Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards

Published on May 1, 2007in Computer Communications3.167
路 DOI :10.1016/J.COMCOM.2006.12.020
Paolo Baronti4
Estimated H-index: 4
(University of Bradford),
Prashant Pillai13
Estimated H-index: 13
(University of Bradford)
+ 3 AuthorsY. Fun Hu2
Estimated H-index: 2
(University of Bradford)
Sources
Abstract
Wireless sensor networks are an emerging technology for low-cost, unattended monitoring of a wide range of environments. Their importance has been enforced by the recent delivery of the IEEE 802.15.4 standard for the physical and MAC layers and the forthcoming ZigBee standard for the network and application layers. The fast progress of research on energy efficiency, networking, data management and security in wireless sensor networks, and the need to compare with the solutions adopted in the standards motivates the need for a survey on this field.
Figures & Tables
Download
馃摉 Papers frequently viewed together
2000MOBICOM: ACM/IEEE International Conference on Mobile Computing and Networking
2000
References131
Newest
Nov 6, 2006 in CIKM (Conference on Information and Knowledge Management)
#1Mohamed Aly (University of Pittsburgh)H-Index: 5
#2Kirk Pruhs (University of Pittsburgh)H-Index: 38
Last. Panos K. Chrysanthis (University of Pittsburgh)H-Index: 29
view all 3 authors...
We propose an In-Network Data-Centric Storage (INDCS) scheme for answering ad-hoc queries in sensor networks. Previously proposed In-Network Storage (INS) schemes suffered from Storage Hot-Spots that are formed if either the sensors' locations are not uniformly distributed over the coverage area, or the distribution of sensor readings is not uniform over the range of possible reading values. Our K-D tree based Data-Centric Storage (KDDCS) scheme maintains the invariant that the storage of events...
Source
#1Qing Cao (UIUC: University of Illinois at Urbana鈥揅hampaign)H-Index: 30
#2Tarek Abdelzaher (UIUC: University of Illinois at Urbana鈥揅hampaign)H-Index: 94
In this article, we present logical coordinates based routing (LCR), a novel framework for scalable and location-independent routing in wireless sensor networks. LCR assigns each node a logical coordinate vector, and routes packets following these vectors. We demonstrate that LCR (i) guarantees packet delivery with a high probability, (ii) finds good paths, and (iii) exhibits robust performance in the presence of network voids and node failures. We systematically evaluate the performance of LCR ...
Source
#1Giuseppe AmatoH-Index: 23
#2Paolo BarontiH-Index: 4
Last. Valentina Masi (Istituto di Scienza e Tecnologie dell'Informazione)H-Index: 1
view all 4 authors...
Sensor network software is still in its youth. Due to sensor hardware limitations and the highly specific nature of application domains, existing software is generally poorly structured. We identify data collection, intra-sensor and inter-sensor communication as recurring activities in sensor network applications and propose a software module that abstracts these activities: the stream system. Applications running on the sensors rely on the stream system to disregard the actual implementation de...
Source
#1Tae Hyun Kim (SNU: Seoul National University)H-Index: 32
#2Sunghyun Choi (SNU: Seoul National University)H-Index: 56
IEEE 802.15.4 slotted carrier-sense multiple access with collision avoidance (CSMA-CA) adopts periodic sleeping for energy efficiency support. However, such a periodic sleeping mechanism, especially with contention-based medium access, tends to cause additional sleep delay due to heavy contention. In this letter, we propose a priority-based scheme, comprising frame tailoring and priority toning, in order to relax such a problematic delay and guarantee time-bounded delivery of high priority packe...
Source
Different ways to simultaneously control event sensing reliability and device utilization in a beacon-enabled IEEE 802.15.4 sensor cluster are investigated. Activity management is achieved through probabilistic control of the duration of active and inactive (i.e., service and sleep) periods. The probabilistic control parameters are derived as functions of the required event sensing reliability, device utilization, medium access control and physical layer parameters, and network size
Source
#1Ben Leong (MIT: Massachusetts Institute of Technology)H-Index: 20
#2Barbara Liskov (MIT: Massachusetts Institute of Technology)H-Index: 81
Last. Robert Morris (MIT: Massachusetts Institute of Technology)H-Index: 81
view all 3 authors...
We present a new geographic routing algorithm, Greedy Distributed Spanning Tree Routing (GDSTR), that finds shorter routes and generates less maintenance traffic than previous algorithms. While geographic routing potentially scales well, it faces the problem of what to do at local dead ends where greedy forwarding fails. Existing geographic routing algorithms handle dead ends by planarizing the node connectivity graph and then using the right-hand rule to route around the resulting faces. GDSTR ...
#1Shashi PhohaH-Index: 18
#2Thomas La PortaH-Index: 33
Last. Christopher GriffinH-Index: 17
view all 3 authors...
PREFACE. CONTRIBUTORS. I SENSOR NETWORK OPERATIONS OVERVIEW. 1 Overview of Mission-Oriented Sensor Networks. 1.1 Introduction. 1.2 Trends in Sensor Development. 1.3 Mission-Oriented Sensor Networks: Dynamic Systems Perspective. References. II SENSOR NETWORK DESIGN AND OPERATIONS. 2 Sensor Deployment, Self-Organization, and Localization. 2.1 Introduction. 2.2 SCARE: A Scalable Self-Configuration and Adaptive Reconfiguration Scheme for Dense Sensor Networks. 2.3 Robust Sensor Positioning in Wirele...
Source
#1Anis KoubaaH-Index: 29
#2M谩rio AlvesH-Index: 29
Last. Eduardo TovarH-Index: 33
view all 3 authors...
The IEEE 802.15.4 protocol proposes a flexible communication solution for low-rate wireless personal area networks including sensor networks. It presents the advantage to fit different requirements of potential applications by adequately setting its parameters. When enabling its beacon mode, the protocol makes possible real-time guarantees by using its guaranteed time slot (GTS) mechanism. This paper analyses the performance of the GTS allocation mechanism in IEEE 802.15.4. The analysis gives a ...
Source
#1Tony Sun (UCLA: University of California, Los Angeles)H-Index: 19
#2Ling-Jyh ChenH-Index: 25
Last. Mario Gerla (UCLA: University of California, Los Angeles)H-Index: 121
view all 5 authors...
IEEE 802.15.4 is an emerging wireless standard addressing the needs of low-rate wireless personal area networks with a focus on enabling various pervasive and ubiquitous applications that require interactions with our surrounding environments. In view of the application potential of IEEE 802.15.4, knowing the fundamental network properties soon becomes essential in fasten the interactivity between these devices. Among all, knowing effective capacity of a path in wireless networks is of particula...
Source
The performance of an IEEE 802.15.4 compliant network operating in the beacon enabled mode with both downlink and uplink traffic is analyzed through discrete time Markov chains and the theory of M/G/1 queues. The model considers acknowledged transmissions and includes the impact of different network and traffic parameters such as the packet arrival rate, packet size, inactive period between the beacons, and the number of stations. We investigate the nonsaturation region and outline the condition...
Source
Cited By1225
Newest
#2Bhupesh GuptaH-Index: 2
Source
Source
Source
#2Juan F. De PazH-Index: 24
Last. Javier BajoH-Index: 2
view all 4 authors...
Source
#1Francisco Velasco (UCO: University of C贸rdoba (Spain))H-Index: 19
#2JM Jose Palomares (UCO: University of C贸rdoba (Spain))H-Index: 12
Last. Joaqu铆n Olivares (UCO: University of C贸rdoba (Spain))H-Index: 9
view all 3 authors...
Abstract null null Wireless Sensor Networks (WSN) consist of devices with limited resources to explore and sense the environment in a cooperative way. Security, mainly in terms of guaranteeing the data integrity, is a primary issue for many applications, but with an extra energy cost. Thus, trade-off is required between security level and energy consumption in real applications. First of all, a brief survey about security methods, focusing in data integrity, in WSN is implemented. The objective ...
Source
India's irrigation system has given economic growth a high priority. Many innovative concepts are being explored to enhance and achieve their full potential for agricultural automation. We should not only analyse the impact of establishing a new single technology but examine broader challenges for entire systems development and also monitoring conditions for plants utilising the Internet of things to take full benefit of these technologies (IOT). The microcontroller crop management聽project is me...
Owing to the specific characteristics of Unmanned Aerial Vehicles (UAVs), the demands and applications increase dramatically for them being deployed in confined or closed space for surveying, inspection or detection to substitute human. However, Global Positioning System (GPS) may lose effectiveness or become unavailable due to the potential signal block or interference in that operational environment. Under such circumstances, an imperative requirement on new positioning technology for UAV has ...
Source
#2Masoud Sabaei (AUT: Amirkabir University of Technology)H-Index: 11
Source
#2Rushikesh Battulwar (UNR: University of Nevada, Reno)H-Index: 2
Last. Javad Sattarvand (UNR: University of Nevada, Reno)H-Index: 9
view all 4 authors...
In the last decade, new developments took place in the area of indoor positioning (or localization). Since the Global Navigation Satellite System (GNSS) cannot be used in underground mines, other technologies are needed for localization. Positioning and communication options today primarily include Wi-Fi, Bluetooth Low Energy (BLE), Ultra-Wideband (UWB), Radio Frequency Identification Device (RFID), etc. Smartphones and tablets currently have an array of sensors and radios, which can provide val...
Source
#1Scott Fazackerley (UBC: University of British Columbia)H-Index: 5
#2Craig Nichol (UBC: University of British Columbia)H-Index: 11
Last. Ramon Lawrence (UBC: University of British Columbia)H-Index: 14
view all 3 authors...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.