Toward Integrated Real-World Sensing Environment — Applications and Challenges
Abstract
Growing popularity of wireless sensor network (WSN) applications and machine-to-machine (M2M) communication has recently led to emergence of a new class of network traffic. The communication between things introduces network traffic characteristics very different from traditional human-centric communication. As more WSN and M2M services are expected to use mobile network as a backhaul, it is important to understand the impact that their traffic will have on the radio access network. WCDMA radio access networks are dimensioned using traffic models containing traffic characteristics for a number of services offered by the operators and their networks today. In this chapter, the potential capacity impact of several selected sensor-based applications on the WCDMA radio access network, both dedicated and common channels, is presented. The results thus far have shown that currently 3G mobile networks can successfully cope with the new WSN traffic. With the increase of WSN traffic, optimizations of protocols and solutions will be required and radio bearer mapping can be a deciding factor in determining the size of the radio access network and the required resources.
Keywords
Wireless Sensor Network Mobile Network User Equipment Radio Access Network Traffic ClassReferences
- 1.3rd Generation Partnership Project (3GPP). Services and service capabilities. Technical Standard TS 22.105, R99, 3rd Generation Partnership Project (3GPP) Mobile Competence Centre, Sophia Antipolis, France, 1999.Google Scholar
- 2.K. Aberer, M. Hauswirth, and A. Salehi. Infrastructure for data processing in large-scale interconnected sensor networks. In: Mobile Data Management, 2007 International Conference, pages 198–205, Mannheim, Germany, May 2007.Google Scholar
- 3.K. Aberer, M. Hauswirth, and A. Salehi. A middleware for fast and flexible sensor network deployment. In: VLDB ’06: Proceedings of the 32nd International Conference on Very Large Data Bases, pages 1199–1202, Seoul, Korea, 2006.Google Scholar
- 4.D. Alberts, J. Garstka, R. Hayes, and D. Signori. Understanding Information Age Warfare, 2nd edition. CCRP Publication Services, Washington, USA, 2001.Google Scholar
- 5.D. Alberts, J. Garstka, and F. Stein. Network Centric Warfare: Developing and Leveraging Information Superiority, 2nd edition. CCRP Publication Services, Washington, USA, 1999.Google Scholar
- 6.Apple Inc. Nike + ipod: Meet your new personal trainer. online.Google Scholar
- 7.S. Baydere, E. Cayirci, I. Hacioglu, O. Ergin, A. Olero, I. Maza, A. Viguria, and P. Bonnety. Applications and application scenarios. Project Deliverable IST-004400, Embedded WiSeNts Consortium, IPVS, Distributed Systems Group, Universitat Stuttgart, Universitatsstr. 38, D-70569 Stuttgart, Germany, February 2006.Google Scholar
- 8.D. E. Bell. Looking back at the bell-la padula model. In: Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, AZ, USA, 2005.Google Scholar
- 9.J. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, and M. B. Srivastava. Participatory sensing. In: Proceedings of the World Sensor Web Workshop, ACM Sensys 2006, Boulder, CO, USA, 2006.Google Scholar
- 10.L. Compagna, V. Lotz, and K. Wrona. Towards adaptive security for ubiquitous computing systems: Mosquito and serenity. In Muhlhauser M., Gurevych I., editors. Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises. Idea Group Publishing, Hershey, USA, 2008.Google Scholar
- 11.T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel. A survey of lightweight-cryptography implementations. IEEE Design and Test of Computers, 24(6):522–533, 2007.CrossRefGoogle Scholar
- 12.Ericsson. Vision 2020—50 billion connected devices. online.Google Scholar
- 13.A. Gluhak, M. Bauer, F. Montagut, V. Stirbu, M. Johansson, J. B. Vercher, and M. Presser. Towards an architecture for a real world internet. In: Proceedings of the Autonomous and Spontaneous Networks Symposium, Telecom ParisTech, Paris, 2008.Google Scholar
- 14.J. Goldman, K. Shilton, J. Burke, D. Estrin, M. Hansen, N. Ramanathan, S. Reddy, V. Samanta, M. Srivastava, and R. West. Participatory sensing: A citizen-powered approach to illuminating the patterns that shape our world. Technical report, UCLA’s Center for Embedded Networked Sensing (CENS), Los Angeles, CA, USA, May 2009.Google Scholar
- 15.W. I. Grosky, A. Kansal, S. Nath, J. Liu, and F. Zhao. Senseweb: An infrastructure for shared sensing. Multimedia, IEEE, 14(4):8–13, October–December 2007.CrossRefGoogle Scholar
- 16.M. Hefeeda and M. Bagheri. Wireless sensor networks for early detection of forest fires. In: Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems, pages 1–6, Los Alamitos, CA, USA, 2007.Google Scholar
- 17.C. Huddlestone-Holmes, G. Gigan, G. Woods, A. Ruxton, I. Atkinson, and S. Kininmonth. Infrastructure for a sensor network on davies reef, great barrier reef. In: Proceedings of the 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (ISSNIP), pages 675–679, Melbourne, Australia, 2007.Google Scholar
- 18.R. S. H. Istepanian, S. Laxminarayan, and C. S. Pattichis, editors. Mhealth: Emerging mobile health systems. Topics in Biomedical Engineering Series Topics in Biomedical Engineering International Book Series. Springer, New York, USA, 2006.Google Scholar
- 19.M. Kim, Y. J. Lee, and J. Ryou. What are possible security threats in ubiquitous sensor network environment? In: Managing Next Generation Networks and Services—Proceedings of the APNOMS 2007, volume 4773 of LNCS, Sapporo, Japan, pages 437–446, 2007.Google Scholar
- 20.M. Klopfer and I. Simonis, editors. SANY: An open service architecture for sensor networks. SANY Consortium, 2009.Google Scholar
- 21.S. Krco. Health care sensor networks—architecture and protocols. Journal on Ad Hoc and Sensor Wireless Networks, 1, January 2005.Google Scholar
- 22.S. Krco and V. Delic. Personal wireless sensor network for mobile health care monitoring. In: Proceedings of the 6th International IEEE Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service (TELSIKS), Serbia and Motenegro, October 2003.Google Scholar
- 23.S. Krco, M. Johansson, and V. Tsiatsis. A commonsense approach to realworld global sensing. In: Proceedings of the SenseID: Workshop on Convergence of RFID and Wireless Sensor Networks and their Applications, ACMSenSys 2007, Sydney, Australia, 2007.Google Scholar
- 24.M. Kuorilehto, M. Hännikäinen, and T. D. Hämäläinen. A survey of application distribution in wireless sensor networks. EURASIP Journal of Wireless Communication Network, 2005(5):774–788, 2005.MATHCrossRefGoogle Scholar
- 25.M. A. Laguna, J. Finat, and J. A. Gonzalez. Mobile health monitoring and smart sensors: A product line approach. In: Proceedings of the Euro American Conference on Telematics and Information Systems: New Opportunities to Increase Digital Citizenship, Prague, Czech Republic, 2009.Google Scholar
- 26.D. Liu, P. Ning. Security for Wireless Sensor Networks. Springer, Heidelberg, 2007.Google Scholar
- 27.P. J. Marron and D. Minder. Embedded WiSeNts Consortium. Embedded wisents research roadmap. Project Deliverable IST-004400 D3.3, Embedded WiSeNts Consortium, IPVS, Distributed Systems Group, Universitat Stuttgart, Universitatsstr. 38, D-70569 Stuttgart, Germany, November 2006.Google Scholar
- 28.T. Melodia, D. Pompili, and I. F. Akyildiz. A communication architecture for mobile wireless sensor and actor networks. In: Proceedings of the 3rd Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Reston, VA, USA, 2006.Google Scholar
- 29.W. M. Merrill, L. Girod, B. Schiffer, D. McIntire, G. Rava, K. Sohrabi, F. Newberg, J. Elson, and W. Kaiser. Dynamic networking and smart sensing enable next-generation landmines. IEEE Pervasive Computing, 3:84–90, 2004.CrossRefGoogle Scholar
- 30.S. Murthy. Data communication with remote sensors using reflex narrowband pcs technology. Final Project Report ITS-IDEA Project 74, Transportation Research Board, 500 Fifth Street, NW, Washington, DC, USA, 2001.Google Scholar
- 31.A. Pinto, L. P. Carloni, and A. L. Sangiovanni-Vincentelli. A communication synthesis infrastructure for heterogeneous networked control systems and its application to building automation and control. In: Proceedings of the 7th ACM and IEEE International Conference on Embedded Software (EMSOFT), Salzburg, Austria, 2007.Google Scholar
- 32.G. Roladerr. Self healing (antitank) minefield (shm) saic team program. In: Proceedings of the 2002 Mines, Demolition and Non-Lethal Conference & Exhibition, Ft. Belvoir, VA, USA, 2002.Google Scholar
- 33.K. Schleidt and D. Havlik. Sensorweb-based prototype for air quality reporting systems. ERCIM News, (79):48–49, October 2009.Google Scholar
- 34.P. Shankar. Designing an inter-vehicular network stack for car-to-car communication. In: Proceedings of the Rutgers-Helsinki Ph.D. Student Workshop on Spontaneous Networking, Piscataway, NJ, USA, 2006.Google Scholar
- 35.J. Shneidman, P. Pietzuch, J. Ledlie, M. Roussopoulos, M. Seltzer, and M. Welsh. Hourglass: An infrastructure for connecting sensor networks and applications. Technical Report Technical Report TR-21-04, Harvard University, Cambridge, Massachusetts, 2004.Google Scholar
- 36.A. Sorniotti, L. Gomez, K. Wrona, and L. Odorico. Secure and trusted in-network data processing in wireless sensor networks: A survey. International Journal of Information Assurance and Security, 2(4):189–199, 2007.Google Scholar
- 37.M. Srivastava, M. Hansen, J. Burke, A. Parker, S. Reddy, G. Saurabh, M. Allman, V. Paxson, and D. Estrin. Wireless urban sensing systems. Technical Report Technical Report 65, UCLA’s Center for Embedded Networked Sensing Systems (CENS), Los Angeles, CA, USA, April 2006.Google Scholar
- 38.A. Nayak and I. Stojmenovic. Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication. Wiley, Hoboken, NJ, USA, 2010.Google Scholar
- 39.V. Sundararajan, A. Redfern, M. Schneider, P. Wright, and J. Evans. Wireless sensor networks for machinery monitoring. In: Proceedings of the 2005 ASME International Mechanical Engineering Congress and Exposition, Orlando, FL, USA, 2005.Google Scholar
- 40.O. Tekdas, J. H. Lim, A. Terzis, and V. Isler. Using mobile robots to harvest data from sensor fields. IEEE Wireless Communications, 16(1):22–28, 2009.CrossRefGoogle Scholar
- 41.T. Datagate Inc. Interactive link data diode device. Common Criteria Security Target Doc. No. 9162P01000001, Issue No. 5.1, National Information Assurance Partnership (NIAP), Vrginia, VA, USA, 2005.Google Scholar
- 42.G. Tselentis, J. Domingue, A. Galis, A. Gavras, D. Hausheer, S. Krco, V. Lotz, and T. Zahariadis. Towards the Future Internet—A European Research Perspective. IOS Press, Amsterdam, The Netherlands, 2009.Google Scholar
- 43.U. Varshney. Pervasive healthcare and wireless health monitoring. Journal of Mobile Networks and Applications, 12(2–3), June 2007.Google Scholar
- 44.Vital Wave Consulting. mhealth for development: The opportunity of mobile technology for healthcare in the developing world. Technical report, United Nations Foundation and Vodafone Foundation Technology Partnership, New York, NY, USA, 2009.Google Scholar
- 45.P. Volgyesi, G. Balogh, A. Nadas, C. B. Nash, and A. Ledeczi. Shooter localization and weapon classification with soldier-wearable networked sensors. In: Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys), San Juan, Puerto Rico, 2007.Google Scholar
- 46.M. Weiser. The computer for the twenty-first century. Scientific American, 265(3):94–104, 1991.CrossRefGoogle Scholar
- 47.M. Winkler, K.-D. Tuchs, K. Hughes, and G. Barclay. Theoretical and practical aspects of military wireless sensor networks. In: Proceedings of the Military Communications and Information Systems Conference, Bonn, Germany, 2007.Google Scholar