Wireless Sensor NetworksOverviewSensor ApplicationsSensor (vs. Ad-Hoc)Sensor Network ArchitectureData DisseminationDirected DiffusionGeographic Hash tableData GatheringMAC Protocols for Sensor NetworksLocation DiscoveryGlobal Positioning System (GPS)Quality of a Sensor NetworkSensor StandardsTime SynchronizationTransport Layer IssuesSensor Network SecurityReal-Time CommunicationSummaryReading AssignmentHomework17-1©2006 Raj JainCSE574sWashington University in St. LouisWireless Sensor Wireless Sensor NetworksNetworksRaj Jain Washington University in Saint LouisSaint Louis, MO [email protected] slides are available on-line at:http://www.cse.wustl.edu/~jain/cse574-06/17-2©2006 Raj JainCSE574sWashington University in St. LouisOverviewOverviewSensor ApplicationsSensor Network ArchitectureData DisseminationMAC Protocols for Sensor NetworksLocation DiscoveryQuality of a Sensor NetworkTime SynchronizationTransport Layer IssuesSensor Network SecurityReal-Time Communication17-3©2006 Raj JainCSE574sWashington University in St. LouisSensor ApplicationsSensor ApplicationsBattlefield Surveillance Chemical, Biological WeaponsHabitat exploration of animalsPatient heart rate, blood pressureCrops and AgricultureForest Fires and Flood Detection17-4©2006 Raj JainCSE574sWashington University in St. LouisSensor (vs. Ad-Hoc)Sensor (vs. Ad-Hoc)Large scaleBatteries may not be replaceableMay not have global identifiersQueries may be data centric rather than address centric:Who's temperature is more than 95 degree vs. What is your temperature? Geographical routing, Data fusion, Data aggregation17-5©2006 Raj JainCSE574sWashington University in St. LouisSensor Network ArchitectureSensor Network Architecture1. Layered: Base station, one-hop layer, 2-hop layer, ...2. Clustered: Nodes elect and communicate through cluster heads17-6©2006 Raj JainCSE574sWashington University in St. LouisData DisseminationData DisseminationSources, Sinks , and Eve nt sData Gathering: Sources send periodically to central collection points (base station) Data Diffusion: Sinks propagate their interests (type of data or event) Nodes cache interests and report events when detectedFlooding: Implosion (duplicate messages), overlap (multiple sources), blind (no consideration of energy or resources)Gossiping: Randomly select a neighborSinksSources17-7©2006 Raj JainCSE574sWashington University in St. LouisDirected DiffusionDirected DiffusionSensor nodes generate queries. Flooded to entire network.Intermediate node cache the queries and the previous neighbor A gradient (= rate) is applied at each hop to the queryData is propagated along the reverse path proportional to the gradientSink can reinforce a path by requesting higher rates along that pathACDFEBEventSinkACDFEBEventSinkSourceACDFEBSinkSourceACDFEBSinkSource17-8©2006 Raj JainCSE574sWashington University in St. LouisGeographic Hash tableGeographic Hash tableQuery (key) is hashed in a (x,y) coordinate and is sent to a node nearest to that coordinate Home Location (k)The data is hashed and sent to its home location from where it is propagated to the sinks Uniform Storage loadRedundancy can be used for home locationSinkSourceHomeLocation17-9©2006 Raj JainCSE574sWashington University in St. LouisData GatheringData GatheringGathering From all sensor nodes to the BSMinimize delay × energyPEGASIS: Power-Efficient Gathering for Sensor Information SystemsEach nodes combines its data in the message and sends to its nearest neighbor not visited beforeStarting from the farthest nodeEnding at the leader which passes it to the baseA Token is passed backwards from the leader17-10©2006 Raj JainCSE574sWashington University in St. LouisMAC Protocols for Sensor NetworksMAC Protocols for Sensor NetworksThree types:1. Fixed Allocation: Predetermined assignment2. Demand Based: Based on need3. Contention based: No delay guaranteeSelf-Organizing MAC for Sensors (SMACS):Capacity >> Data rateNeighbors synchronize and agree on times for transmissionOnly neighbors synchronize Synch energy savedSleep when not transmitting Further energy savingsTDMA, FDMA, TDMA/FDMA, CSMA are also possibleBluetooth, 802.11, and ZigBee are MACs used in practice17-11©2006 Raj JainCSE574sWashington University in St. LouisLocation DiscoveryLocation DiscoveryLocation Stamp on dataIndoor Localization: Reference nodes in each locationAtomic Multi-Lateration: Need 3 referencesIterative Multi-Lateration: Nodes with known location become references for othersCollaborative Multi-Lateration: Use quadratic equations17-12©2006 Raj JainCSE574sWashington University in St. LouisGlobal Positioning System (GPS)Global Positioning System (GPS)US Department of Defense $12BMan made stars24 Satellites and their ground stationsTriangulationMeasures travel time of radio signal DistanceSatellites broadcast current time and their location using a Direct Sequence Code1023 chips per bit3 satellites give (x, y, z)4 satellites give (x, y, z, t)Correct for any delays experienced through the atmospherehttp://www.edu-observatory.org/gps/tutorials.html17-13©2006 Raj JainCSE574sWashington University in St. LouisQuality of a Sensor NetworkQuality of a Sensor NetworkQuality = Coverage + ExposureExposure: Ability to observe a target.Ability decreases with the distance from the targetCoverage: How well is the region covered with sensorsFind the least covered path that could be followed by enemyVoronoi Diagram: Cost = Distance from nearest sensorFind the maximum cost path. Opposite Problem: Find the best covered path17-14©2006 Raj JainCSE574sWashington University in St. LouisSensor StandardsSensor Standards802.11, Bluetooth, ZigBeeIEEE 1451: Smart Transducer Interface for Sensors and ActuatorsSeven parts 1451.0 through 1451.6 dealing with different issues1451.5 is wireless interface - specifies 802.11, bluetooth and ZigBee17-15©2006 Raj JainCSE574sWashington University in St. LouisTime SynchronizationTime SynchronizationGPS not accessible inside buildings, under water.Send a time stamp to neighborOne-way Delay = Send Time (Preparing the message) + Access Time (media access) + propagation time + receive time (processing at receiver)Best to timestamp the message at the PHY layer of the receiverPost Facto
View Full Document