Lecture 1: Introduction To CS-541 and Wireless Sensor Networks
Lecture 1: Introduction To CS-541 and Wireless Sensor Networks
• CS-541 Overview
Data acquisition,
Programming
Distributed Signal
Simulation and
Processing and
Data Analysis
Machine Learning
Learning Outcomes
Practical Information
All above are compulsory for getting a grade at the end of the exam
Bibliography:
http://www.csd.uoc.gr/~hy541
Objectives:
• determine the response of the structure to
both ambient and extreme conditions WSN:
• compare actual performance to design
predictions 64 wireless sensor nodes
• measure ambient structural accelerations Synchronous monitoring of ambient
from wind load
vibrations
• measure strong shaking from a potential 1 KHz rate, ≤10μs jitter, accuracy=30μg,
earthquake
over a 46-hop network
• the installation and the monitoring was
conducted without the disruption of the
bridge's operation
https://www.youtube.com/watch?v=c-Ekz2kK7J4
Data
App.
Browser
Data
IDTechX:
The WSN market will grow to $1.8
billion in 2024
“Wireless Sensor Networks will
eventually enable the automatic
monitoring of forest fires, avalanches, By 2016: 24 million wireless-enabled sensing
hurricanes, failure of country wide utility points. Source: On World Survey 2012
equipment, traffic, hospitals and much
more over wide areas, something
previously impossible.”
CS-541 Wireless Sensor Networks
Spring Semester 2017-2018 22
University of Crete, Computer Science Department
Introduction Memory
/storage
(data acquisition, and
preprocessing, buffers
handling)
Support Vector
Machines
Regression Models
K-means
Spectral Clustering
Association rules
Distance learning
General purpose design (many applications) Serving a single application or a bouquet of applications
Devices and networks operate in controlled / mild Unattended, harsh conditions & hostile environments
environments (or over an appropriate infrastructure)
Easily accessible Physical access is difficult / undesirable
Global knowledge is feasible and centralized management is Localized decisions – no support by central entity
possible
Energy Networking
• Data are vulnerable (over RF) and critical (e.g. Data • Sensing coverage – how to optimally place the
smart-grid data) Security sensor nodes?
• Data are private (e.g. biometrics, your location)
Manipulation
• Computational complexity & storage capacity
• Computational complexity is poor and are limited
conventional cryptography algorithms • How to cope with noisy and faulty
(@computer networks) will not work measurements?
• WSN nodes are remote and exposed in the • Reduce dummy transmissions – increase the
environment – physical tampering intelligence of the nodes -> Decentralized data
• intrusion detection / node compromise by models (different layers of data abstraction)
attacker, encryption, key establishment and • How to combine heterogeneous, unstructured
distribution, node authentication, and secrecy. data to derive context (e.g. location)
WSN key challenges
CS-541 Wireless Sensor Networks
Spring Semester 2017-2018 35
University of Crete, Computer Science Department
Introduction
• Self-organization -> Clustering?
• Re-Selection of optimal routes w.r.t to different
• Energy is limited
metrics and environmental changes (and
• Affects the lifetime of the WSN and the quality of application demands)
sensing (analog sensors) • Energy conservative (TX is the most power
• Computation – Communication – Consumption hungry element)
Nexus • Cross-layer design – networking needs to
• Compromises its application objectives couple to sensing purposes
• How to cope with delays and packet losses?
• Recharging Batteries, Energy Harvesting OR Node
• Limited range
Discarding? • Hoe to cope with interference from “stronger”
• Dynamic topologies – even when nodes are networks?
static • How to retain QoS in RF harsh environments?
Energy Networking
Programming Paradigms
Middleware Solutions
Testing, Simulation and
emulation on realistic
conditions!
• Data are vulnerable (over RF) and critical (e.g. Data • Sensing coverage – how to optimally place the
smart-grid data) Security sensor nodes?
• Data are private (e.g. biometrics, your location)
Manipulation
• Computational complexity & storage capacity
• Computational complexity is poor and are limited
conventional cryptography algorithms • How to cope with noisy and faulty
(@computer networks) will not work measurements?
• WSN nodes are remote and exposed in the • Reduce dummy transmissions – increase the
environment – physical tampering intelligence of the nodes -> Decentralized data
• intrusion detection / node compromise by models (different layers of data abstraction)
attacker, encryption, key establishment and • How to combine heterogeneous, unstructured
distribution, node authentication, and secrecy. data to derive context (e.g. location)
WSN key challenges
CS-541 Wireless Sensor Networks
Spring Semester 2017-2018 36
University of Crete, Computer Science Department
In this course we will cover aspects
Introduction related to Energy, Networking and
Data Manipulation
• Self-organization -> Clustering?
• Re-Selection of optimal routes w.r.t to different
• Energy is limited
metrics and environmental changes (and
• Affects the lifetime of the WSN and the quality of application demands)
sensing (analog sensors) • Energy conservative (TX is the most power
• Computation – Communication – Consumption hungry element)
Nexus • Cross-layer design – networking needs to
• Compromises its application objectives couple to sensing purposes
• How to cope with delays and packet losses?
• Recharging Batteries, Energy Harvesting OR Node
• Limited range
Discarding? • Hoe to cope with interference from “stronger”
• Dynamic topologies – even when nodes are networks?
static • How to retain QoS in RF harsh environments?
Energy Networking
Programming Paradigms
Middleware Solutions
Testing, Simulation and
emulation on realistic
conditions!
• Data are vulnerable (over RF) and critical (e.g. Data • Sensing coverage – how to optimally place the
smart-grid data) Security sensor nodes?
• Data are private (e.g. biometrics, your location)
Manipulation
• Computational complexity & storage capacity
• Computational complexity is poor and are limited
conventional cryptography algorithms • How to cope with noisy and faulty
(@computer networks) will not work measurements?
• WSN nodes are remote and exposed in the • Reduce dummy transmissions – increase the
environment – physical tampering intelligence of the nodes -> Decentralized data
• intrusion detection / node compromise by models (different layers of data abstraction)
attacker, encryption, key establishment and • How to combine heterogeneous, unstructured
distribution, node authentication, and secrecy. data to derive context (e.g. location)
WSN Challenges
CS-541 Wireless Sensor Networks
Spring Semester 2017-2018 37
University of Crete, Computer Science Department
References and Material for Reading
SmartSantander: http://www.smartsantander.eu/
Patel, S. et al. “Monitoring Motor Fluctuations in Patients With Parkinson's Disease Using
Wearable Sensors.” Information Technology in Biomedicine, IEEE Transactions on 13.6 (2009):
864-873
Pattrick Wetterwald, “Internet Of Things: 10 years later. Facts and Vision”, IEEE WF-IoT, 2015