Deploying a voice capture sensor network system for a secure ubiquitous home environment

In this paper we present a novel voice capture sensor network architecture proposal, we detail the implementation procedure that we followed to build a working prototype. The prototype is oriented towards a secure ubiquitous home environment but can be extended to other similar scenarios. Our approach is based on reducing data redundancy while maintaining node redundancy for reliability and providing at the same time basic security services without sacrificing a considerable amount of resources. We further show that our approach is energy-efficient compared to the capture-send approach used traditionally. More importantly, through our experiences in the real-world deployment of the system we also provide a roadmap for the development of efficient voice-based smart home applications. Copyright c © 2009 John Wiley & Sons, Ltd.

[1]  Stephen S. Intille,et al.  Designing a Home of the Future , 2002, IEEE Pervasive Comput..

[2]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[3]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[4]  Fred D. Davis,et al.  Development and Test of a Theory of Technological Learning and Usage , 1992 .

[5]  Gyula Simon,et al.  Sensor network-based countersniper system , 2004, SenSys '04.

[6]  Clare-Marie Karat,et al.  Conversational interface technologies , 2002 .

[7]  Matt Welsh,et al.  Reventador Volcano 2005 : Eruptive activity inferred from seismo-acoustic observation , 2008 .

[8]  Tarek F. Abdelzaher,et al.  EnviroMic: Towards Cooperative Storage and Retrieval in Audio Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[9]  H. Su,et al.  Energy-Efficient Clustering System Model and Reconfiguration Schemes for Wireless Sensor Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[10]  Paul Lamere,et al.  Sphinx-4: a flexible open source framework for speech recognition , 2004 .

[11]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[12]  Matt Welsh,et al.  Fidelity and yield in a volcano monitoring sensor network , 2006, OSDI '06.

[13]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[14]  Michael C. Mozer,et al.  The Neural Network House: An Environment that Adapts to its Inhabitants , 1998 .

[15]  Peter I. Corke,et al.  Data collection, storage, and retrieval with an underwater sensor network , 2005, SenSys '05.

[16]  W. Buxton Human-Computer Interaction , 1988, Springer Berlin Heidelberg.

[17]  Vincent Rijmen,et al.  Rijndael/AES , 2005, Encyclopedia of Cryptography and Security.

[18]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[19]  Xu Jing Reconfiguration of Clusterheads for Load Balancing in Wireless Sensor Networks , 2009, 2009 Third International Symposium on Intelligent Information Technology Application.

[20]  Waylon Brunette,et al.  Data MULEs: modeling a three-tier architecture for sparse sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[21]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[22]  W. Keith Edwards,et al.  At Home with Ubiquitous Computing: Seven Challenges , 2001, UbiComp.

[23]  Gregory D. Abowd,et al.  The Aware Home: A Living Laboratory for Ubiquitous Computing Research , 1999, CoBuild.

[24]  Deborah Estrin,et al.  Habitat monitoring with sensor networks , 2004, CACM.

[25]  Bruce H. Krogh,et al.  Lightweight detection and classification for wireless sensor networks in realistic environments , 2005, SenSys '05.