scispace - formally typeset
Search or ask a question

Showing papers on "Key distribution in wireless sensor networks published in 2009"


Journal Article
TL;DR: S-MAC as discussed by the authors is a medium access control protocol designed for wireless sensor networks, which uses three novel techniques to reduce energy consumption and support self-configuration, including virtual clusters to auto-sync on sleep schedules.
Abstract: This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect sensor networks to be deployed in an ad hoc fashion, with individual nodes remaining largely inactive for long periods of time, but then becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from traditional wireless MACs such as IEEE 802.11 in almost every way: energy conservation and self-configuration are primary goals, while per-node fairness and latency are less important. S-MAC uses three novel techniques to reduce energy consumption and support self-configuration. To reduce energy consumption in listening to an idle channel, nodes periodically sleep. Neighboring nodes form virtual clusters to auto-synchronize on sleep schedules. Inspired by PAMAS, S-MAC also sets the radio to sleep during transmissions of other nodes. Unlike PAMAS, it only uses in-channel signaling. Finally, S-MAC applies message passing to reduce contention latency for sensor-network applications that require store-and-forward processing as data move through the network. We evaluate our implementation of S-MAC over a sample sensor node, the Mote, developed at University of California, Berkeley. The experiment results show that, on a source node, an 802.11-like MAC consumes 2–6 times more energy than S-MAC for traffic load with messages sent every 1–10s.

5,354 citations


Journal ArticleDOI
01 May 2009
TL;DR: This paper breaks down the energy consumption for the components of a typical sensor node, and discusses the main directions to energy conservation in WSNs, and presents a systematic and comprehensive taxonomy of the energy conservation schemes.
Abstract: In the last years, wireless sensor networks (WSNs) have gained increasing attention from both the research community and actual users. As sensor nodes are generally battery-powered devices, the critical aspects to face concern how to reduce the energy consumption of nodes, so that the network lifetime can be extended to reasonable times. In this paper we first break down the energy consumption for the components of a typical sensor node, and discuss the main directions to energy conservation in WSNs. Then, we present a systematic and comprehensive taxonomy of the energy conservation schemes, which are subsequently discussed in depth. Special attention has been devoted to promising solutions which have not yet obtained a wide attention in the literature, such as techniques for energy efficient data acquisition. Finally we conclude the paper with insights for research directions about energy conservation in WSNs.

2,546 citations


Journal ArticleDOI
TL;DR: This survey was the starting point for a generic definition of sensor network lifetime for use in analytic evaluations as well as in simulation models—focusing on a formal and concise definition of accumulated network lifetime and total network lifetime.
Abstract: Network lifetime has become the key characteristic for evaluating sensor networks in an application-specific way. Especially the availability of nodes, the sensor coverage, and the connectivity have been included in discussions on network lifetime. Even quality of service measures can be reduced to lifetime considerations. A great number of algorithms and methods were proposed to increase the lifetime of a sensor network—while their evaluations were always based on a particular definition of network lifetime. Motivated by the great differences in existing definitions of sensor network lifetime that are used in relevant publications, we reviewed the state of the art in lifetime definitions, their differences, advantages, and limitations. This survey was the starting point for our work towards a generic definition of sensor network lifetime for use in analytic evaluations as well as in simulation models—focusing on a formal and concise definition of accumulated network lifetime and total network lifetime. Our definition incorporates the components of existing lifetime definitions, and introduces some additional measures. One new concept is the ability to express the service disruption tolerance of a network. Another new concept is the notion of time-integration: in many cases, it is sufficient if a requirement is fulfilled over a certain period of time, instead of at every point in time. In addition, we combine coverage and connectivity to form a single requirement called connected coverage. We show that connected coverage is different from requiring noncombined coverage and connectivity. Finally, our definition also supports the concept of graceful degradation by providing means of estimating the degree of compliance with the application requirements. We demonstrate the applicability of our definition based on the surveyed lifetime definitions as well as using some example scenarios to explain the various aspects influencing sensor network lifetime.

849 citations


Journal ArticleDOI
TL;DR: This paper focuses on a protocol stack solution that deals with MAC layer, that minimizes the energy consumption and delay required to transmit packets across the network, called Adaptive SMAC protocol designed for sensor networks.
Abstract: Sensor networks are deployed in remote locations with limited processor capabilities, memory capacities, and battery supplies. Wireless Sensor Networks (WSN) detects environmental information with sensors in remote settings. One problem facing WSNs is the inability to resupply power to these energy-constrained devices due to their remoteness. Therefore to extend a WSN's effectiveness, the lifetime of the network must be increased by making them as energy efficient as possible. An energy-efficient medium access control (MAC) can boost a WSN's lifetime. This paper focuses on a protocol stack solution that deals with MAC layer, that minimizes the energy consumption and delay required to transmit packets across the network. It is based on Sensor Medium Access Control (S-MAC) called Adaptive SMAC protocol designed for sensor networks. It enables low duty cycle operation in a multi-hop network and common sleep schedules to reduce control overhead and enable traffic adaptive wakeup. To reduce control overhead and latency, introduces coordinated sleeping among neighboring nodes. It is a contention based protocol based on CSMA/CA mechanism. This protocol is simulated in NS-2 and performance evaluated using various topologies under various traffic conditions. In addition with this we tried to improve the energy efficiency of Adaptive SMAC with the help of a new design called Adaptive Cross MAC protocol

797 citations


Journal ArticleDOI
TL;DR: This paper introduces an energy efficient heterogeneous clustered scheme for wireless sensor networks based on weighted election probabilities of each node to become a cluster head according to the residual energy in each node.

727 citations


Proceedings ArticleDOI
20 Sep 2009
TL;DR: This paper presents the first complete design to apply compressive sampling theory to sensor data gathering for large-scale wireless sensor networks and shows the efficiency and robustness of the proposed scheme.
Abstract: This paper presents the first complete design to apply compressive sampling theory to sensor data gathering for large-scale wireless sensor networks. The successful scheme developed in this research is expected to offer fresh frame of mind for research in both compressive sampling applications and large-scale wireless sensor networks. We consider the scenario in which a large number of sensor nodes are densely deployed and sensor readings are spatially correlated. The proposed compressive data gathering is able to reduce global scale communication cost without introducing intensive computation or complicated transmission control. The load balancing characteristic is capable of extending the lifetime of the entire sensor network as well as individual sensors. Furthermore, the proposed scheme can cope with abnormal sensor readings gracefully. We also carry out the analysis of the network capacity of the proposed compressive data gathering and validate the analysis through ns-2 simulations. More importantly, this novel compressive data gathering has been tested on real sensor data and the results show the efficiency and robustness of the proposed scheme.

631 citations


Journal ArticleDOI
TL;DR: This letter presents a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.
Abstract: Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.

627 citations


Journal ArticleDOI
TL;DR: In this article the main design principles, potential advantages, application areas, and network architectures of CRSNs are introduced and the existing communication protocols and algorithms devised for cognitive radio networks and WSNs are discussed along with the open research avenues for the realization of C RSNs.
Abstract: Dynamic spectrum access stands as a promising and spectrum-efficient communication approach for resource-constrained multihop wireless sensor networks due to their event-driven communication nature, which generally yields bursty traffic depending on the event characteristics. In addition, opportunistic spectrum access may also help realize the deployment of multiple overlaid sensor networks, and eliminate collision and excessive contention delay incurred by dense node deployment. Incorporating cognitive radio capability in sensor networks yields a new sensor networking paradigm (i.e., cognitive radio sensor networks). In this article the main design principles, potential advantages, application areas, and network architectures of CRSNs are introduced. The existing communication protocols and algorithms devised for cognitive radio networks and WSNs are discussed along with the open research avenues for the realization of CRSNs.

590 citations


Journal ArticleDOI
31 Aug 2009-Sensors
TL;DR: An overview of wireless sensor networks technologies, main applications and standards, features in WSNs design, and evolutions is reported; some peculiar applications, such as those based on environmental monitoring, are discussed and design strategies highlighted.
Abstract: Wireless sensor networks (WSNs) enable new applications and require non-conventional paradigms for protocol design due to several constraints. Owing to the requirement for low device complexity together with low energy consumption (i.e., long network lifetime), a proper balance between communication and signal/data processing capabilities must be found. This motivates a huge effort in research activities, standardization process, and industrial investments on this field since the last decade. This survey paper aims at reporting an overview of WSNs technologies, main applications and standards, features in WSNs design, and evolutions. In particular, some peculiar applications, such as those based on environmental monitoring, are discussed and design strategies highlighted; a case study based on a real implementation is also reported. Trends and possible evolutions are traced. Emphasis is given to the IEEE 802.15.4 technology, which enables many applications of WSNs. Some example of performance characteristics of 802.15.4-based networks are shown and discussed as a function of the size of the WSN and the data type to be exchanged among nodes.

588 citations


Journal ArticleDOI
TL;DR: This article surveys pioneer WBAN research projects and enabling technologies, and explores application scenarios, sensor/actuator devices, radio systems, and interconnection of WBANs to provide perspective on the trade-offs between data rate, power consumption, and network coverage.
Abstract: A wireless body area network is a radio-frequency- based wireless networking technology that interconnects tiny nodes with sensor or actuator capabilities in, on, or around a human body. In a civilian networking environment, WBANs provide ubiquitous networking functionalities for applications varying from healthcare to safeguarding of uniformed personnel. This article surveys pioneer WBAN research projects and enabling technologies. It explores application scenarios, sensor/actuator devices, radio systems, and interconnection of WBANs to provide perspective on the trade-offs between data rate, power consumption, and network coverage. Finally, a number of open research issues are discussed.

529 citations


Journal ArticleDOI
07 Jul 2009
TL;DR: An overview of the current state-of-the-art in the field of visual sensor networks is provided, by exploring several relevant research directions to provide a better understanding of current research problems in the different research fields ofVisual sensor networks.
Abstract: Visual sensor networks have emerged as an important class of sensor-based distributed intelligent systems, with unique performance, complexity, and quality of service challenges. Consisting of a large number of low-power camera nodes, visual sensor networks support a great number of novel vision-based applications. The camera nodes provide information from a monitored site, performing distributed and collaborative processing of their collected data. Using multiple cameras in the network provides different views of the scene, which enhances the reliability of the captured events. However, the large amount of image data produced by the cameras combined with the network's resource constraints require exploring new means for data processing, communication, and sensor management. Meeting these challenges of visual sensor networks requires interdisciplinary approaches, utilizing vision processing, communications and networking, and embedded processing. In this paper, we provide an overview of the current state-of-the-art in the field of visual sensor networks, by exploring several relevant research directions. Our goal is to provide a better understanding of current research problems in the different research fields of visual sensor networks, and to show how these different research fields should interact to solve the many challenges of visual sensor networks.

Journal ArticleDOI
TL;DR: An Unequal Cluster-based Routing (UCR) protocol is proposed that mitigates the hot spot problem in multihop sensor networks, and achieves an obvious improvement on the network lifetime.
Abstract: Clustering provides an effective method for prolonging the lifetime of a wireless sensor network. Current clustering algorithms usually utilize two techniques; selecting cluster heads with more residual energy, and rotating cluster heads periodically to distribute the energy consumption among nodes in each cluster and extend the network lifetime. However, they rarely consider the hot spot problem in multihop sensor networks. When cluster heads cooperate with each other to forward their data to the base station, the cluster heads closer to the base station are burdened with heavier relay traffic and tend to die much faster, leaving areas of the network uncovered and causing network partitions. To mitigate the hot spot problem, we propose an Unequal Cluster-based Routing (UCR) protocol. It groups the nodes into clusters of unequal sizes. Cluster heads closer to the base station have smaller cluster sizes than those farther from the base station, thus they can preserve some energy for the inter-cluster data forwarding. A greedy geographic and energy-aware routing protocol is designed for the inter-cluster communication, which considers the tradeoff between the energy cost of relay paths and the residual energy of relay nodes. Simulation results show that UCR mitigates the hot spot problem and achieves an obvious improvement on the network lifetime.

Posted Content
TL;DR: A wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them are discussed including the challenges faced.
Abstract: Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.

Proceedings ArticleDOI
17 May 2009
TL;DR: The challenges of designing networking protocols for such WSNs powered by ambient energy harvesting are discussed, which is to convert the ambient energy from the environment into electricity to power the sensor nodes.
Abstract: Wireless sensor networks (WSNs) research has pre-dominantly assumed the use of a portable and limited energy source, viz. batteries, to power sensors. Without energy, a sensor is essentially useless and cannot contribute to the utility of the network as a whole. Consequently, substantial research efforts have been spent on designing energy-efficient networking protocols to maximize the lifetime of WSNs. However, there are emerging WSN applications where sensors are required to operate for much longer durations (like years or even decades) after they are deployed. Examples include in-situ environmental/habitat monitoring and structural health monitoring of critical infrastructures and buildings, where batteries are hard (or impossible) to replace/recharge. Lately, an alternative to powering WSNs is being actively studied, which is to convert the ambient energy from the environment into electricity to power the sensor nodes. While renewable energy technology is not new (e.g., solar and wind) the systems in use are far too large for WSNs. Those small enough for use in wireless sensors are most likely able to provide only enough energy to power sensors sporadically and not continuously. Sensor nodes need to exploit the sporadic availability of energy to quickly sense and transmit the data. This paper surveys related research and discusses the challenges of designing networking protocols for such WSNs powered by ambient energy harvesting.

Journal ArticleDOI
TL;DR: The relationship between security and data aggregation process in wireless sensor networks is investigated and a taxonomy of secure data aggregation protocols is given by surveying the current ''state-of-the-art'' work in this area.

Patent
13 Jan 2009
TL;DR: A wireless communication network for programming and monitoring a plurality of network-managed devices, including electronic-ink based display devices, comprising a network management computer system, a network gateway device, one or more wireless network routers, a majority of network managed devices, and a network coordinator is proposed in this paper.
Abstract: A wireless communication network for programming and monitoring a plurality of network-managed devices, including electronic-ink based display devices, comprising a network management computer system, a network gateway device, one or more wireless network routers, a plurality of network-managed devices, and a network coordinator. The wireless communication network of the present invention bridges the gap between wireless display networks, wireless sensor networks, and the worlds of passive, active and partially-active RFID and real-time locating systems. The wireless communication network of the present invention allows conventional communication network protocols to operate in more flexible ways in dynamic, diverse, and heterogeneous application environments, in fields including retail, healthcare, transport, logistics, manufacturing, education, etc. At the same time, the wireless communication network of the present invention is preferably based on the IEEE 802.15.4 network layer standard, which offers low-cost wireless network communication between a large number of wireless network end-devices.

Journal ArticleDOI
TL;DR: The design of a Structure-Aware Self-Adaptive WSN system, SASA, is discussed, able to rapidly detect structure variations caused by underground collapses, and a sound and robust mechanism for efficiently handling queries under instable circumstances is developed.
Abstract: Environment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-Adaptive WSN system, SASA. By regulating the mesh sensor network deployment and formulating a collaborative mechanism based on a regular beacon strategy, SASA is able to rapidly detect structure variations caused by underground collapses. We further develop a sound and robust mechanism for efficiently handling queries under instable circumstances. A prototype is deployed with 27 mica2 motes in a real coal mine. We present our implementation experiences as well as the experimental results. To better evaluate the scalability and reliability of SASA, we also conduct a large-scale trace-driven simulation based on real data collected from the experiments.

Journal ArticleDOI
TL;DR: A novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other, which can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.
Abstract: Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small portion of its neighbors. Key management is a fundamental security operation. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead. In this paper, we adopt a Heterogeneous Sensor Network (HSN) model for better performance and security. We propose a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other. We utilize Elliptic Curve Cryptography in the design of an efficient key management scheme for sensor nodes. The performance evaluation and security analysis show that our key management scheme can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.

Journal ArticleDOI
Jinyun Zhang1, Philip Orlik1, Zafer Sahinoglu1, Andreas F. Molisch1, P. Kinney 
16 Mar 2009
TL;DR: The IEEE 802.15.4a standard is described, an important system that adopts UWB impulse radio to ensure robust data communications and precision ranging and uses specific modulation, coding, and ranging waveforms that can be detected well by both coherent and noncoherent receivers.
Abstract: Wireless sensor networks are emerging as an important area for communications. They enable a wealth of new applications including surveillance, building control, factory automation, and in-vehicle sensing. The sensor nodes have to operate under severe constraints on energy consumption and form factor, and provide the ability for precise self-location of the nodes. These requirements can be fulfilled very well by various forms of ultra-wide-band (UWB) transmission technology. We discuss various techniques and tradeoffs in UWB systems and indicate that time-hopping and frequency-hopping impulse radio physical layers combined with simple multiple-access techniques like ALOHA are suitable designs. We also describe the IEEE 802.15.4a standard, an important system that adopts UWB impulse radio to ensure robust data communications and precision ranging. In order to accommodate heterogeneous networks, it uses specific modulation, coding, and ranging waveforms that can be detected well by both coherent and noncoherent receivers.

Patent
13 Jan 2009
TL;DR: In this article, the authors present a method and apparatus for increasing the SNR at the RF antenna of a wireless end-device (e.g. wireless electronic-ink display device or sensor) on a wireless communication network having one or more wireless network routers and a network controller, while minimizing the RF power transmitted by the wireless routers and wireless coordinator to the wireless end devices.
Abstract: Method and apparatus for increasing the SNR at the RF antenna of a wireless end-device (e.g. wireless electronic-ink display device or sensor) on a wireless communication network having one or more wireless network routers and a network controller, while minimizing the RF power transmitted by the wireless routers and wireless coordinator to the wireless end-devices.

Book ChapterDOI
30 Sep 2009
TL;DR: This paper provides taxonomies for mobile wireless sensors and localization, including common architectures, measurement techniques, and localization algorithms, and concludes with a description of real-world mobile sensor applications that require position estimation.
Abstract: Over the past decade we have witnessed the evolution of wireless sensor networks, with advancements in hardware design, communication protocols, resource efficiency, and other aspects. Recently, there has been much focus on mobile sensor networks, and we have even seen the development of small-profile sensing devices that are able to control their own movement. Although it has been shown that mobility alleviates several issues relating to sensor network coverage and connectivity, many challenges remain. Among these, the need for position estimation is perhaps the most important. Not only is localization required to understand sensor data in a spatial context, but also for navigation, a key feature of mobile sensors. In this paper, we present a survey on localization methods for mobile wireless sensor networks. We provide taxonomies for mobile wireless sensors and localization, including common architectures, measurement techniques, and localization algorithms. We conclude with a description of real-world mobile sensor applications that require position estimation.

Journal ArticleDOI
TL;DR: The algorithm is implemented in TinyOS and shown to be effective in adapting to local topology changes without incurring global overhead in the scheduling, and the effect of the time-varying nature of wireless links on the conflict-free property of DRAND-assigned time slots is evaluated.
Abstract: This paper presents a distributed implementation of RAND, a randomized time slot scheduling algorithm, called DRAND. DRAND runs in O(delta) time and message complexity where delta is the maximum size of a two-hop neighborhood in a wireless network while message complexity remains O(delta), assuming that message delays can be bounded by an unknown constant. DRAND is the first fully distributed version of RAND. The algorithm is suitable for a wireless network where most nodes do not move, such as wireless mesh networks and wireless sensor networks. We implement the algorithm in TinyOS and demonstrate its performance in a real testbed of Mica2 nodes. The algorithm does not require any time synchronization and is shown to be effective in adapting to local topology changes without incurring global overhead in the scheduling. Because of these features, it can also be used even for other scheduling problems such as frequency or code scheduling (for FDMA or CDMA) or local identifier assignment for wireless networks where time synchronization is not enforced. We further evaluate the effect of the time-varying nature of wireless links on the conflict-free property of DRAND-assigned time slots. This experiment is conducted on a 55-node testbed consisting of the more recent MicaZ sensor nodes.

Journal ArticleDOI
TL;DR: This article proposes a simple and provably secure encryption scheme that allows efficient additive aggregation of encrypted data and constructs an end-to-end aggregate authentication scheme that is secure against outsider-only attacks, based on the indistinguishability property of a pseudorandom function (PRF), a standard cryptographic primitive.
Abstract: Wireless sensor networks (WSNs) are composed of tiny devices with limited computation and battery capacities. For such resource-constrained devices, data transmission is a very energy-consuming operation. To maximize WSN lifetime, it is essential to minimize the number of bits sent and received by each device. One natural approach is to aggregate sensor data along the path from sensors to the sink. Aggregation is especially challenging if end-to-end privacy between sensors and the sink (or aggregate integrity) is required. In this article, we propose a simple and provably secure encryption scheme that allows efficient additive aggregation of encrypted data. Only one modular addition is necessary for ciphertext aggregation. The security of the scheme is based on the indistinguishability property of a pseudorandom function (PRF), a standard cryptographic primitive. We show that aggregation based on this scheme can be used to efficiently compute statistical values, such as mean, variance, and standard deviation of sensed data, while achieving significant bandwidth savings. To protect the integrity of the aggregated data, we construct an end-to-end aggregate authentication scheme that is secure against outsider-only attacks, also based on the indistinguishability property of PRFs.

Journal ArticleDOI
01 Nov 2009
TL;DR: Two main categories of privacy-preserving techniques for protecting two types of private information, data-oriented and context-oriented privacy, respectively are reviewed, and a number of important open challenges for future research are discussed.
Abstract: Much of the existing work on wireless sensor networks (WSNs) has focused on addressing the power and computational resource constraints of WSNs by the design of specific routing, MAC, and cross-layer protocols. Recently, there have been heightened privacy concerns over the data collected by and transmitted through WSNs. The wireless transmission required by a WSN, and the self-organizing nature of its architecture, makes privacy protection for WSNs an especially challenging problem. This paper provides a state-of-the-art survey of privacy-preserving techniques for WSNs. In particular, we review two main categories of privacy-preserving techniques for protecting two types of private information, data-oriented and context-oriented privacy, respectively. We also discuss a number of important open challenges for future research. Our hope is that this paper sheds some light on a fruitful direction of future research for privacy preservation in WSNs.

Journal ArticleDOI
TL;DR: A new lightweight group-based trust management scheme (GTMS) for wireless sensor networks, which employs clustering and reduces the cost of trust evaluation and is more suitable for large-scale sensor networks.
Abstract: Traditional trust management schemes developed for wired and wireless ad hoc networks are not well suited for sensor networks due to their higher consumption of resources such as memory and power. In this work, we propose a new lightweight group-based trust management scheme (GTMS) for wireless sensor networks, which employs clustering. Our approach reduces the cost of trust evaluation. Also, theoretical as well as simulation results show that our scheme demands less memory, energy, and communication overheads as compared to the current state-of-the-art trust management schemes and it is more suitable for large-scale sensor networks. Furthermore, GTMS also enables us to detect and prevent malicious, selfish, and faulty nodes.

Journal ArticleDOI
24 Feb 2009-Sensors
TL;DR: This paper proposes an improved DFD scheme that performs well in the above situation and can increase the fault detection accuracy greatly, and defines new detection criteria for this scheme.
Abstract: Wireless sensor networks (WSNs) are an important tool for monitoring distributed remote environments. As one of the key technologies involved in WSNs, node fault detection is indispensable in most WSN applications. It is well known that the distributed fault detection (DFD) scheme checks out the failed nodes by exchanging data and mutually testing among neighbor nodes in this network., but the fault detection accuracy of a DFD scheme would decrease rapidly when the number of neighbor nodes to be diagnosed is small and the node's failure ratio is high. In this paper, an improved DFD scheme is proposed by defining new detection criteria. Simulation results demonstrate that the improved DFD scheme performs well in the above situation and can increase the fault detection accuracy greatly.

Proceedings ArticleDOI
04 Nov 2009
TL;DR: Mercury as mentioned in this paper is a wearable, wireless sensor platform for motion analysis of patients being treated for neuromotor disorders, such as Parkinson's Disease, epilepsy, and stroke, which is designed to support long-term, longitudinal data collection on patients in hospital and home settings.
Abstract: This paper describes Mercury, a wearable, wireless sensor platform for motion analysis of patients being treated for neuromotor disorders, such as Parkinson's Disease, epilepsy, and stroke. In contrast to previous systems intended for short-term use in a laboratory, Mercury is designed to support long-term, longitudinal data collection on patients in hospital and home settings. Patients wear up to 8 wireless nodes equipped with sensors for monitoring movement and physiological conditions. Individual nodes compute high-level features from the raw signals, and a base station performs data collection and tunes sensor node parameters based on energy availability, radio link quality, and application specific policies.Mercury is designed to overcome the core challenges of long battery lifetime and high data fidelity for long-term studies where patients wear sensors continuously 12 to 18 hours a day. This requires tuning sensor operation and data transfers based on energy consumption of each node and processing data under severe computational constraints. Mercury provides a high-level programming interface that allows a clinical researcher to rapidly build up different policies for driving data collection and tuning sensor lifetime. We present the Mercury architecture and a detailed evaluation of two applications of the system for monitoring patients with Parkinson's Disease and epilepsy.

Journal ArticleDOI
TL;DR: The MI waveguide technique for communication is developed to address the high attenuation challenges of MI waves through soil, and a channel model is provided to characterize the wireless channel for WUCNs in underground mines and road/subway tunnels.

Journal ArticleDOI
01 Jul 2009
TL;DR: This paper takes a unique look at the cluster head election problem, specifically concentrating on applications where the maintenance of full network coverage is the main requirement and uses coverage-aware selection of cluster head nodes, active sensor nodes and routers.
Abstract: Coverage preservation is one of the basic QoS requirements of wireless sensor networks, yet this problem has not been sufficiently explored in the context of cluster-based sensor networks. Specifically, it is not known how to select the best candidates for the cluster head roles in applications that require complete coverage of the monitored area over long periods of time. In this paper, we take a unique look at the cluster head election problem, specifically concentrating on applications where the maintenance of full network coverage is the main requirement. Our approach for cluster-based network organization is based on a set of coverage-aware cost metrics that favor nodes deployed in densely populated network areas as better candidates for cluster head nodes, active sensor nodes and routers. Compared with using traditional energy-based selection methods, using coverage-aware selection of cluster head nodes, active sensor nodes and routers in a clustered sensor network increases the time during which full coverage of the monitored area can be maintained anywhere from 25% to 4.5x, depending on the application scenario.

Journal ArticleDOI
30 Oct 2009-Sensors
TL;DR: The design, research and development of a wireless multisensor network which mixes sensors with IP cameras in a wireless network in order to detect and verify fire in rural and forest areas of Spain and the test performance given by a test bench formed by four wireless IP cameras is shown and the energy consumed when they are transmitting.
Abstract: Forest and rural fires are one of the main causes of environmental degradation in Mediterranean countries. Existing fire detection systems only focus on detection, but not on the verification of the fire. However, almost all of them are just simulations, and very few implementations can be found. Besides, the systems in the literature lack scalability. In this paper we show all the steps followed to perform the design, research and development of a wireless multisensor network which mixes sensors with IP cameras in a wireless network in order to detect and verify fire in rural and forest areas of Spain. We have studied how many cameras, sensors and access points are needed to cover a rural or forest area, and the scalability of the system. We have developed a multisensor and when it detects a fire, it sends a sensor alarm through the wireless network to a central server. The central server selects the closest wireless cameras to the multisensor, based on a software application, which are rotated to the sensor that raised the alarm, and sends them a message in order to receive real-time images from the zone. The camera lets the fire fighters corroborate the existence of a fire and avoid false alarms. In this paper, we show the test performance given by a test bench formed by four wireless IP cameras in several situations and the energy consumed when they are transmitting. Moreover, we study the energy consumed by each device when the system is set up. The wireless sensor network could be connected to Internet through a gateway and the images of the cameras could be seen from any part of the world.