Smart Phone Assisted City—scale Wireless Sensor Network Deployment for Transportation System Monitor

来源 :科技致富向导 | 被引量 : 0次 | 上传用户:lovejr622
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  1.INTRODUCTION
  Ensuring transportation network security is one Of the most daunting challenges confronting homeland security agencies today. Significant research has been dedicated. To model and analyze the vulnerability of transportation systems,while notably fewer studies propose specific strategies for deploying defensive technologies to safeguard these systems. The ultimate goal of situational awareness for prevention and rapid response remains largely unaddressed. Wireless sensors and ad hoc networks are widely regarded as a promising approach to monitor systems and enhance their security.Furthermore,the growth in smart phone usage can contribute additional relay nodes to the network connecting the deployed sensors and command center. Such sensor networks offer the potential to detect a terrorist plot before it can be executed, support effective response to emergency events,and dynamically monitor traffic flows to facilitate efficient travel within a city.
  This paper proposes an algorithm to deploy wireless sensor nodes for monitoring a transportation system in order to provide highly reliable data delivery to a homeland security command center within a city.It is assumed that the vulnerability analysis stage has already been carried out and can therefore guide deployment according to the relative importance for monitoring portions of the city.
  The deployed sensor nodes form a network and leverage the additional bandwidth available from smart phones in the city to deliver information to a command center in order to coordinate response services. The existing 3G network is also employed in order to ensure the delivery of data. Certain key properties are required, including sensing coverage, network connectivity, and low end to end delay.
  The deployment is formulated as a multi-objective optimization problem to place sensors at a subset of candidate positions to maximize coverage, guarantee connectivity, and provide fault-tolerance, which will ensure low end to end delay . Information from vulnerability analysis, Geographic Information System data, and additional details such as the sensing range of sensor nodes and the mobility patterns of smart phones are incorporated into the utility function of the optimization problem to guide node placement.
  We illustrate the approach through a series of simulations with applications to detection, traffic monitoring,and travel guidance based on real GIS data and realistic scenarios. Our results demonstrate the approach cost effectively achieves high coverage, guarantees connectivity,and delivers fault-tolerant end to end delay.   2.DESCRIPTION
  This section formulates sensor deployment
  as an optimization problem and then solving this formulation to achieve the key performance metrics of the applications. We also Introduce our cell phone assisted routing scheme here.
  2.1 Deployment problem formulation
  (1)Definition: To capture real-world restrictions on the deployment of sensors in a city such as various forms of private property, our model considers regions where sensors are prohibited. Thus, we first identify a set of candidate deployment locations beforehand in light of these restrictions.This planning step determines candidate positions,represented by matrix Lmn,which indicates the locations of these possible deployment sites throughout the entire transportation system under consideration. Here m is the number of roads,and n the number of points along the mth road.
  In3G or even 4G network,some equipments can serve as access points,providing gate ways to connect to existing networks, including the internet. They may also serve as
  Each road possesses a quantitative measure of vulnerability, which is based on the importance or criticality of that road. Our previous research [1] offers a game Theoretic approach to assess the vulnerability of the links comprising a network.Other risk based methodologies are also possible.Intuitively,a highly vulnerable road should receive priority for coverage by the monitoring network so that problems occurring on this road can be quickly detected and remediated. The present work assumes that each road possess a constant vulnerability given by Vm.Future research will explore the possibility of time-varying vulnerability.
  Because timely response is needed to prevent a problematic situation from worsening,the latency experienced with the network during data delivery is of paramount
  importance.Many operations incur delays in a single hop of a wireless network,including transmission delay,propagation delay,and reception delay,as well as encoding and decoding delay.The sum of these operations is represented by the constantτ.Furthermore,tolerant end to end delay from event detection to command center awareness is denoted byτT.A primary objective is to minimize the overall average end to end delay overhead through 3G network.
  To concretize this formulation,we de?ne Y
  where Vki denotes the vulnerability of the point Lki.Although the vulnerability of each road is given, some candidate points may be situated at intersections.In these situations,the point vulnerability is computed as the sum of the vulnerabilities of all road crossing a point,capturing the criticality of such crossroads.   (3)Constraints: are formulated to ensure coverage is achieved.In total,four sets of constraints are considered,including a budget limit for sensors,connectivity requirements,guarantees of tolerant end to end delayτT.
  ·Budget limit:the budget limit constrainsthe number of available sensors. Weassume the budget is predefined and doesnot change.Thus,it is not possible to addmore sensors during the optimization procedure,hence we have:
  ·Tolerant end to end delay:Tolerant end toend delay guarantees that all events aredetected can be delivered to the commandcenter within time no greater thanτT, sothat the response can be initiated toprevent the undesirable outcomes that canlead to loss of life and assets. Because thisend to end delay is the sum of the delaysfrom the points where the event happens tothe access point,and from access point tothe command center coverage mustbemore thantheminimumneededto ensureconnectivity.Since wired networks areorders of magnitude faster, the delayfrom access point to the command centertreated as a fixed constant Pa. Thus, thedelay depends primarily on the delay fromlocation of the event’s occurrence to anaccess point. For this reason,each cluster should be able to reach one or more accesspoint,and the overall delay should be lessthanτT.Assuming the delay betweeneach pairs of sensor nodes isηij,wehave:
  In above formulation,although the binaryvariable Yki=0can always make theequation hold,however,when the positionshould be selected,Yki should be“1”.Thanks to the maximization in equationEq.(4),Yki tend to be “1”.
  By solving the optimization problem with branch-and-cut which is introduced in Section II in linear time, the position where the sensors should be deployed can be figured out. Deploy sensors according to the guideline of
  the algorithm, the weighted coverage can be maximized.
  2.2Cell phone assisted routing
  In this sub-section, we utilize a VBF like[2]routing scheme for mobile smart phones to add additional band-width to the system.
  Nowadays, people operate smart phones to talk or text with each other through 3G networks as they travel through the city; They also obtained access to internet through a 3G or 4G network. Thus, smart phones also possess the ability to form an ad hoc network by changing their configurations for the WIFI. In this mode, smart phones can serve as mobile sensor nodes to aid the monitoring system, by helping to deliver some delay tolerant information.   Here, we assume that an advertising campaign has successfully recruited a large number of smart phones users to register for the service. and that existing an ad hoc network which enables them to connect to access points throughout the majority of the city. A flooding based routing scheme for the mobile smart phones is then employed todeliver information from sensor nodesnear events to an access points. Sensor nodes and smart phones know their positions as well as the location of access points. Each packet carries the positions of the sender and the target access points for delivery through thead hoc network according to a forwarding path specified by the routing vector from the sender to each target access point. For example, when a smart phone receives a packet, it computes its position relative to the sender andtarget access point. If the smart phone is close enough to the routing vector(e.g.,less than a predefined distance threshold, denoted asW), it will continue to forward the packet; otherwise, it simply discards the packet. This way,all the smart phones forwarding packets in the ad hoc network form a “routing pipe”. Smart phones in this pipe are eligible for packet forwarding. Those which are notclose to the routing vector(i.e., the axis of the pipe) do not forward.
  Fig.1 Smart phone routing strategy
  Fig. 1 illustrates the concept of a routing pipe. Sensor node S0 is the source, and Ap is the target access point,and the routing vector is determined from their locations.Data packets are forwarded from S0 to Ap. Forwarders along the routing vector form a routing pipe with a pre-controlled radius (i.e., the distance threshold). The radius of the routing pipe may be increased to ensure the delivery of critical events.
  3.PERFORMANCE EVALUATION
  3.1 Simulation Settings
  The simulations were developed in CPLEX, which provides an implementation of branch-and-cut to solve the optimization problem. There are 100 candidates position, and the topology of the candidates position is a 10 by 10 grid of horizontal and vertical roads intersecting at right angles. The intersections(nodes) are labeled 1 to 100, from the left upper node to the node in the lower right. The vulnerabilities of each horizontal roads is randomly set to 0 to 1 with probability 0.5.
  Furthermore, the are a total of 10 access points throughout the city, which can be accessed by both wireless sensor nodes and smart phones. These access points are randomly located in the cityAfter the location of the access points are determined, the shortest path to each candidate position is known. Thus, it becomes possible to apply static routing to route information within the wireless sensor network. There are also 200 registered smart phones randomly distributed in the city, which can help to deliver information. The end to end delay between each pair of smart phones is set to one second, denoted as Ps and events occur randomly throughout the city every one hour.   3.2 Results and Analysis
  (1)Coverage:Fig.2 shows the normalized coverage achieved with different numbers of sensors. Clearly, there is a direct relationship between the number of sensors and the attainable coverage. This agrees with intuition because more sensors can cover more area in the city, ensuring that coverage increases. The figure also reveals that increasing the number of sensors does not achieve a linear improvement in the coverage. This sublinear improvement occurs because the optimization scheme covers the most vulnerable portions of the network with greater redundancy to ensure that the command center is notified of events occurring in critical regions. Less vulnerable roads therefore receive less attention.
  Fig.2 Normalized coverage vs. number of sensors
  (2)Average end to end delay:Fig.3 shows the impact of the number of deployed sensors on the average end to end delay. The average end to end delay is always under 5 seconds,which is the acceptable delay for the detected information to reach the command center. It may also been seen that increasing the number of sensors deployed decreases the average delay. This increase occurs because additional sensor nodes provide more alternative paths to route detected information to access points. Since routing within the wireless sensor network occurs along the shortest paths, these additional paths lower the average end to end delay.
  Fig.3 Average delay vs. number of sensors
  4.CONCLUSION AND FUTURE WORK
  This paper proposes an algorithm to deploy wireless sensor nodes to monitor a transportation system in order to ensure highly reliable data delivery to a homeland security command center within a city.We formulated sensor deployment as an optimization problem to quickly detect events occurring at the most vulnerable portions of the network.We also demonstrated that an ad hoc network formed with smart phones can be harnessed to deliver information to a command center in order to facilitate response.
  Future research will apply our scheme with real GIS data to evaluate its performance and identify additional constraints to make the approach more practical for adoption in real-world applications.
  【References】
  [1]N.Lownes,Q.Wang,S.Ibrahim,R.Ammar,S.Rajasekaran,and D. Sharma, “A many-to-many game theoretic approachtomeasuring transportation network vulnerability,”Transportation ResearchRecord,vol.2263:1-8,mar,2011.
  [2]P.Xie,L.Lao,andJ.-H.Cui,“VBF:vector-based forwarding protocol for underwater sensor networks,”in To appear in Proceedings of IFIP Networking,May,2006.
其他文献
32强的球衣历来是被關注的热点,色彩、款式的变化太“肤浅”,科技元素让球衣具有更多的内涵。本届世界杯上,球衣已经不仅仅为球员的攻城拔寨做好后勤工作,还在保护环境、节能减排上做起了文章。  如果说东道主巴西队的队服是“绿色”的,不少人可能会发懵:你说的是巴西?当然不是,这里说的是巴西队在球衣材质上的创新。巴西队的球衣、球裤和球袜均使用提取自回收塑料瓶的再生涤纶,这也是国家队装备首次在球袜上使用这项创
期刊
巴西世界杯正如火如荼,有人看的是比赛,有人看的是帅哥,今天,我们不妨来看看本届世界杯上新亮相的先进技术装备。请关注——说说世界杯上的科技新玩意儿。  巴西世界杯的开幕式选择了一名瘫痪患者利用外置机械骨骼帮助开球,这似乎昭示着本届世界杯,“里约大冒险”的主角们除了志在夺冠的球队、明星外,还有早已摩拳擦掌多时的各种高科技元素。  机器人大放异彩  开幕式上,一名巴西瘫痪青年身穿“脑控外骨骼”装置,獨自
期刊
在电视转播技术方面,巴西世界杯与往届相比也有了巨大飞跃。2013年初,索尼宣布将与国际足联合作,在世界杯上启用4K技术转播3场比赛,包括北京时间7月14日凌晨3点的冠亚军决赛。此前在2013年联合会杯上,索尼已经对4K摄像转播技术进行了试验。  所谓4K技术,是指新兴的数字电影及计算机视频的超高分辨率标准,常见分辨率包括3840×2160和4096×2160两种规格,其清晰度能达到高清分辨率的4倍
期刊
平息了门线上的争议进球,越位的争端又被推上风口浪尖。在墨西哥与喀麦隆的比赛中,多斯桑托斯的两粒进球都被裁判以越位为由无情吹掉,但慢镜头回放显示,第一个越位球,裁判有误判嫌疑。  但“多斯桑托斯式的冤案”在技术层面上来说,也是可以解决的。主转播服务商董事长弗朗西斯?泰列爾表示,“视频回放技术”能在“几秒钟内”让观众看到一个定格画面,上面会出现测量防守队员与进攻队员之间距离的线,越位与否,一目了然。 
期刊
历届世界杯用球都是参赛球员、球迷和媒体关注的焦点之一。本届世界杯官方比赛用球——“桑巴荣耀”(brazuca)。上届世界杯用球“普天同庆”被球员批评重量过轻,以致皮球的飞行轨迹难以预测。鉴于此,阿迪达斯用了长达两年半的时间设计此次巴西世界杯的比赛用球。2012年欧洲杯官方用球“Tango 12”和2013年联合会杯官方用球“Cafusa”所采用的球膽和球胎技术,在“桑巴荣耀”的设计上得到了延续。 
期刊
在门线附近,球进了没?本届杯赛首次引入的门线技术轻松解决难题!  揭幕战上,马塞洛的乌龙球回放是门线技术首次在世界杯的舞台呈现,更多的人看过后觉得是多此一举,可当智利对阵澳大利亚以及法国对阵洪都拉斯的比赛都通过门线技术解决了“进球悬案”时,你不得不承认这玩意真管用,有它存在的价值和必要。  门线技术的存在,为世界杯免去了一场可能爆发的负面争议,将人们的注意力留在了足球本身而不是各种“黑幕论”,赛事
期刊
从2008年以来,王暾一直因地震预警系统的建设而备受关注。  地震预警,指在地震发生后,利用地震波传播速度小于电波传播速度的特点,提前对地震波尚未到达的地方进行预警。地震预测与地震预警的根本区别在于,前者在地震发生之前进行,后者在地震发生时和发生后进行。王暾告诉记者,地震预警系统并不能预测地震何时发生,但它能在地震发生之后,告诉那些可能受到影响地区的人们地震波到达的时间。  “首都圈地震预警系统能
期刊
不过,地震预警推广受阻的问题并非无解。在采访中,许多专家建议,至少从地震预警系统自身建设角度,研究者应把用户需求纳入预警预案中来。  在陈会忠看来,地震预警是一个复杂的社会工程。他曾提出一个概念——“地震预警的社会容忍度”。陈会忠解释说,对于地震预警,公众的容忍度最高,而一些重要企业的容忍度就非常低,比如核电类的企业,其对预警准确性的要求相当严格,因为一旦停止发电,其恢复生产是要付出很大代价的。 
期刊
在大地震发生几秒后发出警报,抢在地震波到达之前为人们留出可能的逃生时间,这是地震预警希望做到的。近年来,我国地震预警研究可谓遍地开花,然而,所有的研究无一例外,均在推广应用上碰了壁。  5月12日是全国防灾减灾日,人们对于汶川地震那场灾难的记忆也再次被唤醒。就在此前幾天,首都圈地震预警系统投入使用,该系统能够在地震后7秒内迅速发出地震预警警报,将为首都圈民众和地铁、化工等重大工程提供地震预警服务。
期刊
2011年3月11日,日本发生9级大地震。在地震预警過程中,日本气象厅一共发布了15次预警警报,而第一次预报将地震等级预测为4.3级。  “地震预警要求快,但是快和准很难做到,这是困扰整个地震预警界的难题。”地震学家、中国工程院院士许绍燮说。  不过,这一疏漏并未受到使用者的责难,或引起法律纠纷。因为该国《气象法》特别对地震预警的准确性作了免责规定。  “这说明日本地震预警的法规建设和预警技术发展
期刊