{"title":"Poster abstract: reconstruction distortion in lossy wireless sensor networks","authors":"U. Gunay, A. Abouzeid","doi":"10.1109/WIMESH.2006.288631","DOIUrl":"https://doi.org/10.1109/WIMESH.2006.288631","url":null,"abstract":"Wireless sensor networks enable monitoring of various physical phenomena. In this paper, we consider the monitoring of a phenomenon that is continuous and correlated both in space and time. The sensor nodes periodically sample the phenomenon and transmit their measurements to a sink node using a routing tree. The sink node reconstructs the phenomenon in time and space using the samples it gathers. Because the data is spatially and temporally continuous, perfect reconstruction is only possible if there is an infinite number of sensors continuously monitoring every point in the area of interest. A perfect reconstruction also requires that all measurements produced by the nodes are delivered to the sink. All these requirements are practically impossible. Hence, in this paper, we consider the practical situation where the phenomenon is discretized spatially and temporally, and samples might be lost while they traverse the network due to a variety of reasons including wireless-induced packet losses. These factors cause distortion between the actual phenomenon and the reconstructed phenomenon. We model the physical phenomenon as a Gaussian stochastic process and derive expressions for distortion in time (temporal distortion) and space (spatial distortion) for a fixed packet loss rate.","PeriodicalId":426713,"journal":{"name":"2006 2nd IEEE Workshop on Wireless Mesh Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault-tolerant mobile sink in networked sensor systems","authors":"I. Saleh, A. Agbaria, M. Eltoweissy","doi":"10.1109/WIMESH.2006.288624","DOIUrl":"https://doi.org/10.1109/WIMESH.2006.288624","url":null,"abstract":"A networked sensor system (NSS) is typically comprised of tiny sensors with limited energy and storage capabilities deployed in an environment for monitoring and tracking purposes. Critical to the success of NSS is the reliable collection and dissemination of data while conserving sensors' limited resources, in particular energy. In this paper, we propose a novel scheme that aims to move the sink functionality (data aggregation and forwarding) closer to occurring events (areas of high traffic with higher rate of reporting) to reduce the probability of packet drop and the amount of energy expended in multi-hop communications. The scheme provides fault-tolerant data collection and dissemination through data checkpointing and recovery. Our simulation results show that our scheme is highly resilient to sensor and sink failure.","PeriodicalId":426713,"journal":{"name":"2006 2nd IEEE Workshop on Wireless Mesh Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131740738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A service-oriented query architecture for sensor-actuator networks","authors":"A. Rezgui, M. Eltoweissy","doi":"10.1109/WIMESH.2006.288608","DOIUrl":"https://doi.org/10.1109/WIMESH.2006.288608","url":null,"abstract":"Current architecture and programming paradigms are not able to support the requirements of emerging sensor- actuator applications. In this paper, we discuss those requirements and propose service-oriented sensor-actuator networks (SANETs) as a novel programming and querying paradigm that is able to cope with the requirements of future sensor-actuator systems.","PeriodicalId":426713,"journal":{"name":"2006 2nd IEEE Workshop on Wireless Mesh Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114632875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A first look at a cross-layer facilitating architecture for wireless sensor networks","authors":"C. Merlin, W. Heinzelman","doi":"10.1109/WIMESH.2006.288606","DOIUrl":"https://doi.org/10.1109/WIMESH.2006.288606","url":null,"abstract":"A plethora of cross-layer schemes exists today, and these protocols often provide ingenious ways to serve dedicated applications for wireless sensor networks. However, sensor network protocols often trade compatibility with other schemes for specialization. In this paper, we describe the beginning of an ambitious project to design a new architecture that facilitates cross-layering while proving enough flexibility to support different applications and networks. In this first look at this architecture, we suggest utilizing different services and data structures to exchange a pool of information among all layers to improve the network performance. By keeping a structure equivalent to the OSI model, we provide an accommodating common framework for protocols in the stack to access useful information about their own state and that of their neighbors.","PeriodicalId":426713,"journal":{"name":"2006 2nd IEEE Workshop on Wireless Mesh Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125962446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GP-pro: the generative programming protocol generator for routing in mobile ad hoc networks","authors":"P. E. Villanueva-Peña, T. Kunz","doi":"10.1109/WIMESH.2006.288628","DOIUrl":"https://doi.org/10.1109/WIMESH.2006.288628","url":null,"abstract":"Routing in mobile ad hoc networks (MANETs) where network topology is highly dynamic is not a trivial task. Routing protocols have been profoundly researched but only three of them have reached the RFC status (AODV[7], OLSR[5] and TBPRF[6]). On the other hand, the constantly increasing network requirements in terms of bandwidth, robustness, reliability and quality of service for a broad range of multiplatform scenarios demand for fast development and implementation of routing protocols that satisfy specific user and network requirements. However, current practices for protocol development and implementation are costly error-prone and time-consuming, especially when existing knowledge is not properly reused. Generative Programming is an attractive solution that makes use of reusable components and is also empowered with the knowledge to automatically assemble them. This paper discusses the design and development of the GP- Pro protocol generator (based on generative programming), for automatic generation of ad hoc routing protocols, according to user requirements expressed by means of a specification language. GP-Pro is designed to be extensible, with the explicit goal of generating a large number of different protocols by different component combinations. GP-Pro addresses the generation of proactive, reactive and position-based routing protocols.","PeriodicalId":426713,"journal":{"name":"2006 2nd IEEE Workshop on Wireless Mesh Networks","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127020081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Mishra, F. Gondal, A. Afrashteh, R.R. Wilson, R. D. Moffitt, R. Kapania, S. Bland
{"title":"Embedded wireless sensors for aircraft/automobile tire structural health monitoring","authors":"A. Mishra, F. Gondal, A. Afrashteh, R.R. Wilson, R. D. Moffitt, R. Kapania, S. Bland","doi":"10.1109/WIMESH.2006.288637","DOIUrl":"https://doi.org/10.1109/WIMESH.2006.288637","url":null,"abstract":"Structural Health Monitoring (SHM) of automobile tires is an active area of research. Within this area, the monitoring of strain on tires using wireless devices and networks is gaining prominence because these techniques do not require any wired connection to a base station. In this paper we discuss a wireless sensor network based strain monitoring architecture for aircraft/automobile tires present some initial results, and outline future plans.","PeriodicalId":426713,"journal":{"name":"2006 2nd IEEE Workshop on Wireless Mesh Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125318770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RTSS/CTSS: mitigation of exposed terminals in static 802.11-based mesh networks","authors":"Kimaya Mittal, Elizabeth Beld","doi":"10.1109/WIMESH.2006.288617","DOIUrl":"https://doi.org/10.1109/WIMESH.2006.288617","url":null,"abstract":"Efficient usage of available capacity in wireless mesh networks is critical. Capacity is wasted due to the exposed terminal problem. In this paper, we propose a solution to mitigate the exposed terminal problem in static IEEE 802.11-based mesh networks, thereby improving the spatial reuse of the medium and increasing network throughput. Our solution is complementary to previously-proposed solutions that adjust the carrier-sense range for improved spatial reuse. The proposed solution consists of two phases. In the first phase, exposed links in the mesh topology are detected through an offline training process. Coordination of simultaneous transmissions over exposed links is then done in the second phase through the use of request-to-send- simultaneously (RTSS) and clear-to-send-simultaneously (CTSS) messages, which are added to the MAC protocol. Our solution preserves the distributed nature of the MAC protocol and does not require time synchronization between nodes. We present a simulation-based evaluation that demonstrates that the proposed solution effectively improves capacity usage and network throughput in representative topologies and traffic scenarios.","PeriodicalId":426713,"journal":{"name":"2006 2nd IEEE Workshop on Wireless Mesh Networks","volume":"1000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference aware routing in multi-radio wireless mesh networks","authors":"A. Subramanian, M. Buddhikot, Scott C. Miller","doi":"10.1109/WIMESH.2006.288620","DOIUrl":"https://doi.org/10.1109/WIMESH.2006.288620","url":null,"abstract":"We address the problem of interference aware routing in multi-radio infrastructure mesh networks wherein each mesh node is equipped with multiple radio interfaces and a subset of nodes serve as Internet gateways. We present a new interference aware routing metric - iAWARE that aids in finding paths that are better in terms of reduced interflow and intra-flow interference. We incorporate this metric and new support for multi-radio networks in the well known AODV routing protocol to design an enhanced AODV-MR routing protocol. We study the performance of our new routing metric by implementing it in our wireless testbed consisting of 12 mesh nodes. We show that iAWARE tracks changes in interfering traffic far better than existing well known link metrics such as ETT and IRU. We also demonstrate that our AODV-MR protocol delivers increased throughput in single radio and two radio mesh networks compared to similar protocol with WCETT and MIC routing metrics. We also show that in the case of two radio mesh networks, our metric achieves good intra-path channel diversity.","PeriodicalId":426713,"journal":{"name":"2006 2nd IEEE Workshop on Wireless Mesh Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116117573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid sensor and mesh networks: paradigms for fair and energy efficient communication","authors":"G. Sharma, N. Shroff, R. Mazumdar","doi":"10.1109/WIMESH.2006.288604","DOIUrl":"https://doi.org/10.1109/WIMESH.2006.288604","url":null,"abstract":"The issues pertaining to capacity, fairness, and energy efficiency are central to all wireless networks, including wireless sensor and mesh networks. In this paper, we consider hybrid sensor and mesh networks as paradigms for fair and energy efficient communication. A hybrid network consists of sensor or mesh nodes with wireless communication capability and some infrastructure in the form of cables with wireless transceivers attached to their ends. We investigate the trade-offs that exist between the amount of infrastructure and the improvement in fairness and energy efficiency over a pure wireless network. In particular, we show that a limited amount of infrastructure is enough to significantly improve fairness as well as energy efficiency. Moreover, in many scenarios the aggregate capacity of the network can also be substantially improved with the help of a limited infrastructure.","PeriodicalId":426713,"journal":{"name":"2006 2nd IEEE Workshop on Wireless Mesh Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting wormhole attacks in wireless networks","authors":"R. Maheshwari, Jie Gao, S.R. Das","doi":"10.1109/WIMESH.2006.288607","DOIUrl":"https://doi.org/10.1109/WIMESH.2006.288607","url":null,"abstract":"We study and propose a novel algorithm for detecting Wormhole Attacks in wireless ad hoc and sensor networks. The algorithm uses only local connectivity information and utilizes disk packing argument to detect such attacks. The success of the detection algorithm depends on the density of nodes in the network. Preliminary simulation results indicate that for uniformly distributed UDG networks, wormholes can be detected with very high probabilities for average degrees as low as 8.","PeriodicalId":426713,"journal":{"name":"2006 2nd IEEE Workshop on Wireless Mesh Networks","volume":"108 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113980753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}