We consider the problem of deploying wireless sensors in a three dimensional space to achieve a desired degree of coverage, while minimizing the number of sensors placed. Typical sensor deployment scenarios impose con...
详细信息
Piezoelectric materials can be used to convert mechanical energy, such as vibration into electrical energy which can be used to power up devices in a smart dust sensing network. this piezoelectric mechanism exhibits g...
详细信息
sensor networks introduce new resource allocation problems in which sensors need to be assigned to the tasks they best help. Such problems have been previously studied in simplified models in which utility from multip...
详细信息
ISBN:
(纸本)9783642020841
sensor networks introduce new resource allocation problems in which sensors need to be assigned to the tasks they best help. Such problems have been previously studied in simplified models in which utility from multiple sensors is assumed to combine additively. In this paper we study more complex utility models, focusing on two particular applications: event detection and target localization. We develop distributed algorithms to assign directional sensors of different types to multiple simultaneous tasks using exact location information. We extend our algorithms by introducing the concept of fuzzy location which may be desirable to reduce computational overhead and/or to preserve location privacy. We show that our schemes perform well using both exact or fuzzy location information.
sensor networks deployed for scientific data acquisition must inspect measurements for faults and events of interest. Doing so is crucial to ensure the relevance and correctness of the collected data. In this work we ...
详细信息
ISBN:
(纸本)9783642020841
sensor networks deployed for scientific data acquisition must inspect measurements for faults and events of interest. Doing so is crucial to ensure the relevance and correctness of the collected data. In this work we unify fault and event detection under a general anomaly detection framework. We use machine learning techniques to classify measurements that resemble a training set as normal and measurements that significantly deviate from that set as anomalies. Furthermore, we aim at an anomaly detection framework that can be implemented on motes, thereby allowing them to continue collecting scientifically-relevant data even in the absence of network connectivity. the general consensus thus far has been that learning-based techniques are too resource intensive to be implemented on mote-class devices. In this paper, we challenge this belief We implement an anomaly detection algorithm using Echo State Networks (ESN), a family of sparse neural networks, on a mote-class device and show that its accuracy is comparable to a PC-based implementation. Furthermore, we show that ESNs detect more faults and have fewer false positives than rule-based fault detection mechanisms. More importantly, while rule-based fault detection algorithms generate false negatives and misclassify events as faults, ESNs are general, correctly identifying a wide variety of anomalies.
In this paper we analyze the impact of correlation in both node locations and sensed phenomenon on the performance of distributed compression. In particular, we consider the optimization of Wireless sensor Networks (W...
详细信息
ISBN:
(纸本)9781424433742
In this paper we analyze the impact of correlation in both node locations and sensed phenomenon on the performance of distributed compression. In particular, we consider the optimization of Wireless sensor Networks (WSNs) in realistic environments. distributed Source Coding (DSC) is a compression technique performed by, for example, data gathering applications in which energy consumption and bandwidth usage are important factors. In this work, we consider different node deployment strategies and include in our study models of sensed data with different correlation types in order to model more realistic WSNs. Our evaluation takes into account the transmission overhead and signal processing costs associated withdistributed compression. the energy model applied makes use of measurements obtained from real experiments. From the analysis we derive a novel metric which is essentially based on correlations of node locations and sensed phenomena. this metric enables the performance estimation or WSNs applying DSC prior to the costly real deployment. Furthermore, we show that significant average energy savings and average lifetime extensions are possible using DSC under different node deployment strategies and different data correlation structures.
Data generation in wireless sensor networks could be bursty as it is dictated by the presence or absence of events of interest that generate these data. While conventional sensor nodes possessed only one radio interfa...
详细信息
ISBN:
(纸本)9789639799493
Data generation in wireless sensor networks could be bursty as it is dictated by the presence or absence of events of interest that generate these data. While conventional sensor nodes possessed only one radio interface, next generation sensor nodes are expected to have two (possibly more) radio interfaces, each with different range, capacity, and power consumption. Equipping sensor nodes with dual radios has its own benefits and can be quite useful in handling bursty traffic while at the same time satisfying the application's delivery requirements. In this paper, we propose an adaptive interface switch agent that intelligently selects the interface to be used for data transmission at a sensor node based on the data burst length while taking into consideration power consumption, throughput, and end-to-end delay. the proposed work generalizes earlier works in this area to enable boththe source nodes and intermediate data forwarding nodes to initiate the activation of high power radios so that they can be utilized to a higher degree for converge-cast communication. We have performed extensive simulations withsensor nodes containing bothieee 802.15.4 and ieee 802.11 compatible radios. Our simulation results indicate that: (i) the end-to-end delay and throughput achieved by the proposed interface switch agent are comparable to those achieved in a network of sensor nodes equipped only withieee 802.11 radios, (ii) the energy consumed in the network using our interface switch agent is a fraction of that consumed in a network of the ieee 802.11 sensor nodes and is comparable to that of sensors using only ieee 802.15.4 radios.
this paper presents a failure diagnosis algorithm for summarizing and generalizing patterns that lead to instances of anomalous behavior in sensor networks. Often multiple seemingly different event patterns lead to th...
详细信息
ISBN:
(纸本)9783642020841
this paper presents a failure diagnosis algorithm for summarizing and generalizing patterns that lead to instances of anomalous behavior in sensor networks. Often multiple seemingly different event patterns lead to the same type of failure manifestation. A hidden relationship exists, in those patterns, among event attributes that is somehow responsible for the failure. For example, in some system, a message might always get corrupted if the sender is more than two hops away from the receiver (which is a distance relationship) irrespective of the senderId and receiverId. To uncover such failure-causing relationships, we present a new symbolic pattern extraction technique that identifies and symbolically expresses relationships correlated with anomalous behavior. Symbolic pattern extraction is a new concept in sensor network debugging that is unique in its ability to generalize over patterns that involve different combinations of nodes or message exchanges by extracting their common relationship. As a proof of concept, we provide synthetic traffic scenarios where we show that applying symbolic pattern extraction can uncover more complex bug patterns that are crucial to the understanding of real causes of problems. We also use symbolic pattern extraction to diagnose a real bug and show that;it generates much fewer and more accurate patterns compared to previous approaches.
In this work, we first study and then propose an optimal version on the medium access control mechanism known as carrier sense multiple access with collision avoidance (CSMAlCA). this protocol is adopted by many wirel...
详细信息
ISBN:
(纸本)9789639799493
In this work, we first study and then propose an optimal version on the medium access control mechanism known as carrier sense multiple access with collision avoidance (CSMAlCA). this protocol is adopted by many wireless communication standards, such as the ieee 802.11 series and ieee 802.15.4 (ZigBee).Wefirst identify its drawbacks in a slow fading channel environment, and show that the CSMA/CA can be very energy-inefficient, especially in many wireless sensor network (WSN) applications where the traffic demand is *** particular, we study communication over a Rayleigh fading channel, which we model by means of a time invariant Markov process. We then show that the decision regarding the optimal access time on such a channel can be formulated as an optimization problem, and that an optimal solution can be accurately derived. We also simulate a ZigBee node in a Rayleigh fading environment and the result shows that optimum channel access can save significant amount of energy compared to conventional CSMA/CA.
In recent years, wireless sensor networks (WSN) have received considerable attention within agriculture and farming as a means to reduce operational costs and enhance animal health care. this paper examines the applic...
详细信息
this paper presents a channel aware contention based forwarding scheme (CACF) for wireless sensor network (WSN). In order to improve the probability of correct packet transmission in wireless channel and ensuring succ...
详细信息
ISBN:
(纸本)9780769536781
this paper presents a channel aware contention based forwarding scheme (CACF) for wireless sensor network (WSN). In order to improve the probability of correct packet transmission in wireless channel and ensuring successful contention, CACF selects the appropriate relay node by the integrated consideration of access probability, routing cost metrics and wireless channel characteristics. In the scheme, a well-defined access space mechanism (ASM) is proposed and used as criterion for relay selection during each contention round. the simulation results show that CACF achieves better network performance in terms of packet delivery ratio and improves the node efficiency consequently.
暂无评论