Abstract
Environment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-Adaptive WSN system, SASA. By regulating the mesh sensor network deployment and formulating a collaborative mechanism based on a regular beacon strategy, SASA is able to rapidly detect structure variations caused by underground collapses. We further develop a sound and robust mechanism for efficiently handling queries under instable circumstances. A prototype is deployed with 27 mica2 motes in a real coal mine. We present our implementation experiences as well as the experimental results. To better evaluate the scalability and reliability of SASA, we also conduct a large-scale trace-driven simulation based on real data collected from the experiments.
- Ahmed, N., Kanhere, S. S., and Jha, S. 2005. The holes problem in wireless sensor networks: A survey. ACM SIGMOBILE Mobile Comput. Commun. Rev. 9, 4--18. Google ScholarDigital Library
- Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. 2002. A survey on sensor networks. IEEE Commun. Mag. 40, 102--114. Google ScholarDigital Library
- Chakrabari, A., Sabharwal, A., and Aazhang, B. 2004. Multi-hop communication is order-optimal for homogeneous sensor networks. In Proceedings of the 3rd IEEE/ACM International Conference on Information Processing in Sensor Networks. Google ScholarDigital Library
- Cheekiralla, S. 2005. Wireless sensor network-based tunnel monitoring. In Proceedings of the Workhop on Real-World Wireless Sensor Networks.Google Scholar
- Considine, J., Li, F., Kollios, G., and Byers, J. 2004. Approximate aggregation techniques for sensor databases. In Proceedings of the 20th International Conference on Data Engineering. Google ScholarDigital Library
- Davis, R. S. and Kamamohanarao, K. 1983. A two-level superimposed coding scheme for partial match retrieval. Inform. Syst. 8, 4, 273--280.Google ScholarCross Ref
- Douglas, S., Couto, D., and Morris, R. 2001. Location proxies and intermediate node forwarding for practical geographic forwarding. Tech. Rep. MIT Laboratory for Computer Science MIT-LCS-TR-824.Google Scholar
- Faloutsos, C. 1985. Access methods for text. ACM Comput. Surv. 17, 1, 49--74. Google ScholarDigital Library
- Fang, Q., Gao, J., and Guibas, L. 2004. Locating and bypassing routing holes in sensor networks. In Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies.Google Scholar
- Feyerstein, M. J., Blackard, K. L., Rappaport, T. S., Seidel, S. Y., and Xia, H. H. 1994. Path loss, delay spread, and outage models as functions of antenna height for microcellular system design. IEEE Trans. Vehic. Tech. 43, 487--498.Google ScholarCross Ref
- Gui, C. and Mohapatra, P. 2004. Power conservation and quality of surveillance in target tracking sensor networks. In Proceedings of the 10th ACM Annual International Conference on Mobile Computing and Networking. Google ScholarDigital Library
- He, G. and Hou, J. C. 2005. Tracking targets with quality in wireless sensor networks. In Proceedings of the 13th IEEE International Conference on Network Protocols. Google ScholarDigital Library
- Hill, J. and Culler, D. 2002. Mica: A wireless platform for deeply embedded networks. IEEE Micro. 22, 12--24. Google ScholarDigital Library
- Karp, B. and Kung, H. T. 2000. Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th ACM Annual International Conference on Mobile Computing and Networking. Google ScholarDigital Library
- Lazos, L., Poovendran, R., and Capkun, S. 2005. Robust position estimation in wireless sensor networks. In Proceedings of the 4th IEEE/ACM International Conference on Information Processing in Sensor Networks. Google ScholarDigital Library
- Lian, J., Chen, L., Naik, K., Ozsu, M. T., and Agnew, G. 2005. Localized routing trees for query processing in sensor networks. In Proceedings of the 14th ACM Conference on Information and Knowledge Management Google ScholarDigital Library
- Madden, S., Franklin, M. J., and Hellerstein, J. M. 2002. TAG: A tiny aggregation service for ad hoc sensor networks. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (USENIX). Google ScholarDigital Library
- Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D., and Anderson, J. 2002. Wireless sensor networks for habitat monitoring. In Proceedings of the 1st ACM Workshop on Wireless Sensor Networks and Applications. Google ScholarDigital Library
- Melodia, T., Pompili, D., and Akyildiz, I. F. 2004. Optimal local topology knowledge for energy efficient geographical routing in sensor networks. In Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies.Google Scholar
- Nath, S., Gibbons, P. B., Seshan, S., and Anderson, Z. R. 2004. Synopsis diffusion for robust aggregation in sensor networks. In Proceedings of the 2nd ACM International Conference on Embedded Networked Sensor Systems. Google ScholarDigital Library
- Rajendran, V., Obraczka, K., and Garcia-Luna-Aceves, J. J. 2003. Energy-efficient collision-free medium access control for wireless sensor networks. In Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems. Google ScholarDigital Library
- Ray, S., Ungrangsi, R., Pellegrini, F. D., Trachtenberg, A., and Starobinski, D. 2003. Robust location detection in emergency sensor networks. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies.Google Scholar
- Savvides, A., Han, C., and Srivastava, M. B. 2001. Dynamic fine-grained localization in ad hoc networks of sensors. In Proceedings of the 7th ACM Annual International Conference on Mobile Computing and Networking. Google ScholarDigital Library
- Subramanian, S. and Shakkottai, S. 2005. Geographic routing with limited information in sensor networks. In Proceedings of the 4th IEEE/ACM International Conference on Information Processing in Sensor Networks. Google ScholarDigital Library
- Vural, S. and Ekici, E. 2005. Analysis of hop-distance relationship in spatially random sensor networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. Google ScholarDigital Library
- Wan, C. Y., Eisenman, S. B., Campbell, A. T., and Crowcroft, J. 2005. Siphon: Overload traffic management using multi-radio virtual sinks in sensor networks. In Proceedings of the 3rd ACM International Conference on Embedded Networked Sensor Systems. Google ScholarDigital Library
- Wieselthier, J. E., Nguyen, G. D., and Ephremides, A. 2000. On the construction of energy-efficient broadcast and multicast trees in wireless networks. In Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies.Google Scholar
- Xu, N., Rangwala, S., Chintalapudi, K. K., Ganesan, D., Broad, A., Govindan, P., and Estrin, D. 2004. A wireless sensor network for structural monitoring. In Proceedings of the 2nd ACM International Conference on Embedded Networked Sensor Systems. Google ScholarDigital Library
Index Terms
- Underground coal mine monitoring with wireless sensor networks
Recommendations
Underground structure monitoring with wireless sensor networks
IPSN '07: Proceedings of the 6th international conference on Information processing in sensor networksEnvironment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-Adaptive WSN system, SASA. By regulating the mesh sensor network ...
The application of wireless sensor networks in coal mine
ICICS'09: Proceedings of the 7th international conference on Information, communications and signal processingFor the importance of monitoring system in mine, this paper describes the application of wireless sensor networks for mine safety monitoring. Schemes for clustering and mobile node based on the characteristics of mine wireless sensor networks are ...
Sensor scheduling for p-percent coverage in wireless sensor networks
We study sensor scheduling problems of p-percent coverage in this paper and propose two scheduling algorithms to prolong network lifetime due to the fact that for some applications full coverage is not necessary and different subareas of the monitored ...
Comments