41 research outputs found

    Wireless Cyber-Physical Simulator and Case Studies on Structural Control

    Get PDF
    Abstract: Wireless Structural Control (WSC) systems can play a crucial role in protecting civil infrastructure in the event of earthquakes and other natural disasters. Such systems represent an exemplary class of cyber-physical systems that perform close-loop control using wireless sensor networks. Existing WSC research usually employs wireless sensors installed on small lab structures, which cannot capture realistic delays and data loss in wireless sensor networks deployed on large civil structures. The lack of realistic tools that capture both the cyber (wireless) and physical (structural) aspects of WSC systems has been a hurdle for cyber-physical systems research for civil infrastructure. This advances the state of the art through the following contributions. First, we developed the Wireless Cyber-Physical Simulator (WCPS), an integrated environment that combines realistic simulations of both wireless sensor networks and structures. WCPS integrates Simulink and TOSSIM, a state-of-the-art sensor network simulator featuring a realistic wireless model seeded by signal traces. Second, we performed two realistic case studies each combining a structural model with wireless traces collected from real-world environments. The building study combines a benchmark building model and wireless traces collected from a multi-story building. The bridge study combines the structural model of the Cape Girardea

    A network-aware framework for energy-efficient data acquisition in wireless sensor networks

    Get PDF
    Wireless sensor networks enable users to monitor the physical world at an extremely high fidelity. In order to collect the data generated by these tiny-scale devices, the data management community has proposed the utilization of declarative data-acquisition frameworks. While these frameworks have facilitated the energy-efficient retrieval of data from the physical environment, they were agnostic of the underlying network topology and also did not support advanced query processing semantics. In this paper we present KSpot+, a distributed network-aware framework that optimizes network efficiency by combining three components: (i) the tree balancing module, which balances the workload of each sensor node by constructing efficient network topologies; (ii) the workload balancing module, which minimizes data reception inefficiencies by synchronizing the sensor network activity intervals; and (iii) the query processing module, which supports advanced query processing semantics. In order to validate the efficiency of our approach, we have developed a prototype implementation of KSpot+ in nesC and JAVA. In our experimental evaluation, we thoroughly assess the performance of KSpot+ using real datasets and show that KSpot+ provides significant energy reductions under a variety of conditions, thus significantly prolonging the longevity of a WSN

    In-network data acquisition and replication in mobile sensor networks

    Get PDF
    This paper assumes a set of n mobile sensors that move in the Euclidean plane as a swarm. Our objectives are to explore a given geographic region by detecting and aggregating spatio-temporal events of interest and to store these events in the network until the user requests them. Such a setting finds applications in mobile environments where the user (i.e., the sink) is infrequently within communication range from the field deployment. Our framework, coined SenseSwarm, dynamically partitions the sensing devices into perimeter and core nodes. Data acquisition is scheduled at the perimeter, in order to minimize energy consumption, while storage and replication takes place at the core nodes which are physically and logically shielded to threats and obstacles. To efficiently identify the nodes laying on the perimeter of the swarm we devise the Perimeter Algorithm (PA), an efficient distributed algorithm with a low communication complexity. For storage and fault-tolerance we devise the Data Replication Algorithm (DRA), a voting-based replication scheme that enables the exact retrieval of values from the network in cases of failures. We also extend DRA with a spatio-temporal in-network aggregation scheme based on minimum bounding rectangles to form the Hierarchical-DRA (HDRA) algorithm, which enables the approximate retrieval of events from the network. Our trace-driven experimentation shows that our framework can offer significant energy reductions while maintaining high data availability rates. In particular, we found that when failures across all nodes are less than 60%, our framework can recover over 80% of detected values exactly

    Design And Evaluation of Flexibility-Based Structural Damage Localization Using Wireless Sensor Networks

    Get PDF
    The health of civil structures is very important and sometimes life-critical. While there are different ways to monitor their health, wireless sensor network: WSN) has the advantage of easy deployment and low cost, which make it feasible for most structures. We designed and implemented a system to localize damages on structures with a WSN by detecting the change in structure flexibility. This method has been validated to work well on bridges like a cantilever beam and a truss. It is also possible to be extended to other type of structures. Different from other systems, in network data processing was applied to lower the bandwidth requirement of large amount of raw sensing data. Only the intermediate computation results, that capture the flexibility related information, were transmitted back to the base station. We also divide the detection and localization into multiple levels. Lower level acts as the sentinel to detect the existence of damage; and higher levels, which consume more energy, are then triggered when necessary to get a higher resolution of localization. This design helps to further extend the lifetime of the system

    Analysis and comparison of security protocols in wireless sensor networks

    Get PDF
    Abstract-Wireless sensor networks are widely used in several application domains thanks to their data acquisition and processing capabilities and their decentralized and self-organizing nature. A widely distributed monitoring system is typically characterized by different security requirements that should be addressed by means of specific security protocols and architectures. Indeed, security solutions should be properly designed as they could have a strong impact on the overall performances. In this paper, we focus our attention on security problems related to the data exchange between sensor nodes and evaluate the performances of two different cryptosystems used to guarantee confidentiality, integrity and authentication requirements

    Cyber-Physical Co-Design of Wireless Control Systems

    Get PDF
    Wireless sensor-actuator network (WSAN) technology is gaining rapid adoption in process industries because of its advantages in lowering deployment and maintenance cost in challenging environments. While early success of industrial WSANs has been recognized, significant potential remains in exploring WSANs as unified networks for industrial plants. This thesis research explores a cyber-physical co-design approach to design wireless control systems. To enable holistic studies of wireless control systems, we have developed the Wireless Cyber-Physical Simulator (WCPS), an integrated co-simulation environment that integrates Simulink and our implementation of WSANs based on the industrial WirelessHART standard. We further develop novel WSAN protocols tailored for advanced control designs for networked control systems. WCPS now works as the first simulator that features both linear and nonlinear physical plant models, state-of-art WirelessHART protocol stack, and realistic wireless network characteristics. A realistic wireless structural control study sheds light on the challenges of WSC and the limitations of a traditional structural control approach under realistic wireless conditions. Systematic emergency control results demonstrate that our real-time emergency communication approach enables timely emergency handling, while allowing regular feedback control loops to effectively share resources in WSANs during normal operations. A co-joint study of wireless routing and control highlights the importance of the co-design approach of wireless networks and control

    Real-Time and Energy-Efficient Routing for Industrial Wireless Sensor-Actuator Networks

    Get PDF
    With the emergence of industrial standards such as WirelessHART, process industries are adopting Wireless Sensor-Actuator Networks (WSANs) that enable sensors and actuators to communicate through low-power wireless mesh networks. Industrial monitoring and control applications require real-time communication among sensors, controllers and actuators within end-to-end deadlines. Deadline misses may lead to production inefficiency, equipment destruction to irreparable financial and environmental impacts. Moreover, due to the large geographic area and harsh conditions of many industrial plants, it is labor-intensive or dan- gerous to change batteries of field devices. It is therefore important to achieve long network lifetime with battery-powered devices. This dissertation tackles these challenges and make a series of contributions. (1) We present a new end-to-end delay analysis for feedback control loops whose transmissions are scheduled based on the Earliest Deadline First policy. (2) We propose a new real-time routing algorithm that increases the real-time capacity of WSANs by exploiting the insights of the delay analysis. (3) We develop an energy-efficient routing algorithm to improve the network lifetime while maintaining path diversity for reliable communication. (4) Finally, we design a distributed game-theoretic algorithm to allocate sensing applications with near-optimal quality of sensing

    Solutions and Tools for Secure Communication in Wireless Sensor Networks

    Get PDF
    Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of security material, and effective prevention and reaction against security threats and attacks. However, WSNs are mainly composed of resource-constrained devices. That is, network nodes feature reduced capabilities, especially in terms of memory storage, computing power, transmission rate, and energy availability. As a consequence, assuring secure communication in WSNs results to be more difficult than in other kinds of network. In fact, trading effectiveness of adopted solutions with their efficiency becomes far more important. In addition, specific device classes or technologies may require to design ad hoc security solutions. Also, it is necessary to efficiently manage security material, and dynamically cope with changes of security requirements. Finally, security threats and countermeasures have to be carefully considered since from the network design phase. This Ph.D. dissertion considers secure communication in WSNs, and provides the following contributions. First, we provide a performance evaluation of IEEE 802.15.4 security services. Then, we focus on the ZigBee technology and its security services, and propose possible solutions to some deficiencies and inefficiencies. Second, we present HISS, a highly scalable and efficient key management scheme, able to contrast collusion attacks while displaying a graceful degradation of performance. Third, we present STaR, a software component for WSNs that secures multiple traffic flows at the same time. It is transparent to the application, and provides runtime reconfigurability, thus coping with dynamic changes of security requirements. Finally, we describe ASF, our attack simulation framework for WSNs. Such a tool helps network designers to quantitatively evaluate effects of security attacks, produce an attack ranking based on their severity, and thus select the most appropriate countermeasures

    Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network

    Get PDF
    A medical sensor network can wirelessly monitor vital signs of humans, making it useful for long-term health care without sacrificing patient comfort and mobility. For such a network to be viable, its design must protect data privacy and authenticity given that medical data are highly sensitive. We identify the unique security challenges of such a sensor network and propose a set of resource-efficient mechanisms to address these challenges. Our solution includes (1) a novel two-tier scheme for verifying the authenticity of patient data, (2) a secure key agreement protocol to set up shared keys between sensor nodes and base stations, and (3) symmetric encryption/decryption for protecting data confidentiality and integrity. We have implemented the proposed mechanisms on a wireless mote platform, and our results confirm their feasibility

    Quantifying, generating and mitigating radio interference in Low-Power Wireless Networks

    Get PDF
    Doctoral Programme in Telecommunication - MAP-teleRadio interference a ects the performance of low-power wireless networks (LPWN), leading to packet loss and reduced energy-e ciency, among other problems. Reliability of communications is key to expand application domains for LPWN. Since most LPWN operate in the license-free Industrial Scienti c and Medical (ISM) bands and hence share the spectrum with other wireless technologies, addressing interference is an important challenge. In this context, we present JamLab: a low-cost infrastructure to augment existing LPWN testbeds with accurate interference generation in LPWN testbeds, useful to experimentally investigate the impact of interference on LPWN protocols. We investigate how interference in a shared wireless medium can be mitigated by performing wireless channel energy sensing in low-cost and low-power hardware. For this pupose, we introduce a novel channel quality metric|dubbed CQ|based on availability of the channel over time, which meaningfully quanti es interference. Using data collected from a number of Wi-Fi networks operating in a library building, we show that our metric has strong correlation with the Packet Reception Rate (PRR). We then explore dynamic radio resource adaptation techniques|namely packet size and error correction code overhead optimisations|based on instantaneous spectrum usage as quanti ed by our CQ metric. To conclude, we study emerging fast fading in the composite channel under constructive baseband interference, which has been recently introduced in low-power wireless networks as a promising technique. We show the resulting composite signal becomes vulnerable in the presence of noise, leading to signi cant deterioration of the link, whenever the carriers have similar amplitudes. Overall, our results suggest that the proposed tools and techniques have the potential to improve performance in LPWN operating in the unlicensed spectrum, improving coexistence while maintaining energy-e ciency. Future work includes implementation in next generation platforms, which provides superior computational capacity and more exible radio chip designs.A interferência de r adio afeta o desempenho das redes de comunicação sem o de baixo consumo - low-power wireless networks (LPWN), o que provoca perdas de pacotes, diminuição da e ciência energética, entre outros problemas. A contabilidade das comunicações e importante para a expansão e adoção das LPWN nos diversos domínios de potencial aplicação. Visto que a grande maioria das LPWN partilham o espectro radioelétrico com outras redes sem o, a interferência torna-se um desafio importante. Neste contexto, apresentamos o JamLab: uma infraestrutura de baixo custo para estender a funcionalidade dos ambientes laboratoriais para o estudo experimental do desempenho das LPWN sob interferência. Resultando, assim, numa ferramenta essencial para a adequada verificação dos protocolos de comunicações das LPWN. Para al em disso, a Tese introduz uma nova técnica para avaliar o ambiente radioelétrico e demostra a sua utilização para gerir recursos disponíveis no transceptor rádio, o que permite melhorar a fiabilidade das comunicações, nomeadamente nas plataformas de baixo consumo, garantindo e ciência energética. Assim, apresentamos uma nova métrica| denominada CQ - concebida especificamente para quantificar a qualidade do canal r adio, com base na sua disponibilidade temporal. Mediante dados adquiridos em v arias redes sem o Wi-Fi, instaladas no edifício de uma biblioteca universitária, demonstra-se que esta métrica tem um ótimo desempenho, evidenciando uma elevada correlação com a taxa de receção de pacotes. Investiga-se ainda a potencialidade da nossa métrica CQ para gerir dinamicamente recursos de radio como tamanho de pacote e taxa de correlação de erros dos códigos - baseado em medições instantâneas da qualidade do canal de radio. Posteriormente, estuda-se um modelo de canal composto, sob interferência construtiva de banda-base. A interferência construtiva de banda-base tem sido introduzida recentemente nas LPWN, evidenciando ser uma técnica prometedora no que diz respeito à baixa latência e à contabilidade das comunicações. Na Tese investiga-se o caso crítico em que o sinal composto se torna vulnerável na presença de ruído, o que acaba por deteriorar a qualidade da ligação, no caso em que as amplitudes das distintas portadoras presentes no receptor sejam similares. Finalmente, os resultados obtidos sugerem que as ferramentas e as técnicas propostas têm potencial para melhorar o desempenho das LPWN, num cenário de partilha do espectro radioelétrico com outras redes, melhorando a coexistência e mantendo e ciência energética. Prevê-se como trabalho futuro a implementação das técnicas propostas em plataformas de próxima geração, com maior flexibilidade e poder computacional para o processamento dos sinais rádio.This work was supported by FCT (Portuguese Foundation for Science and Technology) and by ESF (European Social Fund) through POPH (Portuguese Human Potential Operational Program), under PhD grant SFRH/BD/62198/2009; also by FCT under project ref. FCOMP-01-0124-FEDER-014922 (MASQOTS), and EU through the FP7 programme, under grant FP7-ICT-224053 (CONET)
    corecore