Many sensor-based applications (re)act following the detection of certain events of interest. Hence, the effectiveness of these applications depends on the quality of the information (QoI) provided by their sensor-bas...
详细信息
ISBN:
(纸本)9780769527888
Many sensor-based applications (re)act following the detection of certain events of interest. Hence, the effectiveness of these applications depends on the quality of the information (QoI) provided by their sensor-based event detectors. In this paper we derive relationships between the QoI attributes of timeliness and confidence and the operational characteristics of sensorsystems and the events they detect. By building upon the Neyman-Pearson hypothesis testing procedure, we study the dependence of these characteristics and attributes on each other and establish their theoretical performance boundaries(1).
Two different operating system types are currently considered for sensor networks: event driven and multithreaded. this paper compares the two well-known operating systems TinyOS (event driven) and MANTIS (multithread...
详细信息
ISBN:
(纸本)9780769527888
Two different operating system types are currently considered for sensor networks: event driven and multithreaded. this paper compares the two well-known operating systems TinyOS (event driven) and MANTIS (multithreaded) regarding their memory usage, power consumption and processing capabilities. TinyOS and MANTIS are both ported to the DSYS25sensor platform. Both operating systems are used to execute the same sensor network application and the aforementioned parameters of interest are measured. the results presented in this paper show for which set of applications each operating system is preferable.
Withthe increased realisation of the benefits of studying environmental data, sensor networks are rapidly scaling in size, heterogeneity of data, and applications. In this paper, we present a State-based Publish/Subs...
详细信息
ISBN:
(纸本)9781595939302
Withthe increased realisation of the benefits of studying environmental data, sensor networks are rapidly scaling in size, heterogeneity of data, and applications. In this paper, we present a State-based Publish/Subscribe (SPS) framework for sensorsystems with many distributed and independent application clients. SPS provides a state-based information deduction model that is suited to many classes of sensor network applications. State Maintenance Components (SMCs) are introduced that are simple in operation, flexible in placement, and decomposable for distributed processing. Publish/Subscribe communication forms the core messaging component of the framework. SPS uses the decoupling feature of Pub/Sub and extends this across the SMCs to support a more flexible and dynamic system structure. Our evaluation, using real sensor data, shows that SPS is expressive in capturing conditions, and scalable in performance. Copyright 2007 ACM.
A smart transducer is the integration of a sensor/actuator element, a processing unit and a network interface. Smart sensor networks are composed of smart transducer nodes interconnected through a communication networ...
详细信息
ISBN:
(纸本)9781424408504
A smart transducer is the integration of a sensor/actuator element, a processing unit and a network interface. Smart sensor networks are composed of smart transducer nodes interconnected through a communication network. this paper proposes a new architecture for smart sensor networks, that is driven by events (asynchronous data). the events are derived from a data compression algorithm embedded in the smart sensor, which compresses data from the sensor. the proposed architecture also provides configuration and monitoring data to manage the distributed system.
sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to attacks if deployed in hostile environment...
详细信息
ISBN:
(纸本)9780769527871
sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to attacks if deployed in hostile environments. When a sensor network is under attack, the most fundamental concern is that information communicated or stored in the network remains safe. the past research has focused on securing information in communication, but how to secure information in storage has been generally overlooked. Meanwhile, distributed data storage and retrieval have become popularfor efficient data management in sensor networks, which renders the absence of schemes for securing stored information to be a more severe problem. Hence, we propose in this paper three schemes to deal withthe problem. All the schemes have the following properties: (i) Only authorized entities can access data stored in the sensor network;(ii) the schemes are resilient to a large number of sensor node compromises. the second and the third schemes do not involve any centralized entity except for a few initialization or renewal operations, and thus support secure, distributed data storage and retrieval. the third scheme further provides high scalability and flexibility, and hence is most suitable in real applications. the effectiveness and efficiency of the proposed schemes have also been verified through extensive analysis and TOSSIM-based simulations.
As sensor networks are increasingly used to support pervasive computing, we envision an instrumented environment that can provide varying amounts of information to mobile applications immersed within the network. Such...
详细信息
ISBN:
(纸本)9780769527871
As sensor networks are increasingly used to support pervasive computing, we envision an instrumented environment that can provide varying amounts of information to mobile applications immersed within the network. Such a scenario deviates from existing deployments of sensor networks which are-often highly application-specific andfunnel information to a central collection point. We instead target scenarios, in which multiple mobile applications will leverage sensor network nodes opportunistically and unpredictably. Such situations require new communication abstractions that enable immersed devices to interact directly with available sensors, reducing both communication overhead and data latency. this paper introduces scenes, which applications create based on their communication requirements, abstract properties of the underlying network communication;,and properties of the physical environment. this paper reports on the communication model, an initial implementation,. and its performance in varying scenarios.
Continuous technical innovations result in decreasing product life cycles. this in turn requires a flexible production which is able to adapt to the constantly changing demands. Simulation techniques provide a promisi...
详细信息
ISBN:
(纸本)9781424408504
Continuous technical innovations result in decreasing product life cycles. this in turn requires a flexible production which is able to adapt to the constantly changing demands. Simulation techniques provide a promising approach for faster, less error-prone development. Furthermore it offers the opportunity to evaluate alternative production scenarios which helps to save time and to find optimized solutions. this paper presents the result of performance tests withthe simulation environment drd-simulator which is based on J2EE technology(1). these performance tests use a Soft PLC which is connected to the simulation via a ModbusTCP fieldbus. Measurements indicate that J2EE is a suitable and scalable platform for the simulation of distributed control systems.
In spite of several years of intense research, the area of security and cryptography in Wireless sensor Networks (WSNs) still has a number of open problems. On the other hand, the advent of Identity-Based Encryption (...
详细信息
ISBN:
(纸本)9780769527888
In spite of several years of intense research, the area of security and cryptography in Wireless sensor Networks (WSNs) still has a number of open problems. On the other hand, the advent of Identity-Based Encryption (IBE) has enabled a wide range of new cryptographic solutions. In this work, we argue that IBE is ideal for WSNs and vice versa. We discuss the synergy between the systems, describe how IBE can solve the key agreement problem in WSNs, and present some estimates of performance.
In the embedded (real-time) systems domain, data-flow based modeling tools like Matlab Simulink(R) or SCADE(R) are increasingly used, because they not only allow for specifying functionality at a level closer to the s...
详细信息
ISBN:
(纸本)9781424408504
In the embedded (real-time) systems domain, data-flow based modeling tools like Matlab Simulink(R) or SCADE(R) are increasingly used, because they not only allow for specifying functionality at a level closer to the semantics and terminology of the application domain than a conventionally used programming language like C, but also to simulate the designed model and such the specified behavior in an early project phase. However, in general such tools provide rather little support for simulating complete distributed real-time systems because of the lack of modeling communication aspects like latencies. Hence, this paper discusses an approach for simulating distributed time-triggered systems using SCADE, where the temporal requirements are imported from a platform independent model of the distributed system.
Modern embedded control systems are asked to exhibit higher distribution, higher degree of integration and to support operational flexibility. Conventionally the planning of distributed control systems was done either...
详细信息
ISBN:
(纸本)9781424408504
Modern embedded control systems are asked to exhibit higher distribution, higher degree of integration and to support operational flexibility. Conventionally the planning of distributed control systems was done either by considering worst-case requirements, leading to expensive and inefficient designs, or by considering average requirements, potentially leading to occasional run-time overloads. the dynamic rate adaptation technique was developed to support operational flexibility and a higher degree of integration in distributed control systems. this technique adapts the communication requirements of distributed feedback control loops by increasing the sampling periods of the messages associated to the control action in order to free network bandwidth when a possible network overload condition is detected. the distributed controllers have to be able to deal withthe change of the sampling period and the variable sampling to actuation delay. this work reports different control approaches used in the implementation of the dynamic rate adaptation method, namely a static version based on a set of controllers with parameters pre-computed off-line, a dynamic version where the system parameters are identified online according to the dynamic behaviour of the distributed system and a hybrid version using an adaptive controller with a set of online identifiers.
暂无评论