95,298 research outputs found

    Adding Network Coding Capabilities to the WSNet Simulator

    Get PDF
    This technical report presents the implementation of a Network Coding module in WSNet - a Wireless Sensor Network simulator. This implementation provides a generic programming interface to allow an easy specialization of different coding strategies: random, source/destination-oriented, intra/inter-flow, etc

    Cross-level sensor network simulation with COOJA

    Get PDF
    Simulators for wireless sensor networks are a valuable tool for system development. However, current simulators can only simulate a single level of a system at once. This makes system development and evolution difficult since developers cannot use the same simulator for both high-level algorithm development and low-level development such as device-driver implementations. We propose cross-level simulation, a novel type of wireless sensor network simulation that enables holistic simultaneous simulation at different levels. We present an implementation of such a simulator, COOJA, a simulator for the Contiki sensor node operating system. COOJA allows for simultaneous simulation at the network level, the operating system level, and the machine code instruction set level. With COOJA, we show the feasibility of the cross-level simulation approach

    VLIT NODE Sensor Technology and Prefarm

    Get PDF
    Precision farming systems are based on a detailed monitoring of information and data that are necessary for successful decision-making in crop production. The system is designed for data collection from several resources. In past years an extensive research and development work has been done in the field of wireless sensor networks (WSN) in the world. When a wireless sensor network (WSN) is used for agricultural purposes, it has to provide first of all a long-reach signal. The present paper describes new long distance RFID based technology implementation - VLIT NODE.Wireless Sensor Network, Precision Agriculture, RFID., Research and Development/Tech Change/Emerging Technologies, Research Methods/ Statistical Methods, GA, IN,

    Decentralized event-triggered control over wireless sensor/actuator networks

    Full text link
    In recent years we have witnessed a move of the major industrial automation providers into the wireless domain. While most of these companies already offer wireless products for measurement and monitoring purposes, the ultimate goal is to be able to close feedback loops over wireless networks interconnecting sensors, computation devices, and actuators. In this paper we present a decentralized event-triggered implementation, over sensor/actuator networks, of centralized nonlinear controllers. Event-triggered control has been recently proposed as an alternative to the more traditional periodic execution of control tasks. In a typical event-triggered implementation, the control signals are kept constant until the violation of a condition on the state of the plant triggers the re-computation of the control signals. The possibility of reducing the number of re-computations, and thus of transmissions, while guaranteeing desired levels of performance makes event-triggered control very appealing in the context of sensor/actuator networks. In these systems the communication network is a shared resource and event-triggered implementations of control laws offer a flexible way to reduce network utilization. Moreover reducing the number of times that a feedback control law is executed implies a reduction in transmissions and thus a reduction in energy expenditures of battery powered wireless sensor nodes.Comment: 13 pages, 3 figures, journal submissio

    Wireless and Physical Security via Embedded Sensor Networks

    Full text link
    Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the physical location of the offending party, as opposed to its possibly spoofed (MAC addresses) identity in cyber space. Traditional Wireless Network Security Systems are still heavily anchored in the digital plane of "cyber space" and hence cannot be used reliably or effectively to derive the physical identity of an intruder in order to prevent further malicious wireless broadcasts, for example by escorting an intruder off the premises based on physical evidence. In this paper, we argue that Embedded Sensor Networks could be used effectively to bridge the gap between digital and physical security planes, and thus could be leveraged to provide reciprocal benefit to surveillance and security tasks on both planes. Toward that end, we present our recent experience integrating wireless networking security services into the SNBENCH (Sensor Network workBench). The SNBENCH provides an extensible framework that enables the rapid development and automated deployment of Sensor Network applications on a shared, embedded sensing and actuation infrastructure. The SNBENCH's extensible architecture allows an engineer to quickly integrate new sensing and response capabilities into the SNBENCH framework, while high-level languages and compilers allow novice SN programmers to compose SN service logic, unaware of the lower-level implementation details of tools on which their services rely. In this paper we convey the simplicity of the service composition through concrete examples that illustrate the power and potential of Wireless Security Services that span both the physical and digital plane.National Science Foundation (CISE/CSR 0720604, ENG/EFRI 0735974, CIES/CNS 0520166, CNS/ITR 0205294, CISE/ERA RI 0202067

    Analysis of Energy Consumption Performance towards Optimal Radioplanning of Wireless Sensor Networks in Heterogeneous Indoor Environments

    Get PDF
    In this paper the impact of complex indoor environment in the deployment and energy consumption of a wireless sensor network infrastructure is analyzed. The variable nature of the radio channel is analyzed by means of deterministic in-house 3D ray launching simulation of an indoor scenario, in which wireless sensors, based on an in-house CyFi implementation, typically used for environmental monitoring, are located. Received signal power and current consumption measurement results of the in-house designed wireless motes have been obtained, stating that adequate consideration of the network topology and morphology lead to optimal performance and power consumption reduction. The use of radioplanning techniques therefore aid in the deployment of more energy efficient elements, optimizing the overall performance of the variety of deployed wireless systems within the indoor scenario

    THAWS: automated wireless sensor network development and deployment

    Get PDF
    This research focuses on the design and implementation of a tool to speed-up the development and deployment of heterogeneous wireless sensor networks. The THAWS (Tyndall Heterogeneous Automated Wireless Sensors) tool can be used to quickly create and configure application-specific sensor networks. THAWS presents the user with a choice of options, in order to characterise the desired functionality of the network. With this information, THAWS generates the necessary code from pre-written templates and well-tested, optimized software modules. This is then automatically compiled to form binary files for each node in the network. Wireless programming of the network completes the task of targeting the wireless network towards a specific sensing application. THAWS is an adaptable tool that works with both homogeneous and heterogeneous networks built from wireless sensor nodes that have been developed in the Tyndall National Institute

    Transmission Power Scheduling for Energy Harvesting Sensor in Remote State Estimation

    Get PDF
    We study remote estimation in a wireless sensor network. Instead of using a conventional battery-powered sensor, a sensor equipped with an energy harvester which can obtain energy from the external environment is utilized. We formulate this problem into an infinite time-horizon Markov decision process and provide the optimal sensor transmission power control strategy. In addition, a sub-optimal strategy which is easier to implement and requires less computation is presented. A numerical example is provided to illustrate the implementation of the sub-optimal policy and evaluation of its estimation performance.Comment: Extended version of article to be published in the Proceedings of the 19th IFAC World Congress, 201
    • 

    corecore