Wireless sensor network

(Redirected from Sensor Networks)

Wireless sensor networks (WSNs) refer to networks of spatially dispersed and dedicated sensors that monitor and record the physical conditions of the environment and forward the collected data to a central location. WSNs can measure environmental conditions such as temperature, sound, pollution levels, humidity and wind.[1]

These are similar to wireless ad hoc networks in the sense that they rely on wireless connectivity and spontaneous formation of networks so that sensor data can be transported wirelessly. WSNs monitor physical conditions, such as temperature, sound, and pressure. Modern networks are bi-directional, both collecting data[2] and enabling control of sensor activity.[3]  The development of these networks was motivated by military applications such as battlefield surveillance.[4] Such networks are used in industrial and consumer applications, such as industrial process monitoring and control and machine health monitoring and agriculture.[5]

A WSN is built of "nodes" – from a few to hundreds or thousands, where each node is connected to other sensors. Each such node typically has several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from a shoebox to (theoretically) a grain of dust, although microscopic dimensions have yet to be realized. Sensor node cost is similarly variable, ranging from a few to hundreds of dollars, depending on node sophistication. Size and cost constraints constrain resources such as energy, memory, computational speed and communications bandwidth. The topology of a WSN can vary from a simple star network to an advanced multi-hop wireless mesh network. Propagation can employ routing or flooding.[6][7]

In computer science and telecommunications, wireless sensor networks are an active research area supporting many workshops and conferences, including International Workshop on Embedded Networked Sensors (EmNetS), IPSN, SenSys, MobiCom and EWSN. As of 2010, wireless sensor networks had deployed approximately 120 million remote units worldwide.[8]

Application

edit

Area monitoring

edit

Area monitoring is a common application of WSNs. In area monitoring, the WSN is deployed over a region where some phenomenon is to be monitored. A military example is the use of sensors to detect enemy intrusion; a civilian example is the geo-fencing of gas or oil pipelines.

Health care monitoring

edit

There are several types of sensor networks for medical applications: implanted, wearable, and environment-embedded. Implantable medical devices are those that are inserted inside the human body. Wearable devices are used on the body surface of a human or just at close proximity of the user. Environment-embedded systems employ sensors contained in the environment. Possible applications include body position measurement, location of persons, overall monitoring of ill patients in hospitals and at home. Devices embedded in the environment track the physical state of a person for continuous health diagnosis, using as input the data from a network of depth cameras, a sensing floor, or other similar devices. Body-area networks can collect information about an individual's health, fitness, and energy expenditure.[9][10] In health care applications the privacy and authenticity of user data has prime importance. Especially due to the integration of sensor networks, with IoT, the user authentication becomes more challenging; however, a solution is presented in recent work.[11]

Habitat monitoring

edit

Wireless sensor networks have been used to monitor various species and habitats, beginning with the Great Duck Island Deployment, including marmots, cane toads in Australia and zebras in Kenya.

Environmental/Earth sensing

edit

There are many applications in monitoring environmental parameters,[12] examples of which are given below. They share the extra challenges of harsh environments and reduced power supply.

Air quality monitoring

edit

Experiments have shown that personal exposure to air pollution in cities can vary a lot.[13] Therefore, it is of interest to have higher temporal and spatial resolution of pollutants and particulates. For research purposes, wireless sensor networks have been deployed to monitor the concentration of dangerous gases for citizens (e.g., in London).[14] However, sensors for gases and particulate matter suffer from high unit-to-unit variability, cross-sensitivities, and (concept) drift.[15] Moreover, the quality of data is currently insufficient for trustworthy decision-making, as field calibration leads to unreliable measurement results, and frequent recalibration might be required. A possible solution could be blind calibration or the usage of mobile references.[16][17]

Forest fire detection

edit

A network of Sensor Nodes can be installed in a forest to detect when a fire has started. The nodes can be equipped with sensors to measure temperature, humidity and gases which are produced by fire in the trees or vegetation. The early detection is crucial for a successful action of the firefighters; thanks to Wireless Sensor Networks, the fire brigade will be able to know when a fire is started and how it is spreading.

Landslide detection

edit

A landslide detection system makes use of a wireless sensor network to detect the slight movements of soil and changes in various parameters that may occur before or during a landslide. Through the data gathered it may be possible to know the impending occurrence of landslides long before it actually happens.

Water quality monitoring

edit

Water quality monitoring involves analyzing water properties in dams, rivers, lakes and oceans, as well as underground water reserves. The use of many wireless distributed sensors enables the creation of a more accurate map of the water status, and allows the permanent deployment of monitoring stations in locations of difficult access, without the need of manual data retrieval.[18]

Natural disaster prevention

edit

Wireless sensor networks can be effective in preventing adverse consequences of natural disasters, like floods. Wireless nodes have been deployed successfully in rivers, where changes in water levels must be monitored in real time.

Industrial monitoring

edit

Machine health monitoring

edit

Wireless sensor networks have been developed for machinery condition-based maintenance (CBM) as they offer significant cost savings and enable new functionality.[19]

Wireless sensors can be placed in locations difficult or impossible to reach with a wired system, such as rotating machinery and untethered vehicles.

Data logging

edit

Wireless sensor networks also are used for the collection of data for monitoring of environmental information.[20] This can be as simple as monitoring the temperature in a fridge or the level of water in overflow tanks in nuclear power plants. The statistical information can then be used to show how systems have been working. The advantage of WSNs over conventional loggers is the "live" data feed that is possible.

Water/waste water monitoring

edit

Monitoring the quality and level of water includes many activities such as checking the quality of underground or surface water and ensuring a country's water infrastructure for the benefit of both human and animal. It may be used to protect the wastage of water.

Structural health monitoring

edit

Wireless sensor networks can be used to monitor the condition of civil infrastructure and related geo-physical processes close to real time, and over long periods through data logging, using appropriately interfaced sensors.

Wine production

edit

Wireless sensor networks are used to monitor wine production, both in the field and the cellar.[21]

Threat detection

edit

The Wide Area Tracking System (WATS) is a prototype network for detecting a ground-based nuclear device[22] such as a nuclear "briefcase bomb." WATS is being developed at the Lawrence Livermore National Laboratory (LLNL). WATS would be made up of wireless gamma and neutron sensors connected through a communications network. Data picked up by the sensors undergoes "data fusion", which converts the information into easily interpreted forms; this data fusion is the most important aspect of the system.[23][obsolete source]

The data fusion process occurs within the sensor network rather than at a centralized computer and is performed by a specially developed algorithm based on Bayesian statistics.[24] WATS would not use a centralized computer for analysis because researchers found that factors such as latency and available bandwidth tended to create significant bottlenecks. Data processed in the field by the network itself (by transferring small amounts of data between neighboring sensors) is faster and makes the network more scalable.[24]

An important factor in WATS development is ease of deployment, since more sensors both improves the detection rate and reduces false alarms.[24] WATS sensors could be deployed in permanent positions or mounted in vehicles for mobile protection of specific locations. One barrier to the implementation of WATS is the size, weight, energy requirements and cost of currently available wireless sensors.[24] The development of improved sensors is a major component of current research at the Nonproliferation, Arms Control, and International Security (NAI) Directorate at LLNL.

WATS was profiled to the U.S. House of Representatives' Military Research and Development Subcommittee on October 1, 1997, during a hearing on nuclear terrorism and countermeasures.[23] On August 4, 1998, in a subsequent meeting of that subcommittee, Chairman Curt Weldon stated that research funding for WATS had been cut by the Clinton administration to a subsistence level and that the program had been poorly re-organized.[25]

Incident monitoring

edit

There are studies that show that using sensors for incident monitoring improve in a great way the response of firefighters and police to an unexpected situation.[26] For an early detection of incidents we can use acoustic sensors to detect a spike in the noise of the city because of a possible accident,[27] or use termic sensors to detect a possible fire.[28]

Supply chains

edit

Using low-power electronics, WSN:s can be cost-efficiently applied also in supply chains in various industries.[29]

Characteristics

edit

The main characteristics of a WSN include

Cross-layer is becoming an important studying area for wireless communications.[33] In addition, the traditional layered approach presents three main problems:

  1. Traditional layered approach cannot share different information among different layers, which leads to each layer not having complete information. The traditional layered approach cannot guarantee the optimization of the entire network.
  2. The traditional layered approach does not have the ability to adapt to the environmental change.
  3. Because of the interference between the different users, access conflicts, fading, and the change of environment in the wireless sensor networks, traditional layered approach for wired networks is not applicable to wireless networks.

So the cross-layer can be used to make the optimal modulation to improve the transmission performance, such as data rate, energy efficiency, quality of service (QoS), etc.[33] Sensor nodes can be imagined as small computers which are extremely basic in terms of their interfaces and their components. They usually consist of a processing unit with limited computational power and limited memory, sensors or MEMS (including specific conditioning circuitry), a communication device (usually radio transceivers or alternatively optical), and a power source usually in the form of a battery. Other possible inclusions are energy harvesting modules,[35] secondary ASICs, and possibly secondary communication interface (e.g. RS-232 or USB).

The base stations are one or more components of the WSN with much more computational, energy and communication resources. They act as a gateway between sensor nodes and the end user as they typically forward data from the WSN on to a server. Other special components in routing based networks are routers, designed to compute, calculate and distribute the routing tables.[36]

Platforms

edit

Hardware

edit

One major challenge in a WSN is to produce low cost and tiny sensor nodes. There are an increasing number of small companies producing WSN hardware and the commercial situation can be compared to home computing in the 1970s. Many of the nodes are still in the research and development stage, particularly their software. Also inherent to sensor network adoption is the use of very low power methods for radio communication and data acquisition.

In many applications, a WSN communicates with a local area network or wide area network through a gateway. The Gateway acts as a bridge between the WSN and the other network. This enables data to be stored and processed by devices with more resources, for example, in a remotely located server. A wireless wide area network used primarily for low-power devices is known as a Low-Power Wide-Area Network (LPWAN).

Wireless

edit

There are several wireless standards and solutions for sensor node connectivity. Thread and Zigbee can connect sensors operating at 2.4 GHz with a data rate of 250 kbit/s. Many use a lower frequency to increase radio range (typically 1 km), for example Z-wave operates at 915 MHz and in the EU 868 MHz has been widely used but these have a lower data rate (typically 50 kbit/s). The IEEE 802.15.4 working group provides a standard for low power device connectivity and commonly sensors and smart meters use one of these standards for connectivity. With the emergence of Internet of Things, many other proposals have been made to provide sensor connectivity. LoRa[37] is a form of LPWAN which provides long range low power wireless connectivity for devices, which has been used in smart meters and other long range sensor applications. Wi-SUN[38] connects devices at home. NarrowBand IOT[39] and LTE-M[40] can connect up to millions of sensors and devices using cellular technology.

Software

edit

Energy is the scarcest resource of WSN nodes, and it determines the lifetime of WSNs. WSNs may be deployed in large numbers in various environments, including remote and hostile regions, where ad hoc communications are a key component. For this reason, algorithms and protocols need to address the following issues:

  • Increased lifespan[41]
  • Robustness and fault tolerance[42]
  • Self-configuration[43]

Lifetime maximization: Energy/Power Consumption of the sensing device should be minimized and sensor nodes should be energy efficient since their limited energy resource determines their lifetime. To conserve power, wireless sensor nodes normally power off both the radio transmitter and the radio receiver when not in use.[33]

Routing protocols

edit

Wireless sensor networks are composed of low-energy, small-size, and low-range unattended sensor nodes. Recently, it has been observed that by periodically turning on and off the sensing and communication capabilities of sensor nodes, we can significantly reduce the active time and thus prolong network lifetime.[44][45] However, this duty cycling may result in high network latency, routing overhead, and neighbor discovery delays due to asynchronous sleep and wake-up scheduling. These limitations call for a countermeasure for duty-cycled wireless sensor networks which should minimize routing information, routing traffic load, and energy consumption. Researchers from Sungkyunkwan University have proposed a lightweight non-increasing delivery-latency interval routing referred as LNDIR. This scheme can discover minimum latency routes at each non-increasing delivery-latency interval instead of each time slot.[clarification needed] Simulation experiments demonstrated the validity of this novel approach in minimizing routing information stored at each sensor. Furthermore, this novel routing can also guarantee the minimum delivery latency from each source to the sink. Performance improvements of up to 12-fold and 11-fold are observed in terms of routing traffic load reduction and energy efficiency, respectively, as compared to existing schemes.[46]

Operating systems

edit

Operating systems for wireless sensor network nodes are typically less complex than general-purpose operating systems. They more strongly resemble embedded systems, for two reasons. First, wireless sensor networks are typically deployed with a particular application in mind, rather than as a general platform. Second, a need for low costs and low power leads most wireless sensor nodes to have low-power microcontrollers ensuring that mechanisms such as virtual memory are either unnecessary or too expensive to implement.

It is therefore possible to use embedded operating systems such as eCos or uC/OS for sensor networks. However, such operating systems are often designed with real-time properties.

TinyOS, developed by David Culler, is perhaps the first operating system specifically designed for wireless sensor networks. TinyOS is based on an event-driven programming model instead of multithreading. TinyOS programs are composed of event handlers and tasks with run-to-completion semantics. When an external event occurs, such as an incoming data packet or a sensor reading, TinyOS signals the appropriate event handler to handle the event. Event handlers can post tasks that are scheduled by the TinyOS kernel some time later.

LiteOS is a newly developed OS for wireless sensor networks, which provides UNIX-like abstraction and support for the C programming language.

Contiki, developed by Adam Dunkels, is an OS which uses a simpler programming style in C while providing advances such as 6LoWPAN and Protothreads.

RIOT (operating system) is a more recent real-time OS including similar functionality to Contiki.

PreonVM[47] is an OS for wireless sensor networks, which provides 6LoWPAN based on Contiki and support for the Java programming language.

Online collaborative sensor data management platforms

edit

Online collaborative sensor data management platforms are on-line database services that allow sensor owners to register and connect their devices to feed data into an online database for storage and also allow developers to connect to the database and build their own applications based on that data. Examples include Xively and the Wikisensing platform Archived 2021-06-09 at the Wayback Machine. Such platforms simplify online collaboration between users over diverse data sets ranging from energy and environment data to that collected from transport services. Other services include allowing developers to embed real-time graphs & widgets in websites; analyse and process historical data pulled from the data feeds; send real-time alerts from any datastream to control scripts, devices and environments.

The architecture of the Wikisensing system[48] describes the key components of such systems to include APIs and interfaces for online collaborators, a middleware containing the business logic needed for the sensor data management and processing and a storage model suitable for the efficient storage and retrieval of large volumes of data.

Simulation

edit

At present, agent-based modeling and simulation is the only paradigm which allows the simulation of complex behavior in the environments of wireless sensors (such as flocking).[49] Agent-based simulation of wireless sensor and ad hoc networks is a relatively new paradigm. Agent-based modelling was originally based on social simulation.

Network simulators like Opnet, Tetcos NetSim and NS can be used to simulate a wireless sensor network.

Other concepts

edit

Localization

edit

Network localization refers to the problem of estimating the location of wireless sensor nodes during deployments and in dynamic settings. For ultra-low power sensors, size, cost and environment precludes the use of Global Positioning System receivers on sensors. In 2000, Nirupama Bulusu, John Heidemann and Deborah Estrin first motivated and proposed a radio connectivity based system for localization of wireless sensor networks.[50] Subsequently, such localization systems have been referred to as range free localization systems, and many localization systems for wireless sensor networks have been subsequently proposed including AHLoS, APS, and Stardust.

Sensor data calibration and fault tolerance

edit

Sensors and devices used in wireless sensor networks are state-of-the-art technology with the lowest possible price. The sensor measurements we get from these devices are therefore often noisy, incomplete and inaccurate. Researchers studying wireless sensor networks hypothesize that much more information can be extracted from hundreds of unreliable measurements spread across a field of interest than from a smaller number of high-quality, high-reliability instruments with the same total cost.

Macroprogramming

edit

Macro-programming is a term coined by Matt Welsh. It refers to programming the entire sensor network as an ensemble, rather than individual sensor nodes. Another way to macro-program a network is to view the sensor network as a database, which was popularized by the TinyDB system developed by Sam Madden.

Reprogramming

edit

Reprogramming is the process of updating the code on the sensor nodes. The most feasible form of reprogramming is remote reprogramming whereby the code is disseminated wirelessly while the nodes are deployed. Different reprogramming protocols exist that provide different levels of speed of operation, reliability, energy expenditure, requirement of code resident on the nodes, suitability to different wireless environments, resistance to DoS, etc. Popular reprogramming protocols are Deluge (2004), Trickle (2004), MNP (2005), Synapse (2008), and Zephyr (2009).

Security

edit

Infrastructure-less architecture (i.e. no gateways are included, etc.) and inherent requirements (i.e. unattended working environment, etc.) of WSNs might pose several weak points that attract adversaries. Therefore, security is a big concern when WSNs are deployed for special applications such as military and healthcare. Owing to their unique characteristics, traditional security methods of computer networks would be useless (or less effective) for WSNs. Hence, lack of security mechanisms would cause intrusions towards those networks. These intrusions need to be detected and mitigation methods should be applied.

There have been important innovations in securing wireless sensor networks. Most wireless embedded networks use omni-directional  antennas and therefore neighbors can overhear communication in and out of nodes. This was used this to develop a primitive called "local monitoring"[51] which was used for detection  of sophisticated attacks, like blackhole or wormhole, which degrade the  throughput of large networks to close-to-zero. This primitive has since been  used by many researchers and commercial wireless packet sniffers. This was subsequently refined for more sophisticated attacks such as with  collusion, mobility,  and multi-antenna, multi-channel devices.[52]

Distributed sensor network

edit

If a centralized architecture is used in a sensor network and the central node fails, then the entire network will collapse, however the reliability of the sensor network can be increased by using a distributed control architecture. Distributed control is used in WSNs for the following reasons:

  1. Sensor nodes are prone to failure,
  2. For better collection of data,
  3. To provide nodes with backup in case of failure of the central node.

There is also no centralised body to allocate the resources and they have to be self organized.

As for the distributed filtering over distributed sensor network. the general setup is to observe the underlying process through a group of sensors organized according to a given network topology, which renders the individual observer estimates the system state based not only on its own measurement but also on its neighbors'.[53]

Data integration and sensor web

edit

The data gathered from wireless sensor networks is usually saved in the form of numerical data in a central base station. Additionally, the Open Geospatial Consortium (OGC) is specifying standards for interoperability interfaces and metadata encodings that enable real time integration of heterogeneous sensor webs into the Internet, allowing any individual to monitor or control wireless sensor networks through a web browser.

In-network processing

edit

To reduce communication costs some algorithms remove or reduce nodes' redundant sensor information and avoid forwarding data that is of no use. This technique has been used, for instance, for distributed anomaly detection[54][55][56][57] or distributed optimization.[58] As nodes can inspect the data they forward, they can measure averages or directionality for example of readings from other nodes. For example, in sensing and monitoring applications, it is generally the case that neighboring sensor nodes monitoring an environmental feature typically register similar values. This kind of data redundancy due to the spatial correlation between sensor observations inspires techniques for in-network data aggregation and mining. Aggregation reduces the amount of network traffic which helps to reduce energy consumption on sensor nodes.[59][60] Recently, it has been found that network gateways also play an important role in improving energy efficiency of sensor nodes by scheduling more resources for the nodes with more critical energy efficiency need and advanced energy efficient scheduling algorithms need to be implemented at network gateways for the improvement of the overall network energy efficiency.[33][61]

Secure data aggregation

edit

This is a form of in-network processing where sensor nodes are assumed to be unsecured with limited available energy, while the base station is assumed to be secure with unlimited available energy. Aggregation complicates the already existing security challenges for wireless sensor networks[62] and requires new security techniques tailored specifically for these scenarios. Providing security to aggregate data in wireless sensor networks is known as secure data aggregation in WSN.[60][62][63] were the first few works discussing techniques for secure  data aggregation in wireless sensor networks.

Two main security challenges in secure data aggregation are confidentiality and integrity of data. While encryption is traditionally used to provide end to end confidentiality in wireless sensor network, the aggregators in a secure data aggregation scenario need to decrypt the encrypted data to perform aggregation. This exposes the plaintext at the aggregators, making the data vulnerable to attacks from an adversary. Similarly an aggregator can inject false data into the aggregate and make the base station accept false data. Thus, while data aggregation improves energy efficiency of a network, it complicates the existing security challenges.[64]

See also

edit

References

edit
  1. ^ Ullo, Silvia Liberata; Sinha, G. R. (2020-05-31). "Advances in Smart Environment Monitoring Systems Using IoT and Sensors". Sensors. 20 (11): 3113. Bibcode:2020Senso..20.3113U. doi:10.3390/s20113113. ISSN 1424-8220. PMC 7309034. PMID 32486411.
  2. ^ FrancescoMario, Di; K, DasSajal; AnastasiGiuseppe (2011-08-01). "Data Collection in Wireless Sensor Networks with Mobile Elements". ACM Transactions on Sensor Networks. 8: 1–31. doi:10.1145/1993042.1993049. S2CID 15576441.
  3. ^ Xia, Feng; Tian, Yu-Chu; Li, Yanjun; Sun, Youxian (2007-10-09). "Wireless Sensor/Actuator Network Design for Mobile Control Applications". Sensors. 7 (10): 2157–2173. Bibcode:2007Senso...7.2157X. doi:10.3390/s7102157. ISSN 1424-8220. PMC 3864515. PMID 28903220.
  4. ^ "Wireless sensor networks for battlefield surveillance" (PDF). 2006.
  5. ^ Global, I. G. I. "Wireless sensor networks have potential in health care and agriculture, says study". techxplore.com. Retrieved 2023-02-09.
  6. ^ Dargie, W.; Poellabauer, C. (2010). Fundamentals of wireless sensor networks: theory and practice. John Wiley and Sons. pp. 168–183, 191–192. ISBN 978-0-470-99765-9.
  7. ^ Sohraby, K.; Minoli, D.; Znati, T. (2007). Wireless sensor networks: technology, protocols, and applications. John Wiley and Sons. pp. 203–209. ISBN 978-0-471-74300-2.
  8. ^ Oliveira, Joao; Goes, João (2012). Parametric Analog Signal Amplification Applied to Nanoscale CMOS Technologies. Springer Science & Business Media. p. 7. ISBN 978-1-4614-1670-8.
  9. ^ Peiris, V. (2013). "Highly integrated wireless sensing for body area network applications". SPIE Newsroom. doi:10.1117/2.1201312.005120.
  10. ^ Tony O'Donovan; John O'Donoghue; Cormac Sreenan; David Sammon; Philip O'Reilly; Kieran A. O'Connor (2009). A Context Aware Wireless Body Area Network (BAN) (PDF). Pervasive Computing Technologies for Healthcare, 2009. doi:10.4108/ICST.PERVASIVEHEALTH2009.5987. Archived (PDF) from the original on 2016-10-09.
  11. ^ Bilal, Muhammad; et al. (2017). "An Authentication Protocol for Future Sensor Networks". Sensors. 17 (5): 979. arXiv:1705.00764. Bibcode:2017Senso..17..979B. doi:10.3390/s17050979. PMC 5464775. PMID 28452937.
  12. ^ "J.K.Hart and K. Martinez, "Environmental Sensor Networks: A revolution in the earth system science?", Earth-Science Reviews, 2006" (PDF). Archived from the original (PDF) on November 23, 2015.
  13. ^ Apte, J.S.; Messier, K.P.; Gani, S.; Brauer, M.; Kirchstetter, T.W.; Lunden, M.M.; Marshall, J.D.; Portier, C.J.; Vermeulen, R.C.H.; Hamburg, S.P. (2017). "High-Resolution Air Pollution Mapping with Google Street View Cars: Exploiting Big Data". Environmental Science and Technology. 51 (12): 6999–7008. Bibcode:2017EnST...51.6999A. doi:10.1021/acs.est.7b00891. PMID 28578585.
  14. ^ "Breathe London". Breathe London. Retrieved 27 April 2021.
  15. ^ Feinberg, S.; Williams, R.; Hagler, G.S.W.; Rickard, J.; Garver, D.; Harshfield, G.; Stauffer, P.; Mattson, E.; Judge, R.; Garvey, S. (2018). "Long-term evaluation of air sensor technology under ambient conditions in Denver, Colorado". Atmospheric Measurement Techniques. 11 (8): 4605–4615. Bibcode:2018AMT....11.4605F. doi:10.5194/amt-11-4605-2018. PMC 6781239. PMID 31595175.
  16. ^ Balzano, L.; Nowak, R. (2008). "Blind Calibration of Networks of Sensors: Theory and Algorithms". Networked Sensing Information and Control. pp. 9–37. doi:10.1007/978-0-387-68845-9_1. ISBN 978-0-387-68843-5.
  17. ^ Sauce, O.; Hasenfratz, D.; Thiele, L. (2015). "Reducing multi-hop calibration errors in large-scale mobile sensor networks". Proceedings of the 14th International Conference on Information Processing in Sensor Networks. pp. 274–285. doi:10.1145/2737095.2737113. ISBN 978-1-4503-3475-4. S2CID 15171166.
  18. ^ Spie (2013). "Vassili Karanassios: Energy scavenging to power remote sensors". SPIE Newsroom. doi:10.1117/2.3201305.05.
  19. ^ Tiwari, Ankit; et al. (2007). "Energy-efficient wireless sensor network design and implementation for condition-based maintenance". ACM Transactions on Sensor Networks. 3: 1–es. CiteSeerX 10.1.1.188.8180. doi:10.1145/1210669.1210670. S2CID 7278286.
  20. ^ K. Saleem; N. Fisal & J. Al-Muhtadi (2014). "Empirical studies of bio-inspired self-organized secure autonomousRouting protocol". IEEE Sensors Journal. 14 (7): 1–8. Bibcode:2014ISenJ..14.2232S. doi:10.1109/JSEN.2014.2308725. S2CID 27135727.
  21. ^ Anastasi, G.; Farruggia, O.; Lo Re, G.; Ortolani, M. (2009). "Monitoring High-Quality Wine Production using Wireless Sensor Networks". 2009 42nd Hawaii International Conference on System Sciences. pp. 1–7. doi:10.1109/HICSS.2009.313. ISBN 978-0-7695-3450-3.
  22. ^ "A national strategy against terrorism using weapons of mass destruction". str.llnl.gov. Science & Technology Review. Archived from the original on 2 May 2017. Retrieved 26 February 2019.
  23. ^ a b "Striving for a Safer World Since 1945". fas.org. Federation of American Scientists. Archived from the original on 2016-03-16. Retrieved 2019-02-26.
  24. ^ a b c d Hills, Rob. "Sensing for Danger". str.llnl.gov. Science & Technology Review. Archived from the original on 2 May 2017. Retrieved 26 February 2019.
  25. ^ "U.S./Russian National Security Interests". commdocs.house.gov. US House of Representatives. Retrieved 26 February 2019.
  26. ^ Aguilar, Mónica (2020). "INRISCO: INcident monitoRing in Smart COmmunities". IEEE Access. 8: 72435–72460. arXiv:2312.07787. Bibcode:2020IEEEA...872435I. doi:10.1109/ACCESS.2020.2987483. hdl:2117/328871. S2CID 218468946.
  27. ^ Pastor, Adolfo (2020). "Psychoacoustic Annoyance Implementation With Wireless Acoustic Sensor Networks for Monitoring in Smart Cities". IEEE Internet of Things Journal. 7: 128–136. doi:10.1109/JIOT.2019.2946971. S2CID 208111073.
  28. ^ Lloret, Jaime (2009). "A Wireless Sensor Network Deployment for Rural and Forest Fire Detection and Verification". Sensors. 9 (11): 8722–8747. Bibcode:2009Senso...9.8722L. doi:10.3390/s91108722. PMC 3260610. PMID 22291533. S2CID 13104461.
  29. ^ Liz Young (2022-06-08). "Israeli Tech Firm Rolls Out Tracking Devices the Size of Postage Stamps". Wall Street Journal. Retrieved 2022-07-08.
  30. ^ "ReVibe Energy – Powering The Industrial IoT". revibeenergy.com. Archived from the original on 22 September 2017. Retrieved 3 May 2018.
  31. ^ "THE WORLD LEADER IN VIBRATION HARVESTER POWERED WIRELESS SENSING SYSTEMS". THE WORLD LEADER IN VIBRATION HARVESTER POWERED WIRELESS SENSING SYSTEMS. Archived from the original on 13 April 2018. Retrieved 3 May 2018.
  32. ^ Saleem, Kashif; Fisal, Norsheila; Hafizah, Sharifah; Kamilah, Sharifah; Rashid, Rozeha; Baguda, Yakubu (2009). "Cross layer based biological inspired self-organized routing protocol for wireless sensor network". TENCON 2009 - 2009 IEEE Region 10 Conference. pp. 1–6. doi:10.1109/TENCON.2009.5395945. ISBN 978-1-4244-4546-2. S2CID 30236796.
  33. ^ a b c d e Guowang Miao; Jens Zander; Ki Won Sung; Ben Slimane (2016). Fundamentals of Mobile Data Networks. Cambridge University Press. ISBN 978-1-107-14321-0.
  34. ^ Aghdam, Shahin Mahdizadeh; Khansari, Mohammad; Rabiee, Hamid R; Salehi, Mostafa (2014). "WCCP: A congestion control protocol for wireless multimedia communication in sensor networks". Ad Hoc Networks. 13: 516–534. doi:10.1016/j.adhoc.2013.10.006.
  35. ^ Magno, M.; Boyle, D.; Brunelli, D.; O'Flynn, B.; Popovici, E.; Benini, L. (2014). "Extended Wireless Monitoring Through Intelligent Hybrid Energy Supply". IEEE Transactions on Industrial Electronics. 61 (4): 1871. doi:10.1109/TIE.2013.2267694. S2CID 23562384.
  36. ^ Xenakis, A.; Foukalas, F.; Stamoulis, G. (2016). "Cross-layer energy-aware topology control through Simulated Annealing for WSNs". Computers & Electrical Engineering. 56: 576–590. doi:10.1016/j.compeleceng.2016.02.015.
  37. ^ "LoRa Alliance". Archived from the original on 2017-11-09.
  38. ^ "Wi-Sun Alliance". 2018-08-15. Archived from the original on 2017-11-09.
  39. ^ "NB-IOT vs. LoRa vs. Sigfox, LINKLabs, Jan 2017". Archived from the original on 2017-11-10.
  40. ^ "What is LTE-M?". Archived from the original on 2017-11-09.
  41. ^ Janakiram, Kottnana; Reginald, P. Joshua (2023-02-23). "Extending the Lifespan of Wireless Sensor Networks using Graph Theory Approaches". 2023 7th International Conference on Computing Methodologies and Communication (ICCMC). Erode, India: IEEE. pp. 993–997. doi:10.1109/ICCMC56507.2023.10084135. ISBN 978-1-6654-6408-6. S2CID 257959382.
  42. ^ Lyakhov, P. A.; Kalita, D. I. (2023-05-03). "Reliable Kalman Filtering with Conditionally Local Calculations in Wireless Sensor Networks". Automatic Control and Computer Sciences. 57 (2): 154–166. doi:10.3103/S0146411623020062. ISSN 0146-4116. S2CID 258465232.
  43. ^ Shi, Junyang; Sha, Mo (2019-06-17). "Parameter Self-Configuration and Self-Adaptation in Industrial Wireless Sensor-Actuator Networks". IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. Paris, France: IEEE. pp. 658–666. doi:10.1109/INFOCOM.2019.8737467. ISBN 978-1-7281-0515-4. S2CID 86721016.
  44. ^ Xenakis, A.; Foukalas, F.; Stamoulis, G. (October 2015). "Minimum weighted clustering algorithm for wireless sensor networks". Proceedings of the 19th Panhellenic Conference on Informatics. pp. 255–260. doi:10.1145/2801948.2801999. ISBN 978-1-4503-3551-5. S2CID 9188571.
  45. ^ Hassan, T. A. H.; Selim, G.; Sadek, R. (2015). "A novel energy efficient vice Cluster Head routing protocol in Wireless Sensor Networks". 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). Cairo: IEEE. pp. 313–320. doi:10.1109/IntelCIS.2015.7397240. ISBN 978-1-5090-1949-6. S2CID 10688614.
  46. ^ K Shahzad, Muhammad; Nguyen, Dang Tu; Zalyubovskiy, Vyacheslav; Choo, Hyunseung (2018). "LNDIR: A lightweight non-increasing delivery-latency interval-based routing for duty-cycled sensor networks". International Journal of Distributed Sensor Networks. 14 (4): 1550147718767605. doi:10.1177/1550147718767605.   Material was copied from this source, which is available under a Creative Commons Attribution 4.0 International License.
  47. ^ "PreonVM – Virtual maschine for wireless sensor devices". Archived from the original on 2017-11-11.
  48. ^ Silva, D.; Ghanem, M.; Guo, Y. (2012). "WikiSensing: An Online Collaborative Approach for Sensor Data Management". Sensors. 12 (10): 13295–332. Bibcode:2012Senso..1213295S. doi:10.3390/s121013295. PMC 3545568. PMID 23201997.
  49. ^ Niazi, Muaz; Hussain, Amir (2011). "A Novel Agent-Based Simulation Framework for Sensing in Complex Adaptive Environments" (PDF). IEEE Sensors Journal. 11 (2): 404–412. arXiv:1708.05875. Bibcode:2011ISenJ..11..404N. doi:10.1109/jsen.2010.2068044. hdl:1893/3398. S2CID 15367419. Archived from the original (PDF) on 2011-07-25.
  50. ^ Bulusu, Nirupama; Heidemann, John; Estrin, Deborah (2000). "GPS-less low cost outdoor localization for very small devices". IEEE Personal Communications. 7 (5). IEEE Personal Communications, October 2000: 28–34. doi:10.1109/98.878533. S2CID 771769.
  51. ^ Khalil, Issa; Bagchi Saurabh; Shroff, N.B. (2005). "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks". 2005 International Conference on Dependable Systems and Networks (DSN'05). pp. 612–621. doi:10.1109/DSN.2005.58. ISBN 0-7695-2282-3. S2CID 2018708.
  52. ^ Mitchell, Robert; Chen, Ing-Ray (2014-04-01). "A survey of intrusion detection in wireless network applications". Computer Communications. 42: 1–23. doi:10.1016/j.comcom.2014.01.012. ISSN 0140-3664.
  53. ^ Li, Wangyan; Wang, Zidong; Wei, Guoliang; Ma, Lifeng; Hu, Jun; Ding, Derui (2015). "A Survey on Multisensor Fusion and Consensus Filtering for Sensor Networks". Discrete Dynamics in Nature and Society. 2015: 1–12. doi:10.1155/2015/683701. ISSN 1026-0226.
  54. ^ Bosman, H. H. W. J.; Iacca, G; Tejada, A.; Wörtche, H. J.; Liotta, A. (2015-12-01). "Ensembles of incremental learners to detect anomalies in ad hoc sensor networks". Ad Hoc Networks. Special Issue on Big Data Inspired Data Sensing, Processing and Networking Technologies. 35: 14–36. doi:10.1016/j.adhoc.2015.07.013. hdl:11572/196409. ISSN 1570-8705.
  55. ^ Bosman, H. H. W. J.; Liotta, A.; Iacca, G.; Wörtche, H. J. (October 2013). "Anomaly Detection in Sensor Systems Using Lightweight Machine Learning". 2013 IEEE International Conference on Systems, Man, and Cybernetics. pp. 7–13. doi:10.1109/SMC.2013.9. ISBN 978-1-4799-0652-9. S2CID 6434158.
  56. ^ Bosman, H. H. W. J.; Liotta, A.; Iacca, G.; Wörtche, H. J. (December 2013). "Online Extreme Learning on Fixed-Point Sensor Networks". 2013 IEEE 13th International Conference on Data Mining Workshops. pp. 319–326. doi:10.1109/ICDMW.2013.74. ISBN 978-1-4799-3142-2. S2CID 6460187.
  57. ^ Bosman, H. H. W. J.; Iacca, G.; Wörtche, H. J.; Liotta, A. (December 2014). "Online Fusion of Incremental Learning for Wireless Sensor Networks". 2014 IEEE International Conference on Data Mining Workshop. pp. 525–532. doi:10.1109/ICDMW.2014.79. hdl:10545/622629. ISBN 978-1-4799-4274-9. S2CID 14029568.
  58. ^ Iacca, G. (2018). "Distributed optimization in wireless sensor networks: an island-model framework". Soft Computing. 17 (12): 2257–2277. arXiv:1810.02679. Bibcode:2018arXiv181002679I. doi:10.1007/s00500-013-1091-x. ISSN 1433-7479. S2CID 33273544.
  59. ^ Bosman, H. H. W. J.; Iacca, G.; Tejada, A.; Wörtche, H. J.; Liotta, A. (2017-01-01). "Spatial anomaly detection in sensor networks using neighborhood information". Information Fusion. 33: 41–56. doi:10.1016/j.inffus.2016.04.007. hdl:11572/196405. ISSN 1566-2535.
  60. ^ a b Cam, H; Ozdemir, S Nair, P Muthuavinashiappan, D (October 2003). "ESPDA: Energy-efficient and Secure Pattern-based Data Aggregation for wireless sensor networks". Proceedings of IEEE Sensors 2003 (IEEE Cat. No.03CH37498). Vol. 2. pp. 732–736. CiteSeerX 10.1.1.1.6961. doi:10.1109/icsens.2003.1279038. ISBN 978-0-7803-8133-9. S2CID 15686293.{{cite book}}: CS1 maint: multiple names: authors list (link)
  61. ^ Rowayda, A. Sadek (May 2018). "Hybrid energy aware clustered protocol for IoT heterogeneous network". Future Computing and Informatics Journal. 3 (2): 166–177. doi:10.1016/j.fcij.2018.02.003.
  62. ^ a b Hu, Lingxuan; David Evans (January 2003). "Secure aggregation for wireless networks". Workshop on Security and Assurance in Ad Hoc Networks.
  63. ^ Przydatek, Bartosz; Dawn Song; Adrian Perrig (2003). "SIA: Secure information aggregation in sensor networks". Proceedings of the 1st international conference on Embedded networked sensor systems. pp. 255–265. doi:10.1145/958491.958521. ISBN 978-1-58113-707-1. S2CID 239370.
  64. ^ Kumar, Vimal; Sanjay K. Madria (August 2012). "Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis". 2012 IEEE 13th International Conference on Mobile Data Management. pp. 196–201. doi:10.1109/MDM.2012.49. ISBN 978-1-4673-1796-2. S2CID 2990744.

Further reading

edit
  • Amir Hozhabri; Mohammadreza Eslaminejad; Mitra Mahrouyan, Chain-based Gateway nodes routing for energy efficiency in WSN
  • Kiran Maraiya, Kamal Kant, Nitin Gupta "Wireless Sensor Network: A Review on Data Aggregation" International Journal of Scientific & Engineering Research Volume 2 Issue 4, April 2011.
  • Chalermek Intanagonwiwat, Deborah Estrin, Ramesh Govindan, John Heidemann, "Impact of Network Density on Data Aggregation in Wireless SensorNetworks," November 4, 2001.
  • Bulusu, Nirupama; Jha, Sanjay (2005). Wireless Sensor Networks: A Systems Perspective. Artech House. ISBN 978-1-58053-867-1.
edit