No abstract available.
Message from the chairs
ISPN organizing committee
Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
Wireless sensor networks are often queried for aggregates such as predicate count, sum, and average. In untrusted environments, sensors may potentially be compromised. Existing approaches for securely answering aggregation queries in untrusted sensor ...
Dialog codes for secure wireless communications
We investigate the feasibility of achieving perfect secrecy in wireless network communications without shared secrets. We introduce a secure coding problem in which not only the sender but also the receiver participates in the coding. In essence, the ...
Transient-based identification of wireless sensor nodes
Identification of wireless sensor nodes based on the characteristics of their radio transmissions can provide an additional layer of security in all-wireless multi-hop sensor networks. Reliable identification can be means for the detection and/or ...
Gradient clock synchronization in wireless sensor networks
Accurately synchronized clocks are crucial for many applications in sensor networks. Existing time synchronization algorithms provide on average good synchronization between arbitrary nodes, however, as we show in this paper, close-by nodes in a network ...
Event-triggered distributed optimization in sensor networks
Many problems in sensor networks can be formulated as optimization problems. Existing distributed optimization algorithms typically rely on choosing a step size to ensure convergence. In this case, the communication between sensor nodes occurs each time ...
Recovering temporal integrity with Data Driven Time Synchronization
Data Driven Time Synchronization (DDTS) provides synchronization across sensors by using underlying characteristics of data collected by an embedded sensing system. We apply the concept of Data Driven Time Synchronization through a seismic deployment ...
Automating rendezvous and proxy selection in sensornets
As the diversity of sensornet use cases increases, the combinations of environments and applications that will coexist will make custom engineering increasingly impractical. We investigate an approach that focuses on replacing custom engineering with ...
Archetype-based design: Sensor network programming for application experts, not just programming experts
Sensor network application experts such as biologists, geologists, and environmental engineers generally have little experience with, and little patience for, general-purpose and often low-level sensor network programming languages. We believe sensor ...
Distributed resource management and matching in sensor networks
We consider a scenario in which there are resources at or near nodes of a network, which are either static (e.g. fire stations, parking spots) or mobile (e.g. police cars). Over time, events (fires, crime reports, cars looking for parking) arise one-by-...
Predictive QoS routing to mobile sinks in wireless sensor networks
We present an algorithm for data delivery to mobile sinks in wireless sensor networks. Our algorithm is based on information potentials, which we extend to account for mobility. We show that for local movement along edges in the communication graph, the ...
Greedy routing with guaranteed delivery using Ricci flows
Greedy forwarding with geographical locations in a wireless sensor network may fail at a local minimum. In this paper we propose to use conformal mapping to compute a new embedding of the sensor nodes in the plane such that greedy forwarding with the ...
On hierarchical routing in wireless sensor networks
Hierarchical routing is a promising approach for point-to-point routing with very small routing state. While there are many theoretical analyses and high-level simulations demonstrating its benefits, there has been little work to evaluate it in a ...
Application-informed radio duty-cycling in a re-taskable multi-user sensing system
As sensor networks mature, there will be an increasing need for re-usable, dynamically taskable software systems that support multiple concurrent applications. In this paper, we consider the problem of energy management in such systems, taking Tenet as ...
Energy efficient sensor data logging with amnesic flash storage
We present FlashLogger, an energy-efficient sensor data logging system that uses lazy amnesic compression in a flash-efficient manner. FlashLogger incorporates a suite of compression algorithms suitable for progressively compressing time series scalar, ...
Improving the speed and scalability of distributed simulations of sensor networks
Distributed simulation techniques are commonly used to improve the speed and scalability of wireless sensor network simulators. However, accurate simulations of dynamic interactions of sensor network applications incur large synchronization overheads ...
Simultaneous placement and scheduling of sensors
We consider the problem of monitoring spatial phenomena, such as road speeds on a highway, using wireless sensors with limited battery life. A central question is to decide where to locate these sensors to best predict the phenomenon at the unsensed ...
Algebraic approach to recovering topological information in distributed camera networks
Camera networks are widely used for tasks such as surveillance, monitoring and tracking. In order to accomplish these tasks, knowledge of localization information such as camera locations and other geometric constraints about the environment (e.g. walls,...
Near-optimal Bayesian localization via incoherence and sparsity
This paper exploits recent developments in sparse approximation and compressive sensing to efficiently perform localization in a sensor network. We introduce a Bayesian framework for the localization problem and provide sparse approximations to its ...
Sensor ranking: A primitive for efficient content-based sensor search
The increasing penetration of the real world with embedded and globally networked sensors enables the formation of a Web of Things (WoT), where high-level state information derived from sensors is embedded into Web representations of real-world entities ...
Approximating sensor network queries using in-network summaries
In this work we present new in-network techniques for communication efficient approximate query processing in wireless sensornets. We use a model-based approach that constructs and maintains a spanning tree within the network, rooted at the basestation. ...
Peer-to-peer estimation over wireless sensor networks via Lipschitz optimization
Motivated by a peer-to-peer estimation algorithm in which adaptive weights are optimized to minimize the estimation error variance, we formulate and solve a novel nonconvex Lipschitz optimization problem that guarantees global stability of a large class ...
Design and implementation of a high-fidelity AC metering network
We present the architecture, design, and preliminary evaluation of ACme, a wireless sensor and actuator network for monitoring AC energy usage and controlling AC devices in a large and diverse building environment. The ACme system consists of three ...
PermaDAQ: A scientific instrument for precision sensing and data recovery in environmental extremes
- Jan Beutel,
- Stephan Gruber,
- Andreas Hasler,
- Roman Lim,
- Andreas Meier,
- Christian Plessl,
- Igor Talzi,
- Lothar Thiele,
- Christian Tschudin,
- Matthias Woehrle,
- Mustafa Yuecel
The PermaSense project has set the ambitious goal of gathering real-time environmental data for high-mountain permafrost in unattended operation over multiple years. This paper discusses the specialized sensing and data recovery architecture tailored to ...
Monitoring heritage buildings with wireless sensor networks: The Torre Aquila deployment
- Matteo Ceriotti,
- Luca Mottola,
- Gian Pietro Picco,
- Amy L. Murphy,
- Stefan Guna,
- Michele Corra,
- Matteo Pozzi,
- Daniele Zonta,
- Paolo Zanon
Wireless sensor networks are untethered infrastructures that are easy to deploy and have limited visual impact—a key asset in monitoring heritage buildings of artistic interest. This paper describes one such system deployed in Torre Aquila, a medieval ...
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
Recent works have shown the usefulness of network and application layer protocols that connect low power sensor nodes directly to multiple applications and users on the Internet. We propose a security solution for this scenario. While previous works ...
Anti-jamming for embedded wireless networks
Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate ...
SENESCOPE: A design tool for cost optimization of wireless sensor nodes
The market of wireless sensor networks is permanently growing due to the declining costs of sensor nodes. This paper presents a new approach for the hardware design of sensor networks based on a multi-criteria cost optimization by means of evolutionary ...
Radio interferometric Quasi Doppler bearing estimation
The paper introduces a novel technique for the bearing estimation of radio sources that can be used for the precise localization and/or tracking of RF tags such as wireless sensor nodes. It is well known that the bearing to a radio source can be ...
Index Terms
- Proceedings of the 2009 International Conference on Information Processing in Sensor Networks