PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A WSN architecture for building resilient, reactive and secure wireless sensing systems

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
We introduce a wireless sensor network (WSN) architecture intended for massive deployments in custom applications where the primary goal is the collection of low-volume (e.g., telemetric) data possibly augmented with spontaneous special events, like alerts or alarms. The network is built of inexpensive, small-footprint, energy-frugal, possibly mobile nodes running reactive programs and self-organizing themselves into resilient distributed systems in a manner embracing the limited capabilities of the devices as well as the unreliable nature of ad-hoc wireless communication. We propose and elaborate on a holistic approach to constructing complete WSN applications. Our approach incorporates a certain unified programming and communication paradigm. In addition to producing small, energy-efficient, self-documenting and reliable programs for ultra-small-footprint motes, that paradigm enables authoritative virtual execution of complete application, thus facilitating their rapid development, testing, augmentation and modification.
Rocznik
Strony
141--181
Opis fizyczny
Bibliogr. 89 poz., rys., tab.
Twórcy
  • Faculty of Art, Technology and Communication, Vistula University, ul. Stokłosy 3, 02-787 Warsaw, Poland
  • Department of Computing Science, University of Alberta, Edmonton, Alberta, Canada T6G 2E8
  • CTO, Olsonet Communications, 109 St. Claire Avenue, Ottawa, Ontario, Canada K2G 2A7
Bibliografia
  • [1] Lu C, Saifullah A, Li B, Sha M, Gonzalez H, Gunatilaka D, Wu C, Nie L and Chen Y 2015 Real-time wireless sensor-actuator networks for industrial cyber-physical systems, Proceedings of the IEEE 104 (5) 1013
  • [2] Kabadayi S, Pridgen A and Julien C 2006 Virtual sensors: Abstracting data from physical sensors, International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’06), IEEE
  • [3] Gburzyński P and Kopciuszewska E 2019 On rapid development of reactive wireless sensor systems, System Safety: Human, Technical Facility, Environment 1 (1) 574
  • [4] Silberschatz A, Galvin P B and Gagne G 2014 Operating system concepts essentials, Wiley Hoboken
  • [5] Gburzynski P, Olesinski W and Van Vooren J 2016 A WSN-based, RSS-driven, real-time location tracking system for independent living facilities, DCNET 64
  • [6] Conti M and Giordano S 2013 Multihop ad hoc networking: The evolutionary path, Mobile Ad Hoc Networking 35 (3)
  • [7] Gubbi J, Buyya R, Marusic S and Palaniswami M 2013 Internet of things (IoT): A vision, architectural elements and future directions, Future generation computer systems 29 (7) 1645
  • [8] Hansen C J 2015 Internetworking with Bluetooth low energy, GetMobile: Mobile Computing and Communications 19 (2) 34
  • [9] Gill K, Yang S H, Yao F and Lu X 2009 A ZigBee-based home automation system, IEEE Transactions on consumer Electronics 55 (2) 422
  • [10] Buratti C, Conti A, Dardari D and Verdone R 2009 An overview on wireless sensor networks technology and evolution, Sensors 9 (9) 6869
  • [11] Andreev S, Petrov V, Dohler M and Yanikomeroglu H 2019 Future of ultra-dense networks beyond 5G: harnessing heterogeneous moving cells, IEEE Communications Magazine
  • [12] Oracevic A, Akbaş S, Ozdemir S and Kos M 2014 Secure target detection and tracking in mission critical wireless sensor networks, International Conference on Anti-Counterfeiting, Security and Identification (ASID), IEEE 1
  • [13] Krivtsova I, Lebedev I, Sukhoparov M, Bazhayev N, Zikratov I, Ometov A, Andreev S, Masek P, Fujdiak R and Hosek J 2016 Implementing a broadcast storm attack on a mission-critical wireless sensor network, International Conference on Wired/Wireless Internet Communication, Springer 297
  • [14] Rani S and Ahmed S H 2015 Multi-hop routing in wireless sensor networks: an overview, taxonomy and research challenges, Springer
  • [15] Ai Y and Cheffena M 2017 On multi-hop decode-and-forward cooperative relaying for industrial wireless sensor networks, Sensors 17 (4) 695
  • [16] Chen C-P, Chuang C-L and Jiang J-A 2013 Ecological monitoring using wireless sensor networks: Overview, challenges and opportunities, in Advancement in Sensing Technology, Springer 1
  • [17] Lloret J, Garcia M, Bri D and Sendra S 2009 A wireless sensor network deployment for rural and forest fire detection and verification, Sensors 9 (11) 8722
  • [18] Chowdary V and Gupta M K 2018 Automatic forest fire detection and monitoring techniques: A survey, Intelligent Communication, Control and Devices, Springer 1111
  • [19] Reina D, Askalani M, Toral S, Barrero F, Asimakopoulou E and Bessis N 2015 A survey on multihop ad hoc networks for disaster response scenarios, International Journal of Distributed Sensor Networks 11 (10) 647037
  • [20] Lee S-H, Lee S, Song H and Lee H-S 2009 Wireless sensor network design for tactical military applications: Remote large-scale environments, MILCOM 2009-2009 IEEE Military communications conference, IEEE 1
  • [21] Kumar K A, Krishna A V and Chatrapati K S 2017 New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks, Journal of Information and Optimization Sciences 38 (2) 341
  • [22] Jiang H, Chen L, Wu J, Chen S and Leung H 2009 A reliable and high-bandwidth multihop wireless sensor network for mine tunnel monitoring, IEEE Sensors journal 9 (11) 1511
  • [23] Alrajeh N A and Lloret J 2013 Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks, International Journal of Distributed Sensor Networks 9 (10) 351047
  • [24] Chaudhari B S, Zennaro M and Borkar S 2020 LPWAN technologies: Emerging application characteristics, requirements and design considerations, Future Internet 12 (3) 46
  • [25] Wixted A J, Kinnaird P, Larijani H, Tait A, Ahmadinia A and Strachan N 2016 Evaluation of LoRa and LoRaWAN for wireless sensor networks, IEEE SENSORS, IEEE 1
  • [26] Mekki K, Bajic E, Chaxel F and Meyer F 2019 A comparative study of LPWAN technologies for large-scale IoT deployment, ICT express 5 (1) 1
  • [27] Davies J H 2008 MSP430 microcontroller basics, Elsevier
  • [28] Bhadra D and Stevens K S 2017 Design of a low power, relative timing based asynchronous MSP430 microprocessor, Design, Automation & Test in Europe Conference & Exhibition, IEEE 794
  • [29] Texas Instruments 2014 CC1350 SimpleLink Ultra-Low-Power Dual-Band Wireless MCU, Technical document SWRS183B
  • [30] Texas Instruments 2014 CC1100 Single Chip Low Cost Low Power RF Transceiver, Technical document SWRS038D
  • [31] Olsonet Communications Corporation 2014 CC1100 Driver Notes, PicOS Documentation
  • [32] Karlof C, Sastry N and Wagner D 2004 TinySec: a link layer security architecture for wireless sensor networks, Proceedings of the 2nd international conference on Embedded networked sensor systems, ACM 162
  • [33] Kuźnicka E and Gburzyński P 2017 Automatic detection of suckling events in lamb through accelerometer data classification, Computers and Electronics in Agriculture 138 137
  • [34] Gburzynski P, Kaminska B and Rahman A 2009 On reliable transmission of data over simple wireless channels, Journal of Computer Systems, Networks and Communications
  • [35] Ma S, Yang Y, Qian Y, Sharif H and Alahmad M 2016 Energy harvesting for wireless sensor networks: applications and challenges in smart grid, International Journal of Sensor Networks 21 (4) 226
  • [36] Adu-Manu K S, Adam N, Tapparello C, Ayatollahi H and Heinzelman W 2018 Energy-harvesting wireless sensor networks (EH-WSNs) a review, ACM Transactions on Sensor Networks (TOSN) 14 (2) 1
  • [37] Ali A, Jadoon Y K, Changazi S A and Qasim M 2020 Military operations: Wireless sensor networks based applications to reinforce future battlefield command system, 2020 IEEE 23rd International Multitopic Conference (INMIC), IEEE 1
  • [38] Clemente A D S B, Martínez-de Dios J D and Baturone A O 2012 A WSN-based tool for urban and industrial fire-fighting, Sensors 12 (11) 15009
  • [39] Levis P 2009 TinyOS Programming, Cambridge University Press
  • [40] Texas Instruments TI-RTOS 2.20 User’s Guide, 2016, Technical document SPRUHD4M
  • [41] Dunkels A, Gronvall B and Voigt T 2004 Contiki-a lightweight and flexible operating system for tiny networked sensors, 29th annual IEEE international conference on local computer networks, IEEE 455
  • [42] Levis P, Lee N, Welsh M and Culler D 2003 TOSSIM: Accurate and scalable simulation of entire tinyos applications, Proceedings of the 1st international conference on Embedded networked sensor systems 126
  • [43] Zikria Y B, Afzal M K, Ishmanov F, Kim S W and Yu H 2018 A survey on routing protocols supported by the Contiki Internet of Things operating system, Future Generation Computer Systems 82 200
  • [44] Sobeih A, Hou J C, Kung L-C, Li N, Zhang H, Chen W-P, Tyan H-Y and Lim H 2006 J-Sim: a simulation and emulation environment for wireless sensor networks, IEEE Wireless Communications 13 (4) 104
  • [45] Wu H, Luo Q, Zheng P and Ni L M 2007 VMNet: Realistic emulation of wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems 18 (2) 277
  • [46] Li J and Serpen G 2012 Simulating heterogeneous and larger-scale wireless sensor networks with TOSSIM TinyOS emulator, Procedia Computer Science 12 374
  • [47] Riliskis L and Osipov E 2013 Symphony: Simulation, emulation and virtualization framework for accurate WSN experimentation, 2013 4th International Workshop on Software Engineering for Sensor Network Applications (SESENA) 1
  • [48] Manatakis D V, Nennes M G, Bakas I G and Manolakos E S 2014 Simulation-driven emulation of collaborative algorithms to assess their requirements for a large-scale WSN implementation, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE 8360
  • [49] Olsonet Communications Corporation 2019 Programming under PicOS, PicOS Documentation
  • [50] Akhmetshina E, Gburzyński P and Vizeacoumar F 2003 PicOS: A tiny operating system for extremely small embedded platforms, Proceedings of ESA’03 (Las Vegas) 116
  • [51] Shimony B, Nikolaidis I, Gburzynski P and Stroulia E 2010 PicOS tuples: easing event based programming in tiny pervasive systems, Proceedings of the 7th International Workshop on Model-Based Methodologies for Pervasive and Embedded Software, ACM 53
  • [52] Boers N M, Gburzyński P, Nikolaidis I and Olesiński W 2010 Developing wireless sensor network applications in a virtual environment, Telecommunication Systems 45 (2-3) 165
  • [53] Levis P et al. 2005 TinyOS: An operating system for sensor networks, Ambient Intelligence, Springer 115
  • [54] Regehr J, Reid A and Webb K 2005 Eliminating stack overflow by abstract interpretation, ACM Transactions on Embedded Computing Systems (TECS) 4 (4) 751
  • [55] Bucur D 2012 Temporal monitors for TinyOS, International Conference on Runtime Verification, Springer 96
  • [56] Moura A L D and Ierusalimschy R 2009 Revisiting coroutines, ACM Transactions on Programming Languages and Systems (TOPLAS) 31 (2) 1
  • [57] Hambarde P, Varma R and Jha S 2014 The survey of real time operating system: RTOS, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies, IEEE 34
  • [58] Gburzynski P and Kaminska B 2008 Testing real-time properties of embedded systems, Proceedings of ESA 2008 179
  • [59] Gburzyński P 2019 Modeling Communication Networks and Protocols, Springer
  • [60] Dobosiewicz W and Gburzyński P 1997 Protocol design in SMURPH, State of the art in Performance Modeling and Simulation, Gordon and Breach 255
  • [61] Gburzyński P and Nikolaidis I 2006 Wireless network simulation extensions in SMURPH/SIDE, Proceedings of the 2006 Winter Simulation Conference (WSC’06)
  • [62] Gburzyński P and Maitan J 1997 Simulation and control of reactive systems, Proceedings of Winter Simulation Conference WSC’97 413
  • [63] Gburzyński P, Maitan J and Hillyer L 1998 Virtual prototyping of reactive systems in SIDE, Proceedings of the 5th European Concurrent Engineering Conference ECEC’98 75
  • [64] Gburzyński P 1996 Protocol design for local and metropolitan area networks, Prentice-Hall
  • [65] Obaidat M S, Zarai F and Nicopolitidis P 2015 Modeling and simulation of computer networks and systems: Methodologies and applications, Morgan Kaufmann
  • [66] Barrenetxea G, Ingelrest F, Schaefer G and Vetterli M 2008 The hitchhiker’s guide to successful wireless sensor network deployments, Proceedings of the 6th ACM conference on Embedded network sensor systems 43
  • [67] Liu A, Zheng Z, Zhang C, Chen Z and Shen X 2012 Secure and energy-efficient disjoint multipath routing for WSNs, IEEE Transactions on Vehicular Technology 61 (7) 3255
  • [68] De Couto D S, Aguayo D, Chambers B A and Morris R 2003 Performance of multihop wireless networks: Shortest path is not enough, ACM SIGCOMM Computer Communication Review 33 (1) 83
  • [69] Gburzyński P, Kaminska B and Olesiński W 2007 A tiny and efficient wireless ad-hoc protocol for low-cost sensor networks, Proceedings of DATE’07 1562
  • [70] Rahman A, Olesiński W and Gburzyński P 2004 Controlled flooding in wireless ad-hoc networks, Proceedings of IWWAN’04
  • [71] Shakkottai S, Rappaport T and Karlsson P 2003 Cross-layer design for wireless networks, IEEE Communications Magazine 41 (10) 74
  • [72] Akyildiz I F and Wang X 2008 Cross-layer design in wireless mesh networks, IEEE Transactions on Vehicular Technology 57 (2) 1061
  • [73] Feng Y, Zhang B, Chai S, Cui L and Li Q 2017 An optimized AODV protocol based on clustering for WSNs, 6th International Conference on Computer Science and Network Technology (ICCSNT), IEEE 410
  • [74] Chatzimisios P, Boucouvalas A and Vitsas V 2004 Effectiveness of RTS/CTS handshake in IEEE 802.11 a wireless LAN, Electronics Letters 40 (14) 915
  • [75] Fahmy H M A 2021 Protocol stack of WSNs, Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks, Springer 53
  • [76] Ray S, Carruthers J B and Starobinski D 2003 RTS/CTS-induced congestion in ad hoc wireless LANs, 2003 IEEE Wireless Communications and Networking, IEEE, 3 1516
  • [77] Rahman A and Gburzyński P 2006 Hidden problems with the hidden node problem, Proceedings of 23rd Biennial Symposium on Communications 270
  • [78] Wang L, Wu K and Hamdi M 2012 Combating hidden and exposed terminal problems in wireless networks, IEEE Transactions on Wireless Communications 11 (11) 4204
  • [79] Hassan W H et al. 2019 Current research on internet of things (IoT) security: A survey, Computer Networks 148 283
  • [80] Perrig A, Szewczyk R, Tygar J D, Wen V and Culler D E 2002 SPINS: Security protocols for sensor networks, Wireless networks 8 (5) 521
  • [81] Mbarek B and Meddeb A 2016 Energy efficient security protocols for wireless sensor networks: SPINS vs TinySec, 2016 International Symposium on Networks, Computers and Communications (ISNCC), IEEE 1
  • [82] Khan M A and Salah K 2018 IoT security: Review, blockchain solutions and open challenges, Future Generation Computer Systems 82 395
  • [83] Gay D, Levis P, Von Behren R, Welsh M, Brewer E and Culler D 2014 The nesc language: A holistic approach to networked embedded systems, Sigplan Notices 49 (4) 41
  • [84] Daemen J and Rijmen V 2013 The design of Rijndael: AES-the advanced encryption standard, Springer Science & Business Media
  • [85] Rogaway P, Wooding M and Zhang H 201 The security of ciphertext stealing, International Workshop on Fast Software Encryption, Springer 180
  • [86] Bellare M, Kilian J and Rogaway P 2000 The security of the cipher block chaining message authentication code, Journal of Computer and System Sciences 61 (3) 362
  • [87] Raymond D R and Midkiff S F 2008 Denial-of-service in wireless sensor networks: Attacks and defenses, IEEE Pervasive Computing, 1 74
  • [88] Seba A, Nouali-Taboudjemat N, Badache N and Seba H 2019 A review on security challenges of wireless communications in disaster emergency response and crisis management situations, Journal of Network and Computer Applications 126 150
  • [89] Ghildiyal S, Mishra A K, Gupta A and Garg N 2014 Analysis of denial of service (DoS) attacks in wireless sensor networks, IJRET: International Journal of Research in Engineering and Technology 3 2319
Uwagi
PL
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-082a89c7-cd22-43de-88c8-879b9a5a467e
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.