Emerging applications in industrial automation as well as tracking and monitoring applications of humans, objects or animals share common requirements: micro-mobility, high-throughput, and two-way end-to-end communica...
详细信息
ISBN:
(纸本)9781457705137
Emerging applications in industrial automation as well as tracking and monitoring applications of humans, objects or animals share common requirements: micro-mobility, high-throughput, and two-way end-to-end communications. In this paper we present MobiSense, a MAC layer and routing architecture for micro-mobility environments providing reliable and energy-efficient communication and low-latency handoffs. MobiSense's energy-efficiency and reliability comes from a set of carefully chosen design elements: rapid network information gathering, rapid network (re) admission and convergence, distributed network formation, and dynamic scheduling. Testbed evaluations show that a mobile sensor achieves: (i) reliability above 95% even in scenarios with high data rates of 6pps/node;(ii) low latency-handoffs typically below 1 second;(iii) a high aggregate system throughput of more than 95kbps;(iv) two-way communication without the need for flooding;and (v) communication at very low duty-cycles below 4% at 6pps/node.
In Wireless sensor Networks (WSNs), congestion can cause a plethora of malfunctions such as packet loss, lower throughput and energy inefficiency, potentially resulting in reduced deployment lifetime and under-perform...
详细信息
ISBN:
(纸本)9781457705137
In Wireless sensor Networks (WSNs), congestion can cause a plethora of malfunctions such as packet loss, lower throughput and energy inefficiency, potentially resulting in reduced deployment lifetime and under-performing applications. this has led to several proposals describing congestion control (CC) mechanisms for sensor networks. Furthermore, the WSN research community has made significant efforts towards power saving MAC protocols with Radio Duty Cycling (RDC). However, careful study of previous work reveals that RDC schemes are often neglected during the design and evaluation of congestion control algorithms. In this paper, we argue that the presence (or lack) of RDC can drastically influence the performance of congestion detection. In addition, most WSN CC mechanisms are evaluated under traditional sensor network topologies and protocols (e. g. trickle data dissemination, tree data collection). the emerging IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) and related standards pose a new requirement: we now need to investigate if previous findings regarding congestion control are still applicable. In this context, this paper contributes a comprehensive evaluation of existing congestion detection mechanisms in a simulated, multi-node 6LoWPAN sensor network. We present results from two sets of experiments, differentiated by the presence or lack of RDC.
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. It may also be necessary to en...
详细信息
ISBN:
(纸本)9781457705137
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. It may also be necessary to encrypt sensor data in transit. Recently, WSNs and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Available IPv6 protocol stacks can use IPsec to secure data exchange. thus, it is desirable to extend 6LoWPAN such that IPsec communication with IPv6 nodes is possible. It is beneficial to use IPsec because the existing end-points on the Internet do not need to be modified to communicate securely withthe WSN. Moreover, using IPsec, true end-to-end security is implemented and the need for a trustworthy gateway is removed. In this paper we provide End-to-End (E2E) secure communication between IP enabled sensor networks and the traditional Internet. this is the first compressed lightweight design, implementation, and evaluation of 6LoWPAN extension for IPsec. Our extension supports both IPsec's Authentication Header (AH) and Encapsulation Security Payload (ESP). thus, communication endpoints are able to authenticate, encrypt and check the integrity of messages using standardized and established IPv6 mechanisms.
Although there are several works on providing event-based services in pervasive environment or WSN, most of them have not considered composite event detection in an energy-efficient fashion. Composite events consist o...
详细信息
ISBN:
(纸本)9781457705137
Although there are several works on providing event-based services in pervasive environment or WSN, most of them have not considered composite event detection in an energy-efficient fashion. Composite events consist of multiple primitive events with temporal and spatial relations and are much more difficult to manage. Because of the resource constraints in WSN, existing event detection algorithms may not be suitable for WSN when energy efficiency is considered. In this paper, we propose TED (Type-based composite Event Detection), a distributed composite event detection algorithm. the essential idea of TED is type-based event fusion, where some sensor nodes are selected as fusion points. then lower-level events will be fused on these fusion points for detection of higher-level composite events. Each composite event type is assigned to certain fusion point for detection so that the composite events may be detected in-network instead of at the sink. Event fusion with minimum energy cost is an NP-complete problem. We propose a distributed randomized algorithm to solve the problem. We analyze the energy efficiency of TED to show both its effectiveness and efficiency. By carrying out both simulation and real world experiments on TED, we show that TED can reduce the energy cost by 10-20% in event-based WSN applications compared with naive event detection mechanism where the event relations are not considered.
there is a common understanding that we need to use energy in smarter and more efficient ways. In order to achieve increased energy efficiency for households there is a need to adjust energy consumption based on the d...
详细信息
ISBN:
(纸本)9781457705137
there is a common understanding that we need to use energy in smarter and more efficient ways. In order to achieve increased energy efficiency for households there is a need to adjust energy consumption based on the dynamic needs of the people living there, and the available energy and costs at a specific time. Involved energy devices, such as electricity, gas and water meters, need to have a certain amount of "smartness";however without a common way to integrate them we risk ending up with a multitude of heterogeneous smart devices that need to be manually controlled one by one via device-specific interfaces and protocols. We believe that using IPv6 on every device is an important step towards creating a controllable and interoperable energy infrastructure. When every device can publish data and be directly addressed globally, real time monitoring and control becomes possible and more sophisticated as other parties can easily interact with it over Internet and integrate its functionality. Additionally the user is in control over which data to share, with whom and for what purpose (e.g. withthe energy providers for billing), as well as which policy should be used when conditions change. In this demo we show how a Smart Home with an IPv6-equipped electricity smart meter prototype can report meter readings to cloud hosted business services, which collect readings from a number of meters, and can detect deviations from expected usage. In case of unexpected power shortage or surplus, the price is accordingly adjusted and the smart meters are informed. In the case of a price increase, it is up to the user to either pay the higher price, or to reduce her consumption (automatically based on their predefined policy). Similarly for a price drop, the user can choose to execute energy-hungry tasks. By allowing a energy gateway to control not only electricity but also other devices in the household infrastructure such as heating, the energy management can be made more efficien
Wireless sensor and actuator networks (WS&ANs) are a new technology based on networks of small radio-enabled embedded devices that are being deployed in areas such as environmental monitoring, vehicle tracking, bu...
详细信息
the proceedings contain 87 papers. the topics discussed include: self-triggered control over wireless sensor and actuator networks;STARS: static relays for multi-robot real-time search and monitoring;demo: a distribut...
ISBN:
(纸本)9781457705137
the proceedings contain 87 papers. the topics discussed include: self-triggered control over wireless sensor and actuator networks;STARS: static relays for multi-robot real-time search and monitoring;demo: a distributed architecture for heterogeneous multi sensor-task allocation;type-safe updating for modular WSN software;YA-MAC: handling unified unicast and broadcast traffic in multi-hop wireless sensor networks;transmission control policy design for decentralized detection in sensor networks;VIP delegation: enabling VIPs to offload data in wireless social mobile networks;stackless preemptive multi-threading for TinyOS;TED: efficient type-based composite event detection for wireless sensor network;sensor network aided agile spectrum access through low-latency multi-band communications;demo abstract: securing communication in 6LoWPAN with compressed IPsec;and event-driven IPv6 communication for the smart grid infrastructure.
this paper aims at evaluating two localization algorithms for wireless sensor networks: the weighted centroid localization algorithm and the iterative trilateration. the algorithms are simulated for three different wi...
详细信息
In a battlefield surveillance scenario, data readings and events emerging from a wireless sensor network deployed that may not be used immediately by or simply impossible to transmit to an authorized user (a Soldier) ...
详细信息
ISBN:
(纸本)9780769546001
In a battlefield surveillance scenario, data readings and events emerging from a wireless sensor network deployed that may not be used immediately by or simply impossible to transmit to an authorized user (a Soldier) in real time are stored in the network. Without proper protection for the sensitive data generated in this setting, a compromised storage node (by an enemy soldier) may divulge its stored sensitive data about the monitored environment, and even worse, it may alter the data. In this paper, we integrate an elliptic curve cryptography scheme and an erasure coding scheme to provide reliable and secure distributed in-network data storage for sensor networks. the main idea is to distribute each erasure coded fragment appended with a fingerprint to different storage nodes. the fingerprint is to allow each coded data fragment to be independently verified as a valid and correct subset of a specific data item. So, the scheme achieves localization of data error. the proposed scheme is resilient to collusion attack, pollution attack, and data dropping attack, and guarantees forward and backward data secrecy as well. the security of the proposed scheme relies on the intractability of the elliptic curve discrete logarithm problem. Different from the existing solutions, the uniqueness of our method comes from the use of lightweight encryption scheme, which is well suited for resource constrained wireless sensors.
In wireless sensor networks, there exist many redundant sensor nodes, and activating only the necessary number of sensor nodes at any particular moment can save energy, while ensuring all targets covered and network c...
详细信息
ISBN:
(纸本)9780769546001
In wireless sensor networks, there exist many redundant sensor nodes, and activating only the necessary number of sensor nodes at any particular moment can save energy, while ensuring all targets covered and network connectivity. In this paper, we first introduce a distributed scheme for sink nodes to find K paths to each sensor nodes. Secondly, a shortestpath-based algorithm is presented for the maximum set covers problem in wireless sensor networks. the algorithm partitions all nodes into possibly maximum disjointed sets, and the nodes in each set have all targets covered while ensuring the network connectivity. In the proposed algorithm, when constructing a cover set, the key idea is to select a node joining into the set if it has the shortest path to the nodes which is already in the set. At last, simulation is done, and the result shows that the proposed algorithm outperforms others.
暂无评论