Communication Protocols and Middleware Algorithms for Wireless Sensor Networks David S. L. Wei
Outline Motivation and applications Types of sensors Network structure MAC protocols: Wi-Fi, Bluetooth, and Network-Layer protocols: Routing and Topology Control Base station positioning and sensor placement Security in wireless sensor networks
Applications range from civilian life to national security health care traffic control industrial automation environmental monitoring chemical and biological attack detection military sensing among many others
Types of Sensors video/infrared camera gas/smog detector seismic wave sensor acoustic wave sensor chemical- and bioassays among others
Network Architecture Single-node architecture Network architecture
MAC Protocols CSMA/CA Frequency Hopping Bluetooth/802.15
Routing and Topology Control Routing algorithms: power-efficient routing, power-aware routing, security- aware routing, among others. Routing algorithms Topology control algorithms: see slides of another lecture.see slides of another lecture.
Base station positioning and sensor placement Coverage problem: answers the questions about QoS of surveillance WSNs. Sensor placement determines the quality of solutions. Finding optimal solution turns out to be NP-complete. Base Station Positioning: Finding the optimum layout of base stations is also NP-complete.
Security in WSNs public-key encryption (e.g. RSA) vs symmetric-key encryption (e.g. AES) ********
Thank you! The speaker can be reached at or via skype id: dslwei