{"title":"Energy Efficient Transmission Scheme for Data-Gathering in Mobile Sensor Networks","authors":"Chao Wang, P. Ramanathan","doi":"10.1109/SAHCN.2006.288506","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288506","url":null,"abstract":"Mobile sensor networks are being envisioned for certain applications like habitat monitoring and environmental sensing. For instance, mobile sensor nodes are attached to selected animals to gather data about their behavior. These data are uploaded to stationary units for detailed analysis over wireless ad-hoc networks. Since the mobile sensor nodes are likely to operate on batteries, reducing energy consumption for such data gathering is an important issue. This paper proposes a transmission scheme for power-adjustable radio to optimize transmit energy efficiency subject to given overflow and delay constraints. The energy efficiency is defined as the expected transmit energy to deliver one unit of data from sensor node to stationary unit. An analytical model is developed to estimate the unit energy, data throughput and delay for a sensor node in the single-hop case. Simulation results show that the model achieves very good accuracy. The proposed transmission scheme is then adapted to the multi-hop scenario. Simulations based on radio parameters from a sensor board demonstrate that high energy efficiency can be achieved by the transmission scheme in both single-hop and multi-hop cases","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"2014 1","pages":"498-507"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86551267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Practical Approach to Landmark Deployment for Indoor Localization","authors":"Yingying Chen, J. Francisco, W. Trappe, R. Martin","doi":"10.1109/SAHCN.2006.288441","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288441","url":null,"abstract":"We investigate the impact of landmark placement on localization performance using a combination of analytic and experimental analysis. For our analysis, we have derived an upper bound for the localization error of the linear least squares algorithm. This bound reflects the placement of landmarks as well as measurement errors at the landmarks. We next develop a novel algorithm, maxL minE, that using our analysis, finds a pattern for landmark placement that minimizes the maximum localization error. To show our results are applicable to a variety of localization algorithms, we then conducted a series of localization experiments using both an 802.11 (WiFi) network as well as an 802.15.4 (ZigBee) network in a real building environment. We use both received signal strength (RSS) and time-of-arrival (ToA) as ranging modalities. Our experimental results show that our landmark placement algorithm is generic because the resulting placements improve localization performance across a diverse set of algorithms, networks, and ranging modalities","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"1 1","pages":"365-373"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79173633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Data Compression in Wireless Sensor Networks for Civil Infrastructure Health Monitoring","authors":"Shengpu Liu, Liang Cheng","doi":"10.1109/SAHCN.2006.288567","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288567","url":null,"abstract":"In this paper, we present an efficient sensor data compression process for civil infrastructure health monitoring applications. It integrates lifting scheme wavelet transform (LSWT) and distributed source coding (DSC), which can reduce the raw data size by 1:27 to 1:80 while having a minor effect on the modal parameters identified from the sensor data. We have compared our algorithms with other data compression algorithms for structural health monitoring. Results show that our algorithms can achieve 80% ~ 100% higher compression ratios with the same signal-restoration quality","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"1 1","pages":"823-829"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79547890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robot-Assisted Localization Techniques for Wireless Image Sensor Networks","authors":"Huang Lee, Hattie Dong, H. Aghajan","doi":"10.1109/SAHCN.2006.288443","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288443","url":null,"abstract":"We present a vision-based solution to the problem of topology discovery and localization of wireless sensor networks. In the proposed model, a robot controlled by the network is introduced to assist with localization of a network of image sensors, which are assumed to have image planes parallel to the agent's motion plane. The localization algorithm for the scenario where the moving agent has knowledge of its global coordinates is first studied. This baseline scenario is then used to build more complex localization algorithms in which the robot has no knowledge of its global positions. Two cases where the sensors have overlapping and non-overlapping fields of view (FOVs) are investigated. In order to implement the discovery algorithms for these two different cases, a forest structure is introduced to represent the topology of the network. We consider the collection of sensors with overlapping FOVs as a tree in the forest. The robot searches for nodes in each tree through boundary patrolling, while it searches for other trees by a radial pattern motion. Numerical analyses are provided to verify the proposed algorithms. Finally, experiment results show that the sensor coordinates estimated by the proposed algorithms accurately reflect the results found by manual methods","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"1 1","pages":"383-392"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88343229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Realistic Power Consumption Model for Wireless Sensor Network Devices","authors":"Qin Wang, Mark Hempstead, Woodward Yang","doi":"10.1109/SAHCN.2006.288433","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288433","url":null,"abstract":"A realistic power consumption model of wireless communication subsystems typically used in many sensor network node devices is presented. Simple power consumption models for major components are individually identified, and the effective transmission range of a sensor node is modeled by the output power of the transmitting power amplifier, sensitivity of the receiving low noise amplifier, and RF environment. Using this basic model, conditions for minimum sensor network power consumption are derived for communication of sensor data from a source device to a destination node. Power consumption model parameters are extracted for two types of wireless sensor nodes that are widely used and commercially available. For typical hardware configurations and RF environments, it is shown that whenever single hop routing is possible it is almost always more power efficient than multi-hop routing. Further consideration of communication protocol overhead also shows that single hop routing will be more power efficient compared to multi-hop routing under realistic circumstances. This power consumption model can be used to guide design choices at many different layers of the design space including, topology design, node placement, energy efficient routing schemes, power management and the hardware design of future wireless sensor network devices","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"8 1","pages":"286-295"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87673998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Statistical Model for the Evaluation of the Distribution of the Received Power in Ad Hoc and Wireless Sensor Networks","authors":"Enrica Salbaroli, A. Zanella","doi":"10.1109/SAHCN.2006.288557","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288557","url":null,"abstract":"In this paper we consider a scenario composed by nodes which are uniformly and randomly distributed in a given area and derive the distribution of the power received by a given terminal. The model, which takes a propagation environment characterized by distance-dependent loss and log-normally distributed shadowing into account, can be used to evaluate the distribution of the received power in wireless ad hoc and sensor networks. In particular, the model is suited to investigate the distribution of the received useful and the interference power in a scenario where all the terminals can communicate with each other using the same radio resource","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"28 1","pages":"756-760"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91014326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering Ad Hoc Networks: Schemes and Classifications","authors":"D. Wei, A. Chan","doi":"10.1109/SAHCN.2006.288583","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288583","url":null,"abstract":"Many clustering schemes have been proposed for different ad hoc networks and play an important role in self organizing them. A systematic classification of these clustering schemes enables one to better understand and make improvements. This paper surveys clustering schemes and classifies them into ad hoc sensor network clustering schemes and mobile ad hoc network clustering schemes. In sensor networks, the energy stored in the network nodes is limited and usually infeasible to recharge; the clustering schemes for these networks therefore aim at maximizing the energy efficiency. In mobile ad hoc networks, the movement of the network nodes may quickly change the topology resulting in the increase of the overhead message in topology maintenance; the clustering schemes for mobile ad hoc networks therefore aim at handling topology maintenance, managing node movement or reducing overhead","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"37 1","pages":"920-926"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73750393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing the Computational Cost of Bayesian Indoor Positioning Systems","authors":"Konstantinos Kleisouris, R. Martin","doi":"10.1109/SAHCN.2006.288512","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288512","url":null,"abstract":"In this work we show how to reduce the computational cost of using Bayesian networks for localization. We investigate a range of Monte Carlo sampling strategies, including Gibbs and Metropolis. We found that for our Gibbs samplers, most of the time is spent in slice sampling. Moreover, our results show that although uniform sampling over the entire domain suffers occasional rejections, it has a much lower overall computational cost than approaches that carefully avoid rejections. The key reason for this efficiency is the flatness of the full conditionals in our localization networks. Our sampling technique is also attractive because it does not require extensive tuning to achieve good performance, unlike the Metropolis samplers. We demonstrate that our whole domain sampling technique converges accurately with low latency. On commodity hardware our sampler localizes up to 10 points in less than half a second, which is over 10 times faster than a common general-purpose Bayesian sampler. Our sampler also scales well, localizing 51 objects with no location information in the training set in less than 6 seconds. Finally, we present an analytic model that describes the number of evaluations per variable using slice sampling. The model allows us to analytically determine how flat a distribution should be so that whole domain sampling is computationally more efficient when compared to other methods","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"91 1","pages":"555-564"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73651512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Worst-Case Coverage of Directional Field-of-View Sensor Networks","authors":"Jacob Adriaens, S. Megerian, M. Potkonjak","doi":"10.1109/SAHCN.2006.288438","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288438","url":null,"abstract":"Sensor coverage is a fundamental sensor networking design and use issue that in general tries to answer the questions about the quality of sensing (surveillance) that a particular sensor network provides. Although isotropic sensor models and coverage formulations have been studied and analyzed in great depth recently, the obtained results do not easily extend to, and address the coverage of directional and field-of-view sensors such as imagers and video cameras. In this paper, we present an optimal polynomial time algorithm for computing the worst-case breach coverage in sensor networks that are comprised of directional \"field-of-view\" (FOV) sensors. Given a region covered by video cameras, a direct application of the presented algorithm is to compute \"breach\", which is defined as the maximal distance that any hostile target can maintain from the sensors while traversing through the region. Breach translates to \"worst-case coverage\" by assuming that in general, targets are more likely to be detected and observed when they are closer to the sensors (while in the field of view). The approach is amenable to the inclusion of any sensor detection model that is either independent of, or inversely proportional to distance from the targets. Although for the sake of discussion we mainly focus on square fields and model the sensor FOV as an isosceles triangle, we also discuss how the algorithm can trivially be extended to deal with arbitrary polygonal field boundaries and sensor FOVs, even in the presence of rigid obstacles. We also present several simulation-based studies of the scaling issues in such coverage problems and analyze the statistical properties of breach and its sensitivity to node density, locations, and orientations. A simple grid-based approximation approach is also analyzed for comparison and validation of the implementation","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"3 1","pages":"336-345"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74976411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Services in Wireless Sensor Networks Using Sparse Random Coding","authors":"F. Delgosha, Erman Ayday, K. Chan, F. Fekri","doi":"10.1109/SAHCN.2006.288407","DOIUrl":"https://doi.org/10.1109/SAHCN.2006.288407","url":null,"abstract":"The task of providing security services for wireless sensor networks is not trivial due to the resource constraints of the sensor nodes. An adversary may launch a wide range of attacks including eavesdropping, message forgery, packet dropping, and noise injection. In this paper, we propose random coding security (RCS) that provides protection against all the aforementioned attacks. For this purpose, the proposed protocol makes extensive use of node collaboration and data redundancy. Moreover, using location information, we both localize adversarial activities to the area under attack and enhance routing the data toward the sink. The objectives of using the novel idea of sparse random coding in RCS are twofold. First, every node generates correlated data by calculating random linear combinations of the received packets. Hence, the availability of the data at the receiver is guaranteed with a high probability. The second advantage is the feasibility of implementing the RCS in the real case scenario in which the communication media between the sensors is usually modeled as the erasure channel. The existing protocols cannot be trivially modified to suit this realistic situation. In the overall, RCS provides many security services with computation and communication overheads comparable with other schemes","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"57 1","pages":"40-49"},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77037085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}