Unit V: Data Aggregation and Security
Unit V: Data Aggregation and Security
1
• This chapter explores how to manage very large wireless
sensor networks.
• In these networks, typical data collection techniques are
not viable, as they flood the network with too much data
and exhaust its energy reserves too quickly.
• There are several possibilities to minimize the traffic in
very large WSNs.
• You can aggregate the data on its way to reduce the
number of packets; organize the network into sub-
networks and let the sub-networks decide what to do
with the data and, last but not least, reduce the data
produced at the individual nodes in the first place.
2
CLUSTERING TECHNIQUES
• Clustering was one of the first techniques applied to very
large networks.
• The main idea is to organize the network into smaller
sub-networks, so that data can be collected and analyzed
in a location-restricted way.
• So only some important or aggregated data comes to
the final network-wide sink.
3
4
Roles of individual nodes:
• Cluster members are simple nodes, which sense some
phenomena. They send their data to their cluster heads. A
cluster member belongs to a single cluster head.
• Cluster heads are local sinks, which gather all of the
information of their cluster members. Several options are
possible here and depend on the application: send
everything through a more powerful link to a final data
storage place; aggregate or compress the data then send it
through the sensor network to a global sink; or analyze the
data and either report some event or not.
• The sink, sometimes called the global sink, is a single node
in the network, which gathers all information from all
nodes in the network. It is not necessary that it exists at all.
5
The main objective of clustering is to save
energy and to avoid data congestion
in the network.
6
Random Clustering
• Where I am & what time I have ?
• Most of devices do not know where they are, ranging
from washing machines and coffee makers to cars and
laptops.
• Only when a GPS receiver is installed, does a device
have location information to use.
7
LOCALIZATION CHALLENGES AND PROPERTIES
• Where I am & what time I have ?
• Most of devices do not know where they are, ranging
from washing machines and coffee makers to cars and
laptops.
• Only when a GPS receiver is installed, does a device
have location information to use.
8
LOCALIZATION CHALLENGES AND PROPERTIES
• Where I am & what time I have ?
• Most of devices do not know where they are, ranging
from washing machines and coffee makers to cars and
laptops.
• Only when a GPS receiver is installed, does a device
have location information to use.
9
LOCALIZATION CHALLENGES AND PROPERTIES
• Where I am & what time I have ?
• Most of devices do not know where they are, ranging
from washing machines and coffee makers to cars and
laptops.
• Only when a GPS receiver is installed, does a device
have location information to use.
10
LOCALIZATION CHALLENGES AND PROPERTIES
• Where I am & what time I have ?
• Most of devices do not know where they are, ranging
from washing machines and coffee makers to cars and
laptops.
• Only when a GPS receiver is installed, does a device
have location information to use.
11
LOCALIZATION CHALLENGES AND PROPERTIES
• Where I am & what time I have ?
• Most of devices do not know where they are, ranging
from washing machines and coffee makers to cars and
laptops.
• Only when a GPS receiver is installed, does a device
have location information to use.
12
13