Vous êtes sur la page 1sur 25

Lester A.

Cano
CS 589

The authors introduce the various threats (swimmers, divers,
boats, ships) and the difficulty of detecting these threats
using land based techniques (radars, satellites,
magnetometers, thermal sensors, etc..)
They propose a new approach using a wireless sensor
network system with detectors stationed on buoys to
measure ship generated waves.
The authors used a three axis accelerometer sensors with an
iMote2 detection network to capture and relay data. Using
spatial and temporal correlations the authors were able to
exploit these characteristics in field trials to develop a
detection algorithm.
Analyze Transverse Waves
As the transverse ship waves decay their
height can be calculated using the following
formula:
Maximum wave height H
m
at distance d from
the sailing line can be expressed as the
following equation:


c is a parameter related to the speed of the
passing ship
As ship waves attenuate to background wave
level as the waves travel sailing path, and the
speed of the ship-wave W
v
can be predicted
by the following equation:



V is speed of the ship where and =
35.27(1e
12(Fd1)
) and (F
d
is the Froude number
related to the traveling ship). The Froude
number is defined as:



Where V is a characteristic velocity for the water
wave and c a characteristic water wave
propagation velocity.



iMote2 with accelerometer (sampling at 50Hz)
and Buoy








The Basic Sensor Board contains a three axis
ST Micro LIS3L02DQ accelerometer, an
advanced temperature/ humidity sensor, a
light sensor and a 4 channel A/D converter.

The accelerometer has a range of +/-2g
with12 bit resolution

The sensor node is mounted into a bottle is
then fixed the bottle on a buoy


By focusing on the Z axis of the
Accelerometer signal the authors were able to
determine distinct signatures for ocean waves
and ship waves.
Ship waves and ocean waves have a different
energy spectrum

Ocean wave without ship waves has a high
single peak concentration

Ocean waves combining with ship waves has
multiple peaks and wide crests without
distinct peaks
Deployed manually in grid fashion
Node level detection
Samples in immediate area and reports to local head
node or sink for further processing and classification
Cluster level classification
Are formed according to geographical locations of nodes
Regional data fusion by a head node
Upon positive detection, sleeping nodes are awakened
and sampling rate is increased to perform more accurate
detection
Sink level detection
Processes data from head nodes
Filter raw accelerometer data








Define threshold D
max;
which must be exceeded
for a detection to occur



Validate and verify individual node
detections.
This avoids false positives by confirming that
nearby nodes are also being disturbed and
detecting ship movement.
Spatial and temporal correlations are
calculated by validating the continuous
disturbance of successive small areas
A Correlation coefficient which measures the
spatial and temporal correlations in a cluster
is defined as follows:


if C is greater than a threshold the collected
node data is considered to have a correlation.
This correlation is reported to the cluster
head and eventually to the sink
Can also determine ship velocity


As the anomaly frequency a
f
increases for
lower threshold measurements (indicative of
individual node detection, the successful
detection ratio tops at ~ 0.5.
As the threshold increases along with the
number of nodes detecting movement
(indicative of cluster detection) the false
alarms decreases significantly and as a
f

increases so does the successful detection
ratio.

Design Parameters
Number or Nodes tested
Cost per node
Tradeoffs considered during design
Communications
Power
Network
Node States



Note: The paper is generally well written, the authors are from Universities in
China, so any grammatical mistakes can be attributed less than ideal technical
writing support. The authors provide a good overview of the problem and their
approach for SID is novel and provides useful information for detection and
assessment in the water.
Alternate Power Sources
Other then batteries, i.e. solar?
Power consumption for various states of the sensor
Amount and type of memory
Whether iMote2 onboard sensors provided any useful
information
Temperature, humidity, light sensors
Could IMote2 be modeled in a simulation (using SENSE)?
Could x , y accelerometer motion provide useful data?
Size, Displacement

Note: The authors discuss the iMote2 as their primary sensing and communications device but provide
little data on how the device is configured for use.

Note: The power requirements for the system are nominally discussed. It appears that the iMote2 uses
three AA batteries. Power management is discussed but not explained in any detail. Since SID
depends heavily on cluster detection of ships moving in the area, this would probably affect the
number of nodes which could be sleeping, especially if the time to wake them up is on the order of the
ship moving through the area.



Different states of the system
Energy costs for Idle / Sleep / TX /RX states
Carrier frequency and bands
TX and RX power and efficiency
BER and SINR (if measured)

Note: The authors did not provide much detail on how communications was
instantiated for the detection system, other than the fact this is multi-hop
system and the head node must be able to communicate with the nodes in
its cluster


WSN Protocol used
MAC Protocols:
Fixed (TDMA), Demand (HIPERLAN/2), Random Access (CSMA/CD/CA)
Performance
Throughput, stability, low overhead
TX ranges and data rates
Potential Hidden /Exposed station problems
Protocol stack used
Security services available an instantiated.
What layer of protocol stack was security available in.
Dominant type of data traffic
Periodic, Intermittent, and / or Repetitive low-latency


Note: The authors appeared to have deployed a combined cluster star topology,
with individual nodes in a cluster reporting to a head node which collects data for
re-transmittal to a sink.
Probability of Assessment (P
A
) - the likelihood
of assessing an adversary within the zone
covered by an intrusion detection sensor
Probability of Sensing (P
S
) - probability that an
intrusion detection sensor will sense an
unauthorized action
Probability of Communication (P
C
) - probability
that an intrusion detection network will
communicate an unauthorized action
Probability of Detection (P
D
) = P
S
* Pc - the
likelihood of detecting an adversary within the
zone covered by an intrusion detection sensor




Probability of Assessed Detection (P
AD
) = P
A
*
P
D
Probability of Neutralization (P
N
) - the
likelihood of rendering ineffective or stopping
the actions of an adversary
Probability of Interruption (P
I
) - the likelihood
of stopping the progress of an adversary
Probability of Effectiveness (P
E
) = P
I
* P
N

Note: Provided as an alternate means of measuring system performance
Observe the overall system as a whole
What are the tradeoffs being made to optimize the
system?
Cost vs. Performance?
Hardware vs. Software?
Application vs. Network?
Decide how much you want to pay for lunch
and design the overall system from that
perspective.
Understand what you gain as well as what you
give up

Incentive
For Development Innovation, Increased
Production, Increased Performances
Process
Design, Installation, Maintenance
Mechanism
System Instantiation and Maintenance
Assurance
Performance, Meets Requirements, Maintenance

Vous aimerez peut-être aussi