recovering data from corrupt packets sensys 2013 ewsn 2014

25
Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

Upload: nancy-barrett

Post on 17-Jan-2018

221 views

Category:

Documents


0 download

DESCRIPTION

DSSS in Standard  A byte = 2 four-bit symbols  Echo symbol is finally represented by a 32-bit log chip sequence (i.e. the rightmost table)  What happened when takes noise into consideration ?  Corruption may happen

TRANSCRIPT

Page 1: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

Recovering Data From Corrupt PacketsSENSYS 2013EWSN 2014

Page 2: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

Typical procedure of transmissionTechniques for overcoming bit errors

ARQ : Automatic Repeat reQuestFEC : Forward Error CorrectionOr the combination : HARQ

Interesting things happened when it finds a corrupted packet during the CRC detection process!All IS NOT LOST(ANL): a opportunistic approachTVA: an novel method of CRC correcting

Page 3: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

DSSS in 802.15.4 StandardA byte = 2 four-bit symbols

Echo symbol is finally represented by a 32-bit log chip sequence (i.e. the rightmost table)

What happened when takes noise into consideration ?Corruption may happen

Page 4: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

ANL : ObservationDeployment

16 nodesOne year from 2012 to 2013

Mutation Matrix:Each entry denotes a mutation frequency

One Observation:Mutations are not uniformly distributed

Page 5: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

ANL : Recovering DataConsider a received symbol

E.g s13,p(s5|s13)=

Consider a received sequence of symbolsE.g receive symbol sequence r = (s13,s3,s0,s11) a possible sent sequence t = (s5,s3,s1,s11)

Key idea: compute a probability distribution over the possible sent packets

Page 6: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

ANL : Left questionsHow to generate the mutation matrix?

Through Simulation

How to estimate pchip : using LQI

Is the actual sent word is assigned the highest rank?(95% of them are)

Page 7: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

TVA-A reliable protocol Procedure

Feature:A novel method of CRC error correctionCompact and computationally efficientDesigned to correct the most common error

patterns observed in WSNs

Page 8: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

CRC error correction TheoryTabular Method

m2 - the received msg ; m1 – the sent msg ; e – the error pattern we want to correct

Prebuild a table using CRCs of target error pattern P as indexIndex into the table with c and get error sequence e.The corrected message

Cyclic Method anyway,reduced memory requirement needed by single Tabular Method e.g 64 bytes to correct 4-bit-bursts in 40 bytes of data , while the tabular method uses 10KB

…… CRC(e1) CRC(e2) CRC(e3) ……

...... e1 e2 e3 ……

Page 9: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

Reliability of TVA:verifyCorrection process:m1

Risk : if CRC(e1) = CRC(e2) and

Verify : compare the sender side CRC and receiver side CRC

So what is this polynomial P?

Not the correcting polynomial G : since CRC(m1 e1 e2 ) = CRC(m1) CRC(e1) CRC(e2) = CRC(m1)

The key property of the polynomial P : it does not fail to detect a message error consisting of a common channel error XOR’d with a correction error

⊕e 1 e2…… CRC(e2)=c ……

…… e2 ……

Page 10: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

Searching for Polynomials:results

Page 11: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

Performance Comparison

Page 12: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

Conclusion of two workSolve the same issue

Recovering information from corrupt packetDifferent method

ANL : a probabilistic approach TVA : CRC error correcting

Combination Possibility?

Page 13: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

谢谢!

Page 14: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014
Page 15: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014
Page 16: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014
Page 17: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014
Page 18: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

Comparison with other protocol

Page 19: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014
Page 20: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

Outline1.All is not lost

the distinct pattern of how 802.15.4 packets are corrupted

an probabilistically approach infers the original content of a corrupt packet

2.Unlocking the full power of the CRC

a novel method of CRC error correction

a protocol TVA making use of the error correcting ability of CRC

Page 21: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

Comparision with ANL

Page 22: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

ObservationsObservation 1:Mutations are not uniformaly distributed

Observation 2:The most significant bit of a symbol is more stable than other bits

Observation 3:Symbols s0 to s7 are more stable than other symbols

Page 23: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

Explanation

Page 24: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

ExploitationCOMPUTE A DISTRIBUTION:

Page 25: Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014