sensor network operations - download.e-bookshelf.de · 3.2 controlled mobility for efficient data...

30
SENSOR NETWORK OPERATIONS Edited by Shashi Phoha Thomas LaPorta Christopher Griffin IEEE PRESS A JOHN WILEY & SONS, INC PUBLICATION

Upload: others

Post on 14-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

  • SENSOR NETWORKOPERATIONS

    Edited by

    Shashi Phoha

    Thomas LaPorta

    Christopher Griffin

    IEEE PRESS

    A JOHN WILEY & SONS, INC PUBLICATION

    Innodata9780471784166.jpg

  • SENSOR NETWORKOPERATIONS

  • IEEE Press445 Hoes Lane

    Piscataway, NJ 08854

    IEEE Press Editorial BoardMohamed E. El-Hawary, Editor-in-Chief

    M. Akay R. J. Herrick F. M. B. PereiraJ. B. Anderson S. V. Kartalopoulos C. SinghJ. E. Brewer M. Montrose G. ZobristT. G. Croda M. S. Newman

    Kenneth Moore, Director of IEEE Book and InformationCatherine Faduska, Acquisitions Editor, IEEE Press

    Jeanne Audino, Project Editor, IEEE Press

  • SENSOR NETWORKOPERATIONS

    Edited by

    Shashi Phoha

    Thomas LaPorta

    Christopher Griffin

    IEEE PRESS

    A JOHN WILEY & SONS, INC PUBLICATION

  • Copyright C© 2006 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved.

    Published by John Wiley & Sons, Inc.Published simultaneously in Canada.

    No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by anymeans, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted underSection 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of thePublisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center,Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web atwww.copyright.com. Requests to the Publisher for permission should be addressed to the PermissionsDepartment, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201)748-6008, or online at http://www.wiley.com/go/permission.

    Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts inpreparing this book, they make no representations or warranties with respect to the accuracy or completeness ofthe contents of this book and specifically disclaim any implied warranties of merchantability or fitness for aparticular purpose. No warranty may be created or extended by sales representatives or written sales materials.The advice and strategies contained herein may not be suitable for your situation. You should consult with aprofessional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any othercommercial damages, including but not limited to special, incidental, consequential, or other damages.

    For general information on our other products and services or for technical support, please contact our CustomerCare Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 orfax (317) 572-4002.

    Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not beavailable in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.

    Library of Congress Cataloging-in-Publication Data is available.

    ISBN-13 978-0-471-71976-2ISBN-10 0-471-71976-5

    Printed in the United States of America

    10 9 8 7 6 5 4 3 2 1

    http://www.copyright.comhttp://www.wiley.com/go/permissionhttp://www.wiley.com

  • To Him in whose presence to present oneself is to find oneself.—Shashi Phoha

    I dedicate this book to Lisa, Abigail, and Sophia.—Thomas F. LaPorta

    For Amy, my darling wife, who put up with me during this project. I love youmore than you can imagine.

    —CHG

  • CONTENTS

    PREFACE xiii

    CONTRIBUTORS xv

    I SENSOR NETWORK OPERATIONS OVERVIEW 1

    1 Overview of Mission-Oriented Sensor Networks 3

    1.1 Introduction / 31.2 Trends in Sensor Development / 41.3 Mission-Oriented Sensor Networks: Dynamic Systems Perspective / 8References / 10

    II SENSOR NETWORK DESIGN AND OPERATIONS 11

    2 Sensor Deployment, Self-Organization, and Localization 13

    2.1 Introduction / 132.2 SCARE: A Scalable Self-Configuration and Adaptive

    Reconfiguration Scheme for Dense Sensor Networks / 142.3 Robust Sensor Positioning in Wireless Ad Hoc Sensor Networks / 352.4 Trigonometric k Clustering (TKC) for Censored Distance Estimation / 512.5 Sensing Coverage and Breach Paths in Surveillance Wireless

    Sensor Networks / 68References / 86

    3 Purposeful Mobility and Navigation 91

    3.1 Introduction / 913.2 Controlled Mobility for Efficient Data Gathering in Sensor

    Networks with Passively Mobile Nodes / 923.3 Purposeful Mobility in Tactical Sensor Networks / 1133.4 Formation and Alignment of Distributed Sensing Agents with

    Double-Integrator Dynamics and Actuator Saturation / 126

    vii

  • viii CONTENTS

    3.5 Modeling and Enhancing the Data Capacity of Wireless SensorNetworks / 157

    References / 179

    4 Lower Layer Issues—MAC, Scheduling, and Transmission 185

    4.1 Introduction / 1854.2 SS-TDMA: A Self-Stabilizing Medium Access Control (MAC) for

    Sensor Networks / 1864.3 Comprehensive Performance Study of IEEE 802.15.4 / 2184.4 Providing Energy Efficiency for Wireless Sensor Networks

    Through Link Adaptation Techniques / 237References / 257

    5 Network Routing 263

    5.1 Introduction / 2635.2 Load-Balanced Query Protocols for Wireless Sensor Networks / 2645.3 Energy-Efficient and MAC-Aware Routing for Data Aggregation in

    Sensor Networks / 2915.4 LESS: Low-Energy Security Solution for Large-scale Sensor

    Networks Based on Tree-Ripple-Zone Routing Scheme / 308References / 329

    6 Power Management 337

    6.1 Introduction / 3376.2 Adaptive Sensing and Reporting in Energy-Constrained Sensor

    Networks / 3386.3 Sensor Placement and Lifetime of Wireless Sensor Networks:

    Theory and Performance Analysis / 3546.4 Algorithms for Maximizing Lifetime of Battery-Powered Wireless

    Sensor Nodes / 3676.5 Battery Lifetime Estimation and Optimization for Underwater

    Sensor Networks / 397References / 416

    7 Distributed Sensing and Data Gathering 421

    7.1 Introduction / 4217.2 Secure Differential Data Aggregation for Wireless Sensor Networks / 4227.3 Energy-Conserving Data Gathering Strategy Based on Trade-off

    Between Coverage and Data Reporting Latency in Wireless SensorNetworks / 442

    7.4 Quality-Driven Information Processing and Aggregation inDistributed Sensor Networks / 467

  • CONTENTS ix

    7.5 Progressive Approach to Distributed Multiple-Target Detection inSensor Networks / 486

    References / 504

    8 Network Security 509

    8.1 Introduction / 5098.2 Energy Cost of Embedded Security for Wireless Sensor Networks / 5108.3 Increasing Authentication and Communication Confidentiality in

    Wireless Sensor Networks / 5228.4 Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc

    Networks / 5358.5 Fast and Scalable Key Establishment in Sensor Networks / 5578.6 Weil Pairing-Based Round, Efficient, and Fault-Tolerant Group

    Key Agreement Protocol for Sensor Networks / 571References / 580

    III SENSOR NETWORK APPLICATIONS 587

    9 Pursuer–Evader Tracking in Sensor Networks 589

    9.1 Introduction / 5899.2 The Problem / 5909.3 Evader-Centric Program / 5929.4 Pursuer-Centric Program / 5959.5 Hybrid Pursuer–Evader Program / 5969.6 Efficient Version of Hybrid Program / 5999.7 Implementation and Simulation Results / 6009.8 Discussion and Related Work / 605

    References / 607

    10 Embedded Soft Sensing for Anomaly Detection in MobileRobotic Networks 609

    10.1 Introduction / 60910.2 Mobile Robot Simulation Setup / 61410.3 Software Anomalies in Mobile Robotic Networks / 61510.4 Soft Sensor / 61610.5 Software Anomaly Detection Architecture / 61610.6 Anomaly Detection Mechanisms / 61810.7 Test Bed for Software Anomaly Detection in Mobile Robot Application / 61910.8 Results and Discussion / 62310.9 Conclusions and Future Work / 626Appendix A / 626Appendix B / 627References / 628

  • x CONTENTS

    11 Multisensor Network-Based Framework for VideoSurveillance: Real-Time Superresolution Imaging 631

    11.1 Introduction / 63211.2 Basic Model of Distributed Multisensor Surveillance System / 63211.3 Superresolution Imaging / 63611.4 Optical Flow Computation / 63811.5 Superresolution Image Reconstruction / 64411.6 Experimental Results / 64411.7 Conclusion / 645References / 646

    12 Using Information Theory to Design Context-SensingWearable Systems 649

    12.1 Introduction / 64912.2 Related Work / 65112.3 Theoretical Background / 65112.4 Adaptations / 65412.5 Design Considerations / 66212.6 Case Study / 66312.7 Results / 66612.8 Conclusion / 674Appendix / 674References / 675

    13 Multiple Bit Stream Image Transmission over WirelessSensor Networks 677

    13.1 Introduction / 67713.2 System Description / 67913.3 Experimental Results / 68513.4 Summary and Discussion / 686References / 687

    14 Hybrid Sensor Network Test Bed for Reinforced Target Tracking 689

    14.1 Introduction / 68914.2 Sensor Network Operational Components / 69014.3 Sensor Network Challenge Problem / 69414.4 Integrated Target Surveillance Experiment / 69514.5 Experimental Results and Evaluation / 69814.6 Conclusion / 701References / 703

    15 Noise-Adaptive Sensor Network for Vehicle Tracking in the Desert 705

    15.1 Introduction / 70615.2 Distributed Tracking / 708

  • CONTENTS xi

    15.3 Algorithms / 71015.4 Experimental Methods / 71215.5 Results and Discussion / 71415.6 Conclusion / 715References / 715

    ACKNOWLEDGMENTS 717

    INDEX 719

    ABOUT THE EDITORS 723

  • PREFACE

    In recent years, interest in sensor networks has evolved from a subject solely of researchto one of deployed systems. As new applications have arisen that use sensor networks, thedemands on these networks have grown. One of the main challenges with these networks ishow to manage missions from application requirements to network operation. By their na-ture, most sensor networks are mission specific. They therefore place specific requirementson network systems that in turn dictate the use of certain algorithms.

    In this book we present the state-of-the art on methods for sensor network operations. Thisincludes algorithms for configuring networks to meet mission requirements and applicationsin the real world.

    FOCUS

    The focus of this book is on sensor network operations, starting from translating missionspecifications into operational algorithms and applications. The technologies presented aregeneral in terms of the types of transducers and data being gathered.

    INTENDED AUDIENCE

    This book is intended for researchers and practitioners interested in any aspect of sensornetwork operations. For researchers, this book serves as a starting point into research inareas such as algorithms for sensor placement, power management, routing, or applicationsof sensor networks. It may serve as a comprehensive tutorial or be used as the basis fornew research projects. For practitioners, this book contains many algorithms, protocols, andexperiments that will prove useful in the design and deployment of mission-specific sensornetworks.

    ORGANIZATION

    This book is organized into three parts. The first part provides the motivation and overviewof the book and gives a background on sensor platforms and mission-oriented sensor net-works. The second part of the book is arranged into seven chapters and presents many

    xiii

  • xiv PREFACE

    algorithms for controlling sensor networks. This includes deployment and localization,mobility management, low layer protocols, routing, power management, data gathering anddissemination, and security. The third part of the book presents several sensor networkapplications and illustrates how sensor networks may be used.

    SHASHI PHOHATHOMAS LAPORTACHRISTOPHER GRIFFIN

    January 2006

  • CONTRIBUTORS

    Gordon B. Agnew, University of Waterloo, Ontario, Canada

    Anish Arora, Ohio State University, Computer Science & Engineering, Columbus, Ohio

    Mahesh Arumugam, Michigan State University, East Lansing, Michigan

    Saurabh Bagchi, Purdue University, West Lafayette, Indiana

    Kiran S. Balagani, Pennsylvania State University, Mechanical Engineering, StateCollege, Pennsylvania

    N. Balakrishnan, Indian Institute of Science, Supercomputing Research Center,Bangalore, Karnataka, India

    Pierre Baldi, Center for Pervasive Communications and Computing, Irvine, California

    Steve Beck, University of Tennessee, Knoxville, Tennessee

    Pratik K. Biswas, Pennsylvania State University, State College, Pennsylvania

    Hasan Çam, Arizona State University, Computer Science and Engineering, Tempe,Arizona

    Guohong Cao, Pennsylvania State University, State College, Pennsylvania

    Krishnendu Chakrabarty, Duke University, Electrical and Computer Engineering,Durham, North Carolina

    Chang Wen Chen, Florida Institute of Technology, Electrical Computer Engineering,Melbourne, Florida

    Wook Choi, University of Texas at Arlington, Computer Science and Engineering,Arlington, Texas

    Kaviraj Chopra, University of Arizona, Electrical and Computer Engineering, Tucson,Arizona

    Song Ci, University of Massachusetts, Boston, Massachusetts

    Sajal K. Das, University of Texas at Arlington, Computer Science and Engineering,Arlington, Texas

    Sridhar Dasika, University of Arizona, Electrical and Computer Engineering, Tucson,Arizona

    Hakan Deliç, Bogazici University, Bebek, Istanbul, Turkey

    Murat Demirbas, Ohio State University, Computer Science & Engineering, Columbus,Ohio

    xv

  • xvi CONTRIBUTORS

    Roberto Di Pietro, Università, di Roma, Dipartimento di Informatica, Roma, Italy

    Tassos Dimitriou, Athens Information Technology, Athens, Greece

    Cem Ersoy, Bogazici University, Bebek, Istanbul, Turkey

    Mohamed Gouda, University of Texas at Austin, Computer Sciences, Austin, Texas

    Stanley Grant, California Institute for Telecommunications and InformationTechnology, La Jolla, California

    Eric Grele, Pennsylvania State University, State College, Pennsylvania

    Christopher Griffin, Pennsylvania State University, State College, Pennsylvania

    Bechir Hamdaoui, University of Wisconsin, Madison, Wisconsin

    Sharif Hamid, University of Nebraska–Lincoln, Computer and Electronics Engineering,Omaha, Nebraska

    Kristin Herlugson, Washington State University, Pullman, Washington

    Anh Tuan Hoang, National University of Singapore, Electrical & Computer Engineering,Singapore

    Alireza Hodjat, UCLA, Electrical Engineering, Los Angeles, California

    Fei Hu, Rochester Institute of Technology, Computer Engineering Department, Rochester,New York

    Tzonelih Hwang, National Cheng Kung University, Department of Computer Science andInformation Engineering, Tainan, Taiwan

    S. S. Iyengar, Louisiana State University, Computer Science Department, Baton Rouge,Louisiana

    Ekta Jain, University of Texas at Arlington, Electrical Engineering, Arlington, Texas

    Xiang Ji, Pennsylvania State University, Department of Computer Science and Engineer-ing, Universtiy Park, Pennsylvania

    Holger Junker, Wearable Computing Lab, EE, Zurich, Switzerland

    Raja Jurdak, University of California, Irvine, Information and Computer Science, Irvine,California

    G. Kesidis, Pennsylvania State University, State College, Pennsylvania

    John Koch, Pennsylvania State University, State College, Pennsylvania

    Ioannis Krontiris, Athens Information Technology, Athens, Greece

    Sandeep Kulkarni, Michigan State University, East Lansing, Michigan

    Thomas LaPorta, Pennsylvania State University, State College, Pennsylvania

    Bennett Lau, Purdue University, West Lafayette, Indiana

    Ha V. Le, Vientnam National University, Computer Science Department, Hanoi, Vietnam

    Duke Lee, UC Berkeley, Electrical Engineering and Computer Science, Berkeley,California

    Myung J. Lee, City College of New York, Electrical Engineering, New York, NewYork

  • CONTRIBUTORS xvii

    Tian-Fu Lee, National Cheng Kung University, Department of Computer Science andInformation Engineering, Tainan, Taiwan

    Zhiyuan Li, Purdue University, West Lafayette, Indiana

    Jie Lian, University of Waterloo, Ontario, Canada

    Qilian Liang, University of Texas at Arlington, Electrical Engineering, Arlington, Texas

    R. Logananthraj, University of Louisiana at Lafayette, Center for Advanced ComputerStudies, Lafayette, Louisiana

    Cristina Videira Lopes, University of California, Irvine, Chemical Engineering andMaterials Science, Irvine, California

    Yung-Hsiang Lu, Purdue University, West Lafayette, Indiana

    Stefan Lucks, NEC Europe Ltd., Network Laboratories, Heidelberg, Germany andMannheim University, Computer Science, Mannheim, Germany

    Paul Lukowicz, Electronics Laboratory, EE, Zurich, Switzerland

    Bharat Madan, Pennsylvania State University, State College, Pennsylvania

    Nipoon Malhotra, Purdue University, West Lafayette, Indiana

    Luigi V. Mancini, University of Rome, Department of Information, Rome, Italy

    Carter May, Rochester Institute of Technology, Computer Engineering Department,Rochester, New York

    Alessandro Mei, University of Rome, Department of Information, Rome, Italy

    Mehul Motani, Institute for Infocomm Research, Singapore

    Amit U. Nadgar, Pennsylvania State University, Mechanical Engineering, State College,Pennsylvania

    Kshirasagar Naik, University of Waterloo, Ontario, Canada

    Prashant Nair, Arizona State University, Computer Science and Engineering, Tempe,Arizona

    Fotios Nikakis, Athens Information Technology, Athens, Greece

    Krishna Nuli, University of Nebraska—Lincoln, Computer and Electronics Engineering,Omaha, Nebraska

    Ertan Onur, Bogazici University, Bebek, Istanbul, Turkey

    Suat Ozdemir, Arizona State University, Computer Science and Engineering, Tempe,Arizona

    Symeon Papavassiliou, New Jersey Institute of Technology, Electrical and ComputerEngineering, Newark, New Jersey

    Shashi Phoha, Pennsylvania State University, University Park, Pennsylvania

    Vir V. Phoha, Louisiana Tech University, Computer Science, Ruston, Louisiana

    Raviraj Prasad, University of Nebraska—Lincoln, Computer and Electronics Engineer-ing, Omaha, Nebraska

    Hairong Qi, University of Tennessee, Knoxville, Tennessee

  • xviii CONTRIBUTORS

    Parmeswaran Ramanathan, University of Wisconsin, Madison, Wisconsin

    Vaithiyam Ramesh, Rochester Institute of Technology, Rochester, New York

    Hamid Sharif, University of Nebraska, Lincoln, Nebraska

    Asok Ray, Pennsylvania State University, Mechanical Engineering, University Park,Pennsylvania

    Sandip Roy, Washington State University, Pullman, Washington

    Harshavardhan Sabbineni, Duke University, Electrical and Computer Engineering,Durham, North Carolina

    Ali Saberi, Washington State University, Pullman, Washington

    H. Ozgur Sanli, Arizona State University, Computer Science and Engineering, Tempe,Arizona

    Vrudhula Sarma, University of Arizona, Electrical and Computer Engineering, Tucson,Arizona

    Guna Seetharaman, Air Force Institute of Technology, Department of Electrical andComputer Engineering, Wright Patterson AFB, Ohio

    Sivakumar Sellumuthu, Wayne State University, Computer Science, Detroit, Michigan

    Sengupta Raja, UC Berkeley, Electrical Engineering and Computer Science, Berkeley,California

    Kewei Sha, Wayne State University, Computer Science, Detroit, Michigan

    Weisong Shi, Wayne State University, Computer Science, Detroit, Michigan

    Waqaas Siddiqui, Rochester Institute of Technology, Rochester, New York

    Yuldi Tirta, Purdue University, West Lafayette, Indiana

    Gerhard Troester, Wearable Computing Lab, EE, Zurich, Switzerland

    Pravin Varaiya, UC Berkeley, Civil Engineering, Berkeley, California

    Raviteja Varanasi, Pennsylvania State University, Mechanical Engineering, StateCollege, Pennsylvania

    Ingrid Verbauwhede, UCLA, Electrical Engineering, Los Angeles, California

    Xiaoling Wang, University of Tennessee, Knoxville, Tennessee

    André Weimerskirch, Ruhr-University Bochum, Communication Security, Bochum,Germany

    Hsiang-An Wen, National Cheng Kung University, Department of Computer Science andInformation Engineering, Tainan, Taiwan

    Dirk Westhoff, NEC Europe Ltd., Network Laboratories, Heidelberg, Germany andMannheim University, Computer Science, Mannheim, Germany

    Min Wu, University of Missouri–Columbia, Electrical Engineering, Columbia, Missouri

    Jie Yang, New Jersey Institute of Technology, Electrical and Computer Engineering,Newark, New Jersey

    Bin Yao, Pennsylvania State University, State College, Pennsylvania

  • CONTRIBUTORS xix

    Erik Zenner, NEC Europe Ltd., Network Laboratories, Heidelberg, Germany andMannheim University, Computer Science, Mannheim, Germany

    Hongyuan Zha, Pennsylvania State University, Department of Computer Science andEngineering, State College, Pennsylvania

    Jianliang Zheng, City College of New York, Electrical Engineering, New York, New York

    Jin Zhu, New Jersey Institute of Technology, Electrical and Computer Engineering,Newark, New Jersey

  • ISENSOR NETWORK

    OPERATIONS OVERVIEW

  • 1OVERVIEW OF

    MISSION-ORIENTEDSENSOR NETWORKS

    1.1 INTRODUCTION

    Sensor networks represent a new frontier in technology that holds the promise of unprece-dented levels of autonomy in the execution of complex dynamic missions by harnessingthe power of many inexpensive electromechanical microdevices. Miniature sensing andcomputational devices, often embedded in wireless electromechanical platforms, are be-ing developed to interact directly with the physical world. Spanning time and space, andcognizant of a common mission, they monitor changes in the operational environment andcollaborate to actuate distributed tasks in dynamic and uncertain environments. Dispersedover a hostile battlefield, these devices may self-organize to act as numerous eyes and earsof soldiers surveying the field from a safe distance. Embedded in unmanned air vehicles,they may monitor bio/chemical plumes in the atmosphere or handle hazardous materialson the ground. Mobile robots with embedded sensor systems explore the surface of Mars;and integrated systems of undersea robots are being designed to hunt for mines in shallowwater and to develop high fidelity now casts and forecasts of the ocean through time–spacecoordinated sampling. Sensor networks are expected to play an important role in transporta-tion management and safety and in medical applications. More commonplace applicationsinclude fine-grain monitoring of indoor environments, buildings, and home appliances. Ingeneral, the next phase of automation calls on networks of sensors to take on the dull,dirty, and dangerous functions of human interest, accomplishing them with the perceptionand adaptation of humans, in collaboration with humans. As a system of interacting sen-sor nodes, a sensor network is a human-engineered, complex dynamic system that mustcombine its understanding of the physical world with its computational and control func-tions and operate with constrained resources. As a distributed dynamic system, these tinydistributed devices must collectively comprehend the time evolution of physical and oper-ational phenomena and predict their effects on mission execution and then actuate controlactions that execute common high-level mission goals.

    Sensor Network Operations, Edited by Phoha, LaPorta, and GriffinCopyright C© 2006 The Institute of Electrical and Electronics Engineers, Inc.

    3

  • 4 OVERVIEW OF MISSION-ORIENTED SENSOR NETWORKS

    This book presents new advances for engineering and operating sensor networks tomeet specified mission goals. Prior to deployment, these mission-oriented sensor networks(MoSNs) need to be endowed with distributed high-level representations of mission specifi-cations that can be dynamically executed by harnessing the collective powers of distributedsensor/actuator nodes in unknown or uncertain environments. Collaborative intelligent in-ference is necessary to circumvent limitations of sensor data, communications, and equip-ment faults. Emergent behaviors and phase transitions must be modeled, predicted, andcontrolled.

    1.2 TRENDS IN SENSOR DEVELOPMENT

    Shashi Phoha and Thomas LaPorta

    Sensors of physical phenomena with integrated servomechanisms have been commonplacethroughout the latter half of the twentieth century controlling thermostats and valves, mon-itoring flow or adapting to changes in pressure or stress, and providing alarms for fire orflooding. As dynamic systems, they have been expected to perform these and many otherlocalized isolated tasks with precision and reliability. These applications relied on staticallypositioned sensors designed to operate independently for long periods of time (months toyears) with nonrenewable power supplies. Traditional sensor technology was characterizedby large transducers, highly capable processing platforms, and complex signal and dataprocessing software. These characteristics limited the types of applications that could makeuse of sensor technology. Sensor technology has matured resulting in smaller and moreefficient transducers, processing platforms, and communication modules. In addition, thecommunications capabilities of sensors have greatly improved to allow large-scale networksof sensors to be formed. These advancements have paved the way for a much broader setof applications of sensors.

    The present-day demands on sensor networks entail comprehensive perception of locallysensed changes in the physics of the environment and adaptive time–space coordinatedcontrol of individual servomechanisms in support of a common mission [1]. The state-of-the-art in sensor technology now supports extremely small sensors that may be highly mobileand power efficient and are equipped with sufficient computing capabilities to run distributedalgorithms to manage their motion, process data, and form and manage networks. As aresult, algorithms for managing sensor networks, and the applications that use them, havegrown increasingly complex. In this book we provide a collection of studies that represent acomprehensive treatment of the current state of research with respect to sensor networks. Weprovide a brief overview of the state-of-the art in sensor platforms and algorithms dealingwith the computational infrastructure issues for sensor networks.

    1.2.1 Sensor Platforms

    Sensor platforms are comprised of four main components: transducers, a hardware com-puting platform, an operating system, and communication modules. The transducers areresponsible for monitoring an area of interest and gathering data. The computing platformand operating system are responsible for processing and formatting data received from thetransducers so that it is useful to an application that is analyzing data from the sensor field.

  • 1.2 TRENDS IN SENSOR DEVELOPMENT 5

    These modules also run control algorithms to move sensors, form networks, aggregate data,and perform security functions. The hardware computing platform typically consists of acentral processing unit (CPU), memory, and input/output (I/O) ports. The operating systemruns on the computing hardware and is used to provide a software interface to the hardwareand to provide a degree of programmability. The communication module has two functions.First, it provides an interface for the transducers to transmit their gathered data into thecomputing platform. Second, it is used to transmit data back to a server where it is analyzedalong with data received from other sensors. This module may include multiple I/O inter-faces. Today, wireless interfaces are becoming the dominant communication technology forsensor networks because of their ease of deployment and reduced cost.

    There are a tremendous number of research efforts on transducer technologies thatare beyond the scope of this book. Overviews of some major efforts can be found athttp://www.cens.ucla.edu/ and http://www.el.utwente.nl/tt/. This research has resulted inminiature transducers for sensing many types of phenomena, thus placing the onus on thedesigners of computing platforms, operating systems, and communication modules to re-duce the size and cost of their components so that entire sensor packages are small. Inthe following subsections we review the prevailing technology in the hardware computingplatform, operating systems, and communication modules.

    Computing Hardware By far, the most popular processing platform for small sensordevices is based on the so-called Mote hardware that was developed at the University ofCalifornia at Berkeley. This family of hardware platform has been productized by Crossbow(www.xbow.com) as the MICA product line. The platforms are characterized by small size,power efficiency, and very limited CPU and memory capabilities when compared to conven-tional processing platforms, such as desktop personal computers (PCs). However, despitetheir limitations, they provide a highly capable system for developing sensor applicationsin a form factor that may be used in many harsh, inaccessible environments.

    The MICA 2 Mote weighs 0.7 ounces and is 58 × 32 × 7 mm, making it ideal for de-ployment for many applications that require very small sensors. The MICA 2 has 128 kbytesof program memory and 512 kbytes of memory for storing samples. The MICA 2 has a10-bit analog-to-digital (A/D) converter, so it can store over 100,000 samples in its mem-ory. The MPR400CB processor board runs the communications and networking protocolssimultaneously with application software. The MICA 2 has a 51-pin expansion connectorto allow it to interface with many types of external transducers. It also supports severalinternal transducer cards. It draws 8 mA while active, and less than 15 µA while in sleepmode. We will discuss the radio capabilities of the MICA 2 in the next subsection, but itis designed to be deployed in large-scale sensor networks of over 1000 nodes. If a smallerplatform is required, the MICA 2DOT has capabilities similar to the MICA 2, but has aform factor of approximately the size of a quarter, or a thickness of 6 mm and a diameterof 25 mm. The major difference between the MICA 2 and the MICA 2DOT is that theMICA 2DOT offers far fewer I/O connections. It has 18 pins for connecting external pe-ripherals. It is clear from the description of the hardware computing platform, that while thepresence of a CPU and memory allows for many types of algorithm to execute, they mustbe specially designed to account for the hardware limitations. We illustrate this point withthree examples. First, consider security. In most Internet environments, security is providedusing encryption using either DES or AES. The DES algorithm requires about 20 kbytesof memory to store the program if written in C, and approximately another 20 kbytes of

  • 6 OVERVIEW OF MISSION-ORIENTED SENSOR NETWORKS

    memory to store the variable used during its run-time operation. Therefore, it would occupyalmost one-third of the available memory on the platform, making it infeasible to use. Solu-tions include using hardware support for encryption/decryption or using simpler algorithms.These choices present trade-offs in terms of hardware complexity, power consumption, andoverall strength of security. Second, consider routing. In an Internet environment, routing isperformed using proactive protocols that exchange link state or distance vectors, requiringlarge tables to be stored in individual routers. These tables included next-hop routes for alldestinations. In a large sensor network, if sensor nodes forward data for each other, thesetables will become prohibitively large to store on memory-limited sensor nodes. Therefore,new routing algorithms and protocols must be developed.

    Finally, the operating system itself is typically several megabytes on a conventionalcomputing platform. Given the limited memory on a Mote, new operating systems mustbe defined, as discussed in the next subsection. Another example of very simple sensornodes are RFID tags, which are often passive devices with no power or computing capabil-ities. Active badges, such as those developed in the iBadge project (http://nesl.ee.ucla.edu/projects/ibadge/) at UCLA are another example. The iBadge is 2.3 ounces and has a lifetimeof over 4 h. It uses BlueTooth for radio communication and has on-board localization andspeech processing capabilities.

    In addition to simple end devices, much more capable sensor computing platformsexist. These are typically used as gateways to aggregate traffic from simple sensors to abackbone network or operate in controlled environments with persistent power supplies. Oneexample is the Crossbow Stargate XScale Network Interface and Single Board Computer.The Stargate runs the Linux operating system and provides USB and PCMCIA and Ethernetinterfaces. Another example is the Sensoria (http://www.sensoria.com/) sGate. Like theStargate, the sGate runs Linux. It has a 32-bit 300-MIPs processor. Essentially, these aregeneral-purpose processors that can perform complex functions to support security, routing,and data processing.

    Operating Systems Operating systems for sensor nodes must be very lightweight andoccupy only a small amount of memory. Because sensor applications have many commoncharacteristics, the operating system design can be very specialized. The operating systemsmost commonly used across a wide range of sensor platforms is the TinyOS, which wasdeveloped as part of the Smart Dust project at Berkeley, the same project that led to theMote. While the Mote has been productized by Crossbow, the TinyOS is maintained asopen source by the research group at Berkeley and has a very large user community. Detailsof the TinyOS, the source code, and a list of platforms that support its use are available athttp://webs.cs.berkely.edu/tos.

    The TinyOS is designed to support event-driven applications. In addition, it supportsconcurrency so that many events may be monitored simultaneously. These two character-istics are the most important user features of the OS. It is designed to run with minimalsupport from hardware, thus enabling sensor computing platforms to use simple, low-powerdevices. TinyOS supports programming in a language very similar to C. More capable sen-sor nodes, such as the Stargate and sGate discussed above, often use off-the-shelf operatingsystems, such as Linux.

    Communication Modules As stated earlier, the communication modules of sensorplatforms support both reading data from transducers and communication links that are

  • 1.2 TRENDS IN SENSOR DEVELOPMENT 7

    used to form a network for passing sensor data back to a server for processing. Wireless isthe most popular media for sensor networks. Much research is still ongoing to determine thebest wireless communications technology and low layer access protocols to be used in sen-sor networks. Considerations include transmission range, power consumption, bandwidth,and traffic types to be supported. Whereas many sensor applications of disparate type havemigrated to the Mote platform and TinyOS for a computing platform, because these appli-cations have vastly different data transmission requirements, several radio technologies arestill under consideration. For example, many sensor applications assume that sensors willbe densely deployed and that low-bit-rate telemetry or event reporting will be transmittedacross the network. For these applications, a low-power, low-bit-rate radio suffices becausesensors may relay traffic for each other, and not much data is being transmitted. On theother hand, sensor networks that support applications that include the transmission of im-ages or video streams when an event of interest is detected, must support the transmissionof high-bit-rate, bursty data. These sensors require the use of radios more typical of wirelesslocal area networks. Because power consumption of wireless transmission may be high, theradio interfaces tend to be more specialized with respect to applications than the computinghardware platform or operating system.

    The MICA 2 sensors use radios that operate in the ISM band, specifically at 868, 916,315, or 315 MHz. Depending on the model, between 4 and 50 channels are supported on asingle platform. Data is transmitted at 38.4 kbaud using Manchester encoding. These radioswork at low power, 25 to 27 mA, for transmitting at maximum power, 8 to 10 mA to receive,and less than 1 µA while in sleep mode. Their outdoor transmission range is 500 to 1000 ft.One ongoing research effort to produce a much lower power radio is the PicoRadio projectat Berkeley. Details can be found at http://bwrc.eecs.berkeley/Research/PicoNet. The goalof this project is to produce a radio that costs less than 50 cents and draws less than 5 nJ percorrectly transmitted bit. In fact, the goal is to design the overall node to be so low power thatit can scavenge energy from the environment through vibrations or other means. A seconddirection for radio advancements for sensor networks is through the 802.15.4 standard.Ember (http://www.ember.com/) has a commercially available version of a radio designedfor sensor networks based on this technology. The radio is 7 × 7 mm, has a range of 75 m,and supports 128-bit AES encryption. The radio operates in the 2.4 GHz ISM band andsupports up to 16 channels with 5-MHz spacing per channel. Data is transmitted at 250 kbpsusing OQPSK Direct Sequence Spread Spectrum. The power consumption is similar to thatof the MICA 2 radio 20.7 mA to transmit, 19.7 mA to receive, and 0.5 µA while idle. Otherwireless interfaces are also popular in sensor networks, including well-known standardssuch as BlueTooth and 802.11.

    Sensor Platform Summary As we have discussed, a very small form factor for sensornodes is critical for many applications. To meet these requirements great innovations havebeen applied to transducers, computing hardware, operating system, and communicationdesign. These systems are now commercially available from several companies. With theability to support more complex applications, more complex algorithms to support theseapplications are required to run in the sensor nodes. Even with the advances in sensorplatform technology, the resulting platforms are still quite limited compared to desktop andserver computing platforms. For this reason, much research is ongoing in designing andimplementing these algorithms with high efficiency.

  • 8 OVERVIEW OF MISSION-ORIENTED SENSOR NETWORKS

    1.2.2 Sensor Network Algorithms

    Many algorithms and protocols execute in sensor nodes to fulfill the mission of the net-worked sensing system. These algorithms must first enable dispersed sensors to form anetwork, determine their locations, and reconfigure or perhaps move to reposition so thatthe system may fulfill its mission. They must allow sensor nodes to efficiently gather data,access transmission media, communicate information to distant nodes, and disseminate in-formation that has been learned. Depending on the type of application, different levels ofsecurity must be provided to protect the integrity and privacy of the data being gatheredand disseminated. Finally, all of these algorithms must be designed with power efficiencyin mind.

    1.3 MISSION-ORIENTED SENSOR NETWORKS: DYNAMICSYSTEMS PERSPECTIVE

    Shashi Phoha

    For executing complex time-critical missions, a sensor network may be viewed as a dis-tributed dynamic system with dispersed interacting smart sensing and actuation devicesthat may be embedded in mobile or stationary platforms. A sensor network operates onan infrastructure for sensing, computation, and communications, through which it per-ceives the time evolution of physical dynamic processes in its operational environment.A mission-oriented sensor network (MoSN) is such a dynamic system that has also beenendowed with a high-level description of the goals of a specific mission. The MoSN nodesaccept inputs from interacting nodes for situation awareness and participate in individualor cluster-wide dynamic adaptation to meet mission goals. Advances in integrated wirelesscommunications, fast servocontrolled sensors/actuators, and micro- and nanotechnologies,have enabled large-scale integration of inexpensive computational and sensing devices thatcan be spatially dispersed for distributed monitoring of physical phenomena. With intel-ligent mechanisms for self-organization and adaptation, the sensor network can take onmany functions of human interest with the perception and adaptation of humans. The inter-active nonlinear and multi-time-frame dynamics of the resulting systems can approach thecomplexity of biological systems.

    Part II of the book covers recent research developments relating to the computational,communications, and networking designs of MoSNs that provide an adaptive infrastructurefor dependable data collection for real-time control and actuation. In harnessing the truepotential of networked sensors, a perceptive infrastructure is needed that adapts to the dy-namics of the mission. The infrastructure enables these dynamically self-reconfigurable andintrospective networks of possibly mobile sensor nodes to be capable of understanding andinterpreting mission objectives and adapting to the dynamics of harsh and often unknownphysical environments. These tiny distributed devices must collectively comprehend thetime evolution of physical phenomena and their effect on mission execution to close thedistributed feedback control loop.

    Part III of the book presents a wide range of pragmatic applications that are enabled bysensor networks. Multiple types of sensors are involved: acoustic, video, wearable context-sensitive sensor nodes, and even multimodal sensor nodes. A system of wearable sensorsis described for context recognition in human subjects. An unmanned underwater sensor