Initiating the Interaction Analyzing an Area of Interest

Slides:



Advertisements
Similar presentations
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Advertisements

Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
Presented by : Poorya Ghafoorpoor Yazdi Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern Mediterranean.
March 13, 2006 Location Tracking System & Sensor Based Communications For Mining Response to RIN 1219-AB44.
Wireless Sensor Network. A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
Modeling Human Response to Threats and Disasters John H. Sorensen Oak Ridge National Laboratory May 29-30, 2003.
Fault Tolerance in ZigBee Wireless Sensor Networks
Introduction To Wireless Sensor Networks Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting of spatially distributed.
Incident Command System (ICS)
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Layered Approach using Conditional Random Fields For Intrusion Detection.
DESIGN & IMPLEMENTATION OF SMALL SCALE WIRELESS SENSOR NETWORK
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
Introduction to Wireless Sensor Networks
A Traffic Chaos Reduction Approach for Emergency Scenarios A Traffic Chaos Reduction Approach for Emergency Scenarios Syed R. Rizvi †, Stephan Olariu †,
 Adviser : Dr. Lei Ying  Research Assistant: Ming Ouyang  Team Members:  Prashanth Yanamandra  Wyatt Brenneman  Taylor McKechnie  Client: ECpE.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
A White Paper on the potential for a small scale airborne system for Threat assessment, Characterization, Monitoring, and Tactical feed-back for deployment.
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
Wireless Sensor Networks
IS3220 Information Technology Infrastructure Security
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Real Time Event Processing Using Distributed Machine Learning in Urban Environments Nikos Stefanos Kostagiolas Computer Science Student at National Kapodistrian.
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Communications and Energy- Harvesting in Nanosensor Networks Michele C. Weigle Intelligent Networking and Systems Lab (iNetS) Department of Computer Science.
Created by :- prashant more prashant more. INTRODUCTION Bluetooth is wireless high speed data transfer technology over a short range ( meters).
Wireless Sensors Networks - Network Address Allocation Presented by: Assaf Goren Supervisor: Dr. Yehuda Ben-Shimol.
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Verizon Intelligent Track and Trace: Serialization and Cold Chain
Mohd Rozaini Bin Abd Rahim, Norsheila Fisal, Rozeha A
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Wireless Sensor Networks
IOT – Firefighting Example
Black Swan Ohio SET Black Swan Ohio SET 2017.
Wireless Sensor Networks in Healthcare
If you are a company, why you need the Angel Helmet?
Jamming for good: a fresh approach to authentic communication in WSNs
doc.: IEEE <doc#>
CASE BACKGROUND On September 27, 2012, an explosion occurred and right tons of hydrofluoric acid (HF) leaked from the Hube Global plant in Gumi, South.
Attention CFOs How to tighten your belt and still survive May 18, 2017.
How SCADA Systems Work?.
Progress Report of The Russian Federation Project
UNMANNED INTELLIGENT MILITARY ROBOT USING ZIGBEE
Introduction to Wireless Sensor Networks
Early Warning Flood Detection
Network Security: IP Spoofing and Firewall
Bluetooth Based Smart Sensor Network
Adhoc and Wireless Sensor Networks
Wei Li, Flávia C. Delicato Paulo F. Pires, Young Choon Lee
Wireless Body Area Network (WBAN)
Fast Localization for Emergency Monitoring and Rescue in Disaster Scenarios Based on WSN SPEAKER:Jyun-Ying Yu ADVISOR:DR. Kai-Wei Ke DATE:2018/05/04.
An Introduction To VDEM VDEM Director of External Affairs
Initiating the Interaction Analyzing an Area of Interest
Department of Computer Science Old Dominion University
doc.: IEEE <doc#>
The Anatomy and The Physiology of the Grid
Norfolk State University Department of Computer Science Colloquium
Sensor Networks – Motes, Smart Spaces, and Beyond
Data Centre Environment
Disaster Preparedness
Wireless Range Testing
Developing Vehicular Data Cloud Services in the IoT Environment
An Overview of Security Issues in Sensor Network
Presentation transcript:

Initiating the Interaction Analyzing an Area of Interest ALERT: A Next-generation Emergency Response System for First Responders using Retasking of Wireless Sensor Networks Mat Kelly, Syed R Rizvi, Liang Chen, Chinmay Lokesh, Stephan Olariu, Michele C. Weigle Intelligent Networking and Systems Research Group (http://www.cs.odu.edu/inets) at Old Dominion University, Norfolk, VA 23529 The objective is to design a real-time information system to improve emergency-response functions by bringing together information to respond to a terrorist attack, natural disaster or other small or large-scale emergency Problems Addressed Implementation Search and Rescue Unique and unknown conditions Lack of real-time information for disaster management Hardware specification IRIS motes WLAN capable Notebook Software specification TinyOS 2.1.1 nesC programming language Initiating the Interaction ALERT detects the arrival of PSAR (Patrol, search and rescue vehicle/personnel) As PSAR enters area PSAR authenticated Trust relationship established PSAR authorized to retask and utilize services of sensor network PSAR trains sensors in its range PSAR provides middleware and shares short-term mission parameters with neighboring AFNs Approach On the fly retasking approach Targeted towards first responders and evacuations Utilizing independently deployed wireless sensor networks (WSN) Retasking the original sensor networks into short- lived, mission-driven sensor networks Results Analyzing an Area of Interest Wireless sensor networks WSN1, WSN2 and WSN3 have been independently deployed over a common area of interest in the vicinity of a chemical plant WSN1 deployed for environmental monitoring including temperature (T),humidity (H), motion (M), and acoustic (A) sensors WSN2 deployed for pollution monitoring including air pressure (P), smoke (S), and chemical (C) sensors WSN3 deployed for traffic monitoring contains video (V), acoustic (A), motion (M), and GPS (G) sensors Many ZigBee / IEEE 802.15.4-based wireless data networks operate in the 2.45–2.4835 GHz band, and so are subject to interference from other devices operating in that same band Let us assume that there was an explosion at the chemical plant. As a result, the factory is on fire, and thick smoke, toxic gases and other hazardous chemicals were released over a large surrounding area. The three networks must be retasked into short-lived mission-driven sensor networks in support of the following high priority missions: Three non-integrated WSNs Conclusions Resulting in Availability of timely and accurate information Better disaster response plans Improved emergency response functions The effectiveness of the ALERT system is dependent on the basic transmission capabilities and orientation of motes At shorter ranges (<10m) transmission looks promising with reliability (>95%) at all times At larger ranges (>25m), quality of communications may be acceptable, but repeated tests have show that reliability is very low At medium ranges (10m < X < 25m) communication usually has consistent reliability Orientation of the mote has an effect on its transmission range Objectives Discover and reallocate the available capabilities in individual sensor networks Specify sensor missions and their attributes Retask independently-deployed sensor networks Provide middleware support for retasking independently-deployed sensor networks Assess the extent and potential effect of hazardous materials Identify and locate survivors Detect the wounded and assess their condition Guide rescue teams to the trapped and the wounded Detect fires, and identify directions of their spreading Detect damaged power lines, leaks from gas lines and hazmat spills Building Blocks Sensors: Sends data directly to the assigned AFN AFN: Aggregation-and-forwarding node aggregates the data from all sensors in its group Base station: Typically a first responder, it receives the aggregated reports from AFNs Retasking strategies: Based on emergency type and size Middleware: Based on the required Quality of Service Future Work The same WSNs, with regions near responders (Ti) integrated by the virtual infrastructure Further enhancement towards improving disaster management Early warning systems Detecting trends and unanticipated events