Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/570681.570688acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

A distributed monitoring mechanism for wireless sensor networks

Published: 28 September 2002 Publication History

Abstract

In this paper we focus on a large class of wireless sensor networks that are designed and used for monitoring and surveillance. The single most important mechanism underlying such systems is the monitoring of the network itself, that is, the control center needs to be constantly made aware of the existence/health of all the sensors in the network for security reasons. In this study we present plausible alternative communication strategies that can achieve this goal, and then develop and study in more detail a distributed monitoring mechanism that aims at localized decision making and minimizing the propagation of false alarms. Key constraints of such systems include low energy consumption and low complexity. Key performance measures of this mechanism include high detection accuracy (low false alarm probabilities) and high responsiveness (low response latency). We investigate the trade-offs via simulation.

References

[1]
M. Bhardwaj and A. P. Chandrakasan. Bounding the lifetime of sensor networks via optimal role assignments. In IEEE InfoCom, 2002.
[2]
D. Ganesan, R. Govinda, S. Shenker, and D. Estrin. Highly resilient, energy efficient multipath routing in wireless sensor networks. Mobile Computing and Communications Review (MC2R), 1(2), 2002.
[3]
J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan. Building efficient wireless sensor networks with low-level naming. In Proceedings of the Symposium on Operating Systems Principles, pages 146--159, October 2001.
[4]
W. Heinzelman, A. Chandrakasa, and H. Balakrishnan. Energy-efficient communication protocols for wireless microsensor networks. In Proceedings of Hawaiian International Conference on Systems Science, January 2000.
[5]
C. Intanagonwiwat, D. Estrin, and R. Gonvindan. Impact of network density on data aggregation in wireless sensor networks. In International Conference on Distributed Computing Systems (ICDCS-22), November 2001.
[6]
J. Kulik, W. R. Heinzelman, and H. Balakrishnan. Negotiation-based protocols for disseminating information in wireless sensor networks. ACM Wireless Networks, 8, 2002.
[7]
L. Subramanian and R. H.Katz. An architecture for building self-configurable systems. In IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC 2000), 2000.
[8]
A. Woo and D. E. Culler. A transmission control schemes for media access in sensor networks. In ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), 2001.
[9]
W. Ye, J. Heidemann, and D. Estrin. An energy-efficient mac protocol for wireless sensor networks. In IEEE InfoCom, 2002.
[10]
Y. J. Zhao, R. Govindan, and D. Estrin. Residual energy scan for monitoring sensor networks. In IEEE Wireless Communications and Networking Conference (WCNC'02), March 2002.

Cited By

View all
  • (2022)A Simple and Efficient Tree-Based Algorithm for the Distributed Trigger Counting ProblemElectronics10.3390/electronics1107112711:7(1127)Online publication date: 2-Apr-2022
  • (2021)Detection and rectification of cloned node intruder in wireless sensor networkMaterials Today: Proceedings10.1016/j.matpr.2020.12.1057Online publication date: Feb-2021
  • (2019)A Unified approach for Selecting Probes and Probing Stations for Fault Detection and Localization in Computer Networks2019 IEEE International Conference on Systems, Man and Cybernetics (SMC)10.1109/SMC.2019.8914491(2071-2076)Online publication date: Oct-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSE '02: Proceedings of the 1st ACM workshop on Wireless security
September 2002
100 pages
ISBN:1581135858
DOI:10.1145/570681
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 September 2002

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. monitor and surveillance
  2. security
  3. system design
  4. wireless sensor networks

Qualifiers

  • Article

Conference

WiSe02
Sponsor:

Acceptance Rates

Overall Acceptance Rate 10 of 41 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)A Simple and Efficient Tree-Based Algorithm for the Distributed Trigger Counting ProblemElectronics10.3390/electronics1107112711:7(1127)Online publication date: 2-Apr-2022
  • (2021)Detection and rectification of cloned node intruder in wireless sensor networkMaterials Today: Proceedings10.1016/j.matpr.2020.12.1057Online publication date: Feb-2021
  • (2019)A Unified approach for Selecting Probes and Probing Stations for Fault Detection and Localization in Computer Networks2019 IEEE International Conference on Systems, Man and Cybernetics (SMC)10.1109/SMC.2019.8914491(2071-2076)Online publication date: Oct-2019
  • (2018)An Intelligent Scheme for the Identification of QoS Violations in Virtualized Environments2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)10.1109/ICTAI.2018.00160(1040-1047)Online publication date: Nov-2018
  • (2018)Predictive intelligence to the edge through approximate collaborative context reasoningApplied Intelligence10.1007/s10489-017-1032-y48:4(966-991)Online publication date: 1-Apr-2018
  • (2017)Data Fusion and Type-2 Fuzzy Inference in Contextual Data Stream MonitoringIEEE Transactions on Systems, Man, and Cybernetics: Systems10.1109/TSMC.2016.256053347:8(1839-1853)Online publication date: Aug-2017
  • (2017)Evaluation of low power listening MAC protocol on network monitoring in wireless sensor networks2017 9th International Conference on Knowledge and Smart Technology (KST)10.1109/KST.2017.7886117(260-265)Online publication date: Feb-2017
  • (2017)Intelligent fault management system for wireless sensor networks with reduction of power consumption2017 IEEE 26th International Symposium on Industrial Electronics (ISIE)10.1109/ISIE.2017.8001471(1521-1527)Online publication date: Jun-2017
  • (2016)Security Issues in Mobile Ad Hoc NetworksMobile Computing and Wireless Networks10.4018/978-1-4666-8751-6.ch086(1940-1985)Online publication date: 2016
  • (2016)DARPAProceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks10.1145/2939918.2939938(171-182)Online publication date: 18-Jul-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media