Mobile Networks and Applications

, Volume 16, Issue 2, pp 194–213 | Cite as

Complex Event Detection in Extremely Resource-Constrained Wireless Sensor Networks

  • Michael ZoumboulakisEmail author
  • George Roussos


Complex Events are sequences of sensor measurements indicating interesting or unusual activity in the monitored process. Such events are ubiquitous in a wide range of Wireless Sensor Network (WSN) applications, yet there does not exist a common mechanism that addresses both the considerable constraints of WSNs and the specific properties of Complex Events. We argue that Complex Events cannot be described using standard threshold-based or composite logic approaches and attempting to represent them as such can lead to unpredictable execution cost while detection accuracy suffers from erroneous recording of observations which are common in WSNs. To address this, we develop a family of Complex Event Detection (CED) algorithms based on online symbolic conversion of sensor readings. With fixed execution cost and modest resource requirements, the CED algorithms cater for exact, approximate, non-parametric, multiple and probabilistic detection that is neither application nor data dependent. Overall, full implementation and simulations provide experimental evidence of the advantages of the proposed approach. We find that the proposed algorithms minimise configuration, promote unattended operation and complement the goal of prolonged lifetime—factors that satisfy the long-term research vision predicting Internet-scale WSNs comprising billions of devices.


wireless sensor networks complex event detection integer techniques 


  1. 1.
    Arzen KE, Bicchi A, Dini G, Hailes S, Johansson KH, Lygeros J, Tzes A (2007) A component-based approach to the design of networked control systems. Eur J Control 13(2–3):261–279CrossRefGoogle Scholar
  2. 2.
    Basha EA, Ravela S, Rus D (2008) Model-based monitoring for early warning flood detection. In: SenSys ’08: proceedings of the 6th ACM conference on embedded network sensor systems, pp 295–308Google Scholar
  3. 3.
    Buettner M, Prasad R, Sample A, Yeager D, Greenstein B, Smith J, Wetherall D (2008) RFID sensor networks with the intel WISP. In: SenSys. ACM, pp 393–394Google Scholar
  4. 4.
    Burrell J, Brooke T, Beckwith R (2004) Vineyard Computing: Sensor Networks in Agricultural Production. IEEE Pervasive Computing 3(1):38–45CrossRefGoogle Scholar
  5. 5.
    Cardell-Oliver R, Kranz M, Smettem K, Mayer K (2005) A reactivetion soil moisture sensor network: design and field evaluation. IJDSN 1(2):149–162Google Scholar
  6. 6.
    Casey K, Lim A, Dozier G (2008) A Sensor Network Architecture for Tsunami Detection and Response. IJDSN 4(1):28–43Google Scholar
  7. 7.
    Ceriotti M, Mottola L, Picco GP, Murphy A, Stefan G, Corrà M, Pozzi M, Zonta D, Zanon P (2009) Monitoring heritage buuldings with wireless sensor networks: the Torre Aquila deployment. In: IPSN ’09: proceedings of the 2009 international conference on information processing in sensor networks. IEEE Computer Society, Washington, pp 277–288Google Scholar
  8. 8.
    Chakravarthy S, Krishnaprasad V, Anwar E, Kim SK (1994) Composite events for active databases: Semantics, contexts and detection. In: Proceedings of the international conference on very large data bases, pp 606–606Google Scholar
  9. 9.
    Chin JC, Yau DKY, Rao NSV, Yang Y, Ma CYT, Shankar M (2008) Accurate localization of low-level radioactive source under noise and measurement errors. In: SenSys ’08: proceedings of the 6th ACM conference on embedded network sensor systems, pp 183–196Google Scholar
  10. 10.
    Desnoyers P, Ganesan D, Li H, Li M, Shenoy P (2005) PRESTO: A predictive storage architecture for sensor networks. In: Tenth workshop on hot topics in operating systems (HotOS X)Google Scholar
  11. 11.
    Doolina D, Sitar N (2004) Wireless sensors for wildfire monitoring. In: SPIE symposium on smart structures & materialsGoogle Scholar
  12. 12.
    Doraiswamy PC, Moulin S, Cook PW, Stern A (2003) Crop yield assessment from remote sensing. Photogramm Eng Remote Sensing 69(6):665–674Google Scholar
  13. 13.
    EasySen C (2008) SBT80—multi modality sensor board. Accessed 1 August 2009
  14. 14.
    Faloutsos C, Ranganathan M, Manolopoulos Y (1994) Fast subsequence matching in time-series databases. SIGMOD Rec 23(2):419–429. doi: 10.1145/191843.191925 CrossRefGoogle Scholar
  15. 15.
    Gao T, Greenspan D, Welsh M, Juang R, Alm A (2005) Vital signs monitoring and patient tracking over a wireless network. In: Proceedings of the 27th annual international conference of the IEEE EMBS, pp 102–105Google Scholar
  16. 16.
    Gunatilaka A, Ristic B, Gailis R (1988) Radiological source localisation. DSTO-TR-1988. Accessed July 2007
  17. 17.
    Gusfield D (1997) Algorithms on strings, trees and sequences: computer science and computational biology. Cambridge University PressGoogle Scholar
  18. 18.
    Han Q, Jayasumana AP, Illangaskare TH, Sakaki T (2008) A wireless sensor network based closed-loop system for subsurface contaminant plume monitoring. In: Proceedings of 24th IEEE international parallel and distributed processing symposium. IEEE, pp 1–5Google Scholar
  19. 19.
    Hauer JH, Handziski V, Köpke A, Willig A, Wolisz A (2008) A component framework for content-based publish/subscribe in sensor networks. In: EWSN. Springer, pp 369–385Google Scholar
  20. 20.
    Huang L, Garofalakis M, Hellerstein J, Joseph A, Taft N (2006) Toward sophisticated detection with distributed triggers. In: MineNet ’06: proceedings of the 2006 SIGCOMM workshop on mining network data, pp 311–316Google Scholar
  21. 21.
    Intel (2004) Lab data (Berkeley). Accessed 2 June 2004
  22. 22.
    Ishida H, Nakamoto T, Moriizumi T (1998) Remote sensing of gas/odor source location and concentration distribution using mobile system. Sens Actuators, B, Chem 1–2(49):52–57CrossRefGoogle Scholar
  23. 23.
    Katsiri E, Ho M, Wang L, Lo B, Toumazou C (2007) Embedded real-time heart variability analysis. In: 4th international workshop on wearable and implantable body sensor networks (BSN 2007), pp 128–132Google Scholar
  24. 24.
    Keogh E (2008) The UCR time series data mining archive. Accessed December 2008
  25. 25.
    Keogh E, Lonardi S, Ratanamahatana CA (2004) Towards parameter-free data mining. In: KDD ’04: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, New York, pp 206–215CrossRefGoogle Scholar
  26. 26.
    Keogh E, Lin J, Fu A (2005) HOT SAX: efficiently finding the most unusual time series subsequence. IEEE international conference on data mining, pp 226–233Google Scholar
  27. 27.
    Kim S, Pakzad S, Culler D, Demmel J, Fenves G, Glaser S, Turon M (2007) Health monitoring of civil infrastructures using wireless sensor networks. In: IPSN ’07: proceedings of the 6th international conference on information processing in sensor networks, pp 254–263Google Scholar
  28. 28.
    Kirsch C, Mattingley-Scott M, Muszynski C, Schaefer F, Weiss C (2007) Monitoring chronically ill patients using mobile technologies. IBM Syst J 46(1):85–93CrossRefGoogle Scholar
  29. 29.
    Krishnamurthy L, Adler R, Buonadonna P, Chhabra J, Flanigan M, Kushalnagar N, Nachman L, Yarvis M (2005) Design and deployment of industrial sensor networks: experiences from a semiconductor plant and the north sea. In: SenSys ’05: proceedings of the 3rd international conference on embedded networked sensor systems, pp 64–75Google Scholar
  30. 30.
    Levis P, Culler D (2002) Maté: a tiny virtual machine for sensor networks. In: ASPLOS-X: proceedings of the 10th international conference on architectural support for programming languages and operating systems. ACM, New York, pp 85–95CrossRefGoogle Scholar
  31. 31.
    Levis P, Brewer E, Culler D, Gay D, Madden S, Patel N, Polastre J, Shenker S, Szewczyk R, Woo A (2008) The emergence of a networking primitive in wireless sensor networks. Commun ACM 51(7):99–106CrossRefGoogle Scholar
  32. 32.
    Lin J, Keogh E, Lonardi S, Chiu B (2003a) A symbolic representation of time series, with implications for streaming algorithms. In: DMKD ’03: proceedings of the 8th ACM SIGMOD workshop on research issues in data mining and knowledge discovery. ACM, New York, pp 2–11CrossRefGoogle Scholar
  33. 33.
    Lin M, Kumar A, Qing X, Beard SJ, Russell SS, Walker JL, Delay TK (2003b) Monitoring the integrity of filament-wound structures using built-in sensor networks. In: Society of photo-optical instrumentation engineers (SPIE) conference series, vol 5054, pp 222–229Google Scholar
  34. 34.
    Lo BPL, Thiemjarus S, King R, Yang Gz (2005) Body sensor network—a wireless sensor platform for pervasive healthcare monitoring. In: Adjunct proceedings of the 3rd international conference on pervasive computing (PERVASIVE’05, pp 77–80Google Scholar
  35. 35.
    Malan D, Fulford-jones T, Welsh M, Moulton S (2004) CodeBlue: an ad hoc sensor network infrastructure for emergency medical care. In: International workshop on wearable and implantable body sensor networksGoogle Scholar
  36. 36.
    Manber U, Myers G (1990) Suffix arrays: a new method for on-line string searches. In: SODA ’90: proceedings of the first annual ACM-SIAM symposium on discrete algorithms, society for industrial and applied mathematics. Philadelphia, pp 319–327Google Scholar
  37. 37.
    Marshall IW, Price MC, Li H, Boyd N, Boult S (2007) Multi-sensor cross correlation for alarm generation in a deployed sensor network. In: EuroSSC. Springer, pp 286–299Google Scholar
  38. 38.
    Norris JR (1997) Markov chains. Cambridge University PressGoogle Scholar
  39. 39.
    Opitz D, Maclin R (1999) Popular ensemble methods: an empirical study. J Artif Intell Res 11(169–198):12Google Scholar
  40. 40.
    Paek J, Chintalapudi K, Govindan R, Caffrey J, Masri S (2005) A wireless sensor network for structural health monitoring: performance and experience. In: EmNets ’05: proceedings of the 2nd IEEE workshop on embedded networked sensors. IEEE Computer Society, Washington, pp 1–9CrossRefGoogle Scholar
  41. 41.
    Papadogkonas D, Roussos G, Levene M (2006) Discovery and ranking of significant trails. In: Second international workshop on exploiting context histories in smart environments (ECHISE) at Ubicomp, p 8Google Scholar
  42. 42.
    Polastre J, Szewczyk R, Culler D (2005) Telos: enabling ultra-low power wireless research, pp 364–369Google Scholar
  43. 43.
    Salson M, Lecroq T, Léonard M, Mouchard L (2009) Dynamic extended suffix arrays. J Discret AlgorithmsGoogle Scholar
  44. 44.
    Shin M, Tsang P, Kotz D, Cornelius C (2009) DEAMON: energy-efficient sensor monitoring. In: Sensor, mesh and ad hoc communications and networks, 2009. SECON ’09. 6th Annual conference on IEEE communications society, pp 1–9Google Scholar
  45. 45.
    Steere DC, Baptista A, McNamee D, Pu C, Walpole J (2000) Research challenges in environmental observation and forecasting systems. In: MOBICOM, pp 292–299Google Scholar
  46. 46.
    Stiefmeier T, Roggen D, Tröster G (2007) Gestures are strings: efficient online gesture spotting and classification using string matching. In: BodyNets ’07: proceedings of the ICST 2nd international conference on body area networks, pp 1–8Google Scholar
  47. 47.
    Stoianov I, Nachman L, Madden S, Tokmouline T (2007) PIPENETa wireless sensor network for pipeline monitoring. In: IPSN ’07: proceedings of the 6th international conference on information processing in sensor networks, pp 264–273Google Scholar
  48. 48.
    Talzi I, Hasler A, Gruber S, Tschudin CF (2007) PermaSense: investigating permafrost with a WSN in the Swiss alps. In: EmNets. ACM, pp 8–12Google Scholar
  49. 49.
    Ukkonen E (1995) On-line construction of suffix trees. Algorithmica 14(3):249–260MathSciNetzbMATHCrossRefGoogle Scholar
  50. 50.
    Werner-Allen G, Lorincz K, Johnson J, Lees J, Welsh M (2006) Fidelity and yield in a volcano monitoring sensor network. In: OSDI, USENIX association, pp 381–396Google Scholar
  51. 51.
    Werner-Allen G, Dawson-Haggerty S, Welsh M (2008) Lance: optimizing high-resolution signal collection in wireless sensor networks. In: Proceedings of the 6th ACM conference on embedded network sensor systems, pp 169–182Google Scholar
  52. 52.
    Xue W, Luo Q, Chen L, Liu Y (2006) Contour map matching for event detection in sensor networks. In: SIGMOD ’06: proceedings of the 2006 ACM SIGMOD international conference on management of data, pp 145–156Google Scholar
  53. 53.
    Zoumboulakis M, Roussos G (2009a) Efficient pattern detection in extremely resource-constrained devices. In: Sixth annual IEEE communications society conference on sensor, mesh and ad hoc communications and networksGoogle Scholar
  54. 54.
    Zoumboulakis M, Roussos G (2009b) Estimation of pollutant-emitting point-sources using resource-constrained sensor networks. In: GSN ’09: proceedings of the 3rd international conference on geosensor networks, pp 21–30Google Scholar
  55. 55.
    Zoumboulakis M, Roussos G (2009c) In-network pattern detection on Intel WISPs. (Demo Abstract). In: Proceedings of wireless sensing showcaseGoogle Scholar
  56. 56.
    Zoumboulakis M, Roussos G (2009d) Integer-based optimisations for resource-constrained sensor platforms. In: First international ICST conference, S-CUBE 2009, pp 144–157Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.Birkbeck College, University of LondonLondonUK
  2. 2.Birkbeck College, University of LondonLondonUK

Personalised recommendations