Quality-of-service in wireless sensor networks: state-of-the-art and future directions

Wireless sensor networks (WSNs) are one of today’s most prominent instantiationsof the ubiquituous computing paradigm. In order to achieve highlevels of integration, WSNs need to be conceived considering requirementsbeyond the mere system’s functionality. While Quality-of-Service (QoS) istraditionally associated with bit/data rate, network throughput, message delayand bit/packet error rate, we believe that this concept is too strict, inthe sense that these properties alone do not reflect the overall quality-ofserviceprovided to the user/application. Other non-functional propertiessuch as scalability, security or energy sustainability must also be consideredin the system design. This paper identifies the most important non-functionalproperties that affect the overall quality of the service provided to the users,outlining their relevance, state-of-the-art and future research directions.

[1]  Eduardo Tovar,et al.  Real-Time Communications Over Cluster-Tree Sensor Networks with Mobile Sink Behaviour , 2008, 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.

[2]  Antonio Alfredo Ferreira Loureiro,et al.  MANNA: a management architecture for wireless sensor networks , 2003, IEEE Commun. Mag..

[3]  Songwu Lu,et al.  GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks , 2005, Wirel. Networks.

[4]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[5]  Chen Zhang,et al.  ExScal: elements of an extreme scale wireless sensor network , 2005, 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'05).

[6]  Amitava Mukherjee,et al.  Mobility support in IP: a survey of related protocols , 2004, IEEE Network.

[7]  L. V. Doorn,et al.  SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.

[8]  Qi Han,et al.  Journal of Network and Systems Management ( c ○ 2007) DOI: 10.1007/s10922-007-9062-0 A Survey of Fault Management in Wireless Sensor Networks , 2022 .

[9]  Gaurav S. Sukhatme,et al.  Autonomous deployment and repair of a sensor network using an unmanned aerial vehicle , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.

[10]  Jan M. Rabaey,et al.  Power Sources for Wireless Sensor Networks , 2004, EWSN.

[11]  Tarek F. Abdelzaher,et al.  On Scheduling and Real-Time Capacity of Hexagonal Wireless Sensor Networks , 2007, 19th Euromicro Conference on Real-Time Systems (ECRTS'07).

[12]  Chieh-Yih Wan,et al.  Pump-slowly, fetch-quickly (PSFQ): a reliable transport protocol for sensor networks , 2005, IEEE Journal on Selected Areas in Communications.

[13]  Insup Lee,et al.  Opportunities and Obligations for Physical Computing Systems , 2005, Computer.

[14]  Pravin Varaiya,et al.  PEDAMACS: power efficient and delay aware medium access protocol for sensor networks , 2004, IEEE Transactions on Mobile Computing.

[15]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[16]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[17]  Anthony Rowe,et al.  RT-Link: A Time-Synchronized Link Protocol for Energy- Constrained Multi-hop Wireless Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[18]  Andrew S. Tanenbaum,et al.  Distributed systems: Principles and Paradigms , 2001 .

[19]  Gyula Simon,et al.  The flooding time synchronization protocol , 2004, SenSys '04.

[20]  Pai H. Chou,et al.  Energy-efficient platform designs for real-world wireless sensing applications , 2005, ICCAD-2005. IEEE/ACM International Conference on Computer-Aided Design, 2005..

[21]  Timothy C. Green,et al.  Energy Harvesting From Human and Machine Motion for Wireless Electronic Devices , 2008, Proceedings of the IEEE.

[22]  Edward A. Lee Cyber-physical Systems -are Computing Foundations Adequate? Position Paper for Nsf Workshop on Cyber-physical Systems: Research Motivation, Techniques and Roadmap , 1998 .

[23]  Gianluca Dini,et al.  S2RP: a Secure and Scalable Rekeying Protocol for Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[24]  Chris Van Hoof,et al.  Corrigendum: Harvesting energy from the motion of human limbs: the design and analysis of an impact-based piezoelectric generator , 2009 .

[25]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[26]  Pai H. Chou,et al.  AmbiMax: Autonomous Energy Harvesting Platform for Multi-Supply Wireless Sensor Nodes , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[27]  J. Elson,et al.  Fine-grained network time synchronization using reference broadcasts , 2002, OSDI '02.

[28]  Imrich Chlamtac,et al.  Time-spread multiple-access (TSMA) protocols for multihop mobile radio networks , 1997, TNET.

[29]  Anis Koubaa,et al.  On a IEEE 802.15.4/ZigBee to IEEE 802.11 gateway for the ART-WiSe architecture , 2007, 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007).

[30]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[31]  Chang-Gun Lee,et al.  Probabilistic QoS guarantee in reliability and timeliness domains in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[32]  William Stallings Data and Computer "Communications, 7th ed , 2004 .

[33]  Anis Koubaa,et al.  A comparative simulation study of link quality estimators in wireless sensor networks , 2009, 2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems.

[34]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[35]  Kang G. Shin,et al.  Soft tamper-proofing via program integrity verification in wireless sensor networks , 2005, IEEE Transactions on Mobile Computing.

[36]  Yang Xiao,et al.  Performance Limits of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[37]  Deborah Estrin,et al.  Computing aggregates for monitoring wireless sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[38]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[39]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[40]  Saurabh Ganeriwal,et al.  Timing-sync protocol for sensor networks , 2003, SenSys '03.

[41]  Abhiman Hande,et al.  Indoor solar energy harvesting for sensor network router nodes , 2007, Microprocess. Microsystems.

[42]  Stephen B. Wicker,et al.  FUNDAMENTAL PERFORMANCE LIMITS OF WIRELESS SENSOR NETWORKS , 2004 .

[43]  Stanford R. Ovshinsky,et al.  Recent advances in NiMH battery technology , 2007 .

[44]  B. R. Badrinath,et al.  The distinctive design characteristic of a wireless sensor network: the energy map , 2004, Computer Communications.

[45]  Paulo J. S. G. Ferreira,et al.  Sun, wind and water flow as energy supply for small stationary data acquisition platforms , 2008 .

[46]  Nuno Pereira,et al.  A Scalable and Efficient Approach for Obtaining Measurements in CAN-Based Control Systems , 2008, IEEE Transactions on Industrial Informatics.

[47]  Deborah Estrin,et al.  The Tenet architecture for tiered sensor networks , 2006, SenSys '06.

[48]  Thomas Watteyne,et al.  Dual-mode real-time MAC protocol for wireless sensor networks: a validation/simulation approach , 2006, InterSense '06.

[49]  Joseph A. Paradiso,et al.  Energy scavenging for mobile and wireless electronics , 2005, IEEE Pervasive Computing.

[50]  Jerome P. Lynch,et al.  Two-tiered wireless sensor network architecture for structural health monitoring , 2003, SPIE Smart Structures and Materials + Nondestructive Evaluation and Health Monitoring.

[51]  Mani B. Srivastava,et al.  Power management in energy harvesting sensor networks , 2007, TECS.

[52]  Eduardo Tovar,et al.  Energy and delay trade‐off of the GTS allocation mechanism in IEEE 802.15.4 for wireless sensor networks , 2007, Int. J. Commun. Syst..

[53]  Johnson P. Thomas,et al.  Security and QoS Self-Optimization in Mobile Ad Hoc Networks , 2008, IEEE Transactions on Mobile Computing.

[54]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[55]  Sampath Kannan,et al.  Sampling based sensor-network deployment , 2004, 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (IEEE Cat. No.04CH37566).

[56]  Chieh-Yih Wan,et al.  CODA: congestion detection and avoidance in sensor networks , 2003, SenSys '03.

[57]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[58]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[59]  Srivaths Ravi,et al.  Tamper resistance mechanisms for secure embedded systems , 2004, 17th International Conference on VLSI Design. Proceedings..

[60]  Gang Zhou,et al.  Impact of radio irregularity on wireless sensor networks , 2004, MobiSys '04.

[61]  Adrian Perrig,et al.  On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[62]  Krishnendu Chakrabarty,et al.  Distributed Mobility Management for Target Tracking in Mobile Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[63]  Donald F. Towsley,et al.  Mobility improves coverage of sensor networks , 2005, MobiHoc '05.

[64]  David Harle,et al.  Data Communications and Networks: An Engineering Approach , 2000 .

[65]  Mohamed F. Younis,et al.  An energy-aware QoS routing protocol for wireless sensor networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[66]  Tarek F. Abdelzaher,et al.  On real-time capacity limits of multihop wireless sensor networks , 2004, 25th IEEE International Real-Time Systems Symposium.

[67]  Srivaths Ravi,et al.  Security in embedded systems: Design challenges , 2004, TECS.

[68]  Eduardo Tovar,et al.  IEEE 802.15.4: a Federating Communication Protocol for Time-Sensitive Wireless Sensor Networks , 2006 .

[69]  Mani B. Srivastava,et al.  Design considerations for solar energy harvesting wireless embedded systems , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[70]  Lui Sha,et al.  Real-time communication and coordination in embedded sensor networks , 2003, Proc. IEEE.

[71]  Eduardo Tovar,et al.  Energy / Delay Trade-off of the GTS Allocation Mechanism in IEEE 802 . 15 . 4 for Wireless Sensor Networks , 2006 .

[72]  Deborah Estrin,et al.  Sympathy for the sensor network debugger , 2005, SenSys '05.

[73]  G. J. Snyder,et al.  Complex thermoelectric materials. , 2008, Nature materials.

[74]  Cristina Alcaraz,et al.  A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes , 2007, Mob. Networks Appl..

[75]  Mario Di Francesco,et al.  Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.

[76]  Eduardo Tovar,et al.  GTS allocation analysis in IEEE 802.15.4 for real-time wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[77]  Canfeng Chen,et al.  Mobile Enabled Large Scale Wireless Sensor Networks , 2006, 2006 8th International Conference Advanced Communication Technology.

[78]  Virtual Bridged,et al.  IEEE Standards for Local and Metropolitan Area Networks: Specification for 802.3 Full Duplex Operation , 1997, IEEE Std 802.3x-1997 and IEEE Std 802.3y-1997 (Supplement to ISO/IEC 8802-3: 1996/ANSI/IEEE Std 802.3, 1996 Edition).

[79]  David E. Culler,et al.  Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.

[80]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[81]  Jianzhong Li,et al.  QoS as Means of Providing WSNs Security , 2008, Seventh International Conference on Networking (icn 2008).

[82]  Dawn Song,et al.  SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..

[83]  Ian F. Akyildiz,et al.  A scalable approach for reliable downstream data delivery in wireless sensor networks , 2004, MobiHoc '04.

[84]  Mario Gerla,et al.  Evaluating Mobility Support in ZigBee Networks , 2007, EUC.

[85]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[86]  C. Van Hoof,et al.  Thermoelectric Converters of Human Warmth for Self-Powered Wireless Sensor Nodes , 2007, IEEE Sensors Journal.

[87]  Eduardo Tovar,et al.  Modeling and Worst-Case Dimensioning of Cluster-Tree Wireless Sensor Networks , 2006, 2006 27th IEEE International Real-Time Systems Symposium (RTSS'06).

[88]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[89]  Muneeb Ali,et al.  Mobility Management in Sensor Networks , 2006 .

[90]  Sung-Ju Lee,et al.  Combining Source- and Localized Recovery to Achieve Reliable Multicast in Multi-hop Ad Hoc Networks , 2004, NETWORKING.

[91]  David E. Culler,et al.  Design of an application-cooperative management system for wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[92]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[93]  Mohamed F. Younis,et al.  Fault-tolerant clustering of wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[94]  Chieh-Yih Wan,et al.  Comparison of IP micromobility protocols , 2002, IEEE Wirel. Commun..

[95]  Michael D. Smith,et al.  Implementing public-key infrastructure for sensor networks , 2008, TOSN.

[96]  Deborah Estrin,et al.  Statistical model of lossy links in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[97]  Gang Zhou,et al.  VigilNet: An integrated sensor network system for energy-efficient surveillance , 2006, TOSN.

[98]  Haiyun Luo,et al.  TTDD: Two-Tier Data Dissemination in Large-Scale Wireless Sensor Networks , 2005, Wirel. Networks.

[99]  Panganamala Ramana Kumar,et al.  The Number of Neighbors Needed for Connectivity of Wireless Networks , 2004, Wirel. Networks.

[100]  Katia Obraczka,et al.  Energy-efficient collision-free medium access control for wireless sensor networks , 2003, SenSys '03.

[101]  Radhika Nagpal,et al.  Firefly-inspired sensor network synchronicity with realistic radio effects , 2005, SenSys '05.

[102]  Elmar Gerhards-Padilla,et al.  BonnMotion: a mobility scenario generation and analysis tool , 2010, SimuTools.

[103]  Mohamed F. Younis,et al.  Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.

[104]  Miodrag Potkonjak,et al.  Coverage problems in wireless ad-hoc sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[105]  Jeffrey Considine,et al.  Approximate aggregation techniques for sensor databases , 2004, Proceedings. 20th International Conference on Data Engineering.

[106]  Qi Han,et al.  Sensor data collection with expected reliability guarantees , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[107]  Deborah Estrin,et al.  Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.

[108]  Kang G. Shin,et al.  System Support for Management of Networked Low-Power Sensors , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[109]  Alessandro Cilardo,et al.  Elliptic Curve Cryptography Engineering , 2006, Proceedings of the IEEE.

[110]  C. Van Hoof,et al.  Micromachined Thermopiles for Energy Scavenging on Human Body , 2007, TRANSDUCERS 2007 - 2007 International Solid-State Sensors, Actuators and Microsystems Conference.

[111]  Chenyang Lu,et al.  SPEED: a stateless protocol for real-time communication in sensor networks , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[112]  Shrikant Bodhe,et al.  A survey of integrating IP mobility protocols and mobile ad hoc networks , 2007, IEEE Communications Surveys & Tutorials.

[113]  Lui Sha,et al.  An implicit prioritized access protocol for wireless sensor networks , 2002, 23rd IEEE Real-Time Systems Symposium, 2002. RTSS 2002..

[114]  Prashant J. Shenoy,et al.  Scheduling messages with deadlines in multi-hop real-time sensor networks , 2005, 11th IEEE Real Time and Embedded Technology and Applications Symposium.

[115]  Deborah Estrin,et al.  Residual energy scan for monitoring sensor networks , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).

[116]  Ramesh Govindan,et al.  Understanding packet delivery performance in dense wireless sensor networks , 2003, SenSys '03.

[117]  Tin Yu Wu,et al.  A survey of Mobile IP in cellular and Mobile Ad-Hoc Network environments , 2005, Ad Hoc Networks.

[118]  William Stallings,et al.  Data and computer communications (2nd ed.) , 1988 .

[119]  Özgür B. Akan,et al.  ESRT: event-to-sink reliable transport in wireless sensor networks , 2003, MobiHoc '03.

[120]  James C. Kellogg,et al.  Energy scavenging for small-scale unmanned systems , 2006 .

[121]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[122]  Eduardo Tovar,et al.  i-GAME: an implicit GTS allocation mechanism in IEEE 802.15.4 for time-sensitive wireless sensor networks , 2006, 18th Euromicro Conference on Real-Time Systems (ECRTS'06).

[123]  Matthew Johnson Usability of Security Management: Defining the Permissions of Guests , 2006, Security Protocols Workshop.

[124]  Kameswari Chebrolu,et al.  Censor networks: a critique of "sensor networks" from a systems perspective , 2008, CCRV.

[125]  Joseph A. Paradiso,et al.  Parasitic Mobility for Pervasive Sensor Networks , 2005, Pervasive.