{"title":"Exploiting safe parallelism in Wireless Sensor Networks: A generic and reconfigurable approach","authors":"J. Ueyama, D. Hughes, P. Grace, E. Madeira","doi":"10.1109/NESEA.2012.6474011","DOIUrl":"https://doi.org/10.1109/NESEA.2012.6474011","url":null,"abstract":"The deployment of complex, multi-threaded sensor network applications is growing rapidly (e.g there are dual-core sensor mote platforms such as the Microsoft m-platform). This paper argues that parallelism can benefit networked sensors, particularly if it is based on a safe approach, i.e., follows a deadlock-free paradigm. Sensor network applications should be deadlock-free because applications running on sensor networks are often critical and thus, it is undesirable to encounter concurrency problems in such environments. This paper presents an approach to ensuring safe parallelism in sensor networks and shows a number of potential benefits to this domain. This is particularly highlighted by a case study on runtime reconfigurable wireless network communication that promotes deadlock-free reconfigurable parallelism.","PeriodicalId":245642,"journal":{"name":"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127884732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile distributed processing of physiological data","authors":"James Meneghello, Kevin Lee, K. Gilleade","doi":"10.1109/NESEA.2012.6474031","DOIUrl":"https://doi.org/10.1109/NESEA.2012.6474031","url":null,"abstract":"Physiological monitoring can be useful in a number of scenarios to evaluate or diagnose the status of individuals or groups, for health or mental reasons. The devices used to collect this data have become increasingly portable, but deriving useful metrics from such data can often take significant processing - a commodity not always available in mobile environments. This paper presents and evaluates a system designed to easily process physiological signals in mobile environments by utilising commonly-available smartphone hardware to collaboratively transform collected data.","PeriodicalId":245642,"journal":{"name":"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130056306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Jamil, D. Parish, R. Phan, I. Phillips, J. Whitley, G. Oikonomou
{"title":"Maximise unsafe path routing protocol for forest fire monitoring system using Wireless Sensor Networks","authors":"A. Jamil, D. Parish, R. Phan, I. Phillips, J. Whitley, G. Oikonomou","doi":"10.1109/NESEA.2012.6474018","DOIUrl":"https://doi.org/10.1109/NESEA.2012.6474018","url":null,"abstract":"Wireless Sensor Networks are an emerging technology with wide potential to be used in many applications. One such application is the detection and prevention of disasters in scenarios such as forest fires, floods and earthquakes. In these disaster situations, the events being monitored have the potential to destroy the sensing devices, for example, they can be burnt in a fire, sunk in a flood, melted in volcano lava, short-circuited in harmful chemicals, etc. In this paper, a novel energy-efficient routing protocol called Maximise Unsafe Path (MUP) Routing using IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) is presented. The protocol aims to extend network lifetime by adapting the routes accordingly based on node destruction threat. MUP uses a routing technique that maximises the energy utilisation of nodes that are going to fail sooner, in order to save the energy of the other nodes. MUP is implemented as an extension to the RPL protocol for IPv6-based WSNs. The performance of the presented routing is evaluated with simulations and compared with the standard RPL in the same scenarios.","PeriodicalId":245642,"journal":{"name":"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127717978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Caliskanelli, J. Harbin, L. Indrusiak, P. Mitchell, D. Chesmore, F. Polack
{"title":"Runtime optimisation in WSNs for load balancing using pheromone signalling","authors":"I. Caliskanelli, J. Harbin, L. Indrusiak, P. Mitchell, D. Chesmore, F. Polack","doi":"10.1109/NESEA.2012.6474028","DOIUrl":"https://doi.org/10.1109/NESEA.2012.6474028","url":null,"abstract":"Wireless Sensor Networks (WSNs) consist of multiple, distributed nodes each with limited resources. With their strict resource constraints and application-specific characteristics, WSNs contain many challenging trade-offs. This paper proposes a bio-inspired load balancing approach, based on pheromone signalling mechanisms, to solve the trade-off between service availability and energy consumption. We explore the performance consequences of the pheromone-based load balancing approach using: 1) a system-level simulator; 2) deployment of real sensor testbeds to provide a competitive analysis of these evaluation methodologies. The effectiveness of the proposed algorithm is evaluated with different scenario parameters and the required performance evaluation techniques are investigated on case studies based on sound sensors.","PeriodicalId":245642,"journal":{"name":"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134355324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"StIgMa: Status information management for evolvable wireless sensor networks","authors":"K. Thoelen, D. Hughes, Sam Michiels, W. Joosen","doi":"10.1109/NESEA.2012.6474030","DOIUrl":"https://doi.org/10.1109/NESEA.2012.6474030","url":null,"abstract":"The application of run-time evolvable software stacks promises an increase in the lifetime of wireless sensor network deployments. Besides supporting changing application requirements, said systems allow the underlying platforms to adapt to new environments by replacing system and communication services at runtime. These dynamics across various software layers however complicate the provision of accurate information about the current software and environmental status of a sensor node. This is problematic as sensor network management requires such information to configure efficient systems. As such, a mechanism needs to be in place via which run-time deployable software services can make their status information available to others in a standardized manner. In this paper we introduce StIgMa; a design for a unified node-local status registry on a sensor node. StIgMa's interfaces are cross-cutting and provide access to status information on all software layers on a sensor node. This is achieved without duplication of status data and avoiding tight coupling of status information providers and clients. To allow multi-user and flexible operation, StIgMa is supported by an extensible namespace for status parameters and a query language. Evaluation of a proof-of-concept implementation confirms that node-local centralized management of status information can be realized in a light-weight manner.","PeriodicalId":245642,"journal":{"name":"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized TDMA based distance routing for Data Centric Storage","authors":"K. Ahmed, M. Gregory","doi":"10.1109/NESEA.2012.6474019","DOIUrl":"https://doi.org/10.1109/NESEA.2012.6474019","url":null,"abstract":"The Wireless Sensor Network (WSN) Data Centric Storage (DCS) scheme is a promising alternative to External Storage (ES) and Local Storage (LS) schemes because the ES and LS schemes may lead to high overhead and latency. The DCS scheme, however, might incur high update traffic due to the lack of an optimally synchronized routing algorithm. This paper presents a new distributed Sector Based Distance (SBD) routing algorithm that has been designed for a low power DCS implementation. In order to guarantee reliability and minimizing end-to-end latency, a simple Grid Coloring Algorithm (GCA) is used to derive the time division multiple access (TDMA) schedules. The GCA uses a slot reuse concept to achieve minimum TDMA frame length. Extensive simulations demonstrate that SBD yields significant improvement in achieving high reliability and low latency while providing optimal energy consumption.","PeriodicalId":245642,"journal":{"name":"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133202250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification of Spatio-Temporal Role Based Access Control using Timed Automata","authors":"Emsaieb Geepalla, B. Bordbar, Kozo Okano","doi":"10.1109/NESEA.2012.6474023","DOIUrl":"https://doi.org/10.1109/NESEA.2012.6474023","url":null,"abstract":"The verification of Spatio-Temporal Role Based Access Control policies (STRBAC) during the early development life cycle improves the security of the software. It helps to identify inconsistencies in the Access Control policies before proceeding to other phases where the cost of fixing defects is augmented. This paper proposes a formal method for an automatic analysis of STRBAC policies. It ensures that the policies are consistent and conflict-free. The method proposed in this paper makes the use of Timed Automata to verify the STRBAC policies. This is done by translating the STRBAC model into Timed Automata, and then the produced Timed Automata is implemented and verified using the model checker UPPAAL. This paper presents a security query expressed using TCTL to detect inconsistency caused due to the interaction between STRBAC policies. With the help of an example, this paper shows how we convert STRBAC model to Timed Automata models and verify the resulting models using the UPPAAL to identify an erroneous design.","PeriodicalId":245642,"journal":{"name":"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132084803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clipping noise mitigating iterative receivers for OFDM","authors":"N. Bibi, B. Cheetham","doi":"10.1109/NESEA.2012.6474024","DOIUrl":"https://doi.org/10.1109/NESEA.2012.6474024","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) systems are susceptible to High Power Amplifier (HPA) nonlinearities because of the high Peak to Average Power Ratios (PAPR) in the symbols that are transmitted. Clipping or otherwise limiting these high peaks causes in-band and out-of-band distortion in the signals. This study focuses on clipping noise mitigation using iterative receivers based on Bussgang Noise Cancellation (BNC) and Decision-Aided Reconstruction (DAR). A modified DAR receiver is simulated with oversampled clipping and filtering. Both receivers are compared in terms of bit-error rate (BER) and number of iterations.","PeriodicalId":245642,"journal":{"name":"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126606818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chelsea Dobbins, M. Merabti, P. Fergus, D. Llewellyn-Jones
{"title":"Augmenting human digital memories with physiological data","authors":"Chelsea Dobbins, M. Merabti, P. Fergus, D. Llewellyn-Jones","doi":"10.1109/NESEA.2012.6474032","DOIUrl":"https://doi.org/10.1109/NESEA.2012.6474032","url":null,"abstract":"The area of human digital memories focuses on documenting our entire lifetime. Using this outlet, a diverse range of information can be brought together, such as photos, location, temperature and physiological information. Nowadays, we have access to a number of different data sources, thus allowing more dynamic and data rich memories to be created. In particular, the inclusion of physiological data offers a new insight into the augmentation of memories and provides a richer level of detail. This information can be used to determine how we were feeling, at any time, and, potentially, how we made others feel as well. Memories, created over a lifetime, can be retrieved, and we can see how our bodies have changed over time. This paper presents the DigMem system, which incorporates physiological data into the creation of human digital memories. A prototype has been successfully developed, which demonstrates the approach and evaluates the applicability of the research.","PeriodicalId":245642,"journal":{"name":"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126797729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Imran, Khursheed Khursheed, Naeem Ahmad, M. O’nils, N. Lawal, Abdul Waheed Malik
{"title":"Architecture of wireless Visual Sensor Node with Region of Interest coding","authors":"Muhammad Imran, Khursheed Khursheed, Naeem Ahmad, M. O’nils, N. Lawal, Abdul Waheed Malik","doi":"10.1109/NESEA.2012.6474029","DOIUrl":"https://doi.org/10.1109/NESEA.2012.6474029","url":null,"abstract":"The challenges involved in designing a wireless Vision Sensor Node include the reduction in processing and communication energy consumption, in order to maximize its lifetime. This work presents an architecture for a wireless Vision Sensor Node, which consumes low processing and communication energy. The processing energy consumption is reduced by processing lightweight vision tasks on the VSN and by partitioning the vision tasks between the wireless Vision Sensor Node and the server. The communication energy consumption is reduced with Region Of Interest coding together with a suitable bi-level compression scheme. A number of different processing strategies are investigated to realize a wireless Vision Sensor Node with a low energy consumption. The investigation shows that the wireless Vision Sensor Node, using Region Of Interest coding and CCITT group4 compression technique, consumes 43 percent lower processing and communication energy as compared to the wireless Vision Sensor Node implemented without Region Of Interest coding. The proposed wireless Vision Sensor Node can achieve a lifetime of 5.4 years, with a sample period of 5 minutes by using 4 AA batteries.","PeriodicalId":245642,"journal":{"name":"2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116040658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}