68 research outputs found

    On the problem of energy efficiency of multi-hop vs one-hop routing in wireless sensor networks

    Get PDF
    The hop distance strategy in wireless sensor networks (WSNs) has a major impact on energy consumption of each sensor mote. Long-hop routing minimizes reception cost. However, a substantial power demand is incurred for long distance transmission. Since the transceiver is the major source of power consumption in the node, optimizing the routing for hop length can extend significantly the lifetime of the network. This paper explores when multi-hop routing is more energy efficient than direct transmission to the sink and the conditions for which the two-hop strategy is optimal. Experimental evidence is provided in to support of these conclusions. The tests showed that the superiority of the multi-hop scheme depends on the source-sink distance and reception cost. They also demonstrated that the two- hop strategy is most energy efficient when the relay is at the midpoint of the total transmission radius. Our results may be used in existing routing protocols to select optimal relays or to determine whether it is better to send packets directly to the base station or through intermediate nodes

    Synchronization service integrated into routing layer in wireless sensor networks

    Get PDF
    The time synchronization problem needs to be considered in a distributed system. In Wireless Sensor Networks (WSNs) this issue must be solved with limited computational, communication and energy resources. Many synchronization protocols exist for WSNs. However, in most cases these protocols are independent entities with specific packets, communication scheme and network hierarchy. This solution is not energy efficient. Because it is very rare for synchronization not to be necessary in WSNs, we advocate integrating the synchronization service into the routing layer. We have implemented this approach in a new synchronization protocol called Routing Integrated Synchronization Service (RISS). Our tests show that RISS is very time and energy efficient and also is characterized by a small overhead. We have compared its performance experimentally to that of the FTSP synchronization protocol and it has proved to offer better time precision than the latter protocol

    Cross-layer energy optimisation of routing protocols in wireless sensor networks

    Get PDF
    Recent technological developments in embedded systems have led to the emergence of a new class of networks, known asWireless Sensor Networks (WSNs), where individual nodes cooperate wirelessly with each other with the goal of sensing and interacting with the environment.Many routing protocols have been developed tomeet the unique and challenging characteristics of WSNs (notably very limited power resources to sustain an expected lifetime of perhaps years, and the restricted computation, storage and communication capabilities of nodes that are nonetheless required to support large networks and diverse applications). No standards for routing have been developed yet for WSNs, nor has any protocol gained a dominant position among the research community. Routing has a significant influence on the overall WSN lifetime, and providing an energy efficient routing protocol remains an open problem. This thesis addresses the issue of designing WSN routing methods that feature energy efficiency. A common time reference across nodes is required in mostWSN applications. It is needed, for example, to time-stamp sensor samples and for duty cycling of nodes. Alsomany routing protocols require that nodes communicate according to some predefined schedule. However, independent distribution of the time information, without considering the routing algorithm schedule or network topology may lead to a failure of the synchronisation protocol. This was confirmed empirically, and was shown to result in loss of connectivity. This can be avoided by integrating the synchronisation service into the network layer with a so-called cross-layer approach. This approach introduces interactions between the layers of a conventional layered network stack, so that the routing layer may share information with other layers. I explore whether energy efficiency can be enhanced through the use of cross-layer optimisations and present three novel cross-layer routing algorithms. The first protocol, designed for hierarchical, cluster based networks and called CLEAR (Cross Layer Efficient Architecture for Routing), uses the routing algorithm to distribute time information which can be used for efficient duty cycling of nodes. The second method - called RISS (Routing Integrated Synchronization Service) - integrates time synchronization into the network layer and is designed to work well in flat, non-hierarchical network topologies. The third method - called SCALE (Smart Clustering Adapted LEACH) - addresses the influence of the intra-cluster topology on the energy dissipation of nodes. I also investigate the impact of the hop distance on network lifetime and propose a method of determining the optimal location of the relay node (the node through which data is routed in a two-hop network). I also address the problem of predicting the transition region (the zone separating the region where all packets can be received and that where no data can be received) and I describe a way of preventing the forwarding of packets through relays belonging in this transition region. I implemented and tested the performance of these solutions in simulations and also deployed these routing techniques on sensor nodes using TinyOS. I compared the average power consumption of the nodes and the precision of time synchronization with the corresponding parameters of a number of existing algorithms. All proposed schemes extend the network lifetime and due to their lightweight architecture they are very efficient on WSN nodes with constrained resources. Hence it is recommended that a cross-layer approach should be a feature of any routing algorithm for WSNs

    A Cooja-based tool for coverage and fifetime evaluation in an in-building sensor network.

    Get PDF
    Contiki’s Cooja is a very popular wireless sensor network (WSN) simulator, but it lacks support for modelling sensing coverage, focusing instead on network connectivity and protocol performance. However, in practice, it is the ability of a sensor network to provide a satisfactory level of coverage that defines its ultimate utility for end-users. We introduce WSN-Maintain, a Cooja-based tool for coverage and network lifetime evaluation in an in-building WSN. To extend the network lifetime, but still maintain the required quality of coverage, the tool finds coverage redundant nodes, puts them to sleep and automatically turns them on when active nodes fail and coverage quality decreases. WSN-Maintain together with Cooja allow us to evaluate different approaches to maintain coverage. As use cases to the tool, we implement two redundant node algorithms: greedy-maintain, a centralised algorithm, and local-maintain, a localised algorithm to configure the initial network and to turn on redundant nodes. Using data from five real deployments, we show that our tool with simple redundant node algorithms and reading correlation can improve energy efficiency by putting more nodes to sleep

    A Visual Programming Framework for Wireless Sensor Networks in Smart Home Applications

    Get PDF
    International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2015). 7 to 9, Apr, 2015. Singapure, Singapore.In this paper, we build upon the Internet of Things (IoT) paradigm, with aim of delivering networked solutions that enable to connect not only single sensors, but also whole wireless sensor networks (WSN) to the Internet in a secure, simple and efficient way, and describe the design and implementation of a smart-home management system. The system is composed of a lightweight tool with an intuitive user interface for commissioning of IPenabled WSN with constrained capabilities. The solution includes a visual programming interface with a common framework for discovering smart home services on the constrained WSN, and a code analysis and translation engine to generate python code. This engine analyses the application rules defined with the graphical user interface and translates them into distributed application scripts. The system also includes modules to plan the optimization of the deployment, and deploy and start the generated code. A prototype of the system, with the visual programming solution and code generation module developed is presented in this paper

    A Cooja-based tool for maintaining sensor network coverage requirements in a building

    Get PDF
    Contiki's Cooja is a very popular Wireless Sensor Network (WSN) simulator, but it lacks support for modelling sensing coverage. We introduce WSN-Maintain, a Cooja-based tool for maintaining coverage requirements in an in-building WSN. To analyse the coverage of a building, WSN-Maintain takes as input the floorplan of the building, the coverage requirement of each region and the locations of sensor nodes. We take account of the heterogeneity of device specifications in terms of communication capability and sensing coverage. WSN-Maintain is run in parallel with the collect-view tool of Contiki, which was integrated into the Cooja simulator. We show that WSN-Maintain is able to automatically turn on redundant nodes to maintain the coverage requirement when active nodes fail and report failures that require physical maintenance. This tool allows us to evaluate different approaches to maintain coverage, including deferring physical maintenance to reduce operational costs

    Active learning for electrodermal activity classification

    Get PDF
    To filter noise or detect features within physiological signals, it is often effective to encode expert knowledge into a model such as a machine learning classifier. However, training such a model can require much effort on the part of the researcher; this often takes the form of manually labeling portions of signal needed to represent the concept being trained. Active learning is a technique for reducing human effort by developing a classifier that can intelligently select the most relevant data samples and ask for labels for only those samples, in an iterative process. In this paper we demonstrate that active learning can reduce the labeling effort required of researchers by as much as 84% for our application, while offering equivalent or even slightly improved machine learning performance.MIT Media Lab ConsortiumRobert Wood Johnson Foundatio

    Wavelet-based motion artifact removal for electrodermal activity

    Get PDF
    Electrodermal activity (EDA) recording is a powerful, widely used tool for monitoring psychological or physiological arousal. However, analysis of EDA is hampered by its sensitivity to motion artifacts. We propose a method for removing motion artifacts from EDA, measured as skin conductance (SC), using a stationary wavelet transform (SWT). We modeled the wavelet coefficients as a Gaussian mixture distribution corresponding to the underlying skin conductance level (SCL) and skin conductance responses (SCRs). The goodness-of-fit of the model was validated on ambulatory SC data. We evaluated the proposed method in comparison with three previous approaches. Our method achieved a greater reduction of artifacts while retaining motion-artifact-free data

    Detecting deception and suspicion in dyadic game interactions

    Get PDF
    In this paper we focus on detection of deception and suspicion from electrodermal activity (EDA) measured on left and right wrists during a dyadic game interaction. We aim to answer three research questions: (i) Is it possible to reliably distinguish deception from truth based on EDA measurements during a dyadic game interaction? (ii) Is it possible to reliably distinguish the state of suspicion from trust based on EDA measurements during a card game? (iii) What is the relative importance of EDA measured on left and right wrists? To answer our research questions we conducted a study in which 20 participants were playing the game Cheat in pairs with one EDA sensor placed on each of their wrists. Our experimental results show that EDA measures from left and right wrists provide more information for suspicion detection than for deception detection and that the person-dependent detection is more reliable than the person-independent detection. In particular, classifying the EDA signal with Support Vector Machine (SVM) yields accuracies of 52% and 57% for person-independent prediction of deception and suspicion respectively, and 63% and 76% for person-dependent prediction of deception and suspicion respectively. Also, we found that: (i) the optimal interval of informative EDA signal for deception detection is about 1 s while it is around 3.5 s for suspicion detection; (ii) the EDA signal relevant for deception/ suspicion detection can be captured after around 3.0 seconds after a stimulus occurrence regardless of the stimulus type (deception/ truthfulness/suspicion/trust); and that (iii) features extracted from EDA from both wrists are important for classification of both deception and suspicion. To the best of our knowledge, this is the firstwork that uses EDA data to automatically detect both deception and suspicion in a dyadic game interaction setting.N

    Counting stars: contribution of early career scientists to marine and fisheries sciences

    Get PDF
    Scientific careers and publishing have radically changed in recent decades creating an increasingly competitive environment for early career scientists (ECS). The lack of quantitative data available on ECS in marine and fisheries sciences prevents direct assessment of the consequences of increased competitiveness. We assessed the contributions of ECS (up to 6 years post first publication) to the field using an indirect approach by investigating the authorships of peer-reviewed articles. We analysed 118461 papers published by 184561 authors in the top 20 marine and fisheries sciences journals over the years 1991–2020. We identified a positive long-term trend in the proportion of scientific articles (co-)authored by ECS. This suggests a growing contribution by ECS to publications in the field. However, the mean proportion of ECS (co-)authors within one publication declined significantly over the study period. Subsequent tests demonstrated that articles with ECS (co-)authors receive fewer citations and that the proportion of ECS (co-)authors on an article has a significant negative effect on the number of citations. We discuss the potential causes of these inequalities and urge systematic support to ECS to achieve more balanced opportunities for funding and publishing between ECS and senior scientists
    corecore