Torsten Braun presented on developing and evaluating energy-efficient and adaptive protocols for wireless sensor networks. He discussed wireless sensor network applications like environmental and building monitoring. Key application requirements include energy efficiency, low delays, reliability, and adaptivity. He described designing, implementing, and evaluating WSN protocols through simulations and experiments on a wireless sensor network testbed called WISEBED, which is a pan-European federation of over 1000 sensor nodes across 9 testbeds. The testbed infrastructure includes sensor nodes, backbones to connect to a portal, and a portal that acts as a gateway between the internet and the wireless sensor network.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
Advanced Software Engineering course - Guest Lecture
A4WSN- Architecture 4 Wireless Sensor Networks
Here you can find the research paper presenting the concepts described in this lecture: http://goo.gl/XBB4k
This presentation has been developed in the context of the Advanced Software Engineering course at the DISIM Department of the University of L’Aquila (Italy).
http://www.di.univaq.it/malavolta
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
Energy saving Wireless Sensor Networks using KerberosEditor IJCATR
The wireless sensor network is an networking field that combines sensing, computation, and communication into a single
tiny device. As sensor networks frame closer towards well-known deployment, security issues become a vital concern. So far, much
work has focused on making sensor networks realistic and useful, but still security in sensor network data communication is big issue
for research. This paper proposed the idea of having different Kerberos authentication architecture for the different clusters in sensor
network to save energy factor of the sensor nodes and to save time for data communication between the sensor nodes in the network
Wireless Sensor Network Simulators: A Survey and ComparisonsCSCJournals
Simulation tools for wireless sensor networks are increasingly being used to study sensor webs and to test new applications and protocols in this evolving research field. There is always an overriding concern when using simulation that the results may not reflect accurate behavior. It is therefore essential to know the strengths and weaknesses of these simulators. This paper provides a comprehensive survey and comparisons of various popular sensor network simulators with a view to help researchers choose the best simulator available for a particular application environment. It also provides a detailed comparison describing the pros and cons of each simulator.
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensorsidescitation
Recently due to progress in Complementary Metal
Oxide Semiconductor (CM OS) technology, Wireless
Multimedia Sensor Networks (WMSNs) become focus of
research in a broader range of applications. In this survey
paper different WMSNs applications, research & design
challenges are outlined. In addition to this, different available
commercial multimedia sensors are discussed in detail and
compared. Also other then commercial available multimedia
sensors, some experimental multimedia sensor prototypes are
discussed. In addition to this different experimental deployed
test beds for WMSNs are outlined. Also few Wireless Sensor
Networks (WSNs) simulators and emulators are reviewed.
Depending upon the requirement a few physical multimedia
sensors can be integrated or embedded within available
simulators to observe more accurate results or to visualize in
a better way.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Surveyijceronline
The rapid growth in wireless communications has contributed to a huge demand on the deployment of new wireless services in both the licensed and unlicensed frequency spectrum. Cognitive Radio Networks (CRNs) is a recently emerging paradigm that aim to opportunistically access the intermittent periods of unoccupied frequency bands and therefore increasing the spectral efficiency. Unlike conventional radios, cognitive radios can intelligently adjust their transmission/reception parameters based on the interaction with the environment and find the best available spectrum bands to use. CRNs rely on cooperation for much of their functionality to make network more efficient. However, due to the distributed nature of cooperative spectrum sensing, the network is vulnerable to new types of security threats. The current spectrum sensing methods do not provide security mechanism to mitigate against these attacks. Traditional security solutions for noncognitive wireless networks do not work well when they are confronted with these new attacks. Furthermore, the security mechanisms proposed for cognitive radio ad hoc networks are not applicable for resource constrained cognitive radio sensor networks. These present considerable obstacles to development of a security mechanism that can defend against such attacks. This paper investigates threats and defense mechanism applicable for cognitive radio sensor networks to use the proposed guidelines for future development of a security mechanism for cognitive radio sensor networks.
Advanced Software Engineering course - Guest Lecture
A4WSN- Architecture 4 Wireless Sensor Networks
Here you can find the research paper presenting the concepts described in this lecture: http://goo.gl/XBB4k
This presentation has been developed in the context of the Advanced Software Engineering course at the DISIM Department of the University of L’Aquila (Italy).
http://www.di.univaq.it/malavolta
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
Energy saving Wireless Sensor Networks using KerberosEditor IJCATR
The wireless sensor network is an networking field that combines sensing, computation, and communication into a single
tiny device. As sensor networks frame closer towards well-known deployment, security issues become a vital concern. So far, much
work has focused on making sensor networks realistic and useful, but still security in sensor network data communication is big issue
for research. This paper proposed the idea of having different Kerberos authentication architecture for the different clusters in sensor
network to save energy factor of the sensor nodes and to save time for data communication between the sensor nodes in the network
Wireless Sensor Network Simulators: A Survey and ComparisonsCSCJournals
Simulation tools for wireless sensor networks are increasingly being used to study sensor webs and to test new applications and protocols in this evolving research field. There is always an overriding concern when using simulation that the results may not reflect accurate behavior. It is therefore essential to know the strengths and weaknesses of these simulators. This paper provides a comprehensive survey and comparisons of various popular sensor network simulators with a view to help researchers choose the best simulator available for a particular application environment. It also provides a detailed comparison describing the pros and cons of each simulator.
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensorsidescitation
Recently due to progress in Complementary Metal
Oxide Semiconductor (CM OS) technology, Wireless
Multimedia Sensor Networks (WMSNs) become focus of
research in a broader range of applications. In this survey
paper different WMSNs applications, research & design
challenges are outlined. In addition to this, different available
commercial multimedia sensors are discussed in detail and
compared. Also other then commercial available multimedia
sensors, some experimental multimedia sensor prototypes are
discussed. In addition to this different experimental deployed
test beds for WMSNs are outlined. Also few Wireless Sensor
Networks (WSNs) simulators and emulators are reviewed.
Depending upon the requirement a few physical multimedia
sensors can be integrated or embedded within available
simulators to observe more accurate results or to visualize in
a better way.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Surveyijceronline
The rapid growth in wireless communications has contributed to a huge demand on the deployment of new wireless services in both the licensed and unlicensed frequency spectrum. Cognitive Radio Networks (CRNs) is a recently emerging paradigm that aim to opportunistically access the intermittent periods of unoccupied frequency bands and therefore increasing the spectral efficiency. Unlike conventional radios, cognitive radios can intelligently adjust their transmission/reception parameters based on the interaction with the environment and find the best available spectrum bands to use. CRNs rely on cooperation for much of their functionality to make network more efficient. However, due to the distributed nature of cooperative spectrum sensing, the network is vulnerable to new types of security threats. The current spectrum sensing methods do not provide security mechanism to mitigate against these attacks. Traditional security solutions for noncognitive wireless networks do not work well when they are confronted with these new attacks. Furthermore, the security mechanisms proposed for cognitive radio ad hoc networks are not applicable for resource constrained cognitive radio sensor networks. These present considerable obstacles to development of a security mechanism that can defend against such attacks. This paper investigates threats and defense mechanism applicable for cognitive radio sensor networks to use the proposed guidelines for future development of a security mechanism for cognitive radio sensor networks.
Choosing a conductivity salinity logger part 2 of 2HOBO Data Loggers
Part 2 of a two-part presentation detailing five important considerations when choosing a conductivity/salinity data logger, presented by Paul Gannett, Product Marketing Manager, Onset Computer Corporation, maker of HOBO Data loggers.
Rivolto a chiunque abbia la necessità di gestire contenuti ed informazioni sul web, per acquisire le conoscenze fondamentali necessarie a scrivere, sviluppare, pubblicare e gestire dei contenuti sul web.
Play faster and longer: How Square Enix maximized Android* performance and ba...Gael Hofemeier
It’s important for developers to deliver the best possible performance and power efficiency for their Android games. With the addition of native x86 Android support in Unity*, Square Enix was able to take advantage of the new feature with their popular title “Hitman GO”—one of the first games published with x86 Android native support developed with Unity. In this session we will discuss how Hitman GO’s “design by constraints” philosophy allowed the developers to deliver a polished, high-end experience to mobile devices. We will then walk the audience through adding x86 support to a previously ARM*-only project. Finally, we will show how to use Intel® Graphics Performance Analyzers toolset to provide the best possible user experience, ensuring that users on the top tablet silicon achieve the highest power and performance. Developers will come out of this presentation with new insights about the Android ecosystem and tools/techniques to optimize their apps to provide a better experience on all levels of hardware to reach as many end users as possible.
Charla Presentacion Libro GRAFITICA: Grafica Popular CostarricenseCaro Goodfellow
Libro de 274 páginas
Proyecto sobre la historia de la gráfica popular costarricense desde 1860 hasta el día de hoy, materiales y temas del oficio del rotulista en Costa Rica, directorio de rotulistas artesanales y muestra de gráfica en todo el país.
Sussy Vargas y Caro Goodfellow
Diseñadora: María Fe Alpizar
Para información contacto grafitica2015@gmail.com
Página web www.grafitica.com
Facebook Grafitica
Training iso dan konsultan iso di selenggarakan oleh bmd street consultingAbu Yazid
Kebutuhan Sertifikasi ISO merupakan keterdesakan tersendiri bagi perusahaan yang ingin bersaing dalam dunia Internasioanl. BMD Street Consulting siap membantu anda untuk kebutuhan Training ISO dan Konsultan ISO
Introduction to design specifications to Summer of Code NZ studentsLulu Pachuau
This talk was designed and aimed at summer of code students - computer science interns for summer. But would still love to hear your thoughts in communicating designs to developers and businesses.
Introduciendo el proyecto Endesa E3 (castellano)Endesa Educa
Pequeña presentación de la actividad Endesa E3: www.endesae3.com
Endesa Educa Energía (Endesa E3) es un trabajo de investigación para 4º ESO, en el que el alumnado realiza un análisis exhaustivo del uso de la energía eléctrica en el centro escolar y en la propia vivienda.
Mediante un análisis de la facturación, un inventario energético y un estudio tecnológico el alumnado puede realizar un informe que comprende un uso más eficiente de la energía y su consecuente ahorro económico.
En el País Vasco se han hablado dos lenguas desde hace siglos, el español o castellano y el euskera o vascuence, siendo las dos originarias de la región, pues el primero surgió en una zona amplia que abarcaba también territorios del occidente de las actuales Álava y Vizcaya.67 El euskera, a diferencia del resto de lenguas españolas modernas, no procede del latín ni pertenece a la familia indoeuropea.
El castellano es la lengua mayoritaria en los hogares del País Vasco: en el año 2001, y era la lengua hablada en el hogar por el 83,0% de la población, mientras que el euskera era la lengua hablada por el 11,8% y un 5,2% usaba ambas lenguas por igual en el hogar.68 Estos porcentajes varían de una provincia a otra, siendo Guipúzcoa donde más se habla euskera y Álava donde menos.
Las poblaciones gasconas asentadas en Guipúzcoa trajeron consigo su lengua, el gascón (ya desaparecido del País Vasco, aunque se conservaron algunas comunidades hasta el siglo XX).
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
With the advancements in wireless technology and digital electronics, some tiny devices have started to be used in numerous areas in daily life. These devices are capable of sensing, computation and communicating. They are generally composed of low power radios, several smart sensors and embedded CPUs (Central Processing Units). These devices are used to form wireless sensor network (WSN) which is necessary to provide sensing services and to monitor environmental conditions. In parallel to WSNs, the idea of internet of things (IoT) is developed where IoT can be defined as an interconnection between identifiable devices within the internet connection in sensing and monitoring processes. This paper presents detailed overview of WSNs. It also assesses the technology and characteristics of WSNs. Moreover, it provides a review of WSN applications and IoT applications.
A wireless sensor network has important applications such as remote environmental monitoring and target tracking, particularly in recent years with the help of sensors that are smaller, cheaper, and intelligent. Sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. A WSN consists of a number of sensor nodes (few tens to thousands) working together to monitor a region to obtain data about the environment. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the applications design objectives, cost, hardware, and system constraints.
Current Activities in WSN: Developing test bed for target tracking Using Passive Infrared and Ultrasonic Sensors Improving the delivery rate in low power wireless networks .Guided Navigation of Friendly Vehicle towards tracked Object. Design and development of smart mines and explosive ordinance for intelligent activation and deactivation and safe recovery based on secure WSN. Design of a data mule for data collection from remotely placed sensor nodes
The course gives the thorough concepts of the wireless sensor networks, applications examples. It also gives detailed study of sensor node architecture and various protocols used in wireless sensor networks. It also covers issues related to topology, clustering ,synchronization and operating execution environment used for wireless sensor networks.
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...AJIT M KARANJKAR
Secure and Efficient Data Transmission (SET) protocols for cluster based wireless sensor network (CWSN), called SET-IBS and SET-IBOOS, by using the identity-based digital signature (IBS) scheme and the identity-based online/offline digital signature (IBOOS) scheme, respectively.
In this presentation we are going to learn about the basic concepts of wireless sensor Networks and how the sensor are helpful for human beings in their daily life and what are the different approaches to make effectiveness of the sensor working and their future scope.
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) IJCSES Journal
Wireless sensor networks (WSNs) have turned to be the backbone of most present-day information technology, which supports the service-oriented architecture in a major activity. Sensor nodes and its restricted and limited resources have been a real challenge because there’s a great engagement with
sensor nodes and Internet Of things (IoT). WSN is considered to be the base stone of IoT which has been widely used recently in too many applications like smart cities, industrial internet, connected cars, connected health care systems, smart grids, smart farming and it's widely used in both military and civilian
applications now, such as monitoring of ambient conditions related to the environment, precious species and critical infrastructures. Secure communication and data transfer among the nodes are strongly needed due to the use of wireless technologies that are easy to eavesdrop, in order to steal its important information. However, is hard to achieve the desired performance of both WSNs and IoT and many critical
issues about sensor networks are still open. The major research areas in WSN is going on hardware, operating system of WSN, localization, synchronization, deployment, architecture, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. In This paper we discuss in detail all about Wireless Sensor Networks, its classification, types,
topologies, attack models and the nodes and all related issues and complications. We also preview too many challenges about sensor nodes and the proposed solutions till now and we make a spot ongoing research activities and issues that affect security and performance of Wireless Sensor Network as well.
Then we discuss what’s meant by security objectives, requirements and threat models. Finally, we make a
spot on key management operations, goals, constraints, evaluation metrics, different encryption key types
and dynamic key management schemes.
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) IJCSES Journal
Wireless sensor networks (WSNs) have turned to be the backbone of most present-day information
technology, which supports the service-oriented architecture in a major activity. Sensor nodes and its
restricted and limited resources have been a real challenge because there’s a great engagement with
sensor nodes and Internet Of things (IoT). WSN is considered to be the base stone of IoT which has been
widely used recently in too many applications like smart cities, industrial internet, connected cars,
connected health care systems, smart grids, smart farming and it's widely used in both military and civilian
applications now, such as monitoring of ambient conditions related to the environment, precious species
and critical infrastructures. Secure communication and data transfer among the nodes are strongly needed
due to the use of wireless technologies that are easy to eavesdrop, in order to steal its important
information. However, is hard to achieve the desired performance of both WSNs and IoT and many critical
issues about sensor networks are still open. The major research areas in WSN is going on hardware,
operating system of WSN, localization, synchronization, deployment, architecture, programming models,
data aggregation and dissemination, database querying, architecture, middleware, quality of service and
security. In This paper we discuss in detail all about Wireless Sensor Networks, its classification, types,
topologies, attack models and the nodes and all related issues and complications. We also preview too
many challenges about sensor nodes and the proposed solutions till now and we make a spot ongoing
research activities and issues that affect security and performance of Wireless Sensor Network as well.
Then we discuss what’s meant by security objectives, requirements and threat models. Finally, we make a
spot on key management operations, goals, constraints, evaluation metrics, different encryption key types
and dynamic key management schemes.
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor networks (WSNs), a
dynamic coordinate system, and a scalable energy-efficient training protocol for collections of nodes
deployed in the space that are initially anonymous, asynchronous, and unaware of their initial location.
The 3D WSNs considered comprise massively deployed tiny energy-constrained commodity sensors and
one or more sink nodes that provide an interface to the outside world. The proposed architecture is a
generalization of a two-dimensional virtual architecture previously proposed in the literature, in which a
flexible and intuitive coordinate system is imposed onto the deployment area and the anonymous nodes are
partitioned into clusters where data can be gathered from the environment and synthesized under local
control. The architecture solves the hidden sensors problem that occurs because of irregularities in rugged
deployment areas or environments containing buildings by training the network of nodes arbitrarily
dispersed in the 3D space. In addition, we derive two simple and energy-efficient routing protocols,
respectively for dense and sparse networks, based on the proposed dynamic coordinate system. They are
used to minimize the power expended in collecting and routing data to the sink node, thus increasing the
lifetime of the network.
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor networks (WSNs), a
dynamic coordinate system, and a scalable energy-efficient training protocol for collections of nodes
deployed in the space that are initially anonymous, asynchronous, and unaware of their initial location.
The 3D WSNs considered comprise massively deployed tiny energy-constrained commodity sensors and
one or more sink nodes that provide an interface to the outside world. The proposed architecture is a
generalization of a two-dimensional virtual architecture previously proposed in the literature, in which a
flexible and intuitive coordinate system is imposed onto the deployment area and the anonymous nodes are
partitioned into clusters where data can be gathered from the environment and synthesized under local
control. The architecture solves the hidden sensors problem that occurs because of irregularities in rugged
deployment areas or environments containing buildings by training the network of nodes arbitrarily
dispersed in the 3D space. In addition, we derive two simple and energy-efficient routing protocols,
respectively for dense and sparse networks, based on the proposed dynamic coordinate system. They are
used to minimize the power expended in collecting and routing data to the sink node, thus increasing the
lifetime of the network.
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor networks (WSNs), a dynamic coordinate system, and a scalable energy-efficient training protocol for collections of nodes deployed in the space that are initially anonymous, asynchronous, and unaware of their initial location. The 3D WSNs considered comprise massively deployed tiny energy-constrained commodity sensors and one or more sink nodes that provide an interface to the outside world. The proposed architecture is a generalization of a two-dimensional virtual architecture previously proposed in the literature, in which a flexible and intuitive coordinate system is imposed onto the deployment area and the anonymous nodes are partitioned into clusters where data can be gathered from the environment and synthesized under local control. The architecture solves the hidden sensors problem that occurs because of irregularities in rugged deployment areas or environments containing buildings by training the network of nodes arbitrarily dispersed in the 3D space. In addition, we derive two simple and energy-efficient routing protocols, respectively for dense and sparse networks, based on the proposed dynamic coordinate system. They are used to minimize the power expended in collecting and routing data to the sink node, thus increasing the lifetime of the network.
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
The field of Wireless Sensor Networks (WSNs) is experiencing a resurgence of interest and a continuous evolution in the scientific and industrial community. The use of this particular type of ad hoc network is becoming increasingly important in many contexts, regardless of geographical position and so, according to a set of possible application. WSNs offer interesting low cost and easily deployable solutions to perform a remote real time monitoring, target tracking and recognition of physical phenomenon. The uses of these sensors organized into a network continue to reveal a set of research questions according to particularities target applications. Despite difficulties introduced by sensor resources constraints, research contributions in this field are growing day by day. In this paper, we present a comprehensive review of most recent literature of WSNs and outline open research issues in this field.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wireless Sensor Networks
1. IEEE 3rd Latin-American Conference on
Communications – LATINCOM 2011
Development and Evaluation of
Energy-Efficient and Adaptive Protocols
for Wireless Sensor Networks
Torsten Braun, Universität Bern, Switzerland
braun@iam.unibe.ch, rvs.unibe.ch
joint work with many other persons, see publications
2. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Overview
> Introduction
— Wireless Sensor Network Applications and Application Requirements
— Design, Implementation, Evaluation of WSN Protocols
> Experimentation Platform for WSN Research
— Wireless Sensor Network Testbed
— Software-Based Estimation of Energy Consumption
> WSN Research Experiments
— Traffic-Adaptive and Energy-Efficient WSN MAC Protocol
— Adaptive Forward Error Control in WSNs
> Conclusions
> Outlook: Mobility Support
Belém, October 24, 2011 2
3. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Wireless Sensor Network Applications
> REDE (REde de sensores sem fio
para Detectar Enchentes) project
(USP São Carlos,
http://sp-river.blogspot.com)
> Outdoor deployment of wireless
sensor network to measure water
depth and pollution in creeks of
the city of São Carlos SP
> SunSPOT motes and hydrostatic
level and conductivity sensors.
Jó Ueyama, Daniel Roy Hughes, Nelson Matthys,
Wouter Horré, Wouter Joosen, Christophe Huygens,
Sam Michiels:
An Event-based Component Model for Wireless
Sensor Networks: a Case Study for River Monitoring,
XXVIII Simpósio Brasileiro de Redes de
Computadores e Sistemas Distribuídos
Belém, October 24, 2011 3
4. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Wireless Sensor Network Applications
> Environmental monitoring (A4-Mesh, a4-mesh.unibe.ch)
Thomas Staub, Benjamin
Nyffenegger, Desislava Dimitrova,
Torsten Braun:
Operational Support of Wireless
Mesh Networks Deployed for
Extending Network Connectivity,
1st International Workshop on
Opportunistic Sensing and
Processing in Mobile Wireless
Sensor and Cellular networks
(MobiSense), Bilbao, May 2011
Belém, October 24, 2011 4
5. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
A4-Mesh Impressions
Belém, October 24, 2011 5
6. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Wireless Sensor Network Applications
> Monitoring and control of buildings using sensor nodes and
artificial neural networks
Markus Wälchli, Torsten Braun:
Building Intrusion Detection with a
Wireless Sensor Network, ICST
AdHocNets, Niagara Falls, 2009
Belém, October 24, 2011 6
7. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Application Requirements
> Energy-efficient operation
> Low delays
> Reliability
> Adaptivity to varying link characteristics and traffic load
Belém, October 24, 2011 7
8. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Design, Implementation, and Evaluation
of Wireless Sensor Network Protocols
> Simulations are only meaningful with accurate calibration of
parameters, e.g., energy consumption, transmission
characteristics, traffic models.
> Experiments in testbeds give insights about protocol behaviour
in more realistic scenarios and system-related issues,
but face several problems
— Experiment control
— Scalability
— Reproducability
— Energy measurements
— Mobility
Belém, October 24, 2011 8
10. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Wireless Sensor Network Testbed
(WISEBED)
> Recently finished FP7 Future Internet
research project
> wisebed.eu
> Pan-European federation of
9 WSN testbeds Testbed
Testbed
Testbed
> approx. 1000 deployed nodes
> Each partner runs own testbed
with different hardware. Testbed
> Use of individual testbed or
interconnected testbeds Testbed
Testbed
Belém, October 24, 2011 10
11. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
General Testbed Infrastructure
> Portal WSN
Testbed
— Gateway between Internet and WSN part of
Internet WISEBED
— Used for WSN management
> Wireless Sensor Network
— Sensor nodes communicate with
each other. Portal
— Backbone used to communicate with DB
portal. WSN
Backbone Testbed
> Internet part of
WISEBED
— connects all WISEBED testbeds Wireless
Sensor Network
(WSN)
Belém, October 24, 2011 11
12. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Testbed @ Universität Bern
Mesh Node
Internet
USB
Ethernet
LAN
wireless
Portal
(running TARWIS
management system)
Sensor Node
Belém, October 24, 2011
12
13. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Testbed @ Universität Bern
> Approx. 50 TelosB/MSB430 nodes connected to
portal via Ethernet with temperature, humidity, light
sensors
Belém, October 24, 2011 13
14. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
TARWIS System Architecture
Belém, October 24, 2011 14
15. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Testbed / Sensor Node Reservation
> Reservation system maintains per-site reservation database.
> User Interfaces
— Web-based user interface
— iPhone application
Belém, October 24, 2011 15
16. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
TARWIS Experiment Configuration
Belém, October 24, 2011 16
17. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
TARWIS Experiment Monitoring
Belém, October 24, 2011 17
18. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
TARIWS-Generated Experiment Trace
Belém, October 24, 2011 18
20. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Software-Based Estimation of
Energy Consumption
> Problem:
Equipment of sensor nodes with measurement hardware is
— very expensive.
— difficult in out-door environments / real-world deployments.
— not sufficient to support energy awareness.
– Energy awareness: Application / system adapts operation in order
to meet energy consumption constraints.
> Solution:
Software-based energy measurement
(calibration of software-based model using measurement
hardware)
Belém, October 24, 2011 20
21. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Hardware-Based Energy Measurements
> Measurement of current draw and voltage using
Sensor Network Management Devices (SNMD) from KIT
Belém, October 24, 2011 21
22. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Simple 3-State-Model
A. Dunkels, F. Osterlind, N. Tsiftes, Z. He: Software-based On-line Energy Estimation for Sensor Nodes. IEEE EmNets, 2007
Belém, October 24, 2011 22
23. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Measured vs. Estimated Energy Consumption
Approach: Measurement of current draw in different states and energy estimation by
Belém, October 24, 2011 23
24. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
3-State-Model with State Transitions
Revised estimation:
Belém, October 24, 2011 24
25. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Estimation Accuracy
OLS: Ordinary Least Squares Regression Analysis
On the Accuracy of Software-based Energy Estimation Techniques. Philipp Hurni, Torsten Braun, Benjamin Nyffenegger,
Anton Hergenroeder: 8th European Conference on Wireless Sensor Networks (EWSN), Bonn, Germany, February 2011.
Belém, October 24, 2011 25
27. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
MAC Protocols for Wireless Sensor Networks
1. Scheduled Protocols
— Multiplexing and Allocation of channels, e.g., time multiplexing,
requires accurate time synchronization
2. Contention-based Protocols
— Channel sharing and allocation on-demand, often: periodic wake-ups
— Problems: collisions and delays
— Sender must ensure that receiver is awake during transmission
– Transmissions of long preambles/beacons (B-MAC, X-MAC, WiseMAC)
– Weakly synchronized wakeups (S-MAC, T-MAC)
– Receiver signals wakeup (RI-MAC)
— Load adaptation
– Adaptation of wakeup time dependent on activation events or load
(T-MAC, X-MAC)
Wake-up interval
Belém, October 24, 2011 27
28. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
WiseMAC
> Very energy-efficient MAC protocol, but adaptivity to traffic
variation is very limited.
> Unsynchronized nodes wakeup for a short time
> Tpreamble = min {4θL,T}
— θ: clock drift, L: time since last update, T: duration of a cycle
— Max. clock drift: 2θL, sender must start preamble transmission 2θL
prior to wakeup and transmit it until 2θL after wakeup.
> „Piggybacking― of wakeup times
Enz et al.: WiseNET: An Ultralow-Power Wireless Sensor Network
Solution, IEEE Computer, Vol. 37, No. 8; August 2004
Belém, October 24, 2011 28
29. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
MaxMAC: a Maximally Traffic-Adaptive
and Energy-Efficient WSN MAC Protocol
> is based on sampling of preambles, cf. WiseMAC
> integrates destination address into preamble to reduce overhearing
> Additional wakeups for higher rates of received packets
(measurement by sliding window)
— Periodic reports in acknowledgements from receiver to sender
— State transitions if thresholds T1,T2,TCSMA are exceeded.
packet rate ≥ T1 packet rate ≥ T2 packet rate ≥ TCSMA
S1 S2
Base CSMA
2* 4*
state duty duty
RECV
cycle cycle
packet rate < T1 packet rate < T2 packet rate < TCSMA
Lease expired Lease expired Lease expired
Belém, October 24, 2011 29
30. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
MaxMAC
CSMA
Philipp Hurni and Torsten Braun. MaxMAC: a maximally traffic-adaptive MAC protocol for wireless sensor networks.
7th European Conference on Wireless Sensor Networks (EWSN), Coimbra, Portugal, February 2010.
Belém, October 24, 2011 30
31. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
MaxMAC Implementation on MSB430
> Threshold parameters: T1 = 1, T2 = 2, TCSMA = 3 packets / s
> Base duty cycle: 0.6 % (3 ms) for a base interval of 500 ms
> Frame size: 40 bytes including header
> Lease times: 3 s
> Bit rate: 19.2 kbps
> Implementation of packet burst mode
Belém, October 24, 2011 31
32. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Implementation Experiences
Implementation of MaxMAC on MSB430 using Scatterweb
operating system raised several problems:
> Inaccurate execution of timers,
e.g., because of active event processing at timer expiration
→ somewhat earlier scheduling of timers
> Overhearing avoidance has not been supported by node
hardware.
Belém, October 24, 2011 32
33. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Experiments with Intruder Scenario I
WiseMAC
MaxMAC
CSMA
Belém, October 24, 2011 33
34. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Experiments with Intruder Scenario II
Belém, October 24, 2011 34
36. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Error Control in Wireless Sensor Networks
> Wireless channels in sensor networks have varying bit error
rates, sometimes up to 20 %.
> Options
— Automatic Repeat Request (ARQ)
– Retransmission adds delay.
– Original transmission was useless, but consumed bandwidth and
energy.
— Forward Error Correction (FEC)
– Relatively small delay (due to encoding and decoding) compared to
ARQ for error correction
– En-/decoding can be costly (several 100 ms for decoding).
– Too strong codes consume computing resources and bandwidth.
– Too weak codes might not be able to correct errors.
> Proposed Approach: Adaptive FEC
Belém, October 24, 2011 36
37. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Implementation of FEC Library
> Repetition Code
> Hamming Code
> Double Error Correction Triple Error Detection (DECTED)
> Bose-Chaudhuri-Hocquengham (BCH)
Belém, October 24, 2011 37
38. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Adaptive FEC
> Stateful Adaptive FEC (SA)
— Selection of current code dependent on success of previous
transmission (next higher / lower level)
— Quick adaptation
> Stateful History Adaptive (SHA)
— History of last transmissions (here: 5)
— For successful/failed transmissions: storage of next lower/higher level
— Selection of level with majority in history
— Reacts less quickly than SA-FEC
Philipp Hurni, Sebastian Barhlomé,
> Stateful Sender Receiver Adaptive (SSRA) Torsten Braun:
— Consideration of number of corrected bit errors Link-Quality Aware Run-Time
Adaptive Forward Error Correction
by receiver (to be reported in acknowledgement) Strategies in Wireless Sensor
Networks, submitted
(63,36)
Belém, October 24, 2011 38
39. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Energy Consumption by FEC and ARQ
> Additional power consumption by FEC
> In case of no FEC, MSB430 node can enter lower power mode
with Idefault
> Energy for encoding/decoding 32 bytes (30/100 ms): 0.95 mJ
> Energy for retransmission
Belém, October 24, 2011 39
40. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Wisebed Experiments
> Different link characteristics → Deployment of a single FEC
scheme would not be most efficient.
Belém, October 24, 2011 40
41. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Static vs. Adaptive FEC
> Better error correction performance of
adaptive FEC schemes than for static ones.
> Adaptive FEC advantages
— Lower processing and energy costs
— Lower bandwidth and lower interference
in multi-hop scenarios
— Higher packet delivery rate
— Adapt automatically to different
link characteristics
Belém, October 24, 2011 41
42. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Conclusions
> Contributions
— Design and experimental evaluation of energy-efficient, reliable, and
adaptive protocols
> Experiences: Development and use of WSN testbed resulted in
— More efficient use of hardware resources
— Testbed experiments as easy as simulations
— Repeatability and larger number of experiments
(statistical significance)
— Reproducability of experiments and results
> Outlook
— Several experiences (testbeds, protocols) to be applied in other
areas, e.g. wireless mesh and ad-hoc networks
— Mobility support in wireless sensor / mesh network testbeds
Belém, October 24, 2011 42
43. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Wireless Sensor Networks and UAVs in
Agriculture
Field not to be sprayed
Sensor-UAV-link
UAV-UAV-link Fausto Guzzo da Costa, Torsten
Braun, Jó Ueyama, Gustavo Pessin,
Fernando Santos:Arquitetura baseada
chemicals em veículos aéreos não tripulados e
redes de sensores sem fio para
Field to be sprayed aplicações agrícolas, VIII Congresso
Brasileiro de Agroinformatica,
Belém, October 24, 2011 SBIAGRO 2011, Bento Gonçalves 43
44. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
VirtualMesh:
Wireless and Mobile Network Emulation
Thomas Staub, Reto Gantenbein, Torsten Braun:
VirtualMesh: an emulation framework for wireless
mesh and ad hoc networks in OMNeT++,
SIMULATION: Transaction of the Society for
Modelling and Simulation International, Vol. 87,
No. 1-2, January 1, 2011
Belém, October 24, 2011 44
45. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Mobility Support in Wisebed by VirtualMesh
Torsten Braun, Geoff Coulson, Thomas Staub: Towards Virtual Mobility Support in a Federated Testbed for Wireless Sensor
Networks, 6th Workshop on Wireless and Mobile Ad-Hoc Networks (WMAN 2011), Kiel, Germany, March 10 - 11, 2011
Belém, October 24, 2011 45
46. Torsten Braun: Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wireless Sensor Networks
Thanks for your attention !
> Contact: braun@iam.unibe.ch
> More information: rvs.unibe.ch
Belém, October 24, 2011 46