Hejiu ZHANG Ningmei YU Nan LYU Keren LI
This letter presents a 12-bit column-parallel hybrid two-step successive approximation register/single-slope analog-to-digital converter (SAR/SS ADC) for CMOS image sensor (CIS). For achieving a high conversion speed, a simple SAR ADC is used in upper 6-bit conversion and a conventional SS ADC is used in lower 6-bit conversion. To reduce the power consumption, a comparator is shared in each column, and a 6-bit ramp generator is shared by all columns. This ADC is designed in SMIC 0.18µm CMOS process. At a clock frequency of 22.7MHz, the conversion time is 3.2µs. The ADC has a DNL of -0.31/+0.38LSB and an INL of -0.86/+0.8LSB. The power consumption of each column ADC is 89µW and the ramp generator is 763µW.
Chun-Hao LIAO Makoto SUZUKI Hiroyuki MORIKAWA
Concurrent transmission (CT) is a revolutionary multi-hop protocol that significantly improves the MAC- and network-layer efficiency by allowing synchronized packet collisions. Although its superiority has been empirically verified, there is still a lack of studies on how the receiver survives such packet collisions, particularly in the presence of the carrier frequency offsets (CFO) between the transmitters. This work rectifies this omission by providing a comprehensive evaluation of the physical-layer receiver performance under CT, and a theoretical analysis on the fading duration of the beating effect resulting from the CFO. The main findings from our evaluations are the following points. (1) Beating significantly affects the receiver performance, and an error correcting mechanism is needed to combat the beating. (2) In IEEE 802.15.4 systems, the direct sequence spread spectrum (DSSS) plays such a role in combatting the beating. (3) However, due to the limited length of DSSS, the receiver still suffers from the beating if the fading duration is too long. (4) On the other hand, the basic M-ary FSK mode of IEEE 802.15.4g is vulnerable to CT due to the lack of error correcting mechanism. In view of the importance of the fading duration, we further theoretically derive the closed form of the average fading duration (AFD) of the beating under CT in terms of the transmitter number and the standard deviation of the CFO. Moreover, we prove that the receiver performance can be improved by having higher CFO deviations between the transmitters due to the shorter AFD. Finally, we estimate the AFD in the real system by actually measuring the CFO of a large number of sensor nodes.
Sungbok LEE Jaehyun PARK Jonghyeok LEE
In this paper, we consider wireless powered sensor networks. In these networks, the energy access point (EAP) transmits the energy packets to the sensor nodes and then, the sensor nodes send their sensing data to the information access point (IAP) by exploiting the harvested energy. Because the sensor nodes have a limited information queue (data storage) and energy queue (battery), energy packet/data packet scheduling is important. Accordingly, to reduce the total energy required to support the associated sensor network and simultaneously avoid sensing data loss, the energy packet/data packet transmission periods are jointly optimized. Furthermore, analyses identify the optimal location of EAP which will yield energy-efficient wireless powered sensor networks. Through the computer simulations, the performance of the proposed packet scheduling and deployment policy is demonstrated.
Wireless Sensor Networks (WSNs) are randomly deployed in a hostile environment and left unattended. These networks are composed of small auto mouse sensor devices which can monitor target information and send it to the Base Station (BS) for action. The sensor nodes can easily be compromised by an adversary and the compromised nodes can be used to inject false vote or false report attacks. To counter these two kinds of attacks, the Probabilistic Voting-based Filtering Scheme (PVFS) was proposed by Li and Wu, which consists of three phases; 1) Key Initialization and assignment, 2) Report generation, and 3) En-route filtering. This scheme can be a successful countermeasure against these attacks, however, when one or more nodes are compromised, the re-distribution of keys is not handled. Therefore, after a sensor node or Cluster Head (CH) is compromised, the detection power and effectiveness of PVFS is reduced. This also results in adverse effects on the sensor network's lifetime. In this paper, we propose a Fuzzy Rule-based Key Redistribution Method (FRKM) to address the limitations of the PVFS. The experimental results confirm the effectiveness of the proposed method by improving the detection power by up to 13.75% when the key-redistribution period is not fixed. Moreover, the proposed method achieves an energy improvement of up to 9.2% over PVFS.
Katsumi SASAKI Naoki HONMA Takeshi NAKAYAMA Shoichi IIZUKA
This paper presents the Received-Signal-Strength-Indicator (RSSI) based living-body radar, which uses only a single RF front-end and a few parasitic antennas. This radar measures the RSSI variation at the single active antenna while varying the terminations of the parasitic antennas. The propagation channel is estimated from just the temporal transition of RSSI; our proposal reconstructs the phase information of the signal. In this paper, we aim to estimate the direction of living-body. Experiments are carried out and it is found that most angular errors are within the limit of the angular width of the living-body.
Ryouichi NISHIMURA Seigo ENOMOTO Hiroaki KATO
Surveillance with multiple cameras and microphones is promising to trace activities of suspicious persons for security purposes. When these sensors are connected to the Internet, they might also jeopardize innocent people's privacy because, as a result of human error, signals from sensors might allow eavesdropping by malicious persons. This paper presents a proposal for exploiting super-resolution to address this problem. Super-resolution is a signal processing technique by which a high-resolution version of a signal can be reproduced from a low-resolution version of the same signal source. Because of this property, an intelligible speech signal is reconstructed from multiple sensor signals, each of which is completely unintelligible because of its sufficiently low sampling rate. A method based on Bayesian linear regression is proposed in comparison with one based on maximum likelihood. Computer simulations using a simple sinusoidal input demonstrate that the methods restore the original signal from those which are actually measured. Moreover, results show that the method based on Bayesian linear regression is more robust than maximum likelihood under various microphone configurations in noisy environments and that this advantage is remarkable when the number of microphones enrolled in the process is as small as the minimum required. Finally, listening tests using speech signals confirmed that mean opinion score (MOS) of the reconstructed signal reach 3, while those of the original signal captured at each single microphone are almost 1.
Qiang GAO Wenping MA Wei LUO Feifei ZHAO
Key predistribution schemes (KPSs) have played an important role in security of wireless sensor networks (WSNs). Due to comprehensive and simple structures, various types of combinatorial designs are used to construct KPSs. In general, compared to random KPSs, combinatorial KPSs have higher local connectivity but lower resilience against a node capture attack. In this paper, we apply two methods based on hash chains on KPSs based on transversal designs (TDs) to improve the resilience and the expressions for the metrics of the resulting schemes are derived.
Masayuki KINOSHITA Takaya YAMAZATO Hiraku OKADA Toshiaki FUJII Shintaro ARAI Tomohiro YENDO Koji KAMAKURA
Image sensor communication (ISC), derived from visible light communication (VLC) is an attractive solution for outdoor mobile environments, particularly for intelligent transport systems (ITS). In ITS-ISC, tracking a transmitter in the image plane is critical issue since vehicle vibrations make it difficult to selsct the correct pixels for data reception. Our goal in this study is to develop a precise tracking method. To accomplish this, vehicle vibration modeling and its parameters estimation, i.e., represetative frequencies and their amplitudes for inherent vehicle vibration, and the variance of the Gaussian random process represnting road surface irregularity, are required. In this paper, we measured actual vehicle vibration in a driving situation and determined parameters based on the frequency characteristics. Then, we demonstrate that vehicle vibration that induces transmitter displacement in an image plane can be modeled by only Gaussian random processes that represent road surface irregularity when a high frame rate (e.g., 1000fps) image sensor is used as an ISC receiver. The simplified vehicle vibration model and its parameters are evaluated by numerical analysis and experimental measurement and obtained result shows that the proposed model can reproduce the characteristics of the transmitter displacement sufficiently.
Hong YANG Linbo QING Xiaohai HE Shuhua XIONG
Wireless video sensor networks address problems, such as low power consumption of sensor nodes, low computing capacity of nodes, and unstable channel bandwidth. To transmit video of distributed video coding in wireless video sensor networks, we propose an efficient scalable distributed video coding scheme. In this scheme, the scalable Wyner-Ziv frame is based on transmission of different wavelet information, while the Key frame is based on transmission of different residual information. A successive refinement of side information for the Wyner-Ziv and Key frames are proposed in this scheme. Test results show that both the Wyner-Ziv and Key frames have four layers in quality and bit-rate scalable, but no increase in complexity of the encoder.
Yuriko YOSHINO Masafumi HASHIMOTO Naoki WAKAMIYA
In this paper, we focus on two-layer wireless sensor networks (WSNs) that consist of sensor-concentrator and inter-concentrator networks. In order to collect as much data as possible from a wide area, improving of network capacity is essential because data collection applications often require to gather data within a limited period, i.e., acceptable collection delay. Therefore, we propose a two-stage scheduling method for inter-concentrator networks. The proposed method first strictly schedules time slots of links with heavy interference and congestion by exploiting the combination metric of interference and traffic demand. After that, it simply schedules time slots of the remaining sinks to mitigate complexity. Simulation-based evaluations show our proposal offers much larger capacity than conventional scheduling algorithms. In particular, our proposal improves up to 70% capacity compared with the conventional methods in situations where the proportion of one- and two-hop links is small.
In wireless sensor networks, the on-off attacker nodes can present good behaviors and then opportunistically and selectively behave badly to compromise the network. Such misbehaving nodes are usually difficult to be spotted by the network system in a short term. To address this issue, in this study, we propose a reputation scheme to mitigate the on-off attack. In addition, a penalty module is properly designed so that the reputation scheme can effectively respond to the on-off misbehaviors and make such nodes quickly detected by the system, hence the minimization of their influence. We confirm the feasibility and effectiveness of the proposed scheme through simulation tests.
Sho SASAKI Yuichi MIYAJI Hideyuki UEHARA
A number of battery-driven sensor nodes are deployed to operate a wireless sensor network, and many routing protocols have been proposed to reduce energy consumption for data communications in the networks. We have proposed a new routing policy which employs a nearest-neighbor forwarding based on hop progress. Our proposed routing method has a topology parameter named forwarding angle to determine which node to connect with as a next-hop, and is compared with other existing policies to clarify the best topology for energy efficiency. In this paper, we also formulate the energy budget for networks with the routing policy by means of stochastic-geometric analysis on hop-count distributions for random planar networks. The formulation enables us to tell how much energy is required for all nodes in the network to forward sensed data in a pre-deployment phase. Simulation results show that the optimal topology varies according to node density in the network. Direct communication to the sink is superior for a small-sized network, and the multihop routing is more effective as the network becomes sparser. Evaluation results also demonstrate that our energy formulation can well approximate the energy budget, especially for small networks with a small forwarding angle. Discussion on the error with a large forwarding angle is then made with a geographical metric. It is finally clarified that our analytical expressions can obtain the optimal forwarding angle which yields the best energy efficiency for the routing policy when the network is moderately dense.
Intelligent transportation systems (ITS) are a set of technological solutions used to improve the performance and safety of road transportation. Since one of the most important information sources on ITS are sensors, the integration and sharing the sensor data become a big challenging problem in the application of sensor networks to these systems. In order to make full use of the sensor data, is crucial to convert the sensor data into semantic data, which can be understood by computers. In this work, we propose to use the SSN ontology to manage the sensor information in an intelligent transportation architecture. The system was tested in a traffic light settings application, allowing to predict and avoid traffic accidents, and also for the routing optimization.
Yating GAO Guixia KANG Jianming CHENG Ningbo ZHANG
Wireless sensor networks usually deploy sensor nodes with limited energy resources in unattended environments so that people have difficulty in replacing or recharging the depleted devices. In order to balance the energy dissipation and prolong the network lifetime, this paper proposes a routing spanning tree-based clustering algorithm (RSTCA) which uses routing spanning tree to analyze clustering. In this study, the proposed scheme consists of three phases: setup phase, cluster head (CH) selection phase and steady phase. In the setup phase, several clusters are formed by adopting the K-means algorithm to balance network load on the basis of geographic location, which solves the randomness problem in traditional distributed clustering algorithm. Meanwhile, a conditional inter-cluster data traffic routing strategy is created to simplify the networks into subsystems. For the CH selection phase, a novel CH selection method, where CH is selected by a probability based on the residual energy of each node and its estimated next-time energy consumption as a function of distance, is formulated for optimizing the energy dissipation among the nodes in the same cluster. In the steady phase, an effective modification that counters the boundary node problem by adjusting the data traffic routing is designed. Additionally, by the simulation, the construction procedure of routing spanning tree (RST) and the effect of the three phases are presented. Finally, a comparison is made between the RSTCA and the current distributed clustering protocols such as LEACH and LEACH-DT. The results show that RSTCA outperforms other protocols in terms of network lifetime, energy dissipation and coverage ratio.
We have proposed a fish farm monitoring system for the efficient farming of tuna. In our system, energy efficient and adaptive control of sensor node is highly important. In addition, since a sensor node is attached to the fish, the transmission range of sensor node is not omni-directional. In this paper, we propose a data gathering mechanism for fish farm monitoring by extending a traditional desyncronization mechanism. In our proposed mechanism, by utilizing acknowledgment packets from the sink node, distributed and adaptive timing control of packet transmission is accomplished. In addition, we apply a reassignment mechanism and a sleep mechanism for improving the performance of our proposed mechanism. Through simulation experiments, we show that the performance of our proposed mechanism is higher than that of comparative mechanisms.
Jaekeun YUN Daehee KIM Sunshin AN
Since the sensor nodes are subject to faults due to the highly-constrained resources and hostile deployment environments, fault management in wireless sensor networks (WSNs) is essential to guarantee the proper operation of networks, especially routing. In contrast to existing fault management methods which mainly aim to be tolerant to faults without considering the fault type, we propose a novel efficient fault-aware routing method where faults are classified and dealt with accordingly. More specifically, we first identify each fault and then try to set up the new routing path according to the fault type. Our proposed method can be easily integrated with any kind of existing routing method. We show that our proposed method outperforms AODV, REAR, and GPSR, which are the representative works of single-path routing, multipath routing and location based routing, in terms of energy efficiency and data delivery ratio.
Peng QIAN Yan GUO Ning LI Baoming SUN
The compressive sensing (CS) theory has been recognized as a promising technique to achieve the target localization in wireless sensor networks. However, most of the existing works require the prior knowledge of transmitting powers of targets, which is not conformed to the case that the information of targets is completely unknown. To address such a problem, in this paper, we propose a novel CS-based approach for multiple target localization and power estimation. It is achieved by formulating the locations and transmitting powers of targets as a sparse vector in the discrete spatial domain and the received signal strengths (RSSs) of targets are taken to recover the sparse vector. The key point of CS-based localization is the sensing matrix, which is constructed by collecting RSSs from RF emitters in our approach, avoiding the disadvantage of using the radio propagation model. Moreover, since the collection of RSSs to construct the sensing matrix is tedious and time-consuming, we propose a CS-based method for reconstructing the sensing matrix from only a small number of RSS measurements. It is achieved by exploiting the CS theory and designing an difference matrix to reveal the sparsity of the sensing matrix. Finally, simulation results demonstrate the effectiveness and robustness of our localization and power estimation approach.
Yan GUO Baoming SUN Ning LI Peng QIAN
Many basic tasks in Wireless Sensor Networks (WSNs) rely heavily on the availability and accuracy of target locations. Since the number of targets is usually limited, localization benefits from Compressed Sensing (CS) in the sense that measurements can be greatly reduced. Though some CS-based localization schemes have been proposed, all of these solutions make an assumption that all targets are located on a pre-sampled and fixed grid, and perform poorly when some targets are located off the grid. To address this problem, we develop an adaptive dictionary algorithm where the grid is adaptively adjusted. To achieve this, we formulate localization as a joint parameter estimation and sparse signal recovery problem. Additionally, we transform the problem into a tractable convex optimization problem by using Taylor approximation. Finally, the block coordinate descent method is leveraged to iteratively optimize over the parameters and sparse signal. After iterations, the measurements can be linearly represented by a sparse signal which indicates the number and locations of targets. Extensive simulation results show that the proposed adaptive dictionary algorithm provides better performance than state-of-the-art fixed dictionary algorithms.
Yan WANG Long CHENG Jian ZHANG
Wireless sensor network (WSN) has attracted many researchers to investigate it in recent years. It can be widely used in the areas of surveillances, health care and agriculture. The location information is very important for WSN applications such as geographic routing, data fusion and tracking. So the localization technology is one of the key technologies for WSN. Since the computational complexity of the traditional source localization is high, the localization method can not be used in the sensor node. In this paper, we firstly introduce the Neyman-Pearson criterion based detection model. This model considers the effect of false alarm and missing alarm rate, so it is more realistic than the binary and probability model. An affinity propagation algorithm based localization method is proposed. Simulation results show that the proposed method provides high localization accuracy.
As autonomous underwater vehicles (AUVs) have been widely used to perform cooperative works with sensor nodes for data-gathering, the need for long-range AUVs has further grown to support the long-duration cooperation with sensor nodes. However, as existing data-gathering protocols for the cooperative works have not considered AUVs' energy consumption, AUVs can deplete their energy more quickly before fulfilling their missions. The objective of this work is to develop an AUV based data-gathering protocol that maximizes the duration for the cooperative works. Simulation results show that the proposed protocol outperforms existing protocols with respect to the long-range AUVs.