scholarly journals A Three-Tier Architecture for User-Centric Ubiquitous Networked Sensing

2012 ◽  
Vol 2012 ◽  
pp. 1-11 ◽  
Author(s):  
Jin Nakazawa ◽  
Hideyuki Tokuda

In a sensor network, sensor data are usually forwarded from sensor nodes to a database. This tight coupling between the nodes and the database has been complicating user-centric applications that traverse multiple different sensor networks. To break this coupling, thus enabling user-centric applications, we propose a three-tier architecture for ubiquitous networked sensing. Its major feature is that it contains the “core” device, which is assumed to be a terminal held by users between sensor nodes and sensor databases. This architecture supports the sensor data directly transmitted to and consumed by the core device, in addition to the classic ones that are transmitted to the sensor database first, and downloaded to the core. The major contribution of this paper are the following three-fold. First, we clarify the architecture itself. Researchers can leverage the architecture as the baseline of their development. Second, we show two types of prototype implementations of the core device. Industry is allowed to develop a new product for practical use of ambient sensing. Finally, we show a range of applications that are enabled by the architecture and indicate issues that need to be addressed for further investigation.

2011 ◽  
Vol 2-3 ◽  
pp. 131-134
Author(s):  
Naoya Sakamoto ◽  
Hideki Shimada ◽  
Kenya Sato

Sensor networks, which can immediately detect events and situations and automatically control actuators, are expected to proliferate in the future, even though their visualization of sensor networks has not been emphasized. Identifying broken nodes in real environments remains difficult using a traditional visualization tool that plots the virtual diagram on which sensor nodes are put. In this paper, we propose and implement a control system of sensor network devices with AR technology. Our proposed system displays sensor data and network information such as the link status, the packet data, and the traffic in the sensor network on an AR interface. In addition, we control the sensor devices through the AR interface. Our proposed system allows users to intuitively acquire the status of sensor networks. We can also control the devices through the AR interface.


Author(s):  
Vineela Devarashetty ◽  
Jeffrey J.P. Tsai ◽  
Lu Ma ◽  
Du Zhang

A sensor network consists of a large number of sensor nodes, which are spread over a geographical area. Sensor networks have found their way into many applications, from military domains to traffic or environmental monitoring, and as sensor networks reach toward wide spread deployment, security becomes a major concern. In this regard, one needs to be sure about the confidentiality, authenticity and tamper-proof of data. The research thus far has focused on how to deploy sensor networks so that they can work efficiently; however, the focus of this paper is on sensor networks’ security issues. In this paper, the authors propose a formal model to design and analyze the secure sensor network system. The model is based on an augmented Petri net formalism called Extended Elementary Object System. This proposed secure sensor network model has a multi-layered structure consisting of sink node layer, sensor node layer and security mechanism layer. At the security mechanism layer, a synchronous firing mechanism is utilized as a security measure to detect malicious node attacks to sensor data and information flow. In addition, the model applies SNEP protocol for authentication and confidentiality of sensor data.


2013 ◽  
Vol 284-287 ◽  
pp. 2021-2026
Author(s):  
Won Hyuck Choi ◽  
Min Seok Jie

The development of wireless communication and electronic technology leads to wireless sensor networks in various fields. Wireless sensor networks can exchange the data that generated from near environment field observation between other sensor nodes. Generally, Wireless sensor networks consist of multi sensor nodes and one or more sink nodes The sensor sensing data that nodes detected transmit from sensor networks to base station and deliver to users through internet. However sensor networks are restricted in the aspects of communication, processing data and energy consumption. Because of the low capacity batteries with devices of sensor networks, it is important to increase the lifespan operation life of sensor nodes by using energy efficiently. In this kind of sensor nodes, the energy consumption for message sending and receiving is very important for the maintenance of sensor nodes. In the existing static routing method, it consumes more energy for the maintenance of sensor network than dynamic routing method because data transmits repeatedly when the sensor data begin to spread. In this study, based on the difference in the cycle of information gathering in accordance with the characteristic of the sensor in sensor network and the cycle of demands from the sink in accordance with the characteristic of application layer, dynamic routing of wireless sensor network is proposed which actively responds to its various needs.


Author(s):  
Vineela Devarashetty ◽  
Jeffrey J.P. Tsai ◽  
Lu Ma ◽  
Du Zhang

A sensor network consists of a large number of sensor nodes, which are spread over a geographical area. Sensor networks have found their way into many applications, from military domains to traffic or environmental monitoring, and as sensor networks reach toward wide spread deployment, security becomes a major concern. In this regard, one needs to be sure about the confidentiality, authenticity and tamper-proof of data. The research thus far has focused on how to deploy sensor networks so that they can work efficiently; however, the focus of this paper is on sensor networks’ security issues. In this paper, the authors propose a formal model to design and analyze the secure sensor network system. The model is based on an augmented Petri net formalism called Extended Elementary Object System. This proposed secure sensor network model has a multi-layered structure consisting of sink node layer, sensor node layer and security mechanism layer. At the security mechanism layer, a synchronous firing mechanism is utilized as a security measure to detect malicious node attacks to sensor data and information flow. In addition, the model applies SNEP protocol for authentication and confidentiality of sensor data.


2018 ◽  
Vol 7 (2.26) ◽  
pp. 25
Author(s):  
E Ramya ◽  
R Gobinath

Data mining plays an important role in analysis of data in modern sensor networks. A sensor network is greatly constrained by the various challenges facing a modern Wireless Sensor Network. This survey paper focuses on basic idea about the algorithms and measurements taken by the Researchers in the area of Wireless Sensor Network with Health Care. This survey also catego-ries various constraints in Wireless Body Area Sensor Networks data and finds the best suitable techniques for analysing the Sensor Data. Due to resource constraints and dynamic topology, the quality of service is facing a challenging issue in Wireless Sensor Networks. In this paper, we review the quality of service parameters with respect to protocols, algorithms and Simulations. 


Author(s):  
Osman Salem ◽  
Alexey Guerassimov ◽  
Ahmed Mehaoua ◽  
Anthony Marcus ◽  
Borko Furht

This paper details the architecture and describes the preliminary experimentation with the proposed framework for anomaly detection in medical wireless body area networks for ubiquitous patient and healthcare monitoring. The architecture integrates novel data mining and machine learning algorithms with modern sensor fusion techniques. Knowing wireless sensor networks are prone to failures resulting from their limitations (i.e. limited energy resources and computational power), using this framework, the authors can distinguish between irregular variations in the physiological parameters of the monitored patient and faulty sensor data, to ensure reliable operations and real time global monitoring from smart devices. Sensor nodes are used to measure characteristics of the patient and the sensed data is stored on the local processing unit. Authorized users may access this patient data remotely as long as they maintain connectivity with their application enabled smart device. Anomalous or faulty measurement data resulting from damaged sensor nodes or caused by malicious external parties may lead to misdiagnosis or even death for patients. The authors' application uses a Support Vector Machine to classify abnormal instances in the incoming sensor data. If found, the authors apply a periodically rebuilt, regressive prediction model to the abnormal instance and determine if the patient is entering a critical state or if a sensor is reporting faulty readings. Using real patient data in our experiments, the results validate the robustness of our proposed framework. The authors further discuss the experimental analysis with the proposed approach which shows that it is quickly able to identify sensor anomalies and compared with several other algorithms, it maintains a higher true positive and lower false negative rate.


2018 ◽  
Vol 14 (11) ◽  
pp. 155014771881130 ◽  
Author(s):  
Jaanus Kaugerand ◽  
Johannes Ehala ◽  
Leo Mõtus ◽  
Jürgo-Sören Preden

This article introduces a time-selective strategy for enhancing temporal consistency of input data for multi-sensor data fusion for in-network data processing in ad hoc wireless sensor networks. Detecting and handling complex time-variable (real-time) situations require methodical consideration of temporal aspects, especially in ad hoc wireless sensor network with distributed asynchronous and autonomous nodes. For example, assigning processing intervals of network nodes, defining validity and simultaneity requirements for data items, determining the size of memory required for buffering the data streams produced by ad hoc nodes and other relevant aspects. The data streams produced periodically and sometimes intermittently by sensor nodes arrive to the fusion nodes with variable delays, which results in sporadic temporal order of inputs. Using data from individual nodes in the order of arrival (i.e. freshest data first) does not, in all cases, yield the optimal results in terms of data temporal consistency and fusion accuracy. We propose time-selective data fusion strategy, which combines temporal alignment, temporal constraints and a method for computing delay of sensor readings, to allow fusion node to select the temporally compatible data from received streams. A real-world experiment (moving vehicles in urban environment) for validation of the strategy demonstrates significant improvement of the accuracy of fusion results.


Information ◽  
2018 ◽  
Vol 9 (9) ◽  
pp. 236 ◽  
Author(s):  
Nengsong Peng ◽  
Weiwei Zhang ◽  
Hongfei Ling ◽  
Yuzhao Zhang ◽  
Lixin Zheng

A key issue in wireless sensor network applications is how to accurately detect anomalies in an unstable environment and determine whether an event has occurred. This instability includes the harsh environment, node energy insufficiency, hardware and software breakdown, etc. In this paper, a fault-tolerant anomaly detection method (FTAD) is proposed based on the spatial-temporal correlation of sensor networks. This method divides the sensor network into a fault neighborhood, event and fault mixed neighborhood, event boundary neighborhood and other regions for anomaly detection, respectively, to achieve fault tolerance. The results of experiment show that under the condition that 45% of sensor nodes are failing, the hit rate of event detection remains at about 97% and the false negative rate of events is above 92%.


2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Ahmad S. Almogren

With recent advances in wireless sensor networks and embedded computing technologies, body sensor networks (BSNs) have become practically feasible. BSNs consist of a number of sensor nodes located and deployed over the human body. These sensors continuously gather vital sign data of the body area to be used in various intelligent systems in smart environments. This paper presents an intelligent design of the body sensor network based on virtual hypercube structure backbone termed as Smart BodyNet. The main purpose of the Smart BodyNet is to provide resilience for the BSN operation and reduce power consumption. Various experiments were carried out to show the performance of the Smart BodyNet design as compared to the state-of-the-art approaches.


The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges on their security to researchers. These networks are likely to be composed of thousands of tiny sensor nodes, which are low-cost devices equipped with limited memory, processing, radio, and in many cases, without access to renewable energy resources. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. First, we propose some of the security goal for Wireless Sensor Network. To perform any task in WSN, the goal is to ensure the best possible utilization of sensor resources so that the network could be kept functional as long as possible. In contrast to this crucial objective of sensor network management, a Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of th


Sign in / Sign up

Export Citation Format

Share Document