SlideShare a Scribd company logo
1 of 27
SOK Phearin
Department of Computer Science
   MBC Lab., Konkuk University
Outline
I.        Introduction to Wireless Sensor Network
     1)     What is Wireless Sensor Network and its applications
     2)     Communication Architectures
     3)     Sensor Node Basic Components

II. Introduction to Middleware
   1)  What is Middleware
   2) Middleware Design Principles for Wireless Sensor Networks
   3) Middleware Approaches
What is Wireless Sensor Network
 Wireless Sensor Network consists of spatially
 distributed autonomous sensor nodes used to monitor
 and control physical or environmental conditions at
 different locations cooperatively.
Wireless Sensor Network Applications
 Intelligent agricultural and environmental sensing

  Grapes Networks
   - Central Valley of California
Wireless Sensor Network Applications
 Health monitoring




 Home automation and consumer electronics
 Security and military sensing
 Structural monitoring
…
Communication Architectures



 Sensor Node: senses data or events, and
        collect the data among the nodes via
        radio link and route to the sink using
        multi hop infrastructure architecture

 Sensor Field: scope or area within sensor
        nodes can detect or collect the
        sensed data

 Sink: communicates with the End Users via
        Internet or any network (WAN)
        connection
Sensor Node Basic Components
 The basic components of a sensor node
    sensing unit
    o   Sensor: produce analog signal based on the sensed environment
    o   Analog to Digital Converter (ADC): convert from analog to
                digital signal and transfer to processing unit
   processing unit: manages the procedures for sensing tasks
      and collaborations
   transceiver unit: connects the node to network (RF radio
      communication is preferred)
   power unit
Sensor Node Basic Components
What is Middleware
 Software layer between the operating system and
  applications to manage the complexity and
  heterogeneity in the distributed system or network.



 Why middleware in wireless sensor networks?
   a software infrastructure that glues together the network
    hardware, operating systems, network stacks, and
    applications
Middleware Design Principles
 Limited power and resources
    Provide efficient CPU and memory
     Ex. sleep mode, minimize number of transmission


 Scalability, mobility, and dynamic network topology
    adapt to the changing network environment, fault tolerance and
     sensor node self-configuration and self-maintenance

 Heterogeneity
    able to interface various kinds of hardware, software and
       networks
Middleware Design Principles
 Dynamic network organization
    provide ad hoc network resource discovery and its location

 Real-world integration
    provide real-time services to adapt to the changes and provide
       consistent data

 Data aggregation
    able to aggregate data to eliminate redundancy and
       minimize the number of transmissions to the sink

 Security
    able to develop and integrate security in the initial phases of
     software design to achieve different security requirements
     such as authentication, integrity, freshness, and availability
Middleware Approaches
 Based on the Programming models
                                           Global behavior
                                         (macroprogramming)
                         Programming
                          Abstraction
                                             Local behavior
                                        (data centric, geometric)

  Programming
                                            Virtual machine
  Wireless Sensor
    Networks
                                               Database

                         Programming
                                           Modular (agents)
                            Support
                                           Message-oriented
                                             middleware
Middleware Approaches

 Programming abstraction : provides systems,
      services, and runtime mechanisms



 Programming support: provides concepts and
      abstractions of sensor nodes and sensor data
Middleware Approaches
                                    Global behavior
                                  (macroprogramming)
                  Programming
                   Abstraction
                                      Local behavior
                                 (data centric, geometric)

Programming
                                     Virtual machine
Wireless Sensor
  Networks
                                        Database

                  Programming
                                    Modular (agents)
                     Support
                                    Message-oriented
                                      middleware
Global behavior
 the sensor network as a whole, not to drive
      individual node
 high-level specification


 Example: Kairos
   provides notions and concepts to design, develop, and
    implement a macroprogramming model on WSN
   express a single centralized program
Middleware Approaches
                                    Global behavior
                                  (macroprogramming)
                  Programming
                   Abstraction
                                      Local behavior
                                 (data centric, geometric)

Programming
                                     Virtual machine
Wireless Sensor
  Networks
                                        Database

                  Programming
                                    Modular (agents)
                     Support
                                    Message-oriented
                                      middleware
Local behavior
 the nature of the sensed data
 a group of sensor nodes in a specified region


 Example: Abstract regions
   local computation, data aggregation, and communication
    occur
   aggregate all sensor readings from nodes near the object to
    generate accurate information locally
Middleware Approaches
                                    Global behavior
                                  (macroprogramming)
                  Programming
                   Abstraction
                                      Local behavior
                                 (data centric, geometric)

Programming
                                     Virtual machine
Wireless Sensor
  Networks
                                        Database

                  Programming
                                    Modular (agents)
                     Support
                                    Message-oriented
                                      middleware
Virtual Machine Approach
 lets developers write applications in separate, small
  modules
 system injects and distributes the modules through the
  network using tailored algorithms
 VM then interprets the modules



 Example: Mate
    uses codes broken into capsules of 24 byte-long
     instructions, easy for distribution.
    synchronous model, makes the programming simpler
    avoids message buffering and large storage
Middleware Approaches
                                    Global behavior
                                  (macroprogramming)
                  Programming
                   Abstraction
                                      Local behavior
                                 (data centric, geometric)

Programming
                                     Virtual machine
Wireless Sensor
  Networks
                                        Database

                  Programming
                                    Modular (agents)
                     Support
                                    Message-oriented
                                      middleware
Database Approach
 views the whole network as a virtual database system
 lets the user issue queries to the sensor network


 Example: Cougar
    Represents all sensors and sensor data in a relational
     database.
    Control of sensors and extracting data occurs through
     special SQL-like queries
    Allows the scheduling of ongoing queries that provide
     incremental results
Middleware Approaches
                                    Global behavior
                                  (macroprogramming)
                  Programming
                   Abstraction
                                      Local behavior
                                 (data centric, geometric)

Programming
                                     Virtual machine
Wireless Sensor
  Networks
                                        Database

                  Programming
                                    Modular (agents)
                     Support
                                    Message-oriented
                                      middleware
Modular Approach
 applications are as modular as possible
 Only parts of the program need to be
  updated, propagate efficiently

 Example: Impala
    provides mechanisms for network updates and support
     dynamic applications
    fault tolerance and network self organization
    nature of its code instruction doesn't allow hardware
     heterogeneity
Middleware Approaches
                                    Global behavior
                                  (macroprogramming)
                  Programming
                   Abstraction
                                      Local behavior
                                 (data centric, geometric)

Programming
                                     Virtual machine
Wireless Sensor
  Networks
                                        Database

                  Programming
                                    Modular (agents)
                     Support
                                    Message-oriented
                                      middleware
Message Oriented Approach
 uses the publish-subscribe mechanism
 supports asynchronous communication – loose
  coupling

 Example: Mires
    advertise their sensed data(topic) through publish service
    Multi-hop routes the advertised messages to the sink
    user application subscribes to topics of interest
Reference
 [1] Salem Hadim & Nader Mohamed, “Middleware: Middleware Challenges and
  Approaches for Wireless Sensor Networks”, IEEE 01621014, Vol. 7, No. 3; March
  2006

 [2] Jong-Wan Yoon, Young-Ki Ku, Choon-Sung Nam, & Dong-Ryeol
  Shin, “Sensor Network Middleware for Distributed and Heterogeneous
  Environment”, 2009, IEEE 05260722,
Thank You

More Related Content

What's hot

Umts system architecture
Umts system architectureUmts system architecture
Umts system architectureMidhun S
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
Sensor networks
Sensor networksSensor networks
Sensor networksMarc Pous
 
Network Mnagement for WSN
Network Mnagement for WSNNetwork Mnagement for WSN
Network Mnagement for WSN@zenafaris91
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architectureVidhi603146
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulatorsSyedAhamed44
 

What's hot (20)

Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Unit 4
Unit 4Unit 4
Unit 4
 
Network Mnagement for WSN
Network Mnagement for WSNNetwork Mnagement for WSN
Network Mnagement for WSN
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Manet
ManetManet
Manet
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulators
 

Similar to Sensor Network

Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 
A4WSN: an Architecting environment 4 Wireless Sensor Networks
A4WSN: an Architecting environment 4 Wireless Sensor NetworksA4WSN: an Architecting environment 4 Wireless Sensor Networks
A4WSN: an Architecting environment 4 Wireless Sensor NetworksIvano Malavolta
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokejbyun77
 
Presentation seminar shubham
Presentation seminar shubhamPresentation seminar shubham
Presentation seminar shubhamShubhamPal80
 
Ubiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesUbiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesKuncoro Wastuwibowo
 
DavidRodriguez ISCRAM summerschool 2012
DavidRodriguez ISCRAM summerschool 2012DavidRodriguez ISCRAM summerschool 2012
DavidRodriguez ISCRAM summerschool 2012d_rdgz
 
51679421-Wireless-Sensor-Networks-PPT.pptx
51679421-Wireless-Sensor-Networks-PPT.pptx51679421-Wireless-Sensor-Networks-PPT.pptx
51679421-Wireless-Sensor-Networks-PPT.pptxGeetha982072
 
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing IJORCS
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networksguest1b5f71
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]Raul Soto
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...DMV SAI
 
Relate: Architecture, Systems and Tools for Relative Positioning
Relate: Architecture, Systems and Tools for Relative PositioningRelate: Architecture, Systems and Tools for Relative Positioning
Relate: Architecture, Systems and Tools for Relative PositioningTill Riedel
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...Rio Info
 

Similar to Sensor Network (20)

Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
 
A4WSN: an Architecting environment 4 Wireless Sensor Networks
A4WSN: an Architecting environment 4 Wireless Sensor NetworksA4WSN: an Architecting environment 4 Wireless Sensor Networks
A4WSN: an Architecting environment 4 Wireless Sensor Networks
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
 
391 394
391 394391 394
391 394
 
Presentation seminar shubham
Presentation seminar shubhamPresentation seminar shubham
Presentation seminar shubham
 
Ubiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesUbiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware Services
 
DavidRodriguez ISCRAM summerschool 2012
DavidRodriguez ISCRAM summerschool 2012DavidRodriguez ISCRAM summerschool 2012
DavidRodriguez ISCRAM summerschool 2012
 
51679421-Wireless-Sensor-Networks-PPT.pptx
51679421-Wireless-Sensor-Networks-PPT.pptx51679421-Wireless-Sensor-Networks-PPT.pptx
51679421-Wireless-Sensor-Networks-PPT.pptx
 
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
 
Indoor navigation system
Indoor navigation systemIndoor navigation system
Indoor navigation system
 
Intrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless NetworksIntrusion Detection Techniques for Mobile Wireless Networks
Intrusion Detection Techniques for Mobile Wireless Networks
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]
 
middleware
middlewaremiddleware
middleware
 
middleware
middlewaremiddleware
middleware
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
Relate: Architecture, Systems and Tools for Relative Positioning
Relate: Architecture, Systems and Tools for Relative PositioningRelate: Architecture, Systems and Tools for Relative Positioning
Relate: Architecture, Systems and Tools for Relative Positioning
 
Sensor Data Management
Sensor Data ManagementSensor Data Management
Sensor Data Management
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
 

More from Phearin Sok

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityPhearin Sok
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDPhearin Sok
 
Mobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitectureMobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitecturePhearin Sok
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkPhearin Sok
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningPhearin Sok
 
Content centric networking
Content centric networkingContent centric networking
Content centric networkingPhearin Sok
 

More from Phearin Sok (9)

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and Continuity
 
N Screen
N ScreenN Screen
N Screen
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique ID
 
Mobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitectureMobility Management in HIMALIS Architecture
Mobility Management in HIMALIS Architecture
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant Network
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
UNICEF
UNICEFUNICEF
UNICEF
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation Planning
 
Content centric networking
Content centric networkingContent centric networking
Content centric networking
 

Recently uploaded

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Recently uploaded (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Sensor Network

  • 1. SOK Phearin Department of Computer Science MBC Lab., Konkuk University
  • 2. Outline I. Introduction to Wireless Sensor Network 1) What is Wireless Sensor Network and its applications 2) Communication Architectures 3) Sensor Node Basic Components II. Introduction to Middleware 1) What is Middleware 2) Middleware Design Principles for Wireless Sensor Networks 3) Middleware Approaches
  • 3. What is Wireless Sensor Network  Wireless Sensor Network consists of spatially distributed autonomous sensor nodes used to monitor and control physical or environmental conditions at different locations cooperatively.
  • 4. Wireless Sensor Network Applications  Intelligent agricultural and environmental sensing Grapes Networks - Central Valley of California
  • 5. Wireless Sensor Network Applications  Health monitoring  Home automation and consumer electronics  Security and military sensing  Structural monitoring …
  • 6. Communication Architectures  Sensor Node: senses data or events, and collect the data among the nodes via radio link and route to the sink using multi hop infrastructure architecture  Sensor Field: scope or area within sensor nodes can detect or collect the sensed data  Sink: communicates with the End Users via Internet or any network (WAN) connection
  • 7. Sensor Node Basic Components  The basic components of a sensor node  sensing unit o Sensor: produce analog signal based on the sensed environment o Analog to Digital Converter (ADC): convert from analog to digital signal and transfer to processing unit  processing unit: manages the procedures for sensing tasks and collaborations  transceiver unit: connects the node to network (RF radio communication is preferred)  power unit
  • 8. Sensor Node Basic Components
  • 9. What is Middleware  Software layer between the operating system and applications to manage the complexity and heterogeneity in the distributed system or network.  Why middleware in wireless sensor networks?  a software infrastructure that glues together the network hardware, operating systems, network stacks, and applications
  • 10. Middleware Design Principles  Limited power and resources  Provide efficient CPU and memory Ex. sleep mode, minimize number of transmission  Scalability, mobility, and dynamic network topology  adapt to the changing network environment, fault tolerance and sensor node self-configuration and self-maintenance  Heterogeneity  able to interface various kinds of hardware, software and networks
  • 11. Middleware Design Principles  Dynamic network organization  provide ad hoc network resource discovery and its location  Real-world integration  provide real-time services to adapt to the changes and provide consistent data  Data aggregation  able to aggregate data to eliminate redundancy and minimize the number of transmissions to the sink  Security  able to develop and integrate security in the initial phases of software design to achieve different security requirements such as authentication, integrity, freshness, and availability
  • 12. Middleware Approaches  Based on the Programming models Global behavior (macroprogramming) Programming Abstraction Local behavior (data centric, geometric) Programming Virtual machine Wireless Sensor Networks Database Programming Modular (agents) Support Message-oriented middleware
  • 13. Middleware Approaches  Programming abstraction : provides systems, services, and runtime mechanisms  Programming support: provides concepts and abstractions of sensor nodes and sensor data
  • 14. Middleware Approaches Global behavior (macroprogramming) Programming Abstraction Local behavior (data centric, geometric) Programming Virtual machine Wireless Sensor Networks Database Programming Modular (agents) Support Message-oriented middleware
  • 15. Global behavior  the sensor network as a whole, not to drive individual node  high-level specification  Example: Kairos  provides notions and concepts to design, develop, and implement a macroprogramming model on WSN  express a single centralized program
  • 16. Middleware Approaches Global behavior (macroprogramming) Programming Abstraction Local behavior (data centric, geometric) Programming Virtual machine Wireless Sensor Networks Database Programming Modular (agents) Support Message-oriented middleware
  • 17. Local behavior  the nature of the sensed data  a group of sensor nodes in a specified region  Example: Abstract regions  local computation, data aggregation, and communication occur  aggregate all sensor readings from nodes near the object to generate accurate information locally
  • 18. Middleware Approaches Global behavior (macroprogramming) Programming Abstraction Local behavior (data centric, geometric) Programming Virtual machine Wireless Sensor Networks Database Programming Modular (agents) Support Message-oriented middleware
  • 19. Virtual Machine Approach  lets developers write applications in separate, small modules  system injects and distributes the modules through the network using tailored algorithms  VM then interprets the modules  Example: Mate  uses codes broken into capsules of 24 byte-long instructions, easy for distribution.  synchronous model, makes the programming simpler  avoids message buffering and large storage
  • 20. Middleware Approaches Global behavior (macroprogramming) Programming Abstraction Local behavior (data centric, geometric) Programming Virtual machine Wireless Sensor Networks Database Programming Modular (agents) Support Message-oriented middleware
  • 21. Database Approach  views the whole network as a virtual database system  lets the user issue queries to the sensor network  Example: Cougar  Represents all sensors and sensor data in a relational database.  Control of sensors and extracting data occurs through special SQL-like queries  Allows the scheduling of ongoing queries that provide incremental results
  • 22. Middleware Approaches Global behavior (macroprogramming) Programming Abstraction Local behavior (data centric, geometric) Programming Virtual machine Wireless Sensor Networks Database Programming Modular (agents) Support Message-oriented middleware
  • 23. Modular Approach  applications are as modular as possible  Only parts of the program need to be updated, propagate efficiently  Example: Impala  provides mechanisms for network updates and support dynamic applications  fault tolerance and network self organization  nature of its code instruction doesn't allow hardware heterogeneity
  • 24. Middleware Approaches Global behavior (macroprogramming) Programming Abstraction Local behavior (data centric, geometric) Programming Virtual machine Wireless Sensor Networks Database Programming Modular (agents) Support Message-oriented middleware
  • 25. Message Oriented Approach  uses the publish-subscribe mechanism  supports asynchronous communication – loose coupling  Example: Mires  advertise their sensed data(topic) through publish service  Multi-hop routes the advertised messages to the sink  user application subscribes to topics of interest
  • 26. Reference  [1] Salem Hadim & Nader Mohamed, “Middleware: Middleware Challenges and Approaches for Wireless Sensor Networks”, IEEE 01621014, Vol. 7, No. 3; March 2006  [2] Jong-Wan Yoon, Young-Ki Ku, Choon-Sung Nam, & Dong-Ryeol Shin, “Sensor Network Middleware for Distributed and Heterogeneous Environment”, 2009, IEEE 05260722,

Editor's Notes

  1. Grape Networks has deployed the world's largest wireless Sensor network for agriculture in the Central Valley of California. The Wireless Sensor Network covers over 50 acres, and consists of more than 200 sensors, all broadcasting critical vineyard data over the Internet.Sensed data: temperature, humidity and lightThe vineyard operations' manager can view the data on any WEB enabled cellular phone or PC, and can also set the threshold values for alerts over the Internet or via Email. 
  2. Electronic sensor clothing like this Under Armour E39 Shirt lets the athlete understand what is going on inside there body while training. This Under Armour Electronic sensor clothing contains a removable sensor pack, nicknamed 'the bug' near the sternum which provides instant feedback on breathing rate, heart rate, temperature, movements etc. All this data can then ne viewed on wireless devices such as laptops, iPhones, or iPads. 
  3. Processing unitAssociated with a small storage unitManages the procedures that make the sensor node collaborate with the other nodes to carry out the assigned sensing tasks
  4. additional application dependent components: mobilizer, location finding system (most of the sensing tasks require the knowledge of position), Power Generator(solar cell) …
  5. WSN needs middleware to integrate the sensed data from different sensor network and provide for user application. Esp., to convert various raw data from sensor networks to available information for service of user application.
  6. *Limited power and resources - Advance microelectronics technology allows tiny devices but limited in energy and resources, i.e. CPU and memory*Scalability, mobility, and dynamic network topology –As the application grows, device failure, moving obstacles, mobility, and interference, the network will change frequently.Scalability is defined as follows: if an application grows, the network should be flexible enough toallow this growth anywhere and anytime without affecting network performance. Efficientmiddleware services must be capable of maintaining acceptable performance levels as the networkgrows. Network topology is subject to frequent changes owing to factors such as malfunctioning,device failure, moving obstacles, mobility, and interference. Middleware should support sensornetworks' robust operation despite these dynamics by adapting to the changing network environment.Middleware also should support mechanisms for fault tolerance and sensor node self-configurationand self-maintenance.* Heterogeneity - provide low-level programming models to meet the major challenge of bridgingthe gap between hardware technology's raw potential and the necessary broad activities such asreconfiguration, execution, and communication. It should establish system mechanisms that interfaceto the various types of hardware and networks, supported only by distributed, primitive operatingsystemabstractions.
  7. *Dynamic network organization : Unlike traditional networks, sensor networks must deal with resources that are dynamic, such asenergy, bandwidth, and processing power. Sensor networks also must support long-running applications, so routing protocols must be efficiently designed to enable the network to run as long as Possible. Because knowledge of the network is essential for it to operate properly, the middleware should provide ad hoc network resource discovery. A sensor node needs to know its location in thenetwork and in the whole network topology. In some cases, self-location by GPS is impossible,unfeasible, or expensive. Important system parameter issues, such as network size and density persquare mile, affect the trade-offs among latency, reliability, and energy.* Real-time integration : Most sensor network applications are real-time phenomena, where time and space are extremelyimportant. Hence, middleware should provide real-time services to adapt to the changes and provideconsistent data.*Data aggregation: Most sensor network applications involve nodes that contain redundant data and are located in aspecific local region. These traits open the possibility for in-network aggregation of data fromdifferent sources, eliminating redundancy and minimizing the number of transmissions to the sink.This aggregation saves considerable energy and resources, given that communications cost is muchhigher than computation costs. This paradigm shifts the focus from the traditional address-centricapproaches for networking to a more data-centric approach*Security: WSNs are being widely deployed in domains that involve sensitive information for example,healthcare and rescue. The untethered and large deployment of WSNs in harsh environments increasestheir exposure to malicious intrusions and attacks such as denial of service. 11In addition, the wireless medium facilitates eavesdropping and adversarial packet injection to compromise the network'sfunctioning. All these factors make security extremely important. Furthermore, sensor nodes havelimited power and processing resources, so standard security mechanisms, which are heavy in weightand resource consumption, are unsuitable. These challenges increase the need to developcomprehensive and secure solutions that achieve wider protection, while maintaining desirablenetwork performance. Middleware efforts should concentrate on developing and integrating securityin the initial phases of software design, hence achieving different security requirements such asconfidentiality, authentication, integrity, freshness, and availability.
  8. Communication model (not mentioned here)* Programming abtrstraction : providing systems, services, and runtime mechanisms such as reliable code distribution, safe code execution, and application-specific services. * Programming support: the way we view a sensor network and provides concepts and abstractions of sensor nodes and sensor data.
  9. * Programming abtrstraction : providing systems, services, and runtime mechanisms such as reliable code distribution, safe code execution, and application-specific services. * Programming support: the way we view a sensor network and provides concepts and abstractions of sensor nodes and sensor data.
  10. This subclass introduces a new and completely different view on how to program sensor networks. Macroprogramming involves programming thesensor network as a whole, rather than writing low-level software to drive individual nodes. The WSN global behavior is programmed at a high-level specification, enabling automatically generated nodal behaviors. This relieves application developers from dealing with low-level concerns at each network node.
  11. In most sensor network applications, the focus is more on the nature of the sensed data, which generally involves a group of sensor nodes in a specified region. In region or Hood style, the interest is on a specific location in a sensor network for example, applications are morelikely to ask for a location where the temperature exceeds a certain value, rather than for an individual sensor reading. In data-centric sensor networks, nodes are addressed according to the data produced for example, detect a target having a shape of "tank" in military applications.
  12. This system is flexible and contains virtual machines (VMs), interpreters, andmobile agents. It lets developers write applications in separate, small modules. The system injects anddistributes the modules through the network using tailored algorithms, such as overall energyconsumption and resource use are minimized. The VM then interprets the modules. This approach,however, suffers from the overhead that the instructions introduce
  13. It provides an easy-to-use interface that lets the user issue queries to the sensor network to extract the data of interest. However, the approach provides only approximate results, and it lacks the support of realtime applications that need the detection of spatio-temporal relationships between events
  14. The key to this approach is that applications are as modular as possible to facilitate their injection and distribution through the network using mobile code. Transmitting small modules consumes considerably less energy than a whole application. For example, Impala provides mechanisms for network updates that are efficient enough to support dynamic applications. Its autonomic behavior increases its fault tolerance and network selforganization. However, the nature of its code instruction doesn't allow hardware heterogeneity, whichmakes it unsuitable for devices with limited resources
  15. Mainly a communication model in a distributed-sensor network, message-oriented middleware uses the publish-subscribe mechanism to facilitate message exchange between nodes and the sink nodes. The strength of this paradigm lies in that it supports asynchronous communication very naturally, allowing a loose coupling between the sender and the receiver. This approach is quite suitable in pervasive environments such as wireless sensor networks, where most applications are based on events.Mire - Communication occurs in three phases. First, the nodes in the network advertise their sensed data (topic) through the publish service. Next, Mires routes the advertised messages to the sink, using the multi-hop routing algorithm. Finally, the user application subscribes to topics of interest using only a suitable GUI. The publish-subscribe service also maintains the topics list and the subscribed application to marshal the right topic to the related application. Mires sends only messages referring to subscribed topics, hence reducing the number of transmissions andenergy consumption. It includes a data aggregation service that lets the user specify how data will beaggregated and the association between topics of interest and aggregates.