Chapter 2

Wireless sensor networks applications to smart homes and cities

A. Belghith*
M.S. Obaidat
*    Department of Telecommunications, University of Sfax, Sfax, Tunisia
    Department of Computer and Information, Fordham University, Bronx, NY, United States

Abstract

Wireless Sensor Networks (WSNs) provide several types of applications providing comfortable and smart-economic life. Energy saving minimizing the rare sources of energy, noise and atmospheric monitoring reducing the pollution, and healthcare monitoring helping the health are examples of important applications in WSNs.

Any application requires communication between the sensors and the different kinds of servers. This communication can be performed using three main access technology architectures. These architectures profit from important wireless communication technologies such as IEEE 802.15.3 and IEEE 802.15.4 for Wireless Personal Area Network (WPAN), IEEE 802.11g and 802.11n for Wireless Local Area Network (WLAN), and High Speed Downlink Packet Access (HSDPA) and Long-Term Evolution (LTE) for Wireless Wide Area Network (WWAN).

In order to enhance application performance, the routing strategies discovering the best path to the destination, the energy-saving methods maximizing the life of sensors, and security protocols guarantying our privacy are the most important techniques used in WSNs.

Keywords

WSN
applications
access technologies
power saving
routing
security

1. Introduction

Wireless Sensor Networks (WSNs) [1] connect our world more than we dream up. Noise and atmospheric pollutions, garbage level sensor, road traffic monitoring, and smart parking are some of the many WSN applications to smart cities. In smart homes, it is now difficult to avoid using home video message, alarm to mobile phone, door, window, and light control applications while providing comfortable and smart-economic life.
To ensure this admirable way of life, new challenges of WSNs arise. Which access technologies can be used in telecommunication systems for smart cities and homes? Wireless protocols have to be used to communicate with thousands of nodes while managing a trade-off between data transfer rate, speed, and power consumption.
The huge number of sensors requires data aggregation mechanisms in order to prevent information redundancy and high energy consumption, storage capacity, and communication bandwidth. Obviously, these aspects cannot be met given the limitations of WSNs.
Moreover, it is interesting to define efficient network discovery and intelligent path determination to obtain reliable routing protocols taking into account the characteristics of sensors in the smart cities and homes.
Reliability is also guaranteed by security aspects such as encryption, access control, and secure data aggregation. Encryption becomes vital as data exchanged are related to personal and confidential data. Access control avoids privacy information discloser, especially for remote home monitoring.
In this chapter, we first give some examples of WSN applications in smart homes and cities. Then, we discuss the access technology to be used for the applications. Finally, we present some protocols useful to provide better applications’ performance such as the routing strategies, energy-saving methods, and security protocols.

2. WSN applications examples

In this section, we present essential applications of WSNs for smart cities and homes. There are three key applications: energy saving, noise and atmospheric monitoring, and healthcare monitoring.

2.1. Energy-saving applications

The huge energy consumption and the high fuel cost require an efficient use of the energy that becomes more and more rare. Fig. 2.1 shows the total consumption by End-Use sector in the United States [2].
image
Figure 2.1 Total Consumption by End-Use Sector in the United States, 1949–2014 (Quadrillion Btu)
Exact values of energy consumed in the electric power, residential, and transportation sectors in 1994 and 2014 are presented in Table 2.1. We note an increase of about 15% in the past 20 years and therefore it is essential to efficiently react to this growth.

Table 2.1

Total Energy Consumed in 1994 and 2014 by Different Sectors in the United States

Total Energy Consumed by In 2014 (Trillion Btu) 1994 (Trillion Btu) Increase in Past 20 Years (%)
The electric power sector 38,520.472 32,398.714 15.9
The residential sector 21,530.939 18,111.572 15.88
The transportation sector 27,117.707 23,365.133 13.83

The increase in energy consumption is not related only to the USA, but concerns all countries in the word such as in Finland where lighting consumes over 30% of the total electricity used in households for appliances [3] and in Egypt where the consumption of energy in a house can reach 1500 kWh/month [4].
Energy-efficient buildings have to be designed in order to significantly reduce the energy use, especially for heating and cooling. The decrease of the energy use can be performed when reducing the demand for energy by avoiding waste and implementing energy-saving measures. Waste energy avoidance can be performed by having good insulation means, air tightness, and ventilation. In Ref. [5], a procedure for measuring and reporting commercial building is proposed. This procedure consists of two steps. The first step is the measurement system design that identifies the performance metrics, the physical location of each measurement, the frequency of measurements, and the measurement equipment. The second step is the data collection and analysis, which specifies how to monitor data, assemble data, and calculate monthly and annual metrics.
We note that the wasted energy reduction is not sufficient. It is also interesting that the buildings use sustainable and green sources of energy instead of finite fossil fuels. For example, a green building architecture is proposed in Ref. [6]. Monitoring the temperature, light intensity, and presence of persons provides information that is used by the control subsystem of the proposed architecture. The control subsystem can tune the energy to consume, inform the users about the status of the energy consumption periodically or when there are excessive energy consumption in real-time reports, and schedule flexible tasks. For example, when using smart meters in a building [7], the cost of energy varies depending on the period of day and therefore the control subsystem can schedule some house tasks when the price of energy becomes low. Finally, taking into account the atmospheric characteristics, we can program which type of energy can be used such as solar, wind, and geothermal energies.
Wireless sensors can also use green energy such as light, motion, and vibration to work. For example, GreenPark developed ultralow-power sensors that use environmental energy sources in order to reduce the energy consumption and extend the use of sensors in a building [8].

2.2. Noise and atmospheric monitoring

WSNs can be very helpful for the health of urban residents as they can monitor noise and atmospheric pollution. First experiences using WSNs for noise pollution monitoring are presented in Ref. [9]. These experiences are based on Tmote prototyping platform for collecting noise pollution data in both indoor and outdoor settings. Experimental results show the feasibility of using WSNs in noise monitoring. Therefore this kind of application can prevent expensive and complex tasks done especially by private entities.
The increase of noise pollution motivates researchers to continuously propose designs for noise pollution monitoring systems. For example, in Ref. [10], authors propose noise measurement instruments and techniques taking into account the transmitter, receiver, and atmosphere. Note that the noise follows a path depending on the atmosphere to reach the receiver. In Ref. [11], a design of an energy-harvesting noise-sensing WSN mote is proposed in order to mitigate and fight noise pollution. The proposed mote extension is able to detect noise levels in urban environments where there are multiple pulse loads. Experimental results show that the WSN mote provides an improvement of more than 300% in the analytically derived duty cycles.
Note that some commercial WSN devices for atmospheric pollution monitoring are presented in Ref. [12] such as Waspmote, Generic Ultraviolet Sensors Technologies and Observations (GUSTO), and CitiSense. Waspmote [13] can monitor several parameters to verify if the quality of air we breathe is healthy. These parameters consist of Nitrogen dioxide (NO2), Carbon dioxide (CO2), Methane (CH4), and Hydrocarbons (Ethanol, Propane, Butane, etc.). GUSTO [14], based on the Differential Ultraviolet Absorption Spectroscopy (DUVASTM) technology [15], can measure and transmit urban pollutants such as NO2, O3, and benzene in real time.
Figs. 2.2 and 2.3 show Waspmote and GUSTO devices, respectively. We note that these devices do not have display. They send air pollution measurements to a collector for further analysis and investigation.
image
Figure 2.2 Waspmote Devices
image
Figure 2.3 GUSTO Device
CitiSense [16], developed by a University of California-San Diego team, is a pollution monitoring system that can be integrated in smartphones. Therefore, it provides very smart useful service to users in order to prevent staying in highly polluted places. Fig. 2.4 shows that CitiSense finds out that air quality in the current place is moderate. Note that real-time information about air pollution can be obtained using other sophisticated tools such as over the Google Map. However, information is not displayed for public users (only for users having authorization) [17]. Many areas deploy this technology such as in Qatar [18].
image
Figure 2.4 Air Quality Monitoring by CitiSense
Like noise pollution monitoring, several system designs for air pollution were proposed. In Ref. [19], authors propose an air pollution system that monitors the air quality in real time while reducing the energy consumption of sensors using a power-saving strategy. The proposed power-saving strategy is described later. Sensors sense the pollution information and then compare the pollution level with defined standard reference values. If the pollution level sensed is high, then data are sent through transmitter and sensors wait 5 min before sensing the pollution information in the next time. Otherwise, when the sensed pollution level does not exceed the threshold values, sensors do not send data and wait 15 min before performing next measurements.
In Ref. [20], Kalaimani and Sakthivel propose a simple WSN-based air quality monitoring system (WSN-AQMS) for industrial areas. The proposed monitoring system controls and monitors the physical environment while reducing the energy consumption and the rate of data exchanged between sensors. It selects WSN components depending on the building’s purpose, the number of nodes needed, and the options of evaluation. The architecture of the monitoring system uses Gas sensors, humidity sensors, and Global System for Mobile communications (GSM) modules for cellular communications.

2.3. Healthcare monitoring

In addition to the noise and atmospheric monitoring, which are useful for keeping health, WSNs can be also used for smart healthcare of residents while keeping their comfort and privacy. In Ref. [21], authors propose system architecture for residents’ health monitoring. The proposed system integrates the existing medical technology in low-cost sensors in order to nurse elder and handicapped persons. The efficiency of this solution is based on the following proprieties: portability of the small devices (sensors), scalability of the number of devices used when decreasing the complexity of the functionalities, autoconfiguration capability especially when using Internet Protocol version 6 (IPv6) protocol [22], and the real-time response of the deployed sensors when measurements exceed specific thresholds.
Evidently, WSN monitoring is used in hospitals. Many projects are developed in this field [23] such as HealthGear (Microsoft project) [24], MobiHealth (European Commission project) [25], CodeBlue (Harvard University project) [26], and Wireless Sensor Network for Quality of Life (WSN4QoL) (Marie Curie project) [27].
HealthGear consists of a set of noninvasive physiological sensors that are connected via Bluetooth to cell phones. The sensors contain modules that measure many parameters such as the blood’s oxygen level of users as well as the user respiration and motion. The measurements are then transmitted using Bluetooth in order to analyze them and represent the results in an interface (see Fig. 2.5).
image
Figure 2.5 Interface of HealthGear
MobiHealth profits from available technologies such as mobile medical sensors, public wireless network, and new services of Universal Mobile Telecommunications System (UMTS). It provides medical follow-up and medical research. Note that MobiHealth deals with many fields such as remote monitoring of glucose levels in Europe [28] and pregnancy telemonitoring in community centers and clinics in Zambia [29]. As an example, the interface of Diabetes management is presented in Fig. 2.6.
image
Figure 2.6 Interface of MobiHealth for Glucose Measurements
CodeBlue consists of wireless infrastructure that is deployed in emergency medical care environments. It integrates low-power wireless sensors, Personal Digital Assistants (PDAs), and Personal Computers (PCs). The wireless sensors integrate Global Positioning System (GPS) to track persons, an Electromyography (EMG) module that checks the health of the muscles for motion capture, and a mote-based pulse oximeter for transmitting periodic packets containing heart rate.
WSN4QoL aims to provide real-life implementations on the pervasive healthcare applications. The applications targeted by this project are for pacemaker, blood pressure, cochlear implant, and electroencephalogram (EEG).

3. Access technologies

In this section, we present three architectures for access technologies. These architectures are summarized in Ref. [30].

3.1. First access technologies architecture

The first architecture is presented in Fig. 2.7. It can be deployed at home, at work, and in hospitals when monitoring healthcare system. The wireless sensors perform measurement and send results to the personal server using Wireless Personal Area Network (WPAN) technologies such as IEEE 802.15.1 [31], IEEE 802.15.3 [32], and IEEE 802.15.4 [33]. The personal server can be a PDA and needs a second wireless interface, in addition to the WPAN interface, in order to connect to the home server. The connection with the home server is performed using Wireless Local Area Network (WLAN) technologies such as IEEE 802.11a/b/g/n.
image
Figure 2.7 First Access Technologies Architecture: Use of WPAN and WLAN
The home server, called also the central server, has to be connected to the Internet in order to send data to the distant server. This connection has to be secured. Finally, the distant server gathers different information, analyzes it, and displays the final results. The final results can be obtained via web pages in order to facilitate the information access.
The well-known WPAN technology is Bluetooth, which is based on the IEEE 802.15.1 standard. This technology is designed for short range, low cost, and low energy consumption. It operates in the Industrial, Scientific, and Medical (ISM) frequency band of 2.4 GHz, but there are methods to reduce interference [1,34].
IEEE 802.15.3 represents the high rate of WPAN. It provides high throughput and therefore this technology is useful when the sensors need to send images and videos. Moreover, sensors using IEEE 802.15.3 can directly communicate between them and therefore this technology is useful when there is a need to create mesh networks [35]. However, this technology consumes more energy due to the overhead for communication links management [36].
IEEE 802.15.4 represents the low rate of WPAN. It provides low throughput, but enhances the reduction of the energy consumption. Moreover, this technology has sophisticated methods to prevent interference [37]. For example, the bad channels are not used for data transmission such as in Ref. [38] or all channels are used but with different probabilities depending on the channel quality such as in Refs. [1,39,40].
Next, we briefly present the main characteristics of WLAN technologies (see Table 2.2). IEEE 802.11a [1,41] uses orthogonal frequency division multiplexing (OFDM) technique and works in the 5-GHz frequency band. The throughput can reach 54 Mbits/s. The main drawback of this standard is that the signals cannot penetrate obstacles such as walls and solid objects [42,95].

Table 2.2

Main Characteristics of IEEE 802.11a/b/g/n

Standard IEEE 802.11a [41,95] 802.11b [43,102] 802.11g [44] 802.11n [45]
Frequency (GHz) 5 2.4 2.4 2.4 and 5
Modulation OFDM DSSS OFDM and DSSS MIMO–OFDM
Throughput (Mbit/s) 54 11 54 248
Range (m) 35 35 35 70
Publication date October 1999 October 1999 June 2003 October 2009
Advantages Good throughput Low cost Good throughput and better obstacle penetration High throughput and better range
Drawbacks Signals cannot penetrate obstacles Medium throughput and sensitive to interferences Wireless congestion

DSSS, Direct Sequence Spread Spectrum; MIMO, Multiple Input Multiple Output; OFDM, orthogonal frequency division multiplexing.

IEEE 802.11b uses the Direct Sequence Spread Spectrum (DSSS) technique and works in the 2.4-GHz frequency band. The throughput can reach 11 Mbits/s [46]. Note that the use of Carrier Sense Multiple Access/Collusion Avoidance (CSMA/CA) for physical channel access decreases the throughput [102]. Moreover, CSMA/CA is not fair [47]. The main advantage of IEEE802.11b is the low cost and so this technology is widely deployed. However, the throughput is not high and as the frequency band of 2.4 GHz is used, signals are very sensitive to interferences.
IEEE 802.11g uses both OFDM and DSSS techniques and works in the 2.4-GHz frequency band. The throughput can reach 54 Mbits/s. Like IEEE 802.11b, the use of CSMA/CA decreases the throughput. The main advantage of this technology is in its high throughput and the interoperability with the widely used standard IEEE 802.11b [48]. However, as the frequency band of 2.4 GHz is used by many types of equipment such as IEEE 802.11b wireless cards, phones, microwave ovens, and baby monitors, IEEE 802.11g suffers from wireless congestion [49].
IEEE 802.11n uses OFDM and Multiple Input Multiple Output (MIMO) techniques and works in the 2.4- and 5-GHz ISM frequency bands. MIMO enables the opportunity to spatially resolve multipath signals [50]. The throughput can reach 600 Mbits/s when using four antennas for transmission and four antennas for reception. Note that 4 × 4 is the maximum MIMO configuration allowed in IEEE 802.11n.

3.2. Second access technologies architecture

The second architecture is presented in Fig. 2.8. This architecture utilizes only WPAN technologies and therefore it does not need the personal server. Therefore, this technology is the cheapest as it reduces the number of devices needed. The wireless sensors send measurement results directly to the home server using WPAN technologies. However, the wireless sensors require more energy to access the home server as they have to increase Radio-Frequency (RF) output power. The increase of the RF power can also cause more collisions and hence more retransmissions. The increase of the retransmissions degrades the Quality of Service (QoS) and consumes more energy as the same data are transmitted several times.
image
Figure 2.8 Second Access Technologies Architecture: Use of WPAN Only

3.3. Third access technologies architecture

The third architecture is presented in Fig. 2.9. As in the first architecture, the wireless sensors send measurement results to the personal server. Then, the personal server gathers and forwards data to the home server. Unlike in the first architecture, the connection between the personal server and the home server is performed using Wireless Wide Area Network (WWAN) technologies such as 2G, 2.5G, 3G, and 4G. Finally, the home server, connected to the Internet, sends data to the distant server.
image
Figure 2.9 Third Access Technologies Architecture: Use of WPAN and WWAN
Now, we briefly describe some WWAN technologies. The second generation (2G) of mobile networks started to be deployed in the beginning of the 1990s. The main 2G mobile network, and the most successful, by far, is the GSM [51,102]. The services were limited to voice and Short Message Service (SMS).
The so-called two-and-half generation (2.5G or 2G+) such as General Packet Radio Service (GPRS) [52] and Enhanced Data Rates for GSM Evolution (EDGE) [53,102] added packet data services and increased data rate. This generation is mainly used for Internet-style access and email. The theoretical maximum rate in the GPRS system is 115 Kbps while the EDGE system provides better theoretical maximum rate (up to 384 Kbps) [102].
Nevertheless, users need wireless high-speed Internet access. Moreover, users want to be able to access the Internet from a large area. The 3G system can support multimedia, data, video, and other services along with voice. The main 3G systems are the UMTS [54] and CDMA2000 [55,102]. The first deployment of CDMA2000 and UMTS took place in 2000–01.
Yet, the 3G systems are still in evolution. The first data rates were in the magnitude of 1 Mbps. Nowadays much higher data rates are expected in both uplink and downlink with the High Speed Downlink Packet Access (HSDPA) and the High Speed Uplink Packet Access (HSUPA) evolutions [56] (see, eg, Release 7 of UMTS). Apart from the displayed physical data rates, application-level data rates are smaller. For example, in 2007, the HSUPA could reach 1 Mbps for a File Transfer Protocol (FTP) application [57]. More recent versions of HSUPA have higher figures. The next step after 3G is (evidently) 4G or what is also known as Beyond 3G (B3G).
Long-Term Evolution (LTE) defined by third Generation Partnership Project (3GPP) Release 8 in 2008 is a very promising technology providing a high peak data rate of 163 Mbps in a channel bandwidth of 10 MHz and a low latency of 15 ms [58]. The enhancement of LTE, called LTE-Advanced (LTE-A), aims to reach a peak data rate of 1 Gbps in order to have a fourth-generation (4G) access technology. This technology continues to evolve through Release 13 that is planned to be completed in March 2016 although some features will be added [59]. This release includes advanced features such as supporting Advanced three Band Carrier Aggregation (three in Downlink/one in Uplink).
The different access technologies can be evaluated using experimental tests or simulation tools. Note that a web-based simulation tool, proposed in Ref. [60], provides a simulation environment with Network Simulation 2 (NS-2) [61] and includes WSN and Bluetooth modules that can be used to practically evaluate different access technologies for WSN networks.

4. Routing strategies

Routing strategies applied to WSN applications for smart cities and homes have to be simple but efficient in order to enhance the QoS supported by these applications. Moreover, it is essential to not propose complex strategies due to the limit capacities of sensors. An intelligent routing strategy is proposed in Ref. [62]. The proposed routing strategy is based on an efficient network discovery. The network discovery uses a multihop routing tree constructed by the Spanning Tree depending on the metric used. The construction of the Spanning Tree is performed using the Prim’s approach [63]. After adding each sink node to the tree, tree edges are then iteratively selected in breadth-first search, based on the defined routing metric until all nodes are added. The proposed routing strategy uses messages for the discovery of the best parent, announcement of the potential parents (sending beacons periodically), association with the parent selected, and acknowledgment when the association is successful (ack is sent by the parent).
The best parent is determined based on the metric used. The choice of the metric depends on the application requirements. Metrics can be, for example, the number of hops, quality of signals, and residual energy. In Ref. [62], the defined metric combines between these three kinds of metrics using Fuzzy Logic (FL) decision approach. One example of the FL approach used in routing in WSN is presented in Ref. [64].
Experiments are run on the I3ASensorBed testbed [65]. This testbed, deployed in the Albacete Research Institute of Informatics, contains 47 nodes to emulate WSN applications in smart cities. Sensors can monitor temperature, humidity, CO2, presence, door and window state (open or close), and energy consumption sensors. The testbed is accessible using a WEB interface to select nodes that perform applications, configure the nodes, and schedule application running. Note that there are other testbeds in the literature such as Wireless Sensor Network Testbeds (Wisebed) [66], Realnet [67], Twist [68], FIRE [69], and Neteye [70].
Experimental results show that the proposed routing strategy outperforms Hop Algorithm (HA) and Received Signal Strength Indicator Algorithm (RSSIA) in terms of energy consumption per delivered data packet (see Fig. 2.10) and packet delivery ratio (see Fig. 2.11). HA and RSSIA favor routes that have minimum number of hops to the receiver and the maximum RSSI of nodes, respectively.
image
Figure 2.10 Energy Consumed Per Delivered Data Packet Results [62]
image
Figure 2.11 Packet Delivery Ratio Results [62]
The experimental results of energy consumed per delivered data packet can be explained by the fact that HA takes into account only the number of hops and therefore the number of delivered packet decreases as nodes do not have the same residual energy and the same quality of channel. On the one hand, the Modulation and Coding Scheme (MCS) used depends on the channel quality. An efficient MCS (so more data transmitted) is used when the channel quality is better. On the other hand, when data is forwarded by nodes having low residual energy, these nodes can shut down and so the amount of data transmitted decreases. For routing algorithm RSSIA, when the RSSI is the single parameter in selecting routes, data are forwarded by long routes (having high number of hops) and therefore require more total energy consumed.
The experimental results of the packet delivery ratio can be explained by the fact that HA favors routes having the minimum hops and therefore these hops have poor channel quality. When the channel quality is poor, the MCS used has to be robust and therefore lower number of data packets is transmitted. As RSSIA chooses long routes and consumes more energy, the packet delivery is lower than that provided by the FL strategy that combines several metrics in order to select routes having high quality.
The FL decision approach can also be performed in order to reduce the energy consumed. For example, in Ref. [71], authors propose a routing protocol using the FL approach depending on three parameters: the degree of closeness of node to the shortest path, the degree of closeness of node to sink, and the degree of energy balance. Simulation results show that the proposed routing protocol can reduce the energy consumed by 75% when compared to Greedy Perimeter Stateless Routing (GPSR) [72] and minimum transmission energy (MTE) [73]. These two routing protocols (GPSR and MTE) select routes depending only on the location of neighbors and therefore do not balance energy between nodes.
In Ref. [74], authors proposed an adaptive routing strategy taking into account many individual and environmental criteria in order to reduce the traffic congestion and the environmental impact. For example, an individual can choose a trip that contains several touristic areas or provides a safe route avoiding high-criminality areas.
To reduce the traffic congestion and the environmental impact, the route selection has to consider the system state depending on the characteristics of system areas [75,76]. The pattern used in Ref. [74] and located in the city of Milan (Italy) consists of four layers: traffic, pollution, crimes, and events. The traffic layer contains data about the total number of calls and texts generated over a period of 2 months. The pollution layer is based on data obtained by seven sensors. These sensors perform measurements each hour over the course of the past 2 months. The third layer contains 1276 crimes happened during the past year. Finally, the events layer contains 100,000 geolocated tweets generated over a 1-month period. These different layers aim to combine individual level (eg, crimes layer) and global level (eg, pollution layer). Note that Geographic Information System (GIS) can be used to enhance pattern definition.
As the different individuals do not have the same constraints of route selection, variable coefficients of static and dynamic constraints can be defined. Static constraints correspond to restrictions that do not change over time or change over large temporal scales while dynamic constraints correspond to rapid changes within the system itself such as the traffic flow, weather, or accidents.
Simulation results show that the proposed routing strategy decreases time to reach destination. In addition to the efficient route selection, sensors monitor the state of the city in real time and therefore automatically identify areas that are experiencing a temporary congestion and give authorities the possibility to rapidly take action when crimes or accidents occur.

5. Power-saving methods

Energy management in smart homes and cities can be performed by different methods. In general, the visualization of power consumption reduces the energy consumption of cities and homes between 10% and 30% [77]. For example, optical reader can be used to read the power indicator of a utility revenue meter. In Ref. [78], Gagnon proposed a system that contains three components: a sensor that monitors the cyclical property of the indication and generates information depending on the energy consumption measurements, a transmitter that sends the information obtained, and a remote display that indicates the energy consumed when receiving information via the transmitter. The main drawback of this method is that the information collected is very limited as it depends only on the cyclical property of the indication.
Smart meters can replace optical reader in order to reduce the energy consumption [79]. The smart meters can access the information in real time and transmit data using wired or wireless networks. Evidently, for flexible use of the smart meter, it is recommended that smart meters enable wireless transmitter. However, the main drawback of smart meters is the low data refreshing rate (in general each 15 min) due to the communication constraints.
Traditional electric current and voltage probes can be installed inside the electrical panel of customers [80]. This method can collect high-quality information for the analysis of nonintrusive load monitoring. However, the installation of the measuring probes is difficult as it requires licensed professionals.
In Ref. [81], the authors propose the use of a new energy-saving method based on the magnetic sensor array technique. The measurement device for monitoring home energy use is presented in Fig. 2.12. It is composed of an array of magnetic sensors, an electric panel, and a conduit (containing conductor currents).
image
Figure 2.12 Measurement Device Based on Magnetic Sensor Array
The main advantage of this method is that the installation is easy as there is no electrical contact to the conductors so a homeowner can easily install it. Moreover, data refreshing rate is high (each 1 s). Once the sensor is calibrated using the Power Line Communication (PLC) scheme [82], it collects the current information and then transmits the information collected to a receiver using 433-MHz low-power RF communication. Note that the PLC technology provides a self-contained system. The receiver is connected to a remote Internet server using Local Area Network (Ethernet) where information is analyzed in order to display results in an Internet Website.
Based also on the PLC scheme, a home energy management system (HEMS) is proposed in Ref. [83]. The proposed system does not require any additional electric construction as power lines are available in cities and houses. In addition to the energy saving in cities and home appliances, the proposed system takes into account the energy usage of the HEMS itself, in order to decrease the total system cost. The architecture of the proposed HEMS is presented in Fig. 2.13.
image
Figure 2.13 The Architecture of the Proposed HEMS [83]
Sensors, called smart power trips nodes, perform measurements on the power consumption each 10 ms in order to obtain accurate measurements. Note that the accuracy of an electrical energy consumption monitoring system can be improved using a technique proposed in Ref. [84]. This technique is based on a network of Hall-effect wireless sensors attached to the wire in the electrical distribution panel. In order to mitigate the gain errors due to the distance between the sensor and the monitored wire, a single high-precision current transformer sensor has to be added at the main electrical input.
To reduce the energy consumption, the sensors send the average measurements obtained each 1 s. Moreover, they use a low-power wireless communication technology (IEEE 802.15.4) for transmitting results to the sink node. Note that the energy consumption can be enhanced when reducing the amount of the transmission of messages Clear to Send (CTS) [85]. When receiving data from the sensors, the sink node forwards it to a data acquisition component that includes a Data Stream Management System (DSMS) for data processing and data writing in the database. Finally, the results are displayed using web interfaces.
A similar architecture composed of three layers is proposed in Ref. [86] for the purpose of designing a zero-energy home using WSNs. The first layer is the sensors layer where it is essential to investigate the possible avenues of harvesting energy in homes and other buildings and so to efficiently localize the energy harvesting. The second layer is the communication and computation layer where the energy generation is analyzed in order to manage and control the energy system using Information and Communication Technologies (ICT). In order to reduce the energy consumption, sensors should have the ability to decide the actions to take in real time [87]. For example, a smart heating control system was adapted to the available sensors opportunistically in order to reduce the energy consumption while providing the comfort temperature [88]. Note that heating represents a great source of energy consumption. For example, in Switzerland, heating represents 65% of the total consumption in residential buildings [89]. The third layer is the storage layer using the small-scale energy storage devices such as batteries stationed in various locations in houses and cities and therefore the storage devices are distributed.
Finally, in order to evaluate the consumption of energy of the sensor itself, a sophisticated energy model has to be defined. This model has to take into account many energy sources such as:
the radio transmission and reception energy representing the energy consumed for exchanged information;
the control access energy representing the energy consumed when waiting the liberation of the physical channel and when exchanging control packets such as Request-To-Send (RTS) and CTS packets;
the sensor sensing energy enabling the sensor to connect to the physical world for monitoring;
the sensor logging energy representing the energy consumed for writing information in a database;
the aggregation energy for processing in order to reduce the quantity of information exchanged and to eliminate redundancy;
the transient energy representing the dissipated energy when the sensor changes from states (reception, transmission, idle, and sleep states [90]). Note that in the sleep state, the sensor consumes the lowest energy. In the reception and transmission states, the sensor is receiving and transmitting data, respectively. In the idle state, the sensor is awake but it is neither transmitting nor receiving its bursts.
Many energy models were proposed in the literature such as in Refs. [9195]. The energy sources considerations of the energy models are presented in Table 2.3. Evidently, we recommend using the energy model proposed in Ref. [94] in order to use a realistic model.

Table 2.3

Energy Sources Considerations of Energy Models

Energy Sources Model in Ref. [91] Model in Ref. [92] Model in Ref. [93] Model in Refs. [94,102]
Radio transmission and reception energy Yes Yes Yes Yes
Control access energy No No No Yes
Sensor sensing energy No Yes No Yes
Sensor logging energy No No No Yes
Aggregation energy Yes Yes Yes Yes
Transient energy No No Yes Yes

6. Security

Security in applications for smart homes and cities is almost similar to WSN application environment and therefore the security and privacy concerns are also similar. Security issues in WSNs are presented in Ref. [95] detailing specific and physical attacks as well as security protocols and requirements.
However, the communications in sensor networks applications in smart homes and cities is exposed to more serious threats especially when concerning privacy in homes and vital risks on health of persons. Moreover, in access technologies, many wireless networks can be used simultaneously and thus security in these technologies is a major challenge because of the different characteristics of security architectures used within each wireless network; see Refs. [9597].
Among the attacks that can be harmful to WSN applications deployed in smart homes and cities, we cite the following:
Illegal access: A user that does not have authorization may access the system when there is no consistent authentication.
Data alteration: An attacker may modify the information transmitted in the network. Moreover, it can access the database and alter stocked information.
Fake data injection: An attacker may insert erroneous information disrupting the system functioning and even causing damages.
Denial-of-Service (DoS) attacks: An attacker may make the network or equipment unavailable by inserting a great amount of information and/or requests.
Replay attacks: An attacker may replay the requests sent with false answers.
Attacks can be classified into passive or active. Passive attacks aim to obtain information without performing actions such as alteration and dropping and therefore it is too difficult to detect this kind of attacks. Active attacks are more harmful than passive attacks as they steal and alter information in addition to causing drops and even blocking of system functionality. For example, active attacks on hospital and healthcare WSN applications may conduce to life-threatening situations [98,103].
Note that any efficient and useful application has to consider the security. For example, a general architecture taking into account the security in the medical environment is proposed in Ref. [99]. Furthermore, the security is considered in all healthcare projects. In the CodeBlue project, in addition to the event delivery, filtering, aggregation, and handoff modules, a flexible naming and discovery scheme as well as authentication and encryption procedures is used (see Fig. 2.14 [26]).
image
Figure 2.14 Main Modules in CodeBlue Project Architecture
In the WSN4QoL project, the middleware layer contains the security block (see Fig. 2.15 [27]). This block monitors the acknowledgment packets exchanged at the network layer in order to identify threats or equipment malfunctioning and instruct the MAC layer to encrypt data.
image
Figure 2.15 Protocol Stack Used in the WSN4QoL Project Architecture
Therefore, in order to design robust applications, the following security requirements have to be considered:
Confidentiality: As data is highly confidential especially in smart home applications, it is crucial to ensure the secrecy of data.
Integrity: It is essential to guarantee that data received was not modified by attackers. This can be insured by hashing and digital signature. Error resilience as well as communication and data reliability are vital for medical applications [23], especially under chirurgical operations and emergency situations.
Availability: Applications have to offer availability and therefore absolutely avoid system crash due to DoS or Distributed Denial-of-Service (DDoS) attacks. In fact, a lack of availability leads to several problems for saving lives in healthcare applications [100] or fatal accidents when attacking driving management applications in cities [95,101,103].
Secure localization: Things and persons have to be exactly located for efficient applications without unveiling the localizations for the safety and privacy of users.
Secure routing information: Routes have to be safe and information has to cross only trusted equipment.
Intrusion protection and detection: Any network is susceptible to intrusion and therefore prevention and detection techniques have to be deployed. The system has to be well protected and the source of attack has to be determined for further actions [102].

7. Summary

In this chapter, we have presented different wireless sensor networks applications in smart homes and cities. We have focused on applications for energy saving, noise and atmospheric monitoring, and healthcare monitoring. The energy saving is primordial as energy resources have become more and more scarce while the energy use significantly increases. The monitoring of noise, atmospheric, and healthcare aspects certainly makes lives more healthy and comfortable.
To perform these applications, we have presented three access technologies differing in networks and equipment used and therefore presenting various costs and efficiencies. Finally, in order to enhance applications’ performance, we have discussed routing strategies, power-saving methods, and security requirements.
In order to enhance WSN applications for smart cities and homes, it is interesting to consider other challenges and techniques such as the use of IPv6 over Low-power Personal Area Network (6LoWPAN), the determination of efficient services that not only connect sensors to the web but also build a service, and design of software architecture.

References

[1] Obaidat MS, Misra S. Principles of wireless sensor networks. Cambridge, UK: Cambridge University Press; 2014.

[2] Energy consumption by sector. US Energy Information Administration (EIA), March 2015 monthly energy review. March 2015.

[3] Louis J-N, Caló A, Pongrácz E. Smart houses for energy efficiency and carbon dioxide emission reduction. In: The fourth international conference on smart grids, green communications and IT energy-aware technologies (ENERGY 2014), Chamonix, France; April 2014.

[4] Attia II, Ashour H. Energy saving through smart home. Online J Power Energy Eng. 2011;2:223227.

[5] Barley D, Deru M, Pless S, Torcellini P. Procedure for measuring and reporting commercial building energy performance. Technical report. National Renewable Energy Laboratory, NREL/TP-550-38601; October 2005.

[6] Corucci F, Anastasi G, Marcelloni F. A WSN-based testbed for energy efficiency in buildings. In: IEEE symposium on computers and communications (ISCC), Kerkyra, Greece; June 2011. p. 990–3.

[7] The Edison Foundation, Utility-scale smart meter deployments. Washington, DC: Institute for Electric Innovation (IEI); September 2014.

[8] Cees Links. After the smart phone: the smart home. White paper. GreenPeak; October 2014.

[9] Santini S, Ostermaier B, Vitaletti A. First experiences using wireless sensor networks for noise pollution monitoring. In: Workshop on real-world wireless sensor networks (REALWSN’08), Glasgow, Scotland; April 2008. p. 61–65.

[10] Bhusari P, Asutkar GM. Design of noise pollution monitoring system using wireless sensor network. Int J Software Web Sci. 2013;1:5558.

[11] Tan W, Jarvis S. On the design of an energy-harvesting noise-sensing WSN mote. EURASIP J Wireless Commun Networking. 2014;167:118.

[12] Roseline RA, Devapriya M, Sumathi P. Pollution monitoring using sensors and wireless sensor networks: a survey. Int J Appl Innovation Eng Manage. 2013;2(7):119124.

[13] Odey AJ, Daoliang L. AquaMesh – design and implementation of smart wireless mesh sensor networks for aquaculture. Am J Netw Commun. 2013;2:8187.

[14] Richards M, et al. Grid-based analysis of air pollution data. Ecological modeling. 2006;194:274286.

[15] Hassard J, et al. Innovative multi-species sensor development for mobile/portable sensor networks. In: security & resilience for the public & private sectors, London, UK; 2010.

[16] Williams M, Villalonga P. ITI-SENSE: sensor technologies for air quality. In: Citizens’ observatory coordination workshop, Brussels, Belgium; January 2013.

[17] Sirsikar S, Karemore P. Review paper on air pollution monitoring system. Int J Adv Res Comput Commun Eng. 2015;4(1):218220.

[18] Yaacoub E, Kadri A, Mushtaha M, Abu-Dayya A. Air quality monitoring and analysis in Qatar using a wireless sensor network deployment. In: The 9th international wireless communications and mobile computing conference (IWCMC), Sardinia, Italy; July 2013. p. 596–601.

[19] Mishra SA, Tijare DS, Asutkar GM. Design of energy aware air pollution monitoring system using WSN. Int J Adv Eng Technol. 2011;1(2):107116.

[20] Mansour S, Nasser N, Karim L, Ali A. Wireless sensor network-based air quality monitoring system. In: 2014 international conference on computing, networking and communications (ICNC), Honolulu, HI, February 3-6, 2014. p. 545–550.

[21] Virone G, et al. An advanced wireless sensor network for health monitoring. In: The transdisciplinary conference on distributed diagnosis and home healthcare, Arlington, VA; April 2006.

[22] Hyojeong S, Talipov E, Hojung C. IPv6 lightweight stateless address autoconfiguration for 6LoWPAN using color coordinators. In: IEEE international conference on pervasive computing and communications. PerCom 2009, Galveston, TX; March 2009. p. 1–9.

[23] Dhobley A, Ghodichor NA, Golait SS. An overview of wireless sensor networks for health monitoring in hospitals via mobile. Int J Adv Res Comput Commun Eng. 2015;4(1):169171.

[24] Oliver N, Flores-Mangas F. HealthGear: a real-time wearable system for monitoring and analyzing physiological signals. In: International workshop on wearable and implantable body sensor networks, Cambridge; April 2006. p. 64–7.

[25] Gautam KK, Gautam SK, Agrawal PC. Impact and utilization of wireless sensor network in rural area for health care. Int J Adv Res Comput Sci Software Eng. 2012;2(6):9398.

[26] Malan D, Thaddeus FJ, Welsh M, Moulton S. CodeBlue: an ad hoc sensor network infrastructure for emergency medical care. In: Workshop on applications of mobile embedded systems (WAMES 2004), Boston, MA; June 2004.

[27] Tennina S, et al. WSN4QoL: a WSN-oriented healthcare system architecture. Int J Distributed Sensor Netw. 2014;2014:116.

[28] Kouroubali A, Chiarugi F. Developing advanced technology services for diabetes management: user preferences in Europe. In: Wireless mobile communication and healthcare, Mobihealth, Kos Island, Greece; October 2011. p. 69–74.

[29] MobiHealth in Zambia: focus on telemonitoring high risk pregnant women. Technical report. MobiHealth; August 2014.

[30] Milenković A, Otto C, Jovanov E. Wireless sensor networks for personal health monitoring: issues and an implementation. Comput Commun. 2006;29:25212533.

[31] Institute of Electrical and Electronics Engineers. IEEE Std 802.15.1-2005, wireless medium access control (MAC) and physical layer (PHY) specifications for wireless personal area networks (WPANs); June 2005.

[32] Institute of Electrical and Electronics Engineers. Part 15.3: wireless medium access control (MAC) and physical layer (PHY) specifications for high rate wireless personal area networks (WPAN); September 2003.

[33] Institute of Electrical and Electronics Engineers. IEEE Std 802.15.4-2006, wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs); September 8, 2006.

[34] Fredman A. Mechanisms of interference reduction for Bluetooth. pdf ebooks; February 2015.

[35] Khair MAI, Misic J, Misic VB. Piconet interconnection strategies in IEEE 802.15.3 networks. In: Zhang Y, Yang LT, Ma J, eds. Unlicensed mobile access technology: protocols, architectures, security, standards and applications. Boca Raton, FL: Auerbach Publications; 2009:147162: [chapter 8].

[36] Goratti L, Haapola J, Oppermann I. Energy consumption of the IEEE 802.15.3 MAC protocol in communication link set-up over UWB radio technology. Wireless Personal Commun. 2007;40:371386.

[37] Stabellini L, Parhizkar MM. Experimental comparison of frequency hopping techniques for 802.15.4-based sensor networks. In: The fourth international conference on mobile ubiquitous computing, systems, services and technologies (UBICOMM); 2010. p. 110–6.

[38] Popovski P, Yomo H, Prasad R. Strategies for adaptive frequency hopping in the unlicensed bands. IEEE Wireless Commun. 2006;13(6):6067.

[39] Hsu AC-C, et al. Enhanced adaptive frequency hopping for wireless personal area networks in a coexistence environment. In: Global telecommunications conference (GLOBECOM), Washington, DC, USA; November 2007. p. 668–72.

[40] Stabellini L, Shi L, Rifai AA, Espino J, Magoula V. A new probabilistic approach for adaptive frequency hopping. In: The 20th IEEE international symposium on personal indoor and mobile radio communications (PIMRC), Tokyo, Japan; September 2009. p. 2147–51.

[41] Institute of Electrical and Electronics Engineers. 802.11a-1999 high-speed physical layer in the 5 GHz band; October 1999.

[42] 802.11a. White paper. VOCAL Technologies; May 2012.

[43] Institute of Electrical and Electronics Engineers. 802.11b-1999 higher speed physical layer extension in the 2.4 GHz band; October 1999.

[44] Institute of Electrical and Electronics Engineers. IEEE 802.11g-2003: further higher data rate extension in the 2.4 GHz band; October 2003.

[45] Institute of Electrical and Electronics Engineers. IEEE 802.11n-2009 – amendment 5 enhancements for higher throughput; October 2009.

[46] Jun J, Peddabachagari P, Sichitiu M. Theoretical maximum throughput of IEEE 802.11 and its applications. In: Second IEEE international symposium on network computing and applications (NCA 2003), Cambridge, MA, USA; April 2003. p. 249–56.

[47] Wang X, Kar K. Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks. In: The 24th annual joint conference of the IEEE Computer and Communications Societies (INFOCOM 2005), Miami, FL, USA; March 2005.

[48] Khanduri R, Rattan SS, Uniyal A. Understanding the features of IEEE 802.11g in high data rate wireless LANs. Int J Comput Appl. 2013;64:15.

[49] Understanding and optimizing 802.11n. Technical report. Buffalo Technology; July 2011.

[50] Khanduri R, Rattan SS. Performance comparison analysis between IEEE 802.11a/b/g/n standards. Int J Comput Appl. 2013;7:1320.

[51] Lagrange X, Godlewski P, Tabbane S. Réseaux GSM. 5th ed. Paris: Hermes; September 2000.

[52] Seurre E, Savelli P, Pietri P-J. Gprs for mobile internet; December 2002.

[53] Halonen T, Romero J, Melero J. Gsm, Gprs and edge performance: evolution towards 3G/Umts. 2nd ed. West Sussex, UK: John Wiley & Sons; October 2003.

[54] Huber JF, Huber AJ. Umts and mobile computing; March 2002.

[55] Damnjanovic A, Vojcic B, Vanghi V. The CDMA2000 system for mobile communications: 3G wireless evolution; July 2004.

[56] Holma H, Toskala A. HSDPA/HSUPA for UMTS: high speed radio access for mobile communications; April 2006.

[57] Kafka H. Wireless broadband. Technical report. AT&T; November 2007.

[58] Realistic LTE experience: from peak rate to subscriber experience. White paper. Motorola; August 2009.

[59] 3GPP. Release 13 analytical view. RP-151569; September 2015.

[60] Saha BK, Misra S, Obaidat MS. A web-based integrated environment for simulation and analysis with NS-2. IEEE Wireless Commun. 2013;20(4):109115.

[61] The network simulator NS-2, <http://www.isi.edu/nsnam/ns/>, last visited in June 2015.

[62] Ortiz AM, et al. Intelligent routing strategies in wireless sensor networks for smart cities applications. In: IEEE international conference on networking, sensing and control, Evry, France; April 2013.

[63] Prim RC. Shortest connection networks and some generalizations. Bell Syst Tech J. 2013;36:13891401.

[64] Chiang S-Y, Wang J-L. Routing analysis using fuzzy logic systems in wireless sensor networks. Berlin, Heidelberg: Springer-Verlag; 2008:966973.

[65] Ortiz AM, Royo F, Galindo R, Olivares T. I3ASensorBed: a testbed for wireless sensor networks. Technical report. Albacete Research Institute of Informatics; December 2011.

[66] Fischer S. WISEBED – experimental facilities for wireless sensor. Technical report. University of Lübeck; December 2010.

[67] Albesa J, Casas R, Penella MT, Gasulla M. Realnet: an environmental wsn testbed. In: International conference on sensor technologies and applications, SENSORCOMM’07; 2007.

[68] Handziski V, Köpke A, Willig A, Wolisz A. Twist: a scalable and reconfigurable testbed for wireless indoor experiments with sensor networks. In: The 2nd international workshop on multihop ad hoc networks: from theory to reality; 2006.

[69] Karagiannis M, Chantzis K, Nikoletseas S, Rolim J. Passive target tracking: application with mobile devices using an indoors WSN future Internet testbed. In: The IEEE DCOSS workshop on building intelligence through IPv6 sensing systems, HOBSENSE; 2011.

[70] Ju X, Zhang H, Sakamuri D. NetEye: a user-centered wireless sensor network testbed for high-fidelity, robust experimentation. Int J Commun Syst. 2012;25:12131229.

[71] Jiang H, Sun Y, Sun R, Xu H. Fuzzy-logic-based energy optimized routing for wireless sensor networks. Int J Distributed Sensor Netw. 2013;2013:18.

[72] Karp B, Kung HT. GPSR: greedy perimeter stateless routing for wireless networks. In: The 6th annual international conference on mobile computing and networking (MOBICOM ’00); August 2000. p. 243–54.

[73] Heinzelman WR, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks. In: The 33rd annual Hawaii international conference on system sciences (HICSS’00); January 2000. p. 1–10.

[74] De Domenico M, Antonio L, Gonzales MC, Arena A. Personalized routing for multitudes in smart cities. EPJ Data Sci. 2015;4:111.

[75] Wang P, et al. Understanding road usage patterns in urban areas. Scientific report. December 2012.

[76] Othmen S, Belghith A, Zarai F, Obaidat MS, Kamoun L. Power and delay-aware multi-path routing protocol for ad hoc network. In: Proceedings of 2014 IEEE international conference on information, computer and telecommunication systems, CITS 2014, Jeju Island, Korea; July 2014.

[77] Fischer C. Feedback on household electricity consumption: a tool for saving energy? Energy Efficiency. 2008;1:79104.

[78] Gagnon S. System and method for reading power meters. World Intellectual Property Organization (WIPO); October 2005.

[79] Lui T, Stirling W, Marcy H. Get smart. In: IEEE power energy magazine, vol. 8; June 2010. p. 66–78.

[80] Wallich P. Parsing power. IEEE Spectr. 2013;50:2324.

[81] Gao P, Lin S, Xu W. A novel current sensor for home energy use monitoring. IEEE Trans Smart Grid. 2014;5(4):20212028.

[82] Son Y-S, Pulkkinen T, Moon K-D, Chaekyu K. Home energy management system based on power line communication. IEEE Trans Consumer Electron. 2010;56:13801386.

[83] Hashizume A, Mizuno T, Mineno H. Energy monitoring system using sensor networks in residential houses. In: The 26th international conference on advanced information networking and applications workshops (WAINA), Fukuoka, Japan; March 2012. p. 595–600.

[84] Beaufort Samson G, Levasseur M-A, Gagnon F, Gagnon G. Auto-calibration of Hall effect sensors for home energy consumption monitoring. Electron Lett. 2014;50:403405.

[85] Panagiotakis A, Melidis P, Nicopolitidis P, Obaidat MS. Power-controlled reduction of exposed terminals in ad-hoc wireless LANs. In: Proceedings of the 2012 IEEE international conference on computer, information and telecommunication systems, CITS 2012, Amman, Jordan; May 2012. p. 122–6.

[86] Prasad RV, Rao VS, Niemegeers I, de Groot SH. Wireless sensor networks for a zero-energy home. MOBILIGHT 2011, LNICST 81; 2012. p. 338–46.

[87] Mattern F, Staake T, Weiss M. ICT for green – how computers can help us to conserve energy. In: The 1st international conference on energy-efficient computing and networking (e-Energy 2010), Passau, Germany; April 2010. p. 1–10.

[88] Kleiminger W, Beckel C, Santini S. Opportunistic sensing for efficient energy usage in private households. In: The smart energy strategies conference, Zurich, Switzerland; September 2011.

[89] Kemmler A, et al. Analysis of energy consumption by specific use. Technical report. Swiss Federal Office of Energy; September 2014.

[90] Belghith A, Belghith A, Molnar M. Enhancing PSM efficiencies in infrastructure 802.11 networks. Int J Comput Inf Sci. 2007;5:1323.

[91] Heinzelman WR, Chandrakasan A, Balakrishnan H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wireless Commun. 2002;1:660670.

[92] Zhu J, Papavassiliou S. On the energy-efficient organization and the lifetime of multi-hop sensor networks. IEEE Commun Lett. 2003;7:537539.

[93] Mille MJ, Vaidya NH. A mac protocol to reduce sensor network energy consumption using a wakeup radio. IEEE Trans Mobile Comput. 2005;4:228242.

[94] Halgamuge MN, Zukerman M, Ramamohanarao K. An estimation of sensor energy consumption. Electromagn Res B. 2009;12:259295.

[95] Othmen S, Zarai F, Obaidat MS, Belghith A. Re-authentication protocol from WLAN to LTE. In: IEEE global communication conference, GLOBECOM 2013, Atlanta, GA, USA; December 9–13, 2013.

[96] Ellbouabidi I, Ben Ameur S, Smaoui S, Zarai F, Obaidat MS, Kamoun L. Secure macro mobility protocol for new generation access network. In: The 2014 IEEE international on wireless communications and mobile computing conference, IWCMC 2014, Nicosia, Cyprus; 2014. p. 518–23.

[97] Stankovic JA, et al. Wireless sensor networks for in-home healthcare: potential and challenges. In: high confidence medical device software and systems (HCMDSS) workshop. Department of Computer Science; 2005.

[98] Jara AJ, Zamora MA, Skarmeta AFG. An architecture based on internet of things to support mobility and security in medical environments. In: The 7th IEEE consumer communications and networking conference (CCNC’10); January 2010. p. 1–5.

[99] Huang YM, et al. Pervasive, secure access to a hierarchical sensor based healthcare monitoring architecture in wireless heterogeneous networks. IEEE J Selected Commun. 2009;27:400411.

[100] Tavares J, Velez FJ, Ferro JM. Application of wireless sensor networks to automobiles. Meas Sci Rev. 2008;8:6570.

[101] Fatema N, Brad SR. Security requirements, counterattacks and projects in healthcare applications using WSNs – a review. Int J Comput Netw Commun. 2014;2:19.

[102] Nicopolitidis P, Obaidat MS, Papdomitriou G, Amprtsis A. Wireless networks. Hoboken, NJ: Wiley; 2013.

[103] Obaidat MS, Boudriga N. Security of e-systems and computer networks. Cambridge, UK: Cambridge University Press; 2007.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.216.34.146