Communication Protocols and Middleware Algorithms for Wireless Sensor Networks - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

Communication Protocols and Middleware Algorithms for Wireless Sensor Networks

Description:

Communication Protocols and Middleware Algorithms for Wireless Sensor Networks David S. L. Wei Outline Motivation and applications Types of sensors Network structure ... – PowerPoint PPT presentation

Number of Views:172
Avg rating:3.0/5.0
Slides: 11
Provided by: edut1550
Category:

less

Transcript and Presenter's Notes

Title: Communication Protocols and Middleware Algorithms for Wireless Sensor Networks


1
Communication Protocols and Middleware Algorithms
for Wireless Sensor Networks
  • David S. L. Wei

2
Outline
  • Motivation and applications
  • Types of sensors
  • Network structure
  • MAC protocols Wi-Fi, Bluetooth, and
    802.15.4
  • Network-Layer protocols Routing and
    Topology Control
  • Base station positioning and sensor placement
  • Security in wireless sensor networks

3
Applications
  • range from civilian life to national security
  • health care
  • traffic control
  • industrial automation
  • environmental monitoring
  • chemical and biological attack detection
  • military sensing
  • among many others

4
Types of Sensors
  • video/infrared camera
  • gas/smog detector
  • seismic wave sensor
  • acoustic wave sensor
  • chemical- and bioassays
  • among others

5
Network Architecture
  • Single-node architecture
  • Network architecture

6
MAC Protocols
  • CSMA/CA
  • 802.11
  • 802.15.4
  • Frequency Hopping
  • Bluetooth/802.15

7
Routing and Topology Control
  • Routing algorithms power-efficient routing,
    power-aware routing, security-aware routing,
    among others.
  • Topology control algorithms see slides of
    another lecture.

8
Base station positioning and sensor placement
  • Coverage problem answers the questions about QoS
    of surveillance WSNs. Sensor placement determines
    the quality of solutions. Finding optimal
    solution turns out to be NP-complete.
  • Base Station Positioning Finding the optimum
    layout of base stations is also NP-complete.

9
Security in WSNs
  • public-key encryption (e.g. RSA)
  • vs
  • symmetric-key encryption (e.g. AES)


10
  • Thank you!
  • The speaker can be reached at d.wei_at_cm.nctu.edu.tw
  • or
  • via skype id dslwei
Write a Comment
User Comments (0)
About PowerShow.com