scispace - formally typeset
Search or ask a question

Showing papers on "Wireless sensor network published in 2008"


Journal ArticleDOI
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.

5,626 citations


Journal ArticleDOI
TL;DR: Recent developments and open research issues in spectrum management in CR networks are presented and four main challenges of spectrum management are discussed: spectrum sensing, spectrum decision, spectrum sharing, and spectrum mobility.
Abstract: Cognitive radio networks will provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access techniques. However, CR networks impose challenges due to the fluctuating nature of the available spectrum, as well as the diverse QoS requirements of various applications. Spectrum management functions can address these challenges for the realization of this new network paradigm. To provide a better understanding of CR networks, this article presents recent developments and open research issues in spectrum management in CR networks. More specifically, the discussion is focused on the development of CR networks that require no modification of existing networks. First, a brief overview of cognitive radio and the CR network architecture is provided. Then four main challenges of spectrum management are discussed: spectrum sensing, spectrum decision, spectrum sharing, and spectrum mobility.

1,722 citations


BookDOI
TL;DR: Energy Harvesting Technologies as mentioned in this paper provides a cohesive overview of the fundamentals and current developments in the field of energy harvesting, as well as theory and design rules required for fabrication of efficient electronics, and recent findings in thermoelectric energy harvesting systems.
Abstract: Energy Harvesting Technologies provides a cohesive overview of the fundamentals and current developments in the field of energy harvesting. In a well-organized structure, this volume discusses basic principles for the design and fabrication of bulk and MEMS based vibration energy systems, theory and design rules required for fabrication of efficient electronics, in addition to recent findings in thermoelectric energy harvesting systems. Combining leading research from both academia and industry onto a single platform, Energy Harvesting Technologies serves as an important reference for researchers and engineers involved with power sources, sensor networks and smart materials.

1,372 citations


Journal ArticleDOI
TL;DR: A detailed exploration of the single-copy routing space is performed in order to identify efficient single- copy solutions that can be employed when low resource usage is critical, and can help improve the design of general routing schemes that use multiple copies.
Abstract: Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this context, conventional routing schemes fail, because they try to establish complete end-to-end paths, before any data is sent. To deal with such networks researchers have suggested to use flooding-based routing schemes. While flooding-based schemes have a high probability of delivery, they waste a lot of energy and suffer from severe contention which can significantly degrade their performance. Furthermore, proposed efforts to reduce the overhead of flooding-based schemes have often been plagued by large delays. With this in mind, we introduce a new family of routing schemes that "spray" a few message copies into the network, and then route each copy independently towards the destination. We show that, if carefully designed, spray routing not only performs significantly fewer transmissions per message, but also has lower average delivery delays than existing schemes; furthermore, it is highly scalable and retains good performance under a large range of scenarios. Finally, we use our theoretical framework proposed in our 2004 paper to analyze the performance of spray routing. We also use this theory to show how to choose the number of copies to be sprayed and how to optimally distribute these copies to relays.

1,162 citations


Proceedings ArticleDOI
22 Apr 2008
TL;DR: TinyECC is presented, a ready-to-use, publicly available software package for ECC-based PKC operations that can be flexibly configured and integrated into sensor network applications and shows the impacts of individual optimizations on the execution time and resource consumptions.
Abstract: Public key cryptography (PKC) has been the enabling technology underlying many security services and protocols in traditional networks such as the Internet. In the context of wireless sensor networks, elliptic curve cryptography (ECC), one of the most efficient types of PKC, is being investigated to provide PKC support in sensor network applications so that the existing PKC-based solutions can be exploited. This paper presents the design, implementation, and evaluation of TinyECC, a configurable library for ECC operations in wireless sensor networks. The primary objective of TinyECC is to provide a ready-to-use, publicly available software package for ECC-based PKC operations that can be flexibly configured and integrated into sensor network applications. TinyECC provides a number of optimization switches, which can turn specific optimizations on or off based on developers' needs. Different combinations of the optimizations have different execution time and resource consumptions, giving developers great flexibility in integrating TinyECC into sensor network applications. This paper also reports the experimental evaluation of TinyECC on several common sensor platforms, including MICAz, Tmote Sky, and Imotel. The evaluation results show the impacts of individual optimizations on the execution time and resource consumptions, and give the most computationally efficient and the most storage efficient configuration of TinyECC.

966 citations


Journal ArticleDOI
01 Jun 2008
TL;DR: This paper reports on the current state of the research on optimized node placement in WSNs, and categorizes the placement strategies into static and dynamic depending on whether the optimization is performed at the time of deployment or while the network is operational, respectively.
Abstract: The major challenge in designing wireless sensor networks (WSNs) is the support of the functional, such as data latency, and the non-functional, such as data integrity, requirements while coping with the computation, energy and communication constraints. Careful node placement can be a very effective optimization means for achieving the desired design goals. In this paper, we report on the current state of the research on optimized node placement in WSNs. We highlight the issues, identify the various objectives and enumerate the different models and formulations. We categorize the placement strategies into static and dynamic depending on whether the optimization is performed at the time of deployment or while the network is operational, respectively. We further classify the published techniques based on the role that the node plays in the network and the primary performance objective considered. The paper also highlights open problems in this area of research.

924 citations


Journal ArticleDOI
TL;DR: To the authors' knowledge, WISP is the first fully programmable computing platform that can operate using power transmitted from a long-range (UHF) RFID reader and communicate arbitrary multibit data in a single response packet.
Abstract: This paper presents the wireless identification and sensing platform (WISP), which is a programmable battery-free sensing and computational platform designed to explore sensor-enhanced radio frequency identification (RFID) applications. WISP uses a 16-bit ultralow-power microcontroller to perform sensing and computation while exclusively operating from harvested RF energy. Sensors that have successfully been integrated into the WISP platform to date include temperature, ambient light, rectified voltage, and orientation. The microcontroller encodes measurements into an electronic product code (EPC) Class 1 Generation 1 compliant ID and dynamically computes the required 16-bit cyclical redundancy checking (CRC). Finally, WISP emulates the EPC protocol to communicate the ID to the RFID reader. To the authors' knowledge, WISP is the first fully programmable computing platform that can operate using power transmitted from a long-range (UHF) RFID reader and communicate arbitrary multibit data in a single response packet.

917 citations


Journal ArticleDOI
TL;DR: This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.
Abstract: With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make-up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad-hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd.

879 citations


Proceedings ArticleDOI
21 Sep 2008
TL;DR: This paper presents an easy to install sensor network and an accurate but inexpensive annotation method and shows how the hidden Markov model and conditional random fields perform in recognizing activities.
Abstract: A sensor system capable of automatically recognizing activities would allow many potential ubiquitous applications. In this paper, we present an easy to install sensor network and an accurate but inexpensive annotation method. A recorded dataset consisting of 28 days of sensor data and its annotation is described and made available to the community. Through a number of experiments we show how the hidden Markov model and conditional random fields perform in recognizing activities. We achieve a timeslice accuracy of 95.6% and a class accuracy of 79.4%.

873 citations


Journal ArticleDOI
TL;DR: A Bayesian formulation, specifically a beta reputation system, is employed for the algorithm steps of reputation representation, updates, integration and trust evolution in sensor networks to allow the sensor nodes to develop a community of trust.
Abstract: Sensor network technology promises a vast increase in automatic data collection capabilities through efficient deployment of tiny sensing devices. The technology will allow users to measure phenomena of interest at unprecedented spatial and temporal densities. However, as with almost every data-driven technology, the many benefits come with a significant challenge in data reliability. If wireless sensor networks are really going to provide data for the scientific community, citizen-driven activism, or organizations which test that companies are upholding environmental laws, then an important question arises: How can a user trust the accuracy of information provided by the sensor networkq Data integrity is vulnerable to both node and system failures. In data collection systems, faults are indicators that sensor nodes are not providing useful information. In data fusion systems the consequences are more dire; the final outcome is easily affected by corrupted sensor measurements, and the problems are no longer visibly obvious.In this article, we investigate a generalized and unified approach for providing information about the data accuracy in sensor networks. Our approach is to allow the sensor nodes to develop a community of trust. We propose a framework where each sensor node maintains reputation metrics which both represent past behavior of other nodes and are used as an inherent aspect in predicting their future behavior. We employ a Bayesian formulation, specifically a beta reputation system, for the algorithm steps of reputation representation, updates, integration and trust evolution. This framework is available as a middleware service on motes and has been ported to two sensor network operating systems, TinyOS and SOS. We evaluate the efficacy of this framework using multiple contexts: (1) a lab-scale test bed of Mica2 motes, (2) Avrora simulations, and (3) real data sets collected from sensor network deployments in James Reserve.

869 citations


Proceedings ArticleDOI
17 Jun 2008
TL;DR: This position paper identifies and defines the problem of secure control, investigates the defenses that information security and control theory can provide, and proposes a set of challenges that need to be addressed to improve the survivability of cyber-physical systems.
Abstract: In this position paper we investigate the security of cyber-physical systems. We (1) identify and define the problem of secure control, (2) investigate the defenses that information security and control theory can provide, and (3) propose a set of challenges that need to be addressed to improve the survivability of cyber-physical systems.

Journal ArticleDOI
TL;DR: A hybrid MAC protocol for wireless sensor networks that combines the strengths of TDMA and CSMA while offsetting their weaknesses, ZMAC, which achieves high channel utilization and low latency under low contention and reduces collision among two-hop neighbors at a low cost.
Abstract: This paper presents the design, implementation and performance evaluation of a hybrid MAC protocol, called Z-MAC, for wireless sensor networks that combines the strengths of TDMA and CSMA while offsetting their weaknesses. Like CSMA, Z-MAC achieves high channel utilization and low latency under low contention and like TDMA, achieves high channel utilization under high contention and reduces collision among two-hop neighbors at a low cost. A distinctive feature of Z-MAC is that its performance is robust to synchronization errors, slot assignment failures, and time-varying channel conditions; in the worst case, its performance always falls back to that of CSMA. Z-MAC is implemented in TinyOS.

Proceedings ArticleDOI
05 Nov 2008
TL;DR: This paper presents a new asynchronous duty cycle MAC protocol, called Receiver-Initiated MAC (RI-MAC), that uses receiver-initiated data transmission in order to efficiently and effectively operate over a wide range of traffic loads.
Abstract: The problem of idle listening is one of the most significant sources of energy consumption in wireless sensor nodes, and many techniques have been proposed based on duty cycling to reduce this cost. In this paper, we present a new asynchronous duty cycle MAC protocol, called Receiver-Initiated MAC (RI-MAC), that uses receiver-initiated data transmission in order to efficiently and effectively operate over a wide range of traffic loads. RI-MAC attempts to minimize the time a sender and its intended receiver occupy the wireless medium to find a rendezvous time for exchanging data, while still decoupling the sender and receiver's duty cycle schedules. We show the performance of RI-MAC through detailed ns-2 simulation and through measurements of an implementation in TinyOS in a testbed of MICAz motes. Compared to the prior asynchronous duty cycling approach of X-MAC, RI-MAC achieves higher throughput, packet delivery ratio, and power efficiency under a wide range of traffic loads. Especially when there are contending flows, such as bursty traffic or transmissions from hidden nodes, RI-MAC significantly improves throughput and packet delivery ratio. Even under light traffic load for which X-MAC is optimized, RI-MAC achieves the same high performance in terms of packet delivery ratio and latency while maintaining comparable power efficiency.

Proceedings ArticleDOI
27 Jun 2008
TL;DR: MQTT-S is designed in such a way that it can be run on low-end and battery-operated sensor/actuator devices and operate over bandwidth-constraint WSNs such as ZigBee-based networks.
Abstract: Wireless sensor networks (WSNs) pose novel challenges compared with traditional networks. To answer such challenges a new communication paradigm, data-centric communication, is emerging. One form of data-centric communication is the publish/subscribe messaging system. Compared with other data-centric variants, publish/subscribe systems are common and wide-spread in distributed computing. Thus, extending publish/subscribe systems intoWSNs will simplify the integration of sensor applications with other distributed applications. This paper describes MQTT-S [1], an extension of the open publish/subscribe protocol message queuing telemetry transport (MQTT) [2] to WSNs. MQTT-S is designed in such a way that it can be run on low-end and battery-operated sensor/actuator devices and operate over bandwidth-constraint WSNs such as ZigBee-based networks. Various protocol design points are discussed and compared. MQTT-S has been implemented and is currently being tested on the IBM wireless sensor networking testbed [3]. Implementation aspects, open challenges and future work are also presented.

Journal ArticleDOI
01 Jul 2008
TL;DR: A wireless wearable system that was developed to provide quantitative gait analysis outside the confines of the traditional motion laboratory, the GaitShoe proved highly capable of detecting heel-strike and toe-off, as well as estimating foot orientation and position, inter alia.
Abstract: We describe a wireless wearable system that was developed to provide quantitative gait analysis outside the confines of the traditional motion laboratory. The sensor suite includes three orthogonal accelerometers, three orthogonal gyroscopes, four force sensors, two bidirectional bend sensors, two dynamic pressure sensors, as well as electric field height sensors. The "GaitShoe" was built to be worn in any shoe, without interfering with gait and was designed to collect data unobtrusively, in any environment, and over long periods. The calibrated sensor outputs were analyzed and validated with results obtained simultaneously from the Massachusetts General Hospital, Biomotion Laboratory. The GaitShoe proved highly capable of detecting heel-strike and toe-off, as well as estimating foot orientation and position, inter alia.

Journal ArticleDOI
TL;DR: This paper discusses a selection of promising and interesting research areas in the design of protocols and systems for wireless industrial communications that have either emerged as hot topics in the industrial communications community in the last few years, or which could be worthwhile research Topics in the next few years.
Abstract: In this paper we discuss a selection of promising and interesting research areas in the design of protocols and systems for wireless industrial communications. We have selected topics that have either emerged as hot topics in the industrial communications community in the last few years (like wireless sensor networks), or which could be worthwhile research topics in the next few years (for example cooperative diversity techniques for error control, cognitive radio/opportunistic spectrum access for mitigation of external interferences).

Journal ArticleDOI
TL;DR: In this paper, the semantic sensor web (SSW) proposes that sensor data be annotated with semantic metadata that will both increase interoperability and provide contextual information essential for situational knowledge.
Abstract: Sensors are distributed across the globe leading to an avalanche of data about our environment It is possible today to utilize networks of sensors to detect and identify a multitude of observations, from simple phenomena to complex events and situations The lack of integration and communication between these networks, however, often isolates important data streams and intensifies the existing problem of too much data and not enough knowledge With a view to addressing this problem, the semantic sensor Web (SSW) proposes that sensor data be annotated with semantic metadata that will both increase interoperability and provide contextual information essential for situational knowledge

Journal ArticleDOI
TL;DR: Details of the design and instrumentation of variable rate irrigation, a wireless sensor network, and software for real-time in-field sensing and control of a site-specific precision linear-move irrigation system are described.
Abstract: Efficient water management is a major concern in many cropping systems in semiarid and arid areas. Distributed in-field sensor-based irrigation systemsoffer a potential solution to support site-specific irrigation management that allows producers to maximize their productivity while saving water. This paper describes details of the design and instrumentation of variable rate irrigation, a wireless sensor network, and software for real-time in-field sensing and control of a site-specific precision linear-move irrigation system. Field conditions were site-specifically monitored by six in-field sensor stations distributed across the field based on a soil property map, and periodically sampled and wirelessly transmitted to a base station. An irrigation machine was converted to be electronically controlled by a programming logic controller that updates georeferenced location of sprinklers from a differential Global Positioning System (GPS) and wirelessly communicates with a computer at the base station. Communication signals from the sensor network and irrigation controller to the base station were successfully interfaced using low-cost Bluetooth wireless radio communication. Graphic user interface-based software developed in this paper offered stable remote access to field conditions and real-time control and monitoring of the variable-rate irrigation controller.

Proceedings ArticleDOI
Chenxi Zhang1, Rongxing Lu1, Xiaodong Lin1, Pin-Han Ho1, Xuemin Shen1 
13 Apr 2008
TL;DR: An efficient batch signature verification scheme for communications between vehicles and RSUs (or termed vehicle- to-Infrastructure (V2I) communications), in which an RSU can verify multiple received signatures at the same time such that the total verification time can be dramatically reduced.
Abstract: With the adoption of state-of-the-art telecommunication technologies for sensing and collecting traffic related information, Vehicular Sensor Networks (VSNs) have emerged as a new application scenario that is envisioned to revolutionize the human driving experiences and traffic flow control systems. To avoid any possible malicious attack and resource abuse, employing a digital signature scheme is widely recognized as the most effective approach for VSNs to achieve authentication, integrity, and validity. However, when the number of signatures received by a Roadside Unit (RSU) becomes large, a scalability problem emerges immediately, where the RSU could be difficult to sequentially verify each received signature within 300 ms interval according to the current Dedicated Short Range Communications (DSRC) broadcast protocol. In this paper, we introduce an efficient batch signature verification scheme for communications between vehicles and RSUs (or termed vehicle- to-Infrastructure (V2I) communications), in which an RSU can verify multiple received signatures at the same time such that the total verification time can be dramatically reduced. We demonstrate that the proposed scheme can achieve conditional privacy preservation that is essential in VSNs, where each message launched by a vehicle is mapped to a distinct pseudo identity, while a trust authority can always retrieve the real identity of a vehicle from any pseudo identity. With the proposed scheme, since identity-based cryptography is employed in generating private keys for pseudo identities, certificates are not needed and thus transmission overhead can be significantly reduced.

Journal ArticleDOI
TL;DR: The Battle of the Water Sensor Networks (BWSN) was undertaken as part of the 8th Annual Water Distillery Safety Week, which explored how design algorithms compare to the efforts of human designers for practical design of sensor networks.
Abstract: Following the events of September 11, 2001, in the United States, world public awareness for possible terrorist attacks on water supply systems has increased dramatically. Among the different threats for a water distribution system, the most difficult to address is a deliberate chemical or biological contaminant injection, due to both the uncertainty of the type of injected contaminant and its consequences, and the uncertainty of the time and location of the injection. An online contaminant monitoring system is considered as a major opportunity to protect against the impacts of a deliberate contaminant intrusion. However, although optimization models and solution algorithms have been developed for locating sensors, little is known about how these design algorithms compare to the efforts of human designers, and thus, the advantages they propose for practical design of sensor networks. To explore these issues, the Battle of the Water Sensor Networks (BWSN) was undertaken as part of the 8th Annual Water Dist...

Journal ArticleDOI
TL;DR: Several state-of-the-art algorithms and techniques are presented and compared that aim to address the coverage-connectivity issue in wireless sensor networks.

Proceedings ArticleDOI
03 Apr 2008
TL;DR: This paper serves as a survey for identifying the sources of energy harvesting based on various technical papers available in the public domain.
Abstract: Historically, batteries have been the source of energy for most mobile, embedded and remote system applications. Now, with ubiquitous computing requirements in the fields of embedded systems, wireless sensor networks and low- power electronics such as MEMS devices, an alternative source of energy is required. Also with the limited capacity of finite power sources and the need for supplying energy for a lifetime of a system, there is a requirement for self- powered devices. The process of extracting energy from the surrounding environment is termed as energy harvesting. Energy harvesting, which originated from the windmill and water wheel, is widely being considered as a low- maintenance solution for a wide variety of applications. There are various forms of energy that can be scavenged, like thermal, mechanical, solar, acoustic, wind, and wave. This paper serves as a survey for identifying the sources of energy harvesting based on various technical papers available in the public domain.

Proceedings ArticleDOI
17 Jun 2008
TL;DR: New kinds of application-driven challenges are identified and addressed in the context of this system, called Micro-Blog, which was implemented on Nokia N95 mobile phones and distributed to volunteers for real life use.
Abstract: Recent years have witnessed the impacts of distributed content sharing (Wikipedia, Blogger), social networks (Facebook, MySpace), sensor networks, and pervasive computing. We believe that significant more impact is latent in the convergence of these ideas on the mobile phone platform. Phones can be envisioned as people-centric sensors capable of aggregating participatory as well as sensory inputs from local surroundings. The inputs can be visualized in different dimensions, such as space and time. When plugged into the Internet, the collaborative inputs from phones may enable a high resolution view of the world. This paper presents the architecture and implementation of one such system, called Micro-Blog. New kinds of application-driven challenges are identified and addressed in the context of this system. Implemented on Nokia N95 mobile phones, Micro-Blog was distributed to volunteers for real life use. Promising feedback suggests that Micro-Blog can be a deployable tool for sharing, browsing, and querying global information.

Journal ArticleDOI
TL;DR: In this paper, the authors present a survey of denial-of-service threats and countermeasures considering wireless sensor platforms' resource constraints as well as the denial of sleep attack, which targets a battery-powered device's energy supply.
Abstract: This survey of denial-of-service threats and countermeasures considers wireless sensor platforms' resource constraints as well as the denial-of-sleep attack, which targets a battery-powered device's energy supply. Here, we update the survey of denial-of-service threats with current threats and countermeasures.In particular, we more thoroughly explore the denial-of-sleep attack, which specifically targets the energy-efficient protocols unique to sensor network deployments. We start by exploring such networks' characteristics and then discuss how researchers have adapted general security mechanisms to account for these characteristics.

Journal ArticleDOI
TL;DR: It is concluded that in a circular multihop sensor network with nonuniform node distribution and constant data reporting, the unbalanced energy depletion among all the nodes in the network is unavoidable.
Abstract: In this paper, we investigate the theoretical aspects of the nonuniform node distribution strategy used to mitigate the energy hole problem in wireless sensor networks (WSNs). We conclude that in a circular multihop sensor network (modeled as concentric coronas) with nonuniform node distribution and constant data reporting, the unbalanced energy depletion among all the nodes in the network is unavoidable. Even if the nodes in the inner coronas of the network have used up their energy simultaneously, the ones in the outermost corona may still have unused energy. This is due to the intrinsic many-to-one traffic pattern of WSNs. Nevertheless, nearly balanced energy depletion in the network is possible if the number of nodes increases in geometric progression from the outer coronas to the inner ones except the outermost one. Based on the analysis, we propose a novel nonuniform node distribution strategy to achieve nearly balanced energy depletion in the network. We regulate the number of nodes in each corona and derive the ratio between the node densities in the adjacent (i + 1)th and ith coronas by the strategy. Finally, we propose (q-switch routing, a distributed shortest path routing algorithm tailored for the proposed nonuniform node distribution strategy. Extensive simulations have been performed to validate the analysis.

Proceedings ArticleDOI
22 Apr 2008
TL;DR: This paper introduces CHEF - cluster head election mechanism using fuzzy logic, and proves efficiency of CHEF compared with LEACH using the matlab, showing that CHEF is about 22.7% more efficient than LEACH.
Abstract: In designing the wireless sensor networks, the energy is the most important consideration because the lifetime of the sensor node is limited by the battery of it. To overcome this demerit many research have been done. The clustering is the one of the representative approaches. In the clustering, the cluster heads gather data from nodes, aggregate it and send the information to the base station. In this way, the sensor nodes can reduce communication overheads that may be generated if each sensor node reports sensed data to the base station independently. LEACH is one of the most famous clustering mechanisms. It elects a cluster head based on probability model. This approach may reduce the network lifetime because LEACH does not consider the distribution of sensor nodes and the energy remains of each node. However, using the location and the energy information in the clustering can generate big overheads. In this paper we introduce CHEF - cluster head election mechanism using fuzzy logic. By using fuzzy logic, collecting and calculating overheads can be reduced and finally the lifetime of the sensor networks can be prolonged. To prove efficiency of CHEF, we simulated CHEF compared with LEACH using the matlab. Our simulation results show that CHEF is about 22.7% more efficient than LEACH.

Journal ArticleDOI
TL;DR: This paper addresses the following relay sensor placement problem: given the set of duty sensors in the plane and the upper bound of the transmission range, compute the minimum number of relay sensors such that the induced topology by all sensors is globally connected.
Abstract: This paper addresses the following relay sensor placement problem: given the set of duty sensors in the plane and the upper bound of the transmission range, compute the minimum number of relay sensors such that the induced topology by all sensors is globally connected. This problem is motivated by practically considering the tradeoff among performance, lifetime, and cost when designing sensor networks. In our study, this problem is modelled by a NP-hard network optimization problem named Steiner Minimum Tree with Minimum number of Steiner Points and bounded edge length (SMT-MSP). In this paper, we propose two approximate algorithms, and conduct detailed performance analysis. The first algorithm has a performance ratio of 3 and the second has a performance ratio of 2.5.

Journal ArticleDOI
TL;DR: Whether this MAC scheme meets the design constraints of low-power and low-cost sensor networks is analyzed, and a detailed analytical evaluation of its performance in a star topology network, for uplink and acknowledged uplink traffic is provided.
Abstract: Advances in low-power and low-cost sensor networks have led to solutions mature enough for use in a broad range of applications varying from health monitoring to building surveillance. The development of those applications has been stimulated by the finalization of the IEEE 802.15.4 standard, which defines the medium access control (MAC) and physical layer for sensor networks. One of the MAC schemes proposed is slotted carrier sense multiple access with collision avoidance (CSMA/CA), and this paper analyzes whether this scheme meets the design constraints of those low-power and low-cost sensor networks. The paper provides a detailed analytical evaluation of its performance in a star topology network, for uplink and acknowledged uplink traffic. Both saturated and unsaturated periodic traffic scenarios are considered. The form of the analysis is similar to that of Bianchi for IEEE 802.11 DCF only in the use of a per user Markov model to capture the state of each user at each moment in time. The key assumptions to enable this important simplification and the coupling of the per user Markov models are however different, as a result of the very different designs of the 802.15.4 and 802.11 carrier sensing mechanisms. The performance predicted by the analytical model is very close to that obtained by simulation. Throughput and energy consumption analysis is then performed by using the model for a range of scenarios. Some design guidelines are derived to set the 802.15.4 parameters as function of the network requirements.

Journal ArticleDOI
TL;DR: Some future research directions that are aimed at transitioning the concept of energy harvesting for embedded SHM sensing systems from laboratory research to field-deployed engineering prototypes are defined.
Abstract: This paper reviews the development of energy harvesting for low-power embedded structural health monitoring (SHM) sensing systems. A statistical pattern recognition paradigm for SHM is first presented and the concept of energy harvesting for embedded sensing systems is addressed with respect to the data acquisition portion of this paradigm. Next, various existing and emerging sensing modalities used for SHM and their respective power requirements are summarized followed by a discussion of SHM sensor network paradigms, power requirements for these networks, and power optimization strategies. Various approaches to energy harvesting and energy storage are discussed and limitations associated with the current technology are addressed. The paper concludes by defining some future research directions that are aimed at transitioning the concept of energy harvesting for embedded SHM sensing systems from laboratory research to field-deployed engineering prototypes. Finally, it is noted that many of the technologies discussed herein are applicable to powering any type of low-power embedded sensing system regardless of the application.

Journal ArticleDOI
TL;DR: This paper proposes a low-power maximum power point tracker (MPPT) circuit specifically designed for wireless sensor nodes, i.e., a power transferring circuit for optimally conveying solar energy into rechargeable batteries even in not optimal weather conditions.
Abstract: The success of wireless sensor networks and their pervasive use is somehow constrained by energy supply which, generally provided by batteries, is a finite resource. Energy harvesting mechanisms must hence be taken into account to grant a long time operational life, with solar energy being the most interesting one in outdoor deployments due to its relatively high power density. In this paper we propose a low-power maximum power point tracker (MPPT) circuit specifically designed for wireless sensor nodes (hence effective, flexible, low cost and power-aware), i.e., a power transferring circuit for optimally conveying solar energy into rechargeable batteries even in not optimal weather conditions. High efficiency is granted by an ad hoc adaptive algorithm which, by keeping the MPPT electronics in its optimal working point, maximizes energy transfer from the solar cell to the batteries. The suggested implementation is particularly effective in critical weather conditions where traditional solutions do not work and is characterized by a flexible enough design for immediately hosting, in a plug in fashion, different solar panels and battery typologies.