Paper Menu >>
Journal Menu >>
Wireless Sensor Network, 2009, 1, 257-267 doi:10.4236/wsn.2009.14032 Published Online November 2009 (http://www.scirp.org/journal/wsn). Copyright © 2009 SciRes. WSN Wireless Sensor Network Management and Functionality: An Overview Dimitrios GEORGOUL AS, Keith BLOW Adptive Communication Networks Research Group, EE, Aston University, Aston Triangle, B47ET, United Kingdom Email: dimitriosgeorgoulas@yahoo.com Received March 23, 2009; revised May 5, 2 009; accepted June 12, 2009 Abstract Sensor networks are dense wireless networks of small, low-cost sensors, which collect and disseminate en- vironmental data. Wireless sensor networks facilitate monitoring and controlling of physical environments from remote locations with better accuracy. They have applications in a variety of fields such as environ- mental monitoring; military purposes and gathering sensing information in inhospitable locations. Sensor nodes have various energy and computational constraints because of their inexpensive nature and adhoc method of deployment. Considerable research has been focused at overcoming these deficiencies through more energy efficient routing, localization algorithms and system design. Our survey presents the funda- mentals of wireless sensor network, thus providing the necessary background required for understanding the organization, functionality and limitations of those networks. The middleware solution is also investigated through a critical presentation and analysis of some of the most well established approaches. Keywords: Wireless Sensor Networks, Organization, Functionality, Middleware 1. Introduction Wireless sensor networks have been identified as one of most important technologies for the 21st century [1]. As technologies advance and hardware prices drop, wireless sensor networks will find more prosperous ground to spread in areas where tradition al networks are inadequ ate. The foundational conc ept which applies in a vast number of networks can be identified through the simple notion: Sensing Capabilities plus CPU Power plus Radio Trans- mission equals a powerful framework for deploying thousands of potential app lications. However, this notion is underlined by some complex and detailed understanding of each separate network components capabilities and limitations as well as under- standing in areas of modern network management and distributed systems theory. The primary goal of wireless sensor networks is to make useful measurements for as long as possible. To do this it is essential to minimize en ergy use b y reducing the amount of communication between nodes without sacri- ficing useful data transmission. Each node is designed in an interconnected web that will grow upon the deploy- ment in mind. Wireless sensor networks are highly dy- namic and susceptible to network failures, mainly be- cause of the physically harsh environments that they are deployed in and connectivity interruptions [2]. To make the wireless sensor network dream a reality, an architecture must be developed that will monitor and control the node communication in order to optimize and maintain the performance of the ne twork, ensure that the network operates properly and control/instruct a set of cluster nodes without human intervention [3]. In order to develop a system architecture with the above characteristics, we focus explicitly on the functions and the roles of wireless network management systems. Additionally, we present the middleware concept as a novel solution to the limitations that wireless sensor net- works inhabit. A number of network systems are pre- sented, critical reviewed and categorized. 2. Network Management Systems Around 1980s computer networks began to grow and be interconnected in a large scale. This growth produced problems in maintaining and managing those networks, thus the need of network management was realized. To- day, networks are far more dynamic and interconnected 258 D. GEORGOULAS ET AL. than before, especially in the area of wireless sensor networks, thus a managing infrastructure is one of the most basic requirement for monitoring and controlling such networks [4]. A network management system can be defined as a system with the ability to monitor and control a network from a central location. Ideally there are four key func- tional areas that this system must support [5]: 1) Fault Management: This area provides the facilities that allow the discovery of any kind of faults that the managed devices of the network will produce, determin- ing in parallel the possible causes of such errors. Thus, the fault management function should provide mecha- nisms for error detection, correction, log reports and di- agnostics preferably without the user interference. 2) Configuration Management: Responsible for moni- toring the entire network configuration information and also having access to all the managed devices in terms of reconfigure, operate and shut down if necessary. 3) Performance Management: Responsible for meas- uring the network performance through analysis of sta- tistical data about the system so that it may be main- tained at an acceptable level. 4) Security Management: This area provides all those facilities that will ensure that access to network resources can not be obtained without the proper authorization. In order to do so, it provides mechanisms for limiting the access to network resources and provides the end user with notifications of security breeches and attempts. Those four functional areas of network management are far more challenging and vital for a network that will consist of tiny sensors which can be supplied to a spe- cific environment running applications such as habitat monitoring, microclimate research, medical care and structural monitoring [6]. For every sensor network application, the network is presented as a distributed system consisting of many autonomous nodes that co- operate and coordinate their actions based on a prede- fined architecture. Every node is assigned with a specific role inside the network such as data acquisition and processing. Also, nodes can be used as data aggregation and caching points in order to redu ce the communication overhead [7]. 3. The System Organization of a Sensor Network System The organization of sensor network systems is based upon the approach that they will adapt in order to moni- tor and control the state of the wireless sensor network. There are four predominant approaches [8]: Passive Monitoring: The system role is to collect data during the lifetime of the network. The data will identify the state of the network in different time intervals without any action taking place dur- ing the data gathering. An analysis of the data will take place in later stages. Fault Detection Monitoring: The system dedicates its resources to identifying faults and errors during the lifetime of the network. All the information is gathered and reported back to the operator whose responsibility is to correct those problems in later stages. No action is taken by the system towards the resolution of those problems in real time. Reactive Monitoring: The system has a double role to accomplish during the lifetime of the network. Firstly, as we identified in the pr evious approaches, the collection of data that will provide information about the states of the network, is the main role. This time though, the system will be eligible to identify and detect any events and act upon them in real time mainly by altering the parameters of the fixed asset under its control. Proactive Monitoring: The system collects and analyzes all the incoming data concerned with the state of the network. Then an analysis is taking place similar to the one of the reactive monitoring with the big difference that certain events, de- scribed by the collected information, are stored. The system is then able to maintain better available network performance by predicting future events based on past o nes. Wireless sensor systems can be categorized according to their architecture which can be centralized, hierarchi- cal or distributed [9]. The centralized one identifies the role of the base station as the most important one in the whole architecture. The base station will collect the in- formation from all the nodes and will monitor and con- trol the entire network. Benefits to this architecture can be found in areas of processing power and decision making. A base station with unlimited power resources can perform complex analysis of data and process a vari- ety of information, reducing the weight of this energy consuming task from the nodes of the network. The distributed architecture focuses on the deployment of multiple manager stations across the network usually in a web based format. Thus, each substation can coor- dinate its actions and co-operate based on knowledge that it can acquire from a neighboring substations. In this approach, the communication cost is less than the centralized one and more energy efficient since all the workload will be distributed evenly across the network. However, due to the scalability and complexity of wire- less sensor networks it is proven quite difficult to man- age and quite expensive in terms of memory cost. The hybrid between the centralized and distributed approach is that of the hierarchical one. In this architec- ture we have the existence of substations in the network but this time no communication is allowed between them. The design tends to be cluster based, with the heads of the cluster be responsible for a set of network nodes in Copyright © 2009 SciRes. WSN D. GEORGOULAS ET AL. 259 Copyright © 2009 SciRes. WSN terms of processing and transmitting information. All the cluster heads will report back to a single base station. work. Figure 1 is demonstrating this classification. 4. The Functionality of a Sensor Network System The main functionality of sensor network systems is based on the theory behind network management systems, thus is focusing on two attributes those of monitor and control. In this section, we classify some well known sensor systems in terms of the functionality they provide inside the net- Figure 1. The functionalities of wireless sensor networks in different categories. Figure 2. The BOSS architecture, song et al 2005. 260 D. GEORGOULAS ET AL. Copyright © 2009 SciRes. WSN Two characteristic examples of wireless sensor net- works that are based on traditional management sys- tems are those of MANNA [10] and BOSS [11]. MANNA provides a general architecture for managing a wireless sensor network by using a multidimensional plane for the functional, physical and the informational architecture of the network. The functional plane is responsible for the configuration of the application specific entities, the information plane is object ori- ented and specifies all the syntax and semantics that will be exchanged between the entities of the network and lastly the physical plane establishes, according to the available protocols profiles, the communication interfaces for the management entities that will be pre- sent inside the network. The BOSS architecture, Figure 2, is based on the tra- ditional method of the standard service discovery pro- tocol, UpnP. With the UpnP protocol the user does not need to self configure the network and devices in the network automatically will be discovered. However, due to computational power consumption required by the devices and memory space allocation limitations, the protocol itself is not suitable for tiny sensor devices. BOSS architecture is overcoming this problem by act- ing as a mediator between UpnP networks and sensor nodes. In order to do that, it combines four different components: service manager, control manager, service table and a sensor network management service, under the same framework. Routing protocols is another alternative way of moni- toring and controlling a wireless network when they get embedded in an application with examples such as LEACH [12] a nd GAF [1 3]. LEACH is a routing protocol for users that want re- motely to monitor an environment. The protocol is build upon two foundational assumptions. The first one ac- knowledges that the base station is at a fixed poin t and in a far distance from the network nodes and the second one assumes that all nodes in the network are homogeneous and energy constrained. In order to maximize the system lifetime and coverage, LEACH is using a set of methods such as distributed cluster formation with randomized selection of cluster heads and local processing. LEACH dynamic clustering method, splits time in fixed intervals with equal length. Also, it does not allow clusters and cluster heads to be at a fixed point inside the network. LEACH, dictates that once other sensors of the network receive a message they will join a cluster with the stronger signal cluster head. GAF, which stands for geographic adaptive fidelity, focuses its architecture on the extension of the lifetime of the network by exploiting node redundancy. This node redundancy is achieved by switching off unnecessary sensor nodes in the network without any effect on the level of routing fidelity. Figure 3. The GAF nodes state transitions, xu et al 2001. GAF recognizes three transition states for the nodes, Figure 3, active, sleeping and discovery. Initially all nodes in the network are in a discovery state. This means that all nodes will turn their radio on and exchange dis- covery messages in order to identify neighbor nodes in the same grid. When a node is active it will set a timeout, Ta, that will determine for how long it will stay in that state before it returns back to the discovery state. While active, the node periodically re-broadcasts its discovery message at time intervals, Td. The sleeping state is regu- lated by a time interval Ts which is dependent upon the application. GAF assumes that sensor nodes can identify their location in the forming virtual grid with the use of GPS cards. Systems, such as WinMS [14] and Sympathy [15] fo- cus more on the importance of fault detection in a wire- less sensor network. WinMS uses a novel management function, called systematic resource transfer, in order to provide automatic self-configuration and self-stabiliza- tion both locally and globally for the given wireless sen- sor network. This function allows the network, in case of a failure, to have a predetermined period of time where nodes will listen to their environment activities and self- configure. No prior knowledge of the topology of the network is necessary. WinMS, uses a TDMA-based MAC protocol, called FlexiMAC [14], in order to sup- port resource transfer among nodes in the network. FlexiMac protocol provides synchronized communica- tion between the nodes. Thus, it can adaptively adjust the network by providing local and central recovery mecha- nisms. Sympathy is a tool for detecting and debugging fail- ures in wireless sensor networks, but unlike WinMS it does not provide any automatic network reconfiguration incase of a failure. One of the main functionalities of the system is the collection and an alysis of network informa- tion metrics such as nodes next hop and neighbors. By doing so, it is able to iden tify which of the nodes deliver insufficient data to the sink node or to the base station and locate the cause by reporting back to the end user. One of the major advantages of Sympathy is th at it takes into account interactions upon multiple nodes however, by doing so it will require nodes to exchange neighbor- hood lists, something that has proven highly costly in terms of energy levels. D. GEORGOULAS ET AL. 261 sualization of the actual netwo rk. Th for collecting da of wireless se t provide any interpretation of the displayed gr ms such as the A to sleep when they are not active inside th ide traffic management functions in th single radio nodes to evaluate each of their in stems in terms of their organization and func- tio ole of Middleware in Wireless Sensor Networks identified, that a middleware side a wireless sensor network can establish a frame- Another very useful functionality of wireless sensor systems is that of the vi is ability of an end user to demonstrate graphical rep- resentations of the different states of the network at various time intervals can be found in systems such as the TinyDB [16] and MOTE-VIEW [17]. TinyDB is a distributed query processor for sensor networks. It uses an SQL like interface ta from nodes in the given environment and also pro- vides aggregation, filtering and routing of the acquired results back to the end user. With the use of a declarative language for specific user queries, TinyDB proves to be flexible in two domains. Firstly, all the queries that are generated are easy to read and understand and secondly the underlying system will be responsible for the genera- tion and the modifications of the query without the query itself to need any modifications. In the core of the system we find a metadata catalog that identifies the commands and attributes that are available for querying. The MOTE-VIEW system is an interface system be- tween the end user and the deployed network nsors. Through this interface the user can make altera- tions to node characteristics in terms of radio frequency, sampling frequency and transmission power. The system architecture is based on four layers; data access abstrac- tion, node abstraction, conversion abstraction and visu- alization abstraction layer. The data abstraction layer acts as the database interface where all the data is been stored. The node abstraction layer collects and stores all the nodes metadata which will create relatio nal links with the database. All the raw data that is going to be collected from the nodes will be translated into understandable en- gineering units at th e conversion abstraction layer. Finally, the visualization abstraction layer will provide to the end user displays of the data in forms of spreadsheets and charts. MOTE-VIEW is a passive monitor system in that it does no aphical data on behalf of the user. However, in terms of network and other failures MOTE-VIEW does not provide any self-configuration scheme. The resource management is one of the key aspects of every wireless sensor network. Syste gent Based Power Management [18] and SenOS [19] have been created with that concern in mind. The Agent Based Power Management is a system that builds its ar- chitecture upon mobile agents. These intelligent entities are set responsible for local power management process- ing by applying energy saving strategies to the nodes of the network. This agent-based scheme is suitable for ap- plications where the state of the ne twork is partial visible at a known time or location. One of the major concerns of this approach is that by minimizing the transmission power, the communication range of the nodes will be reduced accordingly, threatening the network connec- tivity. SenOS is managing network power resources by in- structing nodes e network. To achieve this, SenOS adapts a dynamic power management algorithm known as DPM. The DPM algorithm, by observing events inside the net- work, can generate a policy for state transitions. Based on that, all redundant nodes are placed inside a cluster with only one node awake for a period of time per cluster while the others are in a sleep mode for con- serving energy. The SenOS architecture is based on a finite state machine which consists of three compo- nents. Firstly, we have the kernel which provides a state sequencer and an event queue. The second com- ponent is a transition table and the final component is a call back library. Siphon [20] and DSN RM [21] are two representative systems that prov eir architecture. Siphon, is based on a Stargate imple- mentation of virtual sinks in order to prevent congestion at near base stations inside the network. These virtual sinks act as intermediates between the actual nodes and the base stations and they are d istributed rando mly inside the network. If at any point the rate of generate data in- creases beyond a level that exists in a predetermined threshold inside the system then the virtual sinks will redirect the traffic to other visible nodes. The visibility of the available nodes by the virtual sinks is one of the disadvantages of this approach, as there is a high prob- ability that some nodes will be not cov ered by any virtual sink. DSN RM (Distributed sensor network resource man- agement) uses coming and outgoing data rate and apply delay schemes to those nodes when necessary in order to reduce the amount of the traffic in the network. In every DSN there are a number of decision stations whose role is to act as data managers in a hierarchical format. However, the ef- fectiveness of this technique is tightly bound on finding reliable data for every decision station inside the wireless sensor network that from its nature can provide inaccurate data during its lifetime due to connectivity and radio problems. Table 1 presents a tabular evaluation of the currently available sy nality. 5. The R M inany researchers have work for bridging the gap between applications and low levels constructs such as the physical layer of the sensor nodes. Copyright © 2009 SciRes. WSN 262 D. GEORGOULAS ET AL. Copyright © 2009 SciRes. WSN ms designed criteria. Wireless sensor Reactivity Architecture Function Energy efficiencyAdaptability Memory Scalability Table 1. Wireless sensor ne twork systeevaluation based on Netw ork Systems efficiency BOSS PrCeManage oactive ntralised ment SystemYes Yes Yes Yes MANNA S ol IEW ces Proactive HierarchicalManagement System N/A N/A N/A N/A LEACH Proactive Distributed Routing Protocol Yes Yes Yes Yes GAF Proactive Distributed Routing Protocol Yes Yes Yes Yes WinMProactive HierarchicalFault Detection Yes Yes Yes Yes SympathyProactive Centralised Fault Detection Yes Yes Yes No TinyDB Passive Centralised Visualization ToYes No Yes Yes MOTE- VPassive Centralised Visualization Tool Yes No Yes Yes SensOS ReactiveHierarchicalManagement resourYes No Yes No A. B. P. M Proactive Distributed Management resources Yes Yes Yes No DSNRM Proactive HierarchicalTraffic Control Yes Yes No No Siphon Proactive Distributed Traffic Control No Yes Yes No A middleware can be visualized as a network manag- in section identifies some of the most well known m machine inside a middleware is a fle 22] middleware is among those that use a vi with content specific rou ting. This section identifies some of the most well known ntexts that refer to an equal amount of events: clock timers, message receptions and message send re- g software mechanism that will create communication bonds with the network hardware, the operating system and the actual application. A fully implemented middle- ware should provide to the end user a flexible interface through which actions of coordination and support will take place for multiple applications preferably in real time. This iddleware approaches that have been developed in re- cent years and classifies them according to their pro- gramming paradigm. This classification presents mid- dlewares as virtual machines based on modular pro- gramming, virtual database systems and adaptive mes- sage oriented s ystems. The use of a virtual xible approach since it can allow a programmer to partition a large application into smaller modules. The middleware will inject and distribute those modules in- side the wireless sensor network with the use of a prede- fined protocol that will aim to reduce the overall energy and resource consumption. The main role of the virtual machine is to interpret those distributed modules. The communication protocol can be designed based on modular programming. The use of mobile code can fa- cilitate an energy efficient framework for the injection and the transmission of the application modules inside the network. The Mate [ rtual machine in order to send applications inside the wireless sensor network. The developers having identi- fied the predominant limitations of wireless sensor net- works such as energy consumption and limited band- width propose a new programming paradigm that is based on a tiny centric virtual machine that will allow complex programs to be very short. In order to achieve that, Mate’s virtual machine acts as an abstraction layer middleware approaches that have been developed in re- cent years and classifies them according to their pro- gramming paradigm. This classification presents mid- dlewares as virtual machines based on modular pro- gramming, virtual database systems and adaptive mes- sage oriented s ystems. The use of a virtual machine inside a middleware is a flexible approach since it can allow a programmer to partition a large application into smaller modules. The middleware will inject and distribute those modules in- side the wireless sensor network with the use of a prede- fined protocol that will aim to reduce the overall energy and resource consumption. The main role of the virtual machine is to interpret those distributed modules. The communication protocol can be designed based on modular programming. The use of mobile code can fa- cilitate an energy efficient framework for the injection and the transmission of the application modules inside the network. The Mate [22] middleware is among those that use a virtual machine in order to send applications inside the or network. The developers having identi-wireless sens fied the predominant limitations of wireless sensor net- works such as energy consumption and limited band- width propose a new programming paradigm that is based on a tiny centric virtual machine that will allow complex programs to be very short. In order to achieve that, Mate’s virtual machine acts as an abstraction layer with content specific rou ting. Figure 4 presents Mate architecture and execution model. This high level architecture will enable the pro- gramming code to break up into small capsules of 24 instructions each that can self-replicate inside the net- work. This architecture enables Mate to begin execution in response to a specific event such as a packet transmission or a time out. This is applicable thro ugh the three execu- tion co D. GEORGOULAS ET AL. 263 Figure 4. Mate architectural concept, P. Levis and D. Culler (2002). quests. Each of the three contexts has an operant stack and a return address one. The operant stack will be used stack will handle all the subroutine calls. very capsule that is sent inside the network includes suffers fr s based on the fact that ea work no ding and working independently. Their inter- co p- tio al database system. The m ta to be a virtual rela- tio for instructions handling all the data while the return address E a type and a version number. Based on that information, Mate can achieve easy version updates by adding a new number to the capsule every time a new version of the program is uploaded. However, Mate middleware om the overhead that every new message introduces and also all the messages are transmitted by flooding the network in order to minimize asynchronous events noti- fications, raising issues with the energy consumption of every node inside the network. Agilla [23] is a middleware that provides a mobile code paradigm for programming and making effective use of a wireless sensor network. Agilla applications consist of mobile agents that can clone or migrate across the network. The framework i ch agent is acting as an autonomous entity inside the network allowing the developer to run parallel processes at the same time. Agilla is based on the Mate architecture in terms of the virtual machine specifications but unlike Mate, which as we described above divides an applica- tion into capsules flooding the network, Agilla uses mo- bile agents in order to deploy an application . Figure 5 presents the Agilla model identifying the communication principle between two neighbor net des. In every network node we can have one or more agents resi mmunication and coordination is established by local tuple spaces that are accessible by all the agents resident in that node and a neighbor list. The local tuple space is a shared memory architecture that is addressed by field-matching. A tuple can be defined as a sequence of data objects that is inserted into the tuple space of each node by every agent. These data objects will remain in the node regardless of the agent status. In due time, an agent can retrieve an old tuple by template matching. In order to do so the sending agent must generate a query for that tuple, matching the exact same sequence of fields. The neighbor list contains the addresses of neighboring nodes and is accessible for every agent in the network that wants to clone or migrate in a different location. Based on these attributes, Agilla allows network re- programming thereby eliminating the power consum n cost of flooding the network. However, the lack of a hierarchical communication model for the agent society and the absence of precise real location information of every node in the network can lead to deadlocks and memory management problems. What is known as a database middleware will visual- ize the whole network as a virtu iddleware in this case will provide the user with an interface for sending queries to the sensor nodes of the system to extract the desired data. The Cougar middleware adopts the above approach by considering the extracted sensor da nal database. The developers by using an SQL-like language assume that the whole network is the database. The contents of such a database are stored data and the sensor data. The stored data is represented as a virtual relationship between the sensors that participate in the network and the physical characteristics. The sensor data which is the outcome of processing functions is repre- sented as time series that will be adapted towards the query formul ation. Figure 5. The Agilla architectural concept, C. Fok and G. Roman (2005). Copyright © 2009 SciRes. WSN 264 D. GEORGOULAS ET AL. Figure 6. Cougar architecture for query processing, G. Gehrke and S. Madden (2002). Figure 6 shows a block diagram that can explain the Cougar architecture for querying processing. One block presents the user end with the base station in the active role of transmitting and receiving queries from the wireless sensor network. The second block presents the distributed network query processor that consists of a number of abstract data types with virtual relation- ships with the operating system of the network. In an SQL query format of SELECT-FROM-WHERE- GROUP-INCLUD ccess this object relational database which mirrors the act odel. This model defines three distinct fa ES Cougar can allow the user to aual network. The third class of middleware is message oriented. Their core architecture is based on creating a communi- cation model that will facilitate message exchanges be- tween nodes and the sink nodes of the wireless sensor network. To achieve that most middlewares will adapt a publish-subscribe mechanism, an asynchronous commu- nication paradigm which allows a loose coupling be- tween the sender and the receiver saving precious power resources. Mires [24] middleware provides such an asynchronous communication m ces for the nodes resident in the network. Initially the network nodes will advertise their sensed data (topic). Using a multi-hop routing algorithm Mires will route those advertisement messages to the sink node. Lastly, a user application interface will select the desired adver- tised topics to be monitored. Figure 7. The Mires architecture, E. Souto and G. Vascon- celos (2004). Figure 7 demonstrates the key characteristics of the Mires architecture. The bottom block consists of the hardware components of the node which are directly interfaced and controlled by the operating system. The middleware is placed on top of the operating system to implement its publish-subscribe communication model. This model is able to advertise the sensor data (topics) provided by the running application while it maintains a topic list provided by the node application. Mires send only messages referring to subscribed topics thus reduc- ing like that the numbers of the transmitted packets and therefore saving energy. Copyright © 2009 SciRes. WSN D. GEORGOULAS ET AL. 265 6. Towards the Design of the In-Motes Middleware In order to design and develop a successful middleware solution for a wireless sensor network th at will be able to satisfy some if not all the functionalities of a network management system for monitor and control there are certain design criteria, which we described in the previ- ous sections, and must be considered and brought for- ward in our design. In the following paragraphs we are going to present those design principles for a substantial middleware development. A wireless sensor network consists of tiny devices that are battery powered and provided with a sml environments. It is obvious, that after ing to hus to nergy efficient manner which of the prevention together with a flexible way of re n efficiently and as long as possible. Su al CPU processor. Usually, and as we have already men- tioned, they can be deployed in hundreds and typically physical harsh in the deployment a physical contact for replacement or maintenance is highly unlikely. A middleware should be able to provide remote access to these nodes making sure that they will exhaust all their resources in terms of battery power and memory in a timely manner. Hence, one of the basic design principles for our mid- dleware is the ability to manage limited power and resources. Our approach [25] in order to satisfy the ab ove design criterion is based in the creation of a flexible communi- cation protocol between the nodes of our network and the base station. Thus, inspired from the GAF protocol that was described in the previous section, we are aim devhaving node redundancy in mind, telop a protocol rgulate in an ee enods of our wireless sensor network will be active and which ones will be in a sleep mode. Subject to our trials and the development of our middleware this protocol will be introduced both hand written in the middleware engine as well as it will be introduced as part of the run- ning application. Field trials such as the CodeBlue Project [26] and the Wireless Sensing Vineyards [27] identified that a wire- less sensor network topology is subject to frequent changes due to factors such as device failure, interfer- ence, mobility and moving obstacles. Also, they proved that it is very possible that an application will grow in time, therefore mechanisms for a dynamic network to- pology should be available from the middleware. A mid- dleware should be able to adapt to parameter changes caused by unexpected external factors of the environ- ment and also provide mechanisms for fault tolerance and self configuration of the nodes inside the wireless sensor network [28]. Based on the above observations, and inspired from approaches similar to WinMS and Sympathy our mid- dleware will incorporate some mechanisms for fault de- tection and configuring the network in real time [29]. As Sympa- thy is a fully automated system, we will be aiming to provide some kind of automatic mechanisms in our mid- dleware for the above design criteria without thou gh this to be our first priority. Unlike traditional networks, sensor networks and their applications are real-time phenomena with dy- namic resources. Upon deployment of an application, core parameters such as energy usage, bandwidth and processing power cannot be predefined due to the dy- namic character of these networks. A middleware should be designed with mechanisms that should allow the network to ru ch mechanisms include resource discovery and loca- tion awareness for the nodes in the system. Low-level programming models must be introduced as well in order to bridge the gap between the running application and the hardware. As we mentioned before, mechanisms that are pre- dominant in traditional networks are not sufficient to maintain the quality of service of a wireless sensor net- work because of constraints such as the dynamic topol- ogy and the power limitations. A middleware should be able to provide an d maintain the qu ality of service ov er a long period of time while in parallel to be able to adapt in changes based on the application and on the perform- ance metrics of the network like these of energy con- sumption and data delivery delay. Inspired both form the work of the Mate and Agilla middlewares we will introduce a mechanism that will allow mobile code to be transmitted inside our network and will be able to allow changes in network parameters such as the bandwidth of each node as well as applica- tion parameters such as switching between available sensors of each node. Thus, an architecture will be de- veloped adapting technologies such as Linda-like tuple spaces and agents/mobile code transmission with the support of a virtual machine engine [30]. Wireless sensor networks can be widely deployed in areas such as healthcare, rescue and military, all of these are areas where information has a certain value and is very sensitive. The environments of those areas tend to be very active and harsh, increasing the chances for malicious intrusions and attacks such as denial of service. Traditional approaches and mechanisms used to secure the network cannot be applied in this kind of network since they are heavy in terms of energy con- sumption. A middleware must be able to provide a se- cure framework for deploying applications inside the network. During the life-cycle of the network the mid- dleware should establish protective mechanisms to ensure security requirements such as authenticity, in- tegrity and confidentiality. Table 2 presents a tabular evaluation of the currently available middleware systems in terms of their organiza- tion and func tionality. Copyright © 2009 SciRes. WSN 266 D. GEORGOULAS ET AL. Copyright © 2009 SciRes. WSN e sy s Table 2. Wireless sensor network middlewar Project Main feature stems evaluation based on designed criteria. ScalabilityMobilityHeterogeneity Power Awareness Easy of use s Opennes Mate Mobile active Capsules, TinyQS, Byte code interpreter Full Full Full Partial Full Little Agilla Generic Agents, TinyQS Full Cougar Virtual Database, SQL like language Partial Mires nesC, TinyQS, message oriented Full In-Motes nesC, TinyQS, agents, behavioral rules Full Partial Full Partial Little Average Partial Partial Partial Partial Full Full Partial Full Full Full Full Full Full Full Full 7. Conclusions This survey presents and demonstrates the wireless sen- sor networks as one of the predominant technologies for . The foundational concept behind this sensor networks,” IEEE Computer, pp. 41–49 [7] I. F. Akyildiz, Y. Sankarasubramaniam, W. Su the 21st century techy is explained toge limitation barat are incorporatd to be addresse the ss ofetwork appl ble numcations in modern so ties. The survting the foundatio funof a. Funct thatased hose of mon and corol anwireless sen sy nurk syst re critically reviewed providing an analytical explana- cture and identifying pros and cons aw some important lessons for our http://www.ddirv.lv/doc_upl/sazonovs1.pdf. [5] n, and M. Srivastava, “Overview of , 2004. , and E. Cayirci, “Wireless sensor networks: a survey,” Cr ork 3– [8] L. Le Datta,. Cardelver, “W: reless r netwnagemestem,” CSSE nical rt, UWA-CSSE-06-001, 2006. [9] . Aky. Sanraman. Su, E. irci, “Wireless sensor networks: a survey,” Co tworks. [10] B. Ruiz J. M. Nra, “MAManagement architecture for wireless sensor networks,” Communica- , Vol. 41, No. 2, pp. 116–125, 2003. im, K. Lee, and J. Sung, “UPnP-based sen- ience, pp. 10–17, network-management system,” CSSE [15] od, and E. debugger,” ong, “TinyDB: ne, and G. M. P. O'Hare, anagement nolog riers thether with th ed and nees and d in proce for a making a wireless sensor nica- cie-ber of useful appli ey opens by presennal ctions network management systemions are b nt upon two main attributes t d are critical for every itor sor stem. A mber of wireless sensor netwoems a tion of their archite helping us drthus proposed system. The survey continues by presenting the middleware solution as a key player in overcoming the wireless sensor networks limitations and as our main methodology behind our proposed approach. A classifi- cation and analysis of the current middleware approaches for the wireless sensor networks is produced. The survey concludes by presenting the role and the key design prin- ciples our middleware approach. 8. References [1] D. Culler, D. Estrin, and M. Srivastava, “Overview of sensor networks,” IEEE Computer, pp. 41–49, 2004. [2] J. Hill, R. Szewczyk, A. Woo, S. Hollar, and D. Culler, “System architecture directions for networked sensors,” Architectural Support for Programming Languages and Operating Systems, pp. 93–104, 2000. [3] A. Boulis, C. C. Han, and M. B. Srivastava, “Design and implementation of a framework for efficient and pro- grammable sensor networks,” International Conference On Mobile Systems, Applications And Services, pp. 187–200, 2003. [4] Cisco Systems, “Network management systems organiza- tion,” 2000, W. Stallings, “Wireless communications and networks,” ISBN-10: 0131918354, pp. 45–50, 2004. 6] D. Culler, D. Estri[ ompute Netws, pp. 39422, 2002. W. Wi e, A. senso and R ork-ma l-Oli nt syinMS Tech Repo I. F Cay ildiz, Ykarasubiam, Wand mputer Ne, pp. 393–422, 2002 L. andogueiNNA: tions Magazine 11] H. Song, D. K[sor network management architecture,” Proceedings of the second International Conference on Mobile Comput- ing and Ubiquitous Networking, pp. 85–92, 2005. [12] W. Heinzelman, A. Chandrakasan, and H. Balakrishan, “Energy efficient communication protocol for wireless microsensors networks,” Proceedings of the Hawaii In- ternational Conference on System Sc 2000. [13] Y. Xu, “Geography-informed energy conservation for ad hoc routing,” Mobicom’01, pp. 203–212, 2001. [14] W. L. Lee, A. Datta, and R. Cardell-Oliver, “WinMS: Wireless sensor Technical Report, UWA- CSSE-06-001, 2006. N. Ramanathan, K. Chang, R. Kapur, L. Gir Kohler, “Sympathy for the sensor network Centre for Embedded Network Sensing, pp. 98, 2005. [16] S. Madden, J. Hellerstein, and W. H In-network query processing in TinyOS,” ACM Transac- tions on Database Systems, pp. 122–173, 2003. [17] Touron, “Crossbow: moteview interface,” Crossbow, 2005, http://www.xbow.com/Technology/UserInterface. aspx. [18] R. Tynan, D. Marsh, D. O'Ka “Intelligent agents for wireless sensor networks,” AAMAS 2005: 1179–1180. [19] T. H. Kim and S. Hong, “Sensor network m D. GEORGOULAS ET AL. 267 e 3rd on Architectural Support for Programming Lan- 2005. Paper Award, Proceedings of the 5th sensing vineyards,” 2008, [30] ational Conference on Telecommunica- protocol for state-driven execution environment,” Pro- ceedings of the International Conference on Ubiquitous Computing, pp. 197–199, 2003. [20] J. Wan, S. Eisenman, A. Campbell, and J. Crowcroft, “Siphon: overload traffic management using multi-radio virtual sinks in sensor networks,” Proceedings of th [26] International Conference on Embedded Networked Sen- sor Systems, pp. 116–129, 2005. [21] Zhang, “Network management in wireless sensor net- works,” 2001. http://www.csse.uwa.edu.au/~winnie/Network_Managem- ent _in_WSNs_.pdf. [22] P. Levis and D. Culler, “Mate: A tiny virtual machine for sensor networks,” Proceedings of the International Con- ference guages and Operating Systems, San Jose, CA, USA, pp. 100–111, 2002. [23] C. L. Fok and G. C. Roman, “Mobile agent middleware for sensor networks: An application case study,” Pro- ceedings of the 4th International Conference on Informa- tion Processing in Sensor Networks, pp. 382–387, [24] S. Eduardo, G. Germano, and V. Glauco, “A mes- sage-oriented middleware for sensor networks,” Pro- ceedings of the 2nd workshop on Middleware for perva-t sive and ad-hoc computing, pp. 127–134, 2004. [25] D. Georgoulas and K. Blow, “In-Motes: An intelligent agent based middleware for wireless sensor networks,” Best Student WSEAS International Conference SEPADS 06, pp. 225–231, 2006. Welsh et al, “Wireless medical sensor networks in emer- gency response: Implementation and pilot results,” IEEE International Conference on Technologies for Homeland Security. [27] Holler, “Wireless http://camalie.com/WirelessSensing/WirelessSensors.htm. [28] D. Georgoulas and K. Blow, “Making motes intelligent: An agent based approach to wireless sensor networks,” In WSEAS on Communications Journal, pp. 515–522, 2006. [29] D. Georgoulas and K. Blow, “In-Motes bins: A real time application for environmental monitoring in wireless sen- sor networks,” Proceedings of the 9th IEEE/IFIP Interna- tional Conference on Mobile and Wireless Communica- tions Networks, pp. 21–26, 2007. D. Georgoulas and K. Blow, “Intelligent mobile agent middleware for wireless sensor networks: A real time ap- plication case study,” AICT 2008, in Proceedings of 4th Advanced Intern ions: Programmable networks, active networks and mo- bile agents, protocol & standards, Athens, pp. 35–43, 2008. Copyright © 2009 SciRes. WSN |