Modeling a Sensor Network by means of Clustering

Querying a sensor network requires the acquisition from sensors of measurements describing the state of the monitored environment. To transmit the required information, sensors consume energy. Since sensors are battery-powered, reduced energy consumption allows the extension of a sensor's lifetime. Hence, an important issue in this context is the reduction of energy consumption during data collection. We propose a framework that performs the analysis of historical sensor readings to provide better quality models for sensor networks under realistic assumptions (e.g., presence of outliers) without restrictive hypotheses on sensor variables. The framework exploits clustering techniques to select a subset of representative sensors, which will be queried instead of the whole network to reduce communication and computation costs and balance energy consumption among sensors. Preliminary experimental results, performed on data collected from 54 sensors deployed in the Intel Berkeley Research lab show the adaptability and the effectiveness of the proposed approach.

[1]  Wei Hong,et al.  Approximate Data Collection in Sensor Networks using Probabilistic Models , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[2]  Jeffrey Considine,et al.  Approximately uniform random sampling in sensor networks , 2004, DMSN '04.

[3]  Wei Hong,et al.  Model-Driven Data Acquisition in Sensor Networks , 2004, VLDB.

[4]  Eduardo B. Fernández,et al.  A Pattern System for Access Control , 2004, DBSec.

[5]  Schahram Dustdar,et al.  Model-driven and pattern-based integration of process-driven SOA models , 2007, Int. J. Bus. Process. Integr. Manag..

[6]  Johannes Gehrke,et al.  Query Processing in Sensor Networks , 2003, CIDR.

[7]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[8]  Eduardo B. Fernandez,et al.  A Methodology to Develop Secure Systems Using Patterns , 2006 .

[9]  Divyakant Agrawal,et al.  BINOCULAR: a system monitoring framework , 2004, DMSN '04.

[10]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[11]  Alexander Ran,et al.  Design decision trees , 1996, Proceedings of the 8th International Workshop on Software Specification and Design.

[12]  Shihong Huang,et al.  Defining Security Requirements Through Misuse Actions , 2006, IFIP Workshop on Advanced Software Engineering.

[13]  Wei Hong,et al.  The design of an acquisitional query processor for sensor networks , 2003, SIGMOD '03.

[14]  Xiaohong Yuan,et al.  Securing analysis patterns , 2007, ACM-SE 45.

[15]  Maritta Heisel,et al.  A Security Engineering Process based on Patterns , 2007 .

[16]  Yannis Kotidis,et al.  Snapshot queries: towards data-centric sensor networks , 2005, 21st International Conference on Data Engineering (ICDE'05).

[17]  Wei Hong,et al.  Exploiting correlated attributes in acquisitional query processing , 2005, 21st International Conference on Data Engineering (ICDE'05).

[18]  Samuel Madden,et al.  Using Probabilistic Models for Data Management in Acquisitional Environments , 2005, CIDR.