Wireless sensor networks can be very useful in applications that require the detection of crucial events, in physical environments subjected to critical conditions, and the propagation of data reporting their realizat...
详细信息
ISBN:
(纸本)3540264221
Wireless sensor networks can be very useful in applications that require the detection of crucial events, in physical environments subjected to critical conditions, and the propagation of data reporting their realization to a control center. In this paper we propose jWebDust, a generic and modular application environment for developing and managing applications that are based on wireless sensor networks. Our software architecture provides a range of services that allow to create customized applications with minimum implementation effort that are easy to administrate. We move beyond the "networking-centric" view of sensor network research and focus on how the end user (administrator, control center supervisor, etc.) will visualize and interact with the system. We here present its open architecture, the most important design decisions, and discuss its distinct features and functionalities. jWebDust allows heterogeneous components to interoperate (real world sensor networks will rarely be homogeneous) and allows the integrated management and control of multiple such networks by also defining web-based mechanisms to visualize the network state, the results of queries, and a means to inject queries in the network. The architecture also illustrates how existing protocols for various services can interoperate in a bigger framework - such as the tree construction, query routing, etc.
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certificates are a way to prove identities. Ho...
详细信息
In this paper, we address the data management aspect of large-scale pervasive computingsystems. We aim at building an infrastructure that simultaneously supports many kinds of context-aware applications, ranging from...
详细信息
ISBN:
(纸本)0769522998
In this paper, we address the data management aspect of large-scale pervasive computingsystems. We aim at building an infrastructure that simultaneously supports many kinds of context-aware applications, ranging from room level up to nation level. This all-embracing approach gives rise to synergetic benefits like data reuse and sensor sharing. We identify major classes of context data and detail on their characteristics relevant for efficiently managing large amounts of it. Based on that, we argue that for large scale systems it is beneficial to have special-purpose servers that are optimized for managing a certain class of context data. In the Nexus project we have implemented five servers for different classes of context data and a very flexible federation middleware integrating all these servers. For each of them, we highlight in which way the requirements of the targeted class of data are tackled and discuss our experiences.
In a wireless mobile computing system such as ad hoc network or sensor network, it is very difficult to manage resources - the precious bandwidth shared by the mobile terminals and the energy in each mobile terminal -...
详细信息
This paper presents Location-Centric Storage (LCS), a novel distributed data storage protocol for sensor networks. In the protocol, each event detected by sensors is associated with an intensity value (σ)(by sensors)...
详细信息
Recently an approach that combined the techniques in distributed classification and the ones in error-correcting codes has been proposed to design a fault-tolerant classification system in wireless networks. The codew...
详细信息
Search and rescue of people in emergency situations, e.g. lost hikers, stranded climbers, or injured skiers has been difficult due to lack of information about their location at various times. Current location and tra...
详细信息
Revolutionary technologies for quickly locating and repairing leaks in the pressurized environment of the international Space Station are a critical NASA need. Leaks caused by the malfunction of on-board vacuum system...
详细信息
A big challenge of designing and implementing a monitoring system for distributedsystems such as the Computational Grid is how to quickly and dynamically deploy and manage a large collection of monitoring sensors. Cu...
详细信息
Wireless sensor networks are emerging as a new computational platform consisting of small, low-power and inexpensive nodes that integrate a modest amount of sensing, computation and wireless communication capabilities...
详细信息
ISBN:
(纸本)3540264221
Wireless sensor networks are emerging as a new computational platform consisting of small, low-power and inexpensive nodes that integrate a modest amount of sensing, computation and wireless communication capabilities. These have found popular applications in a broad set of areas including environmental monitoring, habitat monitoring and disaster recovery. Typically sensor nodes are deployed over a geographical area for the purpose of detecting, tracking and monitoring events of interest. Reports produced upon the observation of specific events are then processed locally at the sensor nodes and transmitted over multiple hops to a centralized sink in order to reach an operations center or to be analyzed further. Since sensor nodes are deployed in a large land region, the objective is to achieve complete coverage of the region, that is, every location in the region lies in the observation field of at least one sensor node. However the initial placement of sensors may not achieve this goal for various reasons: the number of original sensors may have been too low, the original placement may have been random (for example, sensors deployed from the air) leaving parts of the region uncovered, or, some of the sensors have malfunctioned, leaving coverage holes. In this paper we study the coverage restoration problem in sensor networks. The fundamental question is "Given a two-dimensional area, a piece of land for example, and an initial set of sensors, how can we determine the number of sensor nodes required to completely cover the region". Essentially, the coverage restoration problem reflects how well an area is monitored by sensors. In abstract terms, our approach determines uncovered area in the sensor network field and proposes the deployment of nodes to completely cover the area. Our mechanism consists of two steps: (a) estimating the regions uncovered by sensors and (b) identifying the minimum number and location of sensors required to cover this region. The key idea
暂无评论