Coordinated distributed mobile sensors and how to measure their performance

نویسنده

  • Frank Ehlers
چکیده

At present dramatic advances are seen in sensor and multi-sensor fusion techniques, in networking and multi-agent system design, and in capabilities of robotic platforms in terms of robustness and endurance. Applications for autonomous surveillance appear on the horizon, especially wanted for hazardous or dangerous environments. However, whilst for each subsystem measurements of performance exist (e.g. Receiver Operating Characteristics for sensors, data rate for networks, energy efficiency for a robotic platform), we have to find also a systematic approach on how to construct measures of performance for an entire system of distributed sensing robots. Having such a methodology available would allow the comparison of complete systems which are designed with different emphasis on sensor quality, collaboration tactics and platform capabilities, finally resulting in profound investment decisions. In this paper, we discuss two example applications, in underwater surveillance and in logistics, respectively. Furthermore, we describe the recent effort of the “Distributed Mobile Sensors Interest Group” (DMSIG) for which a roadmap towards collaborative work has been proposed. A first aim of this collaboration is to comprehensively understand how better coordination between platforms can compensate lower sensor quality.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ENERGY AWARE DISTRIBUTED PARTITIONING DETECTION AND CONNECTIVITY RESTORATION ALGORITHM IN WIRELESS SENSOR NETWORKS

 Mobile sensor networks rely heavily on inter-sensor connectivity for collection of data. Nodes in these networks monitor different regions of an area of interest and collectively present a global overview of some monitored activities or phenomena. A failure of a sensor leads to loss of connectivity and may cause partitioning of the network into disjoint segments. A number of approaches have be...

متن کامل

Distributed Coordinated Mobile Sensor Control Target Tracking in Multiple Wireless Sensor Networks

Wireless Sensor Networks (WSNs) is highly distributed network of small, lightweight wireless nodes. It monitors the environment or system by measuring physical parameters such as temperature, pressure, humidity. A wireless sensor network is a collection of nodes organized into a cooperative network. The existing presented Mobile sensor controller is used to measure the mobile target signal’s ti...

متن کامل

Representing a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors

Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Distributed Denial of Service Attacks in Mobile Adhoc Networks

The aim of this paper is to explore the security issues that significantly affect the performance of Mobile Adhoc Networks (MANET)and limit the services provided to their intended users. The MANETs are more vulnerable to Distributed Denial of Service attacks (DDoS) because of their properties like shared medium, dynamic topologies etc. A DDoS attack is a coordinated attempt made by malicious us...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011