Secure Systems Research Group - FAU A Pattern for A Sensor Node 11/12/2009 Anupama Sahu.

Slides:



Advertisements
Similar presentations
Distributed Algorithms for Mobile Sensor Networks Chelsea Sanders Ben Tullis.
Advertisements

Marković Miljan 3139/2011
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Presented by : Poorya Ghafoorpoor Yazdi Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern Mediterranean.
Introduction to Wireless Sensor Networks
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
1 Routing Techniques in Wireless Sensor networks: A Survey.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
1 Introduction to Wireless Sensor Networks. 2 Learning Objectives Understand the basics of Wireless Sensor Networks (WSNs) –Applications –Constraints.
KUASAR An efficient and light-weight protocol for routing and data dissemination in ad hoc wireless sensor networks David Andrews Aditya Mandapaka Joe.
UNIVERSITY OF SOUTHERN CALIFORNIA Embedded Networks Laboratory 1 Wireless Sensor Networks Ramesh Govindan Lab Home Page:
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Wireless Sensor Networks Smart Environments: Technologies, Protocols, and Applications ed. D.J. Cook and S.K. Das, John Wiley, New York, B.Devi
報告日期 :2012/03/07 指導教授 : 蔡亮宙 報 告 者 : 吳烱華 自製率 :100%.
ZigBee. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion Topics.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
SCADA and Telemetry Presented By:.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
Basic Data Communication
Communications & Networks
MICA: A Wireless Platform for Deeply Embedded Networks
Wireless Sensor Monitoring Group Members: Daniel Eke (COMPE) Brian Reilly (ECE) Steven Shih (ECE) Sponsored by:
DESIGN & IMPLEMENTATION OF SMALL SCALE WIRELESS SENSOR NETWORK
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Wireless Sensor Monitoring Group Members: Steven Shih (ECE) Brian Reilly (ECE) Dan Eke (COMPE) Sponsored by:
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Computer Concepts 2014 Chapter 5 Local Area Networks.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
Crowd Management System A presentation by Abhinav Golas Mohit Rajani Nilay Vaish Pulkit Gambhir.
Introduction to Wireless Sensor Networks
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
IntroductionRelated work 2 Contents Publish/Subscribe middleware Conclusion and Future works.
IPower: An Energy Conservation System for Intelligent Buildings International Journal of Sensor Networks Yu-Chee Tseng, You-Chiun Wang, and Lun- Wu Yeh.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Systems Wireless EmBedded Wireless Sensor Nets Turning the Physical World into Information David Culler Electrical Engineering and Computer Sciences University.
Wireless Sensor Networks Nov 1, 2006 Jeon Bokgyun
Embedded Design Using ARM For Strong Room Security System
Presented by : Rashmy Balasubramanian.  Aimed at saving endangered species of turtle in Ontario  The WSN gathers information regarding risks factors.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Name Of The College & Dept
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Ben Miller.   A distributed algorithm is a type of parallel algorithm  They are designed to run on multiple interconnected processors  Separate parts.
Introduction to Wireless Sensor Networks
Wireless Sensor Networks
Thermal Detecting Wireless Sensor Network Presenters: Joseph Roberson, Gautam Ankala, and Jessica Curry Faculty Advisor: Dr. Linda Milor ECE 4007: Final.
BANDAGE SIZE NON ECG HEART RATE MONITOR USING ZIGBEE WIRELESS LINK Guided by,Presented by, Ms. Geo. P.G Jeevan.K.Noble Asst.Prof., ECE Dept.S7, ECE-A.
ARM and GPS Based Transformer monitoring system with area Identification Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Software Architecture of Sensors. Hardware - Sensor Nodes Sensing: sensor --a transducer that converts a physical, chemical, or biological parameter into.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Sensor network routing protocol for underground robot remote control Demonstration picture (IDF)
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
How SCADA Systems Work?.
Introduction to Wireless Sensor Networks
Bluetooth Based Smart Sensor Network
Adhoc and Wireless Sensor Networks
Sensor Networks – Motes, Smart Spaces, and Beyond
Protocols.
Protocols.
Presentation transcript:

Secure Systems Research Group - FAU A Pattern for A Sensor Node 11/12/2009 Anupama Sahu

Secure Systems Research Group - FAU Introduction Sensors are widely used in specific and day to day applications. A Wireless Sensor Network is a deployment of massive number of sensors. In order to design a Wireless Sensor Network, it is important to know the architecture of a sensor node or a mote as it is also called. A sensor node is made up of various components that communicate and interact with each other. A sensor node also communicates with other nodes in order to gather information or forward information about the physical environment.

Secure Systems Research Group - FAU Outline  Intent  Example  Context  Problem  Forces  Solution  Block Diagram of Sensor node  Sensor Node Class Diagram  Sensing Sequence Diagram  Forwarding Sequence Diagram  Example Resolved  Consequences  Known uses  Variants  Related patterns  References

Secure Systems Research Group - FAU Intent. This pattern describes how to sense, monitor and gather local information about a physical environment and thus make global decisions about it.

Secure Systems Research Group - FAU Example We have an oil refinery where crude oil is processed and refined into more useful petroleum products. We have accidents wherein our pipes have burst due to excessive pressure and temperature. We are unable to monitor constantly the temperature in our chemical processing units which has led to small fires in the past. If we continue like this we would incur huge losses due to accidents and would also endanger the lives of our employees.

Secure Systems Research Group - FAU Context The oil refinery is a huge complex with large no. of pipes running throughout and carrying streams of fluids between large chemical processing units. The fluids flowing in the pipes are at high pressure and temperature and should be maintained at a suitable pressure and temperature in order to avoid accidents. The chemical processing units operate at different temperatures depending on the type of product being extracted from crude oil. Most of the operations in the refinery are automated since it could be hazardous for the employees to work in an environment of high temperature and explosive fluids.

Secure Systems Research Group - FAU Problem We need to stop or minimize the bursting of oil pipes and fire accidents in the refinery. In order to do so we should be able to know instantly if there is an abnormal increase of pressure and temperature in the pipes or the chemical processing units so that we can take immediate steps to prevent accidents. We should have some mechanism which can automatically activate preventive measures without human intervention This is only possible if we have a device that can sense, detect and monitor some attributes of the physical environment like pressure, temperature, light and smoke.

Secure Systems Research Group - FAU Forces The possible solution is constrained by the following forces:  We should have a device that can sense and collect local information about its surrounding environment like temperature, pressure, light, smoke, humidity and acoustic.  The device should be able to communicate with other devices in order to gather or forward information about the physical environment.  The device should have sufficient memory in order to store the collected data. It should also be able to process the collected data, perform simple computations and transmit only the required data and routing information.  The device should be robust and be able to operate in harsh conditions.

Secure Systems Research Group - FAU Forces  The device should be able to operate autonomously and unattended.  The device should be small in size so that it can be easily deployed in large numbers.  The device should be energy efficient and capable of operating on battery power for a reasonably long time in spite of its routing and computational capabilities.  The device should be able to support actuators such as switches, servos, and motors that would allow it to control various actions.  The architecture of the device should be extensible so that any new component can be added if required.

Secure Systems Research Group - FAU Solution A sensor is such a device that can sense, compute and communicate with other devices for the purpose of gathering local information to make global decisions about a physical environment. A sensor is mounted on a sensor board or a mote. The sensor board has other components like the processing unit, the transceiver unit and the power unit. All these components together make a sensor node. A sensor node acts both as a data collector and a data router. So it can monitor a physical environment and broadcast information either periodically or in case of an event. A sensor node can have various other components depending on the type of sensor it has like light or pressure or humidity.

Secure Systems Research Group - FAU Block Diagram of a Sensor Node

Secure Systems Research Group - FAU Components of the Sensor Node  The block diagram[Aky02] shows a single sensor and ADC in the sensing unit but it can also have multiple and different kinds of sensors sharing the same ADC. The main function of the ADC is to convert the analog data to digital format so that it can be further processed and forwarded to other nodes.  The Processing unit consists of the processor which is responsible for managing and coordinating the various activities of the sensor node. It generates control messages that direct the sensor to start or stop collecting information about the environment as and when required. It also directs the transceiver to be either in the receiving mode or transmitting mode depending upon the scenario.

Secure Systems Research Group - FAU Components of the Sensor Node  Processing unit keeps information about its neighboring nodes, decides the routing path and communicates the routing information to the other nodes. The processor also stores the collected data in the main memory or the flash memory until it is forwarded to the next node.  The Power unit supplies power to the sensing unit, processing unit and the transceiver.  Apart from the four basic components the sensor node might also have some additional application specific components. It can have a Location finding system or GPS to keep a track of its location and of its neighbors. It can have a mobilizer which can help the sensor to move short distances if required, or it can have a power generator which supplies continuous power to a node having some additional functionality.

Secure Systems Research Group - FAU Structure  The class diagram shows the PowerUnit supplying power to the SensingUnit, ProcessingUnit and the Transceiver.  A sensor can sense various attributes like temperature, humidity, light, pressure and many others. It can either measure a single component or a combination of them.  These measurements are in analog format and the ADC converts them to the digital format. The Processor runs various data gathering and routing protocols. It partially processes the gathered data and then either stores it in the storage memory for later use or forwards it to the Transceiver.  The Transceiver transmits and receives control and data messages. It routes the data from the source to the destination either in a single hop or in multiple hops.

Secure Systems Research Group - FAU Class Diagram for Sensor Node

Secure Systems Research Group - FAU Dynamics We describe the dynamic aspects of the sensor node using a sequence diagram for its sensing use case.  The Processor sends control message to enable the sensor  The Sensor starts collecting information about the physical world.  The Sensor reads the information in the analog form. The information which is in the analog format is sent to the ADC  The ADC converts the analog information into the digital format and sends it to the processor  The Processor processes the data locally and sends it to the transceiver and/or storage

Secure Systems Research Group - FAU Sensing Sequence Diagram

Secure Systems Research Group - FAU Forwarding Sequence Diagram  The Processor stores routing tables and runs various routing protocols in order to route the data from one node to the other.  The Processor sends message to the Transceiver which then routes the data to the Transceiver of the neighboring node.  The Transceiver of the neighboring node forwards the data to its Processor.  The Processor processes together the received data as well as its own data and sends it back to the Transceiver.  The Transceiver might go ahead and send this data to the Transceiver of another sensor node.  Sometimes the Processor might locally store small amount of data until it is ready to be routed

Secure Systems Research Group - FAU Forwarding Sequence Diagram

Secure Systems Research Group - FAU Implementation  The components in a sensor node should have some required specifications.  To build a sensor node, some of the sensor boards that could be used are MTS310, MTS420, MTS400,MDA300, MDA100 and various others.  The transceiver used should be IEEE compliant and/or Zigbee compliant.  The operating systems that could be used are TinyOS, SOS, LiteOS

Secure Systems Research Group - FAU Example Resolved We are able to minimize the bursting of oil pipes and fire accidents in the refinery because of the deployment of sensors in the pipes and chemical processing units. The sensors constantly monitor and report instantly if there is an abnormal increase of pressure and temperature in the pipes or the chemical processing units. The sensors also start or activate water sprinklers in case of a fire.

Secure Systems Research Group - FAU Consequences The sensor node pattern has the following advantages:  The design of a sensor node is simple and easy to extend or modify.  Sensor nodes are easy to deploy and can be deployed in hard to reach places.  They can operate in harsh conditions.  They are autonomous in nature.  Low maintenance  Can monitor and control the physical location remotely The sensor node pattern has the following disadvantages:  They have limited resources in terms of processor, radio, memory and battery life.

Secure Systems Research Group - FAU Known Uses  The architecture of the sensor node described in this pattern corresponds to the architecture of the Berkeley Motes manufactured by Crossbow Technologies.  It also corresponds to the architecture of IPsensor Node manufactured by Arch Rock.  Squidbee Mote manufactured by Libelium also has the same architecture.

Secure Systems Research Group - FAU Conclusion A Sensor node consists of four basic components but these components could be of different types as long as they fall within the specifications range and are compatible with the other supporting devices. Thus knowing the architecture of the sensor node helps us in choosing the type of node we require for our application.

Secure Systems Research Group - FAU References [Aky02] I. A. Akyildiz et. al., “A Survey on Sensor Networks”, IEEE Communications Magazine, Aug [Bos09] Raja Bose, “Sensor Networks- Motes, Smart Spaces, and Beyond” Proc. IEEE, 2009 [Bus96] F. Buschmann, R. Meunier, H. Rohnert, P. Sommerland, and M. Stal., Pattern- oriented software architecture, Wiley [Cho03] C. -Y. Chong and S.P. Kumar, "Sensor networks: Evolution, opportunities, and challenges," Proc. IEEE, Aug [Est99] D. Estrin, R. Govindan, J. Heidermann, S. Humar, “Next Century Challenges: Scalable Coordination in Sensor Networks”, Mobicom

Secure Systems Research Group - FAU References wireless-sensor-network-node-mote

Secure Systems Research Group - FAU Questions?

Secure Systems Research Group - FAU Querying Sequence Diagram