10 WSN Introd

21
1 Wireless Sensor Networks - Introduction 1. Sensors in WSN 2. Sensing node 3. Wireless Sensor Netwworks 4. Communication in WSN 5. Challenges and Constraints 6. Selected applications of WSN

Transcript of 10 WSN Introd

Page 1: 10 WSN Introd

1

Wireless Sensor Networks - Introduction

1. Sensors in WSN2. Sensing node3. Wireless Sensor Netwworks4. Communication in WSN5. Challenges and Constraints 6. Selected applications of WSN

Page 2: 10 WSN Introd

2

1. Sensors in WSN

Data acquisition and actuation

An actuator can be:• a valve controlling the flow of hot water, • a motor that opens or closes a door or window, • a pump that controls the amount of fuel injected

into an engine.

Signal conditioning• amplification (or attenuation) to change the signal magnitude • filters to the signal to remove unwanted noise within certain frequency ranges (e.g., highpass filters can be used to remove 50 or 60 Hz noise picked up by surrounding power lines)

Page 3: 10 WSN Introd

3

The components of a sensing node include:• sensing and actuation unit• processing unit• communication unit• power unit• other application-dependent units

2. Sensing node

Page 4: 10 WSN Introd

4

The term sensor node is the most general. The terms Smart Dust, mote and COTS (commercial off-the-shelf) mote are used somewhat interchangeably in the industry.

Page 5: 10 WSN Introd

5

Sensor nodes communicate not only with each other but also with a base station (BS) using their wireless radios, allowing them to disseminate their sensor data to remote processing, visualization, analysis, and storage systems.

3. Wireless sensor networks

A wireless sensor has not only a sensing component, but also on-boardprocessing, communication, and storage capabilities. With these enhancements, a sensor node is often not only responsible for data collection, but also for in-network analysis,correlation, and fusion of its own sensor data and data from other sensor nodes.When many sensors cooperatively monitor large physical environments, they form a wireless sensornetwork (WSN).

Page 6: 10 WSN Introd

6

Single-hop versus multi-hop communication in sensor networks.When the transmission ranges of the radios of all sensor nodes are large enough and the sensors can transmit their data directly to the base station, they can form a star topology.

In mesh topology, sensor nodes must not only capture and disseminate their own data, but also serve as relays for other sensor nodes, that is, they must collaborate to propagate sensor data towards the base station.

4. Communication in WSN

The well-known IEEE 802.11 family of standards was introduced in 1997 and is the most common wireless networking technology for mobile systems. It uses different frequency bands, for example, • 2.4-GHz band is used by IEEE 802.11b and IEEE 802.11g, • 5 GHz for IEEE 802.11a.

Data rates provided by IEEE 802.11 are typically much higher than needed This has led to the development of a variety of protocols that better satisfy the networks’ need for low power consumption and low data rates. For example,the IEEE 802.15.4 protocol has been designed for short-range communications in low-power sensor networks and is supported by most academic and commercial sensor nodes.

Page 7: 10 WSN Introd

7

Standards for Transport Protocols

Page 8: 10 WSN Introd

8

5. Challenges and Constraints

5.1. Energy

The most often met constraint is that sensor nodes operate with limited energy budgets. Typically, they are powered through batteries, which must be either replaced or recharged (e.g., using solar power). For some nodes, neither option is appropriate, that is, they will simply be discarded once their energy source is depleted. For nonrechargeable batteries, a sensor node should be able to operate until either its mission time has passed or the battery can be replaced (monitoring glacial movements may need sensors that can operate for several years while a sensor in a battlefield scenario may only be needed for a few hours or days).The energy consumption of CMOS-based processors is primarily due to switching energyand leakage energy:

ECPU = Eswitch + Eleakage = CtotalV dd2 + Vdd Ileak t

where Ctotal is the total capacitance switched by the computation, Vdd is the supply voltage, Ileak is the leakage current, and t is the duration of the computation.

Switching energy still dominates the energy consumption of processors. It is expected that in future processor designs, the leakage energy will be responsible for more than half the energy consumption.

Page 9: 10 WSN Introd

9

5.2. Self-Management

Sensor nodes must be self-managing in that they configure themselves, operate and collaborate with other nodes, and adapt to failures, changes in the environment, and changes in the environmental stimuli without human intervention.

Ad Hoc DeploymentSensors serving the assessment of battlefield or disaster areas could be thrown from airplanes over the areas of interest, but many sensor nodes may not survive such a drop and may never be able to begin their sensing activities.The surviving nodes must autonomously perform a variety of setup and configuration steps, including the establishment of communications with neighboring sensor nodes, determining their positions, and the initiation of their sensing responsibilities.

Unattended OperationMany sensor networks, once deployed, must operate without human intervention, that is,configuration, adaptation, maintenance, and repair must be performed in an autonomousfashion.A self-managing device will monitor its surroundings, adapt to changesin the environment, and cooperate with neighboring devices to form topologies or agreeon sensing, processing, and communication strategies.

Page 10: 10 WSN Introd

10

Attenuation limits the range of radio signals, that is, a radio frequency (RF) signal fades (i.e., decreases in power) while it propagates through a medium and while it passes through obstacles. The relationship between the received power PR and transmitted power PT of an RF signal can be expressed using the inverse-square law:

An increasing distance between a sensor node and a base station rapidly increases the required transmission power. Therefore, it is more energy-efficient to split a large distance into several shorter distances, leading to the challenge of supporting multi-hop communications and routing.

Due to this challenge networks employ duty cycles to preserve energy, that is, manysensor nodes use a power conservation policy where radios are switched off when they arenot in use. As a consequence, during these down-times, the sensor node cannot receivemessages from its neighbors nor can it serve as a relay for other sensors.

Therefore, some networks rely on wakeup on demand strategies to ensure that nodes can be woken up whenever needed. Usually this involves devices with two radios, a low-power radio used to receive wakeup calls and a high-power radio that is activated in response to a wakeup call.

Another strategy is adaptive duty cycling, when not all nodes are allowed to sleep at the same time. Instead, a subset of the nodes in a network remain active to form a network backbone.

2dPP T

R

5.3. Wireless Networking

Page 11: 10 WSN Introd

11

5.4. Decentralized Management

Centralized algorithms (e.g., executed at the base station) to implementnetwork management solutions such as topology management or routing may be ifeasible due to yhe large scale and the energy constraints.

Instead, sensor nodes must collaborate with their neighbors to make localized decisions, that is, without global knowledge.

As a consequence, the results of these decentralized (or distributed ) algorithms will not be optimal, but they may be more energy-efficient than centralized solutions.

Page 12: 10 WSN Introd

12

5.5. Design Constraints

While the capabilities of traditional computing systems continue to increase rapidly, the primary goal of wireless sensor design is to create smaller, cheaper, and more efficient devices.

Due to this, typical sensor nodes have the processing speeds and storage capacities of computer systems from several decades ago.

These constraints and requirements also impact the software design at various levels, for example, operating systems must have small memory footprints and must be efficient in their resource management tasks. However, the lack of advanced hardware features (e.g., support for parallel executions) facilitates the design of small and efficient operating systems. A sensor’s hardware constraints also affect the design of many protocols and algorithms executed in a WSN.While in-network processing can be employed to eliminate redundant information, some sensor fusion and aggregation algorithms may require more computational power and storage capacities than can be provided by low-cost sensor nodes. Therefore, many software architectures and solutions (operating system, middleware, network protocols) must be designed to operate efficiently on very resource-constrained hardware.

Page 13: 10 WSN Introd

13

5.6. Security

The remote and unattended operation of sensor nodes increases their exposure to malicious intrusions and attacks. One of the most challenging security threats is a denial-of-service attack, whose goal is to disrupt the correct operation of a sensor network. This can be achieved using a variety of attacks, including a jamming attack , where high-powered wirelesssignals are used to prevent successful sensor communications.

While there are numerous techniques and solutions for distributed systems that prevent attacks, many of these incur significant computational, communication, and storage requirements, which often cannot be satisfied by resource-constrained sensor nodes.

As a consequence, sensor networks require new solutions for key establishment and distribution, node authentication, and secrecy.

Page 14: 10 WSN Introd

14

Comparison of traditional networks and wireless sensor networks

5.7. Other Challenges

While traditional computer networks are based on established standards, many protocols andmechanisms in wireless sensor networks are proprietary solutions, while standards-based solutions emerge only slowly. Standards are important for interoperability and facilitate the design and deployment of WSN applications; therefore, a key challenge in WSN design remains the standardization of promising solutions and the harmonization of competing standards.

Page 15: 10 WSN Introd

15

Home control applications provide control, conservation, convenience and safety.Body-worn medical sensors (e.g. heartbeat sensors) are also emerging.

6. Selected applications of WSN

Home control

Page 16: 10 WSN Introd

16

Building Automation

Building automation provide control, conservation, flexibility and safety as follows:• management of lighting, heating, cooling and safety• control of systems to improve conservation• optimized HVAC management• rapid reconfiguring the lighting system to create adaptable workspaces• enable to network and integrate data from multiple access control points.

Page 17: 10 WSN Introd

17

Industrial Automation

Industrial automation applications provide :• process control systems reliability• reduce energy costs• identification of poorly performing equipment and inefficient operations• provide detailed data to improve preventive maintenance• help deploy monitoring networks to enhance employee and public safety.

Page 18: 10 WSN Introd

18

Medical Applications

PDA displaying real-time vital signs of multiple patients.

Page 19: 10 WSN Introd

19

Security Applications

• Military sensor networks detectinformation about enemy movements,explosions etc.• law enforcement and national security applications (figure)• sensor networks to detect chemical, biological, radiological and explosive attacks and material• environmental changes in forests, oceans and so on• monitoring of vehicle traffic on highways or in congested parts of a city• parking lot occupation sensor networks• borders monitoring with sensors ans sattelite uplinks.

Real time monitoring and sensor interrogation

Page 20: 10 WSN Introd

20

Typical highway traffic-sensing installation

Highway Monitoring

Traffic in US is growing at three times the rate of population growth.

Traffic Pulse Technology (US) is an example of a system using stationary WNs, which collects data through sensor network, processes and stores the data in a data center.

Temperature, pollution levels are collected in real-time. Digital sensor network gathers lane-by-lane data on travel speeds, lane occupancy and vehicle counts.

The data are transmitted to the data center for reformatting (every 60 seconds).

Page 21: 10 WSN Introd

21

Civil Engineering Applications

Sensor technology is aplicable for buildings, bridges and other structures.

The picture shows a prototype WSN developed at the University of California, Berkeley, and deployedat the Golden Gate Bridge in San Francisco. The bridge has a center span that sustains a maximum transverse deflection (due to wind or earthquake) of 27.7 ft and maximum upward and downward deflections of 5.8 ft and 10.8 ft, respectively.The towers are 500 ft high above the roadway and 746 ft high above the water. The tops of the towers can have transverse deflections of up to 12.5 in. and toward the shore longitudinal deflections of 22 in. Sixty-four wireless sensor nodes were deployed on this bridge to establish a structural health monitoring network. The nodes were distributed over the main span and the tower, collecting ambient vibrations synchronously, at a rate of 1 kHz, with less than 10 μs jitter and with an accuracy of 30 μG. Data is collected reliably over a 46-hop network.

The deployment scenario of nodes on the Golden Gate Bridge:

a) the nodes are deployed on both sides of

the span.b) a two-dimensional view of the

placement of nodes on the bridge.