3 research outputs found
Verification and Validation of Sensor Networks
Sensor networks play an increasingly important role in critical systems infrastructure and
should be correct, reliable and robust. In order to achieve these performance goals, it is
necessary to verify the correctness of system software and to validate the more broadly
defined world and system models. This includes:
* Physical Phenomena (PDE models, statistical models, etc.),
* Signals (Equations of state, physical properties, etc.),
* Sensors (Physics models, noise models, etc.),
* Hardware (Failure models, power consumption models, etc.),
* RF (Antenna models, bandwidth, delay, propagation, etc.),
* Embedded Code (Correctness, complexity, context),
* Distributed Algorithms (Correctness, concurrency models, etc.),
* Overall Sensor Network and Environment Models (Percolation
theory, wave theory, information theory, simulation, etc.).
We outline some of the V & V issues involved in the various aspects of sensor networks
as well as possible approaches to their development and application both in simulation
and in operational deployed systems
Computational sensor networks
technical reportWe propose Computational Sensor Networks as a methodology to exploit models of physical phenomena in order to better understand the structure of the sensor network. To do so, it is necessary to relate changes in the sensed variables (e.g., temperature) to the aspect of interest in the sensor network (e.g., sensor node position, sensor bias, etc.), and to develop a computational method for its solution. As examples, we describe the use of the heat equation to solve (1) the sensor localization problem, and (2) the sensor bias problem. Simulation and physical experiments are described
A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop
Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs) refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow between different subsystems and components is across a communication network, which forms a closed-loop. New generation sensor networks are found in a growing number of applications and have received increasing attention from many inter-disciplines. Opportunities and challenges in the design, analysis, verification and validation of sensor networks co-exists, among which security and privacy are two important ingredients. This paper presents a survey on some recent results in the security and privacy aspects of emerging sensor networks from the viewpoint of the closed-loop. This paper also discusses several future research directions under these two umbrellas