Introducing Intelligent Agents Potential into a competent Integral Multi-Agent Sensor Network Simulation Architecture Design

Abstract

During this research we spot several key issues concerning WSN design process and how to introduce intelligence in the motes. Due to the nature of these networks, debugging after deployment is unrealistic, thus an efficient testing method is required. WSN simulators perform the task, but still code implementing mote sensing and RF behaviour consists of layered and/or interacting protocols that for the sake of designing accuracy are tested working as a whole, running on specific hardware. Simulators that provide cross layer simulation and hardware emulation options may be regarded as the last milestone of the WSN design process. Especially mechanisms for introducing intelligence into the WSN decision making process but in the simulation level is an important aspect not tackled so far in the literature at all. The herein proposed multi-agent simulation architecture aims at designing a novel WSN simulation system independent of specific hardware platforms but taking into account all hardware entities and events for testing and analysing the behaviour of a realistic WSN system. Moreover, the design herein outlined involves the basic mechanisms, with regards to memory and data management, towards Prolog interpreter implementation in the simulation level.

Share and Cite:

A. Filippou and D. A. Karras, "Introducing Intelligent Agents Potential into a competent Integral Multi-Agent Sensor Network Simulation Architecture Design," Journal of Software Engineering and Applications, Vol. 6 No. 7B, 2013, pp. 42-48. doi: 10.4236/jsea.2013.67B008.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] W. Masri and Z. Mammeri, “On QoS Mapping in TDMA Based Wireless Sensor Networks,” Wireless and Mobile Networking IFIP Joint Conference on Mobile Wireless Communications Networks MWCN 2008.
[2] B.-L. Wenning, et al., “Environmental Monitoring Aware Routing in Wireless Sensor Networks,” Wireless and Mobile Networking IFIP Joint Conference on Mobile Wireless Communications Networks MWCN 2008.
[3] S. Dziembowski, A. Mei and A. Panconesi “On Active Attacks on Sensor Network Key Distribution Schemes,” Algorithmic Aspects of Wireless Sensor Networks 5th International Workshop ALGOSENSORS 2009 Rhodes Greece July 10, 11, 2009.
[4] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, Vol. 1, No. 2-3, 2003, pp. 293-315. doi:10.1016/S1570-8705(03)00008-8
[5] E. Serpedin and Q. Chaudhari, “Synchronization in Wireless Sensor Networks Parameter Estimation Peformance Benchmarks and Protocols,” Cambridge University Press 2009. doi:10.1017/CBO9780511627194
[6] A. Giridhar and P. R. Kumar, “The Spatial Smoothing Method of Clock Synchronization in Wireless Networks,” Theoretical Aspects of Distributed Computing in Sensor Networks Springer 2011.
[7] S. Slijepcevic and M. Potkonjak, “Power Efficient Organization of Wireless Sensor Networks,” Proceedings of IEEE International Conference on Communications, Vol. 2, 2001, pp. 472-447.
[8] G. Q. Mao and B. Fidan “Localization Algorithms and Strategies for Wireless Sensor Networks,” Premier Reference Source–information Science Reference 2009.
[9] www.opnet.com.
[10] T. He, R. Stoleru, A. Stankovic John, “Range Free Localization. Technical Report,” , University of Virginia (2006)
[11] Timo Ojala et al “UBI-AMI: Real-Time Metering of Energy Consumption at Homes Using Multi-Hop IP-based Wireless Sensor Networks” Advances In Grid and Pervasive Computing GPC Oulu Finland 2011, pp. 274-284
[12] M.A Labrador, P.M. Wightman “Topology Control in Wireless Sensor Networks,” Springer 2009.
[13] T. Watteyne, et al. “Centroid Virtual Coordinates–A novel Near–Shortest Path Routing Paradigm,” Computer Networks 17 October, 2008.
[14] P. Levis, N. Lee, M. Welsh and D. Culler, “Tossim: Accurate and scalable simulation of entire tinyos applications,” First International Conference on Embedded Networked Sensor Systems (SenSys 2003) (November 2003).
[15] Khan M, Abdelzaher T.,Gupta K.K “Towards Diagnostic Simulation in Sensor Networks,” Distributed Computing in Sensor Systems 4th IEEE International Conference DCOSS 2008 Santorini Island Greece June 11-14, 2008.
[16] W. B. Heinzelman, A. P. Chandrakasan and H. Balakrishnan, “An Application-specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Transactions on Wireless Communications, Vol. 1, No. 4, 2002, pp. 660-670. doi:10.1109/TWC.2002.804190
[17] S. Lindsey and C. S. Raghavendra, “PEGASIS: Power Ef?cient Gathering in Sensor Information Systems,” in: Proc. IEEE Aerospace Conference, Big Sky, Montana, March 2002. doi:10.1109/AERO.2002.1035242
[18] A. Manjeshwar and D. P. Agrawal, “TEEN: A Protocol For Enhanced E?ciency in Wireless Sensor Networks,” in Proceedings of the 1International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, San Francisco, CA April 2001.
[19] H. Frey and I. Stojmenovic, “On delivery guarantees of face and combined greedy-face routing algorithms in ad hoc and sensor networks,” in twelfth ACM Annual International Conference on Mobile Computing and Networking (MOBICOM) Los Angeles CA USA ACM September 23-29, 2006, pp. 390-401.
[20] T Watteyne, et al., “On using virtual coordinates for routing in the context of wireless sensor networks,” in 18th Annual International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC) Athens Greece IEEE, September 3-7, 2007.
[21] C. Inatanagonwiwat, R. Govindan and D. Estrin, “Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networksm,” Mobicom 2000, Boston, MA, USA (2000).
[22] Jon S. Wilson ed. “Sensor Technology Handbook,” Elsevier 2005.
[23] Patrick Kuckertz et al, “Sniper Fire Localization Using Wireless Sensor Networks and Genetic Algorithm Based Data Fusion,” Military Communications Conference 2007 MILCOM 2007 IEEE (2007).
[24] Muhammad Imran et al. “Application-Centric Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks,” Advances in Grip and Pervasice Computing GPC 2011, pp. 243-253.
[25] H. M. Ammari “Challenges and Opportunities of Connected k Covered Wireless Sensor Networks-From Sensor Deployment to Data Gathering,” Springer 2009.
[26] J. Fraden, “Handbook of Modern Sensors–Physics Designs and Applications,” Springer Verlag, 2004.
[27] P. Balister, S. Kumar, Z. Zheng and P. Sinsha, “Trap Coverage : Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks,” Infocom/IEEE 2009.
[28] M. Cardei, M. T. Thai, Y. Li and W. Wu, “Energy-efficient Target Coverage in Wireless Sensor Networks,” In: IEEE INFOCOM (2005).
[29] M. X. Cheng, L. Ruan and W. Wu, “Achieving minimum coverage breach under bandwidth constraints in wireless sensor networks,” IEEE INFOCOM (2005).
[30] O. Saukh, R. Sauter and P. J. Marron, “Time-Bounded and Space-Bounded Sensing in Wireless Sensor Networks,” Distributed Computing in Sensor Systems DCOSS 2008, LNCS 5067, pp. 357-371.
[31] C. K. Liang and Y. T. Chen, “The Target Coverage Problem in Directional Sensor Networks with Rotatable Angles,” Distributed Computing in Sensor Systems DCOSS 2008, LNCS 5067, pp. 264-273.
[32] C. Gilbert, et al., “SENSE: a wireless sensor network simulator,” Advances in Pervasive Computing and Networking (2005), pp. 249-267.
[33] de P. Alberola, Rodolfo and D. Pesch, “AvroraZ: extending Avrora with an IEEE 802.15. 4 compliant radio chip model,” Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks. ACM, 2008.
[34] Y. Sangho, et al., “SensorMaker: A Wireless Sensor Network Simulator for Scalable and Fine-grained Instrumentation,” Computational Science and Its Applications–ICCSA 2008, pp. 800-810.
[35] M. Bruynooghe, The Memory Management of PROLOG Implementations, in Clark, K. L. and S. Tarnlund (1982, eds.), Logic Programming, Academic Press, Lon-don.
[36] P. Civera, G. Piccinini and M. Zamboni, “Implementation Studies for a VLSI Prolog Coprocessor,” in IEEE Micro, Vol.9/1 February 1989 pp.10-23. doi:10.1109/40.16791

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.