The geographic routing is an ideal approach to realize point-to-point routing in wireless sensor networks because packets can be delivered by only maintaining a small set of neighbors' physical positions. The geog...
详细信息
ISBN:
(纸本)9783540730897
The geographic routing is an ideal approach to realize point-to-point routing in wireless sensor networks because packets can be delivered by only maintaining a small set of neighbors' physical positions. The geographic routing assumes that a packet can be moved closer to the destination in the network topology if it is moved geographically closer to the destination in the physical space. This assumption, however, only holds in an ideal model where uniformly distributed nodes communicate with neighbors through wireless channels with perfect reception. Because this model oversimplifies the spatial complexity of a wireless sensor network, the geographic routing may often lead a packet to the local minimum or low quality route. Unlike the geographic forwarding, the ETX-embedding proposed in this paper can accurately encode both a network's topological structure and channel quality to small size nodes' virtual coordinates, which makes it possible for greedy forwarding to guide a packet along an optimal routing path. Our performance evaluation based on both the MICA2 sensor platform and TOSSIM simulator shows that the greedy forwarding based on ETX-embedding outperforms previous geographic routing approaches.
We introduce a virtual-node based mobile object tracking algorithm for mobile sensor networks, VINESTALK. The algorithm uses the Virtual Stationary Automata programming layer, consisting of mobile clients, virtual tim...
详细信息
Wireless sensor networking, an emerging new field in technology, now opens a vast horizon of application scenarios including environment monitoring, home security and earthquake warning. Since the sensor nodes have li...
详细信息
Although the content of sensor messages describing "events of interest" may be encrypted to provide confidentiality, the context surrounding these events may also be sensitive and therefore should be protect...
详细信息
Many Ubiquitous computing applications can be considered as planning and acting problems in environments characterised by uncertainty and partial observability Such systems rely on sensor data for information about th...
详细信息
ISBN:
(纸本)9780769528472
Many Ubiquitous computing applications can be considered as planning and acting problems in environments characterised by uncertainty and partial observability Such systems rely on sensor data for information about their environment and use stochastic or probabilistic reasoning algorithms to infer system state from sensor data. We propose a domain modelling technique that characterises the sensor and actuator infrastructure and the set of system states in Ubicomp application domains. We capture the location and geometry of all domain model elements and use these spatial properties to tailor system state determination to reflect the quality and spread of the sensor and actuator platform. tThe domain model is used to support the development of Ubicomp applications and allows us calculate the degree of observability that exists over the state space in the environment. The degree of observability over the state space can act as an input into determining the state inference and action selection algorithms used in Ubicomp systems. In this paper we present the design of our Ubicomp domain model. We show that the proposed model contains information necessary to support Ubicomp application development. The expressiveness of the proposed design has been tested by building a model of an Urban Traffic Control application for Dublin city.
With the proliferation of various kinds of sensor networks, we will see large amounts of heterogeneous data. They have different characteristics such as data content, formats, modality and quality. Existing research h...
详细信息
ISBN:
(纸本)9783540730897
With the proliferation of various kinds of sensor networks, we will see large amounts of heterogeneous data. They have different characteristics such as data content, formats, modality and quality. Existing research has largely focused on issues related to individual sensor networks;how to make use of diverse data beyond the individual network level is largely unaddressed. In this paper, we propose a semantics-based approach for this problem and describe a system that constructs applications that utilize many sources of data simultaneously. We propose models to formally describe the semantics of data sources, and processing modules that perform various kinds of operations on data. Based on such formal semantics, our system composes data sources and processing modules together in response to users' queries. The semantics provides a common ground such that data sources and processing modules from various parties can be shared and reused among applications. We describe our system architecture, illustrate application deployment, and share our experiences in the semantic approach.
The problem we address in this paper is how to detect an intruder moving through a polygonal space that is equipped with a camera sensor network. We propose a probabilistic sensor tasking algorithm in which cameras se...
详细信息
ISBN:
(纸本)9783540730897
The problem we address in this paper is how to detect an intruder moving through a polygonal space that is equipped with a camera sensor network. We propose a probabilistic sensor tasking algorithm in which cameras sense the environment independently of one another, thus reducing the communication overhead. Since constant monitoring is prohibitively expensive with complex sensors such as cameras, the amount of sensing done is also minimized. To be effective, a minimum detection probability must be guaranteed by the system over all possible paths through the space. The straightforward approach of enumerating all such paths is intractable, since there is generally an infinite number of potential paths. Using a geometric decomposition of the space, we lower-bound the detection probability over all paths using a small number of linear constraints. The camera tasking is computed for set of example layouts and shows large performance gains with our probabilistic scheme over both constant monitoring as well as over a deterministic heuristic.
Contour mapping is a crucial part of many wireless sensor network applications. Many efforts have been made to avoid collecting data from all the sensors in the network and producing maps at the sink, which is proven ...
详细信息
An intruder tries to disable the single point in a network, i.e. the central analyzer. If this is disabled, the entire network is without protection. Since the sensor nodes fail often, the use of a centralized analyze...
详细信息
ISBN:
(纸本)9781402062674
An intruder tries to disable the single point in a network, i.e. the central analyzer. If this is disabled, the entire network is without protection. Since the sensor nodes fail often, the use of a centralized analyzer is highly limited. Processing all the information at a single host implies a limit on the size of the network that can be monitored. Because of the limit of the central analyzer, it is difficult to keep up with the flow of information in large network like sensor. We have proposed distributed intrusion detection system for distribute sensor networks.
Recently, many low-profile devices with RF communication features have been developed such as sensor network nodes and one-chip microcomputers. This caused a variety of gadgets join to the wireless network. However, i...
详细信息
暂无评论