Uppsala University

                                                                                         

Uppsala VINN Excellence Center for
Wireless Sensor Networks
WISENET

line

WISENET

line

WISENET Nordic Darkness School November 8-9, 2010

HomeProgramSlides (log in required)LecturesPhD students

Lectures

WSN 2.0

Per Gunningberg, Department of Information Technology, Uppsala University
Abstract
It is time to push wireless sensor networks out of the research labs into real use in industry and public organizations. The top main barrier for industry to start to use WSN is reliability. It is followed by cost, security, standards and ease of use. To get a wider acceptance, researcher need to create the next generation WSN - here called WSN 2.0 - where these problems are put forward.

The Uppsala Wisenet center is working closely together with industry on these issues. In this talk I will outline the research challenges ahead for a more widespread usage of WSNs.

Transmission strategies for massive wireless networks in stores

Nils Hulth, Pricer AB
Abstract
Electronic shelf labels (ESL) are used to display prices on the shelf edge, thus saving labour and increasing response time for retailers. An ESL installation can consist of up to 100.000 battery powered nodes in the same store, where each label has to run 8-10 years on one set of batteries. Label communication is two-way with a star network of ceiling mounted tranceivers transmitting data to the labels and receiving acknowledgement signals. The presentation will give details in of the transmission and retransmission strategy and how that influences speed, response time and battery life.

Discussion question: How can the protocol be made optimal and tunable to different stores in order to maximize speed, response time and battery life?

Atmospheric sensing in tornados with unmanned aircraft

Tim Brown, University of Colorado Boulder, USA
Abstract
This workshop describes the networking and communication challenges with airborne sensors in small (10kg) unmanned aircraft. In particular we discuss the roles of flight dynamics, interference, limited spectrum, and flight safety requirements. Mobility is a key feature of these networks and can be exploited to improve network performance. Experiments with atmospheric sensing in a variety of environments will be described including a recent "tornado chasing" campaign to understand the origins of tornados.

Discussion question: What is different and what is common between airbornes sensor networks and other sensor networks? How do these differences affect the node and network design?

Denial of service challenges in wireless networks

Tim Brown, University of Colorado Boulder, USA
Abstract
Wireless networks are well known to be susceptible to jamming. However, as communication and networking protocols increase in functionality and complexity, wireless networks are susceptible to "intelligent jamming". Intelligent jamming uses protocol behavior against a victim network and enables attackers to disrupt communication with much less effort. We discuss these issues from both a red team (attacker) and blue team (defender) perspective. Specific protocols such as 802.11, 802.16, TCP, DNS, and others will be examined.

Discussion Question: Are wireless sensor networks more or less susceptble to denial of service attacks and how can they be better protected?

Natural disaster science – Potential of sensor development in the management of water-related disasters

Sven Halldin, Department of Earth Sciences, Uppsala University
Reading material
A Science Plan for Integrated Research on Disaster Risk – Addressing the challenge of natural and human-induced environmental hazards from International Council for Science.

Internet of Things

Heikki Seppä, VTT, Finland
Abstract
I will shortly describe the historical background of RFID and, of course, basic principle and technology in general. RFID is based on reflection where the reader creates either magnetic field or electromagnetic waves and a tag phase or amplitude modulates the field. The modulation is detected by the reader. The semipassive tag in powered by the reader whereas a semipassive tag consists of a battery, or other energy source. In both cases the basic principle is the same and the reader even does have know whether a tag is supported by a battery or not. Semipassive tags are used in data loggers because RFID reader is not present. RFID reader as a wireless communication technology either in the proximity mode (10 cm) or in a long distance mode (maximum 10 m in the case of passive tag) In paying and ticketing etc. applications 13.56 MHz is used whereas in logistics they work in the UHF band. Soon mobile phones are equipped RFID reader (acting as a tag as well. This technology is called NFC (Near Field communication). All the major mobile phone companies are announced that they will soon have several NFC phones. Nokia already had two phones 2005 and next year all the Nokia's smart phones will be equipped with the NFC reader. Samsung has have these phones already in the internal markets of South Korea and Apple will also do the same soon. This technology enables ticketing and paying (via the phones directly without an operator - phone will act as cash, bank card, visa card, vip card, etc. Mobile phone manufactures, banks and operators are already standardizes this technology. NFC enables us to use a phone as a physical browser (as a mouse in computers) as a service interface (access to information, control, ..) and between an user and his environment including things and items. Now the about 5 billions tags are made but it will grow up to 100 billions soon. The main applications thus far have been ticketing, access control, and logistics a general. Clothing industry does not use RFID only in the packages but also in a single cloth and it is utilized not only in the production and logistic chains but also retailers e.g., for inventory purposes. Next big step will be RFID based sensors e.g., humidity sensors and also well being and medical sensors: temperature, EKG, EEG, etc. data loggers. Finally, as my title is hinting, the big thing it that RFID will create Internet of Things - think about it.

Personal and Pervasive Sensing Systems

Prabal Dutta, Department of Electrical Engineering and Computer Science, University of Michigan, USA
Abstract
This tutorial will discuss emerging approaches to personal and pervasive sensing. As a case study, we will focus on HiJack, a system for stealing power and bandwidth from the mobile phone's audio interface. HiJack enables a new tier small and cheap phone-centric sensor peripherals that support plug-and-play operation including, for example, EKG. More broadly, we will explore how the mobile phone might become the portal for pervasive sensors that are physically-embedded and perpetually-powered, and the scaling laws that will enable this emerging computing class.

Discussion question:
How small should researcher attempt to make wireless sensor nodes given the increasingly complex energy harvesting/storage, energy/power density, radio propagation, timer stability, software development, discovery and networking issues, and integration challenges? Is a killer app needed to justify the research?

Programming and Debugging Sensor Networks

Kay Römer, Institute of Computer Engineering, University of Lübeck, Germany
Abstract
Developing bug-free application software for sensor networks is a fundamental challenge. As the programmer must not only implement the functional requirements of the application, but also has to take into account the resource constraints of typical platforms, programming is a complex multi-objective optimization problem in the mind of the developer. Sensor networks are also massively distributed systems, adding another level of complexity to software development. Finally, sensor networks are exposed to an unpredictable environment that has a strong impact on the function of a sensor network that needs to be considered.

After outlining the fundamental challenges, this talk first addresses the programming side. We present typical abstractions that hide part of the complexity from the programmer and therefore simplify the programming task. We focus in particular on so-called macroprogramming techniques that abstract from the complexity of distributed programming. While these techniques help to avoid bugs, it is common that the resulting applications fail when deployed in the field. In the second part of this talk we therefore discuss debugging techniques to find and eliminate the causes of failures in deployed sensor networks. In particular, we present techniques to increase the visibility of the system state while minimizing the consumption of resources.

Discussion question:
Identify key differences between traditional application software and sensor network applications. For each difference, discuss whether it makes programming easier or more difficult. Also discuss the implications of these differences on programming and debugging.

Reading material that may be helpful:
Luca Mottola, Gian Pietro Picco: Programming Wireless Sensor Networks: Fundamental Concepts and State of the Art. (To appear) in ACM Computing Surveys.

Jan Beutel, Kay Römer, Matthias Ringwald, Matthias Woehrle: Deployment Techniques for Wireless Sensor Networks. In: G. Ferrari (Ed.): Sensor Networks: Where Theory Meets Practice. Springer, Heidelberg, November 2009.

line
line
Uppsala Universitet Uppsala VINN Excellence Center for Wireless Sensor Networks WISENET, Box 337, SE-751 05 Uppsala
Updated: 2010-11-12 11:26 by Roland Grönroos