Results 1 - 10
of
11
Crosslevelsensor network simulation with cooja. InLCN
, 2006
"... Simulators for wireless sensor networks are a valuable tool for system development. However, current simulators can only simulate a single level of a system at once. This makes system development and evolution difficult since developers cannot use the same simulator for both high-level algorithm dev ..."
Abstract
-
Cited by 97 (22 self)
- Add to MetaCart
(Show Context)
Simulators for wireless sensor networks are a valuable tool for system development. However, current simulators can only simulate a single level of a system at once. This makes system development and evolution difficult since developers cannot use the same simulator for both high-level algorithm development and low-level development such as device-driver implementations. We propose cross-level simulation, a novel type of wireless sensor network simulation that enables holistic simultaneous simulation at different levels. We present an implementation of such a simulator, COOJA, a simulator for the Contiki sensor node operating system. COOJA allows for simultaneous simulation at the network level, the operating system level, and the machine code instruction set level. With COOJA, we show the feasibility of the cross-level simulation approach. 1.
Fence monitoring - experimental evaluation of a use case for wireless sensor networks
- In: Proc. of the 4 th European Conf. on Wireless Sensor Networks (EWSN
, 2007
"... Abstract. In-network data processing and event detection on resourceconstrained devices are widely regarded as distinctive and novel features of wireless sensor networks. The vision is that through cooperation of many sensor nodes the accuracy of event detection can be greatly improved. On the pract ..."
Abstract
-
Cited by 20 (4 self)
- Add to MetaCart
(Show Context)
Abstract. In-network data processing and event detection on resourceconstrained devices are widely regarded as distinctive and novel features of wireless sensor networks. The vision is that through cooperation of many sensor nodes the accuracy of event detection can be greatly improved. On the practical side however, little real-world experience exists in how far these goals can be achieved. In this paper, we present the results of a small deployment of sensor nodes attached to a fence with the goal of collaboratively detecting and reporting security relevant incidents, such as a person climbing over the fence. Based on experimental data we discuss in detail the process of innetwork event detection both from the conceptual side and by evaluating the results obtained. Reusing the same traces in a simulated network, we also look into the impact of multi-hop event reporting.
A Quantitative Evaluation of the Simulation Accuracy of Wireless Sensor Networks
"... In the field of wireless sensor networks, network simulators are commonly used to evaluate properties of software components or the network as a whole. Their advantages in reduced experimental overhead, flexibility, and repeatability come at the expense of questionable credibility of the results. In ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
In the field of wireless sensor networks, network simulators are commonly used to evaluate properties of software components or the network as a whole. Their advantages in reduced experimental overhead, flexibility, and repeatability come at the expense of questionable credibility of the results. In order to quantify the simulation accuracy of wireless sensor networks, we have conducted a field test measuring the packet loss rate and compared the data with the results obtained from a carefully configured simulation of the same scenario. Our evaluation gives insight into how much trust can be put into the results of simulations of comparable scenarios.
Demo abstract: Cross-level simulation in cooja
- in Proceedings of the First IEEE International Workshop on Practical Issues in Building Sensor Network Applications
, 2006
"... ..."
(Show Context)
Dropped Packet Problems in Stepping Stone Detection Method
- International Journal of Computer Science & Network Security (IJCSNS
, 2008
"... This paper discusses one of the issues that are not covered by current stepping stone detection based researches. Although dropped packet problems are well-known problem in real network environment, all of the stepping stone detection researches just assume that dropped packet problems do not occur. ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
(Show Context)
This paper discusses one of the issues that are not covered by current stepping stone detection based researches. Although dropped packet problems are well-known problem in real network environment, all of the stepping stone detection researches just assume that dropped packet problems do not occur. Stepping stone detection research already in complex condition where each enhancement of the research attempts to solve problem such as encryption, delay and chaff without focused to solve dropped packet issues. For that situation, this research believes that to make sure that dropped packet problem can be solved; it should begin from the beginning of the stepping stone research. In other words, to solve dropped packet problem, we must solve it at the early stage of stepping stone research without combine it with current complex condition of stepping stone research. For that purpose, experiment has been executed by using NS-2 to prove the existence of the dropped packet in stepping stone detection environment. The experiment has been setup for a basic stepping stone detection environment. From the result obtained, it shows that dropped packet definitely influences the detection of stepping stone. Key words: Intrusion tracing, stepping stone detection, dropped packet
Fence Monitoring – Experimental Evaluation of a Use Case for Wireless Sensor Networks
, 2007
"... All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. ..."
Abstract
- Add to MetaCart
(Show Context)
All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.
ISRN SICS-D--56--SE Improving Low-Power Wireless Protocols with Timing-Accurate Simulation
, 2011
"... I first thank my thesis advisors Thiemo Voigt and Adam Dunkels for being my excellent advisors, and also for being the great colleagues you still are. Thiemo and Adam have complemented each other superbly, giving me feedback, perspectives, insights, and having made every single new venture truly fun ..."
Abstract
- Add to MetaCart
I first thank my thesis advisors Thiemo Voigt and Adam Dunkels for being my excellent advisors, and also for being the great colleagues you still are. Thiemo and Adam have complemented each other superbly, giving me feedback, perspectives, insights, and having made every single new venture truly fun. My deepest thanks also go to my professor Per Gunningberg, Uppsala University. Per has in a seemingly easy way spotted erroneous assumptions, has valued my research contributions, and has connected my own work with another broader world of research. I want to thank all colleagues in the Networked Embedded Systems group:
Demo Abstract: Bridging the Gap between Simulated Sensor Nodes and the Real World
"... Abstract. We present an architecture for the interconnection of simulated sensor nodes and real node hardware. The simulator is therefore running in real-time, and the simulated nodes are able to exchange messages with real sensor nodes as if they were sent over the radio. This runs fully transparen ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract. We present an architecture for the interconnection of simulated sensor nodes and real node hardware. The simulator is therefore running in real-time, and the simulated nodes are able to exchange messages with real sensor nodes as if they were sent over the radio. This runs fully transparent for the application—and is well suitable for debugging purposes and general algorithm development. It is even possible to use exactly the same algorithm implementation for both simulated nodes and real sensors.