Results 1 - 10
of
1,109
X-mac: A short preamble mac protocol for duty-cycled wireless sensor networks
- in SenSys
, 2006
"... In this paper we present X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols developed for duty-cycled WSNs such as B-MAC, which is the default MAC protocol for TinyOS, employ an extended preamble and preamble sampling. While this “low power listening ” approa ..."
Abstract
-
Cited by 360 (0 self)
- Add to MetaCart
(Show Context)
In this paper we present X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols developed for duty-cycled WSNs such as B-MAC, which is the default MAC protocol for TinyOS, employ an extended preamble and preamble sampling. While this “low power listening ” approach is simple, asynchronous, and energy-efficient, the long preamble introduces excess latency at each hop, is suboptimal in terms of energy consumption, and suffers from excess energy consumption at nontarget receivers. X-MAC proposes solutions to each of these problems by employing a shortened preamble approach that retains the advantages of low power listening, namely low power communication, simplicity and a decoupling of transmitter and receiver sleep schedules. We demonstrate through implementation and evaluation in a wireless sensor testbed that X-MAC’s shortened preamble approach significantly reduces energy usage at both the transmitter and receiver, reduces per-hop latency, and offers additional advantages such as flexible adaptation to both bursty and periodic sensor data sources.
Collection Tree Protocol.
- Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys’09),
, 2009
"... Abstract This paper presents and evaluates two principles for wireless routing protocols. The first is datapath validation: data traffic quickly discovers and fixes routing inconsistencies. The second is adaptive beaconing: extending the Trickle algorithm to routing control traffic reduces route re ..."
Abstract
-
Cited by 339 (16 self)
- Add to MetaCart
(Show Context)
Abstract This paper presents and evaluates two principles for wireless routing protocols. The first is datapath validation: data traffic quickly discovers and fixes routing inconsistencies. The second is adaptive beaconing: extending the Trickle algorithm to routing control traffic reduces route repair latency and sends fewer beacons. We evaluate datapath validation and adaptive beaconing in CTP Noe, a sensor network tree collection protocol. We use 12 different testbeds ranging in size from 20-310 nodes, comprising seven platforms, and six different link layers, on both interference-free and interference-prone channels. In all cases, CTP Noe delivers > 90% of packets. Many experiments achieve 99.9%. Compared to standard beaconing, CTP Noe sends 73% fewer beacons while reducing topology repair latency by 99.8%. Finally, when using low-power link layers, CTP Noe has duty cycles of 3% while supporting aggregate loads of 30 packets/minute.
Z-MAC: a Hybrid MAC for Wireless Sensor Networks
, 2005
"... Z-MAC is a hybrid MAC protocol for wireless sensor networks. It combines the strengths of TDMA and CSMA while offsetting their weaknesses. Nodes are assigned time slots using a distributed implementation of RAND. Unlike TDMA where a node is allowed to transmit only during its own assigned slots, a n ..."
Abstract
-
Cited by 296 (7 self)
- Add to MetaCart
(Show Context)
Z-MAC is a hybrid MAC protocol for wireless sensor networks. It combines the strengths of TDMA and CSMA while offsetting their weaknesses. Nodes are assigned time slots using a distributed implementation of RAND. Unlike TDMA where a node is allowed to transmit only during its own assigned slots, a node can transmit in both its own time slots and slots assigned to other nodes. Owners of the current time slot always have priority in accessing the channel over non-owners. Therefore, under low contention where not all owners have data to send, non-owners can “steal ” time slots from owners. This has the effect of switching between CSMA and TDMA depending on contention. Z-MAC is robust to topology changes and clock synchronization errors; in the worst case its performance falls back to that of CSMA. We implemented Z-MAC in TinyOS and evaluated its channel utilization, energy, latency and fairness over single-hop, twohop and multi-hop sensor network topologies constructed using Mica2. The result shows that Z-MAC has remarkably better data throughput than existing sensor MAC protocols while consuming comparable energy (over three times better throughput under high contention).
The feasibility of launching and detecting jamming attacks in wireless networks
- In ACM MOBIHOC
, 2005
"... Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitting radio frequency signals that do not follow an underlying MAC protocol. Jamming attacks can severely interfere with th ..."
Abstract
-
Cited by 265 (15 self)
- Add to MetaCart
(Show Context)
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitting radio frequency signals that do not follow an underlying MAC protocol. Jamming attacks can severely interfere with the normal operation of wireless networks and, consequently, mechanisms are needed that can cope with jamming attacks. In this paper, we examine radio interference attacks from both sides of the issue: first, we study the problem of conducting radio interference attacks on wireless networks, and second we examine the critical issue of diagnosing the presence of jamming attacks. Specifically, we propose four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluate their effectiveness in terms of how
Reputation-based framework for high integrity sensor networks
- In SASN ’04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, 2004
"... The traditional approach of providing network security has been to borrow tools from cryptography and authentication. However, we argue that the conventional view of security based on cryptography alone is not sufficient for the unique characteristics and novel misbehaviors encountered in sensor net ..."
Abstract
-
Cited by 257 (7 self)
- Add to MetaCart
The traditional approach of providing network security has been to borrow tools from cryptography and authentication. However, we argue that the conventional view of security based on cryptography alone is not sufficient for the unique characteristics and novel misbehaviors encountered in sensor networks. Fundamental to this is the observation that cryptography cannot prevent malicious or non-malicious insertion of data from internal adversaries or faulty nodes. We believe that in general tools from different domains such as economics, statistics and data analysis will have to be combined with cryptography for the development of trustworthy sensor networks. Following this approach, we propose a reputation-based framework for sensor networks where nodes maintain reputation for other nodes and use it to evaluate their trustworthiness. We will show that this framework provides a scalable, diverse and a generalized approach for countering all types of misbehavior resulting from malicious and faulty nodes. We are currently developing a system within this framework where we employ a Bayesian formulation, specifically a beta reputation system, for reputation representation, updates and integration. We will explain the reasoning behind our design choices, analyzing their pros & cons. We conclude the paper by verifying the efficacy of this system through some preliminary simulation results.
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
- In Proceedings of the Fourth International Conference On Embedded Networked Sensor Systems (SenSys 2006
, 2006
"... Energy is a critical resource in sensor networks. MAC protocols such as S-MAC and T-MAC coordinate sleep schedules to reduce energy consumption. Recently, lowpower listening (LPL) approaches such as WiseMAC and B-MAC exploit very brief polling of channel activity combined with long preambles before ..."
Abstract
-
Cited by 195 (3 self)
- Add to MetaCart
(Show Context)
Energy is a critical resource in sensor networks. MAC protocols such as S-MAC and T-MAC coordinate sleep schedules to reduce energy consumption. Recently, lowpower listening (LPL) approaches such as WiseMAC and B-MAC exploit very brief polling of channel activity combined with long preambles before each transmission, saving energy particularly during low network utilization. Synchronization cost, either explicitly in scheduling, or implicitly in long preambles, limits all these protocols to duty cycles of 1–2%. We demonstrate that ultra-low duty cycles of 0.1% and below are possible with a new MAC protocol called scheduled channel polling (SCP). This work prompts three new contributions: First, we establish optimal configurations for both LPL and SCP under fixed conditions, developing a lower bound of energy consumption. Under these conditions, SCP can extend lifetime of a network by a factor of 3–6 times over LPL. Second, SCP is designed to adapt well to variable traffic. LPL is optimized for known, periodic traffic, and long preambles become very costly when traffic varies. In one experiment, SCP reduces energy consumption by a factor of 10 under bursty traffic. We also show how SCP adapts to heavy traffic and streams data in multi-hop networks, reducing latency by 85 % and energy by 95 % at 9 hops. Finally, we show that SCP can operate effectively on recent hardware such as 802.15.4 radios. In fact, power consumption of SCP decreases with faster radios, but that of LPL increases.
A dynamic operating system for sensor nodes
- in MobiSys
, 2005
"... Sensor network nodes exhibit characteristics of both embedded systems and general-purpose systems. As an embedded system, a sensor node must use little energy and be robust to environmental conditions. As a general-purpose system, a node should provide common services that make it easy to write appl ..."
Abstract
-
Cited by 189 (13 self)
- Add to MetaCart
(Show Context)
Sensor network nodes exhibit characteristics of both embedded systems and general-purpose systems. As an embedded system, a sensor node must use little energy and be robust to environmental conditions. As a general-purpose system, a node should provide common services that make it easy to write applications. TinyOS, the current state of the art in sensor network operating systems, focuses on traditional embedded system constraints; reusable components implement common services, but a node runs a single statically-linked system image, making it hard to run multiple applications or incrementally update applications. We present SOS, a new operating system for mote-class sensor nodes that implements a more dynamic point on the design spectrum. SOS consists of dynamically-loaded modules and a common kernel, which implements messaging, dynamic memory, and module loading and unloading, among other services. Modules are not processes: they are scheduled cooperatively and there is no memory protection. Nevertheless, the system protects against common module bugs using techniques such as typed entry points, watchdog timers, and primitive resource garbage collection. Individual modules can be added and removed with minimal system interruption. We describe SOS’s design and implementation, discuss tradeoffs, and compare it with TinyOS and with the Maté virtual machine for TinyOS. Our evaluation shows that despite the dynamic nature of SOS and its higher-level kernel interface, it performs comparably to TinyOS in terms of energy usage and performance, and better in terms of energy usage during software updates. 1
Design considerations for solar energy harvesting wireless embedded systems
- IEEE SPOTS
, 2005
"... Sustainable operation of battery powered wireless embedded systems (such as sensor nodes) is a key challenge, and considerable research effort has been devoted to energy optimization of such systems. Environmental energy harvesting, in particular solar based, has emerged as a viable technique to sup ..."
Abstract
-
Cited by 182 (6 self)
- Add to MetaCart
(Show Context)
Sustainable operation of battery powered wireless embedded systems (such as sensor nodes) is a key challenge, and considerable research effort has been devoted to energy optimization of such systems. Environmental energy harvesting, in particular solar based, has emerged as a viable technique to supplement battery supplies. However, designing an efficient solar harvesting system to realize the potential benefits of energy harvesting requires an in-depth understanding of several factors. For example, solar energy supply is highly time varying and may not always be sufficient to power the embedded system. Harvesting compo-nents, such as solar panels, and energy storage elements, such as batteries or ultracapacitors, have different voltage-current characteristics, which must be matched to each other as well as the energy requirements of the system to maximize harvesting efficiency. Further, battery non-idealities, such as self-discharge and round trip efficiency, directly affect energy usage and storage decisions. The ability of the system to modulate its power consumption by selectively deactivating its sub-components also impacts the overall power management architecture. This paper describes key issues and tradeoffs which arise in the design of solar energy harvesting, wireless embedded systems and presents the design, implementation, and performance evaluation of Heliomote, our prototype that addresses several of these issues. Experimental results demonstrate that Heliomote, which behaves as a plug-in to the Berkeley/Crossbow motes and autonomously manages energy harvesting and storage, enables near-perpetual, harvesting aware operation of the sensor node.
Design of a Wireless Sensor Network Platform for Detecting Rare, Random, and Ephemeral Events
, 2005
"... We present the design of the eXtreme Scale Mote, a new sensor network platform for reliably detecting and classifying, and quickly reporting, rare, random, and ephemeral events in a largescale, long-lived, and retaskable manner. This new mote was designed for the ExScal project which seeks to demons ..."
Abstract
-
Cited by 172 (18 self)
- Add to MetaCart
(Show Context)
We present the design of the eXtreme Scale Mote, a new sensor network platform for reliably detecting and classifying, and quickly reporting, rare, random, and ephemeral events in a largescale, long-lived, and retaskable manner. This new mote was designed for the ExScal project which seeks to demonstrate a 10,000 node network capable of discriminating civilians, soldiers and vehicles, spread out over a 10km 2 area, with node lifetimes approaching 1,000 hours of continuous operation on two AA alkaline batteries. This application posed unique functional, usability, scalability, and robustness requirements which could not be met with existing hardware, and therefore motivated the design of a new platform. The detection and classification requirements are met using infrared, magnetic, and acoustic sensors. The infrared and acoustic sensors are designed for low-power continuous operation and include asynchronous processor wakeup circuitry. The usability and scalability requirements are met by minimizing the frequency and cost of human-in-the-loop operations during node deployment, activation, and verification through improvements in the user interface, packaging, and configurability of the platform. Recoverable retasking is addressed by using a grenade timer that periodically forces a system reset. The key contributions of this work are a specific design point and general design methods for building sensor network platforms to detect exceptional events. 1.
Design of an application-cooperative management system for wireless sensor networks
, 2005
"... Abstract — This paper argues for the usefulness of an application-cooperative interactive management system for wireless sensor networks, and presents SNMS, a Sensor Network Management System. SNMS is designed to be simple and have minimal impact on memory and network traffic, while remaining open a ..."
Abstract
-
Cited by 170 (15 self)
- Add to MetaCart
(Show Context)
Abstract — This paper argues for the usefulness of an application-cooperative interactive management system for wireless sensor networks, and presents SNMS, a Sensor Network Management System. SNMS is designed to be simple and have minimal impact on memory and network traffic, while remaining open and flexible. The system is evaluated in light of issues derived from real deployment experiences. I.