3 research outputs found

    Verification and Validation of Sensor Networks

    Get PDF
    Sensor networks play an increasingly important role in critical systems infrastructure and should be correct, reliable and robust. In order to achieve these performance goals, it is necessary to verify the correctness of system software and to validate the more broadly defined world and system models. This includes: * Physical Phenomena (PDE models, statistical models, etc.), * Signals (Equations of state, physical properties, etc.), * Sensors (Physics models, noise models, etc.), * Hardware (Failure models, power consumption models, etc.), * RF (Antenna models, bandwidth, delay, propagation, etc.), * Embedded Code (Correctness, complexity, context), * Distributed Algorithms (Correctness, concurrency models, etc.), * Overall Sensor Network and Environment Models (Percolation theory, wave theory, information theory, simulation, etc.). We outline some of the V & V issues involved in the various aspects of sensor networks as well as possible approaches to their development and application both in simulation and in operational deployed systems

    Computational sensor networks

    Get PDF
    technical reportWe propose Computational Sensor Networks as a methodology to exploit models of physical phenomena in order to better understand the structure of the sensor network. To do so, it is necessary to relate changes in the sensed variables (e.g., temperature) to the aspect of interest in the sensor network (e.g., sensor node position, sensor bias, etc.), and to develop a computational method for its solution. As examples, we describe the use of the heat equation to solve (1) the sensor localization problem, and (2) the sensor bias problem. Simulation and physical experiments are described

    A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop

    No full text
    Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs) refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow between different subsystems and components is across a communication network, which forms a closed-loop. New generation sensor networks are found in a growing number of applications and have received increasing attention from many inter-disciplines. Opportunities and challenges in the design, analysis, verification and validation of sensor networks co-exists, among which security and privacy are two important ingredients. This paper presents a survey on some recent results in the security and privacy aspects of emerging sensor networks from the viewpoint of the closed-loop. This paper also discusses several future research directions under these two umbrellas
    corecore