2,225 research outputs found

    The Application of Sensors on Guardrails for the Purpose of Real Time Impact Detection

    Get PDF
    The United States roadway system has deteriorated over time due to its age, increasing delays in completing preventative maintenance, and the lack of timely repairs following damage to the infrastructure. Proper asset management drives the need for generalized methods to integrate new sensing capabilities into existing Intelligent Transportation Systems in a time efficient and cost effective manner. In this thesis, we present a methodology for the deployment of new sensors into an existing ITS system. The proposed methodology employs a three phase approach that incorporates data modeling, spatial analysis in Geographic Information Systems, and cost optimization to provide enhanced decision support when deploying new sensing capabilities within an existing ITS. Additionally, we also demonstrate the usefulness of computing while integrating these new sensors using a guardrail sensor case study and focusing on data modeling. The results of the three phase methodology demonstrate an effective means for planning new sensor deployments by analyzing tradeoffs in equipment selection yielding the minimum cost solution for a given set of requirements. Furthermore, the results of the data models demonstrate necessary considerations that must be made with a systems engineering method. The data models accomplish this while accounting for asset management principles taking a systematic approach and incorporating engineering principles

    Underground Mining Monitoring and Communication Systems based on ZigBee and GIS

    Get PDF
    ZigBee as a wireless sensor network (WSN) was developed for underground mine monitoring and communication systems. The radio wave attenuations between ZigBee nodes were investigated to measure underground communication distances. Various sensor node arrangements of ZigBee topologies were evaluated. A system integration of a WSN-assisted GIS for underground mining monitoring and communication from a surface office was proposed. The controllable and uncontrollable parameters of underground environments were assessed to establish a reliable ZigBee network

    Design and Performance Analysis of Genetic Algorithms for Topology Control Problems

    Full text link
    In this dissertation, we present a bio-inspired decentralized topology control mechanism, called force-based genetic algorithm (FGA), where a genetic algorithm (GA) is run by each autonomous mobile node to achieve a uniform spread of mobile nodes and to provide a fully connected network over an unknown area. We present a formal analysis of FGA in terms of convergence speed, uniformity at area coverage, and Lyapunov stability theorem. This dissertation emphasizes the use of mobile nodes to achieve a uniform distribution over an unknown terrain without a priori information and a central control unit. In contrast, each mobile node running our FGA has to make its own movement direction and speed decisions based on local neighborhood information, such as obstacles and the number of neighbors, without a centralized control unit or global knowledge. We have implemented simulation software in Java and developed four different testbeds to study the effectiveness of different GA-based topology control frameworks for network performance metrics including node density, speed, and the number of generations that GAs run. The stochastic behavior of FGA, like all GA-based approaches, makes it difficult to analyze its convergence speed. We built metrically transitive homogeneous and inhomogeneous Markov chain models to analyze the convergence of our FGA with respect to the communication ranges of mobile nodes and the total number of nodes in the system. The Dobrushin contraction coefficient of ergodicity is used for measuring convergence speed for homogeneous and inhomogeneous Markov chain models of our FGA. Furthermore, convergence characteristic analysis helps us to choose the nearoptimal values for communication range, the number of mobile nodes, and the mean node degree before sending autonomous mobile nodes to any mission. Our analytical and experimental results show that our FGA delivers promising results for uniform mobile node distribution over unknown terrains. Since our FGA adapts to local environment rapidly and does not require global network knowledge, it can be used as a real-time topology controller for commercial and military applications

    Emerging Communications for Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are deployed in a rapidly increasing number of arenas, with uses ranging from healthcare monitoring to industrial and environmental safety, as well as new ubiquitous computing devices that are becoming ever more pervasive in our interconnected society. This book presents a range of exciting developments in software communication technologies including some novel applications, such as in high altitude systems, ground heat exchangers and body sensor networks. Authors from leading institutions on four continents present their latest findings in the spirit of exchanging information and stimulating discussion in the WSN community worldwide

    Whether and Where to Code in the Wireless Relay Channel

    Full text link
    The throughput benefits of random linear network codes have been studied extensively for wirelined and wireless erasure networks. It is often assumed that all nodes within a network perform coding operations. In energy-constrained systems, however, coding subgraphs should be chosen to control the number of coding nodes while maintaining throughput. In this paper, we explore the strategic use of network coding in the wireless packet erasure relay channel according to both throughput and energy metrics. In the relay channel, a single source communicates to a single sink through the aid of a half-duplex relay. The fluid flow model is used to describe the case where both the source and the relay are coding, and Markov chain models are proposed to describe packet evolution if only the source or only the relay is coding. In addition to transmission energy, we take into account coding and reception energies. We show that coding at the relay alone while operating in a rateless fashion is neither throughput nor energy efficient. Given a set of system parameters, our analysis determines the optimal amount of time the relay should participate in the transmission, and where coding should be performed.Comment: 11 pages, 12 figures, to be published in the IEEE JSAC Special Issue on Theories and Methods for Advanced Wireless Relay

    Security techniques for sensor systems and the Internet of Things

    Get PDF
    Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We develop nesCheck, a novel approach that combines static analysis and dynamic checking to efficiently enforce memory safety on TinyOS applications. As security guarantees come at a cost, determining which resources to protect becomes important. Our solution, OptAll, leverages game-theoretic techniques to determine the optimal allocation of security resources in IoT networks, taking into account fixed and variable costs, criticality of different portions of the network, and risk metrics related to a specified security goal. Monitoring IoT devices and sensors during operation is necessary to detect incidents. We design Kalis, a knowledge-driven intrusion detection technique for IoT that does not target a single protocol or application, and adapts the detection strategy to the network features. As the scale of IoT makes the devices good targets for botnets, we design Heimdall, a whitelist-based anomaly detection technique for detecting and protecting against IoT-based denial of service attacks. Once our monitoring tools detect an attack, determining its actual cause is crucial to an effective reaction. We design a fine-grained analysis tool for sensor networks that leverages resident packet parameters to determine whether a packet loss attack is node- or link-related and, in the second case, locate the attack source. Moreover, we design a statistical model for determining optimal system thresholds by exploiting packet parameters variances. With our techniques\u27 diagnosis information, we develop Kinesis, a security incident response system for sensor networks designed to recover from attacks without significant interruption, dynamically selecting response actions while being lightweight in communication and energy overhead

    Fine-Grained Reliability for V2V Communications around Suburban and Urban Intersections

    Full text link
    Safe transportation is a key use-case of the 5G/LTE Rel.15+ communications, where an end-to-end reliability of 0.99999 is expected for a vehicle-to-vehicle (V2V) transmission distance of 100-200 m. Since communications reliability is related to road-safety, it is crucial to verify the fulfillment of the performance, especially for accident-prone areas such as intersections. We derive closed-form expressions for the V2V transmission reliability near suburban corners and urban intersections over finite interference regions. The analysis is based on plausible street configurations, traffic scenarios, and empirically-supported channel propagation. We show the means by which the performance metric can serve as a preliminary design tool to meet a target reliability. We then apply meta distribution concepts to provide a careful dissection of V2V communications reliability. Contrary to existing work on infinite roads, when we consider finite road segments for practical deployment, fine-grained reliability per realization exhibits bimodal behavior. Either performance for a certain vehicular traffic scenario is very reliable or extremely unreliable, but nowhere in relatively proximity to the average performance. In other words, standard SINR-based average performance metrics are analytically accurate but can be insufficient from a practical viewpoint. Investigating other safety-critical point process networks at the meta distribution-level may reveal similar discrepancies.Comment: 27 pages, 6 figures, submitted to IEEE Transactions on Wireless Communication
    corecore