li | T t |, t ∀i ∈ {T t , B, RP} Load balance constraint j:ij∈E t y p ∈ {0,1} xij ∈ [0, | T t |] t 18
  • 19. BALANCED LOAD  li=0.5 Topology 1 Topology 2 19
  • 20. SOLVING MIP (MIXED INTEGER PROGRAMMING) EFFICIENTLY  NP-hard  Integer Programming Algorithm (IPA)  Linear relaxation with sequential rounding  Prune process  Advantage of IPA  Holistic view across topologies  Load balance  Environmental factors  Obstacles, irregular transmission range, 2D to 3D  Flexible cost defined for a candidate relay place  Installation cost, reliability 20
  • 21. UNCONSTRAINED RELAY PLACEMENT  Relays are placed anywhere in network  Steinerization approach  1) Minimum spanning tree among terminals and BSes  2) Steinerization  Break edges into pieces with length of at most transmission range 21
  • 22. STITCH-AND-PRUNE ALGORITHM  Steinerize each topology separately T1 T2  Combine relays for all topologies  Prune redundant ones 22
  • 23. PERFORMANCE EVALUATION (1)  Square network area  2 BSes  TxRange = 100m (default)  Constrained relay placement with regular grid (100m)  Average over 20 randomly generated scenarios for each configuration IPA Integer programming algorithm w.o. load balance IPALB Integer programming algorithm w.t. load balance 23 SPA Stitch-and-prune algorithm
  • 24. PERFORMANCE EVALUATION (2)  Number of relays Same density ������������(������) = 100������ ������������(������) = 200������ 24
  • 25. PERFORMANCE EVALUATION (3)  Gain of global optimization over multiple topologies 25
  • 26. CONCLUSION  Relay placement for reliable base station communication  Constrained relay placement Integer programming formulation based on network flow 26   Unconstrained relay placement  Stitch-and-prune algorithm Constrained Model capability Optimization overhead (IPA) Unconstrained Simple Cannot handle obstacles, load balance, (SPA) algorithm; etc. Preli m Run fast Local optimization; prune by redundancy Exa m, Nov 16th
  • 27. REFERENCES  W. He, Y. Huang, K. Nahrstedt, W. C. Lee, “Mobi-Herald: Alert Propagation in Mobile Ad Hoc Networks”, ACM Mobicom 2007 (Poster Session), Montreal, Canada, Sept. , 2007  Y. Huang, W. He, K. Nahrstedt, W. C. Lee, “Requirements and System Architecture Design Consideration for First Responder Systems”, IEEE Conference on Technologies for Homeland Security Conference, Waltham, MA, May 2007  Y. Huang, W. He, K. Nahrstedt, W. Lee, “Incident Scene Mobility Analysis”, 2008 IEEE Int’l Conf. on Technologies for Homeland Security, Boston, MA, May 2008.  Y. Huang, W. He, K. Nahrstedt, W. Lee, “CORPS: Event-Driven Mobility Model for First Responders in Incident Scene”, IEEE MILCOM 2008, San Diego, CA, November 2008  Y. Huang, Y. Gao, K. Nahrstedt, “Relay Placement for Reliable Base Station Connectivity in Polymorphous Networks, IEEE SECON 2010  T. Pongthawornkamol, S. Ahmed, A. Uchiyama, K. Nahrstedt, “Zero- knowledge Real-time Indoor Tracking via Outdoor Wireless Directional 27 Antennas”, IEEE Percom’10 , Germany. March 2010  (all papers are at http://cairo.cs.uiuc.edu/publications )
  • 28. OUTLINE  RelayPlacement In Unpredictable Environments  Brief Overview of other MONET group projects 28
  • 29. MONET GROUP OVERVIEW  Department of Computer Science, University of Illinois at Urbana-Champaign  http://cs.illinois.edu  MONET Group Website  http://cairo.cs.uiuc.edu  8 PhDs in Fall 2011  3 Master Students in Fall 2011  Active Research Areas  Mobile Systems  Mobile learning communities  First responders system  Mobility patterns and data dissemination in P2P mobile systems  3D Tele-immersive Systems  View-casting  Monitoring and diagnosis in 3DTI  Multi-sender/multi-receiver synchronization  H-media – holistic multi-stream resource management for distributed immersive applications  Trustworthy Critical Infrastructures  QoS systems and protocols in SCADA systems  Jamming and security in SCADA systems
  • 30. MOBILE SYSTEMS - JYOTISH Characterizing and Leveraging Movement of People
  • 32. HOW DO WE MEASURE, CHARACTERIZE AND LEVERAGE PEOPLE MOVEMENT 1. Decide on Tracking Methodology 2. Determine Tracking Parameters 3. Collect Tracking Measurements (Mobility Traces) 4. Characterize Mobility Patterns 5. Leverage Mobility for 1. Mobility Prediction 2. Content Distribution
  • 33. 1. DECIDE ON TRACKING METHODOLOGIES  Surveys/Questionnaires  Surveillance via Video Cameras  New Tracking Methods via mobile devices such as  Cellular Device Monitoring  WiFi Device Monitoring  Bluetooth Device Monitoring  Sound Monitoring  Combination of Tracking methods
  • 34. 2. DETERMINE TRACKING PARAMETERS  Contact Parameters  Probability of contact (encounter)  Duration of contact  Frequency of contact  Environment Parameters  Tracking number of days  Period of scanning (accuracy of tracked data)  Homogeneity of mobility patterns  Mobile Device Parameters  Speed of person carrying mobile device  Density of mobile devices
  • 35. 3. COLLECT TRACE EXAMPLE: TRACKING VIA UIM University Campus UIM – University of Illinois Movement  Collects MAC addresses of Wifi APs and Bluetooth- enabled devices  Wifi AP MACs are used to infer location information  Bluetooth MACs are used to infer social contact  Deployed on Android phones carried by professors, staff, and students from March to August 2010  UIM trace available online!!!! http://dprg.cs.uiuc.edu/downloads
  • 36. 4. CHARACTERIZING PEOPLE MOVEMENT FOUND IN UIM TRACE (1)  Location is regular if person visits location at the same time slot for at least half number of days  People visit regular locations (plot is from 50 participants)
  • 37. 5. LEVERAGE (1): UIM-BASED CONSTRUCTION METHOD OF PREDICTIVE MODEL (JYOTISH)
  • 38. PERFORMANCE OF TOP-K CONTACT PREDICTOR  If at least one contact is predicted correctly, top-k contact predictor is correct  With k=5, 60% of participants have more than 75% of correct contact predictions L. Vu, Q. Do, K. Nahrstedt, “Jyotish: A Novel Framework for Constructing Predictive Model of People Movement from Joint Wifi/Bluetooth Trace”, IEEE Percom 2011 (Mark Weiser Best Paper)
  • 39. 5. LEVERAGE (2): COMMUNITY-BASED DATA ROUTING/FORWARDING PROTOCOL (COMFA)  Observation from UIM traces  People make regular social contacts in their daily activities and form social communities and share interests such as music or sports  Approach PROPHET 3R 0.3 0.1 0.1 0.9 0.5 0.7 0.5 0.15 0.4 0.2 0.8 0.1 0.2 0.2 0.2 0.3 time slot1 slot2 slot3 time
  • 40. 3R RESULTS: DELIVERY RATIO • Settings • 100 senders/receivers via 9 phones carried by MONET research group members from March 01 to March 20, 2010 • Message delay deadline 12 hours • Each node has 20 days of trace 3R PROPHET EPIDEMIC  Epidemic performs best due to its flooding nature  Epidemic outperforms 3R by 10%  3R outperforms Prophet by 9%
  • 41. TEEVE – -ENVIRONMENTS FOR EVERYBODY 3D Tele-immersion
  • 42. HIGH-LEVEL VISION – MAKING DISTANCE IRRELEVANT AND TELE-IMMERSION FOR EVERYBODY (TEEVE) 4 Photo courtesy of Prof. Ruzena Bajcsy. 2
  • 43. Static Immersive Spaces for Physiotherapy 43
  • 44. MULTI-PARTY TELE-IMMERSIVE D ACTIVITY SYSTEMS D C C C C SG SG session Internet controller SG D D SG SG C D C D D C C C 4 4 SG service gateway D 3D display C 3D camera
  • 45. VIEW-AWARE STREAM DIFFERENTIATION 3D capturing 3D rendering 3D camera 8 8 less important streams 6 2 transmission 6 2 4 4 streams contributing more to user view user view
  • 46. VIEW-CASTING V2 U2 session controller V1 V3 U3 U4.w U3.w U2.w V4 U4 user view
  • 47. TRUST IN SCADA SYSTEMS Trustworthy Cyber Infrastructure for Power Grid (TCIPG) Research at University of Illinois, Urbana-Champaign
  • 48. TCIPG SUMMARY  TCIPG – premier center in USA in the area of trust- worthy cyber-infrastructure for power-grid infrastructures  Trustworthy cyber-infrastructure research for power- grid is now going on  Previous 5 years (NSF) – wealth of knowledge, experiences, scientific results  New 5 years (DOE)  World-leading experts in power engineering are part of TCIPG (Prof. Sauer, Overbye, Gross, Thomas)  World-leading experts in reliability, security and real- time are part of TCIPG (Prof. Sanders, Gunter, Nicol, Nahrstedt, Campbell, Smith, Hauser, Bakken, Khurana, and other experts) 48
  • 49. THE CHALLENGE: PROVIDING TRUSTWORTHY SMART GRID OPERATION IN POSSIBLY HOSTILE ENVIRONMENTS  Trustworthy  A system which does what is supposed to do, and nothing else  Availability, Security, Safety, …  Hostile Environment  Accidental Failures  Design Flaws  Malicious Attacks  Cyber Physical  Must make the whole system trustworthy, including both physical & cyber components, and their interaction. 49
  • 50. SMART POWER GRID OF TOMORROW: TRANSMISSION GRID WITH SYNCHROPHASOR SENSORS • NASPI Initiative, funded by DOE and industry, to investigate putting Phasor Measurement Units (PMUs) throughout physical power infrastructure • Need significant changes in power cyber infrastructure to support PMUs • “Class A” service requires low latency, data integrity & availability (“no gaps”) 50
  • 51. SMART POWER GRID OF TOMORROW: CONTROL OF ELECTRICAL EQUIPMENT AND AN OPEN GRID Consumer Portal: • Security issues are huge – Privacy, billing integrity, Mischief, vandalism, intrusion, Consumer manipulation of system Demand Response: • Extends the Control Loop – Links distribution and transmission – Increases real time requirements – Provides bigger surface for Who is responsible for security? security violations • Consumer? Utility? 51
  • 52. (MONET RESEARCH) NEED FOR SECURE WIRELESS NETWORKS  No wireless network deployed broadly today in Power Grid (some early adapters – nuclear industry)  EPRI recommendations for usage of wireless technology in substation network architecture (Report, Jan. 2009)  ISA100 standard efforts leveraging other standards, as appropriate, to produce a relevant result in as short a time frame as possible  ISA99 – Security  IEEE 1451 – Smart sensor  FIPS 140-2 – Security  ISO/OSI 7-layer model for network connectivity 52
  • 53. ALIBI: CONTAINMENT OF JAMMING ATTACKS  Goal • Attack Model  Containment of • Taking into account one jammer jamming attacks with “inside” knowledge Knows shared hopping pattern Requirements 1.  2. Knows any systems’ protocol  Detecting & 3. Uses listen-n-jam strategy Identifying one jammer in the single-hop wireless 5 network with time- 1 slotted communication BS 2 4 3 53
  • 54. CONCLUSIONS  FRs move in very challenging unstructured environments  FRs with mobile devices represent a challenging mobile ad hoc network that needs to communicate with commanders connected via wireless infrastructure network brought by FRs  Challenges: Deployment of ad hoc and BS communication infrastructure on the incident scene  Placement algorithms needed (offline and online)  Exciting Projects in MONET group exploring  QoS-issues and security issues in critical infrastructures, mobile infrastructures, and 3D multimedia infrastructures 54
  • 55. ACKNOWLEDGMENTS  The work on first responders is funded by Vodafone fellowship, and Motorola Center and Illinois-Boeing Center funding grants.  The work on Characterizing and Leveraging People Movement is funded by the Illinois-Boeing Center funding grant.  The work on Tele-immersive Systems is funded by the National Science Foundation (NSF).  The work on Trustworthy Communication in 55 SCADA networks is funded by the NSF and Department of Energy (DOE).
  • 56. Missing part Problem: Efficient in mobile ad hoc networks Alert Service Detection Alert Propagation Reaction  Efficient Alert Message Distribution Watch Dog Pathrater Relatively small FR Environment:  communication overhead   Capable to handle  Mobile Ad-hoc temporary network Networks partition  Problem:  In spite of mobility,  How to trigger the majority of the network can defense against be aware of the alert. malicious attacks in the  Against Collusive whole network after Slander Attacks malicious behavior is detected locally?   Slanderers can issue a DoS Alert Propagation attack easily by defaming other nodes.  Solution: Mobility Assisted 56  Alert Propagation
  • 57. MOBI-HERALD ARCHITECTURE Confirm alert Threshold-based message m Alert Propagation Verification Management Report received Control alert alert messages propagation Mobility-assisted Epidemic Routing Receive alert Periodically propagate messages alert message m 57
  • 58. MOBILITY ASSISTED EPIDEMIC ROUTING: ADVANTAGES  Mobility-assisted epidemic routing is able to deliver a message to almost all the nodes even under intermittent network partitions. Flooding protocol cannot deliver message to the whole network if a mobile network is partitioned.  In mobility-assisted epidemic routing, transmissions can be more efficient. Mobility assisted epidemic routing A A B B Flooding 58
  • 59. EXAMPLE (2) t=t0+T (1) t=t0 (3) t=t0+2T (4) t=t0+3T 59
  • 60. MOBI-HERALD EPIDEMIC ROUTING: PROTOCOL  A mobile node retransmits a message periodically  A node suppresses transmission if it hears the transmission in the same period (within ∆ time slot). Retransmissions of a message time T T T 60
  • 61. QUORUM-BASED VERIFICATION  Assuming k is the number of collusive slanders, a node does not actively forward the received alert Unaware message before it received Listening to alert Q (Q>k) copies of the alert ag py De havi messages ess t co em tec or be message. rt m firs ted dir ale he ma ectl an d t lic y of eive iou c s AlertedRe Confirmed Received Q alert messages m Listening to Periodically (assuming Quorum size is Q) more copies of propagate the the m alert message m Received less than Q copies of m 61
  • 62. ALERT PROPAGATION MANAGER  Balance reliability and efficiency A parameter “Times-to-send (TTS)” is attached in the message header, which indicates how many times an alert should be retransmitted by a mobile herald. Large TTS  large message overhead Small TTS  Small coverage of message delivery  Balance end-to-end delay of alert propagation and efficiency Period of alert propagation “T” Large T  large end-to-end delay Small T  less efficiency of retransmissions 62
  • 63. SELECTION OF T r Moving direction Location of Location of previous current transmission transmission T 2r Preferably T= vavg 63
  • 64. SIMULATION RESULTS  Wesimulate Mobi-herald alert propagation protocol under Random Waypoint mobility pattern.  Evaluation Metrics  End-to-end alert message delivery delay  Coverage of an alert message 64
  • 65. END-TO-END ALERT MESSAGE DELIVERY DELAY (REAL-TIME ALERT) Threshold Q=1 Threshold Q=3 10 35 Delay of alert propagation (minute) Delay of alert propagation (minute) average degree = 2 average degree = 2 9 average degree = 4 average degree = 4 30 average degree = 9 average degree = 9 8 average degree =14 average degree = 14 7 25 6 20 5 15 4 3 10 2 5 1 0 0 20 30 40 20 30 40 Transmission range (meter) Transmission rage (meter) 65
  • 66. COVERAGE OF MESSAGE DELIVERY Flooding Mobi-Herald N=264 N=442 N=884 N=1326 N=264 N=442 N=884 N=1326 Coverage of message delivery Coverage of message delivery (d=2) (d=4) (d=9) (d=14) (d=2) (d=4) (d=9) (d=14) 1 1 0.8 0.8 0.6 0.6 0.4 0.4 0.2 0.2 0 0 1 2 3 1 2 3 Confirmation threshold Q Confirmation threshold Q 66