2nd International ICST Conference on Broadband Networks

Research Article

Hazard avoidance in wireless sensor and actor networks

  • @INPROCEEDINGS{10.1109/ICBN.2005.1589675,
        author={Ramanuja Vedantham and Zhenyun Zhuang and Raghupathy Sivakumar},
        title={Hazard avoidance in wireless sensor and actor networks},
        proceedings={2nd International ICST Conference on Broadband Networks},
        publisher={IEEE},
        proceedings_a={BROADNETS},
        year={2006},
        month={2},
        keywords={},
        doi={10.1109/ICBN.2005.1589675}
    }
    
  • Ramanuja Vedantham
    Zhenyun Zhuang
    Raghupathy Sivakumar
    Year: 2006
    Hazard avoidance in wireless sensor and actor networks
    BROADNETS
    IEEE
    DOI: 10.1109/ICBN.2005.1589675
Ramanuja Vedantham1,*, Zhenyun Zhuang1,*, Raghupathy Sivakumar1,*
  • 1: School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, USA
*Contact email: ramv@ece.gatech.edu, zhenyun@ece.gatech.edu, siva@ece.gatech.edu

Abstract

A typical wireless sensor network performs only one action: sensing the environment. The requirement for intelligent interaction with the environment has led to the emergence of wireless sensor and actor networks (WSANs). In WSANs, the sensors monitor the environment based on which the sink issues commands to the actors to act on the environment. In order to provide tight coupling between sensing and acting, an effective coordination mechanism is required among sensors and actors. In this context, we identify the problem of "hazards", which is the out-of-order execution of queries and commands due to a lack of coordination between sensors and actors. We identify three types of hazards and show with an example application, the undesirable consequences of these hazards. We also identify and enumerate the associated challenges in addressing hazards. In this context, we discuss the basic design needed to address this problem efficiently. We propose a distributed and fully localized hazard-free approach that addresses the problem and the associated challenges based on the design. Through simulations, we study the performance of the proposed solution and two basic strategies, and show that the proposed solution is efficient for a variety of network conditions.