A PursuerEvader Game for Sensor Networks - PowerPoint PPT Presentation

1 / 37
About This Presentation
Title:

A PursuerEvader Game for Sensor Networks

Description:

Each mote communicates with each neighbor at every time step ... Explicit stabilizing actions need to be added for motes outside of tracking tree. ... – PowerPoint PPT presentation

Number of Views:36
Avg rating:3.0/5.0
Slides: 38
Provided by: johnOles
Category:

less

Transcript and Presenter's Notes

Title: A PursuerEvader Game for Sensor Networks


1
A Pursuer-Evader Game for Sensor Networks
  • By Murat Demirbas, Anish Arora, Mohamed Gouda
  • Presented 4/17/03 by John Oleszkiewicz

2
Roadmap
  • Problem Description
  • System Description
  • Evader-Centric Algorithm
  • Pursuer-Centric Algorithm
  • Hybrid Algorithm
  • Extended Hybrid Algorithm

3
  • Problem Description

4
The Pursuer-Evader Problem
  • Goal For each computation, the pursuer must
    eventually catch an evader
  • Catching being in the same location in a graph

5
Evader
  • May know state of entire graph
  • e.g. May be omniscient
  • Can choose any evasion strategy it likes

6
Pursuer
  • May only use local information
  • Is faster than the evader

7
Pursuer-Evader in Sensor Networks
  • Previous work does not present solutions
    applicable to sensor networks
  • Nodes are too energy constrained
  • Limited computational resources are available
  • Sensors are fault-prone
  • No on-site maintenance is available
  • Plus...
  • Purser-Evader in Sensor Networks money

8
  • System Description

9
Notation
  • ltguardgt --gt statement
  • j, k, l represent motes
  • var.j A variable at mote j
  • x e A x is assigned to an element of set A
  • Evader resides at j true for all states where
    evader is at j
  • Evader detected at j true in any step where
    the evader moves to j false any other time

10
Motes
  • Each mote consists of
  • A system clock
  • A timestamp variable
  • A pointer to another mote
  • Each mote can
  • Sense the evader
  • Sense the pursuer
  • Change its own variables
  • Read the variables of its neighbors

11
Graph
  • Undirected, connected
  • N number of motes
  • D diameter
  • M distance between pursuer and evader
  • a ratio of speed of evader to pursuer
  • ? average degree of each mote
  • Transient faults only
  • Faults do not cause loss of connectivity

12
Pursuer and Evader Actions
13
System Graph
14
Performance Metrics
  • How many communications are performed?
  • How fast is the evader caught?

15
Evader-Centric Algorithm
16
Mote Actions
17
Tracking Tree
18
Performance Metrics
  • Each mote communicates with each neighbor at
    every time step
  • Number of communications at each step N?
  • Not very energy efficient
  • Evader will be captured quickly
  • At most in M 2M a / (1-a) steps
  • M steps for tracking tree construction, 2M for
    maximum distance between evader and pursuer after
    construction

19
Stabilization
  • Assuming
  • ts.j lt clock.j
  • p.j is either a nbr.j, j or NULL
  • A fresh tracking tree is reconstructed in at most
    D steps
  • Starting from an arbitrarily corrupted state, the
    pursuer catches the evader in at most
  • D 2D a / (1 a)

20
Pursuer-Centric Algorithm
21
Mote Actions
22
Pursuer-Centric Graph
23
Performance Metrics
  • At each time step, only one node communicates
    with all of its neighbors
  • Number of communications at each step ?
  • Energy efficient
  • Evader will not be captured quickly
  • Random walk to pick up the trail - O(n3)
  • Can be improved to O(N2logN) with topology info
  • Once pursuer finds the trail, evader will be
    captured in N a / (1 a) steps

24
Stabilization
  • Timestamps are reset to 0 every time the pursuer
    visits
  • Eventually corrupted timestamps disappear.

25
Hybrid Algorithm
26
Mote Actions
27
Mote Actions (con't)
28
Hybrid Graph
29
Performance Metrics
  • Metrics are tuneable to the application needs
  • Tracking tree communication and pursuer-centric
    communication required.
  • n ? ?
  • Evader will be caught faster than pursuer-centric
  • O(N-n)2 log (N-n) steps to find the tracking
    tree
  • R (a / 1 a) steps to catch pursuer

30
Stabilization
  • Tracking tree ok...
  • Explicit stabilizing actions need to be added for
    motes outside of tracking tree.
  • Detect invalid parents
  • Correct fake tree roots

31
Mote Stabilization Actions
32
Extended Hybrid Algorithm
33
Extended Pursuer-Centric
  • The pursuer uses agents to search for a trace of
    the evader.
  • Previous method random walk
  • If an agent finds a timestamp greater than 0, it
    reports back to the pursuer
  • Does not use mote communications
  • Provides path from pursuer to mote

34
Extended Hybrid
35
Performance Metrics
  • Communication
  • Each step n ? communications occur
  • One-time cost of 2(D-R)? for pursuer tree
  • Evader caught more quickly than hybrid version
  • 3(D-R) R a / (1 a) steps
  • (2D steps for pursuer tree construction D steps
    to follow path through pursuer tree)

36
Other Issues
  • 1-pursuer 0-evader scenario
  • Evader-centric no energy expended
  • Pursuer-centric ? communications per step
  • Hybrid ? communications per step
  • Extended Hybrid Path returned only if evader
    tree encountered. No energy expended otherwise.
  • 0-pursuer 1-evader scenario
  • Force pursuers to authenticate themselves when
    they join the network and notify the network when
    they leave.

37
Thanks for Listening!
Write a Comment
User Comments (0)
About PowerShow.com