Design of a Sensor Network Based Security System
|
|
- Jody O’Brien’
- 8 years ago
- Views:
Transcription
1 Design of a Sensor Network Based Security System Gergely Vakulya University of Pannonia Department of Computer Science and Systems Technology Veszprém, Hungary vakulya@dcs.uni-pannon.hu Gyula Simon University of Pannonia Department of Computer Science and Systems Technology Veszprém, Hungary simon@dcs.uni-pannon.hu Abstract In this paper a wireless distributed building safety and security framework will be introduced. The main design goals of the system are completely distributed operation, flexibility, robustness, fast response time, and energy efficiency. The framework uses low duty cycle TDMA-based communication scheme, where the scheduling is the result of optimization, based on network discovery measurements. The hardware and software architecture of a prototype system is introduced. I. INTRODUCTION Building security and safety systems (BSSS) use a wide variety of sensors to detect smoke, fire, intrusion, and also can measure additional environmental properties, e.g. temperature, humidity, lighting conditions. Sensors communicate their measurements and based on the measured properties the system makes decisions and may generate alarms. Most BSSS applications use wired technologies, but due to their ease of deployment and reconfigurability several wireless BSSS solutions have been proposed (e.g. [1], [2], [3], [4]). The sensory aspects and the automatic detection in safety systems have a large literature, see e.g. [5] for a survey. The physical sensors and detection algorithms are out of the scope of this paper, the goal of the proposed system is to provide a general framework, which can incorporate arbitrary sensors or actuators, and also any decision making algorithm. Safety and security systems require real-time response (e.g. alarm after a few seconds of the detection of fire) and robust operation (e.g. fail-safe operation in case of the failure of some nodes). Energy efficiency is also a crucial requirement if the system is operated on batteries. In the proposed system the operation is completely distributed (i.e. no central control or supervisor unit is required except for the system setup), thus the potential single point of failure is avoided. The sensors form a wireless network where the important information is spread throughout the network and each node decides autonomously on its own actions. E.g. an alarm node is not ordered to be activated by another node but rather the alarm node decides itself, based upon the received messages, whether the alarm should be set or not. The system may contain central (optionally mobile) supervision units to monitor the network by the operators. The network propagates not only alert messages but status information as well, thus the intactness of the system is continuously monitored. When a failure is detected (e.g. a node is missing) a system alarm is generated. The energy efficient operation of the network is provided by a low duty cycle TDMA scheduling, computed and optimized when the system is deployed. Robustness is provided by guaranteeing multiple data propagation paths to tolerate single node (or link) failures. The paper is organized as follows. Section II reviews relevant literature. In Section III the proposed system architecture is introduced. In Section IV the hardware and software architecture of a prototype system are described. Section V concludes. II. PREVIOUS WORK The scope of duties in safety and security systems is diversified, covering detection, communication, decision making, and actuation. The specific challenges arising in sensor networkbased applications are discussed in [5] from the viewpoint of fire protection systems. The main design considerations and principles of fire rescue applications, including the hardware and software aspects, are summarized in [6]. In [2] a distributed fire monitoring system is described. It uses MicaZ motes as sensors and their onboard thermometers as fire detectors. The application uses a special network protocol for transporting the critical data. In another interesting solution Bluetooth, primarily designed for computer peripherals, was used in security systems [3]. Due to its small protocol stack and advanced energy saving capabilities ZigBee is often used in wireless sensor networking applications. In [4] a complex fire protection system was presented, using ZigBee for sensor-sensor communication, and a combination of WiFi, 3G and DAB as the communication infrastructure for the fire brigades. TDMA is used in various sensor networking applications to achieve high power efficiency, small end-to-end delay and also to avoid collisions. The scheduling problem is unfortunately NP-complete [7], but approximate solutions are known, e.g. based on graph coloring [7] or nonlinear optimization [8]. The problem of clustered wireless sensor networks was handled in [8], with special emphasis on energy efficiency. In this paper a novel TDMA-based solution will be proposed for energy efficient data dissemination in the whole network (from every node to every node) /11/$ IEEE 15
2 III. THE PROPOSED SECURITY SYSTEM A. Requirements Since this sensor network is designed for safety and security (e.g. fire monitoring and building surveillance) the primary requirements are low latency, high reliability and fault-tolerance. The main system requirements are summarized as follows: The whole system is decentralized; every node is equivalent. In this way no central operation/decision making is required. Every alert message reaches all nodes in at most 5 seconds, which is satisfactory for most fire alarm and intrusion detection systems. The network tolerates a single point of failure, e.g. a fault of one node, or communication link. In case of a failure instant user intervention is required, while the service is still maintained. Dispatching the alert messages are guaranteed even in case of a single point of failure. The network is scalable up to several hundreds of nodes, allowing services in medium-sized buildings. The lifetime of the nodes is at least 1 year, with one battery pack. The requirements on fault tolerance induce that the graph of the network must be 2-connected. In addition to this the following reasonable assumptions are used: The sensor nodes have fixed positions. The nodes have an unique, 64-bit address. by one, with AddressAssign messages. The nodes send an AddressAssignReply message to acknowledge. After the address assignment the base station broadcasts a NeighborRequest message to the network, and after random delays the nodes start to send NeighborShout messages to their neighbors. These messages are single-hop broadcast messages, and they are repeated multiple times. The nodes store the IDs of the neighbors they have received NeighborShout messages from, and also the quality of the links, represented by the triplet {N rec, avgrssi, avglqi}, where N rec is the number of received messages, avgrssi is the average Received Signal Strength Indicator, and avglqi is the average Link Quality Index. After a safe delay the nodes send back the collected information in NeighborReport messages. In case a NeighborReport message does not reach the base station a NeighborRequest message can be addressed to a particular node, instead of the whole network. In this case the selected node sends back its collected information about the neighborhood, without the discovery procedure. B. Operating modes The system has two operating modes: setup and surveillance. The setup mode is used after the deployment of the sensor nodes and it consists of three phases: discovery, optimization and configuration. In discovery phase the network topology is determined. The optimization phase calculates the TDMA schedule, which is then downloaded to the nodes in the configuration phase. The surveillance mode uses the precomputed TDMA schedule to coordinate inter-node communication. C. Network discovery The operation of the network discovery is shown in Fig. 1. The nodes have a 64-bit unique long address, which is impractical for addressing and routing. Thus at the beginning of the discovery phase the long address is replaced by a unique 10-bit short address as follows. The discovery phase is initiated by the base station, by sending a HelloEverybody message to the network. For the network-wide broadcast flood routing is used. As an answer the nodes send their long address in a HelloEverybodyReply message. The converge-cast protocol is handled by a gradientbased routing. To avoid the collisions every node uses a random delay before the actual sending. After the reception of the HelloeverybodyReply messages the base station assigns a short address to the nodes, one Fig. 1. Messages of the discovery phase From the collected NeighborReport messages the base station builds the preliminary connectivity graph G, which contains also the symmetric link quality information, as follows: The vertices of G are the nodes in the network. There is an edge between two vertices in G if the composite link quality index CLQI, computed from {N rec,avgrssi,avglqi}, 16
3 between the corresponding nodes is good in both directions. The weight of an edge between nodes i and j is the minimum of the CLQI quantities between (i, j) and (j, i). This step is shown in Fig. 2(b). From G the reliable connectivity matrix G is generated, by omitting vertices with weights less than a threshold (Fig. 2(c)). D. TDMA optimization In the optimization phase a TDMA schedule is generated. With a clustering algorithm k-connected subgraphs are searched (k 2), as shown in Fig. 2(c). Then a derived graph F is generated, where the vertices represent the clusters and there is an edge between two vertices in F if there are at least two vertex-disjoint paths between the corresponding clusters in G. Then a Hamiltonian cycle is searched in F with a traveling salesman approximator. This cycle then projected back to G, where an edge of F is associated by an edge in G, so that the edges are vertex-disjoint in G (Fig. 2(d), thick lines). In the next step all the remaining points of the clusters are connected to the Hamiltonian cycle (Fig. 2(e), thin lines), producing graph H. Because of the small number of nodes in each cluster, an exhaustive search can also be used for the last step. This way we obtain a cycle, with optional hooks on it. The traversal is built as follows: 1 Start from an arbitrary node in H to an arbitrary direction. 2 Continue until a branch is found. 3 Travel all paths, one after the other, until the end of branch is reached. 4 Continue from step 2 until there are no nodes left. 5 Time slices are associated with the edges of H in the order of the traversal (Fig. 2(e)). Fig. 2(e) shows one direction of the message transmission path with length L =28. This path is reversed and another scheduling is added with the reverse direction. Thus the full TDMA schedule contains 2L time slices. Communicating in both directions provides fault-tolerance, i.e. the information will get to all nodes even if one of the nodes dies. E. Network configuration In the configuration phase the TDMA schedule is downloaded to the nodes, and other working parameters can also be set. The configuration download is reliable, using an acknowledgement for each downloaded packet. F. Surveillance mode In the surveillance mode the communication is organized using the TDMA schedule provided by the optimization phase. TDMA requires precise time synchronization and guaranteed availability of the required resources (radio, CPU). The accurate time synchronization is provided by using a modified version of FTSP [9]. There are two modifications to the original algorithm. First, there are no separate time synchronization messages: the synchronization information is embedded in the existing network traffic. Second, periodical beaconing is provided according to the TDMA time slots. (b) (d) (a) Fig. 2. The TDMA schedule optimization. (a) An example building layout with fire sensors, motion detectors and alarms. (b) The measured connection graph. The thickness of the arcs represent the quality of the corresponding links. (c) The network after thresholding the links and clustering. (d) Hamiltonian-cycle between the clusters (thick lines) and paths inside the clusters (thin lines). Links represented by dashed lines do not participate in the communication. (e) The TDMA schedule in one direction. For the guaranteed availability of system resources slotted programming [10] is used as shown in Fig. 3. The communication is assigned to dedicated time slots, separated from the processing, which may require longer and uncertain amount of time. In each communication time slot exactly one node can transmit to exactly one other node, with acknowledgement. With the applied synchronization method the duty cycle can be lowered to the range of %. Fig. 3. Slotted communication of four consecutive nodes. Each node have a time slot for transmission and for reception. Processing is separated in time from communication. (c) (e) 17
4 IV. PROTOTYPE SYSTEM A. Hardware architecture The sensor node is built around the ZigBit integrated radio device. It contains an 8-bit Atmel ATmega1281 microcontroller, and an RF212 radio transceiver, connected to each other using an SPI bus. The microcontroller has 128kByte flash program memory, 8kByte SRAM, and several peripherals, such as I2C, SPI and analog-digital converter. In the prototype system the 900MHz version of the radio was used, with an external whip antenna. The maximum radio communication bandwidth is 1Mbps. The analog and digital IO ports of the processor can be accessed using an external connector, so several kinds of sensors can be connected to the prototype board. For programming and communication purposes the mote has a JTAG connector and a USB interface with a USB- RS232 converter. The sensor node is shown on Fig. 4. Fig. 4. The sensor node B. Software architecture The sensor node s software uses TinyOS [11], which is a component-based embedded real-time operating system designed to wireless sensor network applications. TinyOS provides a large number of reusable modules, e.g. serial port access, periodical and one-shot timers, single or multihop radio communication [12] and time synchronization [9]. Fig. 5. The architecture of the sensor nodes. The architecture of the sensor nodes is shown in Fig. 5. The main low-level services are the drivers for the radio, the timers and the sensors. The security application can access them through two middleware services (routing, time synchronization), and the measurement service. The configuration service handles the settings of the sensor node. Fig. 6. The architecture of the supervisor unit. The architecture of supervisor unit is shown in Fig. 6. It consists of two main components. In left hand side of the figure the architecture of the system configuration, while in the right hand side the system management component are shown. Both components use the WSN interface to communicate with the wireless sensor network. The discovery service of the system management component is responsible to for detecting the nodes and building the connectivity matrix. Using the data provided by the discovery service the optimization service computes the TDMA schedule, which is then downloaded to the nodes by the configuration service. While the system configuration component is mainly offline, the system management component is heavily online. The wireless sensor network is accessed through a system state service. The user can execute commands or handle (e.g. cancel or confirm) alarms with the commands and the alarm handling services. All user interactions are done using the graphical user interface. C. Results The prototype system was tested in a 15-node network, deployed in an office building. The communication framework provided a 96-byte packet for the application, which was used to transmit alarm messages (e.g. movement detected) and user commands (e.g. activate sensor) with low delay, and status information (e.g. node battery level) with higher delay. The cycle time was two seconds, thus an alarm message can be delivered to each node in the network within 4 seconds in the worst case. The delivery time consists of max. 2 seconds on-node delay from the event detection to the message transmission, and another 2 seconds cycle time for the message hopping through the network (this time actually was much smaller, 15 20ms in the 15-node network.) The average synchronization error between subsequent nodes was 16μs with maximum network-wide synchronization error of 150μs. The radios were switched on either at the sheduled transmission time or slightly before the scheduled reception time. The tight syncronization allowed the prereception awake time be minimal. As a result, the radio of every node was alive for less than 8ms in each cycle, providing duty cycle of 0.4%, which cannot be approached by current off-the-shelf technologies (e.g. Zigbee). The microcontroller s duty cycle was even lower in this simple application. The applied 96-byte useful payload of the messages was more than enough for our simple application but for higher node numbers a careful application-level mechanism must be implemented to control the access to the scarce message resources. 18
5 V. CONCLUSION A sensor network-based massively distributed security framework has been proposed, which can distribute alarm messages in the whole network with low latency and provides high power efficiency. The network needs a central control unit only at the initial phase and later on its operation is completely distributed. The proposed system uses a TDMAbased communication protocol, based on graph-theoretic optimization, in order to provide low duty cycle operation for the nodes. The proposed system is robust and fault-tolerant, as it provides guaranteed system services even in case of a single node failure. The hardware and software architectures of the prototype system were introduced. REFERENCES [1] N. Ikram, S. Durranii, H. Sajid, and H. Saeed, A wireless multimedia sensor network based intelligent safety and security system (IS3), in SENSORCOMM 09: Proceedings of the 2009 Third International Conference on Sensor Technologies and Applications. Washington, DC, USA: IEEE Computer Society, 2009, pp [2] A. Tsertou, R. Upadhyay, D. Laurenson, and S. McLaughlin, Towards a tailored sensor network for fire emergency monitoring in large buildings, in Proceedings of the 1st IEEE International Conference in Wireless Rural and Emergency Communications (WRECOM07), Rome, Italy, Sep [3] S.-H. Choi, B.-K. Kim, J. Park, C.-H. Kang, and D.-S. Eom, An implementation of wireless sensor network for security system using bluetooth, IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp , Feb [4] S.-H. Yang and P. Frederick, SafetyNET a wireless sensor network for fire protection and emergency responses, Measurement and Control, vol. 39, no. 7, pp , Sep [5] M. Bahrepour, N. Meratnia, and P. J. M. Havinga, Automatic fire detection: A survey from wireless sensor network perspective, Centre for Telematics and Information Technology University of Twente, Enschede, Technical Report TR-CTIT-08-73, Dec [6] K. Sha, W. Shi, and O. Watkins, Using wireless sensor networks for fire rescue applications: Requirements and challenges, in Proceedings of IEEE International Conference on Electro/information Technology, [7] S. C. Ergen and P. Varaiya, TDMA scheduling algorithms for wireless sensor networks, Wirel. Netw., vol. 16, no. 4, pp , [8] L. Shi and A. O. Fapojuwo, TDMA scheduling with optimized energy efficiency and minimum delay in clustered wireless sensor networks, IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp , [9] M. Maróti, B. Kusy, G. Simon, and A. Lédeczi, The flooding time synchronization protocol, in Proceedings of the 2nd international conference on Embedded networked sensor systems, ser. SenSys 04. New York, NY, USA: ACM, 2004, pp [Online]. Available: [10] R. Flury and R. Wattenhofer, Slotted programming for sensor networks, in IPSN 10: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks. New York, NY, USA: ACM, 2010, pp [11] P. Levis and D. Gay, TinyOS Programming. New York, NY, USA: Cambridge University Press, [12] M. Maróti, Directed flood-routing framework for wireless sensor networks, in Middleware 04: Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware. New York, NY, USA: Springer-Verlag New York, Inc., 2004, pp
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
More information15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs
15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration
More informationA Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
More informationHigh-Frequency Distributed Sensing for Structure Monitoring
High-Frequency Distributed Sensing for Structure Monitoring K. Mechitov, W. Kim, G. Agha and T. Nagayama* Department of Computer Science, University of Illinois at Urbana-Champaign 201 N. Goodwin Ave.,
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationWireless Sensor Network Based Low Power Embedded System Design For Automated Irrigation System Using MSP430
Wireless Sensor Network Based Low Power Embedded System Design For Automated Irrigation System Using MSP430 Mr. Patil Vikas Anandrao. M Tech. Student (Digital Systems) Rajarambapu Institute of Technology,
More informationIntroduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationDesign of WSN-Based Remote Monitoring System for Environmental Parameters in Substation
International Journal of Smart Grid and Clean Energy Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation Aina Hu a *, Huanhuan Wang b, and Jianchen Wan a a Department
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy
INTRODUCTION TO WIRELESS SENSOR NETWORKS Marco Zennaro, ICTP Trieste-Italy Wireless sensor networks A Wireless Sensor Network is a self-configuring network of small sensor nodes communicating among themselves
More informationDesigning and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System
, pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department
More informationImplementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
More informationWBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable
More informationWireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009
Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth
More informationA Review of Security System for Smart Home Applications
Journal of Computer Science 8 (7): 1165-1170, 2012 ISSN 1549-3636 2012 Science Publications A Review of Security System for Smart Home Applications Mohammad Syuhaimi Ab-Rahman and Mohd Ariff Razaly Department
More informationIntelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
More informationISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationSurveillance System Using Wireless Sensor Networks
Surveillance System Using Wireless Sensor Networks Dan Nguyen, Leo Chang Computer Engineering, Santa Clara University Santa Clara, California, USA dantnguyen84@gmail.com chihshun@gmail.com Abstract The
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationRemote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationLoad Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
More informationWireless Sensor Network for Performance Monitoring of Electrical Machine
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol. 4, No. 1, March 2015, pp. 1~5 ISSN: 2089-4864 1 Wireless Sensor Network for Performance Monitoring of Electrical Machine Priyanka
More informationRemote-Controlled Dissolved Oxygen Monitoring System
Iowa State University Senior Design Remote-Controlled Dissolved Oxygen Monitoring System Final Document Students: Terry Fett-EE Josh Dunham-EE Brian Peck-CprE Grant VerMeer-CprE Advisors: Dr. Joseph Shinar
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationBROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS
Review of the Air Force Academy No 2 (24) 2013 BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Marian ALEXANDRU, Vlad URSU Transilvania University of Brasov, Romania Abstract: A study of how to implement
More informationExperimental implementation of a real-time token-based network protocol on a microcontroller
Experimental implementation of a real-time token-based network protocol on a microcontroller Ferdy Hanssen, Robert Krikke, Bert Baron, Pierre G. Jansen, Hans Scholten Distributed and Embedded Systems group
More informationLoad Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
More informationZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
More informationRT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
More informationREMOTE TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS
REMOTE TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS Varsha jaladi 1, Guthula Ganga Raja Sekhar 2, K.Raghava Rao 3 1 BTech Student, dept. of Electronics and Computers, K L University,
More informationDEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK
International Journal of Computer Application and Engineering Technology Volume 1-Issue1, January 2012.pp.1-7 www.ijcaet.net DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK
More informationNanoMon: An Adaptable Sensor Network Monitoring Software
NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and Telecommunications Research Institute (ETRI) Gajeong-dong
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationSPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network
u Today: Wired embedded networks Ø Characteristics and requirements Ø Some embedded LANs SPI I2C LIN Ethernet u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network Network from a High End
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationSTRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY
Ref: WhP_Rome_vA STRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY WHITE PAPER Summary: This white paper shows how Structural Health Monitoring (SHM), helps to improve the quality in the construction
More informationDesign and Development of SMS Based Wireless Home Appliance Control and Security System
Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al
More informationCSC 774 Advanced Network Security. Outline. Related Work
CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time
More informationPower & Environmental Monitoring
Data Centre Monitoring Made Easy Power & Environmental Monitoring Features & Benefits Packet Power provides the easiest, most cost effective way to capture detailed power and temperature information for
More informationIndustrial Networks & Databases
Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution
More informationHigh rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN
Security Issues and Quality of Service in Real Time Wireless PLC/SCADA Process Control Systems Dr. Halit Eren & Dincer Hatipoglu Curtin University of Technology (Perth Australia) 2/27/2008 1 PRESENTATION
More informationMaximizing Range and Battery Life in Low-Cost Wireless Networks
Maximizing Range and Battery Life in Low-Cost Wireless Networks The proliferation of cost-effective wireless technology has led to the rise of entirely new types of networks across a wide range of applications
More informationWireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
More informationFAMA/TDMA Hybrid MAC for Wireless Sensor Networks
FAMA/TDMA Hybrid MAC for Wireless Sensor Networks Nuwan Gajaweera Dialog-University of Moratuwa Mobile Communication Research Lab, University of Moratuwa, Katubedda, Moratuwa, Sri Lanka Email: nuwang@ent.mrt.ac.lk
More informationAPPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description
APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This
More informationAutomated Security System using ZigBee
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School
More informationWireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
More informationFig. 1 BAN Architecture III. ATMEL BOARD
Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationSensor network infrastructure for intelligent building monitoring and management system
Sensor network infrastructure for intelligent building monitoring and management system 1 R.VENKATESH, 2 K.RADHA, 3 M.GANTHIMATHI 1.B.E-CSE, Muthayammal Engineering College, Rasipuram. 2. Assistant Professor
More informationThe BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications
The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul jellul@imperial.ac.uk Overview Brief introduction to Body Sensor Networks BSN Hardware
More informationCongestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
More informationDesign and Development of SMS Based Wireless Home Appliance Control and Security System
Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad 1, Md. Al Muzahid 2 and Md. Saifuddin Faruk 3 The rapid change in the wireless communication
More informationDipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India
Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur
More informationAN EVOLVABLE OPERATING SYSTEM FOR WIRELESS SENSOR NETWORKS
AN EVOLVABLE OPERATING SYSTEM FOR WIRELESS SENSOR NETWORKS THU-THUY DO, DAEYOUNG KIM, TOMAS SANCHEZ LOPEZ, HYUNHAK KIM, SEONGKI HONG, MINH-LONG PHAM Information and Communications University, 119 Munjiro,
More information3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationAn Intelligent Car Park Management System based on Wireless Sensor Networks
An Intelligent Car Park Management System based on Wireless Sensor Networks Vanessa W.S. Tang, Yuan Zheng, Jiannong Cao Internet and Mobile Computing Lab Department of Computing, The Hong Kong Polytechnic
More informationInternet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
More informationThe design and implementation of the environment monitoring system of smart home based on EnOcean technology
International Conference on Manufacturing Science and Engineering (ICMSE 2015) The design and implementation of the environment monitoring system of smart home based on EnOcean technology Peng Dong1, a,
More informationA Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
More informationDKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD
DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD PRELIMINARY DATA SHEET Wednesday, 16 May 2012 Version 0.5 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes
More informationWireless Home Security System
Wireless Home Security System Group: D14 Members: Vaibhav Singh (05D07026) Abhishek Tiwari (05D07028) Sauvik Chowdhury (05D07029) 1. Abstract The project is aimed at designing a low cost and reliable wireless
More informationSIP Protocol as a Communication Bus to Control Embedded Devices
229 SIP Protocol as a Communication Bus to Control Embedded Devices Ramunas DZINDZALIETA Institute of Mathematics and Informatics Akademijos str. 4, Vilnius Lithuania ramunas.dzindzalieta@gmail.com Abstract.
More informationDesign of Environmental Parameters Monitoring System for Watermelon Seedlings Based on Wireless Sensor Networks
Applied Mathematics & Information Sciences An International Journal 20 NSP 5 (2) (20), 243S-250S Design of Environmental Parameters Monitoring System for Watermelon Seedlings Based on Wireless Sensor Networks
More informationWireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
More informationBodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks
BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks Gengfa Fang and Eryk Dutkiewicz Department of Physics and Engineering Macquarie University, Sydney, NSW, Australia Tel:
More informationVibration Measurement of Wireless Sensor Nodes for Structural Health Monitoring
, pp.18-22 http://dx.doi.org/10.14257/astl.2015.98.05 Vibration Measurement of Wireless Sensor Nodes for Structural Health Monitoring Surgwon Sohn, Seong-Rak Rim, In Jung Lee Div. of Computer and Information
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationPalaparthi.Jagadeesh Chand. Associate Professor in ECE Department, Nimra Institute of Science & Technology, Vijayawada, A.P.
Patient Monitoring Using Embedded Palaparthi.Jagadeesh Chand Associate Professor in ECE Department, Nimra Institute of Science & Technology, Vijayawada, A.P Abstract The aim of this project is to inform
More informationLatency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
More informationService and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
More informationMedium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
More informationSensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao
Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks
More informationMOTEWORKS. Key Features. Overview
MOTEWORKS SOFTWARE PLATFORM MoteWorks 2.0 provides a complete software development environment for wireless sensor network applications. Included is a collection of flexible software packages that enables
More informationM2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit www.advantech.com/products.
M2M I/O Modules 14 M2M I/O Modules Overview 14-2 M2M I/O Modules Selection Guide 14-6 ADAM-2510Z Wireless Router Node 14-8 ADAM-2520Z Wireless Modbus RTU Gateway 14-9 ADAM-2031Z ADAM-2632Z ADAM-2017Z ADAM-2018Z
More information2.0 Command and Data Handling Subsystem
2.0 Command and Data Handling Subsystem The Command and Data Handling Subsystem is the brain of the whole autonomous CubeSat. The C&DH system consists of an Onboard Computer, OBC, which controls the operation
More informationWater Quality Monitoring System Using Zigbee Based Wireless Sensor Network
24 Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network Zulhani Rasin Faculty of Electrical Engineering Universiti Teknikal Malaysia Melaka (UTeM) Melaka, Malaysia Email: zulhani@utem.edu.my
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationWireless monitoring system for temperature and humidity based on ZigBee
Wireless monitoring system for temperature and humidity based on ZigBee Abstract Jianjun Chen* Shaoxing University uanpei College, Shaoxing, Zhejiang, 3000, China Received March 04, www.cmnt.lv Traditional
More informationUsing IPv6 and 6LoWPAN for Home Automation Networks
Using IPv6 and 6LoWPAN for Home Automation Networks Thomas Scheffler / Bernd Dörge ICCE-Berlin Berlin, 06.09.2011 Overview IPv6 and 6LoWPAN for Home Automation Networks 6LoWPAN Application & Network Architecture
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationSynapse s SNAP Network Operating System
Synapse s SNAP Network Operating System by David Ewing, Chief Technology Officer, Synapse Wireless Today we are surrounded by tiny embedded machines electro-mechanical systems that monitor the environment
More informationA survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
More informationEasy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.
1 LCA Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. Christina Vlachou, Julien Herzen, Patrick Thiran (EPFL) Marc Sommer, Hervé Dedieu (HEIG-VD) Gérôme Bovet, Jean
More informationInfluence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
More informationData Management in Sensor Networks
Data Management in Sensor Networks Ellen Munthe-Kaas Jarle Søberg Hans Vatne Hansen INF5100 Autumn 2011 1 Outline Sensor networks Characteristics TinyOS TinyDB Motes Application domains Data management
More informationSensors and actuators are ubiquitous. They are used
Understanding IEEE 1451 Networked Smart Transducer Interface Standard Eugene Y. Song and Kang Lee istockphoto.com What Is a Smart Transducer? Sensors and actuators are ubiquitous. They are used in a variety
More informationADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
More informationMicrochip Technology. February 2008 Valerio Moretto Slide 1
Microchip Technology February 2008 Valerio Moretto Slide 1 Connectivity Solutions Wired Wireless February 2008 Valerio Moretto Slide 2 Microchip Solutions More complex software Operating Systems >40 MIPS
More informationLoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ
LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques
More informationLoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
More informationChapter 2 Principle of Wireless Sensor Networks
Chapter 2 Principle of Wireless Sensor Networks Keywords IEEE 802.15.4 ZigBee 6LowPAN Wireless sensor networks 2.1 Introduction Wireless sensor networks are a subset of wireless networking applications,
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationIndustrial Network Marketing System (WNC)
WIRELESS PROCESS MONITORING AND CONTROL: A Brief Overview Authors: Waqas Ikram and Nina F Thornhill Department of Chemical Engineering Imperial College Contents Contents Motivation Why use Wireless? Opportunities
More informationDATA LOGGER AND REMOTE MONITORING SYSTEM FOR MULTIPLE PARAMETER MEASUREMENT APPLICATIONS. G.S. Nhivekar, R.R.Mudholker
e -Journal of Science & Technology (e-jst) e-περιοδικό Επιστήμης & Τεχνολογίας 55 DATA LOGGER AND REMOTE MONITORING SYSTEM FOR MULTIPLE PARAMETER MEASUREMENT APPLICATIONS G.S. Nhivekar, R.R.Mudholker Department
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More information