Error-Correcting Sequence-Based Localization for Wireless Ad Hoc

advertisement
Error-Correcting Sequence-Based
Localization for Wireless Networks:
A New Paradigm
Location esitmate for 123745968
Bhaskar Krishnamachari
Autonomous Networks Research Group
Dept. of EE-Systems
USC Viterbi School of Engineering
http://ceng.usc.edu/~anrg
bkrishna@usc.edu
12
Y-AXIS (length units)
11
10
9
A4
A5
A8
A2
A7
A6
A1
A3
A9
8
7
6
5
4
P
3
E
2
1
0
1
2
3
4
5
6
7
8
9 10 11 12
X-AXIS (length units)
ARO Workshop, Seattle, June 1415, 2005
1
Overview
• Location information is a fundamental building block for
self-organized wireless ad-hoc and sensor networks. It is
important for
–
–
–
–
stamping sensor measurements
target tracking
topology formation
routing and querying
• Thus far, the primary focus in designing localization
algorithms has been on functionality.
• Critical challenges of fault-tolerance and security have
been largely ignored.
2
Securing Localization
• Localization algorithms can be made secure and robust
in a number of complementary ways:
– developing tamper-proof hardware
– securing measurements through cryptographic algorithms
– patches to existing algorithms to address identified vulnerabilities
– developing a fundamentally new class of localization algorithms
3
Thesis
• A new class of sequence-decoding localization
algorithms, with the potential to automatically detect and
correct errors introduced by the environment as well as
malicious attackers, will be a key component of future
tactical wireless networks.
4
Traditional Forward Error Correction
encoder
original message
higher dimension
codeword
channel with error
decoder
corrupted
packet
“nearest”
correct codeword
received message
• FEC is at the heart of modern high-performance wireless
communication.
• A major field of research for several decades
• Latest FEC techniques (turbo codes, LDPC codes) can provide low5
error communication within 0.1 dB of theoretical Shannon limit
Error Correcting Localization
encoder
ideal signals
corrupted signals
(RSS, TDOA, AOA, etc.)
noise/environmental errors
malicious errors
decoder
codeword
corrupted
codeword
“nearest”
correct codeword
decoded
location
6
Ecolocation
•
A novel RF-only sequence-based error-correcting localization technique
currently under development
•
Empirically shown to have superior performance compared to state of the
art techniques
•
“Tip of the iceberg”
Reference:
Yedavalli, Krishnamachari, Srinivasan, Ravula, “Ecolocation: A sequence based
technique for RF-only localization in wireless sensor networks,” IPSN 2005.
7
Ecolocation
• Basic idea: look at the sequence indicating relative
ranking of RSSI measurements, not absolute values
• Each sequence ideally corresponds to a unique location
region
• Provides a way to decode location with high accuracy, even
given a possibly erroneous sequence.
8
The Basic Algorithm
 Unknown node sends a beacon.
 Nearby reference nodes measure RSSI and send to computation
point.
 Sequence is determined and expressed as a set of ordering
constraints.
 Most likely location is computed based on this measured
sequence
9
Illustration
• Sequence: ADBC
DC
B
AD
BC
D
C
A
AB
AC
DB
10
Motivation
• Ordered sequence is inherently more robust to amplitude
fading fluctuations than absolute signal strengths
• Many corrupt sequences do not correspond to any valid
locations - hence error is easily detected and can be
corrected in most cases by mapping to nearest valid
sequence. Specifically, the number of feasible codeword
sequences is only O(n4) out of n! possible (corrupt)
sequences.
11
Location Determination
 Consider a grid of location points in the environment
 Determine ideal sequence for a given possible location of the
unknown node
 Look at the measured sequence and compare with above to
determine number of satisfied/violated constraints
 Identify location(s) that maximizes the number of satisfied
constraints
• Optimizations: Multiresolution search/Greedy approaches
can significantly cut down on search time and computation
12
An alternative approach
• Precompute regions in the location space corresponding to
feasible error-free sequences (not all possible sequences are
feasible)
• Determine the feasible sequence that “best” matches received
sequence and return the corresponding location
• Can yield a much faster solution, can also be optimized
through multi-resolution/greedy approaches
13
Order Constraints
1
2
A
5
F
3
4
B
C
D
E
14
Constraint Violations
RSSI as a function of distance
-90
-80
B
-70
-60
RSSI (dBm)
1
-50
-40
-30
-20
2
A
4
F
3
5
-10
C
0
0
2
6
10
16.12
17.08 18
Distance (feet)
D
E
15
Illustration
Location estimate for 123456789
12
Y-AXIS (length units)
11
10
9
A5
A6
A9
A2
A4
A8
A1
A3
A7
8
7
6
5
4
P
3
E
2
1
0
1
2
3
4
5
6
7
8
9 10 11 12
X-AXIS (length units)
NO ERRONEOUS CONSTRAINTS
16
Illustration
Location esitmate for 123745968
12
Y-AXIS (length units)
11
10
9
A4
A5
A8
A2
A7
A6
A1
A3
A9
8
7
6
5
4
P
3
E
2
1
0
1
2
3
4
5
6
7
8
9 10 11 12
X-AXIS (length units)
13.9% ERRONEOUS CONSTRAINTS
17
Illustration
Location estimate for 234567891
12
Y-AXIS (length units)
11
10
9
A6
A7
A1
A3
A5
A9
8
7
6
5
4
P
3
E
2
A2
1
0
1
2
3
A8
A4
4
5
6
7
8
9 10 11 12
X-AXIS (length units)
22.2% ERRONEOUS CONSTRAINTS
18
Illustration
Location estimate for 913276584
12
Y-AXIS (length units)
11
10
A6
A4
A1
A2
A8
A9
A3
A5
A7
9
8
E
7
6
5
4
P
3
2
1
0
1
2
3
4
5
6
7
8
9 10 11 12
X-AXIS (length units)
47.2% ERRONEOUS CONSTRAINTS
19
Evaluation
• Simulation Model:
– RSS samples generated using log-normal shadowing model
• Simulation Parameters:
– RF Channel Characteristics
• Path loss exponent (η)
• Standard deviation of log-normal shadowing model (σ)
– Node Deployment Parameters
•
•
•
•
Number of reference nodes (α)
Reference node density (β)
Scanning resolution (γ)
Random placement of nodes
20
RF-only State of the Art
• Pattern Recognition (e.g. RADAR)
• Centroids
• Approximate Point in Triangle (APIT)
• RSSI-based Maximum Likelihood Estimation (MLE)
• RSSI-based Minimum Mean Squared Error Estimation (MMSE)
• Proximity (nearest reference, an extreme special case of
ECOLOCATION)
21
22
Experiments with Real Measurements
• Outdoors: Parking Lot.
– Eleven MICA 2 motes placed randomly in an unobstructed 144
sq. m area
– Locations of all motes estimated and compared with true position
• Indoors: 3rd floor of EE building
– Twelve MICA 2 motes placed randomly in an obstructed 120 sq.
m area in an office building
– unknown node placed at five locations for position estimation
23
Empirical Results (1)
24
Empirical Results (2)
25
Empirical Results (3)
26
Empirical Results (4)
27
Observations
• Ecolocation is self-configuring - it does not require prior
measurement of environment. It is robust and efficient in dense
settings.
• Can be easily extended to 3D environments and to incorporate other
available information (including antenna orientations, operational
area constraints)
• Most importantly, Ecolocation can also detect and mitigate induced
errors from malicious nodes. (Each adversary can forge at most n-1
constraints out of n(n-1)/2 )
28
Research Agenda
• Intermediate term: develop Ecolocation
– Full, optimized testbed implementation of Ecolocation taking into
account resource constraints on energy, computation, and
communication
– Quantifying security using different adversarial models
– Theoretical analysis of gains from error correction (is there an
equivalent to coding gain in communications?)
29
Research Agenda
• Long term: Develop and analyze a wide range of
sequence/codeword-based error correcting localization
algorithms suitable for different contexts:
– with other signal measurement modalities (angles, TDoA-based
ranges, etc.)
– under different density/mobility assumptions
– for network localization (multiple unknown nodes)
30
Additional Thoughts
• Enable multiple “competing” solutions
• Develop a “standard suite” of benchmark problems for
comparisons
– realistic empirical traces or real common test-bed
– different environmental operating conditions (density, mobility,
resource constraints, indoor/outdoor, interference)
– different modalities (pure RF, multimodal TDoA)
– different localization requirements (single/multiple unknown
node, cooperating/non-cooperating nodes, different accuracy
and precision requirements, etc.)
– different attack models and assumptions
31
Download