Wirelesssensornetworks PDF
Wirelesssensornetworks PDF
Wirelesssensornetworks PDF
Sensor
Networks
LICENSE, DISCLAIMER OF LIABILITY, AND LIMITED WARRANTY
By purchasing or using this book (the “Work”), you agree that this license grants per-
mission to use the contents contained herein, but does not give you the right of owner-
ship to any of the textual content in the book or ownership to any of the information
or products contained in it. This license does not permit uploading of the Work onto
the Internet or on a network (of any kind) without the written consent of the Publisher.
Duplication or dissemination of any text, code, simulations, images, etc. contained
herein is limited to and subject to licensing terms for the respective products, and
permission must be obtained from the Publisher or the owner of the content, etc., in
order to reproduce or network any portion of the textual material (in any media) that is
contained in the Work.
The author, developers, and the publisher of any accompanying content, and anyone
involved in the composition, production, and manufacturing of this work will not be
liable for damages of any kind arising out of the use of (or the inability to use) the algo-
rithms, source code, computer programs, or textual material contained in this publica-
tion. This includes, but is not limited to, loss of revenue or profit, or other incidental,
physical, or consequential damages arising out of the use of this Work.
The sole remedy in the event of a claim of any kind is expressly limited to replacement
of the book, and only at the discretion of the Publisher. The use of “implied warranty”
and certain “exclusions” vary from state to state, and might not apply to the purchaser
of this product.
Wireless
Sensor
Networks
Architecture • Applications • Advancements
S. R. Vijayalakshmi, PhD
&
S. Muruganand, PhD
Original Title and Copyright: Wireless Sensor Network © 2017 by Overseas Press India Pvt. Ltd.
This publication, portions of it, or any accompanying software may not be reproduced in any
way, stored in a retrieval system of any type, or transmitted by any means, media, electronic dis-
play or mechanical display, including, but not limited to, photocopy, recording, Internet postings,
or scanning, without prior permission in writing from the publisher.
The publisher recognizes and respects all marks used by companies, manufacturers, and develop-
ers as a means to distinguish their products. All brand names and product names mentioned in
this book are trademarks or service marks of their respective companies. Any omission or misuse
(of any kind) of service marks or trademarks, etc. is not an attempt to infringe on the property
of others.
181920321 This book is printed on acid-free paper in the United States of America.
Our titles are available for adoption, license, or bulk purchase by institutions, corporations, etc.
For additional information, please contact the Customer Service Dept. at 800-232-0223(toll free).
All of our titles are available in digital format at academiccourseware.com and other digital ven-
dors. The sole obligation of Mercury Learning and Information to the purchaser is to
replace the book, based on defective materials or faulty workmanship, but not based on the
operation or functionality of the product.
CONTENTS
Preface��������������������������������������������������������������������������������������������� x
3 SOFTWARE ARCHITECTURE............................................. 77
3.1 Introduction to Software Architecture ........................................... 77
3.2 Operating System (OS) Requirements ........................................... 78
3.3 Wireless Sensor Network Characteristics ....................................... 78
3.4 Software Architecture Components................................................ 80
3.5 A Cluster-Based, Service-Oriented Architecture ........................... 83
3.6 Software Development For Sensor Nodes ..................................... 86
3.7 Tiny OS............................................................................................. 87
3.8 ZigBee .............................................................................................. 93
Summary ........................................................................................ 107
Questions........................................................................................ 108
Further Reading ............................................................................ 109
References...................................................................................... 109
Wireless sensor networks (WSN) are more and more frequently seen as the
solution to large scale tracking and monitoring applications. WSN provide a
bridge between the real physical and virtual worlds. They allow the ability
to observe the previously unobservable at a fine resolution over large scales.
The deployment of a large number of small, wireless sensors that can sample,
process, and deliver information to external systems (such as the satellite net-
work or the Internet), opens many novel application domains. They have a
wide range of potential applications to industry, science, transportation, civil
infrastructure, and security. The Internet of Things (IoT), which is technically
supported by WSN and other relevant technologies, is discussed. Wireless
Sensor Networks is an essential guide for anyone interested in wireless com-
munications for sensor networks, home networking, or device hacking.
This book covers a large number of topics encountered in the architecture,
application, and advancements of a wireless sensor network. It covers the
basic idea and advanced technologies in the field of sensor networking. It also
covers the research ideas behind any application of a sensor network.
Chapter 1 discusses the Wireless Sensor Network. Introductory points,
usage, applications, difficulties, basic requirements, and history of wireless
networks are covered. Wireless sensor network architecture, communication
protocols, and WSN sensors are introduced in this chapter.
Chapter 2 discusses different types of the node hardware architecture.
The components of a wireless sensor node architecture, modular sensor node
architecture, PIC node architecture, IMote node architecture, XYZ node
architecture, and Hogthrob node architecture are discussed.
Preface • xi
transport layer, network layer, MAC layer, physical layer, cross-layer design,
wireless video sensor networks, three tier architecture of video sensor
networks and wireless video sensor network for autonomous coastal sensing.
Chapter 9 discusses the Mobile Ad hoc Networks (MANETs). Wireless
Ad hoc Sensor Networks, Mobile Ad hoc Networks, Classification of routing
protocols for MANETs, security in ad hoc networks, Ad Hoc Networks and
Internet Connectivity, Mobile Ad hoc networking for the military, Vehicular
ad hoc and Sensor Networks (VANET), applications of VANET, routing
for VANET, security in VANET, VSN architecture for micro-climate
monitoring are all discussed in this chapter.
Chapter 10 discusses routing and security in the WSN. Algorithms
for wireless sensor networks, routing protocols, security in a Wireless
Sensor Network, obstacles of sensor security, security requirements,
attacks, intrusion detection, and finally, defensive measures are discussed
in this chapter.
S. R. Vijayalakshmi
S. Muruganand
CHAPTER
1
WIRELESS SENSOR
NETWORKS
This chapter deals with the introduction of wireless sensor networks.
By the end of the chapter, one can learn the answers to simple questions
like: What is a wireless sensor network? What are the uses and
advantages of these network systems? Where could these devices be
implemented?
Environmental Observation
Sensor networks can be used to monitor environmental changes. An exam-
ple could be water pollution detection in a lake that is located near a factory
that uses chemical substances. Sensor nodes could be randomly deployed
in unknown and hostile areas and relay the exact origin of a pollutant to a
centralized authority to take appropriate measures to limit the spreading of
pollution. Other examples include forest fire detection, air pollution, and
rainfall observation in agriculture.
Internet
Sensor Fields
Sensor Nodes
Military Monitoring
The military uses sensor networks for battlefield surveillance; sensors could
monitor vehicular traffic, track the position of the enemy, or even safeguard
the equipment of the side deploying sensors.
Building Monitoring
Sensors can also be used in large buildings or factories to monitor climate
changes. Thermostats and temperature sensor nodes are deployed all over
the building’s area. In addition, sensors could be used to monitor vibrations
that could damage the structure of a building.
Healthcare
Sensors can be used in biomedical applications to improve the quality of
the provided care. Sensors are implanted in the human body to monitor
medical problems like cancer and help patients maintain their health.
Military Applications
Sensor networks can provide variety of services to the military and air forces
like information collection, battlefield surveillance, intrusion detection, and
attack detection. Application sensor networks have quite an advantage over
other networks, because enemy attacks can damage or destroy some of the
nodes, but node failure in WSN doesn’t affect the whole network. Possible
uses of WSN in the military are:
1. Intrusion Detection: Sensor networks can be used as a two-phase
intrusion detection system. Instead of using mines, intrusion can be
detected by establishing sensor networks in that area. Mines are dan-
gerous to civilians, so instead sensor nodes sense the intrusion and
alarm the army. The response to prevent intrusion can now be decided
by the military.
2. Enemy Tracking and Target Classification: Moving objects with
significant metallic content can be detected using specially designed
sensors, so enemies can be tracked and civilians are ignored. This
system especially helps in detecting armed soldiers and vehicles.
3. Battlefield Surveillance: Critical areas and borders can be closely mon-
itored using sensor networks to obtain information about any enemy
activity in that area. The quick gathering of information provides time
for a quick response.
4. Battlefield Damage Assessment: Sensor networks can be deployed after
the battle or attacks to gather information about damage assessment.
Wireless Sensor Networks • 5
Industrial Applications
Commercial industry has long been interested in taking advantage of sens-
ing as a means of lowering cost and improving machine performance and
maintainability.
1. Machine Health Monitoring: Wireless sensor networks have been
developed as a condition-based maintenance (CBM) solution for
machinery. In wired systems, the cost of wiring limits the installation
of enough sensors. Machine “health” is monitored through the
determination of vibration or wear and lubrication levels. WSNs enable
6 • Wireless Sensor Networks
Finally, one of the most important issues from the user perspective
is the production performance monitoring, evaluation, and improve-
ment that are achieved through IWSNs.
1. Interference Issues
Radio frequency (RF) interference can lead to disastrous problems
with wireless deployments. With 2.4 GHz wireless, there are several
sources of interfering signals, including microwave ovens, cordless
phones, Bluetooth enabled devices, FHSS wireless LANs, and neigh-
boring wireless LANs.
2. Power Management
Electricity in batteries is a limited resource. It is also a concern in the
case of wireless networks.
3. System Interoperability
The ability of two or more systems or components to exchange infor-
mation and to use the information that has been exchanged is also a
difficult process.
8 • Wireless Sensor Networks
4. Security Concerns
Wireless security is the prevention of unauthorized access or damage
to computers using wireless networks.
5. Security Threats
Radio waves can easily penetrate walls. One can passively retrieve the
radio signal without being noticed (Figure 1.2). Someone could mali-
ciously jam a wireless network and create electronic damage.
Building
Radio-
based
Wireless
LAN
6. Installation Issues
Wireless coverage as a contour is shown in Figure 1.3. So, two
different interferences are Intra-system interference (e.g., between its
own access points) and Inter-system interference ( e.g., from external
Bluetooth, which is also on 2.4 GHz).
7. Health Risks
So far, there is no conclusive answer!! Radio is safer than cellular phones!!
A wireless network is even safer, as it operates at 50~100 milliwatts,
compared to 600mw~3w of cellular phones.
Wireless Sensor Networks • 9
8. Wireless Standards
The two wireless standards used by WSNs are 802.15.4 and Zigbee.
The characteristics of these protocols are as follows:
• They are low-power protocols
• Performance is an issue
• Maximum distance is around 100 m
The following are the channels and their bit rates. Channels are:
• 868.0-868.6MHz ➝ 1 channel (Europe)
• 902.0-928.0MHz ➝ 10 channels (USA)
• 2.40-2.48GHz ➝ 16 channels (worldwide)
Radio Waves
Pocket Data transmission
Antenna
RS232 Terminal Audio
UHF / VHF
Node
Digital Ham Radio
Controller Analog
Signal Signal
PC
FIGURE 1.4 Ham radio terminal node controllers.
Ethernet
The Ethernet was developed in the mid 1970s by Xerox, DEC, and Intel,
and was standardized in 1979. The Institute of Electrical and Electronics
Engineers (IEEE) released the official Ethernet standard IEEE 802.3
in 1983. The Fast Ethernet operates at ten times the speed of the regular
Ethernet, and was officially adopted in 1995. It introduces new features such
as full-duplex operation and auto-negotiation. Both these standards use IEEE
802.3 variable-length frames having between 64 and 1514-byte packets.
Token Ring
In 1984 IBM introduced the 4Mbit/s token ring network. The system was
of high quality and robust, but its cost caused it to fall behind the Ethernet
in popularity. IEEE standardized the token ring with the IEEE 802.5
12 • Wireless Sensor Networks
Gigabit Ethernet
The Gigabit Ethernet Alliance was founded in 1996, and the Gigabit
Ethernet standards were ratified in 1999, specifying a physical layer that
uses a mixture of technologies from the original Ethernet and fiber optic
cable technologies from FDDI.
Client-Server
Client-Server networks became popular in the late 1980s with the replace-
ment of large mainframe computers by networks of personal computers.
Application programs for distributed computing environments are essen-
tially divided into two parts: the client or front end, and the server or back
end. The user’s PC is the client and the more powerful server machines
interface to the network.
Peer-to-Peer Networking
Peer-to-peer networking architectures have all machines with equivalent
capabilities and responsibilities. There is no server, and computers connect
to each other, usually using a bus topology, to share files, printers, Internet
access, and other resources.
Peer-to-Peer Computing
Peer-to-peer computing is a significant evolutionary step over P2P
networking. Here, computing tasks are split between multiple computers,
with the result being assembled for further consumption. P2P computing
has sparked a revolution for the Internet Age and has obtained considerable
success in a very short time. The Napster MP3 music file sharing applica-
tion went live in September 1999, and attracted more than 20 million users
by mid-2000.
PCs, printers, and other devices in a local environment, that is, the home.
Current PCs and laptops as purchased have the hardware to support WiFi.
Purchasing and installing a WiFi router and receivers is within the budget
and capability of home PC enthusiasts.
Bluetooth
Bluetooth was initiated in 1998 and standardized by the IEEE as Wireless
Personal Area Network (WPAN) specification IEEE 802.15. Bluetooth is
a short range RF technology aimed at facilitating communication of elec-
tronic devices between each other and with the Internet, allowing for data
synchronization that is transparent to the user. Supported devices include
PCs, laptops, printers, joysticks, keyboards, mice, cell phones, PDAs, and
consumer products. Mobile devices are also supported. Discovery protocols
allow new devices to be hooked up easily to the network. Bluetooth uses
the unlicensed 2.4 GHz band and can transmit data up to 1Mbit/s, can pen-
etrate solid non-metal barriers, and has a nominal range of 10m that can be
extended to 100m. A master station can service up to 7 simultaneous slave
links. Forming a network of these networks, for example, a piconet, can
allow one master to service up to 200 slaves. Currently, Bluetooth devel-
opment kits can be purchased from a variety of suppliers, but the systems
generally require a great deal of time, effort, and knowledge for program-
ming and debugging. Forming piconets has not yet been streamlined and
is unduly difficult.
Home RF
Home RF was initiated in 1998 and has similar goals to Bluetooth for
WPAN. Its goal is shared data/voice transmission. It interfaces with the
Internet as well as the Public Switched Telephone Network. It uses the
2.4 GHz band and has a range of 50 m, suitable for home and yard. A maxi-
mum of 127 nodes can be accommodated in a single network.
ZigBee
ZigBee takes full advantage of a powerful physical radio specified by IEEE
802.15.4. ZigBee adds logical network, security, and application software.
14 • Wireless Sensor Networks
Visible light
Microwaves
Ultraviolet Gamma Rays
Radio waves Infrared X-Rays
10
6
10
7 8
10 10
9
1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021
Frequency(Hz)
FIGURE 1.5 The electromagnetic spectrum.
Wireless Sensor Networks • 15
Table 1.2 The Various Radio Bands and Their Common Use
AM 550-1650 KHz
Audio FM 88-108 MHz
TV
10,000
1000 LANs
Data Rate (Kbps)
100
DECT
10
PCS Packet data Satellite
1 Cellular
CT-X
0.1 Paging
Examples:
LAN: high rate (11 M), small range (50 m).
Satellite: low rate (10 K), extremely large range (1000 Km).
Paging: very low rate (1 Kbps), large cell (10s of Km).
Examples:
Packet Radio Networks: cell size can be 10s of km
data rate: 10 to 20 Kbps
CT-2 cordless telephony standard): cell size: 100 meters
date rate: order of 10 Kbps
Personal communication service (PCS): cell size: 100 meters to 10s of km
data rate: order of 100 Kbps
Smaller cell size implies higher data rate, less power consumption, more
handovers, and more frequency reuse.
Wireless Sensor Networks • 17
1. ISM Bands
In 1985, the FCC modified part 15 to stimulate the use of wireless networks.
ISM stands for Industrial, Scientific, and Medical. It is unlicensed and one
can use freely install and move. Only 2.4 GHz is the world-accepted ISM
band. 902 MHz is easier in manufacturing. Figure 1.8 shows the Industrial,
Scientific and Medical (ISM) frequency bands.
902 MHz
2.4 GHz 2.4 GHz
5.7 GHz
Spread signal
spectrum
Frequency
Spread Spectrum
The disadvantage of this is that it contradicts with the goal of conserving
bandwidth. The advantage is that it is less susceptible to electrical noise
(especially from narrow band sources). In World War II, the U.S. Army
used spread spectrum to avoid hostile jamming (invented by Hedy Lamarr,
an actress). To spread a signal, there are two ways:
1. Direct sequence (DSSS)
2. Frequency hopping (FHSS)
interference. If one or more bits in the pattern are damaged during trans-
mission, the original data can be recovered due to the redundancy of the
transmission.
1 0 1
C
Frequency
2.40 2.41 2.42 2.43 2.44 2.45 (GHz)
Network Topology
The basic issue in communication networks is the transmission of messages
to achieve a prescribed message throughput (Quantity of Service) and
Quality of Service (QoS). QoS can be specified in terms of message delay,
message due dates, bit error rates, packet loss, economic cost of transmis-
sion, transmission power, and so on. Depending on QoS, the installation
environment, economic considerations, and the application, one of several
basic network topologies may be used.
Wireless Sensor Networks • 21
Backup Ring
Primary Ring
Mesh Networks
Mesh networks are regularly distributed networks that generally allow
transmission only to a node’s nearest neighbors. The nodes in these net-
works are generally identical, so that mesh nets are also referred to as peer-
to-peer (Figure 1.13) nets. Mesh nets can be good models for large-scale
networks of wireless sensors that are distributed over a geographic region,
for example, personnel or vehicle security surveillance systems. Note that
the regular structure reflects the communications topology; the actual
geographic distribution of the nodes need not be a regular mesh. Since
there are generally multiple routing paths between nodes, these nets are
robust to failure of individual nodes or links. An advantage of mesh nets
is that, although all nodes may be identical and have the same computing
and transmission capabilities, certain nodes can be designated as “group
leaders” that take on additional functions. If a group leader is disabled,
another node can then take over these duties.
Star Topology
All nodes of the star topology are connected to a single hub node. The
hub requires greater message handling, routing, and decision-making
capabilities than the other nodes. If a communication link is cut, it only
affects one node. However, if the hub is incapacitated, the network is
destroyed.
Ring Topology
In the ring topology all nodes perform the same function and there is
no leader node. Messages generally travel around the ring in a single
direction. However, if the ring is cut, all communication is lost. The
self-healing ring network (SHR) shown has two rings and is more fault
tolerant.
Bus Topology
In the bus topology, messages are broadcast on the bus to all nodes. Each
node checks the destination address in the message header and processes
the messages addressed to it. The bus topology is passive in that each node
simply listens for messages and is not responsible for retransmitting any
messages.
Wireless Sensor Networks • 23
Vehicle Monitoring
Animal
Monitoring Medical Monitoring
Machine
Monitoring
Wireless
Data Collection Wireless Sensor
Networks
Wireless BSC
sensor Base Station
Controller
Ship Monitoring Preprocessing
BST Management
Data Acquisition Center
Network (Data base large storage analysis)
Data
Distribution
Distribution
Network
Online Printer Trans Server
Roving Monitoring mitter
Human
Roving Monitor
Human Wireless Wire land
PDA
Monitor (WiFi,Bluetooth, (Etherland WLAN
PDA Cellular Network Optical)
CDMA GSM)
Anywhere
anytime to
access
Note Cellular
book Phone PC
Figure 1.14 shows the complexity of wireless sensor networks, which gener-
ally consist of a data acquisition network and a data distribution network,
monitored and controlled by a management center. The plethora of avail-
able technologies makes even the selection of components difficult, let
alone the design of a consistent, reliable, robust overall system. So, the net-
work protocols are also different for wireless.
24 • Wireless Sensor Networks
Headers
Each message generally has a header identifying its source node, destina-
tion node, length of the data field, and other information. This is used by
the nodes in proper routing of the message. In encoded messages, parity
bits may be included. In packet routing networks, each message is bro-
ken into packets of fixed length. The packets are transmitted separately
through the network and then reassembled at the destination. The fixed
packet length makes for easier routing and satisfaction of QoS. Generally,
voice communications use circuit switching, while data transmissions use
packet routing.
In addition to the information content messages, in some protocols
(e.g., FDDI) the nodes transmit special frames to report and identify fault
conditions. This can allow network reconfiguration for fault recovery. Other
special frames might include route discovery packets or ferrets that flow
through the network, for example, to identify shortest paths, failed links, or
transmission cost information. In some schemes, the ferret returns to the
source and reports the best path for message transmission.
When a node desires to transmit a message, handshaking protocols
with the destination node are used to improve reliability. The source and
destination might transmit alternately as follows: request to send, ready to
receive, send message, message received. Handshaking is used to guaran-
tee QoS and to retransmit messages that were not properly received.
Switching
Most computer networks use a store-and-forward switching technique to
control the flow of information. Then, each time a packet reaches a node, it
is completely buffered in local memory, and transmitted as a whole. More
sophisticated switching techniques include wormhole, which splits the
message into smaller units known as flow control units or flits. The header
flit determines the route. As the header is routed, the remaining flits follow
it in pipeline fashion. This technique currently achieves the lowest message
latency. Another popular switching scheme is virtual-cut-through. Here,
when the header arrives at a node, it is routed without waiting for the rest
of the packet. Packets are buffered either in software buffers in memory or
Wireless Sensor Networks • 25
in hardware buffers, and various sorts of buffers are used including edge
buffers, central buffers, and so forth.
Routing
Since a distributed network has multiple nodes and services many mes-
sages, and each node is a shared resource, many decisions must be made.
There may be multiple paths from the source to the destination. Therefore,
message routing is an important topic. The main performance measures
affected by the routing scheme are throughput (quantity of service) and
average packet delay (quality of service). Routing schemes should also
avoid both deadlock and livelock. Routing methods can be fixed (i.e., pre-
planned), adaptive, centralized, distributed, broadcast, and so on. Perhaps
the simplest routing scheme is the token ring. Here, a simple topology and a
straightforward fixed protocol result in very good reliability and precomput-
able QoS. A token passes continuously around a ring topology. When a node
desires to transmit, it captures the token and attaches the message. As the
token passes, the destination reads the header and captures the message. In
some schemes, it attaches a “message received” signal to the token, which is
then received by the original source node. Then, the token is released and
can accept further messages. The token ring is a completely decentralized
scheme that effectively uses TDMA. Though this scheme is very reliable,
one can see that it results in a waste of network capacity. The token must
pass once around the ring for each message. Therefore, there are various
modifications of this scheme, including using several tokens, and so forth.
Fixed routing schemes often use Routing Tables that dictate the next
node to be routed to, given the current message location and the destina-
tion node. Routing tables can be very large for large networks, and cannot
take into account real-time effects such as failed links, nodes with backed-
up queues, or congested links.
Adaptive routing schemes depend on the current network status and
can take into account various performance measures, including cost of
transmission over a given link, congestion of a given link, reliability of a path,
and time of transmission. They can also account for link or node failures.
Routing algorithms can be based on various network analysis and graph
theoretic concepts in computer science (e.g., A-star tree search) or in
Wireless Sensor Networks • 27
Flow Control
In queuing networks, each node has an associated queue or buffer that can
stack messages. In such networks, flow control and resource assignment are
important. The objectives of flow control are to protect the network from
problems related to overload and speed mismatches, and to maintain QoS,
efficiency, fairness, and freedom from deadlock. If a given node A has high
priority, its messages might be preferentially routed in every case, so that
competing nodes are choked off as the traffic of A increases. Fair routing
schemes avoid this. There are several techniques for flow control: in buffer
management, certain portions of the buffer space are assigned for certain
purposes. In choke packet schemes, any node sensing congestion sends
choke packets to other nodes telling them to reduce their transmissions.
28 • Wireless Sensor Networks
Upper Upper
Layer Layer
Protocols Protocols
Network Network
Layer Layer
Wireless Data Link Wireless Data Link
WANS Wireless Layer Network Layer
LANS/
MANS Physical Physical
Layer Layer
Network Models
A wireless sensor network consists of hundreds or thousands of low cost
nodes which could either have a fixed location or be randomly deployed
to monitor the environment. Due to their small size, they have a number
of limitations. Sensors usually communicate with each other using a multi
hop approach. The flowing of data ends at special nodes called base sta-
tions (sometimes they are also referred to as sinks). A base station links the
sensor network to another network (like a gateway) to disseminate the data
Wireless Sensor Networks • 29
sensed for further processing. Base stations have enhanced capabilities over
simple sensor nodes since they must do complex data processing; this justi-
fies the fact that base stations have workstation/laptop class processors, and
of course enough memory, energy, storage, and computational power to
perform their tasks well. Usually, the communication between base stations
is initiated over high bandwidth links.
One of the biggest problems of sensor networks is power consumption,
which is greatly affected by the communication between nodes. To solve
this issue, aggregation points are introduced to the network. This reduces
the total number of messages exchanged between nodes and saves some
energy. Usually, aggregation points are regular nodes that receive data from
neighboring nodes, perform some kind of processing, and then forward the
filtered data to the next hop. Similar to aggregation points is clustering.
Sensor nodes are organized into clusters, each cluster having a “cluster
head” as the leader. The communication within a cluster must travel
through the cluster head, which then is forwarded to a neighboring cluster
head until it reaches its destination, the base station. Another method for
saving energy is setting the nodes to go idle (into sleep mode) if they are
not needed and wake up when required. Of course, the challenge is to find
a pattern at which energy consumption is made evenly for all the nodes in
the network.
Due to sensors’ limited capabilities, there are a lot of design issues that
must be addressed to achieve an effective and efficient operation of wire-
less sensor networks.
Location Discovery
For many applications tracking an object requires knowing the exact or
approximate physical location of a sensor node in order to link sensed data
with the object under investigation. Furthermore, many geographical rout-
ing protocols need the location of sensor nodes to forward data among the
30 • Wireless Sensor Networks
Security
Is it possible to introduce a new technology without addressing security?
Of course not! However, as with all other technologies, security is not the
top priority when designing something new. This approach is acknowl-
edged by almost everyone, and it is erroneous, but they keep doing it
anyway. Security solutions are constrained when applying them to sensor
networks. For example, cryptography requires complex processing to pro-
vide encryption to the transmitted data. Secure routing, secure discovery,
and verification of location, key establishment and trust setup, and attacks
against sensor nodes, secure group management, and secure data aggre-
gation are some of the many issues that need to be addressed in a security
context.
1451.2 Interface
Smart Transducer Interface
Module (STIM)
XDCR ADC Transducer
Independent
Interface (TII)
XDCR DAC N
Network Capable E
Application T
Dig. I/O address W
XDCR Processor (NCAP)
logic O
R
XDCR ? 1451.1 Object
K
Model
Transducer
Electronic Data
Sheet (TEDS)
FIGURE 1.17 The IEEE 1451 standard for Smart Sensor Networks.
32 • Wireless Sensor Networks
Hardware
Interface local
user
interface N
E
T
D W
Analog to application
Signal S digital O
Sensor Conditioning algorithms communication
P conversion R
K
data storage
Virtual Sensor
△R/R = S∈
with R the resistance, ∈ the strain, and S the gauge factor which depends
on quantities such as the resistivity and the Poisson’s ratio of the mate-
rial. Metals and semiconductors exhibit piezoresistivity. The piezoresistive
effect in silicon is enhanced by doping with boron (p-type silicon can have
a gauge factor up to 200). With semiconductor strain gauges, temperature
compensation is important.
△ V = k △F
Tunneling Sensing
Tunneling sensing depends on the exponential relationship between the
tunneling current I and the tip/surface separation z given by
I = I0 e–kz
Capacitive Sensors
Capacitive sensors typically have one fixed plate and one movable plate.
When a force is applied to the movable plate, the change in capacitance C
is given as
△C = ∈A/△d
with the resulting displacement, A the area, and ∈ the dielectric con-
stant. Changes in capacitance can be detected using a variety of electric
circuits and converted to a voltage or current change for further process-
ing. Inductive sensors, which convert displacement to a change in induc-
tance, are also often useful. Magnetic and Electromagnetic Sensors do
not require direct physical contact and are useful for detecting proximity
effects.
VH
BZ
Ix
current
flow
magnetic
field
Thermo-Mechanical Transduction
Thermo-Mechanical Transduction is used for temperature sensing and
regulation in homes and automobiles. On changes in temperature T, all
materials exhibit (linear) thermal expansion of the form,
△L / L = μ △T
with L the length and μ the coefficient of linear expansion. One can fabri-
cate a strip of two joined materials with different thermal expansions. Then,
the radius of curvature of this thermal bimorph depends on the tempera-
ture change.
Thermoresistive Effects
Thermoresistive effects are based on the fact that the resistance R changes
with temperature T. For moderate changes, the relation is approximately
given by many metals,
△R / R = μR △T
with μR the temperature coefficient of resistance. Hence, silicon is useful
for detecting temperature changes.
Thermocouples
Thermocouples are based on the thermoelectric Seebeck effect, whereby
if a circuit consists of two different materials joined together at each end,
with one junction hotter than the other, current flows in the circuit. This
generates a Seebeck voltage given approximately by,
V = μ (T1 - T2) + (T12 - T22)
with T1, T2 the temperatures at the two junctions. The coefficients depend on
the properties of the two materials. Semiconductor thermocouples gener-
ally have higher sensitivities than do metal thermocouples. Thermocouples
are inexpensive and reliable, and so are much used. Typical thermocouples
have outputs on the order of 50 μV/ °C and some are effective for tempera-
ture ranges of –270 °C to 2700 °C.
36 • Wireless Sensor Networks
Optical Transducers
Optical transducers convert light to various quantities that can be detected.
In the photoelectric effect one electron is emitted at the negative end of a
pair of charged plates for each light photon of sufficient energy. This causes
a current to flow. In photoconductive sensors, photons generate carriers
that lower the resistance of the material. In junction-based photo sensors,
photons generate electron-hole pairs in a semiconductor junction that
cause current flow. This is often misnamed the photovoltaic effect. These
devices include photodiodes and phototransistors. Thermopiles use a ther-
mocouple with one junction coated in a gold or bismuth black absorber,
which generates heat on illumination.
Solar cells are large photodiodes that generate voltage from light.
Bolometers consist of two thermally sensitive resistors in a Wheatstone
bridge configuration, with one of them shielded from the incident light.
Optical transducers can be optimized for different frequencies of light,
resulting in infrared detectors, ultraviolet detectors, and so on. Various
devices, including accelerometers, are based on optical fiber technology,
often using timeof-flight information.
Chemiresistors
Chemiresistors have two interdigitated finger electrodes coated with
specialized chemical coatings that change their resistance when exposed
to certain chemical challenge agents. The electrodes may be connected
Wireless Sensor Networks • 37
0.6 MF DC blocking
capacitor Differential mode Sensor Output
amplifier
Electrochemical Transducers
Electrochemical transducers rely on currents induced by oxidation or
reduction of a chemical species at an electrode surface. These are among
the simplest and most useful of chemical sensors. An electron transfer
reaction occurs that is described by O, with O the oxidized species, R the
38 • Wireless Sensor Networks
reduced species, and z the charge on the ion involved. The resulting cur-
rent density is given in terms of z.
Biosensors
Biosensors of a wide variety of types depend on the high selectivity of many
biomolecular reactions; that is, molecular binding sites of the detector
may only admit certain species of analyte molecules. Unfortunately, such
reactions are not usually reversible, so the sensor is not reusable. These
devices have a biochemically active thin film deposited on a platform
device that converts induced property changes (e.g., mass, resistance)
into detectable electric or optical signals. Suitable conversion platforms
include the IGEFET, ion-sensitive FET (ISFET), SAW (Surface Acoustic
Wave), quartz crystal microbalance (QCM), microcantilevers, and so on.
To provide specificity to a prescribed analyte measurand, for the thin film
one may use proteins (enzymes or antibodies), polysaccharide, nucleic
acid, oligonucleotides, or an ionophore (which has selective responses to
specific ion types). Arrays of sensors can be used, each having a different
biochemically active film, to improve sensitivity. This has been used in the
so-called “electronic nose.”
The Electromagnetic Spectrum can be used to fabricate remote sen-
sors of a wide variety of types. Generally the wavelength suitable for a par-
ticular application is selected based on the propagation distance, the level
of detail and resolution required, the ability to penetrate solid materials or
certain mediums, and the signal processing difficulty. Doppler techniques
allow the measurement of velocities. Millimeter waves have been used for
satellite remote monitoring. Infrared is used for night vision and sensing
heat. IR motion detectors are inexpensive and reliable. Electromagnetic
waves can be used to determine distance using time-of-flight information.
Radar uses RF waves and Lidar uses light (laser). The velocity of light is
c = 299.8 x 10 m/s. GPS uses RF for absolute position localization. Visible
light imaging using cameras is used in a broad range of applications but
generally requires the use of sophisticated and computationally expensive
DSP techniques including edge detection, thresholding, segmentation, pat-
tern recognition, motion analysis, and so forth.
Acoustic Sensors
Acoustic sensors include those that use sound as a sensing medium. Doppler
techniques allow the measurement of velocities. Ultrasound often provides
more information about mechanical machinery vibrations, fluid leakage,
Wireless Sensor Networks • 39
membrane
The differences among the two types of networks are listed as follows:
• More nodes are deployed in a sensor network, up to a hundred or a
thousand nodes, than in an ad hoc network that usually involves far
fewer nodes.
• Sensor nodes are more constrained in computational, energy, and
storage resources than ad hoc.
• Sensor nodes can be deployed in environments without the need of
human intervention and can remain unattended for a long time after
deployment.
• Neighboring sensor nodes often sense the same events from their
environment, thus forwarding the same data to the base station,
resulting in redundant information.
Aggregation and in-network processing often require trust relation-
ships between sensor nodes that are not typically assumed in ad hoc
networks.
2. Reliability
Ensuring a robust design with maintenance-free packaging is very impor-
tant. This is because sensors are that part of the device which mostly comes
into contact with the world, and hence has to have the ability to withstand
harsh environments without losing performance.
3. Easy integration
From the developer’s perspective, using ADC, employing filtering
equations, extracting data, and then calibrating the firmware is troublesome.
This is why, to reduce the design effort, pre- calibrated sensors which
support common interfaces like IIC or SPI, and so on, are preferable. A
common example is the use of NTC or PTC thermistors versus a DHT11
Wireless Sensor Networks • 45
4. Software
There are also some sensors whose role mainly depends on the software.
These analyze the environment by sensing some parameters and make use
of a software to come to a decision. Fuzzy logic plays a vital role in such
sensors. The place where the sensor plays a small role but circuitry and
software play a vital role is the load cell for weighing applications. The load
cell is a wheat stone bridge to develop a differential potential at the stress
applied on one of the wings of the bridge. The developed potential puts in
few microvolts prone to get affected by noise due to external disturbances,
and varies due to vibrations created over the platform. ADCs employed
to read these parameters need to be properly selected. Software to reject
the noise as well as average the weight data to produce a calibrated weight
accurately is as important as a physical sensor.
Summary
• Sensor networks are highly distributed networks of wireless sensor
nodes, deployed in large numbers to monitor the environment or
system.
• A wireless sensor network (WSN) is a collection of nodes organized
into a cooperative network. Each node consists of processing
capability (one or more microcontrollers, CPUs, or DSP chips),
may contain multiple types of memory (program, data, and flash
memories), have a RF transceiver (usually with a single omni-
directional antenna), have a power source (e.g., batteries and solar
cells), and accommodate various sensors and actuators.
46 • Wireless Sensor Networks
Questions
1. What is a wireless sensor network?
2. Explain different network topologies.
3. What are the advantages and uses of WSNs?
4. Write about the historical development of wireless standards.
5. What is the sensor?
6. What is the sensor network?
7. What is the sensor node?
8. What is the definition of a wireless sensor network?
9. List some of applications of WSNs.
10. List some of difficulties in WSN research.
11. What are the basic requirements of WSNs?
12. Define spectrum.
Wireless Sensor Networks • 47
2
NODE HARDWARE
ARCHITECTURE
This chapter discusses different node hardware architectures. At the
end of the chapter, one would be able to select the node architecture
suitable for their project.
Wireless sensor nodes are the essential building blocks in a wireless sensor
network for sensing, processing, and communication. The node stores and
executes the communication protocols as well as data processing algorithms.
It consists of sensing, processing, communication, and power subsystems as
shown in Figure 2.1. It is a trade-off between flexibility and efficiency both
in terms of energy and performance.
Temp. ADC 2
IC
Sensor Subsystem Processor Subsystem Communication Subsystem
Sensing Subsystem
The sensing subsystem integrates all the kinds of sensors, needed to mea-
sure the parameters. Table 2.1 shows the sensors and their application area.
Processor Memory
Address Bus
Data Bus
Harvard Architecture
It provides separate memory spaces for storing program instructions and data.
Each memory space is interfaced with the processor with a separate data bus,
Node Hardware Architecture • 53
and program instructions and data can be accessed at the same time. It has a
special single instruction, multiple data (SIMD) operation, a special arith-
metic operation, and a bit reverse.
It supports multi-tasking operating systems but does not provide virtual
memory protection. This architecture is shown in Figure 2.3.
Data Program
Memory Processor Memory
Address Bus
Data Bus
Disadvantages
It is complex and the design and realization process is costly.
Comparison
Working with a microcontroller is preferred if the design goal is to achieve
flexibility. Working with the other mentioned options is preferred if power
consumption and computational efficiency is desired. DSPs are expensive,
large in size and less flexible; they are best for signal processing, with spe-
cific algorithms. FPGAs are faster than both microcontrollers and digital
signal processors and support parallel computing, but their production cost
and programming difficulty make them less suitable. ASICs have higher
bandwidths; they are the smallest in size, perform much better, and con-
sume less power than any of the other processing types, but have a high cost
of production owing to the complex design process.
Communication Interfaces
The choice is often between serial interfaces: Serial Peripheral Interface
(SPI), General Purpose Input/Output (GPIO), Secure Data Input/Output
(SDIO), and Inter-Integrated Circuit (I2C). Among these, the most com-
monly used buses are SPI and I2C.
Serial Peripheral Interface
SPI (Motorola, in the mid-80s) is a high-speed, full-duplex, synchronous
serial bus. It does not have an official standard, but use of the SPI interface
should conform to the implementation specification of other interfaces.
The SPI bus defines four pins:
1. MOSI (MasterOut/Slaveln): It is used to transmit data from the master
to the slave when a device is configured as a master.
2. MISO (Masterln/SlaveOut): The slave generates this signal, and the
recipient is the master.
3. SCLK (Serial Clock) is used by the master to send the clock signal that
is needed to synchronize transmission. It is used by the slave to read
this signal to synchronize transmission.
4. CS (Chip Select) is used to communicate via the CS port.
Both master and slave devices hold a shift register. Every device in every trans-
mission must read and send data. SPI supports a synchronous communication
Node Hardware Architecture • 57
protocol. The master and the slave must agree on the timing. Master and slave
should agree on two additional parameters:
1. Clock polarity (CPOL) defines whether a clock is used as high- or low-
active.
2. Clock phase (CPHA) determines the times when the data in the regis-
ters is allowed to change and when the written data can be read. Table 2.2
shows the different modes of SPI.
a byte level for fast communication. The device can hold the SCL low until
it completes reading or sending the next byte, which is called handshaking.
The aim of I2C is to minimize costs for connecting devices and accommo-
date lower transmission speeds. I2C defines two speed modes:
1. A fast-mode: A bit rate of up to 400Kbps.
2. High-speed mode: A transmission rate of up to 3.4 Mbps.
They are downward compatible to ensure communication with older com-
ponents. Table 2.3 gives the comparison between SPI and I2C.
SPI I2C
4 lines enable full-duplex transmission. 2 lines reduce space and simplify circuit
layout; lower costs.
No addressing is required due to CS. Addressing enables multi-master mode;
Arbitration is required.
Allowing only one master avoids conflicts Multi-master mode is prone to conflicts.
Hardware requirement support increases Hardware requirement is independent of the
with an increasing number of connected number of devices using the bus.
devices, hence, it is costly.
The master’s clock is configured according to Slower devices may stretch the clock latency
the slave’s speed but speed adaptation slows but keep other devices waiting.
down the master.
Speed depends on the maximum speed of the Speed is limited to 5.4MHz.
slowest device.
Heterogeneous register size allows flexibility Homogeneous register size reduces
in the devices that are supported. overhead.
Combined registers imply every transmission Devices that do not read or provide data are
should be read AND written. not forced to provide potentially useless bytes.
The absence of an official standard leads to Official standard eases integration of devices
application specific implementations. since developers can rely on a certain
implementation.
Buses are essential highways to transfer data, and due to the concern for
size, only serial buses can be used. Serial buses demand high clock speeds
to gain the same throughput as parallel buses. Serial buses can also be bot-
tlenecks (e.g., Von Neumann architecture) or may not scale well with the
processor speed (e.g., I2C). Delays due to contention for bus access become
critical, for example, if some of the devices act unfairly and keep the bus
occupied.
Node Hardware Architecture • 59
Sensors
Processor
Transceiver
I/O
ADC Memory
Power Unit
In addition to the previous units, a wireless sensor node may include a num-
ber of application-specific components, for example, a location detection sys-
tem or mobilizer; for this reason, many commercial sensor nodes include
expansion slots and support serial wired communication.
Sensing Unit
A sensor is a device that measures some physical quantity and converts it into
a signal to be processed by the microcontroller. A wide range of sensor types
exist including seismic, thermal, acoustic, visual, infrared, and magnetic.
Some of the sensors are discussed in the previous chapter. Sensors may be
passive (sensing without active manipulation of the environment) or active
(using active manipulation/probing of the environment to sense data, e.g.,
radar) and may be directional or omni-directional. A wireless sensor node
60 • Wireless Sensor Networks
Microcontroller
A microcontroller provides the processing power for, and coordinates the
activity of, a wireless sensor node. Unlike the processing units associated
with larger computers, a microcontroller integrates processing with some
memory provision and I/O peripherals; such integration reduces the need
for additional hardware, wiring, energy, and circuit board space. In addition
to the memory provided by the microcontroller, it is not uncommon for a
wireless sensor node to include some external memory, for example in the
form of flash memory.
Transceiver
A transceiver unit allows the transmission and reception of data to other
devices connecting a wireless sensor node to a network. Wireless sensor
nodes typically communicate using an RF (radio frequency) transceiver
and a wireless personal area network technology such as Bluetooth or the
802.15.4 compliant protocols ZigBee and MiWi. The 802.15.4 standard
specifies the physical layer and medium access control for low-rate, low-cost
wireless communications while protocols such as ZigBee and MiWi build
upon this by developing the upper layers of the OSI Reference Model. The
Bluetooth specification crosses all layers of the OSI Reference Model and
is also designed for low-rate, low-cost wireless networking. Wireless sen-
sor communications tend to operate in the RF industrial, scientific, and
medical (ISM) bands, which are designed for unlicensed operation.
Power Source
Wireless sensor nodes must be supported by a power unit which is typically
some form of storage (that is, a battery) but may be supported by power
scavenging components (for example, solar cells). Energy from power scav-
enging techniques may only be stored in rechargeable (secondary) batteries,
and this can be a useful combination in wireless sensor node environments
where maintenance operations like battery changing are impractical. To
conserve energy a power unit may additionally support power conservation
techniques such as dynamic voltage scaling.
Node Hardware Architecture • 61
FIGURE 2.6 (a) WSN usingAtmega 128 MC. FIGURE 2.6 (b) WSN using MSP430MC.
Like Figure 2.6(a), the Figure 2.6(b) sensor node uses 802.15.4 wireless
sensor communications in the 2.4GHz ISM band and provides support
for secure radio communications at 250kbps. This board provides onboard
sensing for humidity, temperature, and light as well as an expansion connec-
tor for other sensing devices, displays, and digital peripherals. The Figure
2.6(b) node is powered by an 8MHz Texas Instruments MSP 430 micro-
controller with lOkB of RAM and has 48kB of flash memory. It supports
a range of operating systems for wireless sensor nodes including TinyOS,
SOS, Mantis OS, and Contiki. The two node architectures both use a
62 • Wireless Sensor Networks
c) Tracker / Imager
a) Radio Relay
Radio Module Power/
Radio
Battery Sensor+DSP
Power / Solar
FPGA/Imager Embedded
Processor Compact Flash
Sensing
μC FPGA
μC FPG
A
Processing
Power supply
Communication
The PIC Farm project envisages the development of a pool of readily avail-
able off-the-shelf modules [Figure 2.10] which can be assembled in a “plug
and play” or “Lego style” manner [Figure 2.11]. Each module would encap-
sulate some aspect of wireless sensor node functionality, providing both the
required hardware and software. For example, a radio transceiver module
might include a transceiver device alongside a small microcontroller pro-
grammed to control the operation of the radio, including hardware features
such as power management and application-specific features such as the
encapsulation of data into a given format.
While many of the existing research platforms combine multiple net-
working interfaces (for example, use of SPI and I2C technologies), the PIC
farm project uses a more minimal approach suggesting use of a single data
bus. For the purposes of this research the selected network technology is
I2C, but it is assumed that any technology can be used as long as it meets
the requirements of all intended exchanges within a node. Restriction of the
66 • Wireless Sensor Networks
networking capabilities in this way reduces the cost and complexity of node
hardware with the intention of providing a more lightweight architecture
than some of those described thus far.
Image Encryption
Processing Unit
Unit Processor
Processor
FIGURE 2.11 A possible PIC farm node configuration assembled from four “off the shelf ”
modules connected by a single data bus (power source not shown).
For the purposes of development and evaluation, the project required assem-
bly of a specific PIC farm architecture. A dummy PIC farm node was assembled
using three PIC 16F88 chips. Although not connected to sensor node compo-
nents such as a radio and transceiver, each chip was intended to function as if
part of a PIC farm unit, simulating functionality such as sensing, encryption,
and transmission.
Component Selection
The PIC Farm board was assembled from the following components:
PIC 16F88
The PIC Farm aims to support distributed processing within a wireless
sensor node. For this reason, development of the dummy node utilized
multiple low capability PIC microcontrollers. While the PIC Farm
project should be extendable to configurations composed of multiple
different chips, the dummy node was assembled from three identical
16F88 processors. The PIC Farm dummy node is intended to simulate
a simple wireless sensor node in which three core functionalities are
required:
Node Hardware Architecture • 67
Sensing
An abstract sensing functionality is required. Such functionality should
potentially represent any sensing activity: from the very simple (e.g., tem-
perature sensing) to the more complex (e.g., visual, camera-based sensing).
Radio operations
It is assumed that the wider sensor network within which the dummy node
is considered to operate utilizes some form of radio transmissions. For this
reason, the dummy node should simulate radio operations.
Processing
Wireless sensor nodes vary in the processing provision required: a node
within a security conscious network may require encryption while others
with complex sensors may require specialized data analysis (for example,
face detection, audio localization). The dummy node aims to simulate an
abstract processing operation which could represent a variety of tasks.
The identification of the three core functionalities resulted in the deci-
sion to include three PICs within the dummy node: each chip can potentially
represent any one of the required functionalities. The PIC devices are cheap,
low capability, low power microcontrollers (compared to popular alterna-
tives for wireless sensor node architectures, for example, the MSP 430 con-
sumes 150-300 μA at 1 MHz while a low end PIC consumes around 76 μA at
the same frequency), making them an ideal selection for a distributed sensor
node architecture. The 16F88 [Figure 2.12] is a low to mid range PIC device
providing the smallest possible memory and processing requirements for
the intended implementation at a low cost while ensuring minimal resource
wastage. In addition, the selected devices provide support for a number of
networking technologies including hardware support for I2C.
a) b) RA2/AN2/CVREF/VREF- RA1/AN1
RA3/AN3/CVREF+/C1OUT RA0/AN0
RA4/AN4/T0CKI/C2OUT RA7/OSC1/CLK1
RA6/OSC2/CLKO
RA5/MCLR/VPP
VSS VDD
RB7/AN6/PGD/T1OSI
RB0/INT/CCP1(1)
RB6/AN5/PGC/
RB1/SDI/SDA T1OSO/T1CK1
RB2/SDO/RX/DT RB5/SS/TX/CK
RB3/PGM/CCP1(1) RB4/SCK/SCL
FIGURE 2.12 The PIC 16F88: a) Photograph of the device b) Pin allocations for the device.
68 • Wireless Sensor Networks
LED output
For each PIC on the board, an array of three LEDs was supplied for debug/
output purposes.
In addition to the three LED arrays associated with the processors on
the board, an additional LED array was connected to the MAC bus (see as
follows) to allow easy debugging. Although not representative of any sen-
sor node component, the presence of the LEDs facilitated the PIC Farm
development process. Each LED on the board was connected to a resistor to
limit current consumption. While the use of LEDs provides very limited
output, they are considerably simpler than some alternative output mecha-
nisms (for example, LCD displays or external memory). The simplicity of
LEDs as a method of output allowed easy output even in the early stages
of development.
Push button input
In addition to the LED outputs, the dummy node was equipped with a
push button input component purely for development purposes. While a
typical wireless sensor node would be expected to operate independently of
any user and would therefore not be equipped with such input, the dummy
node was required to demonstrate developed functionality in response to
user input in order to confirm that the expected behavior occurred. The
button was connected to a single device and was generally used for the
purpose of generating new tasks. For example, while developing the MAC
mechanism, the appropriate node was programmed to lock the bus for a
period of time in response to a button press. Use of a push button for this
purpose was ideal, as it was considerably simpler than many other forms of
input device (e.g., microphone, light sensor).
Shared external oscillator
A crystal oscillator was used to provide a common clock source for all devices.
While the PIC Farm does not require such synchronization and should sup-
port cooperation between devices clocked by separate sources (potentially
even at different speeds), use of a common source in this manner simplified
the process of clocking the devices and reduced hardware requirements.
I 2C communication bus
To enable communication between the PIC processors, each device is con-
nected to an I2C bus on pins B1 and B4. The I2C bus is intended for data
exchange using the RPC mechanism.
Node Hardware Architecture • 69
GPIOs
802.15.4 30 MB 2xSPI
SMA Flash 3xUART
radio 2
IC
SDIO
32 MB I/O USB host
SDRAM USBclient
CPU Core A G97
256x8 Camera
SRAM
Supply Battery
Charger
SPI
I2 C
wake up
GPIO & Peripheral Connectors SRAM
256Kx16
Peripheral components:
• DMA controller
• Four 10-bit ADC inputs
72 • Wireless Sensor Networks
RF transceiver
When an RF message has been successfully received, the SPI interface
enables the radio to wake up a sleeping processor. The processor subsystem
controls the commumcation subsystem by either turning it off or putting it
in sleep mode.
Motivation
• Monitors movements of a sow to predict onset of estrus
• So that appropriate care can be given for pregnant sows
• Detecting cough or limping to monitor illness
J S
P
T I
A
Processor G
Subsystem U
FPGA Core A
UART R
T
CLK CLK
48MHz 1.2V 2.5V 4MHz Bus
Exchange
AT Mega 128L MCU Switch
Program Flash S
Communication System
UART P S
I P
I
AVR Processor
Care U
U A
I2C A R
Sensing
Subsystem R T
SRAM T
ADC JTAG
CLK LED 3v
8MHz
Summary
• Wireless sensor nodes are the essential building blocks in a wireless
sensor network for sensing, processing, and communication.
• The sensing subsystem integrates all kinds of sensors needed to
measure the parameters.
• Von Neumann architecture provides a single memory space for
storing program instructions and data.
74 • Wireless Sensor Networks
Questions
1. Draw the architecture of a wireless sensor node.
2. What is a sensing subsystem?
3. Give some of the sensors and their application areas.
4. Write about an analog to digital converter.
5. What are 3 basic architectures of a processor subsystem?
6. What is Von Neumann architecture? Draw its blocks.
7. What is Harvard architecture? Draw its blocks.
8. What is Super-Harvard architecture? Draw its blocks.
9. List advantages and disadvantages of microcontrollers.
10. List advantages and disadvantages of Digital signal Processors.
11. List advantages and disadvantages of ASIC.
12. List advantages and disadvantages of FPGA.
Node Hardware Architecture • 75
References
1. http://www3.nd.edu/~cpoellab/teaching/cse40815/Chapter3.pdf
2. http://comp.ist.utl.pt/ece-wsn/doc/slides/sensys-ch2-single-node.pdf
CHAPTER
3
SOFTWARE ARCHITECTURE
This chapter mainly discusses the software architectures used in
wireless sensor networks.
Request Request
Reply
Reply
TCP/IP
Proprietary Protocol
FIGURE 3.1 Surrogate architecture in sensor networks.
82 • Wireless Sensor Networks
Figure 3.1 illustrates the use case. Such architecture can be realized
using the node application structure shown in Figure 3.2, along with the
sensor network architecture shown in Figure 3.3.
Host Middleware
Algorithms Modules Services VM
Middleware Core
Hardware Sensor
Figure 3.2 illustrates the division of node applications into three layers.
The lowest layer handles hardware specifics, such as hardware and sensor
drivers. The node operating system acts as a buffer layer between the hard-
ware specifics and the host middleware application layer. The operating
system layer handles the processes which relate strictly to the node opera-
tion, while the host middleware handles processes concerning the services
offered by the node to the network.
AdministrationTerminal
Distributed Middleware
Architectural Description
One of the more favored network architectures for wireless sensor net-
works involves clustering. A cluster is a set of adjacent sensors which are
grouped together and interface with the rest of the network through a gate-
way, or cluster head. Gateways are higher energy nodes which maintain the
network in the cluster, perform data aggregation, and organize sensors into
subsets.
Clusters exhibit dynamic behavior. Clusters form and are modified on
the fly depending on conditions and node availability. During cluster for-
mation, one node is elected as the gateway. It is important to note that
while clusters can overlap spatially, one node cannot belong to multiple
clusters.
Given the presence of clustering, a cluster can be regarded as the base unit
for the software architecture. In this case, data collection would be per-
formed in a distributed manner. However, in order to dynamically manage
these clusters, the architecture of the middleware needs be fairly complex.
Figure 3.4 displays the software architecture at the cluster level. Figure 3.5
shows a cluster-based middleware architecture.
As shown in Figure 3.5, the architecture proposed contains an abstrac-
tion modeled as a Virtual Machine. The Virtual Machine provides the same
service as in the first architecture, that of hardware-independent program
execution. However, this Virtual Machine splits down into two additional
layers: the resource management layer and the cluster layer.
Software Architecture • 85
Applications
Application code,
specification Application results
QoS requirements resource usage, and
adaptation policies QoS statistics
QoS interpreter
Virtual machine
Resource
management Resource manager
layer
Resource description Cost models
Resource allocation
Cluster information and adaptation
Cluster
layer Cluster forming and control protocol
Sensor
network
Components
Compile / Link
Evaluate
Node Software
3.7 Tiny OS
Tiny OS is a microthreaded OS that draws on previous work done for light-
weight thread support and efficient network interfaces. It is a two-level
scheduling structure, that is, with long-running tasks that can be inter-
rupted by hardware events and a small, tightly integrated design that allows
the crossover of software components into hardware. TinyOS was designed
by Berkeley. The following are the characteristics of TinyOS.
b. Self organizing
i. Large numbers of nodes
1. Robust operation—no redundancy
ii. Fault tolerance—If a node fails, will the network recover?
c. Concurrency and Cooperative processing
i. Limited memory
ii. Triangulation
iii. Sensor data acquisition, processing, targeting—data aggregation
d. Energy efficiency
i. Nodes in a WSN have limited power supplies
ii. Hostile Environments
iii. Architecture can play a large role
iv. Power sensitive task scheduling
e. Modularity
i. The actual hardware of the nodes may vary, for example, temp sen-
sors, hall effect, proximity, and so on.
ii. While the drivers and software on each node may be specific, the
interface presented to the distributed software should be generic.
f. Client
i. Connects at any place on the network
g. Sensor Application
i. Requests certain information from the network
h. Network software
i. Handles request, maintenance, and so forth.
i. Node-specific software and hardware
j. Middleware
i. “The software layer between operating system and sensor applica-
tion on the one hand and the distributed application which inter-
acts over the network on the other hand.”
ii. In essence, the complexity and layer architecture of the middle-
ware defines the software architecture of the entire system.
Software Architecture • 89
k. Scalable
i. Should perform optimization based on resource constraints at run-
time
l. Adaptive
i. Changes in the network and event under observation call for change.
ii. Network restructuring
a. Distributed application task reallocation
b. Supports scalability and robustness
m.Reflective
i. Changes the actual behavior of layers on the fly
a. Example: The modification of the routing strategy depending
on mobility
n. Generic
i. Standard or generic interfaces between middleware components
ii. Customizes application interfaces
It covers the basic TinyOS abstractions, such as hardware abstractions,
communication, timers, the scheduler, booting, and initialization.
Platforms/Hardware Abstraction
Hardware abstractions in TinyOS generally follow a three-level
abstraction hierarchy, called the HAA (Hardware Abstraction
Architecture).
At the bottom of the HAA is the HPL (Hardware Presentation Layer).
The HPL is a thin software layer on top of the raw hardware, presenting
hardware such as IO pins or registers as nesC interfaces. The middle of the
HAA is the HAL (Hardware Abstraction Layer). The HAL builds on top
of the HPL and provides higher-level abstractions that are easier to use
than the HPL but still provide the full functionality of the underlying hard-
ware. The top of the HAA is the HIL (Hardware Independent Layer). The
HIL builds on top of the HAL and provides abstractions that are hardware
independent. This generalization means that the HIL usually does not pro-
vide all of the functionality that the HAL can. TinyOS supports platforms
such as eyesIFXv2, intelmote2, mica2, mica2dot, micaZ, telosb, tinynode,
btnode3, and so on.
90 • Wireless Sensor Networks
Scheduler
The TinyOS scheduler has a non-preemptive FIFO policy. In TinyOS,
every task has its own reserved slot in the task queue, and a task can only be
posted once. A post fails if and only if the task has already been posted. If a
component needs to post a task multiple times, it can set an internal state
variable so that when the task executes, it reposts itself.
This slight change in semantics greatly simplifies a lot of component
code. Rather than test to see if a task is posted already before posting it, a
component can just post the task. Components do not have to try to recover
from failed posts and retry. The cost is one byte of state per task. Applications
can also replace the scheduler, if they wish. This allows programmers to try
new scheduling policies, such as priority- or deadline-based. It is important
to maintain non-preemptiveness, however, or the scheduler will break all
nesC’s static concurrency analysis.
Booting/Initialization
TinyOS has interface StdControl split into two interfaces: Init and
StdControl. The latter only has two commands: start and stop. In TinyOS,
wiring components to the boot sequence would cause them to be powered
up and started at boot. That is no longer the case: the boot sequence only
initializes components. When it has completed initializing the scheduler,
hardware, and software, the boot sequence signals the Boot.booted event.
The top-level application component handles this event and start services
accordingly.
Virtualization
TinyOS is written with nesC, which introduces the concept of a “generic”
or instantiable component. Generic modules allow TinyOS to have reusable
data structures, such as bit vectors and queues, which simplify develop-
ment. More importantly, generic configurations allow services to encapsu-
late complex wiring relationships for clients that need them.
Timers
TinyOS provides a much richer set of timer interfaces. Timers are one of
the most critical abstractions a mote OS can provide, and so expands the
fidelity and form that timers take. Depending on the hardware resources of
a platform, a component can use 32KHz as well as millisecond granularity
timers, and the timer system may provide one or two high-precision timers
that fire asynchronously (they have the async keyword). Components can
Software Architecture • 91
query their timers for how much time remaining before they fire, and can
start timers in the future (e.g., “start firing a timer at 1Hz starting 31ms
from now”). Timers present a good example of virtualization.
Communication
In TinyOS, the message buffer type is message_t, and it is a buffer that is
large enough to hold a packet from any of a node’s communication inter-
faces. The structure itself is completely opaque: a component cannot ref-
erence its fields. Instead, all buffer accesses go through interfaces. Send
interfaces distinguish the addressing mode of communication abstractions.
Active messages are the network HIL. A platform’s ActiveMessageC com-
ponent defines which network interface is the standard communication
medium. For example, a mica2 defines the CC1000 active message layer
as ActiveMessageC, while the TMote defines the CC2420 active message
layer as ActiveMessageC.
There is no longer a TOS_UART_ADDRESS for active message communi-
cation. Instead, a component should wire to SerialActiveMessageC, which
provides active message communication over the serial port.
Active message communication is virtualized through four generic compo-
nents, which take the AM type as a parameter: AMSenderC, AMReceiverC,
AMSnooperC, and AMSnooping ReceiverC. AMSenderC is virtualized in
that the call to send() does not fail if some other component is sending.
Instead, it fails only if that particular AMSenderC already has a packet out-
standing or if the radio is not in a sending state. Underneath, the active
message system queues and sends these outstanding packets.
Sensors
In TinyOS, named sensor components comprise the HIL of a platform’s
sensors. If a component needs high-frequency or very accurate sampling, it
must use the HAL, which gives it the full power of the underlying platform.
Error Codes
In TinyOS the return code is error_t, whose values include SUCCESS,
FAIL, EBUSY, and ECANCEL. Interface commands and events define
which error codes they may return and why.
Arbitration
Basic abstractions, such as packet communication and timers, can
be virtualized. The most pressing example of this is a shared bus on a
92 • Wireless Sensor Networks
Power Management
Power management is divided into two parts: the power state of the
microcontroller and the power state of devices. Microcontroller Power
Management is computed in a chip-specific manner by examining which
devices and interrupt sources are active. TinyOS provides low-power
stacks for the CC1000 (mica2) and CC2420 (micaz, telosb, imote2)
radios. Both use a low-power listening approach, where transmitters
send long preambles or repeatedly send packets and receivers wake
up periodically to sense the channel to hear if there is a packet being
transmitted.
Network Protocols
TinyOS provides simple reference implementations of two of the most
basic protocols used in mote networks: dissemination and collection.
Dissemination reliably delivers small (fewer than 20 byte) data items to
every node in a network, while collection builds a routing tree rooted at a
sink node. Together, these two protocols enable a wide range of data col-
lection applications. Collection has advanced significantly since the most
recent beta release; experimental tests in multiple network conditions have
seen very high (>98%) delivery rates as long as the network is not saturated.
Software development platforms need to be power-consumption aware,
and miserly on memory usage and processing power.
TinyOS, the operating system that runs on motes, is component-based
in that you ‘assemble’ components that you need into the deployed pro-
gram. These components handle radio communication, sending messages,
taking of measurements, timing, and LEDs. Figure 3.7 shows the internal
component graphware and Figure 3.8 shows an sample application for tem-
perature and light measurement.
Software Architecture • 93
Active Messages
packet
Radio Packet Serial Packet Temp SW
byte
Radio byte UART I2C Photo HW
bit
RFM Clocks
Sensing application
application
Routing Layer
routing
3.8 ZigBee
There are many wireless monitoring and control applications for industrial
and home markets which require longer battery life, lower data rates, and
less complexity than is available from existing wireless standards. These
standards provide higher data rates at the expense of power consump-
tion, application complexity, and cost. What these markets need, in many
cases, is a standards-based wireless technology having the performance
94 • Wireless Sensor Networks
APPLICATION FRAMEWORK
ZigBee
NETWORK / SECURITY Alliance
LAYERS
MAC LAYER
IEEE
PHY LAYER
Since total system cost is a key factor for industrial and home wireless appli-
cations, a highly integrated single-chip approach is the preferred solution of
semiconductor manufacturers developing IEEE 802.15.4 compliant trans-
ceivers. The IEEE standard at the PHY is the significant factor in deter-
mining the RF architecture and topology of ZigBee-enabled transceivers
currently sampling. Generally, CMOS is the desired technology to integrate
both analog circuitry and high gate count digital circuitry for lower cost
with the challenge being RF performance.
For these optimized short-range wireless solutions, the other key
elements above the Physical and MAC Layer are the Network/Security
Layers for sensor and control integration. The ZigBee Alliance is in the
Software Architecture • 95
process of defining the characteristics of these layers for star, mesh, and
cluster tree topologies. The performance of these networks will complement
the IEEE standard while meeting the requirements for low complexity and
low power.
IEEE 802.15.4 Overview
The IEEE 802.15.4 standard defines two PHYs representing three license-
free frequency bands that include sixteen channels at 2.4 GHz, ten chan-
nels at 902 to 928 MHz, and one channel at 868 to 870 MHz. The maximum
data rates for each band are 250 kbps, 40 kbps, and 20 kbps respectively.
The 2.4 GHz band operates worldwide, while the sub-1 GHz band oper-
ates in North America, Europe, and Australia/New Zealand, as in Table 3.1.
The IEEE standard is intended to conform to established regulations in
Europe, Japan, Canada, and the United States.
Both PHYs use the Direct Sequence Spread Spectrum (DSSS). The
modulation type in the 2.4 GHz band is O-QPSK with a 32 PN-code length
and an RF bandwidth of 2 MHz. In the sub-1 GHz bands, BPSK modulation
is used with a 15 PN-code length and operates in an RF bandwidth of
600 kHz in Europe and 1200 kHz in North America.
RF Design Considerations
A representative sub-1 GHz transceiver is shown in Figure 3.10. The IC
contains a 900 MHz physical layer (PHY) and portion of the media access
controller (hardware-MAC). The remaining MAC functions (software-
MAC) and the application layer are executed on an external microcontroller.
96 • Wireless Sensor Networks
All PHY functions are integrated on the chip with minimal external com-
ponents required for a complete radio. A low-cost crystal is used as a ref-
erence for the PLL and to clock the digital circuitry. To optimize energy
consumption in sleep mode while still keeping an accurate time base, a Real
Time Clock reference can be used.
ZMD44101
The analog portion of the receiver converts the desired signal from RF to
the digital baseband. Synchronization, dispreading, and demodulation are
done in the digital portion of the receiver. The digital part of the transmit-
ter does the spreading and baseband filtering, whereas the analog part of
the transmitter does the modulation and conversion to RE The three main
analog blocks — the direct-conversion receiver, direct-conversion transmit-
ter, and fractional-N PLL—are discussed as follows.
The choice of the receiver architecture is mainly a compromise between
performance, cost (considering both silicon area and external components),
and power consumption. A direct-conversion receiver (DCR) architecture
(or Zero-IF architecture) was selected as there is no image frequency and
IF filtering required. Further advantages are that the channel select filters
are low-pass filters, instead of band-pass filters, and the baseband frequency
Software Architecture • 97
is the lowest possible. The DCR architecture provides the additional ben-
efits of lower cost, complexity, and power consumption.
The transmitter architecture is also direct-conversion. Since BPSK
modulation is used, only one baseband path is required. A differential
architecture was used to minimize common mode noise. The output can be
single-ended or differential. The single-ended output was selected for the
advantages of lower cost, an on-chip TR switch, and the elimination of the
requirement for an external balun.
Table 3.1 shows the channel allocation in the sub-1 GHz bands of the
IEEE standard, which sets the required bandwidth and frequency resolu-
tion. This had major impact on the PLL topology. The goal was one PLL
circuit for the 868/915 MHz bands using a fixed crystal frequency. To meet
these requirements, a fractional-N PLL architecture was chosen. An addi-
tional benefit is that the software-controlled fractional-N PLL provides the
adaptability to meet future worldwide spectrum expansion in the range of
860 to 930 MHz.
Zigbee Network Considerations
The features of the PHY include receiver energy detection, link quality
indication, and clear channel assessment. Both contention-based and con-
tention-free channel access methods are supported with a maximum packet
size of 128 bytes, which includes a variable payload up to 104 bytes. Also
employed are 64-bit IEEE and 16-bit short addressing, supporting over
65,000 nodes per network. The MAC provides network association and
disassociation, has an optional superframe structure with beacons for time
synchronization, and a guaranteed time slot (GTS) mechanism for high pri-
ority communications. The channel access method is carrier sense multiple
access with collision avoidance (CSMA-CA).
ZigBee defines the network, security, and application framework profile
layers for an IEEE 802.15.4-based system. ZigBee’s network layer sup-
ports three networking topologies; star, mesh, and cluster tree, as shown
in Figure 3.11. Star networks are common and provide for very long bat-
tery life operation. Mesh, or peer-to-peer, networks enable high levels of
reliability and scalability by providing more than one path through the
network. Cluster-tree networks utilize a hybrid star/mesh topology that
combines the benefits of both for high levels of reliability and support for
battery-powered nodes.
98 • Wireless Sensor Networks
Mesh
Star
PAN coordinator
Cluster Tree
Full Function Device
Reduced Function Device
FIGURE 3.11 ZigBee network topologies.
FFDs and RFDs. FFDs discover other FFDs and RFDs to establish com-
munications, and are typically line powered.
The ZigBee Logical Device type distinguishes the Physical Device types
(RFD or FFD) deployed in a specific ZigBee network. The Logical Device
types are ZigBee Coordinators, ZigBee Routers, and ZigBee End Devices.
The ZigBee Coordinator initializes a network, manages network nodes,
and stores network node information. The ZigBee Router participates in
the network by routing messages between paired nodes. The ZigBee End
Device acts as a leaf node in the network and can be an RFD or FFD.
ZigBee application device types distinguish the type of device from an end-
user perspective as specified by the Application Profiles.
ZigBee’s self-forming and self-healing mesh network architecture permits
data and control messages to be passed from one node to another node via
multiple paths. This feature extends the range of the network and improves
data reliability. This peer-to-peer capability may be used to build large, geo-
graphically dispersed networks where smaller networks are linked together
to form a ‘cluster tree’ network. ZigBee provides a security toolbox to ensure
reliable and secure networks. Access control lists, packet freshness timers, and
128-bit encryption protect data transmission and ZigBee wireless networks.
Zigbee Applications
ZigBee networks consist of multiple traffic types with their own unique
characteristics, including periodic data, intermittent data, and repetitive
low latency data. The characteristics of each are as follows:
• Periodic data—usually defined by the application such as a wireless
sensor or meter. Data typically is handled using a beaconing system
whereby the sensor wakes up at a set time and checks for the beacon,
exchanges data, and goes to sleep.
• Intermittent data—either an application or external stimulus such as
a wireless light switch. Data can be handled in a beaconless system or
disconnected. In a disconnected operation, the device will only attach to
the network when communications is required, saving significant energy.
• Repetitive low latency data—uses time slot allocations such as a
security system. These applications may use the guaranteed time slot
(GTS) capability. GTS is a method of QoS that allows each device a
specific duration of time as defined by the PAN coordinator in the
superframe to do whatever it requires without contention or latency.
100 • Wireless Sensor Networks
Application Framework
Zigbee
Application Application Device
object 240 object 1 Object (ZDO)
802.15.4 FFD
802.15.4 RFD
Network Association
FIGURE 3.13 Zigbee network.
102 • Wireless Sensor Networks
Network Formation
When the user app decides to form a network instead of joining an existing
one, it will instruct the ZDO to call the network formation function. Only a
router that is coordinator-capable can form a network, and this is indicated
in the application layer’s information base. It’s just a term for the app layer’s
configuration table.
When the network formation function is called, a list of allowed chan-
nels needs to be supplied, which may be limited to a subset of the total
available channels (16 channels @ 2.4GHz). The network formation func-
tion will call the MAC’s energy scan and active scan services and perform
scans on the supplied channel list. When the scans are finished, the MAC’s
scan confirm function will return the energy readings and network scan
descriptors to the function via the MAC’s scan confirmation. From there,
the network formation function will need to decide on the channel to join.
The usual criteria is to choose a channel with the lowest energy reading
(lowest amount of traffic) and the fewest networks.
Once the channel is decided on, the newly crowned coordinator will
decide on a PAN ID and set the channel in the radio. The final step is for
Software Architecture • 103
the NWK layer to call the MAC start service which configures the MAC
layer. After that, confirmations go back all the way up to the user app. It is
shown in Figure 3.14.
User App ZDO NWK MAC
User app requests NWK issues
to form ZDO issues MAC energy
a new network network formation scan request
request Energy readings
MAC energy scan taken by the radio
confirm
Beacon request
NWK issues
MAC network Beacon Frame 1
scan request
MAC network scan Beacon Frame n
NWK chooses PAN confirm
ID and channel NWK issues MAC
start request
Network Discovery
As the name implies, the Zigbee network discovery service is used to dis-
cover the existing networks on the current channel. It’s mostly just used
when the device is started to find out if there are any suitable networks to
join, although it can also be called at any time via the user app.
When a network discovery is requested by the ZDO (or user app), the
discovery function will call the MAC’s active scan service which, in turn, will
broadcast a beacon request. When other devices see the beacon request,
they will respond with an 802.15.4 beacon frame. The beacon frame contains
MAC information about the responding device as well as a beacon payload
for generic data. Within that payload, the responding device will include
Zigbee network information such as the protocol ID and version, amount of
routers and end devices allowed to join, the device profile that is being used,
and other somewhat useful information. It is shown in figure 3.15.
104 • Wireless Sensor Networks
When the beacons from the scan request are received, the device will add
both the MAC and NWK info to its scan descriptor list and its neighbor
table. After all of the beacons have been collected, a network discovery con-
firmation will be sent to the ZDO along with the list containing all the scan
descriptors. The ZDO or the user app would then need to decide which
network to join based on certain join critera. It’s here that the user can
specify if they only want their device to join certain networks or even if
there is a specific device they’d like to join to. It is shown in Figure 3.16.
User App ZDO NWK MAC
User app requests
network
ZDO issues
discovery discovery NWK issues
request MAC network
scan request
Beacon request
Beacon Frame 1
Network Join
Joining a device or allowing a device to join is probably one of the most
complicated processes in Zigbee. There are actually two sides to the net-
workjoin function: the child side which sends the request and the parent
side which processes the request and sends the response.
MAC association
NWK join confirm confirm
Association Request
MAC association
indication
Check neighbor
table and assign
network address
MAC association
response
Association Response
NWK join
indication
Summary
• Wireless sensor networks are aggregates of numerous small sensor
nodes.
• The IEEE 802.15.4 / Zigbee standard is one of the most promising
candidates for designing WSNs, which need to be self-organized
and self-healing; that is, nodes automatically establish and maintain
connectivity among themselves.
• WSNs must be self organizing, perform cooperative processing, and
be energy optimized and modular.
• Middleware refers to the software layer between the operating
system and sensor application on the one hand and the distributed
application which interacts over the network on the other hand.
• A cluster is a set of adjacent sensors which are grouped together and
interface with the rest of the network through a gateway or cluster head.
108 • Wireless Sensor Networks
Questions
1. What are the requirements of an operating system?
2. What are the four characteristics of WSNs? Explain each.
3. With the help of a diagram, explain software architecture components.
4. Explain about cluster-based, service-oriented architecture.
5. What are the sensor node software development processes?
6. List the characteristics of TinyOS.
7. Explain the TinyOS abstractions.
8. Give frequency bands and data rate of IEEE 802.15.4.
9. What are design factors to consider in RF design?
10. Write about Zigbee network considerations.
11. Compare RFD and FED.
12. Explain Zigbee stacks.
13. In detail write about the Zigbee network layer.
14. Give the network beacon payload format.
Software Architecture • 109
Further Reading
1. Wireless Sensor Networks: Technology, Protocols, and Applications by
Kazem Sohraby, Daniel Minoli, and Taieb Znati
2. Wireless Sensor Networks: Architecture and Applications by Dr. Anis
Koubaa
3. Wireless Sensor Network Designs by Anna Hac
References
1. http://anp.tu-sofia.bg/djiev/Networks_Wireless.htm
2. http://www.freaklabs.org/index.php/blog/zigbee/
CHAPTER
4
WIRELESS BODY SENSOR
NETWORKS
This chapter discusses the wireless body sensor network for medical
field application.
PDA
Gateway
PC
IP Network
User Interfaces Data Base Analysis:
Back End
FIGURE 4.1 Body sensor network architecture.
multi-hop routing and may use either wired or battery power. Nodes in this
network may vary in their capabilities, but generally do not perform exten-
sive calculation or store much data. The sensor network interfaces to multiple
body networks, seamlessly managing handoff of reported data and maintain-
ing patient presence information.
Backbone
A backbone network connects traditional systems, such as PDAs, PCs, and
databases, to the emplaced sensor network. It also connects discontinuous
sensor nodes by a high-speed relay for efficient routing. The backbone may
communicate wirelessly or may overlay onto an existing wired infrastructure.
Nodes possess significant storage and computation capability, for query pro-
cessing and location services.
Human Interfaces
Patients and caregivers interface with the network using PDAs, PCs, or
wearable devices. These are used for data management, querying, object
location, memory aids, and configuration, depending on who is accessing
the system and for what purpose. Limited interactions are supported with
the on-body sensors and control aids. These may provide memory aids,
alerts, and an emergency commumcation channel. PDAs and PCs provide
richer interfaces to real time and historical data. Caregivers use these to
specify medical sensing tasks and to view important data.
Body networks contain a designated gateway device that mediates inter-
action with the surrounding WSN. This modularizes the system’s interaction
with the body network to ease its integration. Data are streamed directly or
multi-hop through the emplaced network to the gateways for storage, analy-
sis, or distribution to user interfaces. Emplaced Sensors are deployed in
living spaces to sense environmental quality, such as temperature, dust, and
light, or resident activities. Motion and tripwire sensors, in particular, pro-
vide a spatial context for activities and enable location tracking.
Due to their low cost, small form factor, and limited power budget,
the devices answer queries for local data and perform limited processing
Wireless Body Sensor Networks • 115
and caching. Though some deployment environments may enable the use of
mains power, we do not require it so as to support ad hoc retrofitting of exist-
ing structures. Figure 4.2(a) shows the lightweight stack resident on sensor
devices.
Body sensor networks need to support dynamically adding new devices
to the network, which register their capabilities and are initialized. This
flexibility allows the system to change over time as sensors are developed
or new pathologies require monitoring. Gateway software stacks serve as a
commumcation backbone and application level gateway between the wireless
sensor and IP networks. Owing to their greater resources, these devices per-
form major aspects of system operation related to dynamic privacy, power
management, query management, and security. The gateway software stack
is shown in Figure 4.2(b).
Back end programs perform online analysis of sensor data, feeding back
behavior profiles to aid context-aware power management and privacy. A data-
base provides long-term storage of system configuration, user information, pri-
vacy policies, and audit records.
Data base
Driver Phoenix Source Routing Client Manager
a b c
FIGURE 4.2 a) Sensor device software stack b) Gateway software stack
c) Back end analysis and storage.
Figure 4.2 shows the body sensor network software architecture for sensor
devices, gateways, and back end servers.
Activity rhythm analysis processes sensor data stored in the database and
learns behavior patterns of residents. These are used to detect deviations
from personal norms that may signal a short- or long-term decline in resi-
dent health. The back end is extensible to new analyses using a modular
116 • Wireless Sensor Networks
• All devices sample and report their battery supply voltage every four
hours, but only if it is below 2.8V (indicating imminent failure);
• Motion, tripwire, and contact switch sensors report activations on
demand, but no more often than every 100ms to debounce or dampen
spurious bursts;
Wireless Body Sensor Networks • 117
The query manager is the main point of access for user interfaces, translating
between higher level query abstractions. Connected users receive a list of
active devices that is updated in real time as registrations are received. A
request for sensor information about person P must be mapped to a device
(or group of devices) D for execution. Some have static associations, such as
a wearable device owned or assigned to a user. Likewise for locations L in
which fixed sensor nodes are placed. But since networks for assisted liv-
ing are more human oriented and heterogeneous than most other types
of WSNs, many sensor types require dynamic binding based on a person’s
context (location, activity, etc).
Motes that are part of body networks necessarily use batteries (or scav-
enge energy from motion). Consequently, energy efficiency is an important
design issue and an application demands some particular requirements on
power management. First, sensors are used to detect and collect informa-
tion on residents, so they should adapt their operational states according
to changes in the resident’s behavior. Second, power management should
provide openness to system administrators, who should be able to set poli-
cies unique for particular applications. Third, individual sensing modalities,
as well as radio components, should be controllable. For example, the system
may want to set a high rate for temperature sensing, a low rate for light sens-
ing, turn off other sensor types, and set a duty cycle mode for the radio. Last, in
a heterogeneous network with diverse sensor nodes, such as ECG, motion, and
weight sensors, power management should adaptively control each according
to its own characteristics and context, including location.
For battery powered devices, two types of power management opera-
tions are designed, that is, those based on administrator directives and those
which rely on context awareness. First, administrators can directly control
each sensor available on a mote. Sensors can be turned on/off or their rates
set for each sensor type, and the radio is similarly controlled. Also, the effec-
tive period of each command can be set. A typical command may be, “Mote
1 turns off the light sensor, but senses the temperature every 2 seconds for
118 • Wireless Sensor Networks
Wireless
Patient 1 Reception
by a Base-Station
Medical Expert
Accessing
Real-Time Data
Wireless Mode
Patient 2
Patient 3
Sensing Computing
Tx
Antenna
subsystem subsystem
Rx
Computing Subsystem
This is a microcontroller unit, which is responsible for the control of sensors
and the implementation of commumcation protocols. The microcontroller
is usually operated under different operating modes for power manage-
ment purposes.
Communications Subsystem
Issues relating to standard protocols, which depend on application vari-
ables, are obtained as the operating frequency and types of standards to be
used (Zigbee, Bluetooth, among others). This subsystem consists of a short
range radio which is used to communicate with other neighboring nodes
and outside the network. The radio can operate in the modes of transmitter,
receiver, standby, and sleep mode.
Sensing Subsystem
This is a group of sensors or actuators and links nodes outside the network.
The power consumption can be determined using low energy components.
Control level
Field level
The field level consists of a set of sensors and actuators that interact directly
with the environment. The sensors are responsible for obtaining types of
data, for example, thermal, optical, acoustic, seismic, and so on. The actua-
tors on the other hand receive orders which are the result of processing the
information gathered by the sensors so it can be run later. The communica-
tion network establish a communication link between the field level and the
level of control. Nodes that are part of a WSN communications subsystem are
grouped into three categories: Endpoints, Routers, and Gateways. Finally,
the level of control consists of one or more control and/or monitoring cen-
ters, which uses information collected by the sensors to set tasks that require
the performance of the actuators. This control is done through special soft-
ware to manage network topologies and behavior of the network in diverse
environments. One way to consider wireless sensor networks is to organize
hierarchically the nodes of the upper level, which are the most complex,
and know its location through a transmission technique. The challenges in
hierarchically classifying a sensor network are finding relevant quantities to
monitor and collect data, access and evaluate information, and so on.
The information needed for intelligent environments or those whose
variables are complex to obtain is provided by a distributed network of wire-
less sensors which are responsible for detecting and for the early stages of
the processing hierarchy.
122 • Wireless Sensor Networks
Communications Protocols
In a wireless sensor network, the communication method varies depending on
the application, whether medical, industrial, or scientific. One of the most
widely used commumcation protocols is the Zigbee protocol, which is a
technology composed of a set of specifications designed for wireless sensor
networks and controllers. This system is characterized by the type of com-
munication condition; it does not require a high volume of information (just
over a few kilobits per second) and also has a limited walking distance.
Zigbee was designed to provide simple and easy low-cost wireless com-
munications and also provide a connectivity solution for low-data transmis-
sion applications with low power consumption, such as home monitoring,
automation, environmental monitoring, control of industries, and emerging
applications in the area of wireless sensors. The IEEE802.15.4 standard,
which is called Zigbee, can work at three different frequency bands. This pro-
tocol is divided into layers according to the OSI model, where each layer has a
specific function depending on the application of the network. The physical
layer and the medium access control (MAC) are standardized by the IEEE
802.15 (WPAN), which is a working group under the name of 802.15.4; the
higher layers are specified by the Zigbee Alliance.
Some characteristics of the layers are given as follows:
Mesh
Star
ZigBee coordinators
ZigBee routers
ZigBee devices
Cluster Tree
FIGURE 4.6 Network topology.
124 • Wireless Sensor Networks
Data Protection Lower level wireless data High-level wireless data trans-
transfer security required fer security required to protect
patient information
Power Supply Accessible and likely to be changed Inaccessible and difficult to
more easily and frequently replace in implantable setting
Power Demand Likely to be greater as power is Likely to be lower as energy is
more easily supplied more difficult to supply
Energy Scavenging Solar and wind power are most Motion (vibration) and thermal
likely candidates (body heat) most likely candidates
Access Sensors more easily replaceable or Implantable sensor replacement
even disposable difficult and requires
biodegradability
Biocompatibility Not a consideration in most A must for implantable and some
applications external sensors. Likely to increase
cost
Context Awareness Not so important with static sen- Very important because body
sors where environments are well physiology is very sensitive to
defined context change
Wireless Bluetooth, Zigbee, GPRS, wireless Low-power wireless required, with
Technology LAN, and RF already offer solutions signal detection more challenging
Data Transfer Loss of data during wireless trans- Loss of data more significant,
fer is likely to be compensated by and may require additional mea-
number of sensors used sures to ensure QoS and Real-
time data interrogation capabilities
Topology of a BSN
The application design of a BSN is based regularly in the star topology; this
topology has the main advantage of optimizing the energy consumption of the
network due to internal nodes called “slaves.” Only the coordinator will trans-
mit information received by the sensors, but as a great disadvantage, it has
the high possibility of network failure due to the fall of the coordinator node.
of features for the proper selection of sensors that will accurately capture
the required signal, and at the same time, allow the correct transduction of
signals sent. The second stage concerns the correct choice of communica-
tion protocol to use and additional features to the network settings such as
topology. Finally, one must determine the relevant elements to design the
platform for visualization and monitoring of the sensed signals.
FIGURE 4.7 Methodology for development of biomedical signals acquisition and monitor-
ing using WSNs.
Signal Acquisition
The monitoring of biomedical signals requires mechanisms to strengthen,
substantiate, and legitimize the information captured by sensors. It should
be noted that for the acquisition of biomedical signals, one must meet cer-
tain characteristics that do not interfere or alter the information gained. One
should take into account sensor components that are responsible for trap-
ping and generating changes in the captured signals.
The concept of biomedical signals focuses on the acquisition of data of
common phenomena of the human body, which can reach diagnoses and pre-
dict diseases in the short and medium term. A biomedical signal becomes more
complex and useful when it captures a common signal. This allows us to argue
the importance of establishing and using elements that provide as much infor-
mation for the analysis of the signal. To define and translate these signals, a
set of parameters requires special handling. Because of the complexity and
accuracy of bio medical data, signals should have low error rates. The medical
sensors should have the ability to capture slight variations in depth to obtain
the behavior of the human body.
To acquire biomedical surface signals, such as the humidity or tempera-
ture, it should be noted that the structure has characteristics that do not alter
sensor data collected by the sensor. It may be the case that if the limit or stan-
dard level moisture or temperature are not met, it may yield inaccurate data or
oxidation of the sensor to a more advanced level. However, the environments
are not extreme in relation to an industrial environment where sensors may
be exposed to hostile areas. Only the following types of sensors and their
respective form of measurement are known, as seen in Figure 4.8.
Wireless Body Sensor Networks • 127
Types of
sensor
interfaces
and distribution, (iv) Formation of the network, and (v) Selection of ele-
ments. It must be accurate for sensing stability. When analyzing signals, it
must turn to decipher an error-free data set. This should give us a straight
answer, which is a translation of a real situation. For this analysis, one must
count on strong signals. The noise signals may alter reports, as one may find
situations where these noises are not important. To overcome this noise
obstacle, one should take into account all types of filters that can regener-
ate the signal for the system to obtain an adequate response. It should also
follow the specifications with which the sensor reported the state of the
system.
The functionality of a wireless sensor network occurs in large part on
the correct and accurate operation of the nodes that comprise it. For the
acquisition of signals in a given environment using specific sensors, these
sensors are as was seen in the first objective, depending on the application
and the environment in which one wants sensing. Based on the basic prin-
ciples for designing a system for acquiring and processing biomedical signals,
the text provides six phases for the data acquisition phase and later empha-
sizes the hardware design. Figure 4.9 is proposed as follows:
a vital role in the performance of each node in the network. Some of these
components are:
1. Sensing unit and unit performance
2. Processing unit
3. Communications unit
4. Power unit
5. Other
These hardware components should be organized to conduct a proper and
effective work without generating any kind of conflict in support of the spe-
cific applications for which they were designed. Each sensor node needs an
operating system (OS). The operating system operates between the applica-
tion software and hardware and is regularly designed to be used in worksta-
tions and PCs with the following points.
1. The collisions should be avoided whenever possible, since the relay
produces unnecessary energy consumption and other potential delays.
It is necessary to find an optimal solution to avoid overloading the net-
work and avoid maximum power consumption.
2. The delay of the transmission of sent data packets is very important
because it should be broadcasting in continuous time and with the high-
estpossible quality.
3. The receptor of the network must always be in constant operation (On),
for it provides an ideal or hypothetical situation where network only
mode when one needs to send or receive packets and minimize the
monitoring efforts of spots.
4. There are points in the design of a wireless system such as: efficient
use of bandwidth, delay, channel quality, and power consumption.
5. The adaptability and mobility of the network.
After the selection of the development platform begins the design phase
of the application. This stage should establish the visual and written
information to be submitted for a proper medical diagnosis. In order to
visualize the acquired biomedical signals, the following modules must be
designed:
Acquisition Module: This module is responsible for taking the BSN bio-
medical signals gateway.
Separation Module: This module is responsible for recovering the
received frame, and the different signals transmitted (if more than one).
Processing Module: In this module each signal must translate the infor-
mation received in units of voltage to the unit required by the signal such as
temperature and relative humidity, among others.
Display Module: Determines the way in which the signal must be
represented.
Graphical User Interface: This module uses integrated display modules
to facilitate the analysis of information by the end user.
After finally completing the respective designs, the following steps are imple-
menting for the software and then it is tested to check its proper functioning,
as seen in Figure 4.10.
Wireless Body Sensor Networks • 131
Graphical
Acquisition Separation Processing Display User
Module Module Module Module Interface
Module
The impact generated by the use of wireless sensor networks in the quality
of patient care is very high. The use of these devices in home care systems
can reduce hospitalizations, health professionals’ timely interventions can
extend patients’ lives, and in some cases the use of biofeedback techniques
in psychological treatments may overcome difficult phobias. The develop-
ment of such systems implies challenges to be faced in the area of engineer-
ing, such as minimizing energy consumption, since nodes in the network
need to survive as long as possible. Another challenge is assuring the reli-
ability of the information transmitted, since any slight variation may gener-
ate erroneous diagnoses. Finally, one of the biggest concerns is related to
the potential impact of electromagnetic radiation to human bodies subject
to the use of such devices.
FIGURE 4.11 A GUI displays accelerometer data, patient pulse rate, and environmental
temperature.
The system is single hop, as the radio range covers all of the facility. A
multi-hop protocol will be necessary for access of multiple floors, or if trans-
mission power is reduced. Data communication is bidirectional between the
motes and the gateway. Time-stamping is done by the PC when motion events
are received. Figure 4.12 shows the current acquisition chain.
Nurse
M Back control
I Gateway End
C station
A TCP-IP Data
Base
802.11.b
802.15.4
Motion
Sensor
Temperature
Luminosity EKG &
SaO2
4.8 Simulators
Currently there are several simulators for sensor networks, which play key
roles in processing and in turn facilitate easy configuration of the network
depending on the application to use. Among the best are the following:
1. NS-2: It was one of the first simulations, which facilitates simulations car-
ried out by both wireless and wired. Itis written in C + + and oTCL (In-
formation Sciences Institute).
2. GloMoSim (Global Mobile Information Systems Simulator): is a scal-
able simulation: device for network systems both wired and wireless.
This simulator is written in C and Parsec. GloMoSom currently sup-
ports protocols for purely wireless network environments.
3. SensorSim: This simulation framework provides channel sensing and
sensor models as models of battery, battery light wide protocols for
wireless microsensors.
Wireless Body Sensor Networks • 135
Summary
• A smart medical home is a system of room labs outfitted with infrared
sensors, computers, biosensors, and video cameras.
• The sensors, such as a portable 2-lead ECG, pulse oximeter, wearable
Pluto mote with built-in accelerometer, module with accelerometer,
gyroscope, and electromyogram sensor for monitoring of stroke
patients are included in the medical node.
• Body network and subsystems, emplaced sensor network, back end,
backend databases, and human interfaces are the different parts of the
body sensor network architecture.
• The intelligent wireless patient-monitoring system framework includes
real-time sensing of the patient’s vital parameters using the motes,
and wireless transmission of such critical information over radio
frequencies to the base station.
136 • Wireless Sensor Networks
Questions
1. What do you mean by body sensor networks?
2. Explain the architecture of body sensor networks.
3. What are the blocks in body sensor network software architecture?
4. Draw the overall framework for patient monitoring. Explain.
5. What are the blocks available in the wireless medical node?
6. Define a homogeneous node.
7. What is meant by an autonomous node?
8. What are the classifications of WSNs?
9. How many classifications are in the functional level of WSNs?
10. What are the characteristics of the layers used for medical?
11. What are the different topologies available for medical? Which is best
suited? Justify the answer.
12. Differentiate WSNs and BSNs.
13. What do you mean by wearable computing?
14. Explain the three-phase methodology for the development of appli-
cations of biomedical signals acquisition.
15. What are the different types of sensors interfaced for medical moni-
toring?
16. Explain the WSN system for health monitoring.
Wireless Body Sensor Networks • 137
Further Reading
1. Body Sensor Networks by Guang-Zhong Yang
2. Wireless Body Area Networks: Technology, Implementation, and Appli-
cations by Mehmet R. Yuce and Jamil Khan
3. Ultra Wideband Wireless Body Area Networks by Kasun Maduranga
Silva Thotahewa, Jean-Michel Redouté, and Mehmet Rasit Yuce
References
1. http://cdn.intechweb.org/pdfs/12898.pdf
2. http://spriyansasi.blogspot.in/2013/08/wireless-sensor-networking.
html
CHAPTER
5
UBIQUITOUS SENSOR
NETWORKS
This chapter discusses the wireless sensor networks for environmental,
industrial monitoring, and Ubiquitous Sensor Networks (USN).
RFID Reader: The reader senses and “reads” the information on the tag
and passes it on for analysis.
RFID Middleware: Like the USN, the RFID network may have its own
software for the collection and processing of data.
As illustrated in Figure 5.1, a USN is not simply a network but can be an
intelligent information infrastructure used to support a multitude of differ-
ent applications. USNs can deliver information to “anywhere, anytime, by
anyone.” But it is the ability to deliver the information also to “anything”
which is groundbreaking. Value is added to the information by using “con-
text awareness,” which comes from detecting, storing, processing, and inte-
grating situational and environmental information gathered from sensor
tags and/or sensor nodes affixed to any object. For instance, context aware-
ness may relate to where the object is located, whether it is moving or sta-
tionary, whether it is hot or cold, and so on.
Characteristics of a USN
• Small
• Scale sensor nodes
• Limited power requirements that can be harvested (e.g., solar power)
or stored (e.g., battery)
• Able to withstand harsh environmental conditions
• Fault tolerant and designed to cope with high possibility of node failures
• Support for mobility
• Dynamic network topology
• Able to withstand communication failures
• Heterogeneity of nodes
• Large scale of deployment
142 • Wireless Sensor Networks
disaster/crisis
management
USN
Services Structural USN Applications
Logistics health
monitoring Disaster Military field
Surveilance Health Care
Agricultural
ubiquitous Control USN Middleware
Spatial
web Context modeling Information
services management management
USN Directory Content Management
Service Management
Infrastructure
Gateway
sink Gateway
Mobile Gateway sink
node
RFID node
sink USN Access Networking
Reader
node
RFID USN
Reader Bridge
Sensor Networking
Wireless
Sensor
Network
Base station
Radio Modem
Long distance radio
Link
FIGURE 5.2 Wireless seismic and acoustic sensor node with volcano monitoring network
architecture.
Security Warning
There are many potential safety problems hidden in regional natural
environments and industrial production. These problems are always hid-
den, unexpected, and unpredictable; they often lead to some unpredict-
able consequences, resulting in huge losses. Wireless sensor networks are
an important means of early warning. WSNs are widely use in industrial
production, construction, transport, medical, and other fields for security
warning. For example, forest fires are one of the most serious disasters
that make destruction of forest resources and threats to human living envi-
ronments. Prevention and monitoring of forest fires has become a major
research focus for forest fire departments around the world. One can build
and import wireless sensor networks to monitor forest fires. The system
is capable of real-time monitoring of the measured parameters (such as
temperature, relative humidity, etc.) and can send the information to the
monitoring center computer, center analyzing the data, compare it with
forest resource base data, and then determine whether there is a potential
forest fire in the field. This will be an effective basis for the departments to
make a decision.
environment ask for certain requirements for a sensor network node. The
nodes working in these areas need to be small in size, pollution free, with
environmental adaptability and low power consumption, and so on.
Network Structure
A sensor network is mainly composed of the communications nodes, sink
nodes, and the application server. Wireless sensor network nodes complete
the data collection, preparation, and communication work. Clusters are
formed by adjacent network nodes, and each node sends the data to the
head node of the cluster. The head node compresses the data and sends it to
the sink node. In fact, the sink node is the gateway node, and is responsible
for the network initiation, maintenance, and data collection, and for send-
ing data to the control center. The monitor center is responsible for data
processing and network management. There is some specific software in
the control center that does the job of data processing and makes decisions.
As farmland is a place that human can easily to reach, one can artifi-
cially divide farmland into multiple regions, and each region forms a cluster
of network topology. Inside each cluster a head node is assigned that is
responsible for communication with the gateway. And since the agricultural
environment may not have an off-the-shelf cable network, one can consider
two communications structures:
Node
Sink
Cluster Internet / Mobile
Node
networks (GSM
CDMA)
1. One in which the gateway communicates with the server control cen-
ter through the cable network.
2. In the mobile networks such as the GSM or CDMA coverage area.
150 • Wireless Sensor Networks
One can use mobile base stations as a transmission medium. The sink node
sends the data to base stations, and the base station data is then transmitted
to the monitoring center. The structure of this network can be shown as
follows as in Figure 5.3.
Node hardware design
The communications node is composed of the sensing element, the cen-
tral processing unit, the wireless transceiver, and the power components.
Based on agricultural environmental monitoring, one needs to use light,
temperature, and humidity sensors. The node structure is as follows in
Figure 5.4.
Optical Sensor
Temperature Sensor
Battery Module
and energy density. Lithium ion batteries can meet the requirements for
volume, environmental adaptation, discharge stability, cost, and so on.
Software Design
Software systems can be divided into node software modules and control
center software modules. Node software needs a serial communication
module, and a data conversion and an amendment module. The serial com-
munication module is responsible for communicating with gateway nodes,
extracting sensors’ collected information, and communicating with nodes
to address information from relevant data frames. The serial data conver-
sion module is responsible for collecting information from the sensors into
digital information. The monitoring center software is the information
processing center. The software must receive and store the data from the
network. To provide a user-friendly interface, the software still needs to
show the data in a variety of ways and make relevant decisions.
This is a typical scheme of a WSN in a regional agricultural environ-
ment. Different applications have different characteristics and parameters.
They need to use different network topologies and different hardware.
Compared with traditional methods for regional environmental protec-
tion, wireless sensor networks are a more convenient, real time, reliable,
and effective means. They are a good option for regional environment
protection.
Sensor
Node 2 Sensor
Sensor Node 4
Node1 Sensor
Paddy Node 5
Field Area
Sensor Irrigation Area
Sensor
Node 3
Node 6
Nodes Coordinator
Base Station
GSM Modem
FIGURE 5.5 Wireless Sensor Network routing via PAN (both ad hoc or planned network).
Start
FIGURE 5.6 (a) Sensor node architecture system that features optimal power management
system and (b) Battery management algorithm.
The wireless and networking activities will take place after the MCU reads
all the ADC values from the sensor output voltage and sends it to FLASH
memory. The digital sensors like the I2C bus type will send the readings
after the acknowledgment bits sent by the MCU. This IEEE 802.15.4
154 • Wireless Sensor Networks
Stationary Network
A stationary network is a network of sensor nodes in which each sensor
node’s position is fixed relative to the base station and other nodes in the
network. A demonstrated application in this direction is humidity monitor-
ing in a paddy field. Data acquired by a mote is transmitted to the base
station which then processes the information and triggers necessary actions
such as localized watering. There are two possible cases to transmit data.
When a node is in direct wireless contact, that is, in the range of the base
station, direct communication is possible. When a node is not in range,
it transmits data in an ad hoc environment also referred to as multi-hop.
Implementation of an efficient multi-hop system requires optimal routing
to facilitate the shortest route, reduced power consumption, and improved
transmission.
Ubiquitous Sensor Networks • 155
Network in Motion
An example in this category is a herd of animals on an extensive farm, where
each animal is equipped with a sensor node. The animals are in constant
motion relative to each other as well as the base station. Such complicated
mobility management requires an even more sophisticated implementation
of routing algorithms. In order to maximally benefit from wireless sensor
networks of this type, additional hardware requirements in the form of GPS
devices and other forms of mote location are needed.
operation mode, so that the faults will be processed at the early phase or be
isolated in a small range.
Traditional wired communications cannot meet the communication
needs of online monitoring of transmission lines. WSNs have an advantage
of the strong ability to adapt to harsh environments, large area coverage,
self-organization, self-configuration, and strong utility independence, and
are very suitable for data communication monitoring systems for transmis-
sion lines.
Application
Layer
Sub station
Network Electric
Layer Communication GPRS, DCMA
network
Communication Agent
Wireless sensor network
UVA patrol Video surveillance
Communication
Perception Agent
Layer
Transportation
Transportation line
line monitoring
monitoring
FIGURE 5.7 General architecture of online monitoring systems for a transmission line
based on WSNs.
Communication
Layer
Optical fiber Wireless
private network TD-SCDMA private
network
Acquisition layer
Equipment Substation Transformer Transportation
status Sensors line
monitoring Transportation Other electric monitoring
line equipment
Municipal
Distribution Company
equipment online Servers
monitoring
Convergence controller
Fiber Reserved TD-LTE
Fiber channel channel channel
Distribution line BS BS
ONU
BS
Sink node
WSN
WSN Sink node
Wireless
gateway Fiber / GPRS Wireless
Concentrator TD-LTE 230 Broadband
PLC gateway
Broadband PLC
WSN
Acquisition acquisition
gateway gateway
Acquisition
Terminal Building Building
block block
SCOPE 1 SCOPE 3
SCOPE 2 DIRECT
INDIRECT
Purchased INDIRECT
Electricity
for own use Production of Employee
purchased Business Travel
Company Owned Materials
Vehicles Waste Disposal
network operators. The latter approach does not actually involve any sens-
ing by the vehicle itself, but still makes use of a wireless network (i.e., the
existing cellular network) to sense or rather infer the current character-
istics of traffic flows. The technical challenges lie particularly in the pro-
cessing of the potentially large amounts of data, the distinction between
useful and non-useful data, and the extrapolation of the actual traffic flow
data from the observation of only a subset of all vehicles. Extensions of the
FCD idea involving information gathered from the on-board electronics
of the vehicles have been proposed under the term extended floating car
data (XFCD). Collecting and evaluating data from temperature sensors,
rain sensors, anti-lock braking system (ABS), Electronic Stability Control
(ESC), and traction control systems of even a relatively small number of
cars can be used to derive real-time information about road conditions
which can be made available to the public and/or used for an improved pre-
diction of traffic flows based on anticipated behavior of drivers in response
to the road conditions.
Privacy issues must be taken into consideration whenever location or
sensor data is collected from private vehicles. However, this is a general
concern related to the monitoring of traffic flows, and schemes that don’t
make use of wireless technology (e.g., relying on license-plate recognition)
also have to consider the car owners’ privacy.
Equivalent to the measurement of vehicle movement by FCD,
passenger behaviour in public transportation systems can be analyzed with
the help of wireless technology. For example, electronic tickets, which typi-
cally employ RFID technology for registering the access to a subway sta-
tion, bus, or train, effectively turn the passenger into a part of a sensor
network, as shown in Figure 5.12.
The possibilities for gathering information about passenger movement
and behavior can be further increased if smart phones are used to store
electronic tickets. Especially for gathering information about intermo-
dal transportation habits of passengers, electronic ticket applications for
smart phones offer possibilities that conventional electronic tickets cannot
provide. It remains to be seen, however, to which extent users will be will-
ing to share position data in exchange for the convenience of using their
mobile phone as a bus or metro ticket.
City logistics
Urbanization is posing a lot of challenges, especially in rapidly developing
countries where already-huge cities are still growing and the increasingly
164 • Wireless Sensor Networks
wealthy population leads to a constantly rising flow of goods into and out
of the city centers. Delivery vehicles account for a large portion of the air
pollution in the cities, and streamlining the flow of goods between the city
and its surroundings is the key to solving a lot of the traffic problems and
improving the air quality.
Wireless technology can help reduce the cost by eliminating the need
to route communication cables (e.g., Ethernet) to all devices in an intersec-
tion. Such an installation will in most cases not be a pure sensor network, as
it will usually also include display components or actuators.
Interaction of the traffic infrastructure with vehicles through wireless
communication (e.g., granting priority to buses or emergency vehicles at
intersections) is another promising application for wireless technology in
traffic infrastructure. Though not all possible applications actually involve
the exchange of sensor data over the wireless communication links, there
are also a number of scenarios in which either vehicles share their sen-
sor data with the infrastructure elements (e.g., regarding speed when
approaching the intersection) or where the infrastructure provides sensor
data to the vehicles (e.g., regarding road congestion on the other side of the
intersection).
Comfort
Actuators
Occupation
Sensor Node 2
User 2
BTS MSC SMSC Server
Sensor Node N
User n
Mote
Internet
When collecting data from sensor nodes installed on the bridge, the
system monitors ambient vibration of the structure. The sensor nodes
have two types, an accelerometer sensor and a thermometer sensor con-
nected to a patch antenna; Data are collected in a PC station by wire-
less network provided by the patch antenna. The collected data are used
to analyze the structural dynamic of the bridge by estimating its modal
properties. Figure 5.17 shows the hardware block diagram of the sensor
nodes. Most of these systems consist of a small-scale network connected
to the sink node directly, so that their network expansion capability is a
limitation. Also, these systems have used a self-designed sensor format
and network.
Antenna
Accelerometer Board
Mote
Thermometer Radio
ADXL Low-pass filter ADC
ADXL Low-pass filter ADC MCU
Reader
interface
Reader WiBro/HSDPA
User interface
(Web Service) Capture
User (Ministry of Land) Interface
Environment Monitoring System
Internet Local Control System
User (National (DB Storage)
emergency management) Query
Integration System User (Electronic interface
(DB, Provider Server) Display)
User (The weather Center) IP Core network
User (Ministry of
Query interface National Defense)
User (TV Station)
Query Local Control System (DB Storage)
interface
Capture
User (Local Government) Interface
Local Control System Reader
(DB, Storage) LAN/WLAN
interface
Capture interface Reader
Reader LAN/WLAN/ interface GW Network
Camera
interface CDMA/HSDPA
Reader Reader
interface interface
Network Camera
GW
Video Information Monitoring System
Ground Information Monitoring System
Summary
• Ubiquitous is derived from the Latin word ubique meaning
“everywhere,” as in the expression of 4A, anywhere, anytime, by
anyone and anything.
• The main components of a USN are the sensor network, access network,
middleware, applications platform, RFID tags, and so forth.
• A wireless personal area network (WPAN) is a personal, short
distance area wireless network for interconnecting devices centered
around an individual person’s workspace.
Ubiquitous Sensor Networks • 173
Questions
1. Define a ubiquitous sensor network.
2. What are the main components of USNs?
3. List the characteristics of a USN.
4. Define the term WPAN.
5. List the application area of USNs.
6. Write about volcanic eruptions with WSN monitoring.
7. With the help of diagram write about the main parameters of a
regional agriculture environment.
8. Explain the design of USNs for rice paddy crop monitoring.
9. Draw the general architecture of online monitoring systems for
transmission lines based on WSNs. Explain.
10. Write about intelligent monitoring and early warning systems for
substations.
11. Draw the architecture of a WSN-based electric energy data acquisi-
tion system.
12. Write in detail about WSN applications for smart water networks.
13. In detail write about intelligent transportation.
14. Explain WSN application for smart homes.
Further Reading
1. Attacks and Defenses of Ubiquitous Sensor Networks: A Systematic
Approach to Sensor Network Security by Tanya G. Roosta
174 • Wireless Sensor Networks
References
1. http://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000040001PDFE.pdf
2. http://www.technicaljournalsonline.com/ijaers/20SEPTEMBER13/
350.pdf
3. http://www.iec.ch/whitepaper/pdf/iecWP-internetofthings-LR-en.pdf
CHAPTER
6
UNDERWATER WIRELESS
SENSOR NETWORKS
(UWSNS)
This chapter discusses the requirements of wireless sensor networks
for oceanographic and water monitoring.
WSNs are largely designed and implemented ad hoc (buoys, electronics, and
software) and oceanographic sensors. The two broad categories of marine
wireless networks, depending on the data transmission medium that they
use, are as follows:
1. WSNs based on radio frequency (RF) aerial communications (hereafter
called Aerial WSNs or A-WSNs) and
2. Under Water Acoustic Sensor Networks (UW-ASNs).
In underwater conditions RF does not work well because radio waves
propagate only at very low frequencies (30–300 Hz), and special antennas
and a bigger power supply are required.
The limitations of UW-ASNs are
1. Bandwidth is severely limited
2. Propagation delays are five orders of magnitude greater than in terres-
trial radio frequency channels
3. Higher bit error rates
4. Temporary losses of connectivity
5. Limited battery power because solar energy cannot be used
UW-ASNs are the best solution for viable oceanographic monitoring at
great depths entailing the use of Autonomous Underwater Vehicles (AUVs)
equipped with underwater sensors.
A-WSNs consist of a set of nodes with scanty power supplies, which
moreover communicate with one another by way of low consumption radio
modules. In addition, they have one or more nodes with bigger power
supplies which act as sinks. These communicate with a remote station using
Underwater Wireless Sensor Networks (UWSNs) • 177
longer range connections (via satellite, GPRS, etc.). This type of network
should not be confused with the ones in which each node has a large power
supply and connects directly to the base station. These are isolated buoys
linked to a data collection center using satellite communications.
A-WSNs do not present the problems described previously in the case
of UW-ASNs, but they do pose other problems; for example, they have to
transmit via data cables running from underwater sensors to buoys on the sur-
face. Where these sensors are located at great depths, the problems that arise
can also be serious. In short, there is no ideal solution, and the most suitable
technology will depend on the particulars of each case.
antenna
antenna mast
Surface sensors Harvesting system
RF Transceiver e.g., Solar panel
sonde
mooring line
underwater
sensor / sensor
buoy weight /
strings diving unit
Anchor
Satellite
GPRS
GPRS Network
Network
Base Station
Multi hop Internet
connection
DB
Point
Sink node to point
Sensor connection
node
Wireless Communications
Network physical topology and density are entirely application
dependant, so before deploying an A-WSN it is necessary to understand
the environment in which it will be installed. This implies choosing the
most suitable number of nodes and their absolute position inside the area
to be monitored. Denser deployments improve data accuracy and provide
180 • Wireless Sensor Networks
Oceanographic Sensors
There are many types of sensors for monitoring oceanographic parameters
(physical, chemical, and biological). The right choice of sensor depends on
the requirements defined by the user and the requirements imposed by the
characteristics of the area where they are to be deployed. These require-
ments include the measurement range within which the parameter is to be
measured, the place where the sensor is to be deployed, sensitivity, linear-
ity, accuracy, precision, resolution, measurement rate, power consumption,
and deployment time. The parameters most commonly measured in a marine
environment and the measurement units used are shown in Table 6.2. In addi-
tion, depending on what sensor is used, it is essential to consider its position
within the node and the depth at which it will be working. For example, to
Underwater Wireless Sensor Networks (UWSNs) • 183
determine the temperature profile of a water column, several sensors will have
to be placed at different depths on the same vertical line.
On the other hand, the sensor node may be equipped with surface sensors
(Table 6.3), which are normally used to determine the state of the water
surface or the atmosphere. These conditions may be important when set-
ting up a sampling strategy. For example, in the event of bad atmospheric
conditions, the sensor node may decide to raise the sampling frequency to
as sure more precise monitoring of the environment.
Air pressure mb
The main component is a low power microprocessor, which is the core of the
platform and is responsible for managing node operation. This microproces-
sor must possess certain features if it is to be suitable for use with an A-WSN:
its architecture, combined with some low power modes, has to be optimized
to achieve extended battery life in portable measurement applications. Also,
it must include several universal serial synchronous/asynchronous commu-
nication interfaces (such as UART, I2C, SPI, etc.) so that the sensors can be
integrated with different types of electrical signals.
The lifetime of the network depends on the autonomy of the sensor
nodes. Power is normally supplied by batteries (commonly D cell, Lithium
ion, AA, or AAA batteries), which may be supplemented by harvesting
systems (solar panels, generators, etc.) to prolong the useful life of the
sensor node. It is sometimes necessary to adapt the voltage between the
node’s power supply and the rest of the components by means of DC/DC
converters. Inclusion of a flash read/write permanent memory (SD, MMC,
Underwater Wireless Sensor Networks (UWSNs) • 185
Monitoring Application
The information gathered by the sensor nodes has to be transmitted to a
base station or monitoring station or PC or Laptop with a massive data stor-
age system (relational databases are the commonest solution such as SQL,
etc.) which can also be used for the necessary studies using the existing
oceanographic theoretical models. Having integrated monitoring tools makes
it possible to maintain permanent communication with the sensor network
deployed and access to the stored data via the Internet. The information dis-
played by these tools usually consists of the number of nodes deployed, the
parameters analyzed, the geographical location of each node, the most recent
data gathered by the sensor nodes, and visualization of a data historical table.
The number of buoy implementations on the basis of the location of their
components (electronics, radio, batteries, sensors) and mooring system are
shown in Figure 6.3.
(E) Electronics housing (B) Batteries housing (R) Radio (S) Sensors
(a) static buoy with (b) static buoy with (c) static (d) non static buoy
mooring line mooring line buoy (Lagrangian buoys)
and floating house and bottom housing
FIGURE 6.3 Most representative configurations of buoys used in A-WSNs.
186 • Wireless Sensor Networks
Satellite User
Mobile cellular
network
GSM or GPRS
Internet
Aerial WSNs
Communication Base Station
Mobile hop
Underwater Point-to-point Communication
Communication Communication
Acoustically connected
sensors
Wireless Acoustic
Communication
Unnamed
Vehicle Sensor
Node
Some of the challenges are different. First, radio is not suitable for
underwater usage because of extremely limited propagation (current
mote radios transmit 50–100 cm). While acoustic telemetry is a promis-
ing form of underwater communication, off the shelf acoustic modems
are not suitable for underwater sensor nets with hundreds of nodes: their
power draws, ranges, and price points are all designed for sparse, long
range, expensive systems rather than small, dense, and cheap sensor nets.
Second, the shift from RF to acoustics changes the physics of communica-
tion from the speed of light (3 × 108 m/s) to the speed of sound (around
1.5 × l03 m/s), a difference of five orders of magnitude. While propaga-
tion delay is negligible for short-range RF, it is a central fact of under-
water wireless. This has profound implications on localization and time
synchronization. Finally, energy conservation of underwater sensor nets
will be different than on the ground because the sensors will be larger,
and because some important applications require large amounts of data,
but very infrequently (once per week or less).
Underwater Wireless Sensor Networks (UWSNs) • 189
Platform
Supernode Buoy
Robot
Sensors
Sensors
In Figure 6.6, four different types of nodes are shown in the system. At the
lowest layer, the large number of sensor nodes are deployed on the sea floor.
They collect data through attached sensors (e.g., seismic) and communicate
with other nodes through short-range acoustic modems. They operate on
190 • Wireless Sensor Networks
batteries, and to operate for long periods they spend most of their life asleep.
Several deployment strategies of these nodes are possible; they are anchored
to the sea floor or buried for protection. Tethers ensure that nodes are
positioned roughly where expected and allow optimization of placement for
good sensor and communications coverage. Node movement is still possible
due to anchor drift or disturbance from external effects. Nodes are able to
determine their locations through distributed localization algorithms. At the
top layer are one or more control nodes with connections to the Internet.
The node shown on the platform in Figure 6.6 is this kind of node. These
control nodes may be positioned on an off-shore platform with power, or they
may be on shore; these nodes are to have a large storage capacity to buffer
data, and access to sufficient electrical power.
Control nodes will communicate with sensor nodes directly, by
connecting to an underwater acoustic modem with wires. In large networks,
a third type of nodes, called super nodes, can be deployed. Super nodes have
access to high speed networks, and can relay data to the base station very
efficiently. There are two possible implementations: the first involves attaching
regular nodes to tethered buoys that are equipped with high-speed radio
communications to the base station, as shown in Figure 6.6. An alternative
implementation would place these nodes on the sea floor and connect
them to the base station with fiber optic cables. Super nodes allow a much
richer network connectivity, creating multiple data collection points for the
underwater acoustic network. Finally, robotic submersibles are interacting
with the system via acoustic communications. In Figure 6.6, “fishes”
represent multiple robots. CPU capability at a node varies greatly in sensor
networks, from 8-bit embedded processors, to 32-bit embedded processors
about as powerful as typical PDAs, such as Intel Stargate, to 32-bit or 64-bit
laptop computers. The Stargate class computers may be used for underwater
sensor networks. Their memory capacities (64MB RAM, 32MB flash storage)
and computing power (a 400MHz XScale processor) are sufficient to store and
process a significant amount of data temporarily, while their cost is moderate.
In a harsh underwater environment, some nodes will be lost over time.
Possible risks include fishing trawlers, underwater life, or failure of water-
proofing. Therefore, one should expect basic deployments to include some
redundancy, so that loss of an individual node will not have wider effects. In
addition, one will be able to recover from multiple failures, either with mobile
nodes, or with deployment of replacements. Operating on battery power, sen-
sor nodes must carefully monitor their energy consumption. It is essential
that all components of the system operate at as low a duty cycle as possible.
Underwater Wireless Sensor Networks (UWSNs) • 191
Applications of UWSNs
The application of wireless sensor networks to the underwater domain has
huge potential for monitoring the health of river and marine environments.
Monitoring these environments is difficult and costly for humans: divers
are regulated in the hours and depths at which they can work, and require a
boat on the surface that is costly to operate and subject to weather conditions.
Figure 6.7 shows anti-submarine warfare, a branch of naval warfare that
uses surface warships, aircraft, or other submarines to find, track, and deter,
damage, or destroy enemy submarines.
DD RF
Data Link
AUV Acoustic
Gateway Modem
Master
Node
Barrier System
Sensor Nodes
Deployment
and Attack
Field System Acoustic Source
1. Ocean Sampling
Networks of sensors and AUVs can perform synoptic, cooperative adaptive
sampling of the 3D coastal ocean environment and advanced ocean models
to improve the ability to observe and predict the characteristics of the
oceanic environment.
2. Environmental Monitoring
UW-ASNs can perform pollution monitoring (chemical, biological, and
nuclear). For example, it may be possible to detail the chemical slurry of
antibiotics, estrogen-type hormones, and insecticides to monitor streams,
rivers, lakes, and ocean bays (water quality analysis). Monitoring of
ocean currents and winds, improved weather forecast, detecting climate
change, understanding and predicting the effect of human activities on
marine ecosystems, and biological monitoring such as tracking of fishes or
microorganisms are other possible applications. An example is the design
and construction of a simple underwater sensor network to detect extreme
temperature gradients, which are considered to be a breeding ground for
certain marine microorganisms.
3. Undersea Explorations
Underwater sensor networks can help detect underwater oilfields or reser-
voirs, determine routes for laying undersea cables, and assist in exploration
for valuable minerals.
4. Disaster Prevention
Sensor networks that measure seismic activity from remote locations can
provide tsunami warnings to coastal areas, or study the effects of submarine
earthquakes (seaquakes).
Underwater Wireless Sensor Networks (UWSNs) • 193
5. Assisted Navigation
Sensors can be used to identify hazards on the seabed, locate dangerous rocks
or shoals in shallow waters, mooring positions, submerged wrecks, and
perform bathymetry profiling.
6. Distributed Tactical Surveillance
Autonomous Underwater Vehicles (AUV) and fixed underwater sensors can
collaboratively monitor areas for surveillance, reconnaissance, targeting,
and intrusion detection systems. For example, a 3D underwater sensor net-
work is designed for a tactical surveillance system that is able to detect and
classify submarines, small delivery vehicles (SDVs), and divers based on
the sensed data from mechanical, radiation, magnetic, and acoustic micro-
sensors. With respect to traditional radar/sonar systems, underwater sensor
networks can reach a higher accuracy and enable detection and classifica-
tion of low signature targets by also combining measures from different
types of sensors.
7. Mine Reconnaissance
Simultaneous operation of multiple AUVs with acoustic and optical sensors
can be used to perform rapid environmental assessment and detect mine
like objects.
8. Flocks of Underwater Robots
A very different application is supporting groups of underwater autono-
mous robots. Applications include coordinating adaptive sensing of chemi-
cal leaks or biological phenomena (for example, oil leaks or phytoplankton
concentrations), and also equipment monitoring applications.
9. Oceanography
Oceanography is the study of processes that govern the complex interplay
of tides, currents, waves, and seabed and coastal modeling. Oceanography
can tell us about coastal deposition and erosion and consequently about
flooding and sea defenses. Sensor networks offer a new paradigm for ocean-
ography, and many other scientific, commercial, agricultural, and industrial
applications.
Communication Buoy
Sensors transmit the collected data from different forms of natural and
human made phenomena such as sound, light, temperature, salinity, and
pollution in water areas to a server “sink/gateway” and subsequently to the
end user. Sensor nodes are interconnected by point to point and multi-hop
communication networks. Wireless sensor network infrastructure requires
standards and protocols (zigbee, IEEE 802.15.4, etc.) which take into
account the battery life of the node and node cost in addition to the operating
environment.
problematic because of the high error rates incurred on the links, which
were already encountered in wireless radio networks.
Another type of approach for reliable data transfer is hop-by-hop. The
hop-to-hop approach is favored in wireless and error-prone networks, and
is believe to be more suitable for sensor networks. PSFQ (Pump Slowly
and Fetch Quickly) employs the hop-by-hop approach. In this protocol, a
sender sends a data packet to its immediate neighbors at a very slow rate.
When the receiver detects some packet losses, it has to fetch the lost pack-
ets quickly. Hop-by-hop, data packets are finally delivered to the data sink
reliably. In PSPQ, ARQ (Automatic Repeat Request) is used for per-hop
communication. However, due to the long propagation delay of acoustic
signals, in UWSNs, ARQ would cause very low channel utilization. One
possible solution to solve the problem is to investigate erasure coding
schemes, which, though introducing additional overhead, can effectively
avoid retransmission delay. The challenge is to design a tailored, efficient
coding scheme for UWSNs. In UWSNs, due to the high error probability
of acoustic channels, efficient erasure coding schemes could be utilized to
help achieve high reliability and at the same time reduce data transfer time
by suppressing retransmission.
in temperature and pressure also affect the speed of the acoustic signal.
Sophisticated signal processing will be needed to compensate for these
sources of errors due to the water medium itself.
Water surface
FIGURE 6.9 The UWSN architecture for long-term non-time-critical aquatic monitoring
applications.
Control Center
sea surface
wreckage
FIGURE 6.10 An illustration of the mobile UWSN architecture for short-term time-critical
aquatic exploration applications.
as plant debris, sand, silt, and clay, which affect the amount of sunlight
reaching aquatic plants. Excess turbidity can reduce reproduction rates of
aquatic life when spawning areas and eggs are covered with soil. Turbidity
is measured in Nephelometric Turbidity Units (NTU).
A large number of sensor nodes can be deployed to cover a large water
monitoring area with enough density. As Figure 6.11 shows, the sensor
network consists of one super node and a number of small sensor nodes. Each
small sensor node has a low capacity solar panel and two low cost sensors (one
temperature sensor and one dissolved oxygen sensor) connected and uses a
low power Zigbee radio for data transmission. The super node has a high
capacity solar panel and five sensors connected and uses a powerful long-
distance 802.11 Ethernet radio for data transmission. The whole network
is divided into several clusters based on signal strength. Each cluster has a
head node, and the cluster nodes send data to the cluster head node. The
cluster head nodes send the gathered data to the super node (sink). All the
small sensor nodes use the low power Zigbee radios, and the long distance
Ethernet radios are used between the super node and the station at shore.
Shore
Water Surface
wireless sensor networks. The key idea of LEACH is to form clusters of the
sensor nodes based on the received signal strength. LEACH is a distributed
protocol and doesn’t require global knowledge of the network. Each cluster
has a head node, and the head node routes data of the cluster to the sink.
This mechanism saves power because only the cluster head nodes do the data
transmissions to the sink nodes, and all the nodes in each cluster only need to
send the data to the respective cluster head. The cluster head nodes compress
the received data from the cluster nodes and send the aggregated packets to
the sink node in order to reduce the amount of data sent to the sink node.
Therefore, power consumption is further reduced and the lifetime of
the sensor network is increased. The estimated optimal number of the clus-
ter head nodes is 5% of all the sensor nodes. In order to evenly distribute
the power dissipation, the cluster heads are rotated over time.
Summary
• WSNs based on radio frequency aerial communications (A-WSNs)
and Under Water Acoustic Sensor Networks (UW-ASNs) are two
broad categories of marine wireless networks depending on the data
transmission medium.
210 • Wireless Sensor Networks
Questions
1. What are the challenges in WSNs for oceanographic monitoring?
2. What are two categories of marine wireless networks depending on
the data transmission medium?
3. List the limitations of UW-ASNs.
4. What are the problems of A-WSNs?
5. Draw the A-WSN sensor node for oceanographic monitoring. Explain.
Underwater Wireless Sensor Networks (UWSNs) • 211
Further Reading
1. Ocean Electronics by S. R.Vijayalakshmi and S. Muruganand
2. Ocean Instrumentation, Electronics, and Energy by S. R.Vijayalakshmi
212 • Wireless Sensor Networks
References
1. http://www.mdpi.eom/1424-8220/10/7/6948/htm
2. https://www.isi.edu/~johnh/PAPERS/Heidemann06a.pdf
3. http://www.ijettjournal.org/volume-3/issue-2/IJETT-V3I2P215.pdf
CHAPTER
7
INTERNET OF THINGS WSNS
This chapter discusses the integration of wireless sensor networks with
the Internet of Things (IoT).
Anytime
Any
Context Anyone
Anything Any
Any Body
Device
Internet
of
Things
Any
Any place Service
Any where Any
Any path Business
Any
Network
Ubiquitous Computing
The focus on context-aware computing evolved from desktop applications,
web applications, mobile computing, ubiquitous computing, to the IoT over
the last decade. This is an era in which computer devices will be embed-
ded in everyday objects, invisible at work in the environment around us; in
which intelligent, intuitive interfaces will make computer devices simple to
use; and in which communication networks will connect these devices to
facilitate anywhere, anytime, always-on communication. Ubiquitous com-
puting is the growing trend toward embedding microprocessors in everyday
objects and refers to how they might communicate and process informa-
tion, creating a world in which things can interact dynamically.
WSN
Internet
G Gateway
G
WSN
Internet
G Gateway G
Sensor node
FIGURE 7.5 Hybrid network.
WSN G
Internet
G Gateway
Sensor node
FIGURE 7.6 Access point network.
It is obvious that the first approach presents a single point of failure due
to the gateway uniqueness. Gateway dysfunction would break down the
connection between the WSN and the Internet. With several gateways and
access points, the second and third scenarios do not present such a weak-
ness. To ensure network robustness, they would consequently be preferred,
if the application supports this type of network structure.
218 • Wireless Sensor Networks
Supervision Layer-Access
Coordinator Real Time Sensor Data
Sensor Layer Layer Anywhere with Internet Access
Web App
E
C
Cloud based
web services
Internet firewall iPad App
Zigbee,
E WiFi GPRS Android App
user Sensor
Sensor
Field Nodes
Internet
Gateway
Source
FIGURE 7.8 Communication Architecture using a gateway.
In Figure 7.8 the full arrows represent the dissemination of the query, and
the dashed arrows, the data routed back. In this case the gateway is the single
Internet Of Things WSNs • 221
point of access to the WSN, and it performs the conversion of the necessary
protocols including the IP.
Application-specific networking and data-centric routing
Traditional IP-based networks follow the layering principle, which sepa-
rates the application level concerns from network layer routing. This is
necessary because a multitude of applications are expected to run over
a common networking substrate. By contrast, sensor networks are likely
to be quite limited in the applications they perform. This calls for cross-
layer optimizations and application-specific designs. One design principle
that exploits application specificity to significantly reduce communication
energy is the use of in-network processing to filter out irrelevant and redun-
dant information. For example, intermediate nodes may be allowed to look
at the application-level content of packets in order to aggregate them with
information originating from other sources.
user Sensor
Sensor
Field Nodes
Internet
Source
FIGURE 7.9 Communication architecture with direct connection: the difference compared
to Figure 7.8 is that in this case every node has an IP address and can be directly
accessed from any point in the Internet that has wireless capabilities.
In homogeneous WSNs, where all the nodes have the same capabilities,
the flexibility for other communication architectures is limited.
Internet
sensor field more capable
nodes
sink
FIGURE 7.10 Heterogeneous Network: the lines show the tunneling communicating the
nodes with IP addresses (circles filled dark).
a) c)
sink Directed sink Acquire
Diffusion
b) d)
FIGURE 7.11 Heterogeneous WSN with and Overlay IP network.
In Figure 7.11 a) shows the first stage in directed diffusion where the
query is flooded to find all the IP-addressable nodes; b) shows that multiple
routes are obtained with this mechanism; c) ACQUIRE is used to build
up the overlay IP network and observe that the query is sent through a
226 • Wireless Sensor Networks
path—one that can be randomly chosen; and d) shows the overlay obtained
by ACQUIRE where only one path is obtained.
This initial interest can be seen as exploratory and the data rate should
be low. As the interest is propagated, the nodes set up gradients from the
source back to the sink. Upon reception, the sources with relevant data
(IP-addressable nodes) respond with the appropriate information stream.
For our example the response could be of the form:
type: IP-addressable // the sensor node has an IP address
address: IP-address // IP address of replying node
This data is sent back through the interest’s gradient path. After recep-
tion, the sink must refresh and reinforce the most efficient paths. Finally,
the sink can select n-paths depending on the expected IP traffic; higher
traffic would imply more paths in the overlay structure. Figure 7.11 a) and
b) show the directed diffusion mechanism. Note that once the overlay paths
are created, they may be used for arbitrary communication between the
IP-addressable nodes, not only between the nodes and the sink.
The main advantage of implementing the overlay structure with
Directed Diffusion is that it can provide multiple paths; however, the
amount of energy consumed by the network is high. If the IP traffic is
expected to be low and the number of IP-addressable nodes is known a pri-
ori, then a more energy-efficient routing method can be used to construct
the overlay. The basic idea is to send an agent to traverse the network and
find all the IP-addressable nodes, instead of flooding.
One proposed routing mechanism that uses agents in WSNs is
ACQUIRE. ACQUIRE is a novel resource discovery mechanism that
presents significant savings in terms of energy compared with flooding, at
a cost of longer delays. ACQUIRE is suitable for one-shot, complex que-
ries. For creating an overlay IP network, a one-shot query could be sent
to find routing information about nodes X, Y, Z, which are known to have
IP addresses. In ACQUIRE, the active query is forwarded step by step
through a sequence of nodes. At each intermediate step the node which is
currently carrying the active query does a lookahead of d hops in order to
resolve the query partially. Once the resource is found, the required data
is sent back. For our purposes, routing information to these nodes must be
included in the data that is sent back (e.g., by including the intermediate
routing nodes in the data, as in source routing). Figure 7.11 c) and 7.11 d)
show the ACQUIRE mechanism.
Internet Of Things WSNs • 227
provided by this popular car manufacturer have been enhanced with the
introduction of the mbrace feature in their cars. Their new system now
enables remote vehicle controls, performs remote engine diagnostics, and
delivers software updates to keep the car running perfectly. These also
monitor fleet performance and understand journey management to deliver
a variety of solutions that help end users reduce fuel consumption and fleet
size while maintaining performance.
of the device monitor and its performance, and view forecasts and predic-
tions of component failure. These factors further increase the efficiency,
effectiveness, and hence the revenue of the system.
Web site so that a user can manage them through a standard Web browser
or a smart phone app, which acts as a personal network operations center.
Smart grid
Automated Lighting
Pool Sensor
Smart appliances Garage door opener
Smart Thermostat
Security system
Gas/Water meter
Smart e-meter
WLAN/HAN gateway
Splinkler system
FIGURE 7.12 IoT enabled home with connected devices and appliances working invisibly
for consumers.
While both the industrial and consumer scenarios are exciting, deploy-
ment is not simplified since they are all disparate vertical systems. The
systems may use the exact same protocols and OS underpinnings, but the
communications layers are inconsistent. Each also uses open application
programming interfaces (APIs) without a horizontal connection, which
would lead to easier cross application integration.
Take for example a sprinkler control system. It can have a level of intel-
ligence so it knows when to water based on sensors and Internet weather
data under programmable control. However, it does not know anything
about motion sensors around a house that might indicate a reason to delay
the sprinklers in a zone to avoid drenching the dog or kids. There are no
motion sensor inputs on the sprinkler controller, so other motion control
vertical integration needs to be used to transfer data to another cloud
server. Then the two cloud servers need to be “glued” together somehow.
Hopefully, both system integrations allow for some small amount of addi-
tional control. However, hope is never a good word in electronic systems.
An additional vertical application written in Perl, Python, PHP, or another
programming language on a server can program a connection that allows
motion to delay the sprinkler zone (or other logic the user may want).
236 • Wireless Sensor Networks
packetizes the data for transport over the Internet. It is also responsible for
distributing data back to end points in applications where two-way commu-
nication is advantageous or required.
Note that a gateway is different from a router. A router manages similar
traffic, and it connects devices that share a common interface. For example,
the devices that connect to a home router all use IP. In contrast, because
a gateway functions as a bridge, it must be able to route different types
of traffic, aggregate data from varying communication interfaces, and con-
vert these streams to a common protocol for access across the WAN. Some
devices might use IP natively while others might use PAN-based protocols
like Bluetooth, Zigbee, or 6LoWPAN. Nodes that are simple sensors may
need to be connected to an ADC to convert their raw analog voltage to a
digital value before transport.
An embedded control gateway extends the functionality of a simple
gateway by providing processing resources and intelligence for handling
local applications. This can take the form of shared processing resources
where the gateway performs tasks that would otherwise occur on nodes.
For example, an embedded control gateway could evaluate and filter sen-
sor data as well as implement high level management tasks. After evaluat-
ing and filtering sensor data, a gateway could determine whether a critical
threshold has been passed. If so, it could then trigger an alarm that is passed
up through the network to alert an appropriate manager.
Having an intelligent embedded control IoT gateway can reduce the
complexity and cost of end points. Depending upon the application, this
can result in significant system savings. Consider a security system with
an array of sensors to which it connects. Consolidating processing, such
as sensor data filtering, in the gateway enables nodes to leverage a shared
resource, making each node simpler as well as lower in cost.
The same holds for enabling connectivity. IP is a complex protocol
to implement with relatively high overhead for more simple IoT nodes.
Instead, simple nodes can connect to a PAN using a wired connection like
I2C or a wireless interface like Bluetooth. The gateway also connects to the
PAN and then bridges each connection to an IP-based WAN interface like
Wi-Fi or Ethernet. In both of these cases, savings include lower processing,
memory, and power requirements. Nodes can therefore be less expensive
as well as more efficient.
Internet Of Things WSNs • 239
When these savings are spread across a network, they add up quickly.
End points that have to house their own intelligence and WAN connec-
tivity require more complex architectures. Using a consolidated or shared
architecture, the cost of each end point can be substantially reduced, more
than making up for any increase in gateway cost through volume savings.
Reducing the complexity of nodes also reduces overall power consumption
for applications where nodes have limited battery life or operate on energy
harvesting sources.
Distributed intelligence also accelerates the implementation of new
applications. Consider smart appliances that use time-of-day information
from the utility meter to operate during off peak hours to reduce energy
costs. Implementing this intelligence at the node level requires that the
washer, dryer, and dishwasher be able to communicate with the utility meter.
When each appliance comes from a different company, the interface to
use this feature will likely differ, creating interoperability issues. In addi-
tion, to take advantage of this feature, consumers would need to buy new
appliances. Enabling intelligence in a gateway addresses both interoper-
ability issues on a local level while minimizing the changes required to con-
nect appliances. Rather than require full intelligence in each appliance,
the gateway can provide the base intelligence for all devices. This also has
the advantage of consolidating management of new features for consum-
ers; rather than needing to figure out and integrate each new appliance as
it enters the home, the consumer only needs to understand how to manage
the gateway. An intelligent gateway also better addresses the issues that
arise from connecting disparate nodes, compared to users manually con-
necting each device or appliance to the Internet.
For many applications, an intelligent gateway can eliminate the need
for a dedicated onsite management or control end point. For example, with
an integrated LCD controller, a gateway can support a user interface so
users can directly interact with nodes. Alternatively, an intelligent gateway
can provide a web-based user interface, accessible through a PC, tablet, or
smart phone, to allow users to easily access additional built-in applications.
This enables the gateway to serve as a flexible and dynamically program-
mable onsite control point. This in turn lowers the cost of installation of
new systems as well as enables third parties to introduce new technology
and devices with a significantly lower cost of entry.
240 • Wireless Sensor Networks
FIGURE 7.13 There are several ways that an IoT gateway can extend connectivity to nodes.
In Figure 7.13 (a) nodes connect to the IoT via a gateway using a less
expensive and less complex wired or wireless PAN technology; (b) nodes
Internet Of Things WSNs • 241
Process Control
Asset Tracking
MANAGEMENT
SYSTEMS
CLOUD SERVICES
Reliable
Low Power
Wireless
Sensor
Networks
FIGURE 7.14 Making IP-enabled wireless sensors reliable and low power will enable wide-
spread usage.
242 • Wireless Sensor Networks
Summary
• The IoT allows people and things to be connected anytime, anyplace,
with anything and anyone, ideally using any network and any service.
• Context is any information that can be used to characterize the
situation of a person, place, or object that is considered relevant to
the interaction between a user and an application.
• Context awareness is the ability to adapt behavior depending on the
current situation of the users in context-aware applications.
• The architecture of the IoT system is divided into three layers: sensor
layer, coordinator layer, and supervision layer.
• Traditional IP and WSN networks are different in network mode,
routing paradigm, data flow, data rate, resource constraints, network
lifetime, and operation.
• Integration of WSNs with the IoT is based on gateways of two types:
homogeneous WSNs and heterogeneous WSNs.
• Challenges of WSN IoT parameters are security, quality of service,
configuration, connectivity, power management, complexity, and
rapid evolution.
Questions
1. Write about the evolution of the Internet.
2. Define the IoT.
3. List the IoT application areas.
4. Define context and context awareness.
5. What do you mean by ubiquitous computing?
6. Explain with a diagram different methods of integrating the WSN to
the Internet.
7. Draw the architecture of the IoT and explain.
8. Write the characteristics of sensor networks with the IoT.
9. Compare traditional IP-based networks and large-scale wireless sen-
sor networks.
Internet Of Things WSNs • 243
8
WIRELESS MULTIMEDIA
SENSOR NETWORKS
This chapter discusses wireless multimedia sensor networks, software,
and hardware architecture.
useful information from anywhere and at any time. For this reason, future
WMSNs will be remotely accessible from the Internet, and will therefore
need to be integrated with the IP architecture. The characteristics of WSNs
rule out the possibility of all-IP sensor networks and recommend the use of
application-level gateways or overlay IP networks as the best approach for
integration between WSNs and the Internet.
Integration with Other Wireless Technologies
Large-scale sensor networks may be created by interconnecting local
“islands” of sensors through other wireless technologies. This needs to be
achieved without sacrificing the efficiency of the operation within each
individual technology.
which may result in energy savings, since by storing it locally, the multimedia
content does not need to be wirelessly relayed to remote locations. The
wireless gateway is also connected to a central sink, which implements the
software front-end for network querying and tasking. The second cloud
represents a single-tiered clustered architecture of heterogeneous sensors
(only one cluster is depicted). Video, audio, and scalar sensors relay data
to a central cluster head, which is also in charge of performing intensive
multimedia processing on the data (processing hub). The cluster head relays
the gathered content to the wireless gateway and to the storage hub. The last
cloud on the right represents a multi-tiered network, with heterogeneous
sensors. Each tier is in charge of a subset of the functionalities. Resource-
constrained, low-power scalar sensors are in charge of performing simpler
tasks, such as detecting scalar physical measurements, while resource-rich,
high-power devices are responsible for more complex tasks. Data processing
and storage can be performed in a distributed fashion at each different tier.
LEGEND
Internet Sink
Multimedia
processing hub
Video sensor
Audio sensor
Gateway
High end
video sensor
Scalar sensor
Wireless
Gateway
Storage hub
(a) (b) (c)
Single-tier flat, Single-tier clustered, Multi-tier
homogeneous sensors, heterogeneous sensors, heterogeneous sensors,
distributed processing, centralized processing distributed processing,
centralized storage centralized storage distributed storage
(reference and sensed images) of the same scene taken at different times,
from different viewpoints, and/or by different sensors:
Different Viewpoints (Multi-View Analysis)
Images of the same scene are acquired from different viewpoints, to gain a
larger 2D view or a 3D representation of the scene of interest. Main appli-
cations are in remote sensing, computer vision, and 3D shape recovery.
Different Times (Multi-Temporal Analysis)
Images of the same scene are acquired at different times. The aim is to find
and evaluate changes in time in the scene of interest. The main applications
are in computer vision, security monitoring, and motion tracking.
Different Sensors (Multi-Modal Analysis)
Images of the same scene are acquired by different sensors. The objective
is to integrate the information obtained from different source streams to
gain more complex and detailed scene representation.
Registration methods usually consist of four steps, that is, feature
detection, feature matching, transform model estimation, and image
resampling and transformation. In feature detection, distinctive objects
such as closed-boundary regions, edges, contours, line intersections,
corners, and so on are detected. In feature matching, the correspondence
between the features detected in the sensed image and those detected in
the reference image is established. In transform model estimation, the
type and parameters of the so-called mapping functions, which align the
sensed image with the reference image, are estimated. The parameters of
the mapping functions are computed by means of the established feature
correspondence. In the last step, image resampling and transformation, the
sensed image is transformed by means of the mapping functions. These
functionalities can clearly be prohibitive for a single sensor. Hence, research
is needed on how to perform these functionalities on parallel architectures
of sensors to produce single data sets.
robot or an autonomous vehicle). The image data that is fed into a computer
vision system is often a digital image, a video sequence, a 3D volume from
a tomography device, or other multimedia content. Traditional computer
vision algorithms require extensive computation, which in turn entails high
power consumption. WMSNs enable a new approach to computer vision,
where visual observations across the network can be performed by means
of distributed computations on multiple, possibly low-end, vision nodes.
(iii) providing flexible and efficient system software, that is, operating
systems and middleware, to export services for higher-layer
applications to build upon; and
Effects of Congestion
In WMSNs, the effect of congestion may be even more pronounced as
compared to traditional networks. When a bottleneck sensor is swamped
with packets coming from several high-rate multimedia streams, apart
from temporary disruption of the application, it may cause rapid depletion
of the node’s energy. While applications running on traditional wireless
networks may only experience performance degradation, the energy loss
(due to collisions and retransmissions) can result in network partition.
Thus, congestion control algorithms may need to be tuned for immediate
response and yet avoid oscillations of data rate along the affected path.
a) Reliability
Multimedia streams may consist of images, video, and audio data, each of
which merits a different metric for reliability. When an image or video is
sent with differentially coded packets, the arrival of the packets with the
ROI field or the I-frame respectively should be guaranteed. The appli-
cation can, however, withstand moderate loss for the other packets con-
taining differential information. Thus, we believe that reliability needs
to be enforced on a per-packet basis to best utilize the existing network-
ing resources. If a prior recorded video is being sent to the sink, all the
I-frames could be separated and the transport protocol should ensure that
each of these reach the sink. Reliable Multi-Segment Transport (RMST)
or the Pump Slowly Fetch Quickly (PSFQ) protocol can be used for this
purpose as they buffer packets at intermediate nodes, allowing for faster
retransmission in case of packet loss. However, there is an overhead of
using the limited buffer space at a given sensor node for caching packets
destined for other nodes, as well as performing timely storage and flushing
operations on the buffer.
b) Congestion control
The high rate of injection of multimedia packets into the network causes
resources to be used up quickly. While typical transmission rates for sen-
sor nodes may be about 40 kbit/s, indicative data rates of a constant bit
rate voice traffic may be 64 kbit/s. Video traffic, on the other hand, may be
bursty and in the order of 500 kbit/s, thus making it clear that congestion
must be addressed in WMSNs.
c) Use of multi-path
The use of multiple paths for data transfer in WMSNs is necessary for the
following two reasons:
1. A large burst of data (say, resulting from an I-frame) can be split into
several smaller bursts, thus not overwhelming the limited buffers at
the intermediate sensor nodes.
2. The channel conditions may not permit high data rate for the entire
duration of the event being monitored. By allowing multiple flows, the
effective data rate at each path gets reduced and the application can
be supported.
Wireless Multimedia Sensor Networks • 265
c) Video traffic exhibits an inherent bursty nature and can lead to sudden
buffer overflow at the receiver. This problem is further aggravated by the
transmission policy adopted in T-MAC.
By choosing to send a burst of data during the listen cycle, T-MAC
shows performance improvement over S-MAC, but at the cost of monopo-
lizing a bottleneck node. Such an operation could well lead to strong jitters
and result in discontinuous real-time playback.
Contention-free single channel protocols
Time Division Multiple Access (TDMA) is a representative protocol of this
class in which the clusterhead (CH) or sink helps in slot assignment, query-
ing particular sensors and maintaining time schedules.
TDMA schemes designed exclusively for sensor networks have a small
reservation period (RP) that is generally contention based, followed by
a contention-free period that spans the rest of the frame. This RP could
occur in each frame or at pre-decided intervals in order to assign slots to
active nodes, taking into consideration the QoS requirement of their data
streams. The length of the TDMA frames and the frequency of the RP
interval are some of the design parameters that can be exploited while
designing a multimedia system. For real-time streaming video, packets are
time constrained and scheduling policies like Shortest Time to Extinction
(STE) or Earliest Due Date (EDD) can be adopted. Both of these are
similar in principle as packets are sent in the increasing order of their
respective delay tolerance but differ in respect that EDD may still forward
a packet that has crossed its allowed delay bound. Based on the allowed
packet loss of the multimedia stream, the dependencies between packet
dropping rate, arrival rate, and delay tolerance can be used to decide the
TDMA frame structure and thus ensure smooth replay of data. This allows
Wireless Multimedia Sensor Networks • 269
greater design choices as against, where the frame lengths and slot duration
are considered constant.
As sensor nodes are often limited by their maximum data transmission
rate, depending upon their multimedia traffic class, the duration of trans-
mission could be made variable. Thus variable TDMA (V-TDMA) schemes
should be preferred when heterogeneous traffic is present in the network.
Tools for calculating the minimum worst-case delay in such schemes and
algorithms for link scheduling are provided. As real-time streaming media
is delay bounded, the link-layer latency introduced in a given flow in order
to satisfy data rate requirements of another flow needs to be analyzed well
when VTDMA schemes are used.
MIMO technology
The high data rate required by multimedia applications can be addressed
by spatial multiplexing in MIMO systems that use a single channel but
employ interference cancellation techniques. Recently, virtual MIMO
schemes have been proposed for sensor networks, where nodes in close
proximity form a cluster. Each sensor functions as a single antenna
element, sharing information and thus simulating the operation of a
multiple antenna array. A distributed compression scheme for correlated
sensor data that specially addresses multimedia requirements is integrated
into the MIMO framework. However, a key consideration in MIMO-
based systems is the number of sensor transmissions and the required
signal energy per transmission. As the complexity is shifted from hardware
to sensor coordination, further research is needed at the MAC layer to
ensure that the required MIMO parameters like channel state and desired
diversity/processing gain are known to both the sender and receiver at an
acceptable energy cost.
Contention-Free Multi-Channel Protocols
Along with improving hardware and thus increasing cost, an alternate
approach is to efficiently utilize the available bandwidth. By using multiple
channels in a spatially overlapped manner, existing bandwidth can be
efficiently utilized for supporting multimedia applications.
Scheduling
MAC layer scheduling in the context of WMSNs differs from the traditional
networking model in the sense that apart from choosing the queue discipline
that accounts for latency bounds, rate/power control and consideration of
270 • Wireless Sensor Networks
trade-off between the increase of packet length due to the additional parity
bits and energy constraints is evaluated, where FEC is shown to perform
better than retransmissions.
MAC, and routing layers together impact the contention for network
resources. The physical layer has a direct impact on multiple access of
nodes in wireless channels by affecting the interference at the receivers.
The MAC layer determines the bandwidth allocated to each transmitter,
which naturally affects the performance of the physical layer in terms of
successfully detecting the desired signals. On the other hand, as a result
of transmission schedules, high packet delays and/or low bandwidth can
occur, forcing the routing layer to change its route decisions. Different rout-
ing decisions alter the set of links to be scheduled, and thereby influence
the performance of the MAC layer. Moreover, specifically for multimedia
transmissions, the application layer does not require full insulation from
lower layers, but needs instead to perform source coding based on infor-
mation from the lower layers to maximize the multimedia performance.
Existing solutions often do not provide adequate support for multimedia
applications since the resource management, adaptation, and protection
strategies available in the lower layers of the stack are optimized without
explicitly considering the specific characteristics of multimedia applica-
tions. Similarly, multimedia compression and streaming algorithms do not
consider the mechanisms provided by the lower layers for error protection
and resource allocation.
Most of the existing studies decompose the resource allocation prob-
lem at different layers, and consider allocation of the resources at each layer
separately. In most cases, resource allocation problems are treated either
heuristically, or without considering cross-layer interdependencies, or by
considering pair-wise interactions between isolated pairs of layers.
The cross-layer transmission of multimedia content over wireless
networks is formalized as an optimization problem. Several different
approaches for cross-layer design of multimedia communications are dis-
cussed, including the bottom-up approach, where the lower layers try to
insulate the higher layers from losses and channel capacity variations, and
top-down, where the higher layer protocols optimize their parameters at
the next lower layer. However, only single-hop networks are considered.
In particular, the improvements of adaptive link layer techniques such as
adaptive modulation and packet size optimization, joint allocation of capacity
and flows (i.e., MAC and routing), and joint scheduling and rate allocation are
discussed. While still maintaining a strict layered architecture, it is shown how
these cross-layer optimizations help improve the spectral efficiency at the
physical layer and the peak signal-to-noise ratio (PSNR) of the video stream
perceived by the user. Clearly, energy constrained multimedia sensors may
274 • Wireless Sensor Networks
need to leverage cross-layer interactions one step further. At the same time,
optimization metrics in the energy domain need to be considered as well.
Crosslayer design is based on the following principles:
Geographical Forwarding
We leverage UWB’s positioning capabilities to allow scalable geographi-
cal routing. The routing paths are selected by the cross-layer controller by
applying an admission control procedure that verifies that each node on
the path be able to provide the required service level. The required packet
error rate and maximum allowed delay are calculated at each step based on
the relative advance of each hop toward the destination.
Multi-Rate Transmission
TH-IR-UWB allows varying the data rate at the physical layer by modify-
ing the pulse repetition period. While this functionality has not been fully
explored so far, it is possible to devise adaptive systems that modify the
achievable data rate at the physical layer based on the perceived interfer-
ence and on the required power consumption.
Integration
GIS server Integration
web server
web server
Streaming
Server
Control
Backup GIS server server
DB Video
server backup
Sensing server Video
DB collection
server BS(G/W) server
FIGURE 8.2 Hardware architecture for sensor networks and video networks.
Gateways and sensor nodes are necessary to build the sensor networks and
gateways, and network cameras are required to form camera networks.
Moreover, the integrated control server, streaming servers, web servers,
database servers, and GIS servers are necessary for the integrated control
system and local servers.
This software architecture of Figure 8.3 shows software required in
two parts: the integrated control server and the sensor network including
the network camera. The integrated control server mainly uses desktop
PCs and workstation PCs, so that there is hardly a limitation on these kinds
of software. That is, it is easy to implement, install, and use. Therefore,
software blocks mentioned previously are essential components for
integrated monitoring. The sensor network, however, is different from
the integrated control flow. Because most of its hardware is an embedded
device based on ARM, MSP, and Atmel, its software has limitations.
Wireless Multimedia Sensor Networks • 277
FIGURE 8.3 Software architecture for sensor networks and video networks.
Video Stream
wake up
Tier 2
Cmucam +
Mote
wake up
Tier 1
Vibration
sensors +
Mote
Figure 8.5 shows multi-tier hardware architecture and Figure 8.6 shows
software architecture.
Benefits of a multi-tier network:
• Reduces power consumption
• Achieves similar performance of single-tier network
• Low cost
• High coverage
• High reliability
• High functionality
Wireless Multimedia Sensor Networks • 279
PTZ Camera
Mini - ITX Ethernet
Tier3
Webcam Webcam
USB
Stargate Stargate
Mote Mote
Tier2
Tier1
Radio
Mote Mote Mote Mote
Serial
Cable
Cmucam Cmucam Cmucam Cmucam
Video
nodes
RF Links
Gateway
FIGURE 8.7 Video Sensing Application (gray seals); VSN grid schematic.
Wireless Multimedia Sensor Networks • 281
study breeding birds can require installation without service for several
months. Services to minimize include battery replacement, lens cleaning,
data download (if not performed in real time). This requirement puts
difficult constraints on the energy used by the camera, communications,
and microcontroller (MCU).
Inexpensive
The VNs must be designed for low cost when produced in quantity.
The components of this VN and the motivations for the selection of
components are described as follow.
Camera Optics
To achieve a wide field of view we will use a catadioptric configuration using
an omni directional mirror fabricated to yield a panoramic image. This
approach eliminates the moving parts of most pan-tilt-zoom configurations,
reduces corresponding energy use, and reduces directionality challenges.
Image Sensor
Advances in single-chip cameras based on CMOS technology have led to
the ubiquity of camera phones. Selection of a 3–5M pixel CMOS chip may
provide flexible temporal and spatial sampling, and low active current.
Wireless Multimedia Sensor Networks • 283
Software Control
Software control includes image capture, processing, analysis, data
routing, and energy management. In order to support duty cycling of each
VN, robust image change detection algorithms will be developed on the
target platform. Particular attention will be applied to low-complexity
algorithms with minimal memory requirements (the so-called “fast and
lean” algorithms) because the available computing power and on-board
memory are severely limited. Since VNs are stationary, the algorithms will
be based on the concept of background subtraction. The background will
be statistically modeled over time and each new image will be tested against
this statistical model. For cameras with overlapping fields of view, inter-
node collaboration will be permitted by means of message passing (e.g.,
communicating partial change detection results). If a change is detected,
a video stream from the node will be transmitted to the gateway using
standard video compression techniques (e.g., MJPEG,MPEG-4,H-264).
284 • Wireless Sensor Networks
Summary
• Wireless multimedia sensor network applications are multimedia
surveillance sensor networks, storage of potentially relevant activities,
traffic avoidance, advanced health care delivery, automated assistance
for the elderly monitors, environmental monitoring, person locator
services, and industrial process control.
• Factors influencing the design of WMSNs are application-specific QoS
requirements, high bandwidth demand, multimedia source coding
techniques, multimedia in-network processing, power consumption,
flexible architecture to support heterogeneous applications,
multimedia coverage, and integration with IP architecture and with
other wireless technologies.
• Computer vision is a subfield of AI, whose purpose is to allow
computer to extract features from an image or multidimensional data.
• Application layer services are traffic management, source code to
application requirements, efficient system software, and advanced
in-network multimedia processing techniques.
• The transport layer is for congestion avoidance and packet reordering
due to multipath.
• The network layer is for addressing and routing.
• The MAC layer is for channel access policies, scheduling, buffer
management, and error control.
• Ultra Wide Band technology is used in WMSNs.
Questions
1. What do you mean by wireless multimedia sensor networks? List
their applications.
2. What are the factors influencing the design of multimedia sensor
networks?
3. Draw the reference network architecture of a WMSN. Explain each
block in detail.
4. Write about WMSNs as distributed computer vision systems.
5. Write the functions of the application layer in detail.
Wireless Multimedia Sensor Networks • 285
9
MOBILE AD HOC
NETWORKS
This chapter discusses wireless ad hoc sensor networks, mobile ad hoc
networks, and vehicular ad hoc networks.
Distributed Operation
Since there is no background network for the central control of the net-
work operations, the control and management of the network is distributed
among the terminals. The nodes involved in a MANET should collaborate
among themselves, and each node acts as a relay as needed to implement
functions like security and routing.
Multi-Hop Routing
Basic types of ad hoc routing algorithms can be single-hop and multi-hop,
based on different link layer attributes and routing protocols. Single-hop
MANET is simpler than multi-hop in terms of structure and implementation,
with the lesser cost of functionality and applicability. When delivering data
packets from a source to its destination out of the direct wireless transmission
range, the packets should be forwarded via one or more intermediate nodes.
Lightweight Terminals
In most of the cases, the MANET nodes are mobile devices with less CPU
processing capability, small memory size, and low power storage. Such
devices need optimized algorithms and mechanisms that implement the
computing and communicating functions.
Mobile Ad Hoc Networks • 293
• Transmission errors
• Node failures
• Link failures
• Route breakages
• Congested nodes or links
Unpredictability of environment
Ad hoc networks may be deployed in unknown terrains, hazardous con-
ditions, and even hostile environments where tampering or the actual
destruction of a node may be imminent. Depending on the environment,
node failures may occur frequently.
Resource-constrained nodes
Nodes in a MANET are typically battery powered as well as limited in stor-
age and processing capabilities. Moreover, they may be situated in areas
where it is not possible to recharge and thus have limited lifespans. Because
of these limitations, they must have algorithms which are energy efficient
as well as operating with limited processing and memory resources. The
available bandwidth of the wireless medium may also be limited because
nodes may not be able to sacrifice the energy consumed by operating at full
link speed.
Dynamic topology
The topology in an ad hoc network may change constantly due to the mobil-
ity of nodes. As nodes move in and out of range of each other, some links
break while new links between nodes are created.
As a result of these issues, MANETs are prone to numerous types of
faults including the following:
Mobile Ad Hoc Networks • 295
Transmission errors
The unreliability of the wireless medium and the unpredictability of the envi-
ronment may lead to transmitted packets being garbled and thus with errors.
Node failures
Nodes may fail at any time due to different types of hazardous conditions in
the environment. They may also drop out of the network either voluntarily
or when their energy supply is depleted.
Link failures
Node failures as well as changing environmental conditions (e.g., increased
levels of EMI) may cause links between nodes to break. Link failures cause
the source node to discover new routes through other links.
Route Breakages
When the network topology changes due to node/link failures and/or node/
link additions to the network, routes become out-of-date and thus incor-
rect. Depending upon the network transport protocol, packets forwarded
through stale routes may either eventually be dropped or be delayed.
Table Driven/Proactive
Destination sequenced distance vector [DSDV]
The DSDV is a table-driven-based routing algorithm. Each DSDV node
maintains two routing tables. They are a table for forwarding packets and a
table for advertising incremental updates. The nodes will maintain a rout-
ing table that consists of a sequence number. The routing table is periodi-
cally exchanged so that every node will have the latest information. DSDV
is suitable for small networks. The algorithm works as follows: a node or a
mobile device will make an update in its routing table and send the infor-
mation to its neighbor upon receiving the updated information and make
an update in its own routing table. The sequence number received is com-
pared with the present sequence number; if the new sequence number is
greater, then the new one will be used. A link failure in one of the nodes will
change the metric value to infinity and broadcast the message.
Cluster head gateway switch router [CGSR]
CGSR is also a table driven routing protocol. In this algorithm the mobile
devices will be grouped to form a cluster. The grouping is based on the
range, and each cluster is controlled by the cluster head. All the mobile
devices will maintain two tables, the cluster member table and the routing
table. The cluster member table will have the information about the clus-
ter head for each destination. The routing table will have routing informa-
tion. In this protocol the packet cannot be directly sent to the destination;
instead, cluster heads are used for routing. CGSR routing involves cluster
routing, where a node finds the best route over cluster heads from the clus-
ter member table.
Wireless routing protocol [WRP]
WRP is also based on a table driven approach. This protocol makes use of
four tables:
1. Distance table: Which contains information like destination, next hop,
distance
Mobile Ad Hoc Networks • 297
value is more, it means node mobility is less. If the associativity value is less,
it means node mobility is more. In ABR, the source which wants to send
the packet to the destination will create a query packet and broadcast in
the network. Query packet generation is required for discovering the route.
The broadcast continues as long as destination is reached. Once the desti-
nation is reached, it creates the reply packet and sends back to the source.
The query packet will have the following information:
1. Source ID
2. Destination ID
3. All intermediate node IDs
4. Sequence number
5. CRC
6. Time to live [TTL]
A node sends an updated packet to the neighbors and waits for the
reply; if an update is received back, then the associative tick will be incre-
mented higher and it means the mobile device is still a part of the network;
otherwise it might not be.
Ad hoc on demand distance vector [AODV]
It is a source-initiated routing protocol in mobile ad hoc networks. The
algorithm consists of two phases:
1. Route discovery phase
2. Route maintenance phase
In the route discovery phase the path from source to destination is
identified by broadcasting a route request packet [RREQ]. When the inter-
mediate node receives the RREQ, it will create a backward pointer and
continue the broadcast. When the route request packet reaches the desti-
nation, a route reply would be generated [RREP]. The route reply will have
information about the path that can be chosen for the packet transmission.
The route request packet can have following information:
1. Source ID
2. Destination ID
3. Sequence number
Mobile Ad Hoc Networks • 299
sent back to the source. The update packet will have the path information
if there is more than one update packet received by the source. It means
there are multiple paths to the destination, and the source has to choose the
best path available.
1. Availability
The term availability means that a node should maintain its ability to
provide all the designed services regardless of its security state. This
security criterion is challenged mainly during denial-of-service attacks.
In this, all the nodes in the network can be the attack target, and thus,
some selfish nodes make some of the network services unavailable,
such as the routing protocol or the key management service.
2. Integrity
Integrity guarantees the identity of the messages when they are transmit-
ted. Integrity can be compromised mainly in two ways:
• Malicious altering
• Accidental altering
A message can be removed, replayed, or revised by an adversary with
a malicious goal, which is regarded as malicious altering; on the con-
trary, if the message is lost or its content is changed due to some be-
nign failures, which may be transmission errors in communication or
302 • Wireless Sensor Networks
3. Confidentiality
Confidentiality means that certain information is only accessible to
those who have been authorized to access it. In other words, in order
to maintain the confidentiality of some confidential information, we
need to keep it secret from all entities that do not have the privilege to
access them.
4. Authenticity
Authenticity is essentially assurance that participants in communica-
tion are genuine and not impersonators. It is necessary for the com-
munication participants to prove their identities as what they have
claimed using some techniques so as to ensure authenticity. If there
is not such an authentication mechanism, the adversary could imper-
sonate a benign node and thus get access to confidential resources, or
even propagate some fake messages to disturb the normal network
operations.
5. No repudiation
Non-repudiation ensures that the sender and the receiver of a message
cannot deny that they have ever sent or received such a message. This
is useful especially when one needs to determine if a node with some
abnormal behavior is compromised or not. If a node recognizes that
the message it has received is erroneous, it can then use the incorrect
message as evidence to notify other nodes that the node sending out
the improper message may have been compromised.
6. Authorization
Authorization is a process in which an entity is issued a credential
which specifies the privileges and permissions it has, and it cannot be
falsified by the certificate authority. Authorization is generally used
to assign different access rights to different levels of users. For in-
stance, one needs to ensure that network management function is only
accessible by the network administrator. Therefore, there should be an
authorization process before the network administrator accesses the
network management functions.
Mobile Ad Hoc Networks • 303
7. Anonymity
Anonymity means that all the information that can be used to identify
the owner or the current user of the node should default to be kept
private and not be distributed by the node itself or the system soft-
ware. This criterion is closely related to privacy preserving, in which
we should try to protect the privacy of the nodes from arbitrary disclo-
sure to any other entities.
for new technologies. One important issue is to try to reduce the packet
or the data loss during an active transmission. In mobile ad hoc networks,
mobile link transmission errors, mobility, and network congestion are some
of the major causes of data loss. Data loss due to transmission errors is
mainly affected by the physical condition of the channel and the region
where networks are deployed. These losses can’t be reduced with the
improvement in ad hoc routing protocols.
Each mobile device in an ad hoc network has to rely on others for for-
warding data packets to other nodes in the network. Routing protocols
of a mobile ad hoc network are another way to transmit data from one
device to another. NWB (Network-wide Broadcast) is considered to be one
of the routing or data exchange related operations, and it is used to dis-
cover routes for both unicast (one-to-one) and multi-cast (one-to-many)
data exchange operations. NWB can also be defined as a process through
which one mobile device sends a packet to all other devices in the network.
NWB provides important control and route establishment functionality to
different protocols of mobile ad hoc networks. It is especially important
for paging, alarming, location updates, route discoveries, or even rout-
ing in highly mobile ad hoc environments. Network-wide broadcasting is
normally achieved via flooding. In a flooding or broadcasting task, a source
mobile device floods or broadcasts the same message to all the devices in
the network. Some of the desirable properties of a scalable flooding scheme
are reliability, power, and bandwidth efficiency, which can be measured by
savings in rebroadcasts.
mobility, is the movement of a mobile node within its own network, while
macro mobility, also called Inter-Domain mobility, is the movement of
mobile node between different networks.
Internet
Gateway
Gateway
Mobile
nodes
Ad hoc network
SATCOM Radio
Backhaul Radio
SATCOM Radio
Backhaul Radio
SATCOM Radio UAV Link Radio Backhaul Radio
Backhaul Radio Wireless Access Point
Wireless
Wireless Clients
Clients
Wireless Client
FIGURE 9.4 A view of a battlefield illustrating a mobile, wireless network capable of com-
municating voice, data, and video traffic. The networking infrastructure is
located in vehicles equipped with backhaul radios and embedded routers.
the clients mobile, but so are the basic building blocks of a mobile wireless
network, for example, the radios and specialized embedded routers. This
creates a fluid and ever-changing network with dynamic nodes and frequent
routing table changes. These are referred to as Mobile Ad hoc NETworks
(MA-NET).
Ad hoc networks have numerous distinguishing characteristics when
compared with conventional networking solutions, as shown in Table 9.2.
Ad hoc networks deliver a compelling advantage wherever highly mobile
soldiers, unsupported by fixed infrastructure, need to share IP-based infor-
mation. They offer superior information sharing at all levels, enabling
improved situational awareness, a clearer understanding of the leader’s
intent, and the ability for remote users to self synchronize.
Self-forming Nodes that come within radio range of each other can establish a net-
work association without any preconfiguration or manual intervention.
Self-healing Nodes can join or leave rapidly without affecting operation of the
remaining nodes.
No infrastructure In an ad hoc network, mobile nodes form their own network and essen-
tially become their own infrastructure.
Peer-to-peer Traditional networks typically support end systems operating in client-
server mode. In an ad hoc network, mobile nodes can communicate and
exchange information without prior arrangement and without reliance
on centralized resources.
Predominantly Historically, networks have been mostly wired and enhanced or
wireless extended through wireless access. The ad hoc environment is essentially
wireless, but can be extended to support wired resources.
Highly dynamic Mobile nodes are in continuous motion, and ad hoc networking topolo-
gies are constantly changing
The fact that they are self forming and self healing facilitates deploy-
ment and minimizes the need for manual configuration and intervention.
Meanwhile, their multi-hop networking nature extends network coverage
and provides redundant paths for increased resilience. With ad hoc net-
works operators also have the ability to operate with or without connectivity
to a centralized network. Such networks are a key enabler for new applica-
tions such as vehicle-to-vehicle networking, intelligent transportation sys-
tems, sensor networking, telemetry monitoring, and more.
308 • Wireless Sensor Networks
Figures 9.5, 9.6, and 9.7 depict the possible communication configu-
rations in intelligent transportation systems. These include inter-vehicle,
vehicle-to-roadside, and routing-based communications. Inter-vehicle, vehi-
cle-to-roadside, and routing-based communications rely on very accurate and
up-to-date information about the surrounding environment which, in turn,
requires the use of accurate positioning systems and smart communication
protocols for exchanging information. In a network environment in which
the communication medium is shared, highly unreliable, and with limited
bandwidth, smart communication protocols must guarantee fast and reliable
delivery of information to all vehicles in the vicinity. It is worth mentioning
that Intra-vehicle communication uses technologies such as IEEE 802.15.1
(Bluetooth), IEEE 802.15.3 (Ultra-wide Band), and IEEE 802.15.4 (Zigbee)
that can be used to support wireless communication inside a vehicle.
1. Inter-vehicle communication
The inter-vehicle communication configuration (Figure 9.5) uses multi-
hop multicast/broadcast to transmit traffic related information over mul-
tiple hops to a group of receivers. In intelligent transportation systems,
vehicles need only be concerned with activity on the road ahead and not
behind (an example of this would be for emergency message dissemina-
tion about an imminent collision or dynamic route scheduling). There
are two types of message forwarding in inter-vehicle communications:
naive broadcasting and intelligent broadcasting. In naive broadcasting,
vehicles send broadcast messages periodically and at regular intervals.
Upon receipt of the message, the vehicle ignores the message if it has
come from a vehicle behind it. If the message comes from a vehicle in
front, the receiving vehicle sends its own broadcast message to vehicles
behind it. This ensures that all enabled vehicles moving in the forward
direction get all broadcast messages. The limitations of the naive broad-
casting method is that large numbers of broadcast messages are gen-
erated, therefore increasing the risk of message collision, resulting in
lower message delivery rates and increased delivery times. Intelligent
broadcasting with implicit acknowledgement addresses the problems
inherent in naive broadcasting by limiting the number of messages
broadcast for a given emergency event. If the event-detecting vehicle
receives the same message from behind, it assumes that at least one ve-
hicle in the back has received it and ceases broadcasting. The assump-
tion is that the vehicle in the back will be responsible for moving the
message along to the rest of the vehicles. If a vehicle receives a message
from more than one source, it will act on the first message only.
Mobile Ad Hoc Networks • 311
2. Vehicle-to-roadside communication
The vehicle-to-roadside communication configuration (Figure 9.6)
represents a single hop broadcast where the roadside unit sends a
broadcast message to all equipped vehicles in the vicinity. Vehicle-to-
roadside communication configuration provides a high bandwidth link
between vehicles and roadside units. The roadside units may be placed
every kilometer or less, enabling high data rates to be maintained in
heavy traffic. For instance, when broadcasting dynamic speed limits,
the roadside unit will determine the appropriate speed limit accord-
ing to its internal timetable and traffic conditions. The roadside unit
will periodically broadcast a message containing the speed limit and
will compare any geographic or directional limits with vehicle data to
determine if a speed limit warning applies to any of the vehicles in the
vicinity. If a vehicle violates the desired speed limit, a broadcast will be
delivered to the vehicle in the form of an auditory or visual warning,
requesting that the driver reduce his speed.
Road side
unit (RSU)
3. Routing-based communication
The routing-based communication configuration (Figure 9.7) is a
multi-hop unicast where a message is propagated in a multi-hop fash-
ion until the vehicle carrying the desired data is reached. When the
query is received by a vehicle owning the desired piece of information,
the application at that vehicle immediately sends a unicast message
containing the information to the vehicle it received the request from,
which is then charged with the task of forwarding it toward the query
source.
B
A: Message
to B
A B: Message
from A
Road side
base station
Emergency
event
Inter-vehicle
communication
Vehicle-to -roadside
communication
within the vehicle can also be connected to the On Board Units (OBU)
to access any services provided by the network or through the Internet.
These applications are not required by the government, but they encourage
people to install the system.
Users enter their start position, destination, and time to start their
journey, and the server responds with the two best routes. The routes are
compiled from a nine-month survey as well as simulations. In its final ver-
sion the system should be able to collect data from the sensors installed
in cars and provide the routes to the OBU. Subscribers to the system get
an onboard navigation system that receives information about the weather,
road conditions, traffic, and any other related data from road side units and
displays it to the user. A number of applications are envisioned for these
networks, some of which are:
• Vehicle collision warning
• Security distance warning
• Driver assistance
• Cooperative driving
• Cooperative cruise control
• Dissemination of road information
• Internet access
• Map location
• Automatic parking
• Driverless vehicles
the information in its location table. The requesting vehicle issues a lo-
cation query message requesting the identification and sequence num-
bers and hop limit when it needs to know the position of a required
vehicle not available in its location table. This message is rebroadcast
to nearby vehicles until it reaches the required vehicle or the hop limit
is reached. If the request is not a duplicate, the required vehicle an-
swers with a location reply message carrying its current position and
timestamp. Upon receipt of the location reply, the originating vehicle
updates its location table.
5. Forwarding
A geographic unicast transports packets between two nodes via mul-
tiple wireless hops. When the requesting node wishes to send a unicast
packet, it determines the position of the destination node by looking
at the location table. A greedy forwarding algorithm is then used to
send the packet to the neighboring vehicle (Figure 9.9), detailing the
minimum remaining distance to the destination vehicle, and this pro-
cess repeats at every vehicle along the forwarding path until the packet
reaches its destination. A geographic broadcast distributes data packets
by flooding, where vehicles re-broadcast the packets if they are located
in the geographic area determined by the packet. The application of
advanced broadcasting algorithms help to minimize overhead by re-
ducing the occurrence of broadcast storms. Data and control packet
forwarding must be loop-free and toward the destination or target area
location. Having packets forwarded across the shortest path toward the
destination is not a requirement due to the high network volatility.
C
E
A
Path
A-C-D-E
B
FIGURE 9.9 Cached Greedy Geographic Unicast (CGGC), an example of a greedy unicast
transmission based on knowledge of the destination’s position.
Mobile Ad Hoc Networks • 319
The CEPEC protocol coordinates the functions of physical, MAC, and net-
work layers to provide a fair and handoff-free solution for uplink packet
delivery from vehicles to roadside units. With CEPEC, the road is logically
partitioned into segments of equal length and a relaying head is selected
in each segment to perform local packet collecting and aggregate packet
relaying. Nodes outside the coverage area of the nearest roadside unit
can still get access via a multi-hop route to their roadside unit. Similar
to CARAVAN, CEPEC allocates timeslots to vehicles in two steps: first,
the roadside unit allocates the timeslots to the segments. Second, intra-
segment timeslot allocation occurs where the Segment Head (SH) assigns
timeslots to individual vehicles within the segment. Results show that the
CEPEC protocol provides higher throughput with guaranteed fairness in
multihop data delivery in VANETs when compared with a purely IEEE
802.16-based protocol.
Broadcasting
A geographic broadcast distributes data packets by flooding, where vehicles
re-broadcast the packets if they are located in the geographic area deter-
mined by the packet. The application of broadcasting algorithms help to
minimize overhead by reducing the occurrence of broadcast storms. Data
and control packet forwarding must be loop-free and in the direction of the
destination or target area location. Having packets forwarded across the
shortest path toward the destination is typically found in conventional rout-
ing networks and is not a requirement due to the high network volatility.
Several routing efforts have investigated the design of ad hoc routing
algorithms suitable for operation in a VANET environment to deal with:
a node’s mobility, by discovering new routes (reactive routing algorithms),
updating existing routing tables (proactive routing algorithms), using
geographical location information (position-based routing algorithms),
detecting stable vehicle configurations (clusters), using a vehicle’s move-
ments to support message transportation, and using broadcasting to sup-
port message forwarding.
Vehicles periodically broadcast short packets with their identifiers and
current geographic position. Upon receipt of such beacons, a vehicle stores
the information in its location table. It is therefore possible to design a
Cooperative Collision Avoidance (CCA) system that can assist in collision
avoidance by delivering warning messages. When an emergency situation
arises, a vehicle that is part of a CCA platoon needs to broadcast a message
Mobile Ad Hoc Networks • 321
to all of the vehicles behind it. The vehicles that receive this message selec-
tively forward it based upon the direction from which it came which ensures
that all members of the platoon eventually receive this warning.
Mobicasting
The mobicast routing protocol for VANET takes the factor of time into
account. The main goal of the mobicast routing protocol is the delivery of
information to all nodes that happen to be in a prescribed region of space
at a particular point in time. The mobicast protocol is designed to support
applications which require spatiotemporary coordination in vehicular ad
hoc networks. The spatiotemporary character of a mobicast is to forward
a mobicast message to vehicles located in some geographic zone at time t,
where the geographic zone is denoted as the Zone Of Relevance (ZORt).
Vehicles located in ZORt at the time t should receive the mobicast message.
Two features are introduced in the mobicast routing protocol for safety
and comfort applications, as follows.
To support safety applications, the mobicast routing protocol must dis-
seminate the message on time. Vehicles located in the ZORt should receive
the mobicast message before time t + 1; therefore, vehicles located in ZORt
at time t must keep the connectivity to maintain the realtime data commu-
nication between all vehicles in ZORt. However, the connectivity in ZORt
is easily lost if any vehicle in ZOR suddenly accelerates or decelerates its
velocity, and this leads to a temporary network fragmentation problem.
Some vehicles in ZORt cannot successfully receive the mobicast messages
due to the temporary network fragmentation. To solve this problem, dis-
seminate mobicast messages to all vehicles in ZORt via a special geographic
zone, known as a Zone Of Forwarding (ZOFt). This protocol dynamically
estimates the accurate ZOFt to guarantee that the mobicast messages can be
successfully disseminated before time t + 1 to all vehicles located in ZORt.
In contrast, comfort applications for VANET are usually delay-tolerant.
That is, messages initiated from a specific vehicle at time t can be delivered
through VANETs to some vehicles within a given constrained delay time λ.
For all vehicles located in the zone of relevance at time t (denoted as ZORt),
the mobicast routing is able to disseminate the data message initiated from
a specific vehicle to all vehicles which have ever appeared in ZORt at time t.
This data dissemination must be done before time t + λ through the multi-
hop forwarding and carry-and-forward techniques. The temporary network
fragmentation problem is also considered in their protocol design. A low
322 • Wireless Sensor Networks
gain advantage (e.g., a vehicle falsely reports that its desired road is jammed
with traffic, thereby encouraging others to avoid this route and providing
a less congested trip). More malicious reporters could impersonate other
vehicles or road-side infrastructure to trigger safety hazards. Vehicles could
reduce this threat by creating networks of trust and ignoring, or at least
distrusting, information from untrusted senders.
Black Hole Attack: A black hole is formed when nodes refuse to par-
ticipate in the network or when an established node drops out. When
the node drops out, all routes it participated in are broken, leading to a
failure to propagate messages.
Threats to authenticity
Providing authenticity in a vehicular network involves protecting legitimate
nodes from inside and/or outside attackers infiltrating the network using
a false identity, identifying attacks that suppress, fabricate, alter, or replay
legitimate messages, revealing spoofed GPS signals, and impeding the
introduction of misinformation into the vehicular network. These include:
Masquerading: Masquerading attacks are easy to perform on VANETs
as all that is required for an attacker to join the network is a functioning
onboard unit. By posing as legitimate vehicles in the network, outsiders
can conduct a variety of attacks such as forming black holes or producing
false messages.
Replay Attack: In a replay attack the attacker re-injects previously
received packets back into the network, poisoning a node’s location
table by replaying beacons. VANETs operating in the WAVE frame-
work are protected from replay attacks, but to continue protection an
accurate source of time must be maintained, as this is used to keep a
cache of recently received messages against which new messages can
be compared.
Global Positioning System (GPS) Spoofing: The GPS satellite maintains
a location table with the geographic location and identity of all vehicles
on the network. An attacker can fool vehicles into thinking that they are
in a different location by producing false readings in the GPS position-
ing system devices. This is possible through the use of a GPS satellite
simulator to generate signals that are stronger than those generated by
the genuine satellite.
Tunneling: An attacker exploits the momentary loss of positioning
information when a vehicle enters a tunnel, and before it receives the
authentic positioning information, the attacker injects false data into the
onboard unit.
Position Faking: Authentic and accurate reporting of vehicle position
information must be ensured. Vehicles are solely responsible for provid-
ing their location information, and impersonation must be impossible.
Unsecured communication can allow attackers to modify or falsify their
Mobile Ad Hoc Networks • 325
Threats to confidentiality
Confidentiality of messages exchanged between the nodes of a vehicular
network are particularly vulnerable with techniques such as the illegitimate
collection of messages through eavesdropping and the gathering of loca-
tion information available through the transmission of broadcast messages.
In the case of eavesdropping, insider and/or outsider attackers can collect
information about road users without their knowledge and use the infor-
mation at a time when the user is unaware of the collection. Location pri-
vacy and anonymity are important issues for vehicle users. Location privacy
involves protecting users by obscuring the user’s exact location in space and
time. By concealing a user’s request so that it is indistinguishable from other
user’s requests, a degree of anonymity can be achieved.
Authentication with digital signatures: Authentication with digital signa-
ture is a good choice for VANETs because safety messages are normally
326 • Wireless Sensor Networks
GPS
receiver
Wireless GSM
Jennicss Module
Link Wirele
GSM
Network
their reporting rates. For each vehicular sensor, the intra-vehicle network
is a Zigbee network.
VANET simulation models
The environment and topology of VANETs makes it difficult to implement
and evaluate them. Outdoor experiments can be used to evaluate VANET pro-
tocols and applications, but these can be difficult and expensive to implement
because of the high number of vehicles and real-life scenarios involved. It is
difficult to perform actual empirical performance measurements because of
the inherently distributed, complex environment. To overcome these limita-
tions, simulation tools are used extensively for VANET simulations.
Summary
• A wireless ad hoc sensor network consists of a number of sensors
spread across a geographical area.
• Each sensor has wireless communication capability and some level of
intelligence for signal processing and networking of the data.
• The requirements of wireless ad hoc sensor networks are a large
number of sensors, low energy use, network self-organization,
collaborative signal processing, and querying ability.
• Mobile ad hoc networks have features such as autonomous terminals,
distributed operation, multi-hop routing, dynamic network topology,
fluctuating link capacity, and lightweight terminals.
• The routing issues of MANET are unpredictability of environment,
unreliability of wireless medium, resource constrained nodes, and
dynamic topology.
• The types of faults in MANETs are transmission errors, node failures,
link failures, route breakages, and congested nodes or links.
• Routing protocols are classified into two categories: table driven and
source initiated.
• DSDV, CGSR, and WRP are table-driven or proactive-routing protocols.
• DSR, ABR, AODV, and TORA are source-initiated or reactive-routing
protocols.
• The attacks are classified into two types, passive and active.
328 • Wireless Sensor Networks
Questions
1. What are wireless ad hoc sensor networks?
2. What are the classifications of wireless ad hoc sensor networks?
3. What are the requirements of wireless ad hoc sensor networks?
4. List the application of wireless ad hoc sensor networks.
5. List the features of mobile ad hoc networks.
6. What are the routing issues for MANET deployment?
7. Compare WSN and MANET.
8. Explain the classification of routing protocols for MANETs in detail.
9. Write about the security in ad hoc networks.
10. What are the types of attacks in ad hoc networks?
11. List the criteria for a secure routing protocol.
12. In detail write about the security criteria for mobile ad hoc and sen-
sor networks.
13. How can ad hoc networks and the Internet be interfaced?
14. Give the application of mobile ad hoc networking for the military.
15. What are the advantages of deployed ad hoc networks?
16. Explain about the intelligent transportation system.
17. Define VANET.
Mobile Ad Hoc Networks • 329
10
ROUTING AND
SECURITY IN WSNS
This chapter discusses the algorithms required for wireless sensor
networks, the network routing protocols, and security in WSNs.
large number of sensors over the monitoring region with the expectation
that the sensors that survive the air drop will be able to adequately monitor
the target region. When site selection is possible, one can use deterministic
sensor deployment and when site selection isn’t possible, the deployment is
nondeterministic. In both cases, it often is desirable that the deployed col-
lection of sensors be able to communicate with one another, either directly
or indirectly via multi-hop communication. So, in addition to covering the
region or set of points to be sensed, it often requires the deployed col-
lection of sensors to form a connected network. For a given placement of
sensors, it is easy to check whether the collection covers the target region
or point set and also whether the collection is connected. For the coverage
property, it needs to know the sensing range of individual sensors (assume
that a sensor can sense events that occur within a distance r, where r is the
sensor’s sensing range), and for the connected property, it needs to know
the communication range, c, of a sensor.
Theorem 1: when the sensor density (i.e., number of sensors per unit area)
is finite, c ≥ 2r is a necessary and sufficient condition for coverage to imply
connectivity.
There is a similar result for the case of k-coverage (each point is covered
by at least k sensors) and k-connectivity (the communication graph for the
deployed sensors is k connected).
Theorem 2: when c ≥ 2r, k-coverage of a convex region implies k-connectivity.
Notice that k-coverage with k > 1 affords some degree of fault tolerance;
one is able to monitor all points so long as no more than k – 1 sensors
fail. Other variations of the sensor deployment problem also are possible.
For example, one may have no need for sensors to communicate with one
another. Instead, each sensor communicates directly with a base station
that is situated within the communication range of all sensors. In another
variant, the sensors are mobile and self deploy. A collection of mobile sen-
sors may be placed into an unknown and potentially hazardous environ-
ment. Following this initial placement, the sensors relocate so as to obtain
maximum coverage of the unknown environment. They communicate the
information they gather to a base station outside of the environment being
sensed.
into the region that is to be sensed. Assume that the sensors that survive the
air drop cover all targets that are to be sensed. Since the power supply of
a sensor cannot be replenished, a sensor becomes inoperable once it runs
out of energy. Define the life of a sensor network to be the earliest time at
which the network ceases to cover all targets. The life of a network can be
increased if it is possible to put redundant sensors (i.e., sensors not needed
to provide coverage of all targets) to sleep and awaken these sleeping sen-
sors when they are needed to restore target coverage. Sleeping sensors are
inactive while sensors that are awake are active. Inactive sensors consume
far less energy than active ones.
In a decentralized localized protocol, the set of active nodes provides
the desired coverage. A sleeping node wakes up when its sleep timer
expires and broadcasts a probing signal a distance d (d is called the prob-
ing range). If no active sensor is detected in this probing range, the sensor
moves into the active state. However, if an active sensor is detected in
the probing range, the sensor determines how long to sleep, sets its sleep
timer, and goes to sleep. In another distributed localized protocol, sensors
may turn themselves on and off. The network operates in rounds, where
each round has two phases. They are self-scheduling and sensing. In the
self-scheduling phase each sensor decides whether or not to go to sleep.
In the sensing phase, the active/awake sensors monitor the region. Sensor
s turns itself off in the self-scheduling phase if its neighbors are able to
monitor the entire sensing region of s. To make this determination, every
sensor broadcasts its location and sensing range. A backoff scheme is pro-
posed to avoid blind spots that would otherwise occur if two sensors turn
off simultaneously, each expecting the other to monitor part or all of its
sensing region. In this backoff scheme, each active sensor uses a random
delay before deciding whether or not it can go to sleep without affecting
sensing coverage.
Routing
Traditional routing algorithms for sensor networks are data-centric in
nature. Given the unattended and untethered nature of sensor networks,
routing must be collaborative as well as energy conserving for individual
sensors. In the sensor-centric paradigm, the sensors collaborate to achieve
common network-wide goals such as route reliability and path length
while minimizing individual costs. The sensor-centric model can be used
to define the quality of routing paths in the network (also called path
weakness).
334 • Wireless Sensor Networks
Unicast
In a unicast, one wants to send a message from a source sensor s to a
destination sensor t. The five strategies that may be used in the selection
of the routing path for this transmission are developed. The first of these
is to use a minimum-energy path (i.e., a path in G for which the sum
of the edge weights is minimum) from s to t. Such a path may be com-
puted using Dijkstra’s shortest path algorithm. However, since in prac-
tice messages between several pairs of source-destination sensors need
to be routed in succession, using a minimum-energy path for a message
may prevent the successful routing of future messages. As an example,
consider the graph of Figure 10.1. Suppose that sensors x, b1, • • •, bn
initially have 10 units of energy each and that u1, • • •, un each have
1 unit. Assume that the first unicast is a unit-length message from x to y.
There are exactly two paths from x to y in the sensor network of Figure 10.1.
The upper path, which begins at x, goes through each of the uis, and ends at y,
uses n + 1 energy units; the lower path uses 2(n + 1) energy units. Using the
minimum energy path depletes the energy in node ui, 1 ≤ i ≤ n. Following
the unicast, sensors u1, • • •, un are unable to forward any messages. So an
ensuing request to unicast from uI to uJ, i < j will fail. On the other hand, had
one used the lower path, which is not a minimum energy path, one would
not deplete the energy in any sensor and all unit-length unicasts that could
be done in the initial network also can be done in the network following the
first x to y unicast.
Routing and Security in WSNS • 335
1 1 1 un
1 u1 u2
1
x y
2 2
2 2 2
b1 b2 bn
Sensor Fusion
The reliability of a sensor system is enhanced through the use of redun-
dancy. That is, each point or region is monitored by multiple sensors. A
redundant sensor system is faced with the problem of fusing or combining
the data reported by each of the sensors monitoring a specified point or
region. Suppose that k > 1 sensors monitor point p. Let mi, 1 ≤ i ≤ k be
the measurement recorded by sensor i for point p. These k measurements
may differ because of inherent differences in the k sensors, the relative
location of a sensor with respect to p, as well as because one or more sen-
sors is faulty. Let V be the real value for p. The objective of sensor fusion is
to take the k measurements, some of which may be faulty, and determine
338 • Wireless Sensor Networks
Data-Centric Protocols
The sink is used to send queries to certain regions and waits for data from
sensors that are located in selected regions in data-centric routing proto-
cols. As queries are used for the requested data, attribute-based naming in
order to specify the properties of data is necessary. The first data-centric
Routing and Security in WSNS • 339
Rumor Routing
Another variation of Directed Diffusion is rumor routing, which is pro-
posed for contexts in which geographic routing criteria are not applicable.
340 • Wireless Sensor Networks
Hierarchical Protocols
The nodes in hierarchical routing are involved in multi-hop communication
within a particular cluster in order to efficiently maintain the energy con-
sumption, and the transmitted messages to the sink are decreased by per-
forming data aggregation and fusion. The formation of a cluster is typically
based on a sensor’s proximity to the cluster and the energy reserve of sen-
sors. Networking clustering has been pursued in some routing approaches
in order to allow the system to cope with additional load and enable to cover
a large area of interest without degrading the service. The following are the
hierarchical routing protocols:
LEACH (Low Energy Adaptive Clustering Hierarchy)
PEGASIS (Power Efficient Gathering in Sensor Information System) and
Hierarchical-PEGASIS
TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol)
and APTEEN. Energy-aware routing for cluster-based sensor networks &
Self-organizing protocol
Location-based Protocols
Location information is required for nodes in sensor networks in most of
the routing protocols. Energy consumption is estimated by calculating the
distance between two particular nodes for which location information is
required. As there are no schemes like IP addresses, data is routed in an
energy-efficient way by utilizing location information. By using the loca-
tion of sensors, the query is diffused only in a particular region which is
known to be sensed, and a significant number of transmissions will be
eliminated. The protocols are designed primarily for MANETs consid-
ering the mobility of nodes, whereas they are also applicable to sensor
Routing and Security in WSNS • 341
information in the form of route table entries along the route. Control mes-
sages used for the discovery and breakage of the route are as follows:
• Route Request Message (RREQ)
• Route Reply Message (RREP)
• Route Error Message (RERR)
• HELLO Messages
A RREQ is identified by the pair source address and request ID; each time
when the source node sends a new RREQ, the request ID is incremented.
After receiving a request message, each node checks the request ID and
source address pair. The new RREQ is discarded if there is already an
RREQ packet with same pair of parameters. A node that has no route entry
for the destination rebroadcasts the RREQ with an incremented hop count
parameter. A route reply (RREP) message is generated and sent back to the
source if a node has a route with a sequence number greater than or equal
to that of RREQ.
Route Reply (RREP)
On having a valid route to the destination or if the node is the destination,
an RREP message is sent to the source by the node. The following param-
eters are contained in the route reply message:
Discovery of Route
When a source node does not have routing information about destination,
the process of the discovery of the route starts for a node with which the
source wants to communicate. The process is initiated by the broadcasting
of an RREQ, as shown in Figure 10.2. On receiving the RREP message, the
route is established. If multiple RREP messages with different routes are
received, then routing information is updated with an RREP message of a
greater sequence number.
Destination
Propagation of RREQ
destination node is found. The addresses of the neighbors from which the
RREQ packets are received are recorded by each node.
S B C D
Route Discovery
S S,B S,B,C
Broadcast
Request
Route
C moves away
data sent S,(B), C,D S,B,(C),D
Forwarding
fails
B,CDead
Route Error
FIGURE 10.3 DSR Route discovery and maintenance.
Wireless sensor networks are quickly gaining popularity due to the fact
that they are potentially low-cost solutions to a variety of real-world chal-
lenges. Their low cost provides a means to deploy large sensor arrays in a
variety of conditions capable of performing both military and civilian tasks.
But sensor networks also introduce severe resource constraints due to their
lack of data storage and power. Both of these represent major obstacles to
the implementation of traditional computer security techniques in a wire-
less sensor network. The unreliable communication channel and unattended
operation make the security defenses even harder. Indeed, wireless sensors
often have the processing characteristics of machines that are decades old (or
longer), and the industrial trend is to reduce the cost of wireless sensors while
maintaining similar computing power. With that in mind, many researchers
have begun to address the challenges of maximizing the processing capabili-
ties and energy reserves of wireless sensor nodes while also securing them
against attackers. Furthermore, due to the inherent unattended feature of
wireless sensor networks, physical attacks to sensors play an important role
in the operation of wireless sensor networks. The main aspects of wireless
sensor network security can be grouped into four major categories:
• The obstacles to sensor network security
• The requirements of a secure wireless sensor network
• Attacks
• Defensive measures
Data Integrity
With the implementation of confidentiality, an adversary may be unable to
steal information. However, this doesn’t mean the data is safe. The adver-
sary can change the data, so as to send the sensor network into disarray. For
example, a malicious node may add some fragments or manipulate the data
within a packet. This new packet can then be sent to the original receiver.
Data loss or damage can even occur without the presence of a malicious
node due to the harsh communication environment. Thus, data integrity
ensures that any received data has not been altered in transit.
Data Freshness
Even if confidentiality and data integrity are assured, it also needs to
ensure the freshness of each message. Informally, data freshness sug-
gests that the data is recent, and it ensures that no old messages have
been replayed. This requirement is especially important when there are
shared-key strategies employed in the design. Typically shared keys need
350 • Wireless Sensor Networks
to be changed over time. However, it takes time for new shared keys to be
propagated to the entire network. In this case, it is easy for the adversary
to use a replay attack. Also, it is easy to disrupt the normal work of the
sensor, if the sensor is unaware of the new key change time. To solve this
problem a time-related counter can be added into the packet to ensure
data freshness.
Availability
Adjusting the traditional encryption algorithms to fit within the wireless
sensor network is not free, and will introduce some extra costs. Some
approaches choose to modify the code to reuse as much code as possible.
Some approaches try to make use of additional communication to achieve
the same goal. Some approaches force strict limitations on the data access,
or propose an unsuitable scheme (such as a central point scheme) in order
to simplify the algorithm. But all these approaches weaken the availability
of a sensor and sensor network for the following reasons:
• Additional computation consumes additional energy. If no more
energy exists, the data will no longer be available.
• Additional communication also consumes more energy. As
communication increases so too does the chance of incurring a
communication conflict.
• A single point failure will be introduced if using the central point
scheme. This greatly threatens the availability of the network. The
requirement of security not only affects the operation of the network,
but also is highly important in maintaining the availability of the whole
network.
Self-organization
A wireless sensor network is a typically an ad hoc network, which requires
every sensor node be independent and flexible enough to be self-organizing
and self-healing according to different situations. There is no fixed
infrastructure available for the purpose of network management in a sensor
network. This inherent feature brings a great challenge to wireless sensor
network security as well. For example, the dynamics of the whole network
inhibit the idea of pre-installation of a shared key between the base station and
all sensors. In the context of applying public-key cryptography techniques
in sensor networks, an efficient mechanism for public-key distribution is
necessary as well. In the same way that distributed sensor networks must
Routing and Security in WSNS • 351
Authentication
An adversary is not just limited to modifying the data packet. It can change
the whole packet stream by injecting additional packets. So, the receiver
needs to ensure that the data used in any decision-making process origi-
nates from the correct source. On the other hand, when constructing the
sensor network, authentication is necessary for many administrative tasks
(e.g., network reprogramming or controlling sensor node duty cycle). As
discussed previously, message authentication is important for many applica-
tions in sensor networks. Informally, data authentication allows a receiver
to verify that the data really is sent by the claimed sender. In the case of
two-party communication, data authentication can be achieved through a
purely symmetric mechanism: the sender and the receiver share a secret
key to compute the message authentication code (MAC) of all communi-
cated data.
The basic idea of the μTESLA, another system, is to achieve asymmet-
ric cryptography by delaying the disclosure of the symmetric keys. In this
case a sender will broadcast a message generated with a secret key. After a
certain period of time, the sender will disclose the secret key. The receiver
is responsible for buffering the packet until the secret key has been dis-
closed. After disclosure the receiver can authenticate the packet, provided
that the packet was received before the key was disclosed. One limitation
of μTESLA is that some initial information must be unicast to each sensor
node before authentication of broadcast messages can begin. An enhance-
ment to the μTESLA system is that it uses broadcasting of the key chain
commitments rather than μTESLA’s unicasting technique. They present
a series of schemes starting with a simple pre-determination of key chains
and finally settling on a multi-level key chain technique. The multi-level key
chain scheme uses pre-determination and broadcasting to achieve a scal-
able key distribution technique that is designed to be resistant to denial of
service attacks, including jamming.
10.6 Attacks
Sensor networks are particularly vulnerable to several key types of attacks.
Attacks can be performed in a variety of ways, most notably as denial of
service attacks, but also through traffic analysis, privacy violation, physical
attacks, and so on. Denial of service attacks on wireless sensor networks can
range from simply jamming the sensor’s communication channel to more
Routing and Security in WSNS • 353
of the packets (if the packets are themselves encrypted). A rate monitoring
attack simply makes use of the idea that nodes closest to the base station
tend to forward more packets than those farther away from the base station.
An attacker need only monitor which nodes are sending packets and follow
those nodes that are sending the most packets. In a time correlation attack,
an adversary simply generates events and monitors to whom a node sends
its packets. To generate an event, the adversary could simply generate a
physical event that would be monitored by the sensor(s) in the area (turning
on a light, for instance).
Traffic Analysis
Traffic analysis typically combines with monitoring and eavesdropping. An
increase in the number of transmitted packets between certain nodes could
signal that a specific sensor has registered activity. Through the analysis on
the traffic, some sensors with special roles or activities can be effectively
identified.
Camouflage
Adversaries can insert their node or compromise the nodes to hide in the
sensor network. After that these nodes can masquerade as a normal node
to attract the packets, then misroute the packets, for example, forward the
packets to the nodes conducting the privacy analysis. It is worth noting that
the current understanding of privacy in wireless sensor networks is imma-
ture, and more research is needed.
Physical Attacks
Sensor networks typically operate in hostile outdoor environments. In such
environments, the small form factor of the sensors, coupled with the unat-
tended and distributed nature of their deployment, make them highly sus-
ceptible to physical attacks, that is, threats due to physical node destruction.
Unlike many other attacks mentioned previously, physical attacks destroy
sensors permanently, so the losses are irreversible. For instance, attack-
ers can extract cryptographic secrets, tamper with the associated circuitry,
modify programming in the sensors, or replace them with malicious sensors
under the control of the attacker.
Routing and Security in WSNS • 357
Key Establishment
One security aspect that receives a great deal of attention in wireless sen-
sor networks is the area of key management. Wireless sensor networks
are unique (among other embedded wireless networks) in this aspect due
to their size, mobility, and computational/power constraints. This makes
secure key management an absolute necessity in most wireless sensor net-
work designs. Encryption and key management/establishment are so cru-
cial to the defense of a wireless sensor network, with nearly all aspects of
wireless sensor network defenses relying on solid encryption.
Key establishment is done using one of many public-key protocols. Key
exchange techniques use asymmetric cryptography, also called public key
cryptography. In this case, it is necessary to maintain two mathematically
related keys, one of which is made public while the other is kept private.
This allows data to be encrypted with the public key and decrypted only
with the private key. The problem with asymmetric cryptography, in a wire-
less sensor network, is that it is typically too computationally intensive for
the individual nodes in a sensor network. Symmetric cryptography is there-
fore the typical choice for applications that cannot afford the computational
complexity of asymmetric cryptography. Symmetric schemes utilize a single
358 • Wireless Sensor Networks
shared key known only between the two communicating hosts. This shared
key is used for both encrypting and decrypting data. The traditional exam-
ple of symmetric cryptography is DES (Data Encryption Standard). The
use of DES, however, is quite limited due to the fact that it can be broken
relatively easily. In light of the shortcomings of DES, other symmetric cryp-
tography systems have been proposed including 3DES (Triple DES), RC5,
AES, and so on.
One major shortcoming of symmetric cryptography is the key exchange
problem. Simply put, the key exchange problem derives from the fact that
two communicating hosts must somehow know the shared key before they
can communicate securely. So the problem that arises is how to ensure
that the shared key is indeed shared between the two hosts who wish to
communicate and no other rogue hosts who may wish to eavesdrop. How
to distribute a shared key securely to communicating hosts is a non-trivial
problem since pre-distributing the keys is not always feasible.
Key Establishment and Associated Protocols
Random key pre-distribution schemes have several variants. A key pre-dis-
tribution scheme is used which relies on probabilistic key sharing among
nodes within the sensor network. Their system works by distributing a key
ring to each participating node in the sensor network before deployment.
Each key ring should consist of a number of randomly chosen keys from
a much larger pool of keys generated offline. Using this technique, it is
not necessary that each pair of nodes share a key. However, any two nodes
that do share a key may use the shared key to establish a direct link to one
another.
The LEAP (Light weight Extensible Authentication Protocol) protocol
takes an approach that utilizes multiple keying mechanisms. Their observa-
tion is that no single security requirement accurately suits all types of com-
munication in a wireless sensor network. Therefore, four different keys are
used, depending on whom the sensor node is communicating with. Sensors
are preloaded with an initial key from which further keys can be estab-
lished. As a security precaution, the initial key can be deleted after its use in
order to ensure that a compromised sensor cannot add additional compro-
mised nodes to the network.
In PIKE (Peer Intermediaries for Key Establishment in Sensor
Network) a mechanism is used for establishing a key between two sen-
sor nodes that is based on the common trust of a third node somewhere
Routing and Security in WSNS • 359
within the sensor network. The nodes and their shared keys are spread over
the network such that for any two nodes A and B, there is a node C that
shares a key with both A and B. Therefore, the key establishment protocol
between A and B can be securely routed through C. A hybrid key estab-
lishment scheme makes use of the difference in computational and energy
constraints between a sensor node and the base station. They posit that an
individual sensor node possesses far less computational power and energy
than a base station. In light of this, they propose placing the major crypto-
graphic burden on the base station where the resources tend to be greater.
On the sensor side, symmetric-key operations are used in place of their
asymmetric alternatives.
The sensor and the base station authenticate based on elliptic curve
cryptography. Elliptic curve cryptography is often used in sensors due to the
fact that relatively small key lengths are required to achieve a given level of
security. Use certificates to establish the legitimacy of a public key. The cer-
tificates are based on an elliptic curve implicit certificate scheme. Such cer-
tificates are useful to ensure both that the key belongs to a device and that
the device is a legitimate member of the sensor network. Each node obtains
a certificate before joining the network using an out-of-band interface.
Public Key Cryptography
Two of the major techniques used to implement public-key cryptosystems
are RSA and elliptic curve cryptography (ECC). Both RSA and elliptic curve
cryptography are possible using 8-bit CPUs with ECC, demonstrating a
performance advantage over RSA. Another advantage is that ECC’s 160 bit
keys result in shorter messages during transmission compared the 1024 bit
RSA keys. In particular, the point multiplication operations in ECC are an
order of magnitude faster than private-key operations within RSA, and are
comparable (though somewhat slower) to the RSA public-key operation.
responsible for disbursing the keys throughout the network. The key dis-
tribution center, therefore, is the root of the key hierarchy while individual
nodes make up the leaves. The internal nodes of the key hierarchy contain
keys that are used in the re-keying process. Directed diffusion is a data-
centric, energy efficient dissemination technique that has been designed
for use in wireless sensor networks. In directed diffusion, a query is trans-
formed into an interest (due to the data-centric nature of the network). The
interest is then diffused throughout the network and the network begins
collecting data based on that interest.
The dissemination technique also sets up certain gradients designed to
draw events toward the interest. Data collected as a result of the interest
can then be sent back along the reverse path of the interest propagation.
Using the above mentioned directed diffusion technique, the logical key
hierarchy is enhanced to create a directed diffusion-based logical key hier-
archy. The logical key hierarchy technique provides mechanisms for nodes
joining and leaving groups where the key hierarchy is used to effectively
re-key all nodes within the leaving node’s hierarchy. The directed diffusion
is also used in node joining and leaving. When a node declares an intent
to join, for example, a join “interest” is generated which travels down the
gradient of “interest about interest to join.” When a node joins, a key set
is generated for the new node based on keys within the key hierarchy. In
this case, nodes are grouped based on locality and attach to a security tree.
However, they assume that nodes within the mobile network are somewhat
more powerful than a traditional sensor in a wireless sensor network.
Secure Broadcasting
A tree-based key distribution scheme is described and suggests a routing-
aware-based tree where the leaf nodes are assigned keys based on all relay
nodes above them. It takes advantage of routing information being more
energy efficient than routing schemes that arbitrarily arrange nodes into
the routing tree. Some schemes cases instead use geographic location infor-
mation (e.g., GPS) rather than routing information. In this case, however,
nodes (with the help of the geographic location system) are grouped into
clusters with the observation that nodes within a cluster will be able to
reach one another with a single broadcast. Using the cluster information, a
key hierarchy is constructed.
Defending against Attacks on Routing Protocols
Most current research has focused primarily on providing the most energy-
efficient routing. There is a great need for both secure and energy-efficient
Routing and Security in WSNS • 363
several distinct paths with the hope that at least one will arrive at the desti-
nation. To discern which, if any, of the messages arriving at the destination
are authentic, an authentication scheme can be employed to confirm the
message’s integrity.
It also makes use of an assumed asymmetry between base stations and
wireless sensor nodes. They assume that the base stations are somewhat
less resource constrained than the individual sensor node. For this reason,
it is suggested that the base station be used to compute routing tables on
behalf of the individual sensor nodes. This is done in three phases. In the
first phase, the base station broadcasts a request message to each neighbor
which is then propagated throughout the network. In the second phase, the
base station collects local connectivity information from each node. Finally,
the base station computes a series of forwarding tables for each node. The
forwarding tables will include the redundancy information used for the
redundant message transmission.
There are several possible attacks that can be made on the routing pro-
tocol during each of the three stages. In the first phase, a node might spoof
the base station by sending a spurious request message. A malicious node
might also include a fake path(s) when forwarding the request message to
its neighbors. It may not even forward the request message at all. To coun-
ter this, use a scheme similar to μTESLA where one-way key chains are
used to identify a message originating from the base station.
The base station is to broadcast an encrypted message to all of its
neighbors. Only those neighbors who are trusted will possess the shared
key necessary to decrypt the message. The trusted neighbor(s) then adds
its location (for the return trip), encrypts the new message with its own
shared key and forwards the message to its neighbor closest to the desti-
nation. Once the message reaches the destination, the recipient is able to
authenticate the source (base station) using the MAC that will correspond
to the base station. To acknowledge or reply to the message, the destina-
tion node can simply forward a return message along the same trusted path
from which the first message was received.
A wormhole attack is one in which a malicious node eavesdrops on a
packet or series of packets, tunnels them through the sensor network to
another malicious node, and then replays the packets. This can be done
to misrepresent the distance between the two colluding nodes. It can also
be used to more generally disrupt the routing protocol by misleading the
neighbor discovery process. Often additional hardware, such as a directional
Routing and Security in WSNS • 365
or duplicated claim revokes the conflicting nodes. This strategy will work,
but the communication cost is far too expensive. In order to reduce the
communication cost, a deterministic multicast could be employed where
nodes would share their locations with a set of witness nodes. In this case,
witnesses are computed based on a node’s ID. In the event that a node has
been replicated on the network, two conflicting locations will be forwarded
to the same witness who can then revoke the offending nodes. But since a
witness is based on a node’s ID, it can easily be computed by an attacker
who can then compromise the witness nodes. Thus, securely utilizing a
deterministic multicast strategy would require too many witnesses and the
communication cost would be too high.
The line-selected multicast algorithm seeks to further reduce the com-
munication costs of the randomized multicast algorithm. It is based upon
rumor routing. The idea is that a location claim traveling from source s to
destination d will also travel through several intermediate nodes. If each of
these nodes records the location claim, then the path of the location claim
through the network can be thought of as a line segment.
Intrusion Detection
The area of intrusion detection in wireless sensor networks is important.
Many secure routing schemes attempt to identify network intruders, and
key establishment techniques are used in part to prevent intruders from
overhearing network data. However, resource constraints are not the only
reason. As such, it is difficult to define characteristics (or signatures) that
are specific to a network intrusion as opposed to the normal network traffic
that might occur as the result of normal network operations or malfunctions
resulting from environment change.
Traditionally, Intrusion Detection has Focused on Two Major Categories.
• Anomaly based intrusion detection (AID)
• Misuse intrusion detection (MID)
Mobile Host
LIDS
Mobile Mobile Mobile
Agent Agent Agent
Local Local
SNMP
LIDS LIDS MIB
Agent
Agent Agent
Mobile Agents Place
both the collection and processing of data from remote hosts, specifically
SNMP requests. The agents are capable of migration between individual
hosts and are capable of transferring data back to their home LIDS. The
local LIDS agent is responsible for detecting and responding to local intru-
sions as well as responding to events generated by remote nodes.
A method is proposed to use SNMP auditing as the audit source for each
LIDS. Rather than simply sending the SNMP messages over an unreliable
UDP connection, it is suggested that mobile agents will be responsible for
message transporting. When a LIDS detects an intrusion, it should com-
municate this intrusion to other LIDS on the network. Possible responses
include forcing the potential intruder to re-authenticate, or to simply
ignore the suspicious node when performing cooperative actions. Although
this approach cannot be applied to wireless sensor network directly, it is an
interesting idea that explores the local information only, which is the key to
any intrusion detection techniques in sensor networks.
to the true aggregation value. In the event that the aggregate value has
been tampered with, the user should reject the incorrect results with high
probability.
The aggregate-commit-prove technique is composed of three phases.
In the first stage, aggregate, the aggregator collects data from the sensors
and computes the aggregation result according to a specific aggregate func-
tion. Each sensor should share a key with the aggregator. This allows the
aggregator to verify that the sensor reading is authentic. However, it is pos-
sible that a sensor has been compromised and possesses the key, or that
the sensor is simply malfunctioning. The aggregate phase does not prevent
such malfunctioning.
In the second phase, the commit phase, the aggregator is responsible
for committing to the collected data. This commitment ensures that the
aggregator actually uses the data collected from the sensors. One way to
perform this commitment is to use a Merkle hash-tree construction. Using
this technique the aggregator computes a hash of each input value and the
internal nodes are computed as the hash of their children concatenated.
The commitment is the root value. The hashing is used to ensure that the
aggregator cannot change any input values after having hashed them. In the
final phase, the aggregator is charged with proving the results to the user.
The aggregator first communicates the aggregation result and the commit-
ment. The aggregator then uses an interactive proof to prove the correct-
ness of the results. This generally requires two steps. In the first, the user/
home server checks to ensure that the committed data is a good representa-
tion of the data values in the sensor network. In the second step, the user/
home server decides whether the aggregator is lying. This can be done by
checking whether or not the aggregation result is close to the committed
result. The interactive proof differs depending on the aggregation function
that is being used.
to employ special software and hardware outside the sensor to detect physi-
cal tampering. As the price of the hardware itself gets cheaper, tamper-
resistant hardware may become more appropriate in a variety of sensor
network deployments.
One possible approach to protect the sensors from physical attacks is
self-termination. The basic idea is the sensor kills itself, including destroy-
ing all data and keys, when it senses a possible attack. This is particularly
feasible in the large-scale wireless sensor network which has enough redun-
dancy of information, and the cost of a sensor is much cheaper than the
loss of being broken (attacked). The key of this approach is detecting the
physical attack.
A simple solution is periodically conducting neighborhood checking
in static deployment. For mobile sensor networks, this is still an open
problem. Techniques described for extracting protected software and
data from smartcard processors include manual micro probing, laser cut-
ting, focused ion-beam manipulation, glitch attacks, and power analysis,
most of which are also possible physical attacks on the sensor. Based on
an analysis of these attacks, the following are examples of low-cost protec-
tion countermeasures that make such attacks considerably more difficult,
including:
Trust Management
Trust is an old but important issue in any networked environment, whether
social networking or computer networking. Trust can solve some problems
beyond the power of the traditional cryptographic security. For example,
judging the quality of the sensor nodes and the quality of their services,
and providing the corresponding access control, for example, does the data
aggregator perform the aggregation correctly? Does the forwarder send out
the packet in a timely fashion? These questions are important, but difficult,
if not impossible, to answer using existing security mechanisms. The trust
issue is emerging as sensor networks thrive. However, it is not easy to build
a good trust model within a sensor network given the resource limits.
According to the small-world principle in the context of social networks
and peer-to-peer computing, one can employ a path-finder to find paths
from a source node to a designated target node efficiently. Based on this
observation, a practical approach to compute trust in wireless networks is
by viewing individual mobile devices as a node of a delegation graph G and
mapping a delegation path from the source node S to the target node T into
an edge in the correspondent transitive closure of the graph G, from which
the trust value is computed. In this approach, an undirected transitive sig-
nature scheme is used within the authenticated transitive graphs. A trust
376 • Wireless Sensor Networks
Summary
• When the sensor density (i.e., number of sensors per unit area) is
finite, c > = 2r is a necessary and sufficient condition for coverage to
imply connectivity.
• For maximum lifespan coverage, the sensor nodes are implemented
with sleep and awake algorithms.
• An energy-aware routing algorithm is selected for energy conservation.
• To maximize lifespan, balance between the energy consumed by a
route and the minimum residual energy at the nodes along the chosen
route is achieved.
• The reliability of a sensor system is enhanced through the use of
redundancy.
• Flooding is a way the sensor node broadcasts a data packet to all its
neighbors, and this process continues until a destination is found.
• In gossiping, the packet is sent to a selected random neighbor which
selects another random neighbor and finally arrives at the destination.
Routing and Security in WSNS • 377
• In reactive routing protocols the routes are created only when source
wants to send data to a destination, whereas proactive routing
protocols are table driven.
• The main categories of wireless sensor network security are as follows:
1. The obstacles to sensor network security, 2. The requirements
of secure wireless sensor networks, 3. Attacks, and 4. Defensive
measures.
• Limited resources, memory, and power are a few obstacles in sensor
security.
• A denial of service attack is defined as any event that diminishes or
eliminates a network’s capacity to perform its expected function.
Questions
1. State the theorem for sensor deployment and coverage.
2. How will it possible to maximize coverage lifespan?
3. What do you mean by unicast?
4. Write about multicast and broadcast routing types.
5. Explain about the data collection and distribution at the base station.
6. Write in detail about data-centric protocols.
7. What is flooding?
8. What is gossiping?
9. Write a note on hierarchical protocols.
10. Write in detail about the AODV routing protocol.
11. Write a short note about location-based protocols.
12. Write a method for DSR route discovery and maintenance.
13. List the obstacles in sensor security.
14. List the sensor security requirements.
15. Write the types of attacks in security.
16. Write about the defensive measures.
378 • Wireless Sensor Networks
References
http://www.cise.ufl.edu/~sahni/papers/sensors.pdf
APPENDIX
A
A GUIDE TO SECURING
NETWORKS FOR WI-FI
(IEEE 802.11 FAMILY)1.0/
MARCH, 2017
Prepared By
United States Department of Homeland Security (DHS) Cybersecurity Engineering
Table of Contents
1. Introduction .................................................................................... 379
2. Threat Types .................................................................................... 381
3. Threat Remediation . ........................................................................ 382
4. Recommended Requirements for Enterprise Wireless Networking ..... 383
5. Recommended Requirements for WIDS/WIPS .................................. 384
6. Recommended Requirements for Wireless Surveys ............................ 386
7. Budget Estimation Guide ................................................................. 388
8. Bluetooth Security Considerations ................................................... 390
Appendix A: Authorities and References ............................................... 390
Appendix B: Acronyms and Abbreviations ............................................ 392
1. Introduction
This guide summarizes leading practices and technical guidance for securing
networks from wireless threats and for securely implementing wireless access
380 • Appendix A
1
Link to FCC announcement: https://www.fcc.gov/document/fcc-increases-5ghz-spectrum-
wi-fi-other-unlicensed-uses
2
According to the SANS Institute, the “SANS CIS Critical Security Controls are a recom-
mended set of actions for cyber defense that provide specific and actionable ways to stop
today’s most pervasive and dangerous attacks.” See Appendix A for link to the SANS CIS
webpage.
A Guide to Securing Networks for Wi-Fi • 381
2. Threat Types
By not addressing wireless security, enterprise networks are exposed to the
threats listed below. Monitoring for wireless activity and devices enables an
enterprise to have better visibility into Wi-Fi use and to identify and miti-
gate Wi-Fi-related threats. Wi-Fi threats include:
• Hidden or Rogue Access Points (APs) – unauthorized wireless APs
attached to the enterprise network may not transmit their service set
identifier (SSID) to hide their existence.
382 • Appendix A
3. Threat Remediation
An active WIDS/WIPS enables enterprise networks to create and enforce
wireless security policies. WIDS/WIPS provides the ability to centrally
A Guide to Securing Networks for Wi-Fi • 383
monitor and manage enterprise wireless security with respect to the vari-
ous threats listed above. Alternatively, during an incident related to these
threats, an on-site technician would be required to survey the entire enter-
prise with a laptop or other wireless network detection device in an attempt
to locate and identify a rogue AP. Having a WIDS/WIPS capability in place
greatly aids in incident remediation.
Successfully identifying and mitigating rogue APs and wireless devices
is a challenging and labor-intensive process, as rogue APs are frequently
moved and not always powered on. A WIDS/WIPS capability provides
immediate automated alerts to the enterprise security operations center
(SOC) and can be configured to automatically prevent any clients from
attaching to rogue APs. WIDS/WIPS capabilities are also useful for physi-
cally locating rogue APs in order to remove them.
3
RFC 5216
4
Cipher block chaining message authentication code is abbreviated as CBC-MAC.
A Guide to Securing Networks for Wi-Fi • 385
5
Federal standards and Federal Acquisition Regulations (FAR)
A Guide to Securing Networks for Wi-Fi • 387
Acronym Definition
B
ABBREVIATIONS
4A Anywhere, Anytime, by Anyone and Anything
ABS Anti-lock Braking System
ADC Analog to Digital Converter
AODV Ad-hoc On Demand Distance Vector Routing
API Application Programming Interface
ASCII American Standard Code for Information Interchange
ASIC Application Specific Integrated Circuit
BLE Bluetooth Low Energy
BRAM Block RAM
CDMA Code Division Multiple Access
CNC Computer Numerically Controller
CoAP Constrained Application Protocol
CPLD Complex Programmable Logic Device
CPU Central Processing Unit
DCM Digital Clock Manager
DMA Direct Memory Access
DRAM Dynamic RAM
DSN Distributed Sensor Network
DSP Digital Signal Processing/Processor
ETSI European Telecommunications Standards Institute
FCC Federal Communications Commission
FDDI Fiber Distributed Data Interface
FDM Frequency Division Multiplexing
FDMA Frequency Division Multiple Access
FFD Full Function Device
396 • Appendix B
Generic, 80, 81, 88–91, 103 Integrity, 76, 134, 135, 194, 195, 197,
Gigabit Ethernet, 12 209, 229, 301, 319, 331, 349, 364, 376
Global monitoring, 170–172 Intermittent data, 99
GloMoSim, 134 Internet of Things, 139, 213, 214, 227,
Gossiping, 293, 339, 376 230, 237
GPRS, 125, 154, 177, 181 Intrusion detection, 4, 168, 193, 254, 357,
GPS, 30, 38, 40, 132, 134, 143, 155, 162, 369–372, 376
164, 169 Inventory, 6
GPSR, 317 IoT Architecture, 218, 219
Greenhouse gases, 161 IrDA, 13
GSM, 149, 152, 154, 181, 228, 326 ISM bands, 11, 17, 60
H J
Hall effect, 34, 40, 41, 42, 88 Jitter, 263, 268
Ham radio, 11
Harvard architecture, 52–54, 74 K
Headers, 24
Key management, 195, 197, 300, 301,
Healthcare, 3, 110, 111, 131, 140,
303, 325, 351, 357, 361
145, 215
Heterogeneous WSN, 225
Hierarchical protocol, 340 L
Hogthrob node architecture, 72, 73 Landslide monitor, 169
Home RF, 13 Latency, 24, 58, 99, 100, 202, 218,
Homogeneous, 58, 120, 223, 224, 266–270, 274, 293, 322, 323, 338, 348
252–254 LEACH protocol, 207, 340
Homogeneous WSN, 224 LEAP protocol, 358
Hybrid network, 216, 217 Livelock, 26, 27
Location based protocol, 340, 341
I Location discovery, 29, 30
Luminosity sensor, 132
IEEE 1451, 30–32, 293
IEEE 802.15.4 stack, 94
IGEFET, 37–39
M
IIC, 44 MAC bus, 68, 69
Imaging motes, 255 Magnetic sensors, 34, 43
Imote node architecture, 69, 70 Magnetoresistive effect, 34
Inductive sensors, 34 MANET, 290–295, 308, 313, 315, 340
Industry, 5, 6, 155, 205, 227, 236, Mechanical sensor, 32, 40
240, 246 MEMS, 32, 40, 128, 256
Information flooding, 367 Mesh network, 22, 77, 99, 123, 218, 228,
Infrastructure-based network, 287 241, 287
402 • Wireless Sensor Networks
Router nodes, 123, 128, 129 Switching, 14, 20, 24, 153, 165, 204, 271,
Routing, 21, 242 287, 290
Rumor routing, 339 Sybil attack, 325, 354, 363, 365
S T
SAW, 38–40 Table driven protocol, 295, 296, 327, 341,
Scalability, 10, 77, 81, 89, 97, 120, 123, 377
172, 251, 252, 254, 289, 293 TDMA, 25, 26, 63, 64, 182, 201, 268, 269
Scheduler, 89, 90, 347 TEEN protocol, 340
Secure data aggregation, 30, 357, 372 Thermal sensors, 35
Security, 6, 8, 13, 22, 29, 30 Thermo-mechanical transduction, 35
Self healing ring, 22 Thermocouples, 35, 36, 40
Self-organizing networks, 288 Timers, 89–91, 99
Sensor networks, 1 Tiny OS, 87–93
Sensor node, 1 Token ring, 11, 26
Sensor technologies, 42, 232 TORA algorithm, 299
Sensor, 1–10, 22, 23, 24 Transducers, 31, 32, 36, 37, 39
SensorSim, 134 Transmission line, 155, 156, 173
SHARC architecture, 52, 53 Tunneling sensing, 33
Simulators, 134 Turbidity, 175, 183, 192, 194, 206, 207,
Smart electricity, 155, 159 210
Smart grid, 155, 157, 166, 173
Smart home, 166, 173
Smart sensor, 30–32, 47, 289 U
Source initiated protocol, 295, 297–299, 327 Ubiquitous computing, 139, 216, 242
Spectrum, 14, 15, 17–20, 38, 39, 46, 95, Underwater Acoustic sensor
97, 228, 237, 271, 319, 327, 359 network, 186, 212
SPEED protocol, 266 Unicast, 266, 304, 312, 317, 318, 334,
SPI, 44, 45, 57, 58, 63, 65, 69, 72, 75, 184 335, 352, 368, 377
SPIN protocol, 339, 366 Unmanned Aerial Vehicles, 305
Spread spectrum modulation, 18 USN, 139–146, 151, 172, 173
Star topology, 22, 98, 123, 125, 170–
172, 218
Static, 90, 117, 120, 124, 125, 186, 202, V
210, 218, 248, 270, 367, 374 VANET, 309, 313–317, 320–324,
Structure monitor, 169 327–329
Sub-1GHz transceiver, 95 Vehicular ad hoc networks, 286, 309, 313,
Substations, 156, 157, 173 319, 321, 329
Surface sensors, 183, 184, 211 Video node, 281, 282
404 • Wireless Sensor Networks
X
W XYZ node architecture, 71, 74, 75
Water quality monitoring, 205–207,
210, 211
Wearable body network, 112 Z
Wearable computing, 134, 136 Zigbee stack, 101, 108
Wi-Fi, 180, 233, 238, 240, 241, 306, 353 ZigBee, 9, 13, 14, 46, 60, 76, 87, 93, 94,
WiMAX, 180 97–103, 105, 107–109, 119, 122, 125,
Wireless communications, 60, 120, 122, 181, 194, 207, 219, 228, 238, 293, 310,
150, 179, 250, 272, 280 327, 353
Wireless LAN, 7, 11, 14, 19, 125, 286