Introduction To Wireless Sensor Networks: January 2015
Introduction To Wireless Sensor Networks: January 2015
net/publication/283824268
CITATIONS READS
8 5,195
2 authors, including:
Mohammad Salahuddin
University of Waterloo
43 PUBLICATIONS 896 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Mohammad Salahuddin on 09 February 2017.
Book Title:
D. BenHaddou and A. Al-Fuqaha (Eds.), pp. 3-32, Springer, New York, 2015.
Chapter Title:
Table of Contents
Abstract ......................................................................................................................................................... 3
1. Introduction to Wireless Sensor Networks (WSN) ................................................................................... 4
1.1 Wireless Sensor Network Nodes and Their Characteristics ............................................................... 5
1.2 Characteristics of Wireless Sensor Networks (WSN) ......................................................................... 7
2.0 Communication Patterns and Protocols in WSN .................................................................................. 10
2.1 Communication Patterns ................................................................................................................... 10
2.1.1 Data Delivery Models ................................................................................................................ 11
2.2 Network Architecture of Wireless Sensor Networks ........................................................................ 13
2.2.1 Transport layer protocols ........................................................................................................... 14
2.2.2 Routing in Network Layer ......................................................................................................... 15
2.2.3 Medium Access Control (MAC) protocols at Data Link Layer ................................................. 18
3.0 Wireless Sensor Network Applications and Problem Space................................................................. 20
4.0 Programming WSNs ............................................................................................................................. 22
4.1 TinyOS: An Operating System for WSN Motes ............................................................................... 23
5.0 Summary ............................................................................................................................................... 25
References and Bibliography ...................................................................................................................... 27
Page 2 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
Abstract
Wireless Sensor Networks enjoy great benefits due to their low-cost, small-scale factor, smart
sensor nodes. Not only can they be employed in cumbersome and dangerous areas of interest, for
monitoring or controlling the region, but they can also be deployed to automate mundane tasks. Early
sensory units were expensive and lacked the computational and communicational capabilities of current
smart sensor nodes, which can now sense, process, store and forward data, all being powered by a battery.
Myriad applications exist that leverage Wireless Sensor Networks as low-cost solutions for
observing the habitat and environment, from military and civilian surveillance and target detection and
tracking applications, to precision farming and agriculture, patient monitoring in health care, residential
applications like energy management, for safety and efficiency in vehicular networks to outer space
explorations.
The diversity of the applications of Wireless Sensor Networks imposes varying design,
implementation and performance requirements on the Wireless Sensor Networks. Therefore, for a
thorough understanding of the different design and implementation techniques, we must understand the
inherent characteristics of Wireless Sensor Networks and their smart sensor nodes. This intrinsic nature of
the application specific Wireless Sensor Networks makes classification and taxonomy delineation
difficult and cumbersome.
In this chapter, we will delineate the inherent characteristics of the Wireless Sensor Networks and
their smart sensor nodes. Then, we will discuss the data delivery models and traffic patterns that instigate
the design and development of novel network architecture protocols for WSN and distinguish them from
its peers in other infrastructureless computing paradigms.
We compare WSN with its peers, with respect to, the problem space of WSN applications,
followed by a brief overview of the challenges in programming WSN motes. Then, we present an
overview of TinyOS, an operating system for WSN motes, and conclude with an overview of the
challenges and limitations of WSNs.
Page 3 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
Page 4 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
protocols for WSN and their taxonomy. We will conclude with a summary of the challenges and
limitations of WSN.
Processing Unit
Sensing Unit(s) Radio Unit(s)
Storage
Power Unit
Page 5 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
expansion slots that enable them to be equipped with mechanical actuators, wheels for mobility or CMOS
chips or microphone for multimedia capabilities. The processors used in these motes can range from ultra-
low-power 8 bit processors to more powerful 32 bit processors, similarly, memory space can vary from a
couple of kilobytes to the order of megabytes [25].
Motes are equipped with short-range radio frequency (RF) transceivers to enable WSN
applications [25] and to ease the query and retrieval of data from the WSN [26]. The use of a short range
radio directly influences the antenna size, since short range radio waves have higher frequencies and
shorter wavelengths they can be received and transmitted by small compact antennas. Through the high
frequencies of 800-1000 MHz, IEEE 802.15.4 or the 2.4GHz Bluetooth, the low-power radios offer
varying bandwidths [25]. The low transmission range of the motes instigates a multi-hop WSN. Though
current WSN motes are equipped with RF radios, communication via infrared, ultrasound and inductive
fields [27] has also been explored [25].
WSN motes can also be equipped with power generation units, that harvest power ambient energy
sources such as solar [28], mechanical and thermal [29]. Table I presents a comparison of some WSN
motes used in academia and industry w.r.t to these characteristics ( [25], [24], [30]).
We will now consider the characteristics of Wireless Sensor Networks, with respect to the various
application and environmental aspects.
Table I. Comparison of some WSN Motes
Clock RAM/Flash/ BW Freq.
Platform CPU Radio Transceiver OS
(MHz) EEPROM (kbps) (MHz)
Intel StrongARM
AWAIRS 1 59-206 1M/4M Conexant RDSSS9M 100 900 MicroC/OS
SA1100
Intel StrongARM
µAMPS 59-206 1M/4M National LMX3162 1000 2400 µOS
SA1100
Dot Atmel Atmega 163 8 1K/16K/32K RFM TR1000 10 916.5 TinyOS
Atmel Atmega
BT Node 8 4K/128K/4K ZV4002 BT/CC1000 1000 2400 TinyOS
128L
Smart-its PIC 18F252 8 3K/48K/64K Radiometrix 64 433 Smart-its
Atmel Atmega
Mica2 8 4K/128K/512K Chipcon CC1000 38.4 900 TinyOS
128L
Atmel Atmega
Mica2Dot 4 4K/128K/512K Chipcon CC1000 38.4 900 TinyOS
128L
Atmel Atmega Ericsson ROK101007
iBadge 8 4K/128K 1000 2400 Palos
128L BT
Atmel Atmega
CENS Medusa
128L/Atmel 4/40 4K/32K/136K/1M RFM TR1000 10 916 Palos
MK2
AT91FR4081
Zeevo ZV4002
iMote 12-48 64K/512K Zeevo BT 720 2400 TinyOS
(ARM)
U3 PIC 18F452 0.031-8 1K/32K/256 CDC-TR-02B 100 315 Pavenet
Chipcon CC1010 0.3- RFRAIN
RFRAIN 3-24 2K/32K Chipcon CC1010 76.8
(8051) 1000 Libraries
Atmel Atmega
Nymph 4 4K/128K/512K Chipcon CC1000 38.4 900 Mantis
128L
Telos TI MSP430F149 8 2K/60K/512K Chipcon CC2420 250 2400 TinyOS
Atmel Atmega
MicaZ 8 4K/128K Chipcon CC2420 250 2400 TinyOS
128L
Particle2/29 PIC 18F6720 20 4K/128K/512K RFM TR1001 125 868.35 Smart-its
eyesIFXv2 TI MSP430F1611 8 10K/48K Infineon TDA 5250 64 868 TinyOS
iMote2 Intel PXA 271 13-104 256K/32M Chipcon CC2420 250 2400 TinyOS
Page 6 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
Page 7 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
deployment could be rocket ejected or aircraft sown [32], e.g. in the aerial spread of motes for volcano
monitoring [13]. Precise deployment usually consists of manual or pre-planned placement of motes, e.g.
habitat monitoring on Skomer Island [33]. The deployment strategies used affects the structure of WSN
and can have an impact on coverage of the region and cost of deployment [26].
Organization and Architecture –WSN can be organized into two typical structures, flat or
hierarchical. Figure 2 illustrates the flat and hierarchical WSN. In a flat network, all motes in the network
have the same role and importance, whereas, in a hierarchical organization, motes are clustered or
organized into groups with different motes playing different roles, such as general purpose sensing motes
or data aggregators or forwarders, etc. As we climb up the hierarchy, the mote’s functionality increases
with respect to its cost, size, processing power, storage size, etc.
Infrastructure Infrastructure
Base Stations
Increasing cost, size and functionality
High Performance
Custer Head Motes
General Purpose
Sink Motes
Special Purpose
Motes
Page 8 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
configurations than the low-cost, low-power general purpose motes at the bottom of the hierarchy or
pyramid. The special purpose motes offer data aggregation, or fusion, and more complex computational
and communicational power, making them ideal sink nodes in the WSN. The general purpose motes at the
bottom of the hierarchy typically act as data collectors and forwarders, as illustrated in Figure 2.
Multiple WSN can be interconnected to form a global WSN, referred to as global sensing
infrastructure [34], as illustrated in Figure 3.
motes
BS
Infrastructure
sink BS WSN
motes
WSN
Page 9 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
heterogeneous network of low-processing power and low-transmission rate motes. These protocols are
needed for establishing and maintaining a secure network infrastructure through self-discovery,
configuration, and healing, routing and inherent fault-tolerance.
Self-configuration and organization – Various types of self-discovery algorithms exist for use in
WSN, some are adaptations from Bluetooth discovery mechanism and others developed specially for
WSN. Algorithms delineated in [39], [40], [41] and their like consist of a suite of protocols responsible
for discovering motes and organizing the wireless infrastructure, despite topology changes and mote
failures.
Connectivity and coverage – Establishing and maintaining connectivity and coverage is an
essential step in the deployment of a WSN. It is important to determine the initial number of motes
required to maintain connectivity and coverage in the region of interest, in face of mote failure and
dropout. It is generally assumed that mote communication and sensing range are uniform and
unidirectional, usually depicted as circular regions (cf. Section 2.1.1 Figure 4).
Furthermore, it is imperative for the configuration algorithms to maintain connectivity in the face
of dynamic topology changes. Berman et al [42] propose dominating k-connectivity, such that in the face
of upto k mote failures, connectivity to a WSN sink is still maintained. Abbasi et al [43] present a
recovery technique for preserving connectivity in the face of mote failure. Others ( [44], [45], [46], [47],
etc) have also studied the matter of connectivity and coverage in WSN in great detail.
Page 10 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
the number of messages required for querying and there is a longer delay in query response, but conserves
power by explicit sampling rather than continuous sampling [48].
WSN applications typically utilized the push approach to conserve energy, when radio
communication was more expensive than sensing on a mote [48], however, advances in radio
technologies have significant improvements in the power consumption, resulting in ultra-low power
radios, e.g. ZigBee radio [48]. Bose and Abdelsalam [48] propose a hybrid push-pull approach to
sampling and retrieving data from a WSN to leverage the benefits of both techniques. The push, pull or
hybrid approach yields three distinct network traffic patterns in WSN. The push approach causes a
many-to-one communication pattern, where motes are pushing data towards the sink or base station. In
the pull approach, before motes-to-sink communication occurs, the sink or base station sends the explicit
command to start sensing, which is one-to-many communication. When motes are collaboratively
communicating, to self-configure, localize, or for data fusion at multiple sinks, many-to-many
communication occurs [49].
Apart from these traffic patterns in WSN, Tilak et al [50] decompose communication paradigms
in WSN into two categories, that is, application-based and infrastructure-based communication.
Application-based communication refers to getting the sensed data from nodes to application user,
whereas, infrastructure-based protocols are those that are used to provide the underlying primitives to
achieve the application-based communication.
We will discuss data delivery models from the application and infrastructure based
communication perspectives, followed by a discussion of the network architecture in WSN.
Page 11 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
delivery is known as Geocasting. Multicast data delivery model can also be specialized to behave in a
many-to-one data delivery manner.
Finally, many-to-many data delivery models results in the presence of multiple sinks or gateways
accessing the WSN for data and information [49]. These data delivery models in WSN are illustrated in
Figure 4.
Communication
Range
Unicast Broadcast
BS
Multicast Many-to-Many
Figure 4. WSN infrastructure based data delivery models, unicast, broadcast, multicast and many-to-many
From the perspective of the application based communication protocols, the data delivery models
consist of continuous, event-driven, query-driven or a hybrid approach of these ( [50], [52] ), as illustrated
in Figure 5. In continuous, also known as periodic, data delivery models, data is transmitted from the
motes to the sink or gateways at periodic intervals. In event-driven models, the motes are sensitive to one
or more physical factors of the environment, when the sensed value (sensor readings) meets or exceeds a
predetermined threshold, an event is triggered. The triggered motes propagate their sensor readings back
to the sink(s) or gateways. In query-driven data delivery models, user initiates a query and network motes
which meet the query criteria transmit their sensor readings. In the hybrid approach, one or more of the
data delivery models are used together. For example, in a volcano monitoring application, the motes
would be primarily event-driven. However, occasionally the user may want to poll or query the WSN for
current seismic or temperature readings.
Page 12 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
Query (Q0)
Threshold (θ)
Time
t0 t0
Transmits sensor reading every t0 Transmitting motes
Figure 5. WSN application based data delivery models in WSN, periodic, event-driven and query-driven
Page 13 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
network architecture. Often, fundamental WSN communication protocols for querying, routing and data
delivery are integrated under data dissemination and aggregation techniques in WSN [53]. These
limitations instigate the use of a cross layer approach in developing network protocols for wireless sensor
networks.
In the following sections, we will discuss the various concepts of the transport, network and data
link layers with respect to wireless sensor networks.
Application Layer
Transport Layer
(End-to-End Transmission) Power
Management
Cross-Layer Network Layer &
Design (Routing Protocols) Security
Protocols
Data Link Layer
(Medium Access Control)
Physical Layer
Page 14 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
the base station. Table II classifies some of the transport layer protocols developed for WSN with respect
to these primitives ( [54], [55], [56]).
Table II. Classification of some Transport Layer Protocols for WSN
Congestion Control
WSN Transport Layer Protocols Reliable Unreliable
Distributed Centralized None
Flush × ×
STCP × ×
Hop × ×
RCRT × ×
Wisden × ×
Tenet × ×
RMST × ×
WRCP × ×
IFRC × ×
Fusion × ×
CODA × ×
QCRA × ×
ESRT × ×
Surge (TinyOS) × ×
CTP × ×
RBC × ×
CentRoute × ×
Koala × ×
XLP × ×
CRRT × ×
CTCP × ×
ERTP × ×
GARUDA × ×
DTSN × ×
PHTCCP × ×
Page 15 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
attribute based addressing is used, where nodes query for an attribute and only those nodes respond that
can satisfy the query. For example, a mote can query for temperature greater than 72°C, and those motes
that have temperature readings more than 72°C will respond.
Routing protocols are also designed for specific WSN topologies, classified as flat and
hierarchical topologies, as illustrated in Figure 2. On top of these WSN topologies, routing can also be
geographical in nature, where packets are routed to motes closest to destination
WSN routing protocols can also be based on different application defined criteria or operation
based attributes [57]. These operation based attributes can include, multipath, negotiation-based, query-
based, QoS parameters (reliability, data integrity, energy efficiency), coherent [57] based routing
techniques to increase reliability, security, etc attributes.
Figure 7 depicts the various characteristics of WSN routing protocols, which can be integrated to
design an efficient application specific routing protocol for a WSN.
Flat Reactive
Hierarchical Proactive
Geographical
Network
Cooperative
Structure
Negotiation based
Operation-based
Attributes Data centric
Multipath
Communication
Query based Mote address centric
Entities
QoS based
Data sampling
Security and retrieving
Coherent
Push
Location based
Pull
Data aggregation
Heterogeneous Hybrid
Page 16 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
Multipath features in routing protocols can have a two-fold benefit for WSN. Multipath routing
can reduce frequency of updating routes, balance traffic load, increase rate of data delivery [58]. This
consequentially increases the lifetime and reliability of WSN. Earlier researchers proposed to use
suboptimal routing paths with low energy consumption [59], or select a routing path based on the residual
energy of the motes on the path [60]. The authors in [61] study the tradeoff between traffic overhead and
reliability using multipath routing in WSN. More recently, [58] use multipath routing to increase lifetime
of WSN and reduce collisions for transmission. Furthermore, researchers are utilizing ant colonization
optimization, a swarm intelligence optimization technique, due to their proven success [62] in routing
protocols for WSN. In [63], ant colonization is used to discover optimal routes to increase network
lifetime and reliability, whereas [62] uses multipath routing to reduce congestion at the mote and link
level. Authors in [64] survey swarm intelligence based routing protocols in WSN.
Routing protocols that are built on the pull approach, where queries can be propagated, are known
as query based routing protocols. Routing algorithms such as Directed Diffusion and Rumor routing [57]
are specifically implemented for query-driven data delivery models, where motes that meet the query
requirements setup interest gradients or paths along which the data is routed to the sink. Negotiation
based routing algorithms suppress redundant data and use negotiation messages to ensure non-redundant
data before transmission, for e.g. Sensor Protocols for Information via Negotiation (SPIN) [65].
QoS-based routing ( [66], [67] [68], [69], etc.) ensure that routing in WSN meets application defined QoS
metrics, of delay, energy, bandwidth, reliability, fault-tolerance, data integrity, etc. Data aggregation is
also an important aspect of WSN and their applications, and is often accounted for when designing and
developing routing protocols, to ensure efficient performance.
Not only is it important to secure the data and the motes in the WSN, but also the network traffic
patterns. Since malicious motes can redirect traffic, inject false data or drop packets and cause havoc in
the WSN. Typical uses of asymmetric key cryptography or complicated symmetric key cryptography are
infeasible for resource constraint WSN [70]. While there are techniques for implementing security on the
data link layer in WSN, researchers are designing novel techniques for securing routing protocols( [71],
[72], [73]), to increase reliability of WSN.
Table III classifies some WSN routing protocols based on the routing protocol characteristics
illustrated in Figure 7( [52], [57], [74], [75], [76], [71], [77], [78], [79]).
Table III. Classification of some WSN routing protocols
WSN Routing Network MANET Operation-based Communication Data sampling
Protocol Structure technique attribute entities and retrieving
Data aggregation,
SPIN Flat Proactive negotiation-based, Data-centric Pull
query-based, multipath
Data aggregation,
Directed Diffusion Flat Reactive Data-centric Pull
negotiation-based,
Page 17 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
Page 18 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
protocols do not require such synchronization or topology information and instigate communication
between motes in different active cycles.
Contention based MAC protocols, eliminate the overhead of synchronization or network topology
from schedule based MAC protocols. Motes can transmit packets immediately and retransmit in the event
of a collision. A refined approach is to sense the physical medium for transmission, and when the medium
is idle then access the medium and transmit the packet. This is the general concept in Carrier Sense
Multiple Access (CSMA), which is one of the canonical contention based MAC protocols.
Ye et al [82] have identified four significant aspects of wasteful energy consumption, namely,
collision, overhearing, control packet overhead and idle listening at the data link layer. When two or more
motes transmit at the same time, their respective packets are corrupted and require retransmissions
increasing energy consumption and latency. Energy consumed in overhearing, is energy spent listening
for packets destined for other motes. Sending and receiving control packets without useful data is also
wasteful with respect to energy consumed. Listening to the channel even when there are no radio
transmissions is considered idle listening, which is an energy consumption overhead [81].
Contention based protocols include techniques like Carrier Sense Multiple Access (CSMA), and
offer multiple benefits like low implementation complexity, flexibility in face of mobility and varying
traffic patterns [80]. However, schedule based MAC protocols like TDMA have intrinsic energy
conserving features since there are no collisions, overhearing and idle listening. Due to the energy
conservation necessary in resource constraint WSN, it is important for MAC protocols for WSN to
incorporate primitives for conserving energy by reducing collisions, overhearing, reduced control packet
overhead and idle listening, without the need for expensive time synchronization.
These MAC protocols require different degrees of collaboration and cooperation amongst the
motes to achieve medium control access. Motes in the network could work completely independently in a
random manner like those in contention-based MAC protocols, to slightly organized slotted MAC
protocols and then to the very organized synchronous schedule based protocols like TDMA [80].
Various MAC protocols have been designed and implemented including synchronous duty
cycling MAC protocols such as S-MAC [82], T-MAC, TRAMA, SCP, DW-MAC, etc and asynchronous
duty cycling MAC protocols such as X-MAC [83], B-MAC, WiseMAC, PW-MAC [81], ASCEMAC
[84], etc. An exhaustive MAC protocols survey is presented in [85]. MAC protocols are also being
designed to include important features like security [86], power management [87] and QoS [88]. Table IV
delineates some of these protocols and their classification ( [80], [89]).
Table IV. Classification of some WSN MAC protocols
WSN MAC Protocol Organization Channel
SMACS Frames FDMA
T-MAC Slots Single
Page 19 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
WSN VANET
Temporal Awareness
Embedded
Systems
MANET/
Cellular WAN
Ad hoc
PAN
Network Size
Distributed
LAN
Computing
Super
Computing
Node
Functionality
Page 20 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
WSN are distinguishable from real-time embedded systems primarily due to the lack of spatial
awareness in embedded system nodes. Real-time embedded systems can include various other computing
paradigms, especially, infrastructureless mobile environments like Bluetooth personal area networks
(PAN), MANET, cellular networks, and ad hoc networks.
WSN are significantly different from traditional distributed and supercomputing paradigms.
Distributed computing includes paradigms such as, peer-to-peer (P2P) networks, grid and
high-performance computing. Apart from the lack of spatial and temporal awareness of the network
nodes, another fundamental difference lies in the functionality of the network nodes. Typically,
distributed and supercomputing paradigms consist of high performance powerful nodes, as illustrated in
Figure 8.
WSN applications are sensitive to spatial and temporal parameters and can be classified into
spatially and temporally related paradigms as follows. Firstly, in the spatial domain, WSN applications
can be broadly classified into local and global WSN applications based on the size and coverage of the
region of interest of the application. Similarly, WSN applications can also be temporally categorized into
continuous, event-driven, query-driven or hybrid applications (cf. Section 2.1.1, Figure 5). This imposes a
constraint on when the motes transmit data, either motes transmit data at periodic intervals, or transmit
only the data that exceeds application defined triggers or threshold levels, or only those motes transmit
data that meets a query criterion or a hybrid approach of these techniques. Figure 9 [49] broadly classifies
some WSN applications into these domains.
Spatial
Global
Environmental Monitoring
Military Surveillance
Industrial Monitoring and Control
Temporal
Periodic Event-Triggered Query
Page 21 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
an otherwise periodic sampling WSN application like environmental monitoring. Furthermore, periodic
sampling WSN applications like patient vitals health monitoring could quickly become query-based, if the
WSN for patient vitals monitoring is polled for specific vital reading. Therefore, WSN applications are
usually designed to operate in multiple temporal domains. Figure 9, illustrates these characteristics of
WSN applications and delineates some WSN application examples that accurately fit the domains.
Figure 10 [49] delineates the various design characteristics that form the intrinsic nature and
behavior of WSN applications and their motes. This directly influences the design for the components of
the network architecture of the WSN. The figure also summarizes the various WSN characteristics we
have discussed in this chapter.
WSN
Applications
Periodic
Sense-only Unicast Static Global
Event-triggered
Sense-and-respond Broadcast Mobile motes Local
Query
Multicast Mobile sinks
Many-to-many Hybrid
Page 22 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
systems (OS) are either event-driven or multithreaded [91]. Multithreaded OS are similar to traditional OS, therefore
easier for programmers to manage, however, infeasible for resource constrained WSN. Therefore, lightweight
multithreaded OS have been designed and implemented for WSN motes. Event-driven OS do not tax the resources
of the WSN motes but pose a learning curve for programmers of WSN applications. Farooq and Kunz [92] survey
and classify operating systems such as TinyOS, Contiki, and MANTIS, in WSN.
In the following section, we will discuss TinyOS, an operating system for WSN, and consider a
component-based approach to programming applications for WSNs using TinyOS.
Page 23 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
The Blink.nc configuration file shows how the components are wired together. A TinyOS application
starts by executing the init command of the StdControl interface of the Main component. Blink
configuration file wires the Main component’s StdControl to SingleTimer and Blink component
StdControl. This binds the implementation of Main.StdControl to SingleTimer.StdControl and
BlinkM.StdControl. The BlinkM.StdControl interface is implemented in the module file, BlinkM.nc.
Similarly, the Timer and Leds interfaces used in Blink actually invoke the Timer interface provided by
component SingleTimer, and Leds interface of component LedsC, respectively. Note, SingleTimer and
Leds provide software abstraction of the hardware components for the clock and LEDS.
The configuration file delineates how control of execution is passed amongst components. The module file
(BlinkM.nc) provides the application-specific implementation by providing and using interfaces.
BlinkM.StdControl. init() initializes the application and BlinkM.StdControl.start() starts the
component. When Blink starts, it sets the timer to repeat every 1,000 ms. In the event-driven operating system,
since, there is no other code to execute, Blink waits until event Timer.fired() is triggered. When the event
is triggered, Blink toggles the red LEDS.
The application is compiled for the target platform, any TinyOS compatible device, e.g. micaz motes, and
flushed on the mote hardware using a programming board, which interfaces a mote with the development
environment on a computer or laptop.
Page 24 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
5.0 Summary
Wireless Sensor Networks typically consist of large number of heterogeneous motes organized in
a hierarchical manner, to monitor and, or control a region of interest, based on ambient environment
factors. Generally, the number of motes deployed in the region increases and the resources decrease as
you move down the hierarchy. The mobile, infrastructure-less WSN are able to truly achieve untethered
communications in dangerous or mundane regions for autonomous data collection, analysis and response
via actuators. However, the greatest resource limitation of WSN is the power source, which must be
optimally used or alternatively harnessed to ensure network lifetime.
There is a lack of standards for traditional network concepts, like architecture, topology, routing
and security, since WSN are application specific in nature. Due to the different types of motes and
wireless sensor networks, there are interoperability issues amongst the heterogeneous hardware units [96].
Further limitations of WSN are attributed to the lack of software for programming and debugging motes
and WSN ( [49] and [90]).
Page 25 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
Energy conservation and power management in the radio and network communications are the
underlying design criteria for protocols and primitives in WSN. However, Bose and Helal [48], show that
advances in technology have allowed low-power radios, like the Atmel Zlink RCB [48] for effective use
in WSN and now attention needs to be on the sensor sampling technique, which consumes significantly
more energy than network and application costs. Anastasi et al [94] present a survey of energy
conservation techniques in WSN.
Furthermore, apart from energy conservation, security challenges in WSN are a make it or break
it criteria in the wide-spread use of WSN in all envisioned domains. Boyle and Newe [97] compare some
security protocols in use today in WSN, like SPIN [98], consisting of SNEP (Secure Network Encryption
Protocol) and µTESLA (micro version of Timed Efficient Stream Loss-tolerant Authentication), LEAP
[99] and TinySec [100], which aim at building security features into network protocols.
As recent routing protocols have gained from swarm intelligence, Kulkarni et al [101] discuss the
use of other computational intelligence paradigms like neural networks, fuzzy logic, evolutionary
algorithms, reinforcement learning and artificial immune system in designing and implementing effective
and efficient protocols and primitives for WSN operations like routing, deployment, localization, security,
scheduling, data aggregation and QoS management.
To summarize, in this chapter we considered the characteristics and features of Wireless Sensor
Networks and their motes. Furthermore, we reviewed the fundamental concepts in wireless sensor
networks pertaining to architecture, topology, data delivery models, transport, routing and data link layer
protocols. We also presented a classification of some of the protocols for transport, routing and data link
layers. We concluded with a discussion of TinyOS, an operating system for WSN motes, and exemplified
programming WSN motes in nesC.
Page 26 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
[2] H. Weinberg, "How They Work: MEMS (Micro Electro-Mechanical Systems) Technology," Sensorland,
[Online]. Available: http://www.sensorland.com/HowPage023.html. [Accessed 6 January 2012].
[3] I. F. Akyildiz, W. Su, Y. Sankarasubramainiam and E. Cayirci, "A Survey on Sensor Networks," IEEE
Communications Magazine, vol. 40, no. 8, pp. 102-114, 2002.
[4] I. F. Akyildiz and I. H. Kasimoglu, "Wireless sensor and actor networks: research challenges," Ad Hoc
Networks, vol. 2, no. 4, pp. 351-367, 2004.
[5] F. Xia, "QoS Challenges and Opportunities in Wireless Sensor/Actuator Networks," Sensors, vol. 8, no. 2, pp.
1099-1110, 2008.
[6] I. F. Akyildiz, T. Melodia and K. Chowdury, "A survey on wireless multimedia sensor networks," Computer
Networks, vol. 51, no. 4, pp. 921-960, 2007.
[7] L. Lamont, M. Toulgoat, M. Deziel and G. Patterson, "Tiered Wireless Sensor Network Architecture for
Military Surveillance Applications," in International Conference on Sensor Technologies and Applications
(SENSORCOMM), Nice/Saint Laurent du Var, France, 2011.
[8] M. A. Antepli, S. Z. Gurbuz and E. Uysal-Biyikoglu, "Ferromagnetic target detection and localization with a
wireless sensor network," in Military Communications Conference (MILCOM), San Jose, CA, 2010.
[9] J. Teng, H. Snoussi and C. Richard, "Decentralized Variational Filtering for Target Tracking in Binary Sensor
Networks," IEEE Transactions on Mobile Computing , vol. 9, no. 10, pp. 1465-1477, 2010.
[10] P. Medagliani, G. Ferrari, V. Gay and J. Leguay, "Cross-layer design and analysis of WSN-based mobile
target detection systems," Ad Hoc Networks, In Press, vol. July, 2011.
[12] P. Sikka, P. Corke, P. Valencia, C. Crossman, D. Swain and G. Bishop-Hurley, "Wireless adhoc sensor and
actuator networks on the farm," in International Conference on Information Processing in Sensor Networks,
Nashville, TN, 2006.
[13] W.-Z. Song, R. Huang, M. Xu, A. Ma, B. Shirazi and R. LaHusen, "Air-dropped sensor network for real-time
high-fidelity volcano monitoring," in International Conference on Mobile System, Applications and Services
(MobiSys 09), Krakow, Poland, 2009.
[14] M. Ceriotti, L. Mottola, G. P. Picco, A. L. Murphy, M. Corra, M. Pozzi, D. Zonta and P. Zanon, "Monitoring
heritage buildings with wireless sensor networks: The Torre Aquila deployment," in International Conference
on Information Processing in Sensor Networks (IPSN), San Francisco, CA, 2009.
[15] J. Ko, J. H. Lim, R. Muvaloiu-E, A. Terzis, G. M. Masson, T. Gao, W. Destler, L. Selavo and R. P. Dutton,
"MEDiSN: Medical emergency detection in sensor networks," ACM Transactions on Embedded Computing
Systems (TECS), vol. 10, no. 1, 2010.
[16] Y. Chen, W. Shen, H. Huo and Y. Xu, "A Smart Gateway for Health Care System Using Wireless Sensor
Network," in International Conference on Sensor Technologies and Applications (SENSORCOMM 10),
Page 27 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
[17] N. Ota, S. Ahrens, A. Redfern, P. Wright and X. Yang, "An Application-Driven Architecture for Residential
Energy Management with Wireless Sensor Networks," in IEEE International Conference on Mobile Adhoc
and Sensor Systems, Vancouver, Canada, 2006.
[18] H. Song, S. Zhu and G. Cao, "SVATS: A Sensor-Network-Based Vehicle Anti-Theft System," in IEEE
Conference on Computer Communications, Phoenix, AZ, 2008.
[19] M. Tubaishat, P. Zhuang, Q. Qi and Y. Shang, "Wireless sensor networks in intelligent transportation
systems," Wireless Communications and Mobile Computing, Special Issue: Distributed Systems of Sensors
and Actuators, vol. 9, no. 3, pp. 287-302, 2009.
[20] T. Vladimirova, C. P. Bridges, J. R. Paul, S. A. Malik and M. N. Sweeting, "Space-based wireless sensor
networks: Design issues," in IEEE Aerospace Conference, Big Sky, MT, 2010.
[21] D. Culler, J. Hill, M. Horton, K. Pister, R. Szewczyk and A. Woo, "MICA: The Commercialization of
Microsensor Motes," Sensors Magazine, 1 April 2002. [Online]. Available:
http://www.sensorsmag.com/networking-communications/mica-the-commercialization-microsensor-motes-
1070. [Accessed 1 February 2012].
[22] W. Merrill and W. Kaiser, "Wireless Integrated Network Sensors (WINS) Next Generation," Airforce
Research Laboratory, Rome, New York, 2004.
[23] "Wireless Applications - Moteiv launches wireless mote with interface to mobile devices," Sensors, 11 May
2007. [Online]. Available: http://www.sensorsmag.com/wireless-applications/news/moteiv-launches-
wireless-mote-with-interface-mobile-devices-2523. [Accessed 7 January 2012].
[24] J. Hill, M. Horton, R. Kling and L. Krishnamurthy, "The platforms enabling wireless sensor networks,"
Communications of the ACM , vol. 47, no. 6, pp. 41-46, 2004.
[25] M. Healy, T. Newe and E. Lewis, "Wireless Sensor Node hardware: A review," in IEEE Sensors , Lecce,
Italy, 2008.
[26] J. Yick, B. Mukherjee and D. Ghosal, "Wireless sensor network survey," Computer Networks(Elsevier), vol.
52, no. 12, pp. 2292-2330, 2008.
[27] Z. Sun and I. F. Akyildiz, "Magnetic Induction Communications for Wireless Underground Sensor
Networks," IEEE Transactions on Antennas and Propagation, vol. 58, no. 7, pp. 2426-2435, 2010.
[28] P. Bhuvaneswari, R. Balakumar, V. Vaidehi and P. Balamuralidhar, "Solar Energy Harvesting for Wireless
Sensor Networks," in International Conference on Computational Intelligence, Communication Systems and
Networks (CICSYN), Indore, India, 2009.
[29] W. K. Seah, Z. A. Eu and H.-P. Tan, "Wireless sensor networks powered by ambient energy harvesting
(WSN-HEAP) - Survey and challenges," in International Conference on Wireless Communication, Vehicular
Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE),
Aalborg, Denmark, 2009.
[31] T. Uchiyama, Y. Uehara, M. Mori, Saito, Hiroki and Y. Tobe, "A System for Analyzing Life Rhythm Using
Wireless Sensors on Mules," in International Conference on Mobile Data Management (MDM), Nara, Japan,
2006.
[32] K. Romer and F. Mattern, "The Design Space of Wireless Sensor Networks," IEEE Wireless
Page 28 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
[33] T. Naumowicz, R. Freeman, H. Kirk, B. Dean, M. Calsyn, A. Liers, A. Braendle, T. Guilford and J. Schiller,
"Wireless Sensor Network for habitat monitoring on Skomer Island," in IEEE Conference on Local Computer
Networks (LCN), Denver, CO, 2010.
[34] C.-L. Fok, G.-C. Roman and C. Lu, "Towards a flexible global sensing infrastructure," Special issue on the
workshop on wireless sensor network architecture, vol. 4, no. 3, pp. 1-6, 2007.
[35] J. Polastre, R. Szewczyk, A. Mainwaring, D. Culler and J. Anderson, "Analysis of wireless sensor networks
for habitat monitoring," in Wireless Sensor Networks, Norwell, MA, Kluwer Academic Publishers, 2004, pp.
399-423.
[36] P. Schoonmaker and W. Luscombe, "Habitat Monitoring: An Approach for Reporting Status and Trends For
State Comprehensive Wildlife Conservation Strategies," 22 March 2005. [Online]. Available:
http://www.defenders.org/resources/publications/programs_and_policy/biodiversity_partners/habitat_monitor
ing.pdf. [Accessed 8 January 2012].
[37] R. Agarwal, R. Martinez-Catala, S. Harte, C. Segard and B. O'Flynn, "Modeling Power in Multi-functionality
Sensor Network Applications," in International Conference on Sensor Technologies and Applications
(SENSORCOMM), Cap Esterel, France, 2008.
[38] W. Dargie, "Dynamic Power Management in Wireless Sensor Networks: State-of-the-Art," IEEE Journal on
Sensors, vol. PP, no. 99, 2011.
[39] K. Sohrabi, J. Gao, V. Ailawadhi and G. J. Pottie, "Protocols for self-organization of a wireless sensor
network," IEEE Personal Communications, vol. 7, no. 5, pp. 16-27, 2000.
[40] O. Saglam and M. E. Dalkili, "A Self Organizing Multihop Clustering Protocol for Wireless Sensor
Networks," in International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Fujian, China, 2009.
[41] R. Kacimi, R. Dhaou and A. Beylot, "Energy-Aware Self-Organization Algorithms for Wireless Sensor
Networks," in IEEE Global Telecommunications Conference (GLOBECOM), New Orleans, Louisiana, 2008.
[42] K. Berman, F. Annexstein and A. Ranganathan, "Dominating connectivity and reliability of heterogeneous
sensor networks," in IEEE International Conference on Pervasive Computing and Communications
Workshop (PerCom), Pisa, Italy, 2006.
[43] A. Abbasi, M. Younis and U. Baroudi, "Restoring Connectivity in Wireless Sensor-Actor Networks with
Minimal Topology Changes," in International Conference on Communications (ICC), Cape Town, South
Africa, 2010.
[44] A. Ghosh and S. K. Das, "Coverage and connectivity issues in wireless sensor networks: A survey,"
Pervasive and Mobile Computing, vol. 4, no. 3, pp. 303-334, 2008.
[45] P. Wang, Z. Sun, M. Vuran, M. A. Al-Rodhaan, A. Al-Dhelaan and I. F. Akyildiz, "On network connectivity
of wireless sensor networks for sandstorm monitoring," Computer Networks, vol. 55, no. 5, pp. 1150-1157,
2011.
[46] M. Lu, J. Wu, M. Cardei and M. Li, "Energy-efficient connected coverage of discrete targets in wireless
sensor networks," International Journal of Ad Hoc and Ubiquitous Computing, vol. 4, no. 3-4, pp. 137-147,
2009.
[47] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless and C. Gill, "Integrated coverage and connectivity
configuration in wireless sensor networks," in International Conference on Embedded Networked Sensor
Systems (SenSys), Los Angeles, CA, 2003.
Page 29 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
[48] R. Bose and A. Helal, "Sensor-Aware Adaptive Push-Pull Query Processing in Wireless Sensor Networks,"
in International Conference on Intelligent Environments (IE), Kuala Lumpur, Malaysia, 2010.
[49] L. Mottola and G. P. Picco, "Programming wireless sensor networks: Fundamental concepts and state of the
art," ACM Computing Surveys (CSUR), vol. 43, no. 3, 2011.
[50] S. Tilak, N. B. Abu-Ghazaleh and W. Heinzelman, "A taxonomy of wireless micro-sensor network models,"
ACM SIGMOBILE Mobile Computing and Communications Review, vol. 6, no. 2, pp. 28-36, 2002.
[51] L. Villalba, O. A, A. Cabrera and C. Abbas, "Routing Protocols in Wireless Sensor Networks," Sensors, vol.
9, no. 11, pp. 8399-8421, 2009.
[52] K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Elsevier Ad Hoc
Networks, vol. 3, no. 3, pp. 325-349, 2005.
[53] D. Niculescu, "Communication paradigms for sensor networks," Communications Magazine, vol. 43, no. 3,
pp. 116-122, 2005.
[54] J. Paek and R. Govindan, "RCRT: rate-controlled reliable transport for wireless sensor networks," in
Proceedings of the 5th international conference on Embedded networked sensor systems (SenSys '07),
Sydney, Australia, 2007.
[55] A. J. D. Rathnayaka and V. M. Potdar, "Wireless Sensor Network transport protocol: A critical review,"
Journal of Network and Computer Applications, 2011.
[56] M. Vuran and I. Akyildiz, "XLP: A Cross-Layer Protocol for Efficient Communication in Wireless Sensor
Networks," IEEE Transactions on Mobile Computing , vol. 9, no. 11, pp. 1578-1591, November 2010.
[57] J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wirless
Communications, vol. 11, no. 6, pp. 6-28, 2004.
[58] Z. Wang, E. Bulut and B. K. Szymanski, "Energy Efficient Collision Aware Multipath Routing for Wireless
Sensor Networks," in IEEE International Conference on Communications , Dresden, Germany, 2009.
[59] R. C. Shah and J. M. Rabaey, "Energy aware routing for low energy ad hoc sensor networks," in IEEE
Wireless Communications and Networking Conference, Orlando, Florida, 2002.
[60] J. H. Chang and L. Tassiulas, "Maximum lifetime routing in wireless sensor networks," IEEE/ACM
Transactions on Networking , vol. 12, no. 4, pp. 609-619, 2004.
[61] S. Dulman, T. Nieberg, J. Wu and P. Havinga, "Trade-off between traffic overhead and reliability in
multipath routing for wireless sensor networks," in IEEE Wireless Communications and Networking, New
Orleans, LA, 2003.
[62] K. Saleem, N. Fisal, S. Hafizah, S. Kamilah and R. Rashid, "A Self-Optimized Multipath Routing Protocol
for Wireless Sensor Networks," International Journal of Recent Trends in Engineering (IJRTE), vol. 2, no. 1,
pp. 93-97, 2009.
[63] S. Okdem and D. Karaboga, "Routing in Wireless Sensor Networks Using an Ant Colony Optimization
(ACO) Router Chip," Sensors, vol. 9, no. 2, pp. 909-921, 2009.
[64] M. Saleem, G. A. Di Caro and M. Farooq, "Swarm intelligence based routing protocol for wireless sensor
networks: Survey and future directions," Elsevier Information Sciences, vol. 181, no. 20, pp. 4597-4624,
2011.
[65] J. Kulik, W. Heinzelman and H. Balakrishnan, "Negotiation-based protocols for disseminating information in
wireless sensor networks," Wireless Networks, vol. 8, no. 2/3, pp. 169-185, 2002.
Page 30 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
[66] X. Huang and Y. Fang, "Multiconstrained QoS multipath routing in wireless sensor networks," Wireless
Networks, vol. 14, no. 4, pp. 465-478, 2008.
[67] B. Kusy, H. J. Lee, M. Wicke, N. Milosavljevic and L. Guibas, "Predictive QoS routing to mobile sinks in
wireless sensor networks," in International Conference on Information Processing in Sensor Networks
(IPSN), San Francisco, CA, 2009.
[68] J. Ben-Othman and B. Yahya, "Energy efficient and QoS based routing protocol for wireless sensor
networks," Elsevier Journal of Parallel and Distributed Computing, vol. 70, no. 8, pp. 849-857, 2010.
[69] Y. Chen, N. Nasser, T. El Salti and H. Zhang, "A multipath QoS routing protocol in wireless sensor
networks," International Journal of Sensor Networks, vol. 7, no. 4, pp. 207-216, 2010.
[70] Y. Zhou, Y. Fang and Y. Zhang, "Securing wireless sensor networks: a survey," IEEE Communications
Suveys & Tutorials, vol. 10, no. 3, pp. 6-28, 2008.
[71] J.-P. Sheu, J.-R. Jiang and C. Tu, "Anonymous Path Routing in Wireless Sensor Networks," in IEEE
International Conference on Communications (ICC), Beijing, China, 2008.
[72] Z. Zhang, C. Jiang and J. Deng, "A secure anonymous path routing protocol for wireless sensor networks," in
IEEE International Conference on Wireless Communications, Networking and Information Security
(WCNIS), Beijing, China, 2010.
[73] T. Zahariadis, H. Leligou, S. Voliotis, S. Maniatis, P. Trakadas and P. Karkazis, "Energy-aware secure
routing for large wireless sensor networks," World Scientific and Engineering Academy and Society (WSEAS)
Transactions on Communications, vol. 8, no. 9, pp. 981-991, 2009.
[74] S. Singh, M. Singh and D. Singh, "Routing Protocols in Wireless Sensor Networks-A Survey," International
Journal of Computer Science and Engineering Survey (IJCSES), vol. 1, no. 2, 2010.
[75] A. Koliousis and J. Sventek, "Proactive vs reactive routing for wireless sensor networks," Department of
Computing Science, University of Glasgow, Glasgow, Scotland, 2007.
[76] X. Du and F. Lin, "Improving routing in sensor networks with heterogeneous sensor nodes," in Vehicular
Technology Conference, Stockholm, Sweden, 2005.
[77] H. Kim, T. Abdelzaher and W. Kwon, "Minimum-energy asynchronous dissemination to mobile sinks in
wireless sensor networks," in 1st international conference on Embedded networked sensor systems (SenSys
'03), Los Angeles, CA, 2003.
[78] Y. Yao and J. Gehrke, "The cougar approach to in-network query processing in sensor networks," ACM
SIGMOD Records, vol. 31, no. 3, pp. 9-18, 2002.
[79] S. Lindsey and C. Raghavendra, "PEGASIS: Power-efficient gathering in sensor information systems," in
IEEE Aerospace Conference, Big Sky, MT, 2002.
[80] K. Langendoen and G. Halkes, "Energy Efficient Medium Access Control," in Embedded Systems Handbook,
CRC Press, 2005, pp. 34.1-34.29.
[82] W. Ye, J. Heidemann and D. Estrin, "An energy-efficient MAC protocol for wireless sensor networks," in
INFOCOM 2002, 21st Annual Joint Conference of IEEE Computer and Communications Societies, New
York , 2002.
[83] M. Buettner, G. V. Yee, E. Anderson and R. Han, "X-MAC: a short preamble MAC protocol for duty-cycled
wireless sensor networks," in Proceedings of 4th International Conference on Embedded Networked Sensor
Page 31 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
[84] Q. Ren and Q. Liang, "An Energy-Efficient MAC Protocol for Wireless Sensor Networks," in IEEE
Globecom, St. Louis, MO, 2005.
[85] A. Bachir, M. Dohler, T. Watteyne and K. Leung, "MAC Essentials for Wireless Sensor Networks," IEEE
Communications Surveys & Tutorials, vol. 12, no. 2, pp. 222-248, 2010.
[86] P. Rao, R. Rani, S. Sankar, K. Pradeep, N. Kumar and V. Kumar, "Secure MAC for Wireless Sensor
Networks through RBFNN," International Journal of Engineering Science and Technology, vol. 2, no. 8, pp.
3510-3514, 2010.
[87] Q. Hu and Z. Tang, "ATPM: An Energy Efficient MAC Protocol with Adaptive Transmit Power Scheme for
Wireless Sensor Networks," Journal of Multimedia, vol. 6, no. 2, pp. 122-128, 2011.
[88] M. Yigitel, O. Incel and C. Ersoy, "QoS-aware MAC protocols for wireless sensor networks: A survey,"
Elsevier Computer Networks, vol. 8, no. 1, pp. 1982-2004, 2011.
[89] K. Langendoen, "The MAC Alphabet Soup served in Wireless Sensor Networks - Taxonomy," Delft
University of Technology, 16 March 2011. [Online]. Available:
http://www.st.ewi.tudelft.nl/~koen/MACsoup/taxonomy.php. [Accessed 12 July 2012].
[90] R. Sugihara and R. K. Gupta, "Programming models for sensor networks: A survey," ACM Transactions on
Sensor Networks (TOSN), vol. 4, no. 2, 2008.
[91] M. Farooq and T. Kunz, "Operating Systems for Wireless Sensor Networks: A Aurvey," Sensors, vol. 11, no.
6, pp. 5900-5930, 2011.
[92] D. Gay, P. Levis, R. von Behren, M. Welsh, E. Brewer and D. Culler, "The nesC language: A holistic
approach to networked embedded systems," in In Proceedings of the ACM SIGPLAN 2003 conference on
Programming language design and implementation (PLDI '03), New York, 2003.
[93] P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer
and D. Culler, "TinyOS: An Operating System for Sensor Networks," in Ambient Intelligence, New York,
Springer, 2005, pp. 115-148.
[94] G. Anastasi, M. Conti, M. Di Francesco and A. Passarella, "Energy conservation in wireless sensor networks:
A survey," Elsevier Ad Hoc Networks, vol. 7, no. 3, pp. 537-568, 2009.
[95] TinyOS, "TinyOS Tutorial Lesson 1: Getting Started with TinyOS and nesC," 9 September 2003. [Online].
Available: http://www.tinyos.net/tinyos-1.x/doc/tutorial/lesson1.html. [Accessed 8 Jan 2012].
[96] R. Thusu, "Wireless Sensor Use Is Expanding in Industrial Applications," Sensors, 1 June 2010. [Online].
Available: http://www.sensorsmag.com/networking-communications/wireless-sensor/wireless-sensor-use-is-
expanding-industrial-applications-7212. [Accessed 8 January 2012].
[97] D. Boyle and T. Newe, "Security Protocols for Use with Wireless Sensor Networks: A Survey of Security
Architectures," in International Conference on Wireless and Mobile Communications (ICWMC),
Guadeloupe, French Caribbean, 2007.
[98] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen and D. Culler, "SPINS: security protocols for sensor networks,"
Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
[99] S. Zhu, S. Setia and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor
networks," in ACM Conference on Computer and Communications Security, Washington D.C., 2003.
[100] C. Karlof, N. Sastry and D. Wagner, "TinySec: a link layer security architecture for wireless sensor
networks," in International Conference on Embedded Networked Sensor Systems (SenSys), Baltimore, MD,
Page 32 of 33
This is a pre-print version for educational purpose only. The respective copyrights are with the publisher.
2004.
[101] "Computational Intelligence in Wireless Sensor Networks: A Survey," IEEE Communications Surveys &
Tutorials, vol. 13, no. 1, pp. 68-96, 2011.
Page 33 of 33