skip to main content
research-article

Underground coal mine monitoring with wireless sensor networks

Authors Info & Claims
Published:03 April 2009Publication History
Skip Abstract Section

Abstract

Environment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-Adaptive WSN system, SASA. By regulating the mesh sensor network deployment and formulating a collaborative mechanism based on a regular beacon strategy, SASA is able to rapidly detect structure variations caused by underground collapses. We further develop a sound and robust mechanism for efficiently handling queries under instable circumstances. A prototype is deployed with 27 mica2 motes in a real coal mine. We present our implementation experiences as well as the experimental results. To better evaluate the scalability and reliability of SASA, we also conduct a large-scale trace-driven simulation based on real data collected from the experiments.

References

  1. Ahmed, N., Kanhere, S. S., and Jha, S. 2005. The holes problem in wireless sensor networks: A survey. ACM SIGMOBILE Mobile Comput. Commun. Rev. 9, 4--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. 2002. A survey on sensor networks. IEEE Commun. Mag. 40, 102--114. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chakrabari, A., Sabharwal, A., and Aazhang, B. 2004. Multi-hop communication is order-optimal for homogeneous sensor networks. In Proceedings of the 3rd IEEE/ACM International Conference on Information Processing in Sensor Networks. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cheekiralla, S. 2005. Wireless sensor network-based tunnel monitoring. In Proceedings of the Workhop on Real-World Wireless Sensor Networks.Google ScholarGoogle Scholar
  5. Considine, J., Li, F., Kollios, G., and Byers, J. 2004. Approximate aggregation techniques for sensor databases. In Proceedings of the 20th International Conference on Data Engineering. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Davis, R. S. and Kamamohanarao, K. 1983. A two-level superimposed coding scheme for partial match retrieval. Inform. Syst. 8, 4, 273--280.Google ScholarGoogle ScholarCross RefCross Ref
  7. Douglas, S., Couto, D., and Morris, R. 2001. Location proxies and intermediate node forwarding for practical geographic forwarding. Tech. Rep. MIT Laboratory for Computer Science MIT-LCS-TR-824.Google ScholarGoogle Scholar
  8. Faloutsos, C. 1985. Access methods for text. ACM Comput. Surv. 17, 1, 49--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Fang, Q., Gao, J., and Guibas, L. 2004. Locating and bypassing routing holes in sensor networks. In Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies.Google ScholarGoogle Scholar
  10. Feyerstein, M. J., Blackard, K. L., Rappaport, T. S., Seidel, S. Y., and Xia, H. H. 1994. Path loss, delay spread, and outage models as functions of antenna height for microcellular system design. IEEE Trans. Vehic. Tech. 43, 487--498.Google ScholarGoogle ScholarCross RefCross Ref
  11. Gui, C. and Mohapatra, P. 2004. Power conservation and quality of surveillance in target tracking sensor networks. In Proceedings of the 10th ACM Annual International Conference on Mobile Computing and Networking. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. He, G. and Hou, J. C. 2005. Tracking targets with quality in wireless sensor networks. In Proceedings of the 13th IEEE International Conference on Network Protocols. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Hill, J. and Culler, D. 2002. Mica: A wireless platform for deeply embedded networks. IEEE Micro. 22, 12--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Karp, B. and Kung, H. T. 2000. Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th ACM Annual International Conference on Mobile Computing and Networking. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lazos, L., Poovendran, R., and Capkun, S. 2005. Robust position estimation in wireless sensor networks. In Proceedings of the 4th IEEE/ACM International Conference on Information Processing in Sensor Networks. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Lian, J., Chen, L., Naik, K., Ozsu, M. T., and Agnew, G. 2005. Localized routing trees for query processing in sensor networks. In Proceedings of the 14th ACM Conference on Information and Knowledge Management Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Madden, S., Franklin, M. J., and Hellerstein, J. M. 2002. TAG: A tiny aggregation service for ad hoc sensor networks. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (USENIX). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D., and Anderson, J. 2002. Wireless sensor networks for habitat monitoring. In Proceedings of the 1st ACM Workshop on Wireless Sensor Networks and Applications. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Melodia, T., Pompili, D., and Akyildiz, I. F. 2004. Optimal local topology knowledge for energy efficient geographical routing in sensor networks. In Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies.Google ScholarGoogle Scholar
  20. Nath, S., Gibbons, P. B., Seshan, S., and Anderson, Z. R. 2004. Synopsis diffusion for robust aggregation in sensor networks. In Proceedings of the 2nd ACM International Conference on Embedded Networked Sensor Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Rajendran, V., Obraczka, K., and Garcia-Luna-Aceves, J. J. 2003. Energy-efficient collision-free medium access control for wireless sensor networks. In Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Ray, S., Ungrangsi, R., Pellegrini, F. D., Trachtenberg, A., and Starobinski, D. 2003. Robust location detection in emergency sensor networks. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies.Google ScholarGoogle Scholar
  23. Savvides, A., Han, C., and Srivastava, M. B. 2001. Dynamic fine-grained localization in ad hoc networks of sensors. In Proceedings of the 7th ACM Annual International Conference on Mobile Computing and Networking. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Subramanian, S. and Shakkottai, S. 2005. Geographic routing with limited information in sensor networks. In Proceedings of the 4th IEEE/ACM International Conference on Information Processing in Sensor Networks. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Vural, S. and Ekici, E. 2005. Analysis of hop-distance relationship in spatially random sensor networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Wan, C. Y., Eisenman, S. B., Campbell, A. T., and Crowcroft, J. 2005. Siphon: Overload traffic management using multi-radio virtual sinks in sensor networks. In Proceedings of the 3rd ACM International Conference on Embedded Networked Sensor Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Wieselthier, J. E., Nguyen, G. D., and Ephremides, A. 2000. On the construction of energy-efficient broadcast and multicast trees in wireless networks. In Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies.Google ScholarGoogle Scholar
  28. Xu, N., Rangwala, S., Chintalapudi, K. K., Ganesan, D., Broad, A., Govindan, P., and Estrin, D. 2004. A wireless sensor network for structural monitoring. In Proceedings of the 2nd ACM International Conference on Embedded Networked Sensor Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Underground coal mine monitoring with wireless sensor networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Sensor Networks
            ACM Transactions on Sensor Networks  Volume 5, Issue 2
            March 2009
            284 pages
            ISSN:1550-4859
            EISSN:1550-4867
            DOI:10.1145/1498915
            Issue’s Table of Contents

            Copyright © 2009 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 3 April 2009
            • Accepted: 1 February 2008
            • Revised: 1 November 2007
            • Received: 1 June 2007
            Published in tosn Volume 5, Issue 2

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader