(contact author) Wireless Sensor Networking Support to Military Operations on Urban Terrain
无线传感器网络测距技术外文翻译文献
无线传感器网络测距技术外文翻译文献(文档含中英文对照即英文原文和中文翻译)原文:RANGING TECHNIQUES FOR WIRELESS SENSOR NETWORKSThe RF location sensors operating in different environments can measure the RSS, AOA, phase of arrival (POA), TOA, and signature of the delay - power profile as location metrics to estimate the ranging distance [4,7] . The deployment environment (i.e., wireless RF channel) will constrain the accuracy and the performance of each technique. In outdoor open areas, these ranging techniques perform very well. However, as the wireless medium becomes more complex, for example, dense urban or indoor environments, the channel suffers from severe multipath propagation and heavy shadow fading conditions. This finding in turn impacts the accuracy and performance in estimating the range between a pair of nodes. For this reason, this chapter will focus its ranging and localization discussion on indoor environments. This is important because many of the WSN applications are envisioned for deployment in rough terrain and cluttered environments and understanding of the impact of the channel on the performance of ranging and localization is important. In addition, range measurements using POA and AOA in indoor and urban areas are unreliable. Therefore, we will focus our discussion on two practical techniques,TOA and RSS.These two ranging techniques, which have been used traditionally in wirelessnetworks, have a great potential for use in WSN localization.The TOA based ranging is suitable for accurate indoor localization because it only needs a few references and no prior training. By using this technique, however, the hardware is complex and the accuracy is sensitive to the multipath condition and the system bandwidth. This technique has been implemented in GPS, PinPoint, WearNet, IEEE 802.15.3, and IEEE 802.15.4 systems. The RSS based ranging, on the other hand, is simple to implement and is insensitive to the multipath condition and the bandwidth of the system. In addition, it does not need any synchronization and can work with any existing wireless system that can measure the RSS. For accurate ranging, however, a high density of anchors or reference points is needed and extensive training and computationally expensive algorithms are required.The RSS ranging has been used for WiFi positioning in systems, for example, Ekahau, Newbury Networks, PanGo, and Skyhook.This section first introduces TOA based ranging and the limitations imposed by the wireless channel. Then it will be compared with the RSS counterpart focusing on the performance as a function of the channel behavior. What is introduced here is important to the understanding of the underlying issues in distance estimation, which is an important fundamental building block in WSN localization.TOA Based RangingIn TOA based ranging, a sensor node measures the distance to another node by estimating the signal propagation delay in free space, where radio signals travel at the constant speed of light. Figure 8.3 shows an example of TOA based ranging between two sensors. The performance of TOA based ranging depends on the availability of the direct path (DP) signal [4,14] . In its presence, for example, short distance line - of - sight (LOS) conditions, accurate estimates are feasible [14] . The challenge, however, is ranging in non - LOS (NLOS) conditions, which can be characterized as site - specific and dense multipath environments [14,22] . These environments introduce several challenges. The first corrupts the TOA estimatesdue to the multipath components (MPCs), which are delayed and attenuated replicas of the original signal, arriving and combining at the receiver shifting the estimate. The second is the propagation delay caused by the signal traveling through obstacles, which adds a positive bias to the TOA estimates. The third is the absence of the DP due to blockage, also known as undetected direct path (UDP) [14] . The bias imposed by this type of error is usually much larger than the first two and has a significant probability of occurrence due to cabinets, elevator shafts, or doors that are usually cluttering the indoor environment.In order to analyze the behavior of the TOA based ranging, it is best to resort to a popular model used to describe the wireless channel. In a typical indoor environment, the transmitted signal will be scattered and the receiver node will receive replicas of the original signal with different amplitudes, phases, and delays. At the receiver, the signals from all these paths combine and this phenomenon is known as multipath. In order to understand the impact of the channel on the TOA accuracy, we resort to a model typically used to characterize multipath arrivals. For multipath channels, the impulse respons 错误!未找到引用源。
Wireless Sensor Networks based on Compressed Sensing
School of Automation Engineering University of Electronic Science and Technology of China Chengdu, China zhuangxyan@
Abstract-The data collected through high densely distributed wireless sensor networks is immense. The asymmetry between the data acquisition and information processing makes a great challenge to the restriction of energy and computation consumption of the sensor nodes, and it limits the application of wireless sensor networks. However, the recent works show that compressed sensing can break through this limitation of asymmetry. Compressed sensing is an emerging theory that is based on the fact that a signal can be recovered through a relatively small number of random projections which contain most of its salient information. In this paper, we introduce the background of compressive sensing, and then applications of compressed sensing in wireless sensor networks are presented. Keywords-wireless sensor networks; data compression; compressed sensing; sparsity
无线红外传感器网络中英文对照外文翻译文献
中英文资料外文翻译文献外文资料AbstractWireless Sensor Network (WSN) has become a hot research topic recently. Great benefit can be gained through the deployment of the WSN over a wide range ofapplications, covering the domains of commercial, military as well as residential. In this project, we design a counting system which tracks people who pass through a detecting zone as well as the corresponding moving directions. Such a system can be deployed in traffic control, resource management, and human flow control. Our design is based on our self-made cost-effective Infrared Sensing Module board which co-operates with a WSN. The design of our system includes Infrared Sensing Module design, sensor clustering, node communication, system architecture and deployment. We conduct a series of experiments to evaluate the system performance which demonstrates the efficiency of our Moving Object Counting system.Keywords:Infrared radiation,Wireless Sensor Node1.1 Introduction to InfraredInfrared radiation is a part of the electromagnetic radiation with a wavelength lying between visible light and radio waves. Infrared have be widely used nowadaysincluding data communications, night vision, object tracking and so on. People commonly use infrared in data communication, since it is easily generated and only suffers little from electromagnetic interference. Take the TV remote control as an example, which can be found in everyone's home. The infrared remote control systems use infrared light-emitting diodes (LEDs) to send out an IR (infrared) signal when the button is pushed. A different pattern of pulses indicates the corresponding button being pushed. To allow the control of multiple appliances such as a TV, VCR, and cable box, without interference, systems generally have a preamble and an address to synchronize the receiver and identify the source and location of the infrared signal. To encode the data, systems generally vary the width of the pulses (pulse-width modulation) or the width of the spaces between the pulses (pulse space modulation). Another popular system, bi-phase encoding, uses signal transitions to convey information. Each pulse is actually a burst of IR at the carrier frequency.A 'high' means a burst of IR energy at the carrier frequency and a 'low'represents an absence of IR energy. There is no encoding standard. However, while a great many home entertainment devices use their own proprietary encoding schemes, some quasi-standards do exist. These include RC-5, RC-6, and REC-80. In addition, many manufacturers, such as NEC, have also established their own standards.Wireless Sensor Network (WSN) has become a hot research topic recently. Great benefit can be gained through the deployment of the WSN over a wide range ofapplications, covering the domains of commercial, military as well as residential. In this project, we design a counting system which tracks people who pass through a detecting zone as well as the corresponding moving directions. Such a system can be deployed in traffic control, resource management, and human flow control. Our design is based on our self-made cost-effective Infrared Sensing Module board which co-operates with a WSN. The design of our system includes Infrared Sensing Module design, sensor clustering, node communication, system architecture and deployment. We conduct a series of experiments to evaluate the system performance which demonstrates the efficiency of our Moving Object Counting system.1.2 Wireless sensor networkWireless sensor network (WSN) is a wireless network which consists of a vast number of autonomous sensor nodes using sensors tomonitor physical or environmental conditions, such as temperature, acoustics, vibration, pressure, motion or pollutants, at different locations. Each node in a sensor network is typically equipped with a wireless communications device, a small microcontroller, one or more sensors, and an energy source, usually a battery. The size of a single sensor node can be as large as a shoebox and can be as small as the size of a grain of dust, depending on different applications. The cost of sensor nodes is similarly variable, ranging from hundreds of dollars to a few cents, depending on the size of the sensor network and the complexity requirement of the individual sensor nodes. The size and cost are constrained by sensor nodes, therefore, have result in corresponding limitations on available inputs such as energy, memory, computational speed and bandwidth. The development of wireless sensor networks (WSN) was originally motivated by military applications such as battlefield surveillance. Due to the advancement in micro-electronic mechanical system technology (MEMS), embedded microprocessors, and wireless networking, the WSN can be benefited in many civilian application areas, including habitat monitoring, healthcare applications, and home automation.1.3 Types of Wireless Sensor NetworksWireless sensor network nodes are typically less complex than general-purpose operating systems both because of the specialrequirements of sensor network applications and the resource constraints in sensor network hardware platforms. The operating system does not need to include support for user interfaces. Furthermore, the resource constraints in terms of memory and memory mapping hardware support make mechanisms such as virtual memory either unnecessary or impossible to implement. TinyOS [TinyOS] is possibly the first operating system specifically designed for wireless sensor networks. Unlike most other operating systems, TinyOS is based on an event-driven programming model instead of multithreading. TinyOS programs are composed into event handlers and tasks with run to completion-semantics. When an external event occurs, such as an incoming data packet or a sensor reading, TinyOS calls the appropriate event handler to handle the event. The TinyOS system and programs are both written in a special programming language called nesC [nesC] which is an extension to the C programming language. NesC is designed to detect race conditions between tasks and event handlers. There are also operating systems that allow programming in C. Examples of such operating systems include Contiki [Contiki], and MANTIS. Contiki is designed to support loading modules over the network and supports run-time loading of standard ELF files. The Contiki kernel is event-driven, like TinyOS, but the system supports multithreading on a per-application basis. Unlike the event-driven Contiki kernel, the MANTIS kernel is based on preemptivemultithreading. With preemptive multithreading, applications do not need to explicitly yield the microprocessor to other processes.1.4 Introduction to Wireless Sensor NodeA sensor node, also known as a mote, is a node in a wireless sensor network that is capable of performing processing, gathering sensory information and communicating with other connected nodes in the network. Sensor node should be in small size, consuming extremely low energy, autonomous and operate unattended, and adaptive to the environment. As wireless sensor nodes are micro-electronic sensor device, they can only be equipped with a limited power source. The main components of a sensor node include sensors, microcontroller, transceiver, and power source. Sensors are hardware devices that can produce measurable response to a change in a physical condition such as light density and sound density. The continuous analog signal collected by the sensors is digitized by Analog-to-Digital converter. The digitized signal is then passed to controllers for further processing. Most of the theoretical work on WSNs considers Passive and Omni directional sensors. Passive and Omni directional sensors sense the data without actually manipulating the environment with active probing, while no notion of “direction” involved in these measurements. Commonly people deploy sensor for detecting heat (e.g. thermal sensor), light (e.g. infrared sensor), ultra sound (e.g. ultrasonic sensor), or electromagnetism (e.g. magneticsensor). In practice, a sensor node can equip with more than one sensor. Microcontroller performs tasks, processes data and controls the operations of other components in the sensor node. The sensor node is responsible for the signal processing upon the detection of the physical events as needed or on demand. It handles the interruption from the transceiver. In addition, it deals with the internal behavior, such as application-specific computation.The function of both transmitter and receiver are combined into a single device know as transceivers that are used in sensor nodes. Transceivers allow a sensor node to exchange information between the neighboring sensors and the sink node (a central receiver). The operational states of a transceiver are Transmit, Receive, Idle and Sleep. Power is stored either in the batteries or the capacitors. Batteries are the main source of power supply for the sensor nodes. Two types of batteries used are chargeable and non-rechargeable. They are also classified according to electrochemical material used for electrode such as NiCd(nickel-cadmium), NiZn(nickel-zinc), Nimh(nickel metal hydride), and Lithium-Ion. Current sensors are developed which are able to renew their energy from solar to vibration energy. Two major power saving policies used areDynamic Power Management (DPM) and Dynamic V oltage Scaling (DVS). DPM takes care of shutting down parts of sensor node which arenot currently used or active. DVS scheme varies the power levels depending on the non-deterministic workload. By varying the voltage along with the frequency, it is possible to obtain quadratic reduction in power consumption.1.5 ChallengesThe major challenges in the design and implementation of the wireless sensor network are mainly the energy limitation, hardware limitation and the area of coverage. Energy is the scarcest resource of WSN nodes, and it determines the lifetime of WSNs. WSNs are meant to be deployed in large numbers in various environments, including remote and hostile regions, with ad-hoc communications as key. For this reason, algorithms and protocols need to be lifetime maximization, robustness and fault tolerance and self-configuration. The challenge in hardware is to produce low cost and tiny sensor nodes. With respect to these objectives, current sensor nodes usually have limited computational capability and memory space. Consequently, the application software and algorithms in WSN should be well-optimized and condensed. In order to maximize the coverage area with a high stability and robustness of each signal node, multi-hop communication with low power consumption is preferred. Furthermore, to deal with the large network size, the designed protocol for a large scale WSN must be distributed.1.6 Research IssuesResearchers are interested in various areas of wireless sensor network, which include the design, implementation, and operation. These include hardware, software and middleware, which means primitives between the software and the hardware. As the WSNs are generally deployed in the resources-constrained environments with battery operated node, the researchers are mainly focus on the issues of energy optimization, coverage areas improvement, errors reduction, sensor network application, data security, sensor node mobility, and data packet routing algorithm among the sensors. In literature, a large group of researchers devoted a great amount of effort in the WSN. They focused in various areas, including physical property, sensor training, security through intelligent node cooperation, medium access, sensor coverage with random and deterministic placement, object locating and tracking, sensor location determination, addressing, energy efficient broadcasting and active scheduling, energy conserved routing, connectivity, data dissemination and gathering, sensor centric quality of routing, topology control and maintenance, etc.中文译文移动目标点数与红外传感器网络摘要无线传感器网络(WSN)已成为最近的一个研究热点。
Wireless sensor network
The Greenhouse Environment Monitoring System Based on Wireless Sensor Network TechnologyΙ..INTRODUCTIONПZIGBEE TECHNOLOGYWireless sensor network(WSN) integrates the sensor network techonology, information processing technology and network communication technology with the feature of small size, low cost and easy maintenance, which has a wide application in the area of environment data collection,security monitoring and target tracking.无线传感器网络(WSN)集成了传感器网络的技术,信息处理技术和网络通信技术,具有体积小,成本低,维护方便的特点,在环境数据采集,安全监控和跟踪目标领域具有广泛的应用。
It comprises a great many wireless sensor nodes deployed in the monitoring region, and through wireless communication a multi-hop self-organizing network system is formed.它包括许多部署在监测区域的无线传感器节点,并且通过无线通信一个多跳的自组织网络系统形成了。
Its role is to coordinate the perception , acquisition and process of the information of its perceptual objects within the area covered by the network, and returned data to the observer.At present, large amount of widely-distributed electronic detection devices and implementing facilities are greatly used in greenhouse production , resulting in intertwining cables(相互交织的电缆)in the greenhouse production .目前,大量分布广泛的电子检测设备和执行设备被广泛地运用在温室生产中,导致了温室生产中存在相互交织的电缆。
Wireless Sensor Networks
Wireless Sensor Networks Wireless Sensor Networks (WSNs) have become an essential part of modern technology, with applications ranging from environmental monitoring to industrial automation. These networks consist of a large number of sensor nodes that are wirelessly connected to gather and transmit data. However, WSNs face several challenges and issues that need to be addressed to ensure their efficient and reliable operation. One of the primary problems with WSNs is the limited power supply of sensor nodes. Most sensor nodes are powered by batteries, which have a finite lifespan and need to be replaced or recharged periodically. This limitation poses a significant challenge for WSNs, especially in applications where the sensor nodes are deployed in remote or inaccessible locations. The need for frequent maintenance and replacement of batteries can increase the overall cost and complexity of WSNs, making them less practical for long-term deployments. Another issue that WSNs face is the limited processing and storage capabilities of individual sensor nodes. Due to their small size and low power consumption requirements, sensor nodes typically have limited processing power and memory. This limitation can affect the ability of WSNs to perform complex data processing and analysis tasks, especially in applications that require real-time or near-real-time decision-making. Additionally, the limited storage capacity of sensor nodes can restrict the amount of data that can be collected and stored locally, requiring frequent data transmission and storage in a central location. Furthermore, WSNs are susceptible to various security and privacy threats, which can compromise the integrity and confidentiality of the data collected and transmitted by the sensor nodes. Since WSNs are often deployed in open and uncontrolled environments, they are vulnerable to physical attacks, tampering, and eavesdropping. Moreover, the wireless nature of communication in WSNs makes them susceptible to interception and unauthorized access by malicious entities. Ensuring the security and privacy of data in WSNs is crucial, especially in applications where sensitive or critical information is being collected and transmitted. In addition to these technical challenges, the design and deployment of WSNs also need to consider the environmental impact and sustainability of the network. The disposal of batteries and electronic components from sensor nodes cancontribute to electronic waste, posing environmental hazards if not managed properly. Moreover, the energy consumption of WSNs, especially in large-scale deployments, can have a significant carbon footprint. Addressing these environmental concerns is essential to ensure the long-term viability and acceptance of WSNs as a sustainable technology. Despite these challenges, there are ongoing efforts and research initiatives aimed at addressing the issues faced by WSNs. For instance, advancements in energy harvesting technologies, such assolar panels and kinetic energy harvesters, can help extend the lifespan of sensor nodes and reduce the reliance on battery replacements. Similarly, the development of low-power and energy-efficient communication protocols and algorithms can help minimize the energy consumption of WSNs, prolonging their operational lifetime and reducing their environmental impact. Furthermore, the integration of advanced security mechanisms, such as encryption, authentication, and intrusion detection systems, can enhance the resilience of WSNs against security threats. Additionally, the use of secure and reliable communication protocols, along with physicalsecurity measures, can help mitigate the risks associated with unauthorized access and tampering. By addressing these technical and security challenges, WSNs can be made more robust and trustworthy for a wide range of applications. In conclusion, while WSNs face several challenges and issues, there are ongoing efforts to address these concerns and improve the efficiency, reliability, and security of these networks. By leveraging advancements in energy harvesting, communication protocols, and security mechanisms, WSNs can overcome their limitations and become a sustainable and dependable technology for various applications. It is essential to continue investing in research and development to ensure the long-termviability and success of WSNs in the rapidly evolving landscape of wireless communication and sensing technologies.。
无线传感器网络管理技术
第38卷 第1期2011年1月计算机科学Computer Science Vo l .38No .1Jan 2011到稿日期:2010-03-03 返修日期:2010-06-17 本文受国家自然科学基金(60873241),国家重大专项(2009ZX03006-001-01),北京市自然科学基金(4092011)和中国科学院专项(KGC X2-YW -149)资助。
赵忠华(1983-),男,博士生,CCF 会员,主要研究方向为无线传感器网络管理,E -mail :zhaozhongh ua @is .iscas .ac .cn ;皇甫伟(1975-),男,博士,助理研究员,主要研究方向为无线网络、自组织网络和无线传感器网络;孙利民(1966-),男,博士,研究员,主要研究方向为无线传感器网络和多媒体通信技术。
无线传感器网络管理技术赵忠华1,2,3 皇甫伟1 孙利民1 杜腾飞4(中国科学院软件研究所 北京100190)1(信息安全国家重点实验室 北京100049)2(中国科学院研究生院 北京100049)3 (北京大学软件与微电子学院 北京100871)4摘 要 无线传感器网络是一个资源受限、应用相关的任务型网络,与现有的计算机网络有显著差异。
现有的网络管理不再适用于无线传感器网络,面临着诸多新的挑战。
首先简要介绍了无线传感器网络管理的技术背景,并结合无线传感器网络自身的特点,给出了相应的无线传感器网络的管理技术应具备的特征等。
然后提出了一个通用的无线传感器网络管理框架,并对其中的各管理内容及研究进展进行了详细论述。
最后探讨了无线传感器网络管理领域面临的公开难题,并针对目前发展现状提出了今后的研究方向。
关键词 无线传感器网络,网络管理,管理技术中图法分类号 T P311 文献标识码 A Wireless Sensor Network Management TechnologyZ H AO Zhong -hua 1,2,3 H U A NG F U W ei 1 SU N Li -min 1 D U T eng -fei 4(In stitu te of S oftw are ,Chinese Academy of Sciences ,Beijing 100190,C hina )1(State Key Lab oratory of In formation S ecurity ,Institute of Softw are ,C AS ,Beijing 100049,China )2(Graduate Univers ity of Chines e Academy of Sciences ,Beijing 100049,C hina )3(Sch ool of S oftw are and M icroelectronics ,Beijing University ,Beijin g 100871,Chin a )4A bstract Wireless sensor netw o rks a re resource -constrained and applicatio n -r elated .Wireless senso r netwo rks are dif -fe rent f rom o ther t raditio nal com puter netwo rks ,so the traditio nal netw or k management is no longer applied to wireless sensor netw o rks and w ireless se nso r ne tw o rk manag ement is faced with many challenges .T his pape r briefly described the techno log y backg round of the wireless sensor netwo rk ma nag ement ;g ave the cor responding manag ement characteri -stics in w ireless sensor ne tw o rks w ith the cha racteristics o f wirele ss senso r ne two rk itself ;then put for war d a commo n framew ork o f wirele ss senso r netwo rk manag ement and discussed the contents of the various ma nag eme nt and re sear ch prog ress in detail ;finally ,w e discussed the public challenges facing the wireless sensor ne tw o rk manag ement and poin -ted o ut the future research directio ns .Keywords Wireless senso r netwo rks ,N etw or k management ,M anag ement techno lo gy 无线传感器网络(Wirele ss Senso r Ne tw o rks ,WS N ,简称传感器网络)由大量低成本的微型传感器节点组成,协作地实现所部署区域的感知信息收集、处理和传输任务,可广泛应用于安全反恐、智能交通、医疗救护、环境监测、精准农业和工业自动化等诸多领域,受到了工业界和学术界的普遍重视,近年来不仅取得了大量的科研成果,也得到了一定的实际应用。
无线传感器网络应用文章英文
无线传感器网络应用文章(英文) Wireless Sensor Network ApplicationsIntroduction:Wireless Sensor Networks (WSNs) have gained significant attention in recent years due to their potential for numerous applications in various fields. A WSN consists of a large number of small, low-cost sensor nodes that are wirelessly connected to monitor physical or environmental conditions. These nodes can collect, process, and transmit data to a central base station for further analysis. This article aims to explore some of the most promising applications of WSNs.Environmental Monitoring:One of the most common applications of WSNs is environmental monitoring. These networks can be deployed in remote or hazardous areas to monitor parameters such as temperature, humidity, air pollution, and water quality. For instance, in forest fire detection, sensor nodes can detect abnormal temperature increases and transmit an alert to authorities, enabling timely intervention. In agriculture, WSNs can monitor soil moisture levels and provide farmers with real-time data to optimize irrigation.Healthcare:WSNs have also found applications in the healthcare industry. They can be used to monitor vital signs of patients, such as heart rate, blood pressure, and body temperature. Sensor nodes attached to patients can wirelessly transmit data to healthcare professionals, enabling continuous monitoring and early detection of any abnormalities. WSNs areparticularly useful in remote patient monitoring, allowing patients to receive medical attention from the comfort of their homes.Smart Homes and Buildings:WSNs can play a crucial role in creating smart homes and buildings. By deploying sensor nodes throughout a building, various parameters such as temperature, lighting, occupancy, and energy consumption can be monitored and controlled. This enables energy-efficient operations by optimizing heating, cooling, and lighting systems based on real-time data. Additionally, WSNs can enhance security by detecting unauthorized access or unusual activities within a building.Industrial Automation:WSNs are widely used in industrial automation to monitor and control different processes. For example, in manufacturing plants, sensor nodes can collect data on machine performance, temperature, and vibration levels, allowing for preventive maintenance and reducing downtime. WSNs can also be used for inventory management, tracking the movement of goods within a warehouse, and ensuring timely restocking.Traffic Management:WSNs can significantly contribute to improving traffic management in urban areas. By deploying sensor nodes along roads, real-time traffic data, such as vehicle density and speed, can be collected. This information can be used to optimize traffic signal timings, detect congestion, and provide drivers with alternative routes, reducingoverall travel time and fuel consumption. WSNs also enable the implementation of intelligent transportation systems, enhancing safety and reducing accidents.Conclusion:Wireless Sensor Networks have found numerous applications in various fields, ranging from environmental monitoring to healthcare, smart homes, industrial automation, and traffic management. These networks offer a cost-effective and scalable solution for collecting and analyzing datain real-time. As technology continues to advance, it is expected thatthe applications of WSNs will continue to expand, revolutionizing different industries and improving the quality of life for people around the world.。
无线传感中英文对照外文翻译文献
(文档含英文原文和中文翻译)中英文对照翻译译文:无线传感器网络的实现及在农业上的应用1引言无线传感器网络(Wireless Sensor Network ,WSN)就是由部署在监测区域内大量的廉价微型传感器节点组成,通过无线通信方式形成的一个多跳的自组织的网络系统。
其目的是协作地感知、采集和处理网络覆盖区域中感知对象的信息,并发送给观察者。
“传感器、感知对象和观察者”构成了网络的三个要素。
这里说的传感器,并不是传统意义上的单纯的对物理信号进行感知并转化为数字信号的传感器,它是将传感器模块、数据处理模块和无线通信模块集成在一块很小的物理单元,即传感器节点上,功能比传统的传感器增强了许多,不仅能够对环境信息进行感知,而且具有数据处理及无线通信的功能。
借助传感器节点中内置的形式多样的传感器件,可以测量所在环境中的热、红外、声纳、雷达和地震波信号等信号,从而探测包括温度、湿度、噪声、光强度、压力、土壤成分、移动物体的大小、速度和方向等等众多我们感兴趣的物质现象。
无线传感器网络是一种全新的信息获取和信息处理模式。
由于我国水资源已处于相当紧缺的程度,加上全国90%的废、污水未经处理或处理未达标就直接排放的水污染,11%的河流水质低于农田供水标准。
水是农业的命脉,是生态环境的控制性要素,同时又是战略性的经济资源,因此采用水泵抽取地下水灌溉农田,实现水资源合理利用,发展节水供水,改善生态环境,是我国目前精确农业的关键,因此采用节水和节能的灌水方法是当今世界供水技术发展的总趋势。
2无线传感器网络概述2.1无线传感器网络的系统架构无线传感器网络的系统架构如图1所示,通常包括传感器节点、汇聚节点和管理节点。
传感器节点密布于观测区域,以自组织的方式构成网络。
传感器节点对所采集信息进行处理后,以多跳中继方式将信息传输到汇聚节点。
然后经由互联网或移动通信网络等途径到达管理节点。
终端用户可以通过管理节点对无线传感器网络进行管理和配置、发布监测任务或收集回传数据。
WirelessSensorNetworksPPT课件
Traditional Sensing Method
Sensors do not have computation ability Sensors do not communicate
Current Sensing Method
the deployment of ZigBee Health Care based products in the market Kroger, one of the largest retail company in the US, joints ZigBee’s BoD ZigBee and SAE created a liaison to focus on solutions to address the
ZigBee Smart Energy is first open standard endorsed by ESMIG for Smart Metering across Europe ZigBee offers Smart Energy to IEC as basis for an IEC HAN & Smart Metering Standard ZigBee developing an IP stack for use with Smart Energy based on IETF RFCs. ZigBee Green Power enhancement being added to the ZigBee/ZigBee PRO stack ZigBee Alliance and Demand Response & Smart Grid Coalition (DRSG) establish a liaison ZigBee RF4CE specification & Technology Paper for public down load ZigBee and Continua Health Alliance signed liaison agreement to support
化工安全领域的无线传感器网络设计v1.0
化工安全领域的一种无线传感器网络设计张争明1林春2应怀樵 1(1、北京东方振动和噪声技术研究所,北京,100085)(2、北京化工大学信息科学与技术学院,北京,100029)摘要:近年来,无线传感器网络在国际上成为测控领域的研究热点,并在很多方面取得了的成果。
化工领域是测控技术应用要求较高的工业场合,无线传感器网络在这一领域的研究与应用却并不多见。
本文针对化工行业实施无线传感器网络测控技术的可行性进行了研究,并提出了一种主从结构的网络模式,优化了系统运行的效率,降低了功耗。
关键词:无线传感器网络、通信协议、传感器节点、化工安全Wireless Sensor Networks for Chemical FieldZhang Zhengming,Lin Chun,Ying Huaiqiao(China Orient institute of Noise and Vibration,Beijing,100085)Abstract Recently, Wireless Sensor Networks(WSN)has been one of the hot issues in the field of international measurement technology, which has begun to be applied in most of different areas. However, in the chemical field which has high request and standards for detecting application, Wireless Sensor Networks has not been applied in a large scale. According to its operation in the chemical field, this passage offers a network mode based on a master-slave relation topology to optimize the efficiency of one system and lower the consumption of power.Key words Wireless Sensor Networks Communication Protocol Sensors Network Nodes Chemical Safety1 引言化工领域中的安全生产管理一直都是一项复杂的工程。
无线传感器网络与TCP_IP网络的融合
2006年12月第29卷第6期北京邮电大学学报Journal of Beijing University of Posts and TelecommunicationsDec.2006Vol.29No.6文章编号:100725321(2006)0620001204无线传感器网络与TCP/IP 网络的融合刘元安1, 叶 靓2, 邵谦明2, 唐碧华1(11北京邮电大学电信工程学院,北京100876;21复旦大学通信科学与工程系,上海200433)摘要:介绍了无线传感器网络和传输控制协议/网际协议(TCP/IP )网络融合的最新研究成果,总结了当前主流的2种方法,即代理和直接TCP/IP 化传感器网络.以此为基础分析了它们各自的优势和不足,通过代理服务器连接传感器网络和TCP/IP 网络,比直接TCP/IP 化整个传感器网络实现方便,安全性较高;但采用TCP/IP 的网络可扩展性与健壮性比代理连接更好.最后提出了一种结合代理和TCP/IP 化的优化方法.关 键 词:无线传感器网络;传输控制协议/网际协议;代理;融合中图分类号:TP393 文献标识码:AIntegrating Wireless Sensor N et works with the TCP/IP N et worksL IU Yuan 2an 1, YE Liang 2, SHAO Qian 2ming 2, TAN G Bi 2hua 1(11School of Telecommunication Engineering ,Beijing University of Posts and Telecommunications ,Beijing 100087,China ;21Department of Communication of Science and Engineering ,Fudan University ,Shanghai 200433,China )Abstract :A summarization of published research achievements about interconnection between wireless sensor networks and transmission control protocol/Internet protocol (TCP/IP )networks is presented.Two different ways to connect wireless sensor networks with TCP/IP networks :proxy architectures and direct TCP/IP architectures for sensor networks are discussed.Investigation shows that the proxy architectures will provide simple access and high security level ,while direct TCP/IP architectures have better extensibilities and robustness.Also ,based on full analysis ,a hybrid approach combined proxy architectures is proposed together with direct TCP/IP architectures to have their respective advan 2tages.K ey w ords :wireless sensor network ;transmission control protocol/Internet protocol ;proxy ;inter 2connection收稿日期:2006209201基金项目:国家自然科学基金项目(60573111);高等学校博士学科点专项科研基金项目(20030013010)作者简介:刘元安(1963—),男,教授,博士生导师,E 2mail :yuliu @.0 引 言无线传感器网络(WSNs ,wireless sensor net 2works )是结合了传感器、无线通信和计算机科学的综合性技术.它是一组传感器以类似于Ad hoc 自组织方式组成的一种无线网络,其目的是协作地感知、收集和处理传感器网络所覆盖的地理区域中感知对象的信息,并传递给观察者[1].WSNs 中的传感器通常比较小,且无线传输距离短,能源储存低.如何把传感器收集的数据转发到有限的几个节点上,通过它们转发到其他具有强大处理能力的计算机上是非常重要的问题.当前大部分关于WSNs 的研究都集中在WSNs 内部的组织架构方式、协议、能源管理等方面,与外部网络特别是因特网的互联问题则较少有人讨论和研究.而将WSNs 与因特网甚至是下一代网络(N GN )融合起来是未来WSNs的重要发展方向.目前,因特网已成为覆盖全球范围的巨型网络,TCP/IP 协议簇也已成为互联的基本标准之一.WSNs 内部一般运行自己独特的传输协议,因此很难使它与TCP/IP 网络直接通信.本文主要讨论传感器网络与TCP/IP 网络互联的几种方法.从整体上看,传感器网络与TCP/IP 网络互联可以分为2种方法.1)通过代理服务器、网关、network address translation (NA T )将WSNs 与TCP/IP 网络连接起来.运用代理的方法可以最大限度地保持WSNs 的独立性,且基本不需要修改WSNs 内部协议,实现方便.2)传感器网络TCP/IP 化,即直接将WSNs 中的每个节点TCP/IP 化,每个节点都可以直连到TCP/IP 网络,这样不需要中间代理或者网关.在这类TCP/IP 化的传感器网络中,各传感器节点之间需要运行TCP/IP 协议,实现较为复杂,但是灵活性、自主性更强.本文分别介绍并分析了基于代理架构和传感器网络TCP/IP 化的方法,并根据代理和TCP/IP 化传感器网络各自的特点,提出了改进方案.1 基于代理机制的WSNs 与TCP/IP互联 在WSNs 与TCP/IP 网络之间设立代理是解决两者之间互联问题的一个简单的方法,如图1所示.图1 基于代理机制的WSNs 与TCP/IP 互联代理服务器既可以访问WSNs ,同时也可以访问TCP/IP 网络,起着网关的作用.因为所有TCP/IP 与WSNs 之间的通路都必须通过代理服务器,所以WSNs 内部的传输协议相对比较独立,只要代理网关能进行传感器网络传输协议与TCP/IP 的互相翻译即可.这类基于代理机制的方法还可以细分成以下2种方法.111 转发服务模式代理代理服务器将传感器网络中传输过来的数据重新打包分组转发到TCP/IP 网络中.相反,在1个节点已经向代理申请注册并通过的条件下,TCP/IP 传输来的数据也将通过代理服务器处理后转发到相应的传感节点上.112 前端服务模式代理完成前端服务的代理服务器的功能通常比较强大.因为此时的代理需要主动地搜集传感器网络中各个节点的相关数据,并将这些信息存储到自己的数据库中,以便TCP/IP 网络中某个用户需要查询传感器网络中的数据时,能最快地查询到所需要的数据,而不必让代理服务器把查询信息一级一级地传递到传感器各节点上.基于代理机制的WSNs 与TCP/IP 互联有个最大优点,即能尽量减少WSNs 与TCP/IP 之间的关联程度.这就意味着在WSNs 内部,完全可以运行用户自己允许的,甚至是自己设计的传输协议,而不必理会TCP/IP 协议,协议转换的工作自然会由代理屏蔽完成.代理机制的最大缺点也是显而易见的.如果代理由于某种原因中断服务,那么TCP/IP 网络与WSNs 的通信将被完全中断.虽然可以添加一些备份代理,但是这与基于代理机制的简单性产生了矛盾.一般来说,代理服务器都需要网络地址翻译(network address translation ).文献[2]介绍了一种通过蓝牙接入的方案.2 TCP/IP 化的WSNs基于代理机制的互联是为弥补传感器网络内部的传输协议与TCP/IP 不同.如果传感器网络内部也是用TCP/IP 协议传输,那么就根本不需要代理作为网关,可以直接连接任何TCP/IP 网络.在TCP/IP 化的WSNs 中不需要任何一个固定节点作为WSNs 网关,WSNs 可以自由选择1个或几个合适的、符合当前环境条件的节点与TCP/IP 通信.WSNs 内部节点之间的相互通信,或者与TCP/IP 网络的通信都可以用通用无线分组业务(GPRS ,gen 2eral packet radio service )技术或者Bluetooth 技术承载TCP/IP 协议.网络结构如图2所示.2北京邮电大学学报 第29卷图2 TCP/IP化的WSNs通信到目前为止,大部分学者都认为微型传感器缺乏足够的存储空间,且在很多恶劣环境下,能源无法替换,所以很难实现完整的TCP/IP协议簇.文献[324]分别介绍了在传感设备上如何运行完整的TCP/IP协议,以及如何在传感设备上实现uIP TCP/IP协议.而本文可以将运行TCP/IP协议的传感器网络直接与现存的TCP/IP网络通信,如可以用F TP传输文件、用HTTP提供Web服务,甚至传感器网络中的节点时间同步也可以应用N TP协议完成.但是真正在WSNs中运用TCP/IP也会碰到一些亟待解决的问题,如IP协议是基于路径为中心的路由,而传感器网络通常都是基于数据为中心的路由;TCP/IP的包头对于本就不长的传感器传输包来说过长;TCP不适用于像WSNs那样误比特率高的连接,TCP包会经常重传,能量利用率下降,导致传感器网络生命周期降低.完整TCP/IP的包头长度在28~40B之间,占传感器网络传输包总长度的90%.过长的包头会使本就出错率高的传输信道在传输过程中更容易出错重传,而且能源耗费也是一笔很大的开销,无线传输的能耗占了整个节点能耗的大部分.TCP/IP包头长度可以进行压缩,如TinyOS[5]包头长度大概仅占全长的5%左右.这里压缩包头的方法都只适用于单跳情况下的链路连接,文献[6]介绍了多跳链路情况下压缩包头的方法.文献[7]介绍了一种在传感器网络中改进TCP 的方法,但是该方法只能适用单跳情况下的无线链路.文献[8]也提出了一个TCP support for sensor nodes(TSS)的方法,保证了TCP包在传感器网络中的有效利用,可以适用于多跳情况下的无线传感器链路.3 一种改进方法无论是代理或是TCP/IP化传感器网络都有各自的特点,可以通过结合这2种方法进行一定的改进,即在TCP/IP化传感器网络的边缘设置前端代理,如图3所示.图3 代理机制与TCP/IP化WSNs互联结构在本方案中,当需要传输WSNs内部数据时,可以直接用TCP/IP化的方式连接到因特网上的某服务器进行处理.如果某台服务器需要访问或控制该WSNs时,则必须通过代理服务器完成对该WSNs的通信.这样既可以保证数据传输处理的便捷性和健壮性,也可以起到一定的访问安全控制作用,从而在2种方法之间取得一定的平衡.基于代理服务的互联通信,优点在于代理服务器简化了WSNs与TCP/IP之间的通信.任务工作的局限性既可以看作是代理方法的缺点,也可以看作是它的一个优点.因为代理服务器通常都是为某个有特殊目的的WSNs服务的,不管该WSNs的传输协议是什么格式,WSNs与TCP/IP协议转换是如何操作等,代理服务只能适应这个唯一的传感器网络,这样虽然带来了局限性,但是也提高了安全性.然而代理方式始终都有一定的脆弱性,如果代理服务器失效,那么所有传感器网络与外部网络的通信都将中断.这时需要TCP/IP化传感器网络弥补.TCP/IP化传感器网络是利用1个或多个节点与TCP/IP网络相连,传感器网络与TCP/IP网络之间的通信可通过这几个节点转发.这些节点与TCP/IP的连接可以通过GPRS或是其他无线技术支持.同样,这些节点需要较大的存储空间和能源,否则无法支持长时间的通信要求.可以通过内部制定某些协议规则使这些节点以某种概率或策略轮换作为网关来节省能耗.安全性是TCP/IP化传感器网络的最大缺陷.在这种条件下,代理机制可以提供非常周密的安全服务,因为所有控制和访问通信都要经过代理服务器.代理服务器可以预先设定用户和数据认证机制等安全措施.TCP/IP本身不提供任何安全机制,而文献[9]已提出了如何在应用层3第6期 刘元安等:无线传感器网络与TCP/IP网络的融合上提供足够的适用于WSNs 的安全措施.每个接入TCP/IP 的网络实体都必须有1个IP 地址,同一段物理连接的IP 地址前缀一般都是相同的,路由器也是根据这个地址的前缀选择路由.但是,传感器网络很难适用基于地址为中心的路由选择,如军事运用的探测型传感器网络,传感器节点数成千上万,此时用IP 寻址很难实现;而且很多传感器网络关心的不是IP 地址,而是空间位置.这里运用文献[10]提出的空间IP 地址分配的模式.它主要是根据传感器节点的具体位置分配IP 地址的,这样IP 寻址时既可以找到该节点,也可以知道该节点大致的位置.但是文献[10]提出的IP 地址分配模式是二维的,有时还需要知道高度信息,所以设计了一个三维IP 地址分配.如图4所示,点A 的IP 地址是192.0.0.0,它表示该点位于x =0、y =0、z =0处;同理,点B 位于x =8、y =1、z =3处;点C位于x =10、y =10、z =10处;点D 位于x =1、y =9、z =6处.图4 三维空间IP 地址分配4 结 论本文总结了WSNs 与TCP/IP 网络互联的2个主流方法———代理与TCP/IP 化WSNs.代理机制简单,在连接特殊传输协议的WSNs 时,只需要配置1台代理服务器即可;但是它有单点脆弱性的缺陷.传感器网络的TCP/IP 化可以直接通过1个或几个节点直接与TCP/IP 外部网络连接;但对该节点的存储能力和能源要求高,而且TCP/IP 的安全性令人担忧,限制了某些敏感领域的应用,如军事领域. 本文方法结合了以上2种方法的优点,既避免了单点脆弱性的可能性,又提高了互联的安全性和简易性.WSNs 的远景就是能通过计算机、个人数字助理(PDA ,personal digital assistant )、手机等通信工具,直接搜索到希望得到的传感器数据.这些数据包括图像、声音,以及温度、气压、湿度等一系列需要的数据信息.参考文献:[1] Tilak S.A taxonomy of wireless micro 2sensor networkmodels[J ].Mobile Computing and Communications Re 2view ,2002,1(2):128.[2] Ostmark A.A wireless network of EIS devices[C]∥In 2strumentation and Measurement Technology Conference ,2004.[S.l.]:IEEE ,2004:119921202.[3] Dunkels A.Full TCP/IP for 82bit architectures [C ]∥Proceedings of the First International Conference on Mo 2bile Systems ,Applications ,and Services (MOBISYSπ03).San Francisco :[s.n.],2003:85298.[4] Dunkels A.uIP 2a TCP/IP stack for 82and 162bit micro 2controllers [EB/OL ].[2006206207].http :∥/adam/uip/.[5] Hill J.System architecture directions for networked sen 2sors[C ]∥De Groot D.Proc of the SIG ARCH 2000,ACM SIG ARCH Computer Architecture News.New Y ork :ACM Press ,2000:932104.[6] Mishra S.A robust header compression technique forwireless Ad hoc networks[EB/OL ].2003[2006206220].http :∥ /mobihoc /2003/posters/p2152sridharan.pdf.[7] Liu Jian.A TCP :TCP for mobile Ad hoc networks[J ].IEEE Journal on Selected Areas in Communications ,2001,19(7):130021315.[8] Braun T.TCP support for sensor networks [EB/OL ].[2006207203].http :∥www.iam.unibe.ch/~braun/in 2tern/infocom -braun.pdf.[9] Stajano F.Security for ubiquitous computing[M ].NewY ork :Halsted Press ,2002:56296.[10] Dunkels A.Making TCP/IP viable for wireless sensornetworks[EB/OL ].2004[2006207215].http :∥www.sics.se/~adam/ewsn2004.pdf.4北京邮电大学学报 第29卷。
Wireless Sensor Network
– Battery Model: Linear Battery, Discharge Rate Dependent and/or Relaxation Battery – Application Layer : Random Neighbor; Constant Bit Rate – Network Layer: Simple Flooding; a simplified verion of ADOV without route repairing, a simplified version of DSR without route repairing – MAC Layer: NullMAC; IEEE 802.11 – Physical Layer: Duplex Transceiver; Wireless Channel – Simulation Engine: CostSimEng (sequential)
– Has included Network Preserving Protocol (NPP) for better performance along with LEACH – Not completed for robustness
Mahapatra-Texas A&M-Spring'07
9
Sensor Network Simulator
• Separate channels:
– Sensor channels: communication among sensor nodes and target – Network channels: to user node or gateways and onward transmission to other network. – Concurrent transmission possible – Easier to model complex behavior of sensor nodes, reaction to multiple sensor signals.
无线传感器网络模型设计英文文献翻译(精)
Model Design of Wireless Sensor Network based on Scale-Free Network TheoryABSTRACTThe key issue of researches on wireless sensor networks is to balance the energy costs across the whole network and to enhance the robustness in order to extend the survival time of the whole sensor network. As a special complex network limited especially by the environment, sensor network is much different from the traditional complex networks, such as Internet network, ecological network, social network and etc. It is necessary to introduce a way of how to study wireless sensor network by complex network theory and analysis methods, the key of which lies in a successful modeling which is able to make complex network theory and analysis methods more suitable for the application of wireless sensor network in order to achieve the optimization of some certain network characteristics of wireless sensor network. Based on generation rules of traditional scale-free networks, this paper added several restrictions to the improved model. The simulation result shows that improvements made in this paper have made the entire network have a better robustness to the random failure and the energy costs are more balanced and reasonable. This improved model which is based on the complex network theory proves more applicable to the research of wireless sensor network.Key-words: Wireless sensor network; Complex network; Scale-free networkI. INTRODUCTIONIn recent years, wireless sensor networks have attracted more and more related researchers for its advantages. Sensor nodes are usually low-power and non-rechargeable. The integrity of the original networks will be destroyed and other nodes will have more business burden for data transmission if the energy of some certain nodes deplete. The key issue of sensor network research is to balance the energy consumption of all sensor nodes and to minimize the impact of random failure of sensor nodes or random attacks to sensor nodes on the entire network [1].Complex network theory has been for some time since first proposed by Barabasi and Albert in 1998, but complex network theory and analysis method applied to wireless sensor networks research is seriously rare and develops in slow progress. As a special complex network limited especially by the environment, sensor network is much different from the traditional complex network, and the existing complex network theory and analysis methods can not be directly applied to analyze sensor networks. Based on scale-free network theory (BA model [2], (1 this paper added a random damage mechanism to each sensor node when deployed in the generation rule; (2 considering the real statement of wireless sensor networks, a minimum and maxinum restriction on sensor communication radius was added to each sensor node; (3 in order to maintain a balanced energy comsuption of the entire network, this paper added a limited degree of saturation value to each sensor node. This improved scale-free model not only has the mentioned improvements above, but also has lots of advantages of traditional scale-free networks, such as the good ability to resist random attacks, so that the existing theory and analysis methods of complex network will be more suitable for the researches of wireless sensor network.II. PROGRESS OF RELATED RESEARCHHailin Zhu and Hong Luo have proposed two complex networks-based models for wireless sensor networks [3], the first of which named Energy-aware evolution model (EAEM can organize the networks in an energy-efficient way, and can produce scale-free networks which can improve the networks reliance against random failure of the sensor nodes. In the second model named Energy-balanced evolution model (EBEM, the maximum number of links for each node is introduced into the algorithm, which can make energy consumption more balanced than the previous model (EAEM.CHEN Lijun and MAO Yingchi have proposed a topology control of wireless sensor networks under an average degree constraint [4]. In the precondition of the topology connectivity of wireless sensor networks, how to solve the sparseness of the networktopology is a very important problem in a large number of sensor nodes deployed randomly. They proved their proposed scheme can decrease working nodes, guarantee network topology sparseness, predigest routing complexity and prolong network survival period.LEI Ming and LI Deshi have proposed a research on self-organization reliability of wireless sensor network[5], which aiming on the two situations: deficiency of WSN nodes and under external attack, analyzes the error tolerance ability of different topologies of WSN, and eventually obtains optimized self—organized topological models of WSN and proposes a refined routing algorithm based on WSN.III. IMPROVED SCALE-FREE MODEL FOR WSNBecause of the limited energy and the evil application environment, wireless sensor networks may easily collapse when some certain sensor nodes are of energy depletion or destruction by the nature, and even some sensor nodes have been damaged when deployed. There is also a restriction on maxinum and mininum communication radius of sensor nodes rather than the other known scale-free networks such as Internet network, which has no restriction on communication radius. To have a balanced energy consumption, it is necessary to set up a saturation value limited degree of each sensor node [6].In response to these points, based on the traditional scale-free model, this paper has made the following improvements in the process of model establishment:(1 A large number of researches have shown that many complex networks in nature are not only the result from internal forces, but also the result from external forces which should not be ignored to form an entire complex network. Node failure may not only occour by node energy depletion or random attacks to them when sensor networks are in the working progress, but also occour by external forces, such as by the nature, whendeployed. In this paper, a mechanism of small probability of random damage has been added to the formation of sensor networks.(2 Unlike Internet network where two nodes are able to connect directly to each other and their connection are never limited by their real location, sensor network, two nodes in which connect to each other by the way of multi-hop, so that each node has a maximum of length restriction on their communication radius. To ensure the sparse of the whole network, there must also be a minimum of length restriction on their communication radius. In this paper, a length restriction on communication radius of sensor nodes has been proposed in the improved model.(3 In sensor network, if there exists a sensor node with a seriously high degree, whose energy consumption is very quickly, it will be seriously bad. The whole sensor network would surely collapse if enough energy were not supported to the certain node. To avoid this situation, this paper has set up a saturation value limited degree of each sensor node. By adding the mentioned restrictions above to the formation of the scale-free model, the new improved model will be more in line with the real statement of sensor network. Complex network theory and analysis methods will be more appropriate when used to research and analyze the sensor network.IV . DESCRIPTION OF THE IMPROVED ALGORITHMThe specific algorithm of the improved model formation are described as follows :(1 A given region (assumed to be square is divided into HS*HSbig squares (named as BS;(2 Each BS (assumed to be square is divided into LS*LS small squares (named as SS, and each SS can have only one node in its coverage region;(3 m0 backbone nodes are initially generated as a random graph, and then a new node will be added to the network to connect the existing m nodes with m edges at each time interval. (m< m0, mis a quantity parameter;(4 The newly generated node v, has a certain probability of Peto be damaged directly so that it will never be connected with any existing nodes;(5 The newly generated node vconnects with the existing node i, which obeyes dependent-preference rule and is surely limited by the degree of the certain saturation value .(6 The distance div between the newly generated node v connects and the existing node i shall be shorter than the maximum dmax of the communication radius of sensor nodes.Above all, the probability that the existing node i will be connected with the newly generated node v can be shown as follows:In order to compute it conveniently, here assumed that few nodes had reached the degree of saturation value kimax . That is, N is very minimal in Eqs.(1 so that it can be ignored here. And in Eqs.iN j 1ak Kjπ=≈∑0N=m 1t +- (2With The varying rate with time of ki, we get:0m 112i i i i t jj k amk amk m t mt m k δπδ+-====-∑ (3When t→∞,condition: k i (t i =m, we get the solution: i 2,i t k t aββ=(t =m ((4 The probabilit y that the degree of node I is smaller than k is:11{k (tk}P{t }i i m t P k ββ<=> (5The time interval when each newly generated node connected into the network is equal, so that probability density of t i is a constant parameter:01(t i P m t=+1/β we rep lace it into Eqs. (5, then we get:11111{k (tk}P{t }1(t i m t k i i i t m t P P k ββββ=<=>=-∑ (61101(t mm t k ββ-+ So we get: 110(k (tk21(k.i P m t P k m t k ββδδ<==+ (7 When t →∞, we get:2(k2m r P k -= (8 In which 12=1+=1+a γβ, and the degree distri bution we get and the degree distribution of traditional scale-free network are similar. Approximately, it has nothing to do with the time parameter t and the quantity of edges m generated at each time interval.max P{d d }iv ≤could be calculated by the ma x in um restriction dmax on communicationradius of each sensor node and the area of the entire coverage region S, thatis max P{d d }iv ≤=2Sd πThen we replace max P{d d }iv ≤=2S d πand a=max P{d d }iv ≤(1-P e into Eqs. and eventually we get:2S 21122(k2m 2e a P km k π----== (1-P d .V. SIMULATIONThis paper used Java GUI mode of BRITE topology generator to generate the topology, and parameter settings were as follows:1 N=5000N means the quantity of the sensor nodes at the end of thetopology generation.2 m=m0 =1M means the quantity of the new generated edges by the new generated node at each time interval.3 HS=500HS means the given region was divided into HS*HS big squares.4 .LS=50 LS means each big square was divided into LS*LS small squares.d=105 mind is the mininum restriction on communication radius of each sensor node.mind=1286 maxd is the maxinum restriction on communication radius of each sensor node.max7 PC=1PC means wether preferential connectivity or not.8 .IG=1IG means wether incremental grouth or not.9 e P=0.01, m=1This means that any newly generated node has 1% chance to be node failure and the newly generated node if normal only connect with one existing node .Then we got each degree of the sensor network nodes from BRITE topology generator.To analyze the degree distribution, we use Matlab to calculate datas and draw graph. As can easily be seen from Fig. 1, the distribution of degree k subjected approximately to Power-Law distribution. However, the value of γ is no longer between 2 and 3, but a very large value, which is caused by the random damage probability P e to new generated nodes when deployed and the max in um of communication radius d max of each sensor node. It can be easily seen that the slope of P(k is very steep and P(k rears up because sensor node has a limited degree of saturation value by 180. The existence of 0 degree nodes is result from the random damage to new generated nodes when deployed.Fig. 1 Degree distribution of Improved ModelCompared with the degree distribution produced by traditional scale-free network as is shown in Fig. 2, the generation rule proposed in this paper has produced a degreedistribution in a relatively low value as is shown in Fig. 1; there are some nodes of 0 degree as is shown in Fig. 1 on the left for the random damage rule; as is shown on the right in Fig. 1, there are no nodes with higher degree than the quantity of 180 while there are some nodes whose degree are of higher degree than the quantity of 180.Fig. 2 Degree distribution of traditional Scale-free ModelVI. CONCLUSIONThis paper has added a random damage to new generated nodes when deployed; considering multi-hop transmission of sensor network, this paper has proposed a maximum restriction on the communication radius of each sensor node; in order to improve the efficiency of energy comsumption and maintain the sparsity of the entire network, this paper has also added a minimum restriction on the communication radius of each sensor node to the improved model; to balance the energy comsuption of the entire network, this paper has proposed a limited degree of saturation value on each sensor node.In this paper, an improved scale-free network model was proposed to introduce the theory of traditional scale-free network and analysis methods into the researches of wireless sensor networks more appropriately, which would be more approximate to the real statement of wireless sensor networks.REFERENCES[1] R. Albert, H. Jeong and A.-L. Barabasi. Error and attack tolerance of complex networks. Nature, 2000; 406: 378-382.[2] Albert R, Barabasi A. Statistical mechanics of complex networks. Rev Mod Phys 2002; 74: 47–97..[3] Zhu HL, Luo H. Complex networks-based energy-efficient evolution model for wireless sensor networks. Chaos, Solitons and Fractals; 2008: 1-4.[4] Chen LJ, Mao YC. Topology Control of Wireless Sensor Networks Under an Average Degree Constraint. Chinese Journal of computers 2007; 30: 1-4.[5] Lei M, Li DS. Research on Self-Organization Reliability of Wireless Sensor Network . Complex system and complexity science ; 2005, 2: 1-4.[6] Chen LJ, Chen DX. Evolution of wireless sensor network . WCNC 2007; 556: 3003–7.[7] Peng J, Li Z. An Improved Evolution Model of Scale-Free Network . Computer application. 2008 , 2; 1: 1-4.基于无范围网络理论的无线传感器网络模型设计张戌源通信工程部通信与信息工程学院上海,中国摘要无线传感器网络的研究的关键问题是是平衡整个网络中的能源成本并且为了延长整个传感器网络的生存时间要增强鲁棒性。
无线传感器网络论文英文版
无线传感器网络论文英文版Wireless Sensor Networks: A Research PaperAbstract:Wireless Sensor Networks (WSNs) have emerged as a revolutionary technology in the field of wireless communication. This research paper aims to provide an overview of WSNs, their applications, challenges, and future prospects.1. Introduction:Wireless Sensor Networks are interconnected nodes that can communicate with each other through wireless protocols. These nodes, equipped with sensors, provide real-time data from physical environments. WSNs have gained significant attention due to their applicability in various industries such as healthcare, agriculture, environmental monitoring, and surveillance.2. Architecture of Wireless Sensor Networks:The architecture of WSNs consists of three main components: sensor nodes, sinks or base stations, and a network infrastructure. Sensor nodes gather information from the environment and transmit it to the sink or base station via multi-hopping or direct transmission. The network infrastructure manages the routing and data aggregation processes.3. Applications of Wireless Sensor Networks:3.1 Environmental Monitoring:WSNs play a crucial role in monitoring environmental parameters such as temperature, humidity, air quality, and water quality. This data is essential for environmental research, disaster management, and habitat monitoring.3.2 Healthcare:WSNs have revolutionized the healthcare industry by enabling remote patient monitoring, fall detection, and medication adherence. These networks assist in providing personalized and timely healthcare services.3.3 Agriculture:In the agricultural sector, WSNs are deployed for crop monitoring, irrigation management, and pest control. The data collected by these networks help farmers enhance crop productivity and reduce resource wastage.3.4 Surveillance:WSNs are extensively employed in surveillance systems to monitor public areas, monitor traffic congestion, and ensure public safety. These networks provide real-time data for efficient decision-making and threat detection.4. Challenges in Wireless Sensor Networks:4.1 Energy Efficiency:Sensor nodes in WSNs are usually battery-powered, making energy efficiency a critical challenge. Researchers are focused on developing energy-efficient protocols and algorithms to prolong the network's lifespan.4.2 Security and Privacy:As WSNs collect sensitive data, ensuring the security and privacy of transmitted information is crucial. Encryption techniques, intrusion detection systems, and secure routing protocols are being developed to address these concerns.4.3 Scalability:Scalability is a critical challenge in large-scale deployment of WSNs. Designing scalable architectures and protocols enable efficient communication and management of a large number of sensor nodes.5. Future Prospects of Wireless Sensor Networks:The future of WSNs is promising, with advancements in technologies such as Internet of Things (IoT) and Artificial Intelligence (AI). Integration of WSNs with IoT devices will enable seamless communication and data exchange. AI algorithms can facilitate intelligent data analysis and decision-making.Conclusion:Wireless Sensor Networks have shown tremendous potential in various fields and continue to evolve with advancements in technology. Addressing energy efficiency, security, and scalability challenges will contribute to the widespread adoption of WSNs. As researchers continue to explore new possibilities, WSNs will become an integral part of our daily lives, transforming industries and enhancing our quality of life.。
zigbee无线传感器网络英文文献
zigbee无线传感器网络英文文献兰州交通大学毕业设计(英文文献)Zigbee Wireless Sensor Network in Environmental MonitoringApplicationsI. ZIGBEE TECHNOLOGYZigbee is a wireless standard based on IEEE802.15.4 that was developed to address theunique needs of most wireless sensing and control applications. Technology is low cost, low power, a low data rate, highly reliable, highly secure wireless networking protocol targeted towards automation and remote control applications. It’s depicts two keyperformance characteristics – wireless radio range and data transmission rate of the wireless spectrum. Comparing to other wireless networking protocols such as Bluetooth, Wi-Fi, UWB and so on, shows excellent transmission ability in lower transmission rate and highly capacity of network.A. Zigbee FrameworkFramework is made up of a set of blocks called layers. Each layer performs a specificset of services for the layer above. As shown in Fig.1. The IEEE 802.15.4 standard definesthe two lower layers: the physical (PHY) layer and the medium access control (MAC) layer. The Alliance builds on this foundation by providingthe network and security layer and the framework for the application layer.Fig.1 FrameworkThe IEEE 802.15.4 has two PHY layers that operate in two separate frequency ranges: 868/915 MHz and 2.4GHz. Moreover, MAC sub-layer controls access to the radio channel using a CSMA-CA mechanism. Its responsibilities may also include transmitting beacon frames, synchronization, and providing a reliable transmission mechanism. B. Zigbee’s TopologyThe network layer supports star, tree, and mesh topologies, as shown in Fig.2. In a startopology, the network is controlled by one single device called coordinator. The coordinator1兰州交通大学毕业设计(英文文献)is responsible for initiating and maintaining the devices on the network. All other devices, known as end devices, directly communicate with the coordinator. In mesh and tree topologies, the coordinator is responsible for starting the network and for choosing certain key network parameters, but the network may be extended through the use ofrouters. In tree networks, routers move data and control messagesthrough the network using a hierarchical routing strategy. Mesh networks allow full peer-to-peer communication.Fig.2 Mesh topologiesFig.3 is a network model, it shows that supports both single-hopstar topology constructed with one coordinator in the center and the end devices, and mesh topology. In the network, the intelligent nodes are composed by Full Function Device (FFD) and Reduced Function Device (RFD). Only the FFN defines the full functionality and can become a network coordinator. Coordinator manages the network, it is to say that coordinator can start a network and allow other devices to join or leave it. Moreover, it can provide binding and address-table services, andsave messages until they can be delivered.Fig.3 Zigbee network model2兰州交通大学毕业设计(英文文献)II. THE GREENHOUSE ENVIRONMENTAL MONITORINGSYSTEM DESIGNTraditional agriculture only use machinery and equipment which isolating and no communicating ability. And farmers have to monitor crops’ growth by themselves. Even ifsome people use electrical devices, but most of them were restricted to simple communication between control computer and end devices like sensors instead of wire connection, which couldn’t be strictly defined as wireless sensor network. Therefore, bythrough using sensor networks and, agriculture could become more automation, more networking and smarter.In this project, we should deploy five kinds of sensors in the greenhouse basement. By through these deployed sensors, the parameters such as temperature in the greenhouse, soil temperature, dew point, humidity and light intensity can be detected real time. It is key to collect different parameters from all kinds of sensors. And in the greenhouse, monitoring the vegetables growing conditions is the top issue. Therefore, longer battery life and lower data rate and less complexity are very important. From the introduction about above, we know that meet the requirements for reliability, security, low costs and low power.A. System OverviewThe overview of Greenhouse environmental monitoring system, which is made up by one sink node (coordinator), many sensor nodes, workstation and database. Mote node and sensor node together composed of each collecting node. When sensors collect parameters real time, such as temperature in the greenhouse, soil temperature, dew point, humidity and light intensity, these data will be offered to A/D converter, then by through quantizing and encoding become the digital signal that is able to transmit by wireless sensor communicating node. Each wireless sensor communicating node has ability of transmitting, receiving function.In this WSN, sensor nodes deployed in the greenhouse, which can collect real time data and transmit data to sink node (Coordinator) by the way of multi-hop. Sink node complete the task of data analysis and data storage. Meanwhile, sink node is connected with GPRS/CDMA can provide remote control and data download service. In the monitoring and controlling room, by running greenhouse management software, the sink node can periodically receives the data from the wireless sensor nodes and displays them on monitors.3兰州交通大学毕业设计(英文文献)B. Node Hardware DesignSensor nodes are the basic units of WSN. The hardware platform is made up sensor nodes closely related to the specific application requirements. Therefore, the most important work is the nodes design which can perfect implement the function of detecting and transmissionas a WSN node, and perform its technology characteristics. Fig.4 shows the universal structure of the WSN nodes. Power module provides the necessary energy for the sensor nodes. Data collection module is used to receive and convert signals of sensors. Data processing and control module’s functions are node device control, task scheduling, and energy computing and so on. Communication module is used to senddata between nodes and frequency chosen and so on.Fig.4 Universal structure of the wsn nodesIn the data transfer unit, the module is embedded to match the MAC layer and the NET layer of the protocol. We choose CC2430 as the protocol chips, which integrated the CPU,RF transceiver, net protocol and the RAM together. CC2430 uses an 8 bit MCU (8051), andhas 128KB programmable flash memory and 8KB RAM. It also includesA/D converter, some Timers, AES128 Coprocessor, Watchdog Timer, 32K crystal Sleep mode Timer, Poweron Reset, Brown out Detection and 21 I/Os. Based on the chips, many modules for theprotocol are provided. And the transfer unit could be easily designed based on the modules.As an example of a sensor end device integrated temperature, humidity and light, the design is shown in Fig. 5.4兰州交通大学毕业设计(英文文献)Fig.5 The hardware design of a sensor nodeThe SHT11 is a single chip relative humidity and temperature multi sensor module comprising a calibrated digital output. It can test the soil temperature and humidity. The DS18B20 is a digital temperature sensor, which has 3 pins and data pin can link MSP430directly. It can detect temperature in greenhouse. The TCS320 is a digital light sensor.SHT11, DS18B20 and TCS320 are both digital sensors with small size and low powerconsumption. Other sensor nodes can be obtained by changing the sensors.The sensor nodes are powered from onboard batteries and the coordinator also allows to be powered from an external power supply determined by a jumper.C. Node Software DesignThe application system consists of a coordinator and several end devices. The general structure of the code in each is the same, with an initialization followed by a main loop.The software flow of coordinator, upon the coordinator being started, the first action of the application is the initialization of the hardware, liquid crystal, stack and application variables and openingthe interrupt. Then a network will be formatted. If this net has been formatted successfully, some network information, such as physical address, net ID, channel number will be shown on the LCD. Then program will step into application layer and monitor signal. If there is end device or router want to join in this net, LCD will shown this information, and show the physical address of applying node, and the coordinator will allocate a net address to this node. If the node has been joined in this network, the data transmitted by this node will be received by coordinator and shown in the LCD.The software flow of a sensor node, as each sensor node is switched on, it scans all5兰州交通大学毕业设计(英文文献)channels and, after seeing any beacons, checks that the coordinatoris the one that it is looking for. It then performs a synchronizationand association. Once association is complete, the sensor node enters a regular loop of reading its sensors and putting out a frame containing the sensor data. If sending successfully, end device will step into idle state; by contrast, it will collect data once again and send to coordinator until sending successfully.D. Greenhouse Monitoring Software DesignWe use VB language to build an interface for the test and this greenhouse sensor network software can be installed and launched on any Windows-based operating system. It has 4dialog box selections: setting controlling conditions, setting Timer, setting relevant parameters and showing current status. By setting some parameters, it can perform the functions of communicating with port,data collection and data viewing.6兰州交通大学毕业设计(英文文献)无线传感器网络在环境监测中的应用Zigbee技术I. Zigbee是一种基于802.15.4的无线标准上被开发用来满足大多数无线传感ZigbeeIEEE和控制应用的独特需求。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
12TH ICCRTS “Adapting C2 to the 21st Century”Wireless Sensor Networking Supportto Military Operations on Urban TerrainTrack 2: Networks and NetworkingTrack 8: C2 Technologies and SystemsDr. António Grilo IST/UTL, INESC, Rua Alves Redol, nº 9 1000-029 LISBOA,PortugalTel: +351-213100226 antonio.grilo@inesc.pt (contact author)Rui SilvaESTIG,Rua Afonso III,nº17800-050 Beja,Portugalrs.beja@Lt Col Paulo NunesCINAMIL/Academia MilitarPaço da Rainha, 291169-203 LISBOA,Portugalpfvnunes@net.sapo.ptMaj José MartinsCINAMILAcademia MilitarPaço da Rainha, 291169-203 LISBOA,Portugaljosecarloslm@netcabo.ptProf. Mário NunesIST/UTL, INESC,Rua Alves Redol, nº 91000-029 LISBOA,PortugalMario.nunes@inesc.ptWireless Sensor Networking Support to Military Operations on Urban Terrain1Dr. António Grilo IST/UTL, INESC, Rua Alves Redol, nº 9 1000-029 LISBOA,PortugalTel: +351-213100226 antonio.grilo@inesc.pt (contact author)Rui SilvaESTIG,Rua Afonso III,nº17800-050 Beja,Portugalrs.beja@Lt Col Paulo NunesCINAMIL/Academia MilitarPaço da Rainha, 291169-203 LISBOA,Portugalpfvnunes@net.sapo.ptMaj José MartinsCINAMILAcademia MilitarPaço da Rainha, 291169-203 LISBOA,Portugaljosecarloslm@netcabo.ptProf. Mário NunesIST/UTL, INESC,Rua Alves Redol, nº 91000-029 LISBOA,Portugalmario.nunes@inesc.ptAbstractFP6 IST research project Ubiquitous Sensing and Security in the European Homeland (UbiSeq&Sens) aims at providing a comprehensive architecture for medium and large scale Wireless Sensor Networks (WSN)s, with the full level of security and reliability required to make them trusted and secure for all applications, while considering early-warning and tracking in a Homeland Security/Defense context (e.g., support of anti-terrorist SWAT team operations) as one of the scenarios for system demonstration. This paper extrapolates from this scenario, defining an architecture for WSNs supporting Military Operations in Urban Terrain (MOUT) in the context of XXIst century Operations Other Than War (OOTH). Based on the defined architecture, the authors identify the main WSN Networking and Security issues and challenges that must be overcome to provide the assurance, efficiency and reliability required by the warfighter, which constitute the focus of ongoing work in IST FP6 UbiSeq&Sens.Keywords:.Wireless Sensor Networks, Network Centric Military Communications, Military Operations on Urban Terrain, IST FP6 UbiSec&Sens1 IntroductionWireless Sensor Networks (WSNs) have motivated intense research, in academia, industry and on the military sector due to its potential to support distributed micro-sensing in environments for which conventional networks are impractical or when the required sensor density demands a robust, secure and cost-effective solution. WSNs rely on large numbers of cheap devices, which are greatly limited in terms of processing, communications and autonomy capabilities. Despite reduced, the capabilities of these devices are leveraged through collaboration in distributed in-network data fusion and processing tasks, with final results that are equivalent to those obtained with centralized processing.Early-warning and tracking is an application where WSNs have seen significant progress in the last few years, with some practical solutions already existing on the market. However, these commercial WSN systems still lack the security, reliability and efficiency required for this kind of application. FP6 IST research project Ubiquitous Sensing and Security in the European Homeland (UbiSeq&Sens) tries to overcome these limitations. The overall objective of UbiSeq&Sens is to provide a comprehensive architecture for medium and large scale WSNs, with the full level of security and reliability required to make them trusted and secure for all applications, while considering early-warning and tracking in a Homeland Security/Defense context (e.g., support of anti-terrorist SWAT team operations) as one of the scenarios for system demonstration. This 1 The work described in this paper is based on results of IST FP6 project UbiSec&Sens (/). UbiSec&Sens receives research funding from the European Community's Sixth Framework Programme. Apart from this, the European Commission has no responsibility for the content of this paper.The information in this document is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability.project, which started in the beginning of 2006 has now completed the scenario specification phase, triggering the beginning of the design work.The end of the Cold War in the beginning of the 1990s and the reality brought by the dramatic events of September 11th 2001 have led to a shift of the focus of military operations to Operations Other Than War (OOTW) with emphasis on Peace Keeping, Making and Building. The Rules Of Engagement (ROE) associated with these missions significantly constrain the options available to warfighters engaged on Military Operations on Urban Terrain (MOUT). In fact, most of the reality experienced by these warfighters bears more similarity with Homeland Security and counterterrorism operations than with traditional military operations. Consequently, many of the operational concepts are common to both types of scenarios, and so are the supporting technologies. In effect, in the context of so called Three Block War2 [1], characteristics of the XXIst century, the use of disproportionate force in MOUT is unacceptable, requiring clearing of hostile urban areas to be made block-by-block, or even room-by-room by infantry teams that must directly intervene on the scene. The complexity of urban environments usually precludes full situation awareness. This, coupled with the fact that the adversary is usually expected to have a better understanding about the operational environment, poses significant risks to the life and integrity of warfighters. In such missions, Network Centric Warfare [2] assisted by robust sensor networking is paramount to reduce situation uncertainty, providing early-warning and tracking of unpredicted intrusions in areas considered already cleared, thus denying the intruder the advantage of surprise.This paper proposes a WSN architecture in the context of MOUT (section 2), extrapolating from the UbiSeq&Sens Homeland Security scenario definition, but taking into account MOUT specificities. Based on the delineated architecture, it identifies the main WSN Networking and Security issues and challenges (sections 3 and 4 respectively) that must overcome in order to provide the assurance and reliability required by the warfighter, which constitute the focus of ongoing work in IST FP6 UbiSeq&Sens. Finally, the paper presents some conclusions and the envisaged way ahead (section 5).2 MOUT WSN ArchitectureThe MOUT WSN architecture is depicted in Figure 1. The MOUT WSN nodes are deployed by infantry team elements as they clear the terrain. Once deployed, these nodes self-organize into a multi-hop network, establishing data paths from each individual sensor to special sink nodes. Sink nodes may operate as gateways between the WSN and higher echelon tactical networks, using appropriate technologies like the Joint Tactical Radio System (JTRS) or SATCOM to connect to Command Posts (CP)s where the information from several information systems, sensors and sensor networks is gathered, fused and analysed and where higher-level tactical decisions are made. Deployment must take into account robustness in the connectivity to CPs and consequently it is desirable to deploy several sink nodes, conveniently positioned in a way that minimizes the risk of WSN partition. Warfighters may also be equipped with Personal Digital Assistants (PDAs) or other wireless terminals that allow direct connection to the WSN, turning them into mobile sink nodes. Similar capabilities may be available to robotic elements like Unmanned Aerial Systems (UAS)s or Unmanned Ground Vehicles (UGV)s. Both warfighters and robots may also carry sensors, making them mobile source nodes as well.2 General Charles Krulak (USMC) set the stage for the importance of the flexibility and innovation required from the Strategic Corporal when he discussed the need to fight the “three block war.” He stated that, "in one moment in time, our service members will be feeding and clothing displaced refugees - providing humanitarian assistance. In the next moment, they will be holding two warring tribes apart - conducting peacekeeping operations. Finally, they will be fighting a highly lethal mid-intensity battle. All on the same day, all within three city blocks. It will be what we call the three block war." In. Krulak, Charles. “The Strategic Corporal: Leadership in the Three Block War.” Marine Corps Gazette. Vol 83, No 1. January 1999. pp. 18-22.Figure 1: Architecture of the MOUT WSN.Functional requirements point to the use of the following sensor types:•Presence/Intrusion (e.g., based on a combination of infrared, photoelectric, laser, acoustic, vibration, etc.);•Ranging3 (e.g., RADAR, LIDAR, ultrasonic, etc.);•Imaging (including infrared and LADAR imaging)4;•Noise (acoustic sensor able to produce an audio stream);•Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) and Toxic Industrial Material (TIM) detectors.Presence/intrusion sensors doubtless constitute the most useful type of sensor for this scenario. Ranging and Imaging (which can also be used as presence sensors) come next as extra means to increase situation awareness. CBRNE and TIM sensors will also be useful to equip robots, once they become available with the required degrees of miniaturization and effectiveness, which still present many issues and currently constitute active research topics.3 Ranging sensors can sometimes be used as presence sensors.4 Imaging sensors can sometimes be used as presence sensors.Intrusion and CBRNE/TIM detectors are the most suitable to operate as alarm triggers. Imaging, noise and ranging sensors present special requirements demanding them to be more capable than other sensors in terms of processing, communications and energy capabilities.The identified distribution patterns – which greatly rely on multicast and multiple reverse-multicast – and the fact that there is potentially more than one sink, point to a WSN topology that consists of the overlay of several trees, where each sink node forms the root of one element tree.The density of sensor deployment, network longevity, the nature and size of the area to be covered, constitute important factors that define the required number of nodes and the selected communication technology. Most often, these factors result into multi-tier heterogeneous network solutions, integrating different wireless technologies, each with its own advantages and constraints in terms of energy consumption, range, data rate, latency, etc. Common examples are IEEE 802.15.4 [3] and IEEE 802.11 [4] (see Figure 2). Presence/intrusion and CBRNE/TIM sensors provide the worst case, asking for greater number and density of sensors and a short-range low-power communications technology such as IEEE 802.15.4 (although for reasons of performance and hop number reduction, a heterogeneous solution might be preferred). Due to their bandwidth requirements, ranging, noise and imaging sensors should be directly connected to high bandwidth backbone networks (e.g., IEEE 802.11).Figure 2: Two-tier MOUT WSN.3 Networking Issues and ChallengesWithin IST FP6 UbiSeq&Sens, “Networking” refers to the functions traditionally expected from the Transport (e.g., Delivery Reliability, Quality of Service and Congestion Control), Network (e.g., Topology Control, Routing) and Data Link (e.g., Medium Access Control – MAC –, link reliability) layers. Energy-efficiency is another aspect that spans all layers of the WSN protocol stack. In fact, current WSN node constraints prevent the use of complex and demanding IP-based protocol architectures. Close-coupling between the traditional Transport, Network and Data Link layers is required instead. This section provides an overview of the main networking challenges and achievements of IST FP6 UbiSeq&Sens.3.1 Transport LayerIn order to characterise QoS requirements, several data flows were identified and characterised according to the following factors (see Table 1):•Source (sinks or sensors);•Destination (sinks or sensors);•Traffic distribution pattern (Unicast, Multicast, Reverse-Multicast5, Broadcast, Geocast6); •Traffic generation pattern (on-demand, alarm driven, periodic);•Delay sensitivity: High (less than 5 s) or Low (less than a few tens of seconds);Table 1: Data flows identified for the MOUT WSN.Source Destination TrafficDistributionTrafficGenerationDelaySensitivityIntrusion report Sensor Sink Ucast/RMcast all High CBRNE report Sensor Sink Ucast/RMcast all High Ranging report Sensor Sink Ucast/RMcast all HighImaging / Noisereport Sensor Sink Ucast/RMcast all LowWSN status Sensor Sink Ucast / RMcast On-demand AverageData request Sink Sensor Ucast / Mcast /Bcast / GcastOn-demand HighConfiguration command Sink Sensor Ucast / Mcast /Bcast / GcastOn-demand LowSome data flows require guaranteed delivery. However, not all data requires full reliability, a fact that can be exploited to increase transport efficiency. For example in alarm triggering sensors, abrupt measurement change reports require full reliability. Where measurements are stable within well-defined bounds, periodic reporting can tolerate some loss, which means that these reports can be sent with partial (< 100%) reliability. The transport mechanisms must be flexible enough to adapt to the best trade-off between reliability and efficiency. Table 2 shows the different reliability requirements envisaged for each type of data flow, taking into account the following factors:•Reliability grade (none, partial, total): Partial reliability requires a lower amount of resources.•Reliability mode: Message-oriented (reliability looks at individual messages) or timeliness-oriented (most recent messages replace older ones in a flow). Timeliness-oriented reliability requires a lower amount of resources.5 Also designated Convergecast.6 Geocast is a form of location-based broadcast in which a packet is broadcast to every node within a defined geographical area.Table 2: Reliability requirements.Reliability grade Reliability modeIntrusion report On-Demand / Alarm / End of Alarm: TotalPeriodic reporting within bounds: PartialOn-Demand / Alarm / End ofAlarm: Message-oriented Periodic reporting within bounds: Timeliness-orientedCBRNE report On-Demand / Alarm / End of Alarm: TotalPeriodic reporting within bounds: PartialOn-Demand / Alarm / End ofAlarm: Message-oriented Periodic reporting within bounds: Timeliness-orientedRanging report Total Timeliness-orientedImaging / Noisereport Total or Partial (depends on error resiliencemechanisms implemented by the codecs)Message-orientedWSN status Total Message–oriented Data request Total Message–orientedConfiguration command Total Message–orientedState-of-the-art reliable transport protocols like Pump Slowly, Fetch Quickly (PSFQ) [5] or Reliable Multi-Segment Transport (RMST) [6] are not designed to offer this degree of flexibility. On the other hand, Event-to-Sink Reliable Transport ERST) [7] supports partial reliability but presents efficiency issues that make it unpractical for utilization in real WSNs. This is the reason why the ongoing development of new reliable and efficient transport protocol is regarded as one of the main networking challenges in IST FP6 UbiSec&Sens. An initial specification of a Distributed Transport for Sensor Networks (DTSN) [8] was already produced, but performance evaluation is still ongoing. DTSN bears some resemblance to RMST and PSFQ regarding some basic mechanisms like caching in relay nodes and selective repeat Automatic Repeat Request (ARQ), but includes new functionalities and optimization that confer more flexibility and efficiency. An example of these mechanisms is the support of partial reliability through probabilistic memorization at the source, defined by different classes of service. Performance results have shown that a significant throughput gain can be achieved with partial reliability relative to full reliability (see Figure 3), a feature that can be exploited by some types of flows.Figure 3: Throughput achieved by a service class with 50% of memorization probability at the source,versus 100% reliability.DTSN is also designed to be closely-coupled with routing, although its only requirement is the support of individual node addressing by the routing protocol (see below). An implementation of the DTSN total reliability service in TinyOS 1.1 is already available. The DTSN implementation is now being extended and ported to TinyOS 2.0.3.2 Routing and In-Network ProcessingAn important performance requirement is to minimize the probability of false alarms in intrusion and CBRNE detection (the alarm-triggering sensors). Sensor redundancy can accomplish this, allowing the system to look at the results of the aggregation/fusion of measurements reported by individual sensors covering the same vicinity. An option is to perform aggregation/fusion at the CPs or warfighter terminals, provided that measurement reports from all relevant individual sensors are delivered by the WSN. Another option is to exploit sensor redundancy in a way that also increases network efficiency. This is possible if data aggregation/fusion is performed inside the WSN. In-network processing leads to traffic reduction because only the results of the aggregation/fusion are delivered to the sink nodes instead of individual sensor measurements. When the fused sensor vicinity is large, it is mandatory that sensing sensor nodes are undoubtedly identified with respect to their location, or at least to identify a well defined area from where fused data stem. Election of aggregation/fusion nodes is another issue that must be addressed by the Routing layer.Some operations are performed over specific sensor nodes (e.g. on-demand imaging requests) and some sensor data must bear node-specific positioning information. For other sensor data types – even if geographically referenced – only the result from the fusion/aggregation of data from several nodes is required (e.g. intrusion or CBRNE detection in an area covered by several sensors). When sensor nodes must be individually addressed, a pure data-centric routing architecture such as Directed Diffusion [9] is not enough.A hybrid node-centric / data-centric solution is then necessary. Another important research challenge consists of assuring low-latency energy-efficient routing to/from mobile sinks/sources, which also requires low-level support at the MAC layer. This issues are currently under investigation in IST FP6 UbiSec&Sens.3.3 Medium Access ControlThe low delays required by intrusion and CBRNE alert reports cannot be achieved by the Transport layer only. The maximization of WSN longevity through low duty cycles will likely compromise established delay bounds, even if the Transport and Routing protocols behave optimally. In order to achieve an acceptable trade-off of the low duty-cycle and low delay bound requirements, a new MAC protocol is required, sincestate-of-the-art solutions do not address this issue. This is an area where significant progress has already been made in IST FP6 UbiSec&Sens.A new MAC protocol was developed designated Tone-Propagated MAC (TP-MAC) [10]. In order to achieve low duty cycle, the proposed TP-MAC protocol inherits some important features from other MAC protocols, namely synchronized wake-up periods (S-MAC [11], T-MAC [12], SCP-MAC [13]), and synchronized wake-up-tone announcement of data availability associated with scheduled channel polling (SCP-MAC). However, in TP-MAC the wake-up-tones are propagated across the WSN so that the nodes in the path from source to destination are woken-up as quickly as possible, before the arrival of the heralded data packets. In this way, TP-MAC is able to achieve low delivery latency even if the WSN node duty-cycle is extremely low, preventing or at least ameliorating the early-sleeping problem.TP-MAC is based on the convergecast communication paradigm, assuming that the WSN is organized in a logical tree topology, associated with one sink, which corresponds to the root node. This again imposes some cross-layer constraints on the Network (i.e. Routing) layer, which is not a real limitation, since most typical WSN scenarios require convergecast of sensor data towards sink nodes. In fact, TP-MAC supports topologies with more than one sink node, though at the cost of some energy-efficiency. The detailed multi-sink support mechanism will not be explained in detail due to space limitations.In a tree-structure rooted at the sink node, it is possible to define different levels defined by the minimum hop distance relative to the sink node. In this way, the sink node constitutes level 0 and the level number increases as hop distance to the sink node increases. The establishment of network levels is at the core of the wake-up-tone propagation mechanism.TP-MAC establishes super-frame periods for channel access, each starting by a synchronization wake-up-tone and two wake-up-tone propagation windows (upstream and downstream), followed by a data transmission window (see Figure 4). The size of the tone propagation window can be different for upstream and downstream, depending on the latency requirements. The channel access method in the transmission window can be based on any MAC protocol, e.g. plain CSMA/CA, S-MAC, T-MAC, SCP-MAC, etc.The synchronization tone marks the beginning of the super-frame structure. This tone is periodically activated by the sink node and slowly propagated downstream to announce the transmission of a broadcast synchronizing/re-synchronizing SYNC packet in the data transmission window. The details of synchronization establishment/maintenance will also not be explained in this paper due to space limitations. The wake-up-tone propagation windows allow the announcement of data and establishment of fast paths from source to destination.When no data traffic is generated, each node only has to poll the channel once in each wake-up-tone propagation window (only in the slot that corresponds to its level), and sometimes also in the synchronization slot. The nodes are allowed to sleep during the rest of the super-frame.When a node has data to transmit, it first sends a wake-up upstream tone (e.g., for sensing data destined to the sink node), or a waking downstream tone (e.g., for control messages issued by the sink node to sensor nodes). The wake-up-tone propagation window structure guarantees that nearby nodes in the next upper/lower level listen to the generated wake-up-tone. They then propagate the tone upstream/downstream, as it can be seen in the tone propagation windows of Fig. 1. If a node detects a wake-up-tone in the last slot of a propagation window, then it shall only propagate it in the next super-frame. The tone propagation mechanism, which resembles the data propagation mechanism of D-MAC [14], assures that nodes within some hop distance are woken-up in just one operation cycle, forming a fast-path before actual data arrives. The maximum distance that a wake-up tone can reach in a single super-frame is equal to the number of tones in each tone propagation window, which is a configuration parameter.The nodes that form a fast path stay active in the data transmission window, for a pre-defined time interval, which is dimensioned to keep those nodes active until the announced data arrives. The timeout mechanism is similar to that defined in T-MAC.TP-MAC nodes only poll the media for a number slightly above two times per cycle (two polls, respectively for upstream and downstream propagated tones in each super-frame, and more seldom for the synchronization/re-synchronization tone), propagating the wake-up tones fast and deeply through the network (and thus opening fast data transmission paths). In this way it is possible to achieve low latencies simultaneously with low duty cycles.Tone listening slot Tone transmission slot Frame transmission (includes contention period) S1 S2 Sn Synchronization toneFigure 4: TP-MAC super-frame structure and wake-up-tone propagation.An analytical model was developed to compare TP-MAC with SCP-MAC, under the assumption that SCP-MAC is used by TP-MAC for data transmission. This model addresses the relationship between duty-cycle during periods without traffic, and the minimum latency that can be achieved once the first packet of an active stream is generated.Figure 5 shows the ratio between the duty cycles of TP-MAC and SCP-MAC as a percentage, for different numbers of hops, and different sizes of the wake-up-tone propagation window. Other TP-MAC parameters are the following: number of transmission slots: 10; synchronization tone period: 5 cycles. It is worth to note that TP-MAC duty cycle decreases with increasing number of hops, but its energy efficiency gain with respect to SCP-MAC stabilizes for high numbers of hops. It is also shown that higher number of tones can give higher energy efficiency gain. For instance, for 10 tones, we can obtain a duty cycle as low as 22% of the SCP-MAC duty cycle, for large network sizes.Figure 5: Ratio between the duty cycles of TP-MAC and SCP-MAC as a function of the number of hopsand the size of the wake-up-tone propagation window.The development of TP-MAC is still not fully completed. Among the remaining issues is the support of efficient mechanisms to deal with sink/source mobility. The INESC team is also developing another MAC protocol, this time based on TDMA principles for implementation simplicity, but incorporating some features of TP-MAC.4 Security Issues and ChallengesInformation and network assurance are vital to the successful conduct of Network Centric Operations. At the WSN level, these requirements are reflected as protection against physical attacks against the network equipment (WSN nodes) or logical attacks against WSN communications. This section will focus on the main issues and technical challenges that these possible attacks entail in a MOUT WSN scenario.4.1 Physical AttacksConsidering the physical attacks it is desired that the capture of one or more nodes of the WSN do not compromise the security of the whole system [15]. Mechanisms must be in place to minimize the probabilities of successful physical tampering of captured WSN nodes on the part of the attacker. Physical analysis of one or more captured WSN nodes by the attacker would expose essential security information such as encryption keys, allowing the attacker to enter and expand its control of the MOUT WSN. This could then be used to passively exploit MOUT WSN sensing data to his own benefit, or otherwise to cause ruptures in MOUT WSN operation.The tampering protection mechanisms implemented in each WSN node must take into account the possible use by the attacker of sophisticated procedures in order to analyse the WSN node. For example, the WSN nodes should have the capability to detect these physical attacks and should self-destruct upon detection of a physical attack. The kind of mechanisms used to detect a physical attack can range from a simple “open box sensor”, or an “acceleration sensor”, or even a “GPS movement sensor”, installed inside the tamper resistant box that contains the WSN node. More sophisticated mechanisms considered for implementation include the detection of environmental actions taken by attackers, namely temperature, clock frequency or voltage decrease/increase beyond the operating range of WSN nodes, so that the sensing and/or communications behaviour of the node become compromised.4.2 Logical AttacksLogical attacks are of more concern than physical attacks because they are not so easily detected. Taking a global view on the logical attacks we can classify them into passive and active attacks [16]. Following is a description of these two kinds of attacks, clearly identifying their target Security Services in the MOUT WSN.Passive attacks are those that simply gather and process the information exchanged between the WSN nodes, and are here designated Passive Man-in-the-Middle attacks. These attacks will likely be targeted at the Confidentiality Security Service of the WSN. To counter this kind of attack a One Time Pad encryption system must be used for all the messages in the WSN, which means that every message in the WSN will be encrypted using a different key. Due to the particularities of WSN communications, and looking at the MOUT WSN in particular, which is mostly alarm-oriented with little traffic being exchanged during normal operation, the simple analysis of network activity may indicate that an alarm condition was triggered. Even if there is network activity in the absence of alarm conditions (e.g. periodic exchange of control messages), since the messages are generally short and some message types may be periodically repeated or at least present very similar content or format, the attacker may be able to identify unusual traffic patterns as indicators of alarm triggering. This is a characteristic that makes WSNs very susceptible to a special kind of Passive Attack that simply relies on the analysis of the traffic pattern of the WSN nodes. In order to counter this, the WSN nodes should send some special messages with the purpose of confusing an attacker performing Traffic Analysis. In addition to this and assuming the use of a different key for each single message, INESC is currently developing a system in which the content of the message is itself reorganized in a way that even for equal messages, the encrypted payload is always different. As result, cryptanalysis of the captured messages becomes twice difficult because even for equal messages encrypted used different keys, the content itself is modified in a unique manner using a different mechanism for each message. We are currently disregarding attacks directed at the system’s encryption key as the latter will never be repeated between different messages. Active attacks, which are here designated Active Man-in-the-Middle attacks, can assume several forms that can be grouped in three main classes:•Forgery of a message to be inserted into the WSN;。