Panos Pardalos Distinguished Professor Center for Applied Optimization Dept. of Industrial and Systems Engineering, University of Florida DIMACS/DyDAn Workshop: Approximation Algorithms in Wireless Ad Hoc and Sensor Networks April 22 - 24, 2009 Sensors Everywhere Introduction Data Fusion Sensor Network Design Sensor Network Localization Sensor Scheduling Network Interdiction Sensors Everywhere Introduction Data Fusion Sensor Network Design Sensor Network Localization Sensor Scheduling Network Interdiction What are sensors? A sensor is a device that responds to a physical stimulus (e.g. heat, light, sound, pressure, magnetism, or motion). It collects and measures data regarding some property of a phenomenon, object, or material. Typical sensors are cameras, radiometers and scanners, lasers, radio frequency receivers, radar systems, sonar, thermal devices, seismographs, magnetometers, gravimeters, and scintillometers. The term "Remote Sensing" indicates that the measuring device is not physically in close proximity with the phenomenon being observed. Each year hundreds millions of sensors are manufactured. They are in domestic appliances, medical equipment, industrial control systems, airconditioning systems, aircraft, satellites and toys. Sensors are becoming smarter, more accurate and cheaper. They will play an ever increasing role in just about every field imaginable. How can nanotechnology improve the performance of sensors? The application of nanotechnology to sensors should allow improvements in functionality. In particular, new biosensor technology combined with micro and nanofabrication technology can deliver a huge range of applications. They should also lead to much decreased size, enabling the integration of nanosensors into many other devices. Sensor Networks A sensor network is a collection of some (sometimes even hundreds & thousands) smart sensor nodes which collaborate among themselves to form a sensing network. Sensor Applications Homeland security Radiation detection and standards X-ray detectors and imaging Integrated System Health Management (ISHM) Multisensor Data Fusion Nondestructive Evaluation and Remote Sensing Commercial Development Environmental sensing Medical/healthcare sensing Robotic and remote sensing Tomography Domestic electronics and smart homes Crime prevention Automotive and aerospace Leisure industry and toys Food and agriculture Marine Energy and Power Sensors Everywhere Introduction Data Fusion Sensor Network Design Sensor Network Localization Sensor Scheduling Network Interdiction Data Fusion Combine information from many sensors to have a better picture than the sensors were used individually More accurate, more complete, more reliable Sensors fusion algorithms use machine learning techniques: Statistical inference and forecasting Kalman Filter Bayesian Networks Neural Networks Fuzzy Logic Dempster-Shaffer Sensor Network Design Finding optimal network topology accounts the following characteristics: Fault tolerance The ability to sustain sensor network functionalities without any interruption due to sensor node failures Scalability A well designed architecture must be able to work with large number of nodes Costs constraints Deployment, Maintenance, etc Hardware constraints Size, Weight, Transmitting, etc Sensors Everywhere Introduction Data Fusion Sensor Network Design Sensor Network Localization Sensor Scheduling Network Interdiction Sensor Network Localization Network topology identification: Ad hoc and dynamics networks; Sensor’s parameters can depend on it’s location: Transmission characteristics; Energy consumption; Reliability. Installing GPS receivers in every sensor – too expensive; Mathematical programming techniques often allow to find efficient solutions. Ad hoc positioning system using angle of arrival Typically, a few nodes of the network know their location - landmarks (equipped with GPS); The rest of the nodes can communicate to other nodes; Every node has a capability to determine the angle of the arriving signal; Every node in the network has fixed main axis to measure all angles against it. Every node can only communicate with its neighbors within the radio range (they may not know their location). Ad hoc positioning system using angle of arrival Nodes with angle of arrival (AOA) capability Ad hoc positioning system using angle of arrival Nodes immediately adjacent to a landmark get their angle directly from the landmark. If a node has some neighbors with orientation for a landmark, it will be able to compute its own orientation with respect to that landmark, and forward it further into the network. Knowledge of orientation to two other nodes (which are not on one line) allows to calculate location of the node by triangulation. Ad hoc positioning system using angle of arrival Node A computes its orientation to remote node L using information from B and C Ad hoc positioning system using angle of arrival Probability for a node to satisfy conditions necessary for orientation forwarding Ad hoc positioning system using angle of arrival The proposed method calculates position of nodes in Ad hoc network where nodes can measure angle of arriving signal; All nodes have AOA capability and only a fraction have self position capability Simulations showed that resulted positions have an accuracy comparable to the radio range between nodes, and resulted orientations are usable for navigational or tracking purposes. Localization via Semidefinite Programming Tomorrow (April, 23) Semidefinite Programming, Graph Realization, and Sensor Network Localization. Yinyu Ye, Stanford University Reduction to Semidefinite Programming Solution existence Statistical interpretation of the formulation (distance values are random with normally distributed measurement errors) Reference Sorokin, A.; Boyko N.; Boginski V.; Uryasev S.; Pardalos P. Mathematical Programming Techniques for Sensor Networks. Algoritms, 2009, p. 565-581 Sensors Everywhere Introduction Data Fusion Sensor Network Design Sensor Network Localization Sensor Scheduling Network Interdiction Sensor Scheduling Scheduling problem – m sensors, n sites to observe, n>m. The problem is to find the schedule that reduces potential loss of limited observations. Single sensor scheduling Multiple sensor schedule using percentile type constrains Sensor Scheduling Scheduling problem – m sensors, n sites to observe, n>m. The problem is to find the schedule that reduces potential loss of limited observations. Single sensor scheduling Multiple sensor schedule using percentile type constrains Single Sensor Scheduling The simplest case is to model one sensor that observes a group of sites at discreet time point Time for changing a site being observed is negligibly small Assume we need to observe n sites during T time periods During every period a sensor is allowed to watch only at one of n sites Single Sensor Scheduling Decision variable: Penalty for not observing site i at time t: ai - fixed penalty; bi ,t - variable penalty; yi ,t - time of last observing site i before time moment t; yi ,t is set to t if and only if the sensor is observing site i at time t otherwise it remains constant - only one site may be observed at a time Single Sensor Scheduling Problem Formulation: Reference This problem was first formulated for one sensor in M. Yavuz and D.E. Jeffcoat. Single sensor scheduling for multi-site surveillance. Technical report, Air Force Research Laboratory, 2007. Sensor Scheduling Single sensor scheduling Multiple sensor schedule using percentile type constrains Multiple Sensor Scheduling Next talk: Vladimir Boginski will present sensors scheduling problem Multiple sensors Stochastic Setup Robust formulation using Conditional Value at Risk (CVaR) Joint work with N. Boyko, T. Turko, D.E. Jeffcoat, S. Uryasev, P.M. Pardalos Sensors Everywhere Introduction Data Fusion Sensor Network Design Sensor Network Localization Sensor Scheduling Network Interdiction Network Interdiction An important issue in military applications is to neutralize the communication in the sensors network of the enemy Given a graph whose arcs represent the communication links in the graph. (Offense) Select at most k nodes to target whose removal creates the maximum network disruption. (Defense) Determine which of your nodes to protect from enemy disruptions. Problem Definition Decision Version: K-CNP Input: Undirected graph G = (V,E) and integer k Question: Is there a set M, where M is the set of all maximal connected components of G obtained by deleting k nodes or less, such that iM i ( i 1) 2 K where σi is the cardinality of component i, for all i in M? Theoretical Results Lemma 1: Let M be a partition of G = (V,E) in to L components obtained by deleting a set D, where | V | k |D| = k Then the objective (| V | k function ) 1 i ( i 1) L 2 2 iM with equality holding if and only σi = σj, for all i,j in M, where σi is the size of ith component of M. Objective function is best when components are of average size. Theoretical Results Lemma 2: Let M1 and M2 be a two sets of partitions of G = (V,E) obtained by deleting a set D1 and D2 sets of nodes respectively, where |D1| = |D2| = k. Let L1 and L2 be the number of components in M1 and M2 respectively, and L1 ≥ L2. If σi = σj, for all i,j in M1, then we obtain a better objective function value by deleting D1. Proof of NP-Completeness NP-complete: Reduction from Independent Set Problem by a simple transformation and the result follow from the above Lemmas. Formulation Let ui,j = 1, if i and j are in the same component of G(V \ A), and 0 otherwise. Let vi = 1, if node i is deleted in the optimal solution, and 0 otherwise. We can formulate the CNP as the following integer linear program Formulation Formulation If i and j in different components and there is an edge between them, at least one must be deleted Formulation Number of nodes deleted is at most k. Formulation For all triplets (i,j,k), if (i,j) in same comp and (j,k) in same comp, then (i,k) in same comp. Heuristics We implement a heuristic based on Maximal Independent Sets Why? Because induced subgraph is empty Maximum Independent Set provides upper bound on # of components in optimal solution. Greedy type procedure Enhanced with local search procedure Results are excellent Heuristic obtains optimal solutions in fraction of time required by CPLEX Runs in O(k2 + |V|k) time. Results •This is the case you just saw!! •Optimal solutions computed for all values of k for this graph •The solutions are computed very quickly Conclusions and Future Work Identified nodes of sparse Breakdown communication Integer Programming and Heuristics Approximation algorithms Weighted version of the problems Reference A. Arulselvan, C.W. Commander, P.M. Pardalos, and O. Shylo. Managing network risk via critical node identification. Risk Management in Telecommunication Networks, N. Gulpinar and B. Rustem (editors), Springer, 2009 Conclusions Applications Health care Military Security and law enforcement Satellite surveillance … essentially Everywhere! Research Directions Computational complexity Stochasticity Robustness … Thank You! Questions?