O7-1 Configuring and managing a large-scale monitoring network Solving real world challenges for Ultra Low Powered and long-range wireless mesh networks
Maleysson, Laurent
- Dugas, Christophe
As formated for the printed proceedings - 66.ps
- 66.pdf
- pages 225-230
As delivered by the authors - 66_pdf_file.pdf
Abstract :
In creating wireless networking solutions suitable for deployment in harsh, unpredictable, and widespread environments, we were confronted with a series of problems as-yet unsolved by commercially available technologies. The purpose of this article is to describe how we addressed mission-critical customer requirements by developing a wireless technology explicitly for devices in Ultra Low Power (ULP) and Long-Range wireless mesh networks. The key end-points in our target implementation are battery-operated devices located in hard-to-reach places, but which are nonetheless expected to offer a lifespan of several years without human intervention.
We provide an overview of the technical requirements for building ULP networks, with a focus on configuration and management (including patent pending self-configuration and dynamic-routing features).
This is followed by a case study of an existing 25,000 node wireless network deployed for an automatic meter reading (AMR) solution, and examples of provisioning individual nodes in complex real-world networks. We also describe how transmitting information about existing network hierarchy to new nodes not only preserves overall battery life in other network nodes, but also simplifies installation efforts significantly. The technology described here is particularly applicable to metering, telemetry, remote monitoring, and large-scale data collection solutions, while straightforwardly suited for personal and property security, medical surveillance, access control, lighting systems, as well as numerous industrial sectors.
With a strong background in utility metering systems, Coronis Systems provides ready-to-use wireless solutions for manufacturers, VARs, and integrators in the automatic remote metering and wireless sensor network industries.
O7-2 Securing Anonymity in P2P Network
Kim, Byung Ryong
- Kim, Ki Chang
- Kim, Yoo Sung
As formated for the printed proceedings - 82.ps
- 82.pdf
- pages 231-234
As delivered by the authors - 82_pdf_file.pdf
Abstract :
Basically flooding-based P2P systems provide anonymity and thus it is not possible to find the initial sender of packet and the designated receiver of that packet. However it does not provide anonymity where the IP addresses of nodes uploading and downloading contents are revealed. So in order to maintain anonymity we propose and test our techniques that the receiver node of response packets on retrieval query is agent node and the agent node provides contents service between server and client. Through the proposed techniques it was found that the identity of node is secured without using encryption techniques which have been deployed in the former anonymity protection techniques and control data communications through all the nodes located between server and client. The application of this concept of which result was evaluated may be extended to many other current P2P systems under operation.
O7-3 Trove : a Physical Game Running on an Ad-Hoc Wireless Sensor Network
Mount, Sarah
- Gaura, Elena
- Newman, Robert M.
- Beresford, Alastair R.
- Dolan, Sam R.
- Allen, Michael
As formated for the printed proceedings - 85.ps
- 85.pdf
- pages 235-240
As delivered by the authors - 85_pdf_file.pdf
Abstract :
This paper describes Trove a physical game implemented on a wireless sensor network (WSN). Architecturally, the WSN is a decentralized system, exhibiting local node processing and information extraction, collaborative inter-node behaviour and local decision making capabilities. From the perspective of the players, Trove is a multi-player, real time, physical game. The user-centered narrative, configuration and game play of Trove are presented as well as its design and implementation.
Trove will be used at Coventry University as a pedagogical aid in under- and postgraduate modules which incorporate concepts from pervasive computing and sensor networks; and also for the dissemination of research work to members of the public. Although educational through its use, the work presented here concerns, from a technical viewpoint, the very specifics of physical WSN design, implementation and deployment and forms a good basis for further proof of concept experimentation within the domain.
|
|