report - Dr. George Markowsky

Transcription

report - Dr. George Markowsky
National Science Foundation Workshop
ANYWHERE, ANYTIME, ANY SIZE, ANY SIGNAL:
Scalable, Remote Information Sensing
and Communication Systems Workshop
January 14-15, 2002
ACCESS Center
Arlington, VA
edited by
George Markowsky, University of Maine
David Nagel, The George Washington University
Don Mitchell, NCSA
Janet Thot-Thompson, NCSA
Tom Williams, Air Networking
Executive Summary
Just as wild animals depend on the keenness of their senses to detect threats and
opportunities, modern society requires new sensors and modes of communication to
manage threats to homeland security and the environment. Emerging technologies in
sensor design and wireless communications have the potential to make a leap in both the
quantity and quality of critically needed data. This workshop brought together experts in
sensors, high-speed wireless communication, networking, power sources, FCC
regulations, crisis management, security, transportation infrastructure and field science to
review recent developments and discuss the potential for deployment of networked
sensors for field science and homeland security. Additionally, they worked to identify
opportunities and impediments for utilization of sensor networks in meeting the nation's
information needs.
The presenters showed how sensors and imagers, enabled by micro and other
technologies, form sensor systems that acquire information. Networks can distribute that
information over local to global and larger distances, enabling truly remote sensing.
Wireless single-link sensor systems and multiple-link networks offer features that can
include high performance, lower installation costs, reconfigurability and mobility. They
are complex engineering systems, which have widely varying characteristics and
performance. Wireless sensor nodes, sometimes called sensor clusters, tend to have a
common set of components regardless of their applications. Energy sources frequently
limit the performance and lifetime of deployed sensor nodes. There is a current need for
software to co-design and simulate the performance of sensor nodes, systems and
networks. Applications of real-time wireless sensor systems and networks are increasing
rapidly now. They include (a) determination of weather and other environmental
conditions for many reasons, including agriculture, (b) monitoring energy, fluid,
machinery, information and other systems in factories, facilities, buildings and homes, as
well as the structures themselves, (c) sensing terrestrial, marine, air and space vehicles
and associated transportation systems, (d) monitoring people and equipment for safety,
health and medical reasons, (e) sensing for security, crisis management and military
operations, and (f) diverse other applications. Ubiquitous sensing will increasingly be
part of the fabric of life in technological societies. Wireless sensor systems and networks
enable radically new integration of engineered systems and humans.
The workshop identified important problems in the design of sensor systems, such as
developing adequate power systems, that must be solved if we are to build and deploy
successful sensor systems. Besides the technical problems that were identified, a variety
of political and social issues were identified as well. In particular, the United States must
seriously rethink the way that it uses its spectrum and find ways to enable new spread
spectrum technologies to be used effectively, which will enable widespread use of
inexpensive wireless systems. Similarly, it is essential that we develop a mechanism to
get people to think seriously about security in the widest possible sense. These and many
additional recommendations are presented throughout this report, along with much
background information.
The presentations and discussions were very informative and lively. The first day
presentations may be viewed at http://homeland.maine.edu/anywhere.htm along with the
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-ii
slides that were presented. This proceedings blends the presentations into a single
document, and identifies issues that need further study and development.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-iii
Table of Contents
Table of Contents................................................................................................................iv
Chapter 1. Introduction....................................................................................................... 1
1.1. Overview Of Workshop ............................................................................................... 1
Chapter 2. Introduction To Homeland Security................................................................ 14
2.1 Introduction................................................................................................................. 14
2.2. The Big Picture........................................................................................................... 15
2.3 The Threat to Homeland Security............................................................................... 16
2.4 Transportation, Buildings and Homes......................................................................... 20
2.5 Medical Applications and Biodefense......................................................................... 27
2.6 Security, Crises and Military Applications ................................................................. 30
2.7 Recommendations ....................................................................................................... 33
Chapter 3. Introduction To Field Science ......................................................................... 34
3.1 Introduction................................................................................................................. 34
3.2 Remotely Deployed Sensors in Ecological Sciences .................................................. 34
3.3. Instrumenting the Environment: Pervasive Environmental In-situ Sensors .............. 38
3.4 Communicating in the Field ........................................................................................ 41
3.5 Other Field Applications: Weather and Agriculture ................................................... 43
3.6 Recommendations ....................................................................................................... 46
Chapter 4. Sensors, Wireless, and Power Sources ............................................................ 47
4.1 Introduction................................................................................................................. 47
4.2 Overview of Sensor Technology................................................................................. 47
A. Cluster Sensors and Electronics ............................................................................... 51
B. Cluster Communications and Power ....................................................................... 54
C. Network Architectures.............................................................................................. 58
D. Design and Simulation of Wireless Sensor Networks......................................... 60
E. Emplacement and Deployment of Wireless Sensor Networks ................................ 61
F. Wireless Sensor Systems and Networks ................................................................... 62
4.3 Power........................................................................................................................... 68
4.4 Laser Wireless Communications for Data Transfer from Remote Sensors ................ 73
4.5 The Future -- A Mobile Internet Powered by a Planetary Computer.......................... 75
4.6 Recommendations ....................................................................................................... 81
Chapter 5. Security, Privacy and Policy............................................................................ 81
5.1 Introduction................................................................................................................. 81
5.2 Overview of Security Issues........................................................................................ 81
5.3 Privacy and Ownership of Data .................................................................................. 84
5.4 Policy and the FCC ..................................................................................................... 85
5.5 Technology Transfer................................................................................................... 89
5.6 Communities ............................................................................................................... 90
The Military and National Security............................................................................... 90
Crisis Preparation, Mitigation, Management, and Response ........................................ 90
Distance Learning.......................................................................................................... 90
Health and Medicine ..................................................................................................... 90
Academic Research....................................................................................................... 90
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-iv
Technology Influenced and Enabled Genres of Art and Music.................................... 91
International and Cultural Exchange ............................................................................. 91
Remote Communication................................................................................................ 91
Commercial and Industrial............................................................................................ 91
5.7 Funding........................................................................................................................ 91
5.8 Recommendations ....................................................................................................... 92
Chapter 6. Proposed Additional Workshops..................................................................... 94
Biographies of Speakers.................................................................................................... 96
Biographies of Participants ............................................................................................. 102
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-v
Chapter 1. Introduction
1.1. Overview Of Workshop
Several recent meetings have highlighted the growing interest of the biological,
ecological, environmental and other research communities in the development and
deployment of large distributed systems for information collection, aggregation,
analysis, simulation, predictive modeling and real-time analysis within their
respective disciplines. Likewise, recent events have caused concern and raised
interest in the need for similar systems in the context of homeland security. It seems
apparent that a structured discussion of the needs for these systems could create
opportunities for synergistic efficiencies between the various user communities. To
date, however, no such discussions have been held among these differing user
communities, nor among these communities and the groups providing and developing
technologies to support their needs.
It is with the possibility of identifying such potential synergies that the Multi-Sector
Crisis Management Consortium (MSCMC) is organizing a series of workshops to
discuss the design, development and deployment of such systems "From Sensor to
Supercomputer and Back: Systems for Information Collection, Aggregation,
Analysis, Assessment and Realtime Simulation." This workshop is the first in this
series. The purpose of this workshop was to summarize the current and projected
states of sensor, communication and power technologies for collection and
communication of information from distributed sensor systems with large numbers of
nodes, and to survey the present and expected needs for such systems in
environmental, facility, medical, crisis management, public safety and national
security arenas. A succinct summary of the current and projected technologies
mapped to current and projected user requirements was envisioned to result from this
workshop.
This workshop brought together experts in field sensors, signal processing, wireless
communications, and field power source technologies to structure solutions for the
common problems of collecting and communicating data from remote field locations
by cost-effective, scalable, integrated devices and networks. The workshop examined
the user needs and technologies involved in field deployable systems for information
gathering including sensors, wireless communications and power supplies, up to the
local aggregation point. While the integration of "locally" gathered information into
larger infrastructures for purposes of analysis is also required, such integration is
beyond the specific focus of this workshop.
This two-day workshop produced:
1. Understanding by participants of the current state of the art and availability of
technologies of sensors, power, integrated circuits and wireless communications,
and how they may be employed in our society.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-1
2. Determination of current and future needs for better capabilities
3. Suggested courses of action to integrate available technologies into scalable,
reliable, cost-effective devices and networks of value to meet those needs,
including both the general scientific and research community, and government
agencies seeking better ways to protect the public from chemical and biological
incidents
4. Proposed design and production of devices not now available or suitable for the
above purposes
5. Recommendations for regulatory relief, especially for design, manufacture and
use of workshop-proposed wireless technologies for the above purposes
6. Recommendation for further work in these areas, and identification of potential
collaborations and partners.
The sensor systems considered in this workshop can be put in context by considering
our senses. We humans contain many sensors that transduce physical, chemical and
biological conditions into perceptions within our central nervous system.
Combinations of sensory organs, nerves for signal conduction and the brain, which
processes, stores and acts upon information from the sensors, respond to both internal
and external stimuli. We have many kinds of internal sensors. They provide
information on our positions, movements, blood chemistry, the degree of filling of
various organs and other factors. These internal sensors generally provide threshold
responses, and they are slow, that is, they have low bandwidth.
External Human
Senses
Temperature
Force and Vibration
Taste and Smell
Hearing
Vision
Human-Designed
Sensors
Many Stimuli
Max. Range for Receipt of
Stimuli
Contact
Contact
Contact
Kilometers
(Depends on Loudness)
Utility Over 10 Kilometers
Bandwidth of Response to
Changes
Less than 1 Hz
Less than 1 Hz
Less than 1 Hz
Greater than 1 Hz
About 30 Hz
Interplanetary
Over 1 GHz in Extreme Cases
(Communications Limited)
Table 1.1. Ranges and bandwidths for Human Senses and Designed Sensors
The external sensors respond to several well-known stimuli, as listed in Table 1.1.
The thermo-mechanical responses of the skin to temperature, forces, and vibrations
require contact with the factor being sensed, and they have low bandwidths in
response to variable stimuli. The same is true for the chemical senses of taste and
smell. The spectroscopic senses of sight and hearing have both relatively long
reaches and faster responses. Our external senses react to continuously varying
inputs over wide ranges, but do not provide quantitative measures of the various
stimuli. There are many conditions to which we are not intrinsically sensitive. The
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-2
Sensors Magazine Buyers Guide lists over 100 categories of designed sensors
[http://www.sensorsmag.com]. In most cases, these artificial sensors provide
quantitative information over their ranges of utility. As indicated in Table 1.1,
designed sensors can obtain information over long distances, depending on available
communications. They respond to rapidly changing inputs in many cases, and can
provide constant vigilance.
The emergence of designed sensors to compliment our natural senses has given us
important new tools. We can now respond to many more quantities and to harsh
conditions that would be unhealthy or lethal for humans. The availability of wired
connections (notably the Internet) and wireless communications (including
technologies like BlueTooth, 802.11b WiFi, cellular networks and satellite systems)
give our "new" senses much greater reach and bandwidth than our natural senses.
Basically, a flood of information from sensors around the world can come to us. It
must then be coupled into our brains primarily through our vision and hearing. The
limitations of our ability to assimilate information, and the fact that we must pay
attention to our surroundings even while focused on receipt of information from
sensors, have two important implications. First, information from sensors has to be
"down-sized" as much as possible as soon as possible during its flow from sensors to
humans. Consider our vision system as a megapixel imager that receives color and
brightness information from each pixel at rates exceeding 30 Hz. It must shunt
unimportant information, or else we could not assimilate the stream of input data. So,
our vision system has capabilities, such as motion and edge detection, which permit
us to focus on a small but important subset of the inputs to our eyes. In a similar
fashion, it must be possible to shed relatively useless information in cases of highbandwidth wired or wireless sensor networks. Second, because information can be
received from many sensors, there is the challenge of melding that information into
forms that can be consumed by humans without undo effort. This challenge is more
than "data fusion". It is really about "information fusion" in ways that match the
physiological, psychological and varied conditions and capabilities of a wide
spectrum of people. If sensor information goes to computers for storage or use in
control systems, it can be assimilated at rates exceeding what people can handle.
However, requirements for discarding useless information and for presenting it in a
proper fashion are also germane in those cases.
Since the employment of sensor
systems is about the acquisition of
information, it is useful to consider
the larger context indicated in Figure
1.1. Each of the five functions of
information technology shown has
many facets, and they evolve over
time. New aspects get added to each
major function as time passes. The
employment of sensors in large
numbers as a means of generating
PROCESSING
GENERATION
COMMUNICATION
By People, Computers
& Sensor Systems
UTILIZATION
By People, Computers
& Diverse Systems
STORAGE
Figure 1.1. The major functions within
information technology and their
relationships. Sensors are rapidly growing in
importance as sources of information.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-3
information is a comparatively recent phenomenon. Ten years ago, relatively little
information came from sensors. Ten years from now, a very significant fraction of
information will originate from sensors, especially because of the growing
commercial importance of sensor systems.
The current "Information Revolution" results from four micro-technologies:
electronics, magnetics, optics and mechanics. The connectivity between the major
aspects of information and micro-technologies is given in Table 1.2. Most of the
entries are evident. Optical computers remain under development and (still) promise
high speeds. Radio-frequency MEMS (MicroElectroMechanical Systems) are being
developed for both signal processing and communications. MEMS data storage
devices, which might offer terabit per square centimeter storage densities, are now in
development. There are some related and important aspects of information
technology not shown in Figure 1.1, including the reliability and security of computer
and communications systems. However, Figure 1.1 and Table 1.2 show the role of
micro-sensors based on different technologies, and the complex inter-relationships of
information and micro-scale technologies.
µ-Electronics
µ-Magnetics µ-Optics
µ-Mechanics
Computers
µ-Sensors
µ-Sensors
µ-Sensors
Computers
In Development RF MEMS
Wireless
Optical Fibers &RF MEMS
Communications
MEMS
Storage
Flash Memories Hard Drives Compact Discs In Development
Utilization
Control Systems Data Mining Displays
µ-Actuators
Table 1.2. Major IT Processes Correlated with Technologies in Sensor Systems.
IT/µ-Tech:
Generation
Processing
Communication
Millions of People
Given the great and growing
Wireless Subscribers
& Wireless Internet Subscribers
importance of the Internet, it
1 out of every 6 people on earth!
1000
is natural to question the
800
relative importance of wired
600
and wireless sensor
400
networks. The case for
200
wireless sensor networks has
two primary facets. The first
1998
1999
2000
2001
2002
2003
Figure
1.2.
The
growth
of
wireless
usage
is the growing availability of
worldwide.
wireless connectivity. We
are in the early stages of
what has been termed the "Wireless Revolution". BlueTooth, 802.11b WiFi, cellular
networks and satellite systems have already been noted above. The growing use of
cellular systems is especially striking. Figure 1.2 shows the increases in wireless
connectivity for both voice and data communications 1 . Sensors, and also hand-held
computers, have already been integrated with cell phones. It is only a matter of the
market before sensors, computers and wireless communications are all integrated into
1
The Industry Standard Magazine, p. 72, January 10-17 2000
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-4
units about the size of cell phones. The other driver for wireless sensor systems and
networks is the savings in costs for fixed systems, and the need for mobility in some
cases. Wires are expensive to install and protect or maintain. Fixed wireless systems
can be modified relatively easily. Issues of interference and reliability of wireless
systems, in general, and wireless sensor systems, in particular, are germane. Usually,
they depend on the specific case of interest. A recent poll by Sensors Magazine asked
at what stage respondents were in regarding implementing wireless networking1 . The
results were: 25.6% have no plans to implement a wireless system, 17.9% were
considering wireless connectivity, 20.5% had a plan for 1 to 2 years, 12.8% had a 712 month plan, 7.6% would make the move in a few months and 15.3% already have
a wireless network. It is likely that the experiences of people who implement
wireless sensor networks, especially in factories and other facilities, will influence
others to do similarly, as the systems are shown to be reliable, as well as costeffective. The number of companies that sell and service wireless sensor systems and
networks can be expected to grow significantly in the coming years.
This workshop is motivated partly by the likelihood that experience with the use of
wireless sensor systems and networks in one industry will be useful in other
industries. In general, each major industry has its own trade shows and publications,
so there is little routine communication between large industries. Despite the great
differences in the hardware deployed and the disparate use of the gleaned
information, there is a common base of components and concerns for wireless sensor
systems and networks. Such characteristics are reviewed during the workshop in
order to introduce the technologies that enable and limit wireless communication of
information from sensors.
1.2. The Program
The first day consisted of half-hour presentations by users presenting some key needs
and successes, and by technologists describing the state of the art and future
developments. The second day was dedicated to creating a report describing the state
of this field and the key steps that must be taken in order to make progress. All
available slides and videos may be found at
http://homeland.maine.edu/anywhere.htm.
1
Sensors Magazine, p. 60, July 2002
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-5
Day 1
PART I -- USER PERSPECTIVES
8:00 -- 8:15
Coffee, Registration
8:15 -- 8:20
Welcome -- Side Nadir, Executive Director, National Response
Center, and Acting Chair, Multi-Sector Crisis Management
Consortium
8:20 -- 8:30
Opening Remarks -- George Markowsky, Chair Departments of
Computer Science and Mathematics/Statistics, University of
Maine, and Secretary, Multi-Sector Crisis Management
Consortium
8:30 -- 9:00
Crisis Management -- Capt. Dennis Egan, Chief, Office of
Command Control and Preparedness US Coastguard, and Member,
Multi-Sector Crisis Management Consortium
9:00 -- 9:30
Biological & Ecological Sciences -- Tim Kratz, Associate
Director for Trout Lake Station Center for Limnology, University
of Wisconsin-Madison
9:30 -- 10:00
Environmental Monitoring & Public Safety -- Neil Gray,
Executive Director, International Bridge, Tunnel, Turnpike
Authority
10:00 -- 10:30
Break
10:30 -- 11:00
Facility Monitoring -- Richard Holm, Reactor Administrator,
Nuclear Reactor Laboratory, University of Illinois
11:00 -- 11:30
Communications -- David Hughes, Partner, Old Colorado City
Communications
11:30 -- 12:00
The Big Picture -- Larry Smarr, Professor, Computer Science
and Engineering Department, University of California San Diego,
and Director of the California Institute for Telecommunications
and Information Technology, Universities of California at San
Diego and Irvine
12:00 -- 1:30
Lunch
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-6
PART II -- TECHNOLOGY PERSPECTIVES
1:30 -- 2:00
Sensor Technologies and Applications -- David Nagel, Research
Professor, School of Engineering and Applied Science, The
George Washington University
2:00 -- 2:30
Sensors -- The Present -- Gregory Bonito, Research Assistant,
Long Term Ecological Research Network Office
2:30 -- 3:00
Communication Security -- Leslie Owens, Founder and CTO,
Vectara Innovations, LLC, Adjunct Assistant Professor,
Georgetown University and Technical Editor, Wireless Security
Perspectives
3:00 -- 3:30
Break
3:30 -- 4:00
Power Systems -- Robert Nowak, Program Manager, Advanced
Energy Technologies, DARPA
4:00 -- 4:30
Medical Systems -- Jim Wilson, WHO/NASA
Ebola/Marburg/VEE Remote Sensing Projects; GDIN Infectious
Diseases Working Group - Global Epidemic Intelligence and
Disease; Forecasting Systems (GEIFFS) and Pediatrician,
Georgetown University
4:30 -- 5:00
Regulatory Issues -- William Lane, Chief Technologist,
Wireless Communications Bureau, Federal Communications
Commission
5:00 -- 5:15
Closing Remarks
Day 2
PART III -- WORKING GROUPS
8:00 -- 8:15
8:15 -- 8:30
8:30 -- 12:00
12:00 -- 1:30
Coffee
Organization of Groups -- George Markowsky
The Technology Group, chaired by David Nagel and the User Group,
chaired by George Markowsky, worked through the material
presented on Day 1 and organized it so needs and possibilities were
highlighted.
Lunch
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-7
PART IV -- DRAFTING OF REPORT
1:30 -- 2:30
2:30 -3:00 -3:30 -4:00 -4:30 --
3:00
3:30
4:00
4:30
5:00
Presentations of Working Group Results and discussion –
David Nagel, George Markowsky, group
Outlining of Final Report -- George Markowsky
Break
Outlining of Final Report -- George Markowsky
Task Assignments -- George Markowsky
Planning for the Next Workshop & Close -- George Markowsky
1.3. Impact on Discipline
To the best of our knowledge, this is the first time that such a wide ranging group of
scholars and practitioners has been assembled to look at all aspects of sensors and
communication systems. This was driven by the unprecedented need to develop both
a more robust scientific network and by the needs for greater homeland security. This
workshop also attracted international interest, as evidenced by the participation of
Russian delegates. It is vitally important for us to better understand the capabilities
that others have developed in this area.
1.4. Dissemination Of Results
Information about the workshop, including the videos and slides of the presentations,
and this report can be found at http://homeland.maine.edu/anywhere.htm. They are
also mirrored at http://www.mscmc.org, which is the website of the Multi-Sector
Crisis Management Consortium. We also expect that, as a result of this workshop,
peer reviewed articles and research grant applications will be produced on the various
subjects covered. Many of the speakers and participants are extremely well known
and influential in their fields of expertise and we expect that the results of the
workshop will be disseminated by them in the course of their activities.
1.5. Pictures
Some pictures taken during the proceedings and of the ACCESS Center are available
at http://homeland.maine.edu and http://www.mscmc.org. In addition, PDF versions
of this report are also available at these websites.
1.6. Similar Workshops
The most recent, prior, workshop that was similar was held in San Diego, California
on October 29-31, 2001. It was organized by Greg Bonito who was one of the
speakers at this conference. Some details about this workshop are presented below.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-8
SCALABLE INFORMATION NETWORKS FOR THE ENVIRONMENT (SINE)
Workshop Overview
The SINE workshop, hosted by the Partnership for Biodiversity
Informatics (PBI), will assemble research scientists, directors of
field stations and marine laboratories, as well as experts in
computational and information sciences to discuss the technical
requirements for building local, regional, and national-level
networks designed to deliver continuous, integrated high-quality
data in real or near real time. Each of these audiences will
contribute to and learn from the information exchange. Scientists
will share their experiences in expanding site-specific science to
broader spatial scales, and will discuss future information
infrastructure needs in light of new sensors (field and satellite)
and data collection capabilities.
Directors of field stations and marine laboratories will ground the
workshop in the present-day realities of existing infrastructure and
capabilities, and will contribute to a new vision of how field
stations and marine laboratories can expand to meet the needs for a
national capability for observing and understanding environmental
complexity. Computational and information scientists will present
state of the art developments in sensor technologies, networking,
information delivery, and knowledge generation.
Workshop presentations, discussion, and working group sessions will
focus on three topics:
1. Building distributed sensor networks: design and
implementation
issues.
2. Enabling technologies and user requirements for data and
information management and delivery.
3. Building scalable environmental information networks--data,
computers, and people.
As environmental research becomes more complex and
multidisciplinary, gains in our understanding of ecosystem
biocomplexity can be furthered through the application of
technologies that improve data management and delivery; enhance
modeling and prediction capabilities; and facilitate communication
among individuals, environmental sensors, computers, and databases.
This workshop will be the first attempt to envision a scalable
national environmental information infrastructure that meets the
needs of scientists working at local and broader scales, as well as
decision-makers and educators that may require information at
regional to national scales. Consequently, the discussions and
working group reports are anticipated to be of broad interest to
many disciplines. To meet this information need, several means will
be used to disseminate the workshop products to the broader
community.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-9
Section 1.7. Acknowledgements
There are many people who made this workshop possible and we would like to thank
all of them.
First, we want to acknowledge the support of the NSF, which made a grant available
to fund the expenses of this workshop. In particular, Tom Greene, the program
director in charge of this grant was extremely supportive and helpful.
Second, the staff of ACCESS was of great help. Of special help were Tom Coffin,
Geoff Koslow, Jennifer Pillen, Kirstin Riesbeck, and Kia Ray.
Third, we thank the organizing committee of Dave Hughes, George Markowsky, Don
Mitchell, Dave Nagel and Janet Thot-Thompson.
Fourth, we thank all the speakers and participants for contributing their time and
expertise.
Fifth, special thanks go to David Nagel, Don Mitchell, Janet Thot-Thompson, and
Tom Williams, and John Porter for their assistance with the writing. David Nagel
wants to acknowledge B. Nickerson and W. J. Kaiser for some helpful conversations.
Fifth, we would like to thank George Brett and Dewayne Hendricks for some
suggestions in organizing the workshop.
This report mentions many products. Such references to products do not imply their
endorsements.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-10
Section 1.8. Participants.
Alexander S. Akhmanov
Head of International Department, Ph.D.
Russian Academy of Sciences
Institute on Laser Information
Technologies
7-095-135-02-54
[email protected]
Neil A. Gray
Director of Government Affairs
IBTTA
202-659-0500
[email protected]
Rich Holm
Reactor Administrator
Greg Bonito
University of Illinois
Research Assistant
217-333-7755
Long Term Ecological Research Network [email protected]
Office
505-292-9331
Dave Hughes
[email protected]
Principal Investigator
Old Colorado City Communications
Michael R. Chritton
719-636-2040
Director of Security Programs
[email protected]
C2M Hill
303-771-0900
Brad E. Hutchens, P.E.
[email protected]
Environmental Engineer
U.S. Army Center for Health Promotion
Tom Coffin
and
Technical Coordinator
Preventive Medicine (USACHPPM)
ACCESS
410-436-6096/8162
703-248-0105
[email protected]
[email protected]
Anna Komarova
Capt. Dennis Egan, Ret.
Professor, Head,
US Coast Guard, now
Dept. of Foreign Languages for Geography
Director Homeland Security for
Lomonosov Moscow State University
Intermodal Transportation
095-932-88-35
System Planning Corp.
[email protected]
703-351-8289
[email protected]
Tim Kratz
Associate Director
Steve Goldstein
Trout Lake Station Center for Limnology
Senior Advisor of Information Technology University of Wisconsin
NSF
715-356-9494
703-292-4605
[email protected]
[email protected]
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-11
William D. Lane, Ph.D., PE
Chief Technologist Wireless
Telecommunications Bureau
Federal Communications Commission
202-418-0676
[email protected]
George Markowsky
Prof. of Computer Science, MSCMC
Secretary
University of Maine
207-581-3940
[email protected]
Dr. William K. Michener
Senior Research Scientist
The University of New Mexico
505-272-7831
[email protected]
Don Mitchell
Associate Director for Strategic
Collaborations
NSF/NCSA
703-2480123
[email protected]
Dick Morley
Consultant
R. Morley Incorporated
603-878-4365
[email protected]
David J. Nagel, Ph.D.
Research Professor MEMS and
Microsystems
George Washington University
202-994-5293
[email protected]
Bob Nowak
Program Manager
DARPA
703-696-7491
[email protected]
Leslie Owens
President
Vectara Innovations
703-980-3377
[email protected]
Jennifer Pillen
Administrative Assistant
ACCESS
703-248-0104
[email protected]
John Porter
N/A
University of Virginia
434-924-8999
[email protected]
Syed Qadir
Executive Director (MSCMC Acting
Chair)
National Response Center
202-267-6352
[email protected]
Kirstin Riesbeck
Program Manager
ACCESS, Shodor Foundation
703-248-0120
[email protected]
Joann P. Roskoski
Deputy Division Director
Division of Environmental Biology
National Science Foundation
703-292-8480
[email protected]
Frank Sellers
President
NAFLET
703-931-2862
[email protected]
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-12
Bill Taylor
President
Virtual West Point, Inc.
443-742-4518
[email protected]
Shukri Wakid
Senior Scientist
Compaq
301-237-9276
[email protected]
Janet Thot-Thompson
Associate Director
MSCMC Acting Executive Director
ACCESS
703-248-0102
[email protected]
Tom Williams
Principal
Air Networking
804-672-7386
[email protected]
Frank Vernon
Research Geophysicist
University of California, San Diego
858-534-5537
[email protected]
James Wilson, V, MD
GDIN Infectious Diseases Working Group
GDIN
202-270-2527
[email protected]
Brief biographies of the speakers and participants are in the Appendices.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-13
Chapter 2. Introduction To Homeland Security
2.1 Introduction
The talks by Syed Qadir, George Markowsky, Dennis Egan, Rich Holm and Jim Wilson laid out
most of the issues dealing with homeland security. Syed Qadir, Executive Director of the National
Response Center located at the U.S. Coast Guard Command and Control Center at Buzzards Point,
Washington D.C., opened the workshop with an introduction. Syed Qadir is also the Acting Chair
of the Multi-Sector Crisis Management (MSCMC) Consortium, which was founded in July 2000.
He noted that this was just the first of a series of workshops hosted by the MSCMC on the synergy
of sensors and supercomputers. We will now quote from the talk. All of these talks with supporting
slides can be viewed at http://homeland.cs.umaine.edu/anywhere.htm.
The MSCMC was formed nearly two years ago, when several of us in the field of crisis
management recognized a need to get people together. It was clear that amazing
technologies were available to aid crisis response, but those technologies, because they
were spread out and fragmented among the private, government, academic, international,
and nonprofit organizations, were not being developed in a coordinated manner. Since its
formation, the Consortium has attempted to break down communication barriers between
these various sectors and bring them together to make sure everyone is working together
and using the best tools in the best ways to efficiently and safely manage and respond to
crises.
With these goals and objectives in mind, we turn first to sensors and supercomputers, as
topics of great importance and a telling example for the need for collaboration and
sharing. Data is of little use without tools to aggregate, analyze, communicate, and apply
the data. Supercomputers and communication technology, on the other hand, capable of
organizing and distributing vast amounts of information, are also of little use without
accurate and timely data, thus inspiring the title for this first workshop. This workshop has
brought together representatives of multiple sectors and diverse backgrounds. Sitting
among you, of course, are top people in the fields of sensors and supercomputers, but there
are also experts in other sectors and areas including lasers, languages, disinfection,
disasters, governing states, global communications, chemical defense, collaboration,
biogeochemistry, broadband data devices, wireless security, and water ecology.
With this brief introduction, we hope that you, with your varied perspectives, your
combined creativity, and wide-ranging knowledge will illuminate new ideas and
applications, identify and propose solutions to current challenges, and envision the future
of data collection and analysis technology-that ultimately you will expand the field of
sensors and supercomputers for global peace and prosperity and democracy.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-14
2.2. The Big Picture
George Markowsky gave some background on major terrorist events and the creation of the
MSCMC. The Multi-Sector Crisis Management Consortium (MSCMC) was created in July 2000.
It was chartered as a Maine non-profit organization, with its headquarters here at the ACCESS
Center. MSCMC has the following goals:
1.Identify the needs of the crisis response communities.
2.Support advanced information technology research for crisis management, emergency response
and related communities.
3.Bring multiple sectors together.
4.Provide neutral convening forum.
5.Provide a portal for user communities to the R & D communities.
A major event that provided impetus for the organization of the MSCMC was the March 20, 1995
Tokyo nerve gas attack by Aum Shinrikyo cult. One of the most frightening aspects of this attack
was its sophistication. Multiple locations were attacked simultaneously, and the cultists also tried to
interfere with the first responders. Two books that provide much more information about this
attack are Underground: The Tokyo Gas Attack and the Japanese Psyche by Haruki Murakami
and Aum Shinrikyo-Japan's Unholy Sect by Rei Kimura.
In the article Combating Terrorism at Home by Douglas J. Gillert in the Journal of Civil Defense,
Winter 1998, the author describes crisis responders by the phrase:
“The brave, the few, the underequipped, the undertrained
He notes that combating domestic terrorism falls on the shoulders of emergency services and other
municipal agencies, but that these agencies are not equipped or trained to handle this
responsibility.
The focus of the MSCMC is not exclusively on terrorism, but on crisis management in general. In
our increasingly more complicated and interconnected world, very serious accidents can happen. A
particularly chilling example was the December 3, 1984 accident at the Union Carbide plant in
Bhopal India that killed nearly 4,000 people.
In addition to terrorist acts and accidents, we live in a world in which natural disasters can happen
in most locations. Natural disasters have great potential for creating disasters. A particularly
frightening form of natural disaster is an epidemic. Epidemics have broken out from time to time,
and claimed many lives. The ever-changing genetic structures of microbes and viruses hold open
the possibility of future large-scale epidemics.
The book Hot Zone by Richard Preston describes a 1989 episode in Reston, Virginia involving the
ebola virus . Fortunately, the strain involved in this incident only infected chimpanzees. Otherwise,
there would have been an outbreak of ebola virus in the suburbs of Washington DC. As travel
increases and human density grows, the chances of a truly devastating epidemic arising because of
accidental contact between humans and microorganisms increase.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-15
Serious incidents might involve multiple factors. The book Normal Accidents by Charles Perrow,
discusses the concept of a normal accident, which is an undesirable event that is truly nobody’s
fault. Normal accidents are a consequence of unexpected and unintended interactions. An amusing
instance discussed by Perrow was an accident involving a salt mining company and an oil drilling
company whose independent actions a lake to disappear.
The book , The Monkey Wrench Gang by Edward Abbey has inspired a small number of
"ecoterrorists" who have acted against various experiments. Even in Maine attacks have taken place
against fields of new plant species. It is conceivable that an attack against a laboratory might lead to
an accidental release of some agent that could have devastating consequences.
The MSCMC is ready to play its part in making the world safer for humanity. Its strong partnership
with the ACCESS Center here in Arlington Virginia, shows some of the technology that can be
effectively harnessed in the fight against disaster. In May 2001, the ACCESS Center successfully
served as the home base for the TOPOFF (Top Officials) Exercises, which simulated setting up an
alternative communications facility in the event of three major incidents (biological, chemical,
nuclear) occurring simultaneously in widely separated areas of the country. Among other projects,
the ACCESS Center and its affiliates are investigating how to make the ACCESS technology
portable. This project is called: AccessGrid to Go. Additional information about the MSCMC and
its events is available at http://www.mscmc.org.
2.3 The Threat to Homeland Security
Captain Dennis Egan, our second speaker, began with the observation that the perception of the
world has changed remarkably in the last several months. He went on with the following
observations.
The world seems to be a much more dangerous place, but it might be that the world has not
changed, and that only our perceptions of the world have changed. Rather than a conventional
belligerent nation, we are confronting a more ancient foe.
The nature of the beast is global and supra national in scope (outside the construct of the nation
state) with a dangerous unifying doctrine of hate, intolerance and violence. Not since the days of
the anarchists has the world experienced such a threat, and the important difference today is these
terrorists have access to weapons of mass destruction. Starting with the Persian Gulf War of 19901991, the United States ushered in a new type of war with a focus on destroying critical
infrastructure of the enemy using both conventional and somewhat revolutionary means. This was a
war that ushered in the use of stealth fighters and bombers, cruise missiles, and a satellite controlled
battlefield with a particular emphasis upon destroying the enemy's command, control and
communication systems, including the ability to control and distribute electricity and fuel and
water. This was the introduction of "nodal" warfare, destroying the enemy's ability to use critical
infrastructure.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-16
During the decade that followed, we started to realize that our own nation, by becoming
increasingly complex, tightly coupled and heavily dependent upon computerized control and
communications, was becoming more vulnerable to cyber attack and cyber disruption.
Considerable emphasis was placed upon introducing continuity of operation plans that ensured
redundant and appropriately isolated systems. This effort peaked during Y2K which, being a nonevent, convinced most of the public that our vulnerabilities were not as bad as they might have
seemed at first.
As almost an afterthought, the press reported on a foiled terrorist plot to destroy the Seattle Space
Needle by Algerian terrorists linked to the Osama Bin Laden organization. Few understood the
nature of this linkage, however some understood that there was some indirect linkage to terrorists
who had blown up two US Embassies in Africa, destroyed American soldiers' barracks in Saudi
Arabia, and carried out an abortive attempt to destroy the World Trade Towers.
Following the attacks on the World Trade Towers and the Pentagon on the 11th of September, we
realized that these terrorists did not have to bring their weapons to the party, they used an inside-out
strategy which turned the risks of our own transportation systems against us. One should never
forget that the most effective weapon against the might of the US Navy, was the suicidal-manned
aerial bomb, the kamikaze. Indeed, much of our critical infrastructure is subjected daily to risks
from the hazardous cargos of our nation's transportation systems. The public accepts the risks
because the carriers have employed very safe practices in transport operations that usually prevent
accidents from happening. This risk-tolerance on the part of government and the public has resulted
in some adverse linkages of hazards that in an unfortunate sequence can change the occurrence of a
number of unrelated accidents into a tightly coupled chain reaction, with disastrous consequences.
For instance, some ports employ the practice of segregating ships carrying explosive cargoes into a
common anchorage, sometimes with little recognition of adjacent shore handling facilities that have
large quantities of toxic materials stored on site. The fact of the matter is that if one ship is
exploded by a terrorist, perhaps by the crash of an airplane, several other ships and toxics ashore
can be ignited with dire consequences to the coastal population.
The USCG Commandant, in a recent speech to the International Maritime Organization (IMO),
emphasized the need for security plans that address vulnerabilities of individual facilities, offshore
terminals and ships. Had the IMO been a multi-modal, all-hazard organization, he could have gone
further in recognizing the close coupling among hazards, including transportation systems that
provide incentives for exploitation by terrorists, because they amplify the consequences of a
terrorist attack into a much larger complex disaster. Despite the creation of many individual
security plans that emphasize preparedness and rapid reaction or response, unless they are
correlated into a larger regional or area infrastructure security plan, that recognizes the potential
linkages among hazards, terrorists will maintain an advantage of choosing the weakest or most
vulnerable link with greatest systematic consequences.
Terrorists use our own transportation systems against us exploiting our freedom of movement that
creates significant economic advantages of free markets in the "Developed world". Such a concept
greatly influenced the Asian Pacific Economic Conference "Economic Leader's Statement On
Counter-Terrorism" 21 October 2000 in Shanghai, China. APEC emphasized the need to coordinate
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-17
plans and preparedness to enhance airport, aircraft, and port security. It recognized key linkages
between transportation system disruptions and temporary supply disruptions and longer-term
challenges facing the region's energy supply. APEC recognized the need for a coordinated effort in
critical sector protection including telecommunications, transportation, health and energy. It called
for the enhancement of international communications networks and accelerated sharing of
information among Customs and Border police organizations. It called for new response initiatives
to strengthen capacity building and economic and technical cooperation to help member economies
to put in place and enforce effective counter-terrorism measures. Finally, APEC called for greater
cooperation to limit the fallout or secondary effects of the attacks, and for the recognition of the
importance of recovering economic confidence in the region through growth-building coordinated
policies as well as providing a secure environment for recovery of trade, investment, travel and
tourism.
Note the much broader considerations of the APEC Economic Leaders' Statement. They called for
much more than a simple initiative on improving reactive forces or more completely sharing police
intelligence about terrorists. They called for an integrative approach with improved coordination in
the four pillars of disaster management that are Prevention, Preparedness, Response and Recovery.
The economic leaders used the language "coordination". What is really needed is more
collaboration than coordination. We find ourselves in much better shape to coordinate safety than
security. Security is quite different than safety. It is highly sensitive because it requires a great deal
of trust to divulge one's vulnerabilities even to a partner. Consequently, coordinating one common,
unified security approach is uncommon. Everyone can subscribe to safety, and work towards both
standards and international protocols. Because resources are limited, security requires that certain
national decisions be made about protecting some things more than others. Because a terrorist will
probe a potential target and select targets of lower resistance that still meet the terrorist's objectives,
it is unwise for a nation to openly set patterns of security protection and procedures "in concrete".
Security demands a degree of covertness while safety is an open discussion. Security requires
collaboration over secure communications while safety can be openly communicated and
coordinated.
Collaboration is essential to enhance and share security technology that provides such initiatives as
integrated surveillance and detection systems, alert and warning systems, secure communication
systems -- both wide bandwidth and wireless -- and decision support capabilities such as hazard
simulation and consequence modeling, pattern recognition, and rapid identity authentication.
Collaborating to establish common approaches to analyze vulnerabilities and understand the
relationships among various linked hazards, can lead to very productive initiatives to mitigate the
consequences of terrorism when it occurs. Often this kind of analysis can establish a potential
causal chain of events and heighten the awareness and pattern recognition should a terrorist
organization conduct a "dry-run" or the initial stages of an attack. This kind of analysis can also
suggest productive strategies to break the causal chain by reducing or eliminating coupling of
hazards. Such mitigating approaches are also beneficial in the recovery phase to ensure that
communities and their economies become more capable of sustaining and recovering from terrorist
attacks.
The Multi-Sector Crisis Response Consortium (MSCRC) is positioned in an extraordinary manner
to enhance the collaboration needed for combating and mitigating terrorism from international
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-18
organizations. It provides a wide bandwidth, common meeting ground to discuss and evaluate key
technologies such as Geographic Information Systems, which effectively communicate the
distribution of critical infrastructure and sensitive areas of the economy, modeling and simulation
of hazards to establish coupling and consequence footprints and development of econometric
models to establish the real costs both immediate from the terrorist attacks as well as that selfimposed reactive cost of initiating alternative counter-terrorism strategies. We have the challenges
of moving such discussions increasingly behind encrypted means. I enjoin this organization with
this imperative. During the recent APEC Transportation Security Experts Working Group session
in Singapore, I submitted a potential project proposal that drew heavily upon the capabilities of
enhanced collaboration offered by the MSCMC. This proposal would lead to both team-to-team
direct collaboration as well as video-teleconferenced collaboration in development of a toolbox of
mutually accessible models and simulations of hazards (transportation hazards with potential
danger to critical infrastructure) that might be unleashed by terrorists. The nations of Russia, China
(including Hong Kong), Singapore, Canada, Australia and New Zealand, were not in favor of
divulging their own appraisals of their nations' vulnerabilities. However, they were strongly in
favor of developing common techniques of analysis of the consequences of terrorist attack and a
community's capability to survive such an attack. Using a notional nation, the proposal would have
a multi-national team set up the GIS clearly demonstrating typical vulnerabilities and coupling of
hazards and critical infrastructure. It would then design a tabletop exercise that would engage the
power of collaborating over wide-bandwidth video teleconferencing and streaming video.
Participants would demonstrate using the toolbox as decision support for response to simulated
terrorist attacks as well as a means for improved prevention, preparedness, and community
recovery. The tabletop exercise could feature a "red" terrorist cell as well as defenders or terrorist
attacks could be pre-scripted. Discussion would draw on the predictions of the consequence
assessment tools used as decision support as participants would submit their proposed response and
mitigation strategies. A basic and relatively simple econometric tool could be used as a decision
support aid by participants to demonstrate the necessity of seeking a balance between security
imperatives and the economic benefits derived from free flow of trade. This conceptual proposal
was selected as one of the top four by the APEC Security Experts Group from among 12 proposals
submitted by various nations. It is being redefined this week as a proposal for a Phase 1 feasibility
study and is to be considered by the APEC Transportation Security Committee during its meeting
in Manila on 4 March 2002. Russia, China, Singapore, New Zealand and the US strongly supported
it at the Working Group level.
To conclude, the current focus on international counter-terrorism really demands a more
comprehensive approach to the four pillars of disaster management - Prevention, Preparedness,
Response and Recovery. While traditional approaches are used to coordinate international safety
initiatives, approaches towards strengthening our collective counter-terrorism capabilities require a
different sort of collaboration, more akin with traditional disaster management considerations, but
with some important differences in secure communications and respect for national sensitivities.
Key technologies are those that can enhance collaboration and visual communication in a secure
environment. New insight may be gained through creating a notional geographic information
system model and conducting team-based, collaborative consequence assessment analysis. This
would engage a common set of hazard simulation tools and an econometric tool for more effective
decision support. Table top exercises and follow-on discussions would emphasize the need for
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-19
strategies that enhance the ability for communities to both survive and recover economically from
terrorist attacks.
2.4 Transportation, Buildings and Homes
In his talk, Neil Gray, Executive Director of the International, Bridge, Tunnel and Turnpike
Authority, introduced himself and his colleagues as the "toll guys" - the people who worry about
places that have tolls. This includes many roads and bridges worldwide. He asked his Association
members what did they want to know? He found out that they are very eager to use sensors to
monitor axles, determine dimensions and read tags. They must have accurate information.
A big issue is vehicle framing, i.e., the identification of distinct vehicles. It is not always easy to
tell the difference between a trailer and a tailgater. He discussed various types of sensors that are
used to monitor roadways and talked about the problem of vehicle framing. As a vehicle travels
through a toll lane various sensors count axles, determine dimensions, read tags, etc. Vehicle
framing refers to insuring that all this sensor data is attributed to the correct vehicle. Common
vehicle separators used in toll lanes and their faults regarding vehicle separation were discussed. He
then talked about loop detectors, which have been around a while, and are very good at detecting
vehicles but not very good at separating them. Cars bunched close together, as happens in a toll
lane, cause the loop to remain on between vehicles. Vehicles pulling trailers (with very little ferrous
mass for the loop to detect) may have a dropout between the vehicle and trailer therefore spoiling
the vehicle separation. Hi-tech motorcycles made mostly of aluminum can cause the loop to miss
them completely. Very high vehicles such as tractors pulling trailers may also cause the loop to
"drop out" while the vehicle is still in the lane.
Sonic sensors, which are normally mounted looking down on traffic. These sensors often miss the
space between vehicles, as the sound sent from the sensor covers such a wide area. Much like the
loop detectors, they are good for detecting the presence of vehicles but not vehicle separation.
Through beam sensors do a much better job at separation since the light beam is emitted from one
side of the lane and received on the other side. This creates a pencil thin beam which when broken
detects vehicles. The problem comes with different height vehicles not triggering the beam. If the
beam is too low, it will not detect high trailers (except for the axles). If it is too high it may miss
lower vehicles such as a flatbed truck with no load on it. These sensors are susceptible to inclement
weather such as snow or rain. In addition, they degrade in performance as they collect dirt and dust.
Light curtains are essentially a vertical array of through-beam sensors. These have all the
advantages of the through-beam sensor and eliminate most of the disadvantages. The trouble with
light curtains is the price. Since they are based on through-beam sensors, the light curtains are also
susceptible to inclement weather, such as snow or rain. In addition, they degrade in performance as
they collect dirt and dust. Since a light curtain starts very close to the ground, it tends to be affected
by snow accumulation and snow plowing.
Laser sensors bounce a beam of light off a vehicle and read the returning beam. This works well in
a controlled environment such as a production line where the target will always be the same shape
and size unlike in a toll lane. These sensors are also susceptible to inclement weather such as snow
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-20
or rain. In addition, they degrade in performance as they collect dirt and dust. In addition, a laser
sensor has high precision moving parts and optics, which will eventually need replacement,
calibration, and other attention.
What people monitoring roadways need is a "dream" sensor that would have the following
qualities:
•
•
•
•
•
•
•
•
•
•
It could accurately separate vehicles, which are as close as 12 inches apart (closer would be
better).
It could recognize a very small target such as the trailer hitch of a vehicle pulling a trailer.
It would be impervious to weather and temperature extremes.
It would have a simple interface, such as a switch output indicating vehicle presence.
It would be simple to mount.
It would have low maintenance.
It would have extensive error reporting.
It would be extremely reliable through design or cost effective redundancy.
It would have a reasonable cost.
It would easily respond to active transponders, which are used as easy tags.
In addition to the need for improved sensors, the members of the authority are interested in issues
of related to shutdowns. Currently, they monitor temperature, weather, turn ramps, and the saline
content of water on the road. They are very interested in automated remote signage.
They need to monitor vehicle flow, which would lead to the creation of large temporary databases.
The goal is to purge records relatively rapidly and not to produce a national ID system. There is no
overarching entity in most areas that would be able to construct a national database. The different
members of the Association collect different types of data. There are no plans to integrate data
collection and analysis.
Another issue is monitoring air quality and determining what toxins are in the air. One unresolved
question is whether it is better not to know about toxins in your air. If you know about them, are
you liable? What can you do about it?
It would be great to have a sampling system for vehicles so you could know what is in a threat area.
Such a system could be linked to INS and Customs. There was an incident in which a truck burned
under a major overpass, which created traffic problems on the East coast for several days. It would
also be wonderful to have some system for counting the number of people in a vehicle, and to
determine some attributes of vehicles such as their weight, and get some idea of whether they are
carrying dangerous materials.
The Association's experience suggests that it is a long, expensive process to determine what
technologies work. Members always want something pervasive and inexpensive. They are very
willing to entertain new things, if they can justify the cost. The members do have significant sums
available, but their interest falls off if data does not come back in useful ways.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-21
There are many issues that need consideration at this time. Some include being able to predict
problems on roads, bridges and in tunnels, and being able to ameliorate them. These include trying
to predict icing conditions, and terrorist attacks. Predicting attacks is only part of the problem -- we
must still determine what to do about them. As we develop technology, we must also be concerned
about privacy and costs. It was noted that perhaps the Orange County Expressway is one of the
most advanced systems in the world. However, they are blessed with generally excellent weather,
so their system might not operate as well in other environments.
Rich Holm, the reactor administrator for the University of Illinois Nuclear Reactor Laboratory,
talked about the trials and tribulations that would be associated with installing sensor technologies
into a 60 story commercial building. The primary question motivating him is what can be done to
make a building the safest commercial building ever built? This question suggests others, such as:
What can make it safe for occupants and for disaster responders? What are the threats?
These questions lead to the problem of deciding on the types of sensors to include (structural, life
safety, security, CBN, etc.) and figuring out how to power them. This is complicated by the fact
that some sensors will be “embedded” and inaccessible after construction. Associated with these
issues are questions of how to assimilate and present the information collected. Many of the sensors
that are required for monitoring transportation infrastructure need to be powered by batteries. Thus,
we would like to have batteries that would last at least 10 years before needing to be replaced.
Some sensors could be hard-wired to power, but this adds to wiring complexity and costs, which
already add 10% to the building cost. Undoubtedly, some concessions will have to be made. The
power source will most likely not be nuclear.
Rich Holm discussed the various types of sensors that might be used in a building. These include
structural sensors that measure skin pressure, temperature, displacement, and strain. Another class
is life safety sensors such as smoke detectors, thermal detectors, chemical and biological sensors,
and radiation measuring devices. A closely related class includes security sensors such as infrared
sensors, motion detectors, individual occupant sensors, and even facial recognition sensors.
We must realize that any building that we build at this time would literally be a living laboratory. It
would be essential to move data from the building to laboratories where it could be analyzed
further. It would also help us realize what items we have overlooked.
An important issue is that of survivability. Given that our vigilance will fail sometimes, we need to
know how to keep the system operating when something happens to it. This is still a wide open
question, which needs a lot of work.
We are learning a lot from Navy ships. If you rotate an aircraft carrier 90 degrees, it will look a lot
like a tall building. The next generation of aircraft carriers might have something like 0.25 million
sensors! Fortunately, the Navy has enough money to carry out the development of such complex
systems. Also, the Navy is very concerned with survivability.
We are also learning a lot from the nuclear industry. Partners such as architects have good archival
design information. The American Institute of Architects (www.aia.org) is a good source to tap
into and they have a sensor group. There are also related groups at Sandia National Laboratory
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-22
(www.sandia.gov). Fire departments and other first responders are also good sources of information
and ideas.
We conclude this section with some material supplied by David Nagel, whose talk is described in
more detail in Chapter 3.
Placing wireless sensors in protected environments
avoids many of the problems with the employment
of such sensors outdoors. However, some of the
systems associated with factories, facilities,
buildings and homes involve a mix of outdoor and
indoor sensors. Unlike the situation outdoors, Figure 2.1. Photograph of an uncooled infrared
from Raytheon with a micro-machined array of
power is generally available within or near camera
120 by 160 pixels, and a picture taken with the system.
structures. If electrical cables are run to sensor
nodes, then it is possible to employ the same cables to transmit data at frequencies well above those
found due to power transmission. Nevertheless, the use of wireless systems for delivering the
sensed information remains attractive in many cases. The monitoring of the condition and
performance of many systems associated with structures is the focus of this section.
The high costs of providing, using and disposing of energy can be ameliorated by the use of energy
monitors. The leakage of heat from buildings can be sensed with micro-machined infrared imagers,
such as the one in Figure 2.1, which view the building from its exterior and convey information to
the user in the building (or elsewhere) by wireless means. The presence of unduly high or low
temperatures within a structure can be determined using relatively simple sensors. The loss of
conditioned air to the exterior can also be determined with point sensors.
Electrical power distribution systems can be monitored for their state of operation as well as for
their energy efficiency. The same is true for fluid distributions systems. These include the HVAC
systems that move air, and the gas distribution systems in some structures, as well as the liquid
systems for water and waste. In general, computers control HVAC systems in response to
programmed instructions, which commonly vary with the time of day and day of the week.
Automatic sensing and control of gas and water systems in emergencies is provided in some cases.
Communication and information systems also offer
opportunities for monitoring. Their integrity and condition is
increasingly critical to the operation of factories, facilities,
buildings and even homes.
Sensing the integrity of such
systems is less complicated than sensing the conditions of
electrical and fluid systems because parameters such as power
and flow rates are not of interest.
Monitoring the condition and operation of machinery has
received great attention is recent years 1 . The goal is to reduce
maintenance costs by doing only what is needed when it is
needed. Parameters of interest include operating temperatures,
1
Figure 2.2. A wireless torque
sensor made by Binsfeld
Engineering
Society for Machinery Failure Prevention Technology, http://www.mfpt.org/
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-23
which can be sensed with infrared imagers and point detectors. Vibrations in many machines are
sensitive indicators of the alignment of the systems and its performance. The torque within drive
shafts is another factor of interest. Its determination is an excellent application of battery-powered
wireless sensor systems, which avoid the need for contact with the shaft to receive power or
transmit information. Figure 2.2 shows an example of a commercial system for measuring the
strain and, hence, the torque in a shaft during operation1 . Other companies also make wireless
strain gauges 2 and general multi-sensor systems 3 .
The control of steps within industrial processes that make materials, devices and more complex
products is a major area of applications for sensors within control loops. Wireless communication
of the information from the sensors to the computer, which controls some part of the process, is
being used increasingly. Similar systems can also be employed to assay the quality of the materials
or other products that result from a process. There are two primary reasons why wireless systems
are not yet more heavily used in industrial control loops. The relatively recent availability of
wireless sensor systems means that there are still many installed legacy control systems that are
wired. The secondary reason is the relative robustness of wired systems, that is, their immunity of
electromagnetic interference, especially for systems that have optical fiber links. It is likely that,
several decades from now, a significant fraction of industrial networks for transmission of sensor
information will still be wired. The situation may prove analogous to the penetration of small
computers into factories and offices. For all of their advantages, medium and large computers still
play a role in industries.
The habitability of buildings depends on the conditions of the air and the absence of deleterious
chemicals and organisms. Hence, many of the parameters of interest for outdoor weather are also
germane to indoor conditions. The same is also true for sensing the chemistry and biology of the
air, water and particles in structures. Probably, major buildings will have sophisticated chemical
and biological analyzers installed for both health and safety reasons, when such systems become
affordable and reliable. Here, also, there are historical precedents. Air conditioning was once
unavailable, but now it is routinely a part of buildings.
In the past decade, the concept of "smart" spaces and homes has arisen in parallel with the
emergence of "smart" sensors and networks. 4 The variety of things that are done in homes
significantly exceeds the functions in factories, facilities and many other buildings, notably offices.
Safety and security are a concern for the occupants of all structures, of course, and communications
is a common function within all structures. In addition, eating, resting, many kinds of cleaning and
maintenance, entertainment and other functions are all done within homes. Currently, sensors are
elements of the HVAC system control loop, but are not in many other home systems. Sensors are
1
D. Hebert, "Wireless Solutions Emerge", Control and Design, p. 45, May 2001 and http://www.binsfeld.com
Model 9300 Rotary Torque Measuring System, http://www.wirelessdatacorp.com/ wdc/index.html, and Strain Link ,
http://www.microstrain.com/slink.html
3
HiDRA: Highly Deployable Remote Access, http://www.rsc.rockwell.com/html/ information.html#Wireless Systems
& Application, and Wireless Web Sensor Networks, http://www.microstrain.com/WWSN.html.
4
B. R. Badrinath and M. Srivastava, "Smart Spaces and Environments", http://www.comsoc.org/livepubs/pci/
public/2000/oct/current.html, J. M. Sanders, "Sensing the Subtleties of Everyday Life", http://www.gtri.gatech.edu/rhwin00/main.html, Home of the 21st Century, http://www.seas.gwu.edu/~h21c/index2.htm and G. Aboud, "The
Broadband House: Related Links", http://www.emory.edu/college/scienceandsociety/scienceinyourlife/
broadbandlinks.htm
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-24
now found in appliances that involve high or low temperatures, including ovens, toasters, clothes
dryers, refrigerators and freezers, as well as water systems such as clothes and dish washers.
Monitoring other consumer products and even food is in prospect. Some homes also have sensors
for security systems. It is expected that sensors, central information systems and voice recognition
technology will be commonly found in homes in the future. These capabilities will enable a better
awareness of the activities and even the health of the occupants of the building. The information
can be used both within the home and beyond it. The current situation regarding "smart" homes
can be likened to another major consumer product, the automobile. Initially, advanced technology,
such as automatic braking systems and night vision devices, were found only on the most expensive
models. As the sales volume of smart home systems increases, prices should drop to where they
are more widely affordable.
In addition to monitoring the contents and occupants of structures, there is great interest in sensor
systems to assess the structures themselves. Responses to earthquakes and high winds, and the
possibility of flooding or gas leaks due to pipe breaks, are primary drivers for this interest. Strain
sensors are being installed in many new buildings to better understand what is needed for safe
design and construction of structures, that is, for improved determination of safety factors.
Current terrestrial, marine and air, and future space transportation systems are all candidates for
monitoring using wireless sensor systems and networks. There is great interest in "intelligent"
highway systems in Europe, Japan and the U. S1 . Motivations for making more effective highway
systems include increased safety, saving travel time and reducing pollution. Knowledge of the
current traffic load and speed over wide geographical regions is needed. Imagers can provide such
data if they are combined with sufficiently capable computers that have adequate analysis software.
Point sensors can also be employed to provide traffic information. This is already being done at
4000 locations on the German autobahn2 . The data obtained from sensors mounted on overpasses
is relayed using the cellular phone system. Monitoring conditions of and within train cars can be
done with wireless systems. An example graphic from such a system is given in Figure 2.3 3 . Air
traffic control is a very different challenge
than following cars, trucks or trains.
Currently, radars on the ground and in
larger planes are employed to sense the
presence of planes in a region. The use of
infrared imagers and acoustic sensors in
wireless systems on and near airports
might impact safety, traffic control and
noise abatement.
Figure 2.3. Map of the U. S. showing the
Automobiles and trucks have a growing location of trains equipped with sensors
number of micro-sensors in order to that report via satellite to a General
improve performance and safety. Most of Electric Service Center.
these are in wired systems within the
vehicles. The use of wireless systems to monitor tire pressure is expected. Under-inflated or over1
2
3
C. Schmidt, "The Road Ahead", MIT Technology Review, pp.73-77, July/August 2001
DDG Gesellschaft für Verkehrsdaten mbH, http://www.ddg.de
R. Pool, "If It Ain't Broke, Fix It", MIT Technology Review, pp.64-69, September 2001
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-25
inflated tires, especially on trucks, significantly increase operating costs. Wireless monitoring of
the conditions within semi-trailers is also in prospect, especially in refrigerated vehicles. Using the
Global Positioning System and wireless reporting is already done to follow the location of trucks
and train cars. Wireless sensor systems can also report on the conditions within shipping crates and
containers.
Wireless systems of sensors enable the operation of robots of many kinds. Robotic vehicles used
by police and others on land now include imagers for inspection of potentially dangerous objects.
They could also be equipped with additional sensors to determine the nature of unknown
substances, including nuclear materials, explosives, chemicals and biological materials. Unmanned
air vehicles are often used as platforms for imagers and other sensors. Unmanned underwater
vehicles can also be used as sensor platforms, from which the wireless link uses acoustic rather
than radio-frequency information communication techniques. The floor of the earth's oceans is
poorly known, and there is growing interest in robotic exploration for both scientific and practical
reasons. Project NEPTUNE envisions equipping much of three small tectonic plates off the coast of
Washington State with, first, wired (fiber optic) and, later, wireless (acoustic) sensors 1 . The
proposed global ocean-mapping project (GOMaP) would put to sea large numbers of underwater
vehicles to map the entire sea floor with side-scan sonar and other sensors 2 . The recorded data
would be sent through satellite systems when the vehicles come to the surface to recharge their
batteries.
Robotic vehicles will also be employed for the exploration of planets and their moons. Mars is the
next target for employment of rovers equipped with diverse sensors, which must necessarily use
wireless communications. The development of such vehicles is challenging since their operating
environment is not well known compared to terrestrial applications. Also, the long ranges needed
for information transmission stress the energy supplies available to such vehicles. Short-range
relay of information to a nearby station on a planet or moon, which has more stored energy, saves
the battery on a rover.
Some of the applications already discussed, especially those in buildings and transportation
systems, deal with what is called infrastructure. Systems within structures for the provision of air
and power, the handling of water and the movement of materials can all be monitored for their
integrity and performance. Highways, bridges, tunnels, ports, canals and airports are all critical to
the smooth function of the economies of societies. Other aspects of the infrastructure of a region
are also susceptible to monitoring with wireless sensor systems. These include wells, waterways,
reservoirs and piping systems for water, gas and oil. Even the integrity of sewage systems is
significant because of health problems that could attend interaction of waste with aquifers. The
surveillance of large systems for the production and distribution of power using the power grid is
also important. Monitoring of transportation and other infrastructures, and border surveillance, are
three foci of the current emphasis on homeland security in the U. S.
The locations and activities of people have already been considered regarding both health
monitoring and military operations. Other applications of wireless sensors involve systems to
monitor children, both in homes and elsewhere. Wireless systems are also being used to keep track
1
2
Neptune: A Fiber Optic Telescope to Inner Space, http://www.neptune.washington.edu/
Project GoMAP, http://mp-www.nrl.navy.mil/marine_physics_branch/gomap.htm
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-26
of the locations of prison parolees. In very general terms, the high value of people makes where
they are and what they are doing of interest for many reasons. Even valuable farm animals and
important wild animals are monitored using wireless sensor systems.
The number of potential applications of wireless sensor networks is large. They provide the
motivation for sensor research centers such as the National Centre for Sensor Research1 , and the
Center for Wireless Integrated Microsystems 2 . Basically, almost anywhere that there is something
of value or interest to anyone, it is possible to contrive a combination of sensors, microcomputers
and communications to provide information in near real time. Accessibility and power are the
primary limitations to such ubiquitous sensing. Costs vary widely, but the emergence of microtechnologies in recent years have made it possible to monitor many more quantities in many
locations for most times at affordable costs.
It is noted that three common types of inherently wireless sensors can also be impacted by microtechnologies, namely radars, lidars and sonars. Radars, which employ microwave radiation, and
lidars, which use light (laser) radiation, work in air to locate and determine the position of objects.
Small short-range radars are under development for automobile collision avoidance, detection of
people and even non-contact respiratory and circulatory measurements. These systems might
employ radio frequency MEMS. Lidars for measurement of the dynamics of structures, such as
ships and skyscrapers, can include solid-state laser sources and either point or array detectors.
Sonars are generally large, relatively low-frequency sound systems for the location of large objects
underwater. Small transducers carried on free-swimming unmanned underwater vehicles will
permit high-resolution imaging of objects in the sea. Clusters of co-located point micro-sensors that
form the nodes in a system or network are relatively new and offer great performance and promise.
Miniature versions of radar, lidar and sonar wireless sensor systems, which are on hand or under
development, are also important for volume sensing.
2.5 Medical Applications and Biodefense
Jim Wilson of Georgetown University spoke about remote sensing to assist in the handling of
epidemics. He is a member of the GDIN Infectious Diseases Working Group. He began his
presentation with a discussion of anecdotal reports of increased incidence of malaria due to both an
increase and decrease of precipitation in 1997-98. In addition, World Health Organization (WHO)
reported simultaneous outbreaks of cholera occurring in 11 countries in West and Central Africa
thought to have originated in the Horn of Africa. It was believed this outbreak was related to the
1997-8 El Nino. In March 2000, in Australia there was an MVE v. Kunjin viral encephalitis
outbreak 3 thought to be related to increased mosquito populations following heavy, sustained
rainfall. In the same month, there was an HPS (Hunta virus Pulmonary Syndrome) 4 outbreak in
Panama thought to be related to precipitation. All these linkages and others were purely anecdotal
and there was no hard evidence linking the climactic factors to the outbreaks.
1
http://www.ncsr.ie/Frame.htm
http://64.78.45.100/
3
http://www.arbovirus.health.nsw.gov.au/areas/arbovirus/viruses/murrayvalleyencephalitisandkunjin.htm
4
http://www.cdc.gov/ncidod/diseases/hanta/hantvrus.htm
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-27
In May 2000, in Orenburg Province, Russia, there was a CCHF (Crimean-Congo haemorrhagic
fever) 1 outbreak believed to be caused by an abrupt increase in local rodent populations thought to
be related to precipitation changes. In the same month in Walkerton, Ontario, Canada there was an
outbreak of EHEC (Enterohemorrhagic E. Coli) 2 , campylobacteria and salmonella involving an
estimated 2000 people thought to be due to flooding of sewage system of a poultry farm,
subsequently contaminating the water supply. In July of 2000 there was a single eastern equine
encephalitis fatality on the Outer Banks, of North Carolina in the US. This was attributed to
increased mosquito populations, but the link seems week. Finally, in September 2000, Israel
expressed fear that increased rainfall could result in a second wave of WNV (West Nile Viral
fever). There are similar reports of plant and livestock outbreaks of diseases.
There has been some research done in this area. Linthicum et al. looked at Rift Valley Fever in
Kenya. This is a mosquito borne disease. They used NDVI (Normalized Difference Vegetation
Index) 3 to forecast outbreaks of RVF. They found a very strong signal4 .
Colwell 5 et al. studied cholera outbreaks in Bangladesh using remotely sensed SSTs (Sea Surface
Temperatures). The epidemic was carried by copopods, which feed on algae. When the algae count
was high, copopods increased.
Glass6 studied Hantavirus using Landsat images to identify areas of high risk in the Southwestern
US. In this case, deer mice served as a reservoir and dried fecal matter was the immediate source of
infection.
Wilson and Tucker et al., studied Ebola fever. Previous outbreaks had been simultaneous, which
was very unusual and suggested climatic modulation. They used the AVHRR-NDVI (Advanced
Very High Resolution Radiometer) 7 , and established that the fever occurred in areas with
abnormally high NDVI 8 .
There have been explosive epidemics of (VEE) Venezuelan Equine Encephalitis. This can affect
humans, but its main effects are on livestock. Wilson and his colleagues are studying one outbreak
that occurred in 1995 in Venezuela and Colombia in which up to 100,000 people were infected and
300 died. The epidemic spread by up to 5 km per day. It was linked to abnormally high rainfall and
might have increased three possible vectors. Seasonal NDVIs lag precipitation by about one month.
They noted an NDVI abnormality where epidemic occurred that tracked the spread of the disease.
The readings for NDVI were among highest readings in a 21 year old dataset.
1
info at http://www.who.int/inf-fs/en/fact208.html
http://www.wvdhhr.org/bph/oehp/sdc/ecoli_protocol.htm
3
http://daac.gsfc.nasa.gov/CAMPAIGN_DOCS/LAND_BIO/ndvi.html
2
4 Linthicum, K. J. Anyamba, A., Tucker, C. J., Kelley, P. W., Myers, M. F. and Peters, C. J. (1999) Climate and Satellite Indicators to Forecast Rift
Valley Fever Epidemics in Kenya. Science, 185: 397-400.
5
http://www.umbi.umd.edu/~comb/faculty/colwell/colwell.html
http://earthobservatory.nasa.gov/Study/Hanta
7
http://edc.usgs.gov/glis/hyper/guide/avhrr
8
Tucker, C. J., J.M. Wilson, R.L. Mahoney, A. Anyamba, K.J. Linthicum, and M.F. Myers (2002) "Climatic and
Ecological Context of the 1994-1996 Ebola Outbreaks". Photogrammetric Engineering and Remote Sensing
(Special Issue on Remote Sensing and Human Health). 68(2): 147-152.
6
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-28
The work on VEE has application to US biodefense, since we have VEE vectors in the US. The
VEE is not a native virus to the US and appears to be an escapee from a laboratory. RSEPI
(Remotely Sensed Epidemic Intelligence) systems have great utility in helping to understand and
respond to epidemics, but it is very much a work in progress. Some highly experimental systems
are under development using multifactorial processes.
We conclude this section with more material supplied by David Nagel. The safety of people in
almost any setting can be improved by the use of wireless sensor networks. Monitoring the safety
of workers employed in harsh environments is already a significant application of wireless sensor
systems. Heat stress monitors are offered for sale by ten companies, some of which are wireless.
Figure 2.4 shows a commercial system capable of monitoring the conditions of as many as 10
people at ranges up to 1000 feet 1 .
Wireless sensor systems offer many opportunities for monitoring
people ranging from healthy persons, including those with
conditions such as diabetes that require continual attention, to
critically ill people in hospital intensive care units2 . Figure 2.4
shows a wireless system for monitoring temperature, heart rate
and activity. Other examples of wireless telemetry of sensor
information from the body include blood glucose levels and the
pressure within the skull and a "gut camera" (Figure 4.6). Once
the images or information are outside of the body, they can be
rapidly communicated around the globe.
Figure 2.4. Wireless
system for temperature,
heart rate and activity
sold by Mini-Mitter.
The use of wireless sensor systems to monitor elderly people in
their homes will be a rapidly growing industry in the U. S in the near future 3 . The growing fraction
of the population that is old, and the great psychological and economic benefits of keeping people
in their own homes, are two of the drivers. It is possible, and maybe even likely that the industry,
which currently provides sensors and monitors for home safety and security, will extend their
services to the monitoring of the occupants of homes. In a similar fashion, the surveillance of
persons in nursing homes can have a variety of benefits for both the occupants and their caregivers.
In hospitals, the use of wired monitors in regular and advanced care settings has been routine for
decades. In such cases, the employment of wireless systems should reduce costs and permit
reconfiguration of rooms to respond to changing requirements, such as would occur in a crisis 4 . It
is now possible to monitor the orientation, movements, heart rate, blood pressure and even
chemical factors with compact systems that can be worn by a person, and to forward the acquired
information by wireless means. Wireless monitoring of medical personnel and critical equipment
may also be done in critical situations.
1
VitalSense Physiological Telemetry System, http://www.minimitter.com/Products/VitalSense/
M. Hawley, "A Picture of Health", MIT Technology Review pp. 28-29, March 2001
3
D. Voss, "Smart Home Care", MIT Technology Review, p. 31, September 2001, and G. Sinha, "The Doctor is in the
House", Popular Science, pp.50-54, July 2000
4
G. Weiss, "Welcome to the (Almost) Digital Hospital", IEEE Spectrum, pp. 44-49, March 2002
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-29
2.6 Security, Crises and Military Applications1
The security of people and things, which range from valuable objects to major facilities, is a routine
requirement that can often be improved using wireless sensor networks. This has been noted in
some of the applications already discussed. Visible and infrared imagers and point sensors are
commonly used for constant security surveillance of areas and conditions. Intrusion detection is
usually the main goal of such monitoring, whether it be in homes, offices, factories, other buildings,
borders, ports or airports. Many of the systems are wired now, but wireless connectivity has some
of the same advantages for safety and security as it does for monitoring in hospitals. Cheaper
installation, easier replacement as technologies evolve and rapid reconfiguration are among the
attractions of wireless technology for security.
Crises and emergencies involve many of the same problems as routine safety and security, but with
much faster rates of change. They have many causes, as listed in Table 2.1.
Weather
Accidents, Crashes and Failures
Wind (Hurricanes, Tornadoes and Other
Transportation (Land, Marine and Air)
Storms)
Rain (Floods and Mud Slides)
Industrial
Snow (Blizzards and Deep Snow)
Structural (Collapses)
Ice Build Up
Releases (Chemical, Biological or
Nuclear)
Geological Events
Terrorism
Earthquakes and Tidal Waves
Threats
Volcanic Eruptions
Attacks
Gas Releases
Fires
Meteorite Impact
Nuclear Contamination
Fires (Forest, Urban and Others)
Nuclear Weapons
Lightening
Explosives
Failures and Accidents
Chemicals
Arson
Biologicals
Animals and Insects
Warfare
Evacuations
Many Types
Table 2.1. Natural and human causes of crises and emergencies.
The preparations for, responses to, management, mitigation, follow-up and recovery from crises,
which affect significant numbers of people, can be broadly impacted by the utility of wireless
sensor networks. Interested parties are (a) those with responsibilities, including local, regional,
national and international governments, and private companies that have contractual
responsibilities, or simply want to protect their own property, (b) those with capabilities to respond,
notably all governments, private organizations and individuals with certain skills or equipment and
(c) those affected, again including governments, companies, organizations and individuals. Some
of the activities that are germane to the various phases of crises are monitoring and surveillance;
locating and assessing problems, victims and responders; search and rescue; fire fighting; crowd
1
This section provided by David Nagel.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-30
control; and removal or cleanup. The sensors that are useful span most of the kinds of available
sensor technologies. Pre-installed wireless systems are useful for crises because of problems with
accessibility to dangerous regions. Deployable sensors, notably those carried by small aerial
vehicles (including helicopters), are especially valuable because they can be used responsively.
A concept for a sensor-carrying wheeled robot for use during emergencies within apartment
buildings was developed recently 1 . The system would ordinarily reside in a compartment at floor
level, possibly under the niche for a fire extinguisher, on each of the floors. When commanded, or
when a fire alarm sounded, or when triggered by its own sensors, the system would move down the
hallway looking for signs of a fire using its visible and infrared imagers. It would be equipped to
wirelessly transmit images, or data from temperature or other sensors, either to managers in the
building or to firemen in the locale of the building. If widely adopted, tens of thousands of units of
such a hallway robot could find use.
There is also significant overlap between actions required by crises and the conduct of military
operations, especially warfare. A fast tempo and great uncertainty are characteristic of both crises
and warfare. Many other military functions overlap civilian applications already mentioned.
Weather is of great interest to the military for planning and executing operations, of course. The
monitoring of machinery and other systems is as much relevant to the military as it is to companies.
Perimeter monitoring and defense are equally applicable to ordinary security and to military
operations. Locating and determining the movements of friendly and hostile personnel has
similarities to following people fighting forest fires, and even some health and medical
applications. Monitoring the locations and movements of military vehicles and equipment has
features in common with following the actions of vehicles on highways.
Other functions are unique to the military. Target detection, classification, identification and
tracking are among the most compelling of military applications of wireless sensor networks.
Detection of the launch of missiles and other weapons by an enemy is of great interest. Battle
damage assessment, that is, determining the effectiveness of weapons employed by the military, is
also important. Imagers and other sensors carried on unmanned aerial vehicles are proving
especially useful for the military.
Unattended ground sensors have been developed for many years by the U. S. military. These are
wireless systems containing multiple sensors for the detection of the movements of personnel and
vehicles in their vicinity. One example is the Advanced Remote Ground Unattended Sensor
(ARGUS) system which uses an air dropped node to communicate sensed information via satellite2 .
Another system was developed by the Internetted unattended ground sensor program3 .
The U. S. Army is developing a system called the Remote Readiness Asset Prognostic/Diagnostic
System4 , to monitor the conditions within missile and munitions canisters. Temperature, humidity,
1
D. J. Nagel, unpublished, 2002.
SJW031: Advanced Remote Ground Unattended Sensor, http://www2.acc.af.mil/afc2tig/news/ newspdf/release000728-JWID.pdf]
3
DARPA's Internetted Unattended Ground Sensors, http://www.sentech-acoustic.com/page3.htm
4
Remote Readiness Asset Prognostic/Diagnostic System, http://www.dtic.mil/ndia/2001armaments/marotta.pdf
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-31
shock, vibration and, possibly, other factors will be monitored by a wireless hand-held interrogator.
The system is designed to have a ten-year, maintenance-free operating lifetime.
The Army is also developing a Warfighter Physiological Status Monitoring System that will report
on the condition of soldiers in the field automatically and wirelessly 1 . It has many features that are
similar to medical monitors, but will be concerned with performance as well as health matters. The
system goals are to maximize operational effectiveness while reducing casualties. Keeping track of
things, as well as people, is another focus of the military. Logistics, the supplying of all the needs
of a fighting force at the right place and time, is challenging and expensive. Systems for
identification and sensing, which report the locations and conditions of military goods and vehicles
automatically to a field or other headquarters command, are under development 2 .
Navies have a strong interest in underwater communications between ships and submarines, and
between submerged instrumentation and facilities on shore. The underwater phones and data links
that are in routine use can also be employed to transmit sensor information. While the bit
transmission rates are low compared to the use of RF in air, a great deal of data can be transmitted
over time. The situation is analogous to the transmission of pictures of distant planets and moons
from space probes. Despite the power-limited bit rates in those cases, remarkable pictures were
returned to earth.
The concept of "network centric" warfare has received much attention in recent years 3 . It springs
from the widespread availability of high-bandwidth wired and wireless connectivity, especially
using satellites. Given such communications, and the long ranges of modern weapons, it is not
necessary to co-locate sensors, weapons and personnel on the battlefield or elsewhere. Wireless
sensor systems and networks, especially but not solely imagers, are quite-naturally among the
enabling technologies for network centric warfare.
A short course entitled "Military Sensor Networks" has been offered by the Technology Training
Corporation4 . Walrod, the lecturer in that course, has provided a great deal of useful material on
wired and wireless sensor networks on the Internet and provided many useful references. 5
1
Warfighter Physiological Status Monitor: http://www.usariem.army.mil/wpsm/
Joint Total Asset Visibility, http://www.dla.mil/infoTechMain.asp
3
R. Suresh and W. E. Roper (Editors), "Battlespace Digitization and Network-Centric Warfare II", SPIE-Int'l. Society
for Optical Engineering, Volume 4741, 2002.
4
J. Walrod, "Military Sensor Networks", Technology Training Corporation, Washington DC December 2001.
2
5 Some of the sources cited these are E. Todd and J. Walrod, "Networks for Sensor Data Acquisition and Recording", THIC Meeting, Bethesda MD, 3 Oct 2000
http://www.thic.org/pdf/Oct00/psi.jwalrod.001003.pdf, ,J. Walrod, "Sensor Network Technology for Joint Undersea Warfare", NDIA Joint Undersea Warfare Technology Conference,
San Diego CA, 21 March 2002, http://www.ndia.org/committees/usw/ walrod_sensornets.pdf, and J. Walrod, "Sensor Networks for Network-Centric Warfare", Network centric
Warfare Conference, Falls Church VA, 30-31 October 2-000, http://www.plansys.com/ Content/NavigationMenu/Products/ Sensor_Network_and_Data_Acquisition_Products_
White_Papers/Sensor_Networks_for_Network_Centric_Warfare_NCW00.pdf
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-32
2.7 Recommendations
1. Much more research needs to be devoted to developing the types of sensors useful for protecting
infrastructure such as roads. There are some well –defined problems, such as vehicle framing, that
urgently need attention.
2. More education needs to be undertaken so that the nation better understands the true nature of the
terrorist threat that faces it.
3. More education about the capabilities of sensor systems needs to be undertaken in the field
science and homeland security arenas.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-33
Chapter 3. Introduction To Field Science
3.1 Introduction
This chapter focuses on the various uses of wireless sensor networks in field science. Numerous
applications are of interest and will be discussed. The field science applications will be included
along with other outdoor applications since they have much in common. For this reason, the
various applications to homeland security discussed in Chapter 2 can suggest useful techniques for
the applications discussed in this chapter. There are several additional reviews of the use of sensors
available. 1
The talks by Bonito and Kratz presented many of the basic issues faced by field scientists. The talks
by Hughes, Nagel and Wilson also addressed some of the issues faced by field scientists. This
chapter summarizes the presentations and presents some recommendations. For videos of the
original talks and copies of the original slides, see http://homeland.cs.umaine.edu/anywhere.htm.
3.2 Remotely Deployed Sensors in Ecological Sciences
1
D. J. Nagel, "Microsensor Clusters", Microelectronics Journal, 33, 107-119, 2002, W. J. Kaiser, "Low Power
Wireless Integrated Sensors", 1994, http://www.janet.ucla.edu/WINS/lwim-innovative.htm, and D. J. Nagel, "Pervasive
Sensing", SPIE Vol. 4126, p. 71-82, 2000.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-34
Figure 3.1. The Old Method for Retrieving Data from Sensors
Tim Kratz outlined how ecological science can benefit from remotely deployed sensors discussing
both what is currently done and what needs to be done. Figure 3.1, taken from his talk, illustrates
the old model of servicing field-deployed sensors. It provides a contrast with the scene shown in
Figure 3.2, and clearly illustrates the obvious benefits of remotely deployed sensors.
Figure 3.2. Current Remotely Deployed Sensor Systems
The National Research Council recently identified several "Grand Challenges" in the environmental
sciences. Among these, at least four can benefit from remotely-deployed sensor systems:
understanding biogeochemical cycles, biodiversity and ecosystem functioning, climate variability
and its consequences for ecosystems, and hydrologic forecasting. 1 Each of these areas is complex
and has multiple drivers acting at multiple scales. These areas are also characterized by thresholds
and non-linearities that can lead to surprises. Untangling cause and effect in these situations
requires that we have long-term observations at multiple locations, and can engage in large-scale
experimentation.
Three types of sensor systems are deployed: a) systems with a small numbers of expensive sensors,
b) systems having many moderately expensive sensors, c) systems having very many inexpensive
sensors. The state of the art for systems of type a) is more advanced than for systems of type c).
These comments are based on experience with the Long Term Ecological Research Network whose
1
National Research Council. 2001. Grand Challenges in the Environmental Sciences, National Academy Press,
Washington, DC.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-35
stations are shown in Figure 3.3, and the 158 Members of the Organization of Biological Field
Stations 1 whose stations are shown in Figure 3.4.
Figure 3.3. The LTER Network
The most common current practice is to have a sensor attached to a data logger, with
communication via modem. One advantage is that this system works and has many protocols
developed for it. Some disadvantages are that it is expensive and does not scale well to large
numbers. In addition, it does not support direct communication among field sampling locations.
Direct communication between sensors would be very handy since it would extend the range of
communication with the sensor and would allow smart sensors to turn on and off depending on the
environmental context as detected by other sensors in the region. Because the individual units are
so expensive, it is impractical to deploy large numbers of them, and consequently it is hard to
capture environmental heterogeneity. An example of such a sensor is shown in Figure 3.5.
1
http://lternet.edu and http://www.obfs.org
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-36
Figure 3.4. The Member Stations of the Organization of Biological Field Stations in North
America.
Figure 3.5 A Relatively Expensive Sensor System
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-37
The automated buoy shown in Figure 3.5 permits the user to download stored data, and to view live
data. Communication can be two way via wireless Ethernet, so one can alter the sampling
protocols. It is easy to publish the data obtained to the WWW. A good example of a system of such
buoys is the Tropical Atmosphere Ocean Project. 1
There are also experiments that really need large numbers of sensors. Under current FCC
regulations, the spread spectrum radios currently used for communication have an effective range
of about three miles in forested landscapes, greatly limiting the spatial extent that can be monitored
effectively. Another very serious problem is the lack of power sources that are inexpensive,
dependable, rugged, and long lasting.
3.3. Instrumenting the Environment: Pervasive Environmental In-situ
Sensors
Gregory Bonito discussed in-situ sensors, which are sensors that are distributed throughout the
environment being studied. Such sensors often provide very high resolution and can provide ground
truth for satellites. Sensors can be classified into physical, chemical and biological.
Sensors are becoming smaller, faster, smarter and cheaper. In addition, their power requirements
are becoming smaller. At present over 100 properties can be sensed and there are thousands of
manufacturers.
Many government agencies, universities and commercial concerns are developing sensors. Some of
the developments are quite astonishing. One such example is the microsensor package that can be
attached to a bee, as shown in Figures 3.6 a) and b). Instrumented bees can help find explosives.
There are many other sensors that can be used on land, including sensors that can measure sap flow
non-intrusively, others that can measure various properties of soils and roots, and even ground
penetrating radar. Instrumented bees are being trained to find explosives.
There are many sensors designed for use in aquatic environments. These range from
multiparameter sondes, which can measure, more than 15 parameters, and have a datalogger2 built
in., through experimental environmental sampling processors that can analyze DNA. Other aquatic
sensor packages include acoustic Doppler current profilers, wireless moored profilers, autonomous
underwater vehicles, and digital whale tags. Common problems for aquatic sensors are fouling and
drift of the sensors.
A very promising field of development is that of MEMS3 (microelectromechanical systems).
MEMS can be used to construct very small weather stations, all types of field instruments including
single chip chemistry labs, electronic noses, electronic tongues, and small gas chromatographs.
1
http://www.pmel.noaa.gov/tao
Most of these are built by Campbell Scientific, http://www.campbellsci.com
3
http://mems.sandia.gov/scripts/index.asp
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-38
Figure 3.6 a) This illustration shows a bee carrying a sophisticated system of electronics on its
back. A scanner mounted on the hive downloads data when tagged bees enter and exit the hive.
Figure 3.6. b). A tagged bee showing a recent micro-telemetry system developed by Pacific
Northwest National Laboratories (PNNL). Figures a) & b) courtesy of PNNL.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-39
Nanotechnology1 promises to make significant contributions to the field of sensors.
Nanotechnology sensors would be very small. We would expect that some would eventually get to
the atomic level, be self-repairing and possibly self-assembling.
At this time, there are many trends that can be observed. These include reducing power loads and
the use of wireless communications. There is still much work to be done on improving power
utilization. It is also clear that costs are being reduced sharply and that miniaturization will
continue. One major problem we will be facing in the near future is the flood of data that we will
get from these sensors. Figure 3.7 shows a hypothetical scene showing how one can achieve
pervasive sensing.
Figure 3.7 A Hypothetical Scene Showing Pervasive Sensing
1
http://www.nano.gov/
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-40
3.4 Communicating in the Field
David Hughes provided many details about providing communication in the wild. Much of his
report was based on the NSF-funded work he has been doing. 1 Dave feels strongly that the current
"sneaker net" that is used to transport data from dataloggers back to the home station is obsolete
and it is time to replace it with wireless.
Hughes began his talk with a tribute to the "co-inventor of spread spectrum", Hedy Lamar 2 . Spread
spectrum was classified for some 45 years. The FCC finally issued rules for using spread spectrum
in 1985. The FCC does not appear to understand the fact that spread spectrum radios can share the
same bandwidth without interference, and its rules, which have not changed since 1985, do not
make good use of the technology. Currently, spread spectrum radios are limited to 1 watt of power,
which gives them a very limited range, especially in forests, in part because of the frequencies they
employ. Also, spread spectrum is confined to three frequency bands: 902-928 MHz, 2.4-2.4835
GHz (802.11b), and 5.725-5.85 GHz. 3 Tim Shepard, in his thesis, 4 showed that it is possible for
billions of spread spectrum radios to operate in a very small area without interference. It is
important for field science and for national security that the FCC restrictions be rescinded. Such a
move is opposed by lobbyists and owners of bandwidth.
Figure 3.8 Co-Inventor of Spread Spectrum--Hedy Lamar
1
http://wireless.oldcolo.com
http://www.sss-mag.com/ss.html and http://wireless.oldcolo.com/course/hedy.htm
3
http://wireless.oldcolo.com/course/regulate.htm.
4
http://wireless.oldcolo.com/course/shepard.pdf
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-41
Dave Hughes has put together many sites that use wireless and sensors, and finds that the limiting
constraint is getting power to the wireless sensor units. Figure 3.9 shows his generic package.
Figure 3.9 A Generic Data Collection Package
Figure 3.10 Some Very Small Radios
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-42
Replacing the power supply in the sensor packages is now the most labor-intensive part of running
them. It is essential that some method for doing this be found. A discussion on power, and some
ideas on using lasers to supply power, are found in the next chapter. Figures 3.6 and 3.10 shows
some of the miniature radios that currently exist. To see a real-time demonstration of the sensors go
to: http://www.uaf.edu/water/projects/cpcrw/metdata/cpcrwmetsitemap.htm. For more information
see http://wireless.oldcolo.com. Figure 3.11 is a map showing one of the sites Hughes
instrumented.
Figure 3.11 The Bonanza Creek Experimental Site
3.5 Other Field Applications: Weather and Agriculture
The following material was supplied by David Nagel. There are several advantages and challenges
particular to the employment of wireless sensor networks outdoors. The major virtue is avoiding
the need for power or data cables. The main problems are provision of power to nodes and having
weatherproof systems for long-term applications. The growth of bacteria and vegetation are
problems in warmer climates. The need to operate over wide temperature ranges is another
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-43
requirement for outdoor systems. The primary outdoor applications of sensor networks are for
determination of weather, environmental parameters and factors relevant to fields of agriculture.
There are many weather parameters of interest. They include, roughly in order of decreasing
importance, temperature, pressure, wind speed and direction, humidity, dew point, rain fall amount,
air clarity, and cloud cover and height. Ordinary wireless weather systems, with individual sensors
and wireless data transmission, are a few meters in size and cost several thousand dollars.
Integrated systems, with short-range wireless links, are less than one meter in size and cost less
than one thousand dollars. 1 They provide information on most of the parameters of interest except
cloud conditions. Concepts for the development of smaller and cheaper weather stations are
available. 2
Weather measurements are needed for current conditions and for forecasting. The latter commonly
involves the use of computer models. Weather simulations are rarely done with grid points less
than one kilometer apart because of the limitations of computer performance and run times. Hence,
having meteorological measurements on grids denser than one node per square kilometer is
unnecessary now. As computers continue to increase in capability and grid spacing shrinks, it will
be desirable to have measurements on finer spatial scales. This will force the development of lowcost systems that can provide the desired measurements.
A fundamental difficulty with weather measurements and simulations is the effect of the earth's
surface. Topology and vegetation serve to strongly modify the micro-weather. Placing weather
stations on the surface, which is easy, provides only limited information on the full threedimensional weather situation. The employment of radiosondes on balloons does provide vertical
information, well away from surface effects. However, the cost of deploying balloons prohibits
their routine use. Small weather stations are likely to be mounted on existing high buildings and
towers in the future. 3
The measurement of environmental parameters goes far beyond the parameters associated with the
weather. They include the levels of water in rivers, lakes and the seas. The chemical makeup of
the atmosphere, water and soil are of interest regarding both natural and polluted conditions. The
presence and motions of pollutants in the environment, especially toxic chemicals due to spills or
willful actions, are of interest for many reasons, including legal proceedings. The number and
movements of animals are germane to biologists and wildlife managers. 4 Many different chemical
analyzers, microphones and imagers are being applied for environmental and animal
measurements. As one example, city busses in Braunschweig, Germany, are equipped with sensors
for atmosphere pollution and GPS receivers. 5 They report measured levels to a central facility via a
1
WS-2000 Wireless Weather Station, http://www.rainwise.com/ws2000/ index.html and Wireless Weather Wizard III
with Solar Power, http://www.davisnet.com/weather /products/weather_product.asp?pnum=7425WS
2
D. J. Nagel, "Microsensor Clusters", Microelectronics Journal, 33, 107-119, 2002, and M. E. Hoenk, R. Wilson and
G. Cardell, Integrated Environment Monitoring Instrument", NASA Tech Briefs, p. 34-6, November 2001.
3
Meteorological Instruments Applications Examples, http://www.youngusa.com/rmyapps1.htm.
4
A. Cerpa, D. Estrin, L. Girod, M. Hamilton and J. Zhao, "Habitat Monitoring: Application Driver for Wireless
Communications Technology", Proceedings of the First ACM SIGCOMM Workshop on Data Communications, 3-5
April 2001 and UCLA Computer Science Technical Report 200023.
5
D. Bahr, F. Schottler and C. Schlums, "Save Your Breath: GPS Drives Mobile Air Quality Monitoring", GPS World,
p.18-25, May 2002
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-44
Figure 3.12. The dots show the global distribution of
the 3000 buoys in the ARGO oceanographic sensor
system.
Figure 3.13. Photograph of a
sensor node (about three
centimeters in diameter) now
used for weather and soil
monitoring.
cellular modem. The Long Term Ecological Research stations are making increasing use of
wireless sensor systems. 1
Remote sensing of the environment is commonly done from a distance using imagers. However,
the employment of sensors in the environment that transmit their information to distant sites by
wireless means is another form of remote sensing. There are several applications of wireless
sensors in geodesy, the study of motions of the earth's surface. Oceanography, for which currents,
temperature profiles and salinities are of prime interest, is also being impacted by wireless sensor
networks. Surface studies can be done from observational satellites, and depth studies can be
accomplished by placing sensors in the seas that are read out using communication satellites. The
ARGO system is now being deployed in the earth's oceans. 2 It will consist of 3000 free-drifting
buoys that will sink to 2000 meters and then rise to transmit temperature and salinity information.
The cycle will take 10 days, with the buoys having a four to five year lifetime. The cost per buoy is
$12,000. Figure 3.12 shows the expected distribution of ARGO buoys. The collected information
will be used for climate prediction.
Weather and environmental conditions are of great interest to farmers, both for terrestrial
agriculture and for marine aquaculture. Some fields of agriculture are more sensitive to the weather
than others. A photograph of a node that measures light, temperature and humidity, and can be
equipped to do soil moisture measurements, is shown in Figure 3.13. 3 The system is being applied
to determine conditions in a botanical garden and on a farm. It was developed for planetary
monitoring by the Jet Propulsion Laboratory. The system takes measurements every second and
transmits over 40 meters. The sensor nodes are also relays, and triple hopping has been
demonstrated. Some areas of agriculture, notably forestry, have long time scales and are less
sensitive to transient conditions, but still require monitoring.
1
http://lternet.edu. A useful recent compilation of ecological sensors is available: G. Bonito, "An Ecological in situ
Sensor Resource", http://lternet.edu/technology/sensors/index.html.
2
ARGO is part of the Integrated Global Observation Strategy: http://www-argo.ucsd.edu.
3
JPL Sensor Webs Project, http://SensorWebs.jpl.nasa.gov
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-45
3.6 Recommendations
It is clear that we need cheaper, smarter sensors that can be deployed widely. It is essential that
better communication among sensors be developed. This will help distribute processing of the flood
of information that we will get. It will also extend the range at which we can collect information
wirelessly since the information can now be relayed.
It is also very important that the FCC encourage the development of spread spectrum
communications. This technology permits the sharing of spectrum and also provides more security
than conventional radio.
Finally, it is essential that reliable and cost effective methods for powering these sensor packages
be found as quickly as possible.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-46
Chapter 4. Sensors, Wireless, and Power Sources
4.1 Introduction
This chapter provides an introduction to sensor technology. We begin the chapter with an
overview of sensors and communication technologies by David Nagel. Following that is
a section provided by Bob Nowak on power sources for sensors. We also have a section
provided by Alexander Akhmanov on using lasers to communicate with remote sensors,
and a section provided by Larry Smarr on the future of sensor systems. We conclude with
a section of recommendations.
4.2 Overview of Sensor Technology
We discussed some sensor systems possessed by humans in Chapter 1, so we will not
repeat that discussion here. The emergence of designed sensors to complement our
natural senses has given us important new tools. We can now respond to many more
quantities and to harsh conditions that would be unhealthy or lethal for humans. The
availability of wired connections, most notably the Internet, and wireless
communications, including technologies like BlueTooth, 802.11b WiFi, cellular networks
and satellite systems, give our "new" senses much greater reach and bandwidth than our
natural senses. A flood of information from sensors around the world can come to us. It
must then be coupled into our brains primarily through our vision and hearing. The
limitations of our ability to assimilate information, and the fact that we must pay attention
to our surroundings even while focused on receipt of information from sensors, have two
important implications. First, information from sensors has to be "down-sized" as much
as possible as soon as possible during its flow from sensors to humans. Consider our
vision system as a megapixel imager that receives color and brightness information from
each pixel at rates exceeding 30 Hz. It must shunt unimportant information, or else we
could not assimilate the stream of input data. So, our vision system has capabilities, such
as motion and edge detection, which permit us to focus on a small but important subset of
the inputs to our eyes. In a similar fashion, it must be possible to shed relatively useless
information in cases of high-bandwidth wired or wireless sensor networks. Second,
because information can be received from many sensors, there is the challenge of
melding that information into forms that can be consumed by humans without undo
effort. This challenge is more than "data fusion". It is really about "information fusion"
in ways that match the physiological, psychological and varied conditions and
capabilities of a wide spectrum of people. If sensor information goes to computers for
storage or use in control systems, it can be assimilated at rates exceeding what people can
handle. However, requirements for discarding useless information and for presenting it
in a proper fashion are also germane in those cases.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-47
Since the employment of sensor systems is
about the acquisition of information, it is
PROCESSING
useful to consider the larger context
indicated in Figure 4.1. Each of the five
GENERATION
COMMUNICATION
UTILIZATION
functions of information technology shown
By People, Computers
By People, Computers
& Sensor Systems
& Diverse Systems
has many facets, and they evolve over time.
STORAGE
New aspects get added to each major
Figure 4.1. The major functions within
function as time passes. The employment
information technology and their
of sensors in large numbers as a means of
relationships. Sensors are rapidly growing in
generating information is a comparatively
importance as sources of information.
recent phenomenon. Ten years ago,
relatively little information came from
sensors. Ten years from now, a very significant fraction of information will originate
from sensors, especially because of the growing commercial importance of sensor
systems.
The current "Information Revolution" results from four micro-technologies: electronics,
magnetics, optics and mechanics. The connectivity between the major aspects of
information and micro-technologies is given in Table 4.1. Most of the entries are
evident. Optical computers remain under development and promise high speeds. Radiofrequency MEMS (MicroElectroMechanical Systems) are being developed for both
signal processing and communications. MEMS data storage devices, which might offer
terabit per square centimeter storage densities, are now in development. There are some
related and important aspects of information technology not shown in Figure 4.1,
including the reliability and security of computer and communications systems. However,
Figure 4.1 and Table 4.1 show the role of micro-sensors based on different technologies,
and the complex inter-relationships of information and micro-scale technologies.
µµ-Magnetics
µ-Optics
µ-Mechanics
Electronics
Generation
Computers µ-Sensors
µ-Sensors
µ-Sensors
Processing
Computers
In Development
RF MEMS
Communication Wireless
Optical Fibers & RF MEMS
Comms
MEMS
Storage
Flash
Hard Drives
Compact Discs
In
Memories
Development
Utilization
Control
Data Mining
Displays
µ-Actuators
Systems
Table 4.1. Major Processes in IT and µ-Technologies for Sensor Systems.
IT\µ-Tech:
Given the great and growing importance of the Internet, it is natural to question the
relative importance of wired and wireless sensor networks. The case for wireless sensor
networks has two primary facets. The first is the growing availability of wireless
connectivity. We are in the early stages of what has been termed the "Wireless
Revolution". BlueTooth, 802.11b WiFi, cellular networks and satellite systems have
already been noted above. The growing use of cellular systems is especially striking.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-48
WIRELESS SUBSCRIBERS
& WIRELESS INTERNET SUBSCRIBERS
L
I
M
Figure 4.2 shows the increases in
1000
1 out of every 6 people on earth!
wireless connectivity for both voice
800
and data communications. 1 Sensors,
600
and also hand-held computers, have
400
already been integrated with cell
200
phones. It is only a matter of the
1998
1999
2000
2001
2002
2003
market before sensors, computers and
wireless communications are all Figure 4.2. The growth of wireless usage
integrated into units about the size of worldwide.
cell phones. The other driver for
wireless sensor systems and networks is the savings in costs for fixed systems, and the
need for mobility in some cases. Wires are expensive to install and protect or maintain.
Fixed wireless systems can be modified relatively easily. Issues of interference and
reliability of wireless systems, in general, and wireless sensor systems, in particular, are
germane. Usually, they depend on the specific case of interest. A recent poll by Sensors
Magazine asked at what stage respondents were in regarding implementing wireless
networking. 2 The results were: 25.6% have no plans to implement a wireless system,
17.9% were considering wireless connectivity, 20.5% had a plan for 1 to 2 years, 12.8%
had a 7-12 month plan, 7.6% would make the move in a few months and 15.3% already
have a wireless network. It is likely that the experiences of people who implement
wireless sensor networks, especially in factories and other facilities, will influence others
to do similarly, as the systems are shown to be reliable, as well as cost-effective. The
number of companies that sell and service wireless sensor systems and networks can be
expected to grow significantly in the coming years.
L
This review is motivated partly by the likelihood that experience with the use of wireless
sensor systems and networks in one industry will be useful in other industries. In
general, each major industry has its own trade shows and publications, so there is little
routine communication between large industries. Despite the great differences in the
hardware deployed and the disparate use of the gleaned information, there is a common
base of components and concerns for wireless sensor systems and networks. Such
characteristics are reviewed briefly in the next section in order to introduce the
technologies that enable and limit wireless communication of information from sensors.
I
It is necessary to make clear what is meant by a wireless sensor system and by a wireless
sensor network. Figure 4.3 illustrates the similarities and differences. Sensor systems
and networks of interest here both include sensor nodes that originate the information of
interest and users, humans or systems, which receive the information, with the wireless
transmission link in between. A system has only a single link, while a network has
multiple links, either through other sensor nodes or specific communication nodes,
depending on the architecture of the network. It is noteworthy that wireless sensor
systems will be used in conjunction with wired networks. Often the wireless system will
serve to get the sensor information to the Internet or other wired network. Sometimes,
wireless communication systems will be used to deliver the information to the users, who
1
The Industry Standard Magazine, p. 72, January 10-17 2000.
Sensors Magazine, p. 60, July 2002.
O
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-49
might be mobile.
In this section, we address the technologies
SENSOR
that are required for wireless sensor systems
SYSTEM
and networks. The ability to design, produce
SENSOR
and employ systems and networks depends
NETWORK
USER
on the recent and growing availability of
COMMUNICATION
several component technologies.
The
NODE
SENSOR NODE
technologies necessary for sensor nodes are
(CLUSTER)
indicated in Figure 4.4. In most cases,
Figure 4.3. Schematic of a wireless
multiple sensors will be needed to perform sensor system, and some simple
some desired function, such as the
wireless sensor networks with relayed
measurement of atmospheric conditions.
communications. In both a system and
Several sensors can beneficially share a
a network, one-way and two-way
common set of other components and power.
communications can be employed.
These include interface electronics to provide
The sensors are indicated by small
needed excitation to the sensors, and to
black rectangles.
amplify or impedance match their output
signals. The computer is commonly a micro-controller with integral analog-to-digital
converters, plus on-board program and data memories. Power can be stored in the microsensor cluster, supplied from the outside or scavenged from energy in the surrounding
region. The communication options include wired and wireless use of different
frequency carriers. The printed circuit board (PCB) offers both wiring and support for
the components of the sensor cluster. The housing provides protection, a means for
mounting and access to the ambient, when that is needed.
Microphone
POWER
SENSORS
COMMANDS
STORED
Chemical
Nuclear
INTERFACE(S)
COMPUTER
PCB & HOUSING
DATA/INFO
SUPPLIED
Electrical
RF
Acoustic
SCAVENGED
Optical
Kinetic
SEVEN
NECESSARY
COMPONENTS
CONDUITS
Electrical
Fiber Optics
Sounder
Magnetometer
1.25 in
PHYSICAL WORLD
FREE SPACE
RF
Optical
Acoustic
Figure 4.4. Schematic of a microsensor cluster showing the seven
types of components, plus the
various means of powering and
communicating.
Temperature
Sensor
Light
Sensor
Accelerometer
Figure 4.5. Photograph of the MICA microsensor cluster showing the location of the five
sensors and a sound maker (labeled sounder).
The combination of sensors, electronics, microcomputer, communications, energy source,
PCB and housing just discussed has come to be called a "micro-sensor cluster". It
frequently combines, that is, clusters, multiple sensors in order to perform functions. The
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-50
temperature, pressure, humidity and other sensors used in a weather station provide an
example. It also clusters the suite of sensors with a common base of ancillary hardware.
Mason and Wise prototyped one of the earlier clusters, which was wrist worn and
contained sensors for temperature, pressure, humidity and acceleration. 1 More recently,
Pister and his students have sought to develop micro-sensor clusters with volumes on the
order of one cubic millimeter, which they termed "Smart Dust". 2 Printed circuit boards
prototypes of such systems were developed as part of that project. 3 A new sensor cluster
from Berkeley is shown in Figure 4.5. 4 Characteristics and examples of micro-sensor
clusters have been reviewed recently. 5
A. Cluster Sensors and Electronics
Micro-sensors are attractive, both because of their performance and because of their
small size, weight and power requirements. Small sensors have been in use for decades,
with the microphone being a prime example. It was in the 1980s when micro-machined
pressure sensors appeared on the market in large numbers and in the 1990s when the
same growth happened for micro-accelerometers. The variety and number of commercial
micro-sensors that measure conditions at a location are increasing steadily now. Kaiser
recognized that the availability of micro-sensors at low cost, due to their batch
fabrication, would enable the widespread use of sensing. 6 It is true that, even if sensors
were free, the other technologies in wireless sensor networks set a floor on costs, but
commodity MEMS sensors are serving to stimulate diverse applications.
The packaging of MEMS and other micro-sensors is generally far more demanding that
the packaging of ICs. The cost of packaging commonly represents 50 to 90% of the cost
of a MEMS device. Many MEMS are in sealed packages. Indeed, there are some cases
in which ordinary microelectronic packages can be employed for MEMS. The primary
instance is the packaging of inertial sensors, including both micro-accelerometers and
angular rate sensors. However, even MEMS in sealed packages often cannot use what is
available from the IC industry. In fact, many MEMS have sealed packages that are
significantly more complicated than standard electronic packages. Optical MEMS, which
must have windows, are the primary example. Uncooled infrared sensor arrays,
consisting of pixels thermally isolated from the substrate, require vacuum packaging that
is effective for approximately a decade. Vacuum packaging is also needed for RF
MEMS that contain micro- or nano-resonators.
1
A. Mason et al, "A Low-Power Wireless Microinstrumentation System for Environmental Monitoring",
Digest Int. Conf. on Solid-State Sensors and Actuators, Stockholm, pp. 107-110, June 1995
2
B. Warneke, M. Last, B. Liebowitz and K. S. J. Pister, "Smart Dust: Communicating with a Cubic
Millimeter Computer", Computer, 44-51, January 2001.
3
S. Hollar, "COTS Dust", M. S. Thesis, Department of Mechanical Engineering, University of California at
Berkeley, 2000 (available at http://www-bsac.EECS.Berkeley.EDU/~shollar/).
4
A. Woo, "The MICA Sensing Platform", 2002, http://www.cs.berkeley.edu/~awoo/micasb.
5
D. J. Nagel, "Microsensor Clusters", Microelectronics Journal, 33, 107-119, 2002
6
W. J. Kaiser, "Low Power Wireless Integrated Sensors", 1994, http://www.janet.ucla.edu/WINS/
lwim-innovative.htm.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-51
There are many MEMS that cannot be used in sealed packages. Pressure sensors are a
commercially important example. They are usually sealed from the ambient atmosphere
by an elastomer, which transmits pressure variations but excludes humidity and dirt.
Microphones must also be able to receive unimpeded acoustic pressure waves. MEMS
strain sensors sometimes have packages, which are penetrated by an element that is
attached to the piece being measured. Some MEMS must actually be in contact with the
atmosphere in order to function. Chemical vapor sensors are the best example. Sensors
for the analysis of water, blood and other liquids must also permit access of the exterior
environment to MEMS devices inside of packages with openings.
Maintenance of the sensitivity and calibration of gas and liquid analyzers over long
periods is challenging. This is particularly true for outdoor applications where the
temperature and humidity vary widely. Filters can be used to protect the sensitive
surfaces in analyzers that give them their functionality, but doing so requires employment
of an air mover. Even simple fans consume significant energy and draw down a battery
more rapidly. One alternative to trying to protect a functional surface, so it can be used
for extended periods, is to initially install several sensors, all but one of which are sealed.
Then, fresh sensors can be employed at preset or other times during the lifetime of the
system in the field. This tactic requires conduits, valves and a control system. Another
approach is to replace the sensor surface by moving into place a new substrate that was
stored in the overall system. This demands a mechanism that can grip and move the
substrate. Another alternative is to reconstitute the sensitive surface in place. This
requires removal of the initial thin sensor film and its reconstruction. Accomplishing
such relatively complex and demanding processes requires fairly sophisticated fluidics,
with associated reservoirs, tubing, valves, pumps and power.
Imagers are particularly useful sensors because of the dominant importance of human
vision. They can be thought of as "volume" sensors in contrast to most sensors that
provide information from a "point", that is, a specific location. In recent decades,
electronic imaging systems have improved significantly. They have also increased
dramatically both in the variety of applications and the numbers of devices in use. Their
diverse employment in security and machine vision applications are good examples. It is
noted that much of the police surveillance on the streets in Monaco is done with video
cameras, so that one person can watch many locations. There are over 1.5 million closed
circuit television systems in England, with 1400 cameras in the London Subway system. 1
Charge-coupled devices (CCDs) have diversified in opposite ways in the past decade.
Mega-pixel CCD chips have been produced in large numbers for instrumentation and,
especially, digital photography. Meanwhile, low-end CCDs have proliferated in cameras
for computers and other systems. It is now possible to buy a color and sound video
system with a CCD imager and related electronics, a transmitter, two antennas and a
1
D. Strieff, "In Britain, Smile for the Camera", MSNBC, 4 Dec 2001,
http://www.msnbc.com/news/620569.asp.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-52
receiver for the 2.4 GHz wireless link (good to 30 meters), plus an interface box to a TV
or VCR, all for $80. 1 The imager and its electronics can be bought for half that price.
In the past few years, visible imagers based on CMOS technology have burst onto the
market. 2 They offer performance comparable to CCDs, but require significantly lower
power. One application of CMOS imagers has gotten much attention, namely their use in
a wireless imaging system for examination of the gastrointestinal tract in humans. 3
Figure 4.6 shows the pill in relation to a U.S. quarter dollar, and a cross sectional drawing
of the pill. It is noteworthy that the batteries occupy about half of the volume of the
system.
Figure 4.6. Photograph and schematic
of the endoscopic pill from Given
Imaging in Israel. Left insert: CMOS
imager is shown near a U. S. dime.
Figure 4.7. Photograph of an uncooled
infrared camera from Raytheon with a
micro-machined array of 120 by 160
pixels, and a picture taken with the
system.
Infrared imagers that detect radiation from warm objects also have changed significantly
in the recent past. Cryogenic imager arrays based on narrow bandgap semiconductors,
notably mercury cadmium telluride (HCT), have been developed for decades, primarily
for military uses. In the past decade, micromachining technology has yielded uncooled IR
imagers. While they do not have the sensitivity of HCT systems, they are substantially
simpler and about one-tenth the cost of cooled systems. Such imagers have come on the
market in the past year, with an example shown in Figure 4.7. 4 One possible application
of uncooled infrared imagers is in luxury cars for the detection of the body heat of
humans and animals beyond the range of the headlights. 5 Such cameras currently cost
about $5K, but should decline in price greatly as they come into widespread use. They
will find applications in home security, and for the monitoring of machinery and other
systems to detect hot spots that are indications of current or imminent problems.
The increasing performance and availability of microelectronics during the 1980s and
1990s was also fundamental to the development of wireless sensor networks.
Components ranging from operational amplifiers to interface chips are widely used with
sensors. Microprocessors (µP) and microcontrollers (µC) are the most important among
1
http://www.X10.com
http://www.photobit.com
3
http://www.givenimaging.com
4
Courtesy of T. Schimert, Raytheon Corporation, Dallas TX
5
http://www.cadillac.com/tech/index.htm
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-53
the integrated circuits that enable sensor networks. Embedded computers are used so
widely in diverse products that they are now made by 44 companies. 1 Many of those
companies offer families of computers with a broad range of capabilities, sizes and costs.
The small computers often have analog-to-digital converters (ADC) and on-chip
memory. The availability of such single-chip computers enables their co-location with
sensors in what are called "smart sensors". It is now possible to turn data, such as
voltages, into information on the parameters of interest, such as pressure or acceleration,
at the sensor by the use of a calibration curve stored in the microcomputer memory.
Compensation for extraneous factors (often temperature variations) and signal
manipulation (including averaging, integrating, differentiating and many other
mathematical functions) can be performed by the digital computer located with the
sensor. In the past, some of these functions were done electronically, essentially by the
use of analog computation. The microcomputer can also serve as the controller for
communication of the information to relay points or users. The micro-controller
functions just described are sometimes accomplished using digital signal processors or
field programmable gate arrays.
Function/Hardware Sensors Electronics
ADC
Memory
µP/µC
Transduction
Sensor Excitation
Impedance Matching
Amplification
Filtering
Signal Manipulation
Digitizing
Data/Info Storage
Apply Calibration
Apply Compensation
Control Comms
Table 4.2. Hardware in Smart Sensors that can Perform Certain Functions
The sensors and various electronics hardware just noted perform a variety of functions, as
indicated in Table 4.2. Several functions can be accomplished by some of the classes of
hardware. Microelectronics, including various integrated circuits, the ADC, memory and
the microcomputer, are involved in almost all of the functions. Some of the functions can
either be performed with analog electronics or by the digital microcomputer and
associated memory. This diversity of options offers both design flexibility and
engineering challenges.
B. Cluster Communications and Power
1
R. Cravotta, "EDN's 28th Annual Microprocessor/Microcontroller Directory", EDN, p. 33-53, 27
September 2001.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-54
Additional functions and hardware, beyond those in Table 4.2, are needed for wireless
sensor systems and networks. They include the communication of information within the
network and, eventually, to the user(s). Radio frequency (RF), optical and acoustic links
in conduits and free space are possible, as indicated in Figure 4.4. Each has advantages
and limitations. RF links are convenient and have an immense technology base. They
can be used at rates exceeding 10 MHz. However, they generally broadcast energy into a
large solid angle. This avoids the need to aim antennas, but it uses the often-limited
energy in a sensor node at a relatively high rate. RF systems are proving to be the most
viable means for communicating information through the air from sensor nodes within a
wireless network. They include at least an oscillator to generate the carrier frequency and
means to modulate that carrier with the information to be transmitted. The latter is
generally a bit stream from the microcomputer. The use of spread spectrum techniques is
proving to be both straightforward and reliable in a wide variety of settings.
Optical systems can use substantially less energy and can transmit at rates exceeding 1
GHz. They require aiming and have weather limitations for outdoor applications. Still,
there is growing use of outdoor free-space optical links for communications of
information of any type between large buildings in cities and for connection to individual
homes. The use of modulated micro-machined corner cubes at the sensor location to
transmit information optically relieves the aiming requirement and puts the burden of
supplying energy on the interrogator. 1 Optical communication links are discussed in
Section 4.4.
Acoustic links in air, using ultrasonic carriers, can handle data rates approaching 100
kHz. However, their ranges are so short that they are generally not applicable to wireless
sensor networks. Underwater acoustic communications are heavily employed for voice
and data transmission. They are used increasingly for communication of information
from sensors. There are research, engineering and military motivations for acoustic
communication of sensor data underwater. Aside from the need for watertight and
pressure-resistant containers for both sensors and communication gear, there are
limitations and challenges associated with underwater acoustic communications. One of
them is the fact that acoustic frequencies limit the bit rates that can be transmitted.
Carrier frequencies from a few kilohertz to a few tens of kilohertz are commonly
employed underwater. Transmission rates are less than 10 Kbits per second. 2 Another
problem is the possibility of multi-path propagation of signals, which means that the
same pulse can arrive at the receiver at different times. This complicates underwater
modems. Because of scattering and background noises, the ranges of underwater
communication systems are generally limited to about 10 kilometers. Several companies
sell underwater communication links. Most of them are designed for voice
communications, and can potentially be adapted for transmission of data from sensors.
The link, whatever the carrier, between a sensor node and a user of the information from
the node is a fundamental unit of a sensor system or network. The link must have certain
1
L. Zhou, " MEMS Corner Cube Retroreflector for Smart Dust", 2000,
http://buffy.eecs.berkeley.edu/IRO/Summary/00abstracts/ lzhou.1.html
2
For examples see http://www.oceantechnologysystems.com/military.html
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-55
properties and can have others. Employment of a communication protocol is
fundamentally necessary to both successful formation of links and effective routing.
Many protocols for transmission on wired and wireless systems have been developed and
commercialized. 1 Comparisons of the features of various protocols for wireless
transmission of sensor information have been published recently. 2 Some of the protocols
available for wireless transmission of voice or data are shown in Figure 4.8, along with
their ranges and data rates. 3 Data compression methods can be used to reduce bandwidth
requirements and power consumption. In general, links that transmit images require the
greatest bandwidth, even with compression schemes such as JPEG. Frequent
measurements by point sensors, such as microphones used for acoustic detection, can also
require significant bandwidth, if there is not significant data reduction at the sensor node.
Some clusters of point sensors require relatively low bandwidth, with weather
measurements being an example.
Other aspects of the links for sensor systems and networks are important. The links in a
sensor network can have security features, such as encryption to avoid unauthorized use
of the transmitted information and authentication of a potential receiver of sensed
information. The latter requires a two-way link, with both a transmitter and receiver at
the node and at the user's location. The ability to send commands to nodes to change
their behavior, and relaying signals from one node to another, also require two-way
communication capabilities. Sensors and other nodes, which receive communications,
sometimes must have the ability to determine received signal strength in order to gauge
inter-node distances, change gain settings or trigger reconfiguration of the network. If
sensor information is delivered to mobile users, even though it might have traveled
entirely over wires until it nears the user, we strictly have a wireless sensor network.
This situation is essentially indistinguishable from the delivery of any data, such as
information from some server on the Internet, to a mobile user. It is of lesser interest
here. The general point is that wireless connectivity solves the problem of getting the
information either to the first wired node, or over the entire route, or from the last fixed
node to a mobile user of sensor information.
The provision of energy to operate the sensors, all electronics and the communications is
essentially a limiting, as well as an enabling part of wireless sensor networks. There are
many choices to be made, as indicated in Figure 4.4. The first is whether all the available
energy will be stored at the sensor locations, or whether some of it can be "harvested"
from the neighborhood of the sensors. 4 The use of solar cells for outdoor systems is the
most common example of scavenging ambient energy. Usually, it is necessary to provide
energy. This can be accomplished using nuclear sources, but doing so is rare because of
1
W. Feibel, "Encyclopedia of Networking" (Third Edition), Sybex, Alameda CA, 2000 and E. Todd and J.
Walrod, "Networks for Sensor Data Acquisition and Recording", THIC Meeting, Bethesda MD, 3 Oct 2000
http://www.thic.org/pdf/ Oct00/psi.jwalrod.001003.pdf
2
M. Wojcik, 'Wireless DAQ: Choosing the System That's Right for You", Control Solutions, p32-26,
February 2001, B. Nickerson, "Wireless LAN Technology for Engine Control and PHM", Proceedings of
the IEEE Aerospace Conference, Big Sky MT, 2002, and P. Sink, "A Comprehensive Guide to Industrial
Networks", Proceedings of Sensors EXPO, Philadelphia PA, p. 673-708, October 2001.
3
D. J. Nagel, "Microsensor Clusters", Microelectronics Journal, 33, 107-119, 2002
4
R. L. Nowak, "Energy Harvesting", http://www.darpa.mil/dso/thrust/md/energy/index.html
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-56
CDPD
CDPD
GPRS
GPRS
19.2 kbps
128 kbps
kbps
(8/900
(8/900 MHz)
MHz) (8/9
(8/9 MHz)
MHz)
1km
Range (m)
Ricochet
PHS
PHS
128 kbps
kbps
128 kbps
kbps
(900
(900 MHz)
MHz) (1.8/1.9 GHz
GHz))
802.11
802.11
&
& HRF
HRF
22 Mbps
(2.4
(2.4 GHz)
100
RFID
RFID
(13.56MHz)
10
DECT
DECT
6 4 kbps
(1.8/1.9 GHz)
GHz)
BLUETOOTH
1 Mbps
Mbps
(2.4 GHz)
GHz)
IrDA
110 kbps
kbps
IrDA
4 Mbps
Mbps
802.11b
802.11b
1 1 Mbps
Mbps
(2.4 GHz
GHz))
HiperLAN (802.11a)
5544 Mbps
(5
(5 GHz
GHz))
RadioLAN
RadioLAN
1100 Mbps
(5.8 GHz
Narrowband
Narrowband))
Cellular Digital Packet Data (CDPD)
Digital Enhanced Cordless
Telecommunications (DECT)
Global Packet Radio System (GPRS)
HomeRF (HRF)
Personal Handyphone System (PHS, Japan)
1
1K
10K
100K
1M
10M
100M
1G
Data Transfer Rate (Max Burst) bps
Figure 4.8. The physical layer data rates and ranges of wireless
networking standards. The BlueTooth and 802.11b technologies are
highlighted with boxes.
the problems attending the use of radioactive materials. Chemical sources are, and will
continue to be the primary means of powering wireless sensor networks outdoors and in
many indoor applications. In the past, batteries have been the primary choice, but small
fuel cells with about an order of magnitude more energy on volume or weight bases
compared to batteries are in prospect. Energy sources for wireless sensor networks are in
an awkward stage now. The needs for higher performance and longer lifetimes are
outstripping the slow growth in battery performance, and fuel cells are not yet available
in a variety of configurations at low costs. Commercial fuel cells for cell phones
(offering few-watt power levels for about half a day) and for notebook computers (with
about 20 watts for several hours) are in prospect by the end of this decade. The
monitoring of available energy in sensor nodes is necessary in order to control the node
and the network. Hardware (microelectronic) monitors can be used, or the on-board
computer can be programmed to estimate the energy still available. Low-power wireless
sensor systems are under development. 1
Function/Hardware
RF
System
Antenna
Energy
Source
PCB
Housing
Communications
Energy Provision
Energy Management
Electrical
Connections
Protection
1
C. G. Sondini, "The Ultra Low Power Wireless Sensor Project", http://www-mtl.mit.edu/
~jimg/project_top.html, and J. M. Rabaey, "Ultra-Low Energy Wireless Sensor and Monitor Networks",
CBS-ETAPS Workshop, Berlin, April 2000, http://bwrc.eecs.berkeley.edu/People/Faculty/jan.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-57
Table 4.3. Additional Functions in Small Sensors
Other hardware requirements for sensor nodes in wireless networks include a printed
circuit board (PCB) to provide the electrical connectivity and a housing to protect the
node. It is noted that the antenna for the node can be printed on the PCB, and the PCB
can serve as part of the housing in some cases. Table 4.3 relates the remainder of the
hardware and functions for a sensor node. These are more uniquely correlated than is the
case for Table 4.2.
C. Network Architectures
From a network viewpoint, a micro-sensor cluster is a node in the network. Recent
advances in the technologies associated with networks have also been fundamental to
enabling wireless sensor networks. There are many choices in both the character of the
individual wireless links and the overall architecture of the network. Much work on the
design of networks falls under the aegis of computer science and technology because
computers of many sizes are commonly found in networks, and because the sophisticated
programming that is necessary for effective protocols and network functions.
The architecture of a sensor network dictates the type(s) of links that are necessary.
Designing the architecture of a network involves choices of the types and mix of nodes
for both sensing and communications, as well as their placement and possible mobility.
As indicated in Figure 4.3, there can be only sensor nodes or else a combination of sensor
and communication nodes.
Of course, other more complex and hierarchical
arrangements are possible. The sensor nodes can only transmit their information, or they
can include receivers for relaying of information or for receipt of commands. The
communication nodes may have the ability to cache and manipulate information received
from sensor nodes in their locale in order to alleviate redundant or unnecessary
communications to the user. That is, they can essentially perform as local, intermediate
dynamic servers in the network. The synchronization of clocks within wireless networks
is one of several significant requirements. The scalability of the network architecture is
often an issue. The trade-off between the overall performance, especially latency and
delay times, and the size of the network is one of the related issues. Another is the use of
reserve nodes in order to extend the overall lifetime of the network. However, that tactic
generally increases the length of communication paths, which requires more power for
communications. In general, the balance between power usage and the areal density of
nodes is a fundamental network performance and cost issue, and one of the critical design
issues.
Two of the more complex questions about the architecture of a wireless sensor network
involve its initial and subsequent organizations. In some circumstances, it is possible to
place the sensor nodes in known locations and to pre-program the organization of the
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-58
network. However, in many other applications, the sensor nodes are deployed in a
pattern that is not deterministic, and it is necessary for the network to form (self organize)
in a so-called ad hoc fashion. The nodes can be designed to determine their absolute, and
hence relative locations by incorporating Global Positioning System technology within
them. However, this increases complexity and costs of the nodes, and requires power for
the position determination. Sometimes, signal strengths can be used to infer inter-node
distances, and arrival angles can give an indication on the angles of nodes relative to each
other. In the case of fixed nodes, the position has only to be determined at the outset of
network usage. Changes in the topology of a deployed network during its lifetime can
occur due to node failures, especially due to loss of power late in the system lifetime, or
due to motion of the sensor nodes. The targets being sensed can also be mobile, so there
are four possibilities, as indicated in Table 4.4.
Fixed Sensor
Nodes
Mobile Sensor
Nodes
Fixed Targets
Time
Dependence
of
Conditions, such at the
Weather, at a Location
Finding Dangerous Objects,
such as Land Mines
Mobile Targets
People or Animals, and Objects or
Materials that are Wind or Water
Borne
People or Animals, and Objects or
Materials that are Wind or Water
Borne
Table 4.4. Examples of Sensor Use
Conservation of the energy available at the nodes is critical to the performance and
lifetime of a wireless sensor network. There are four major approaches to minimizing
energy utilization and extending the network lifetime. The first is to design nodes by
optimum choice of low-power components and circuits. 1 The second is to have the nodes
either off or in standby modes as much of the time as possible. 2 The use of network
architectures that are relatively energy efficient is the third strategy. 3 Finally, minimizing
the duration and, if possible, the range of communications consistent with the network
parameters and required performance has a large impact on saving energy. 4 Algorithms
for energy utilization by the overall network can be used to optimize various
characteristics ranging from delaying the death of the first node to maximizing the length
of time for some level of performance by the total network. There are many papers on
sensor network energy conversation because it is a central and challenging problem.
1
C. G. Sondini, "The Ultra Low Power Wireless Sensor Project", http://wwwmtl.mit.edu/~jimg/project_top.html and J. M. Rabaey, "Ultra-Low Energy Wireless Sensor and Monitor
Networks", CBS-ETAPS Workshop,
Berlin, April 2000,
http://bwrc.eecs.berkeley.edu/People/Faculty/jan.
2
L. Feeney and M. Nilsson, "Investigating the Energy Consumption of a Wireless Network Interface in an
ad hoc Networking Environment", Proceedings of InfoCom, p. 1584-57, 2001.
3
Y. Xu, J. Heidemann and D. Estrin, "Geography-Informed Energy Conservation in ad hoc Routing",
Proceedings of the Int'l. Conference on Mobile Computing and Networking, p. 70-84, 2001.
4
R. Wattenhofer, L. Li, P. Bahl and Y.-M. Yang, "Distributed Topology Control for Power-Efficient
Operation in Multihop Wireless and ad hoc Networks", Proceedings of InfoCom, p. 1388097, 2001.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-59
D. Design and Simulation of Wireless Sensor Networks
This brief summary of the technologies that contribute to wireless sensor networks should
have made clear that the design of such networks is a complex challenge. At the node
level, the choice of components and the circuit layout is a mixed analog and digital
design problem. Designing a cluster or node in a wireless sensor network has most of the
same problems that are encountered in the design of a cell phone. Because of the fierce
competition in the cell phone industry, there are capable and complex software codes for
design of the required hardware. This is not yet the case for the design of nodes in
wireless sensor networks. Further, some wireless sensor nodes have to function in
extremes of temperature that are not encountered by cell phones in ordinary usage.
The performance of sensor nodes cannot be usefully simulated, again due to lack of
software. There are several optimization problems that could be addressed if simulation
software were available. The important trade-off between computations at a sensor node
and communications from it provides one example. Local caching of information, with
communications only at preset intervals or when some set threshold is exceeded,
increases computational energy consumption, but saves on power-hungry
communications. However, less information is available to the users of the sensor
network. There has to be an optimum mix of computation and communication that
balances energy usage against overall network utility. Facile simulation software, even at
the node level only, would contribute to determination of such optima, which are
different for different networks and even for the same network under varied conditions.
Software for the design, simulation, visualization and traffic analysis networks, given the
characteristics of the sensor nodes and networks, is available. Network simulation tools
include NS2, 1 its SenosorSim extension, 2 GloMo Sim, 3 JavaSim, 4 and OpNet 5 , among
others. Some of these are exclusively for wired networks. Networks with 100,000 nodes
have been simulated using the Scalable Simulation Framework, 6 and the
Parallel/Distributed Network Simulator7 was shown to scale to 250,000 elements.
1
S. McCanne and S. Floyd, "The LBNL Network Simulator", 1997, at http://www.isi.edu/nsnam.
A. S. S. Park and M. B. Srivastava, "Simulating Networks of Wireless Sensors", Proceedings of the 2001
Winter Simulation Conference, 2001.
3
X. Zeng, R. Bagrodia and M. Gerla, "GloMoSim: A Library for Parallel Simulation of Large-Scale
Wireless Networks", Proceedings of the 12th Workshop on Parallel and Distributed Simulations, 1998.
4
J.-Y. Tyan and C.-J. Hou, "JavaSim: A Component Based Compositional Network Simulation
Environment", Proceedings of the Western Simulation MultiConference, 2001.
5
S. Bertolotti and L. Dunand, "OpNet 2.4: An Environment for Communication Network Modeling and
Simulation", Proceedings of the European Simulation Symposium, 1993.
6
J. Cowie, H. Liu, J. Liu, D. Nicol and A. Ogielski, "Towards realistic Million Node Internet Simulations",
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and
Applications, 1999.
7
G. F. Riley, M. H. Ammar and R. M. Fujimoto, "Stateless Routing in Network Simulations", Proceedings
of the Eighth International Symposium on Modeling, Analysis and Simulation of Computer and
Telecommunications Systems, 2000.
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-60
Simulations with millions of nodes are in prospect. 1 A taxonomy of wireless microsensor network models has been provided. 2
Since adequate software is not available for node design and simulation, it is also not
possible to rigorously co-design and co-simulate the entire node-network complex.
Neither is it possible to co-organize human and mobile robotic sensor systems, such as
might be found in crisis response teams or on the battlefield in the future. Computing
the effects of weather on wireless systems, both transmission losses and sferics due to
lightening, is challenging. Other interferences, both inadvertent and willful (jamming),
are also difficult to simulate.
E. Emplacement and Deployment of Wireless Sensor Networks
There are several ways to get micro-sensor
clusters in place for use in wireless systems
and networks. Having people install sensor
nodes has the advantage of high assurrance
of proper placement, but can be relatively
costly. Some situations will not allow
emplacement and require deployment by
some means. These include environmental,
emergency and military situations. There
are several means for such deployments.
The installation or integration of sensor
clusters with terrestrial robots offers one
deployment option. Another possibility is
Figure 4.9. Schematic of a system for
to drop sensor clusters from manned or
balloon delivery of micro-sensor
unmanned aircraft, or from missiles. Over
clusters for the detection of missile
300 unmanned aerial vehicles have been
launches.
developed for different purposes, 3 so there
are many options for micro-sensor cluster
deployment by such vehicles. Very small clusters can be dispersed by the wind using
maple seed or other bio-mimetic means for aerodynamic support. A concept for balloon
delivery was developed about a decade ago, as shown in Figure 4.9. 4 It could include
means to control the altitude of the balloon as it drifted on prevailing or other winds. The
ruggedness or micro-sensors and other components in clusters is key to their delivery by
airborne means or even artillery. 5
1
G. F. Riley and M. H. Ammar, "Simulating Large Networks: How Bib is Big Enough?", Proceedings of
the First International Conference on Grand Challenges foe Modeling and Simulations, 2002.
2
S. Tilak, N. B. Abu-Ghazaleh and W. Heinzelman, "A Taxonomy of Wireless Micro-Sensor Network
Models", to be published in ACM Mobile Computing and Communications Review (MC2R) and available
at http://opal.cs.binghamton.edu/~nael/research/papers/wcnc02-draft.pdf.
3
Jane's Unmanned Aerial Vehicles and Targets, http://www.janes.com/company/catalog/unmanned.shtml.
4
D. J. Nagel and T. J. Wieting, Naval Research Laboratory Proposal, unpublished, 1992.
5
More details are available in D. J. Nagel, "Pervasive Sensing", SPIE Vol. 4126, p. 71-82, 2000.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-61
F. Wireless Sensor Systems and Networks
This section summarizes the goals and challenges associated with wireless sensor
systems and networks. It then provides additional information on commercial wireless
sensor nodes and existing wireless sensor systems.
Some factors, such as
manufacturability, testing and reliability that were not covered above, are recognized. A
few current programs for development of wireless sensor and related systems and
networks are noted. Potential societal and other human impacts are also cited.
Wireless sensor systems and networks share many characteristics with established fields,
especially wired industrial and other sensor arrangements, and data acquisition systems.
They are also closely related to real-time systems, and to embedded and other control
systems. Sensor networks are intrinsically distributed systems, the components of which
can be thought of as elements in a large virtual sensor system. The goals and challenges
of making wireless sensor systems and networks include most of the desires and
difficulties of designing, producing, testing and using these other systems.
The basic functions of wireless sensor systems and networks are to provide information
for awareness and decision making. They perform monitoring and surveillance,
detection, tracking and reporting towards those ends. There are many descriptors for the
specific characteristics that are sought in wireless sensor systems and networks. They
include: adaptive, responsive and reactive; autonomous, self-configuring and
coordinated; rapidly-configurable, synchronized, real-time, high-bandwidth and lowlatency; efficient and long-lived; fault tolerant, scalable and gracefully degradable;
reliable and robust; predictable, trustworthy and usable with high-confidence; distributed,
large, dense, mobile, quickly-deployable, and disposable or expendable; affordable and
cost-effective; and user-friendly.
With so many characteristics as desirata, it is clear that the design of wireless sensor
systems and networks is very challenging. It must involve many trade-offs to achieve
performance that includes a sufficient degree of the most important of the many
attributes. The challenges are complicated because the nodes, which are usually mixed
analog-digital systems, are themselves elements in the larger system or network. The
lack of all the needed simulation software for the behavior of nodes is a serious
limitation. Fabrication of the nodes is complex, but the use of common industrial
techniques based on printed circuit boards, both relieves assembly problems and makes
more reliable hardware. Testing at the node and higher levels is complex and timeconsuming. The inclusion of self testing and monitoring at those levels for behavioral
assurance is also challenging, because all such functions require more hardware or
software, and they consume additional energy. Consider the one problem of monitoring
the bit error rate of any of the many links in a network late in the life of the power
sources. Many of the challenges and applications of sensor systems and networks were
addressed in a recent retreat. 1 In short, wireless sensor systems and networks are complex
1
WEbS-Wireless Embedded Systems Winter 2001 Retreat, http://today.cs.berkeley.edu/retreat-1-02.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-62
multi-scale engineering constructs, whose challenges are in a larger sense commensurate
with their payoffs. 1
Some commercial examples of wireless micro-sensor clusters have been cited already. In
general, a growing number of companies offer instruments with wireless communications
to a nearby computer, that is, with a link but not a network. These are termed wireless
systems, as we have noted. However, only a few companies offer nodes for use in
distributed networks. Sensoria 2 sells sophisticated four-sensor nodes, with engineering
support, for thousands of dollars each Kaiser has done experiments that involve as many
as 70 sensor nodes. 3 Crossbow 4 sells sensor nodes for hundreds of dollars each. Their
technology grew out of the "Smart Dust" program at the University of California at
Berkeley. 5 Researchers from Berkeley and Intel demonstrated a self-organizing wireless
sensor network that had over 800 nodes. 6 A plot of either the number of sensor nodes
sold, or the number used in single experiments, will undoubtedly show considerable
growth in the coming years. We expect very large numbers of sensor to be used in the
near future. 7
The area over which the sensors of any size are deployed and networked is a major aspect
of a wireless sensor network. Network descriptions such as WANs (wide area), LANs
(local area) and even PANs (personal area) are familiar. BlueTooth technology is
designed to form spontaneously what are called "piconets" within areas about 10 meters
in diameter. A relatively natural categorization of the spatial extent of networks is given
in Table 4.5.
Size Scale
1-10 meters
Terminology
Personal
10-1000 meters
Local
1-100 kilometers
Regional
Examples
An Individual's Electronic
Devices
Office
Buildings
&
Factories
Between
Buildings
&
Within Cities
Intra- & Inter-Country
Technologies
See Figure 4.8
See Figure 4.8
Cellular
Phones
Satellites
100-10K
Country
kilometers
> 10K kilometers
Global
Primarily Satellite Networks Satellites
Table 4.5. Networks Of Various Sizes and Communication Technologies.
1
R. M. Murray, "Complex, Multi-Scale Networks and Systems",
http://www.cds.caltech.edu/~murray/talks/2001b_mur01-citalum.html
2
http://www.sensoria.com.
3
W. J. Kaiser, Sensoria Corporation, private communication.
4
http://www.xbow.com.
5
B. Warneke, M. Last, B. Liebowitz and K. S. J. Pister, "Smart Dust: Communicating with a Cubic
Millimeter Computer", Computer, 44-51, January 2001.
6
Largest Tiny Network Yet, http://today.cs.berkeley.edu/800demo.
7
J. Walrod, "Sensor Network Technology for Joint Undersea Warfare", NDIA Joint Undersea Warfare
Technology Conference, San Diego CA, 21 March 2002,
http://www.ndia.org/committees/usw/walrod_sensornets.pdf
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-63
Many factors are relevant to wireless sensor networks. Prime among them is the number
and types of sensors at each node. Peak and average data transmission rates are critical to
performance. Such information is generally difficult to obtain. In the following summary,
we will be content with listing the number of sensor locations and their geographic
coverage for a few of the existing wireless sensor systems. Table 4.6 contains a
compilation of systems that involve partial or total wireless reporting from sensor nodes.
The International Monitoring System is a web of seismic stations for monitoring the
compliance with nuclear test ban treaties, and also records earthquakes. 1 The ARGO
system of 3000 buoys for oceanographic and weather measurements covers almost 70%
of the earth's surface. 2 The National Oceanic and Atmospheric Administration (NOAA)
maintains a network of moored weather buoys near the U. S. and in the South Pacific
Ocean. 3 The Tropical Atmosphere Ocean Project is another set of weather buoys near the
equator in the Pacific Ocean. 4 The traffic monitoring system on the autobahn system in
Germany uses cell phone (GSM) protocols to transmit information to the company that
installed and operates the system. 5 The Southern California Integrated GPS Network
(SCIGN) is a system of GPS receivers for detection of motion of the earth's plate in
southern California. 6 The Pacific Northwest Geodesic Array (PANGA) is a similar array
of GPS receivers that can monitor annual motions of the earth's surface as small as 5
millimeters. 7 The Texas Coastal Ocean Observation Network is a collection of 40
environmental and weather observation stations along the coast of Texas between
Louisiana and Mexico. 8 The stations communicate by satellite, packet radio and, in some
cases, telephone modem. The Puerto Rico Rain Forest Network is a set of three weather
stations in a remote national forest. 9 Many wireless sensor networks are being emplaced
to monitor and control operations in factories and plants. 10 Most of the industrial systems
will have between 100 and 1000 sensor locations in areas ranging up to about one square
kilometer, although facilities such as oil refineries will have many more sensors.
It is interesting to plot the data on the number of sensor locations and coverage for each
wireless sensor system. Figure 4.10 is the result. The vertical axis ranges from a single
sensor to 10,000 sensors. The last number might seems high, but tens times that number
of sensors is expected to be installed in coming generations of U. S. Navy ships. While
most of those shipboard sensors will still be wired, they will occupy an area much smaller
then a square kilometer. Terrestrial networks with tens of thousands of nodes are also
envisioned. The horizontal axis in Figure 10 varies from about the upper range of
1
http://www.cmr.gov.
ARGO is part of the Integrated Global Observation Strategy, http://www-argo.ucsd.edu.
3
http://www.ndbc.noaa.gov/ Maps/rmd.shtml.
4
http://www.pmel.noaa.gov/tao.
5
DDG Gesellschaft für Verkehrsdaten mbH, http://www.ddg.de.
6
http://www.sign.org.
7
http://www.geodesy.cwu.edu.
8
P. Michaud, G. Jeffries, R. S. Dannelly and C. Steidley, "Real-Time Data Collection and the Texas
Coastal Ocean Observation Network", Proceedings of the ISA Conference, Houston TX, 2001 and
http://dnr.cbi.tamucc.edu/wiki/TCOON/HomePage.
9
Hughes, private communication & http://wireless.oldcolo.com.
10
W. H. Nelson, " Survey of Wireless Technologies: Chipsets, Systems and Standards Suitable for Medium
Range, Low-Power Sensor Networks, http://www.frontier.net/ ~wadenelson/ successstories/graviton.html.
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-64
BlueTooth technology to the size of the earth. It can be seen that the growing use of
wireless sensor systems and networks in factories and plants will result in the highest
areal density of such technologies. Environmental networks now have about one location
in a square 1 to 10 km on a side. The German traffic network has a sensor about every 10
km. The two geodesy arrays have GPS receivers that are tens of kilometers distant from
each other on average. The ocean weather systems set up by the ARGO project, the
NOAA and the Tropical Atmosphere Ocean Project (TAOP) have sensor suites located
hundreds of kilometers apart. The International Monitoring System has stations covering
most of the globe with average sensor spacings on the order of 2000 km.
Name
Int'l. Monitoring System
Purpose
Nuclear
Explosions
ARGO Ocean Sensor Oceanography
System
NOAA Ocean Buoys
Weather
Nodes
Location
74
Global
Area
(km) 2
5.1 exp 8
3000
Global Oceans
3.5 exp 7
180
Around U. S. 9.2 exp 6
++
Pacific Equator 9.2 exp 6
Tropical Atmos. Ocean Weather
70
Proj.
DDG Network
Traffic
4000
Germany
3.5 exp 5
SCIGN
Geodesy
206
So. Cal.
3.4 exp 5
PANGA
Geodesy
6
Puget Sound
2 exp 4
TCOON
Environment/
40
Texas Coast
1 exp 3
Weather
Puerto Rica Rain Forest Environmental
3
Puerto Rico
6.4 exp 1
Many
Monitoring
& 100Factories
& 0.001 to
Control
1000
Plants
1
Table 4.6. Characteristics of Some Existing and Emerging Wireless Sensor Systems.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-65
2
per
(10
0m
)
On
e lo
cat
ion
PANGA
2
2
per
(10
00
km
)
Puerto
Rico
Rain
Forest
NOAA
Buoys
IMS
TAOP
On
e lo
cat
ion
TCOON
On
e lo
cat
ion
km
)
per
(1
On
e lo
cat
ion
10
per
(10
km
)2
SCIGN
2
Factories & Plants
ARGO
per
(10
0k
m)
per
(10
m)
2
102
DDG
On
e lo
cat
ion
103
On
e lo
cat
ion
NUMBER OF SENSOR LOCATIONS
10 4
Area of
Earth
1
0.01
1
102
10 4
AREA COVERED (km 2 )
106
108
Figure 4.10. Areal density of nodes in existing wireless sensor systems.
Although this discussion has touched on many points, some factors very relevant to
wireless sensor networks have not been covered. Manufacturing, testing and reliability
considerations are as important for sensor networks as they are for any engineering
system. It is difficult to estimate the cost of making, putting in place and using specific
wireless sensor system now. Their variety, the early stage of their development and the
lack of appropriate software all contribute to the difficulty. It seems likely that the use of
the same technologies that are employed for the design, production and population of
printed circuit boards in consumer products will permit the costs of micro-sensor nodes to
decline with production volumes. It is certain that availability of wireless sensor
networks will both enable many new applications and reduce the costs of existing
functions, especially compared to the high costs when people perform those functions.
Testing both nodes and entire systems is challenging because of the complexity and
numbers of entities in some sensor systems. The reliability of such systems will only be
proven by field use. A decade ago, there were many questions about the reliability of
micro-machined sensors. Now that hundreds of millions of MEMS are in use, it is clear
that such micro-sensors are very reliable. Probably, the database on the reliability of
wireless sensor networks will be accumulated in a similar fashion in this and the next
decade
There are several programs for the development of wireless sensor systems and networks
in the US and elsewhere. The DARPA SensIT program includes many projects that
address various aspects of the challenges cited earlier. 1 Another DARPA program, NEST
(short for network embedded software technology) seeks to enable sensor and other
systems with up to 100,000 nodes. 2 The U. S. National Science Foundation is now
1
2
Sensor Information Technology Program, http://dtsn.darpa.mil/ixo/sensit6.htm.
Network Embedded Software Technology, http://dtsn.darpa.mil/ixo/nest.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-66
putting strong emphasis on sensor systems and networks, both wired and wireless. Many
such systems are being developed under new homeland security programs in the U. S.
The applicability of wireless sensor networks is
sufficiently broad that the technology will
undoubtedly have implications that go beyond
what is easily foreseen. 1 For example, the
impact of ubiquitous sensing and imaging on
privacy raises many questions that bother some
people. The Center for Information Technology
Figure 4.11. Photograph of a
in the Interest of Society (CITRIS) at the
Manduca moth with the 0.7
University of California at Berkeley is
gram biotelemetry system that
addressing the technical and other aspects of
2
has two batteries and a 2 meter
major social and commercial concerns. Their
range, shown on the right.
interests include applications of wired and
wireless systems and networks in energy efficiency, transportation, environmental
monitoring, seismic safety, education, cultural research and health care.
Of all the impacts of wireless sensors systems, it may be that integration of such systems
with animals and people will prove to be the most historic. The recent demonstration of
sensing the electrical activity in the muscles of a moth in flight is an example of how
light and compact short range wireless sensor systems can be made. The insect and the
wireless sensor system are shown in Figure 4.11. 3 Even more dramatic was the
demonstrated ability of a human to control a computer by using the electro-chemical
signals that attend thinking. The initial experiment was wired, but the possible
employment of a wireless system is limited primarily by energy supply, which can be
recharged, even if implanted, by the use of RF energy. It is possible that eventually the
natural human metabolic system will be harnessed to power for implanted wireless sensor
systems. Wireless control of a rat using electrodes implanted in its brain does not use a
sensor system. 4 However, it does open the possibility of making a control loop including
both sensors and such actuation to influence behavior. One can expect that designed
sensors will be used to replace or augment our natural senses, and to provide us with
what amount to entirely new senses that couple information directly into our bodies and
1
A. L. Pennenberb, "The Surveillance Society", http://www.wired.com/wired/archive/9.12/
surveillance .html, P. Saffo, "Smart Sensor Focus on the Future",
http://www.cioinsight.com/print_article/0,3668,1=25588,00.asp, and D. Hunter, "Silent Technology-The
Next Wave", http://www.accenture.com/xdoc/en/industries/ government/Silent_technology_insights5.pdf
2
The Center for Information Technology in the Interest of Society (CITRIS),
http://www.citris.berkeley.edu/about_citris.
3
P. Mohseni, K. Nagarajan, B. Ziaie, K. Najafi, and S. B. Crary , "Robotics at the Interface of
Microsystems Technology and Biology: Biobotics", Proceedings of the Int'l. Advanced Robotics Program
Workshop on Micro Robotics, Micromachines and Systems, Moscow, Russia, p. 78-82, 24-25 Nov 1999.
4
S. Milius, "Rescue Rat: Could Wired Rodents Save the Day?",
http://www.sciencenews.org/20020504/fob3.asp and "Brain Implants",
http://www.geocities.com/skews_me/implants.html.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-67
brains. As Kurzweil asserted, “There is no longer going to be a sharp distinction between
humans and machines". 1
4.3 Power
This section is based on Bob Nowak's presentation and other work at DARPA. 2
DARPA's work in power covers a wide range, with some sensors taking up to 100 watts
of power. A key concern is the amount of power generated for a given weight of the
system. Figure 4.12 shows what has happened regarding macro-power.
When discussing power, one must really discuss the relationship between power and
time. In particular, one must deal with such topics as peak power, average power, and the
period of time over which the power is supplied. Figure 4.13 shows some of the different
requirements for different applications. It is often hard to meet the requirements with just
one power source. For this reason, hybrid systems are widely used.
Figure 4.12 Power Densities Available Throughout History
1
R. Kurzweil", The Age of Spiritual Machines: When Computers Exceed Human Intelligence", Viking
Penguin, 1998.
2
http://www.cartech.doe.gov/pdfs/FC/129.pdf, http://www.netl.doe.gov/
publications/proceedings/01/seca/Nowak.pdf, http:// www.onr.navy.mil/ sci_tech/
chief/docs/elec_pwr_sum.ppt, and www.darpa.mil/DARPATech2000/Presentations/
dso_pdf/4NowakAdvancedEnergyB&W.pdf
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-68
For portable power systems, one should begin by seeing whether it is possible to meet the
power requirements with a battery. Batteries are hermetically sealed and very reliable,
and at this time tend to outperform most other options.
A variety of devices such as various kinds of watches can run off such things as hand
motion and body heat. This suggests to some people that there are many alternative
sources of power, but the watches only need a microwatt of power. Some of these
systems are not capable of delivering more than something on the order of a microwatt of
power, and are not suitable for more power hungry applications. In addition, people keep
demanding additional features, which constantly increases the power requirements. There
are some combinations of a PDA and a phone. One such device created by Samsung
seems to have a battery life of about two hours, which is insufficient for practical use.
In many cases, the limiting factor is not power but energy. Power is the amount of energy
per unit time. If energy is limited, that limits power, but with a lot of energy being
available, it is possible to use various storage schemes to high peak power from a source
of little power, but which produces a lot of energy over a long period of time. DARPA
and the military are focusing on energy conversion devices. These are small-scale
examples of the sorts of systems found in contemporary hybrid, electric cars. Of
particular interest are fuel cells, 1 which can convert high-energy content fuel into
electricity. Batteries and fuel cells have very similar chemistry. Batteries, however, are
closed systems, whereas fuel cells need to breathe air and need to receive fuel. For short
missions batteries are preferred because of their simplicity. For long missions, fuel cells
are preferred because of their lower weight due to the use of high-energy fuel.
The primary fuel for fuel cells is hydrogen, which can be delivered in a variety of ways.
Some recent fuel cells, developed over the last 10 years, use methanol and obtain a 30%
efficiency. 2 This gives them something like 2000 watt-hours per KG of fuel at optimal
operation. This compares very well with batteries based on their weights. Also, batteries
work best if not operated at their peak power capacity.
1
2
http://education.lanl.gov/resources/fuelcells
http://www.ott.doe.gov/pdfs/dmfuelcell3_23_01.pdf.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-69
Figure 4.13. Power Requirements for Various DoD Applications
The military is using fuel cells with great success in the gap between batteries and large
generators. In some cases fuel cells are an order of magnitude cheaper for the amount of
energy delivered. One gallon of methanol can deliver as much energy as $4,000 worth of
batteries. People are even looking at putting fuel cells into cell phones, because they
anticipate greater energy requirements in the future. Methanol, however, has some
undesirable properties. It can be corrosive and burns with a colorless flame. Figure 4.14
shows fuel cells being used at a Marine Corps exercise. Figure 4.15 shows the relative
effectiveness of fuel cells and batteries.
Figure 4.14. Fuel Cells in Action
In some cases, flexible photovoltaics are also an option. They can be set up to charge
batteries, which can be used to power a system. Figure 4.16 shows an exercise in which a
combination of power technologies was used.
DARPA is looking at a variety of materials for direct energy conversion. These include
thermoelectric materials, among others. It is clear that we need better materials. At this
time, we want to get to 20% efficiency. The beauty of direct energy conversion is that
there are no moving parts. In addition, we want to be able to burn fuels in very small
amounts and in very clean ways to provide small amounts of heat.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-70
Figure 4.15. Comparison of Fuel Cells and Lithium Batteries
DARPA is also looking at ways to extract energy from the environment. The best known
method of this type is photovoltaics. There are other possibilities including such things as
oxygen gradients caused by bacteria in water, methane hydrates in sediments, and the use
of other biological techniques such as the metabolism of glucose and other carbohydrates.
We are also looking at mechanical methods such as a device that might generate up to 1
watt of power from the energy absorbed by the heel in walking. 1 Another interesting
device is a mechanical eel that extracts energy from a slow moving current. 2
The energy efficiency of living organisms metabolizing carbohydrates has been under
intensive study for the past decade. One amazing feature of this energy extraction is that
it takes place at room temperature. The key to it is enzymes. There is interesting work
going on in combining enzymes with electrodes so that electrodes can use glucose. Such
a combination can be embedded in a human and provide a power source for a radio that
could be used to locate kidnapping victims.
Of great interest are various types of very small biomolecular motors. These can be very
small and very efficient, and surprisingly powerful for their size. They can be either
rotary or linear. Figure 4.17 shows some basic facts about biomolecular motors.
1
2
http://www.darpa.mil/ dso/thrust/md/energy/pa_sri.html.
http://www.darpa.mil/dso/thrust/md/ energy/pa_opt.html.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-71
Figure 4.16. A Humanitarian Drill Using a Variety of Power Technologies
There are interesting ways to use radioisotopes to produce power. One technique is to
bombard a PN junction with radiation. Unfortunately, the radiation eventually destroys
ordinary PN junctions. Fortunately, it appears that there are now some materials that can
resist radiation indefinitely, so that radioisotopes might turn out to be a very promising
source of power.
To sum up, when deciding on a small power source, one should first consider batteries. If
batteries cannot solve the problem, one should consider small fuel cells. Next one should
consider small hybrid systems. Finally, one should consider biologically inspired
systems, or biologically based systems, although such systems are not immediately
available at this time.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-72
Figure 4.17. A Biomolecular Motor
4.4 Laser Wireless Communications for Data Transfer from
Remote Sensors
This section is contributed by Alexander Akhmanov, who was one of the participants in
the workshop.
Free-space laser communications systems can provide a wireless communication channel
between remote sites. In these systems, the data is transmitted by modulated laser light.
Pulses of light are transmitted in a low divergence laser beam through the atmosphere.
For a variety of applications, free-space laser links have many advantages over other
wireless technologies such as RF and microwave. For example:
•
•
•
•
very high bandwidth (today's technology can achieve 2.5 GB/sec for one frequency
channel);
increased security, because of the narrow laser beam, which makes detection and
interception nearly impossible;
licensing is not required;
substantial miniaturization and integration is possible with low power consumption;
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-73
•
free-space laser terminals are mobile and are ideal for temporary installations.
There are also disadvantages:
•
•
laser free-space communications links require a clear line-of-sight;
the communications subject to atmospheric effects such as absorption of light,
refraction, scattering and scintillation.
Free-space laser communication is a proven technology. It is already used in
commercially installed systems. We estimate that the number of installed systems is more
than 10,000. There are more than 30 companies selling equipment in this market.
Free-space laser systems use transmitters and detectors that are similar to the ones used in
optical fiber communications systems, so they can achieve comparable data rates. There
are experimental installations, e.g., Lucent Technologies, with speeds ranging from 2.5 to
10 GB/sec with wavelength division multiplexing, working on distances up to 4 km.
Commercially produced systems run at rates in the range 10 Mbit/sec to 600 Mbit/sec,
and have a range of 100 m to 5 km. The most popular systems have a range of about 1.5
km.
The speed and distance are mainly depends on technical characteristics of laser source.
The majority of systems use semiconductor diode lasers (GaAs quantum well) with a
mean light power of 10 - 50 mWatts, and wavelengths of 800 - 900 nm. Some systems
use wavelengths of 1.3 - 1.5 microns common to fiber waveguides.
Optical communication systems can link spatially separated computer nets and support
all necessary protocols. It is possible to use laser free-space technology for
communications with remote sensors. The technology must be optimized for specific
applications.
For applications with remote sensors, laser and micro-optical elements for beam
conditioning can be integrated into MEMS ( MEOMS) circuits with sensor and data
processing. Such integration gives a significant reduction in size and required power.
It is possible to develop laser beam information gathering systems. In such systems, an
external laser beam reads information from sensors by detecting reflected radiation. In
such systems, there are no laser sources on the sensors. An advantage of such an
approach is the reduced power needed by the sensor package.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-74
4.5 The Future -- A Mobile Internet Powered by a Planetary
Computer
This section is based on the presentation and slides presented by Larry Smarr. This
presentation was delivered remotely from California. This section presents some trends
that will change the way we work.
One trend is that there will be many sensors providing input to the Internet. Also, we
expect to be able to move seamlessly between technologies different technologies such as
802.11 and 3G. Substantial computing resources will be distributed all over the Earth.
This will also be combined with a substantial amount of data mining.
The Cal-IT2 Center 1 is designed to produce an integrated approach to the Internet, and to
try to look five years into the future. The Center combines 220 faculty from UCSD and
UC Irvine to work on all the subcomponents that are necessary to put together an
integrated picture of the future. There are several major areas of focus: environment and
civilian infrastructure, intelligent transportation, digitally enabled genomic medicine, and
new media arts. Since 9/11, the Center has increased its focus on homeland security. As
projects have developed, we have discovered that policy issues sometimes overshadow
technical issues.
The Defense Department is approaching many of the topics of interest to the Center in
ways similar to the way the Center is approaching them. Consequently, developments in
this area might very well constitute examples of dual use. Figure 4.18 illustrates the
Department of Defense layered architecture for defense and civilian applications.
The Center's focus is not just on terrorist threats, but on crises in general. California faces
a formidable array of natural disasters including fires, floods, earthquakes and heavy
traffic. For this reason, the Center wants to broaden the scope of homeland security to
include natural disasters.
The basic design for early warning and disaster response systems should be three tiered.
First, it should have wireless sensor nets that bring data to repositories. The second tier
would consist of collaborative crisis management centers. Finally, remote wireless
devices would interrogate databases. CAL-IT2 will focus on high performance grids like
the ones used by the ACCESS Center, as well as other grids that promote collaboration
and crisis management.
1
http://www.calit2.net.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-75
Figure 4.18. DoD Software Architecture
Licensed and unlicensed RF bands will also add a substantial number of people to the
Internet. Figure 4.19 shows the projected growth of the Internet in terms of both the fixed
connections and the mobile users. It shows Ericsson's projections that by 2005 the
number of mobile connections to the Internet will exceed the number of fixed
connections to the Internet. This is especially surprising since it has taken something like
30 years from the creation of the ARPAnet to get the number of fixed connections in
place, but it will have taken only something like 5 years to get the mobile connections in
place. It is imperative that we make the transition between fixed points and mobile points
as smooth as possible.
G. Maria Feng’s work at the Center involves the installation of seismic sensors on
bridges. There is a lot of interest in such activities, including the commercial availability
of 802.11 “intranet” systems for bridges. A Cal-(IT)2 partner called Graviton has
developed an architecture that can connect any type of sensor via spread spectrum radio
into a network.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-76
Figure 4.19. The Projected Growth of Fixed and Mobile Internet Connections
It looks likely that millions of video cameras will add image data streams to the Internet
in the very near future. The London Subway system has signed a contract to install
25,000 video cameras in the near future. 1 This is a system that can expand to 250,000
cameras. Surveillance cameras are also widely used on London buses. 2 It is estimated that
in London, the average citizen is seen by 300 cameras per day. Authorities are in the
process of adding face recognition to the camera network. Not everyone is happy about
this program of surveillance. 3 Washington DC is making extensive use of surveillance
cameras and planning to connect them to computers in squad cars. 4 It is clear that the
video data collected by all these cameras will add tremendously to the data stream.
Of special interest are flying platforms that can carry sensors. Figure 4.20 shows three
such platforms ranging in size from 300 inches to 1 inch.
1
http://www.telindus.com/downloads/pdf/telindus_case_london_under.pdf.
http://www.londontransport. co.uk/streets/bp_enforcement.shtml.
3
http:// www.msnbc.com/news/620569.asp?cp1=1#BODY.
4
http://loper.org/~george/trends/2002/Feb/68.html.
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-77
Figure 4.20. Some Flying Platforms for Sensors
It looks likely that the human body will become a multiple sensor stream source for the
Internet. For example, a company PhiloMetron1 has a smart “band-aid” that noninvasively transmits information collected from a person’s skin. It is also possible to use
invasive sensors. DARPA has been interested in the state of health of soldiers for a long
time, both in knowing what sorts of aid to send and to understand the extent of casualties.
Again, we are just beginning to think about developments in this area. This could lead to
much data and data mining.
We are in the process of really integrating sensors and wireless technology into systemson-chip. Such a step is necessary if we are to create the small and inexpensive sensor
packages that we can deploy everywhere. Such packages would include sensors,
processors, memory, protocol processors, software, and communication all in one small
package. As we know from Section 4.3, power concerns loom large, so software is
becoming very power aware and shuts down unneeded systems very quickly.
It is clear that a vast amount of software needs to be developed, creating essentially an
"operating system" for wireless sensor nets. Such a system has to be able to operate in
1
http://www.philometron.com
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-78
real time , which is quite different from the time that most operating systems operate in.
In addition, this “operating system” will have to be location aware and very secure. It
appears that cell phones will be required to be location aware within a few years, but it is
clear that adding location awareness could just be a small part of all the sensors that could
be placed on cell phones. These sensors can be chemical and biological sensors. Cell
phone companies are already working on how to get more energy into cell phones by
replacing batteries by fuel cells.
It is clear that in very short order we will have floods of data so that we need to integrate
this into what the military refers to as situational awareness. We need to view the
interrelations of variables to get a coherent picture of what is happening. The biggest
problem is getting enough pixels on a screen to display all the relevant data. Several
companies 1 are looking into this problem. Screens with something like 100 million pixels
will become common in the near future.
Figure 4.21 illustrates an existing system that integrates many functions. These include
modeling functions and prediction functions, in addition to the standard functions that
report on the status of various items. This system2 is an example of things to come. It is
also clear that training people to use such tools will become very important. Centers such
as the DC ACCESS center will play a key role in training people to work on such
systems.
An interesting development is the evolution of XML to allow the federation of
heterogeneous databases. While there are technical problems, they pale in comparison
with the data ownership problems, which revolve around deciding who can view which
database.
We now want to focus on making the wireless Internet available in your hand. It would
help the field scientist and the first responder to have the whole World Wide Web
available in the field. The Center is doing a lot of work with handheld computers
connected wirelessly. Such units are being distributed to students at UCSD, and we
expect a lot of interesting material to be developed.
We need to know how to program our cell phones, but this is difficult to do using the
native mode. Many cell phones, however, use the Qualcomm CDMA chipset, 3 which has
a high level programming environment called BREW available. 4
Figure 4.22 shows a temporary crisis center set up by Hans-Werner Braun as part of the
HPWREN 5 project. This project is getting this high-speed (45 MBS) connectivity out into
the real world, and showing how it can be used successfully.
1
e.g., http://www.panoramtech.com
http://www.saic.com/products/ simulation/cats/cats.html
3
http://www.cdmatech.com.
4
http://www.qualcomm.com/brew.
5
http://hpwren.ucsd.edu
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-79
Figure 4.21. An Example of a Comprehensive View of Lower NYC
We need to be overlaying physical space and cyberspace. Doing so is called augmented
reality. This suggests the more widespread use of head up displays by first responders
and a host of other people. The DoD has been working in this area for a decade and has
produced some very useful examples of heads-up displays. An interesting example of this
is creating a system that shows the stresses in a bridge when you look at it. The
widespread use of augmented reality is definitely in the cards.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-80
Figure 4.22 Demonstrating the Use of Wireless for Crisis Response
4.6 Recommendations
We need to work on better power systems that can lower the costs associated with
maintaining a large sensor network. Existing and new technologies should be pursued in
support of portable and field communications.
We need to work on developing ideal sensor network systems. Such systems should be
modular and their components should be essentially invisible to the end user. They
should make wide use of generic components and standards so that in most cases only the
individual sensor element itself need be changed to fit a specific application.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-81
Chapter 5. Security, Privacy and Policy
5.1 Introduction
It is clear the many important issues are not primarily technical in nature. There are
important social and political concerns as well. These range from getting people to take
security more seriously, to opening up the use of the airwaves, to financing development
in this area, and even to building communities. This chapter is based on the presentations
by Les Owens and Bill Lane, and also on contributions by Don Mitchell, Tom Williams,
Janet Thot-Thompson, Anna Komarova, Dick Morley, and George Markowsky.
5.2 Overview of Security Issues
This section is based on the presentation of Les Owens. It functions as a tutorial on
security, which is going to be of increasing importance as the use of wireless becomes
more common and the number of nodes on the Internet continues to mushroom. At the
start of his presentation, Les Owens recalled the famous quote of George Santayana:
"Those who cannot remember the past are condemned to repeat it."
Attacks on systems can be loosely grouped into two classes: passive attacks and active
attacks. Passive attacks can be further subdivided into eavesdropping and traffic analysis,
which is determining who is talking to whom even though it might not be possible to tell
what they are saying. Passive attacks are difficult to detect, but can be prevented.
Active attacks involve some intervention on the part of the attacker. Such attacks might
involve masquerading as someone else, replaying messages, modifying messages or
denial of service. These kinds of attacks are often easy to detect, but often hard to
prevent. For example, jamming is easy to detect, but might be difficult to prevent. In
some cases, detection can serve as a deterrent.
It is important to understand the sources of attacks. It is estimated that 80% of all attacks
are from insiders. This group includes malicious and disgruntled employees and former
employees. Attackers external to the organization include hackers, crackers, professional
thieves, competitors, foreign governments and terrorists.
The motivation for an attack can range from financial gain or military advantage, all the
way to doing it just for sport. Regardless of the motivation, the outcome is often the
same.
Some case studies are very instructive for better understanding security. First generation
cellular phones used to broadcast two numbers, ESN (electronic serial number) and MIN
(mobile identification number – the phone number), in addition to the number being
called. Thieves could program other phones to send the same two numbers, and some
early cell phone subscribers got colossal phone bills because calls made with the cloned
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-81
phone would all be charged on the same bill. The main motivation seems to have been
acquiring anonymity rather than stealing the phone services. Cloned phones were often
used in illegal activities such as drug smuggling and illegal arms sales.
The designers of first generation cell phones never anticipated that people would have the
capabilities of cloning phones and never prepared for it. The problem was compounded
by the fact that information on cloning phones was distributed widely through the
Internet and through other means.
There has been a great explosion in the use of 802.11 wireless LAN technology.
Unfortunately, the designers of this protocol were not security experts. In particular, the
designers did a poor job on the cryptography component, called WEP (wired equivalent
privacy), which can be broken with well-understood methods. 1 It turns out, moreover,
that people tend not to enable the security features, so it is often easy to connect to other
people’s networks. While the security features are weak, they are better than no security
at all.
It must be noted that by its nature, wireless communication is more insecure than wired
communication since it is easy to attack it passively. Spread spectrum techniques add
some measure of security, but for the best security you must use cryptography.
The fundamental requirements for security are: confidentiality (data is only accessible for
reading by authorized parties), integrity (data can be modified only by authorized
parties), authentication (you must be able to verify user’s identity), and availability (data
must be available to authorized parties).
There are additional requirements for wireless systems: interoperability (different
systems can intercommunicate), seamlessness (the ability to move from one network to
another without being dropped), and efficiency (no long waits and reasonable power
consumption).
Institutions should have a security toolbox that includes such things as firewalls, training,
and especially cryptography. Cryptography has been around for some 4,000 years and has
historically been used to protect military communications.
Classical cryptography is also referred to as symmetric cryptography, which means that
the same key (secret data) is used for encryption and decryption. If the key falls into the
hands of the enemy, the cryptographic system is compromised. For such systems, key
distribution is a problem. Public key cryptography, a relatively recent invention, has two
different keys. Either key can be used for encryption, as long as the other key is used for
decryption. In practice, you would retain one key, and can publish the other. Every
person, including any attackers, can encrypt messages, but if the cryptographic system is
secure, only the person with the other key can decrypt the message in a reasonable
amount of time. This avoids the key problem since only one key needs to be kept secret,
and only in one location. Public key systems are widely used, with the RSA system
1
http://www.cs.rice.edu/~astubble/ wep/wep_attack.html.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-82
probably being the most widely used [http://www.rsasecurity.com/]. Public key
cryptography can be used to secure messages and to provide digital signatures, which
give a mechanism for people to send messages that make it extremely likely that the
messages came from the indicated senders.
Figure 5.1. Fixing Cellular Phone Security with Classical Cryptography
There are three layers of wireless technology. The first layer is referred to as WPAN
(wireless personal area network). This layer includes such technologies as the infrared
standard IrDA1 and the wireless standard Bluetooth. 2 The next layer is referred to as
WLAN (wireless local area network) and includes such wireless technologies as 802.11, 3
CT2 (cordless telephony second generation), UPCS (unlicensed personal communication
services), DECT (digital enhanced cordless telecommunications) and PHS (personal
handyphone system). 4 The final layer is referred to as WWAN (wireless wide area
network). This includes standards such as 3G, 5 CDPD, UMTS, 1xRTT, GPRS, GSM,
1
http://www.irda.com.
http://www.bluetooth.com.
3
http://grouper.ieee.org/ groups/802/11.
4
A good guide to these various acronyms can be found at http://www.idrc.ca/acacia/03866/wireless.
5
http://www.forum.nokia.com/html_reader/main/1,32611,2450,00.html.
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-83
CDMA, and TDMA. 1 There are other wireless technologies that should be mentioned:
Ricochet, RIM.Blackberry, mobile IP, and satellite.
Figure 5.1 shows how classical cryptography was used to make cellular phones clone
resistant. There are also many new ideas for making 802.11 more secure that have been
developed since the proprietary WEP protocol was developed. Cisco has a popular
approach. VPN (virtual private networks) can be used to add security to an 802.11
network. A system known as IPSec 2 is used to provide security for Internet technology,
but this protocol is too hefty for small sensor packages. We need to develop a lightweight
IPSec.
Anyone interested in security (and this should be everybody) should keep the following
thoughts in mind:
1.
2.
3.
4.
5.
Don’t underestimate the capabilities of adversaries and don’t rest on your laurels.
End-to-end cryptography is optimal – a chain is only as strong as its weakest link.
Build security into systems from the beginning.
Use good cryptography.
Design security to anticipate changes in threats and keep in mind that the action of
Moore’s Law is always providing adversaries with ever increasing computer
power.
6. Use expert help.
5.3 Privacy and Ownership of Data
The word “security” covers a broad scope, including data secrecy, data availability (i.e.,
prevention of jamming), and authentication of data. Additionally, “security” implies
conflicting interests, not only between adversaries (Good Guys versus Terrorists) but also
among allies (one’s desire for data security versus another’s desire of easy access to that
data; or the government’s need to monitor an area versus a citizen’s right to privacy) and
even internally (a scientist’s conflicting desires to provide data for others and to preserve
his own intellectual property). There are many security and privacy issues that need not
only to be balanced, but also to be juggled.
When sensors are installed for purposes of enhancing security in a facility, there are
frequently inherent conflicts with the privacy concerns of personnel that normally occupy
the sensored area. Installation of entry control devices, such as badge readers tied into a
central computer database, raise concerns that management will use the entry and exit
times to monitor employees and administer disciplinary actions. Addition of metal
detectors or x-ray screening of hand-carried items subjects personnel to a form of search
and decreases their accustomed amount of privacy.
1
Many of these terms are explained at
http://www.3gamericas.org/pdfs/Wireless_Migration_Strategy_AWS.pdf.
2
http://www.ietf.org/html.charters/ipsec-charter.html.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-84
The solution to these concerns is at least two-fold. First, management must carefully
weigh the benefits of the additional security against the costs of those enhancements. The
costs go beyond the financial cost of the equipment purchase, installation, operation and
maintenance. Costs should also consider the increased stress placed upon workers and the
potential adverse impact on efficiency of normal activities. Second, management must
carefully explain their need for the security enhancements, then listen to and respond to
the employee concerns that will inevitably be raised.
Similarly, perhaps even more obviously, the public at large will tend towards increased
discomfort as sensors, particularly cameras, become more ubiquitous. The solution will
again involve both the balancing of security needs against other legitimate needs, and the
clear communication of those issues between the public servant and the public.
The current academic and scientific culture regarding environmental data is in conflict
with the needs of universal availability. Scientists are implicitly encouraged to keep their
data secret from others until they can assess it and publish their conclusions. This culture
is incompatible with the need to move data quickly from its gathering site to those
machines and people who are in a position to evaluate it for other uses, be they related to
homeland security, disease control, or domestic environmental monitoring (e.g., smog
levels). Thus we either need the environmental scientists to make a sacrifice, or we need
to provide incentives for them to share data.
5.4 Policy and the FCC
The environmental science and environmental security communities need to become
involved in the regulatory process regarding no-license radios. Currently, FCC
regulations regarding the no-license radio spectrum implement a homogenous rule set
throughout the U.S. Implicitly, the FCC assumes the needs of rural constituents to be the
same as those in urban areas. Such an assumption is incorrect.
The current regulatory approach is purely spectrum-based. The rationale behind this
approach is that the FCC's mission is to minimize interference by regulating the finite
resource of RF spectrum. Although such an approach has the appearance of consistency,
its execution of that approach results in inequities between rural and urban users.
Rural areas obviously have a different environment from urban ones. Rural populations
may be measured in acres per person instead of persons per acre. This difference in
environments suggests different requirements.
Rural areas are often regions of very rough terrain. Line-of-sight radio systems, such as
those operating in 900 MHz range and above, are unable to go through or around
Appalachian hills, for example. Indeed, low power radio in that frequency range cannot
even penetrate foliage very well.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-85
Given fewer people in an area, there will be less spectrum saturation. For example, a rural
listener may receive an order of magnitude fewer stations on an FM radio than an urban
listener. The same proportions seem to hold for other segments of spectrum. Thus, there
is less to interfere with, but there are also longer distances to traverse. However, the rules
intended to minimize interference are the same whether you are in a big city or a low
population density area.
In an urban environment, a few nodes, relatively close together, can economically serve a
large number of users, be they business, residential or institutional. In a rural
environment, such economies of scale are quickly swallowed up by the long distances
between nodes. Thus, due to the low power limitations, rural users are forced to
implement expensive relay systems. This one-size-fits-all spectrum allocation algorithm
is thus heavily weighted in favor of those in urban environments. Consequently, this
spectrum allocation policy does not meet the needs of the research community, nor of the
general citizenry in low population density areas.
William Lane of the FCC spoke at the workshop on behalf of Dewayne Hendricks.
Hendricks was been called the “Broadband Cowboy” by Wired magazine in its
November 2001 issue. Lane noted that the views presented in his talk are his views and
not those of the FCC.
The FCC was established in 1934 as an independent agency of the U.S. Government,
which is responsible to Congress. It is charged with establishing a policy to govern
interstate and international communications by television, radio, wire, satellite and cable.
Note that the government’s use of communication media is handled by the National
Telecommunications and Information Administration (NTIA), which is part of the
Department of Commerce.
The FCC is headed by five commissioners, each appointed by the President of the US,
with one designated as the chair of the panel of commissioners. The FCC has seven
bureaus including the Wireless Telecommunications Bureau and the Mass Media Bureau,
and 10 offices including Engineering and Technology and Media Relations.
The Wireless Telecommunications Bureau, where Lane is the Chief Technologist, is
responsible for all domestic wireless communication except for broadcasting or satellite
communications. It provides information, licensing, rulemaking and data storage for cell
phones, paging services, personal communications services, public safety, commercial
wireless services, private wireless services and spectrum auctions.
The process for creating rules is the following. First, the FCC sends out a Notice of
Inquiry (NOI) to gather information and to generate ideas. Next, it sends out a Notice of
Proposed Rulemaking (NPRM) which includes proposed rule changes and seeks public
comment. Then it sends out a Further Notice of Proposed Rulemaking (FNPRM) to seek
further public comment on specific issues. This is followed by the Report and Order
(R&O), which issues new rules, amends existing rules or makes the decision to leave
them unchanged. These rules are entered into the Federal Register. Individuals and
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-86
organizations dissatisfied with the new rules may file a Petition for Reconsideration
within 30 days of the R&O. The FCC will then respond with a Memorandum Opinion
and Order (MO&O).
The chief goals of the FCC for spectrum management include:
1.
2.
3.
4.
Maximizing the efficient use of the radio spectrum to promote competition
Expanding access
To protect and promote the public interest
To ensure the ability of operators to adapt to new technologies, new services, and
new markets.
The basic principles espoused by the FCC include deregulation, technical flexibility,
transparency, fostering competition and holding auctions. Technical flexibility means
letting the technology develop without overburdening it with regulation. Transparency
means that the public at large is a player in developing rules and regulations.
Because of the FCC’s commitment to deregulation, the FCC always tries to ask whether
each regulation is really needed. In particular, the FCC always asks whether there are
alternatives, and whether voluntary standards are adequate. In the US, voluntary
standards are really voluntary which explains how Qualcomm was able to introduce
CDMA (code division multiple access) which is a form of spread spectrum
communication at a time that TDMA was standard for 2G. 1 Finally, the FCC always asks
whether having only one design choice is essential.
The FCC feels that technical flexibility is important since technology moves faster than
changes can be made in government regulations. Unnecessary regulations slow the
introduction of new technology by making it harder to raise capital for development. The
FCC wants the marketplace to drive the technology.
Competition is generally better than government regulation in getting new services and
technology to the public, and in lowering telecommunications costs. Figure 5.2 shows the
cell phone coverage of the United States in October of 2001. Notice that the entire
country was already covered by at least one provider, most of the country had at least two
providers, and many of the populated areas had a half-dozen service providers.
The FCC supports spectrum caps that limit the amount of spectrum that one carrier can
have as a way to foster competition. These caps are in the process of being phased out.
While advisory committees are sometimes used, public comment has a key role in
making regulations and allocations. Anyone can make comments. Public comments are
made public immediately and made available on the web. The FCC decisions explain
final rules and all the points raised in public comments.
1
For more information see http://www.cdg.org/tech/cdma_term.asp.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-87
Figure 5.2. Cellular Coverage of the United States in October 2001
The promotion of technology is not an FCC function. The FCC has no R&D program and
is not interested in picking winners and losers, which is inappropriate for US agencies.
For example, the FCC in 1938 denied an experimental license to the first FM radio
station (W2XMN) as a “visionary development”, but it eventually granted a license and
allocated 41-44 MHz.
Congress decided in 1993 to start auctioning spectrum, and permit the market to decide
how to best use the spectrum that was purchased at auction. Purchasers of spectrum have
a lot of incentive to use the spectrum immediately so they can begin earning money.
One auction involving NextWave got complicated by a pending bankruptcy. The FCC
took back the licenses, but NextWave sued. The US Appeals Court upheld the company’s
position in June 2002 1 and the case is now pending at the Supreme Court. 2 The FCC has
an extensive website, which contains rules, 3 public comments 4 and the current frequency
allocation table . 5
1
http://www.thestandard.com/article/0,1902,27390,00.html.
http://www.usatoday.com/tech/news/ techpolicy/2002-10-08-nextwave-case_x.htm.
3
http://www.fcc.gov/mmb/ asd/bickel/47CFRrule.html.
4
http://gullfoss2.fcc.gov/cgi-bin/ ws.exe/prod/ecfs/comsrch_v2.hts.
5
http://www.fcc.gov/oet/spectrum/table/fcctable.pdf.
2
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-88
International telecommunications policy is handled with the State Department as the lead,
with assistance from the FCC and the NTIA. There are many issues with spectrum
allocation across government and non-government users, as well as differences among
nations. 3G spectrum allocation is very contentious. There are some bands, currently
unlicensed, which will be allocated at 60 GHz and 90 GHz. There are also issues
concerning ultrawideband, which has very short pulses and very wide bandwidth. The
FCC is primarily concerned about regulating power and frequency.
5.5 Technology Transfer
Sensors can be small enough to fit on a bee’s legs. They can count the axles and read the
“easy pass” of a car speeding through a tollbooth at 85 miles per hour. They can
withstand extreme environmental conditions and survive human digestion. Clearly,
sensor technology is forging ahead. But challenges exist, too. Sensors cannot power
themselves indefinitely. It is expensive and sometimes impossible to send someone to
change a sensor’s batteries. Additionally, strategically located data synthesizers are
needed in the field to collect, store, and filter the terabytes of data collected from sensors
into manageable packets that can be transmitted over existing low-bandwidth networks to
larger data processing facilities. Without wireless broadband available in remote areas to
transmit the data, the sensors and data synthesizers are of little use. These are tough
challenges that researchers are working to solve. But an equal and often overlooked
challenge is that of transferring sensor technology to wider use by practitioners and the
general public to ensure that sensor technology continues to receive support and funding
and that the technology’s benefits are maximized for the betterment of society.
This disconnect between technology advances and implementing the technology for
wider practical use is not uncommon. In their Summary of a Workshop on Information
Technology Research for Crisis Management, the Computer Science and
Telecommunications Board of the National Research Council notes the critical
interaction needed between the information technology research community and the crisis
practitioners. Without this exchange, crisis management technology and research are not
likely to have significant impact in the real world. The board asserts that among other
problems, resistance to change, insufficient education and training, and insufficient
awareness are barriers to practical use of new technology. Furthermore, sensors pose two
specific challenges. First, standards to support inter-operability among sensors must be
addressed to minimize the cost to support and adapt new sensors as they come to market.
Second, and perhaps most important, security and privacy issues must be addressed to
ensure that sensors do not invade personal lives and property or intrude into the life-styles
and cultures of people throughout the world.
Funding for research and development of sensors is largely dependent on citizens’ tax
dollars. The more that the public is able to recognize the value of sensors beyond rare
emergency situations and obscure scientific research, the more likely that dollars will find
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-89
their way to continued research, development, and production of sensors. Furthermore,
many sensors require access to wireless broadband, an expensive and regulated
commodity. The more that the public is aware of the benefits of sensors, the more likely
they will support legislative policy resulting in increased access to the wireless broadband
communications necessary for sensor functionality.
5.6 Communities
A first step in expanding outreach and education regarding sensors is identifying their
potential uses and users. Sensors can benefit the global society in the following areas:
The Military and National Security
The most easily recognizable use of sensors is that of detecting dangerous environments.
Sensors can detect chemical and biological toxins and explosives in the air and water. For
example, pervasive sensors could detect minute amounts of nerve gas or anthrax,
initiating a response and evacuation prior to a person showing signs of illness.
Crisis Preparation, Mitigation, Management, and Response
Pervasive sensors in places such as buildings, subways, trains, ships and airplanes can
allow authorities to monitor the environment at all times, quickly alerting them to
potential hazards. When a disaster (such as an earthquake, tornado or explosion) does
occur, sensors already in place can enable rescue workers to better avoid dangers and
locate survivors. Sensors at remote disaster sites permit experts located around the world
to help on-site rescuers respond to a crisis.
Distance Learning
Sensors can expand educational opportunities to rural areas or between geographically
distanced places. Video, audio, temperature, and chemical sensors, integrated with
wireless mobile communications and computers, can permit students in a class in Arizona
to observe and study penguins in Antarctica. Study of the penguins could range from
merely observing them to studying the effect of swimming on their digestion or body
temperature. Students will be able to engage in authentic science using the same data
collected by scientists at the same time to conduct their own classroom studies and
experiments. Students will be better prepared to use these same tools and techniques in
their professional careers.
Health and Medicine
Sensors enable long-distance diagnosis and medical procedures. Sensors also provide a
less invasive means of detecting internal body conditions. Sensors can be swallowed and
transmit video, temperatures and chemical data from inside the digestive tract.
Academic Research
Sensors can provide data for ecological, environmental, biological, geological and
climate research, among others. Sensor networks are able to collect and transmit data
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-90
continuously in extreme environmental locations and conditions that would be dangerous
and expensive for scientists to travel to regularly.
Technology Influenced and Enabled Genres of Art and Music
Sensors permit the integration of the environment and real-time data with art. For
example, one recent exhibit used sensors to transmit a kite’s movement through air.
Using climate sensors, a room housing an art exhibit on the African Elephant could
mimic the temperature, humidity, and air movement of the Serengeti Plains as it cycles
through days and seasons.
International and Cultural Exchange
Sensors permit a new level of cultural exchange. For example, sensors could detect the
Australian didgeridoo’s effects on airwaves and buildings in order to not only transmit
the sound, but also the feeling of the instrument to people in Uzbekistan. Body sensors
can recreate the movement sensation of dancers in Turkey for observers and learners in
Tanzania.
Remote Communication
One of the most important benefits of increased sensor use is the effect of increased
access to wireless communication capabilities for rural areas. Sensors in remote locations
are not very useful if the data cannot be transmitted to computers and scientists.
Therefore, sensor users are continually working to establish wireless broadband
capabilities in rural areas.
Commercial and Industrial
Aside from increased safety with constant environmental monitoring in industrial and
commercial environments, as sensor use grows, it creates new business opportunities and
competition in sensor development and production. This in turn makes sensor use
available for the general public.
5.7 Funding
There are several distinct areas relating to funding and support that need to be addressed.
A key area is to decide who will fund the expense of installing the various sensor systems
that will be developed to help homeland security.
This workshop sought to explore the commonality of interests between the field scientists
and homeland security community. By designing components that can be used by both
groups, we can use the power of mass production to reduce the cost of systems
tremendously.
It seems obvious that governments, at all levels, will play a major economic role in the
development of sensor networks. Of primary importance in the government funding of
these systems are the Federal agencies tasked with a role in crisis management as
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-91
evidenced by their responsibilities to the National Response Center. Also relevant are
agencies involved in weather, environmental and ecological monitoring. All of these
agencies already support the development work through their usual budgetary
mechanisms for grants and contracts, and by using innovative programs like the Small
Business Innovative Research program (SBIR). An important example of the role that the
Federal government can play is the NSF-supported High Performance Wireless Research
and Education Network. 1
Each state, through its National Guard, environmental, natural resources and other
agencies, must play a role in defining, designing, developing and deploying a persistent
monitoring infrastructure for homeland security. Local governments and independent
agencies, such as turnpike authorities, bridge and tunnel authorities, harbor authorities
and universities and research facilities, must keep homeland security issues in mind when
planning their systems. Also, the various first responder groups hold a large stake in the
development of the homeland security infrastructure.
Additionally, the private sector has a major role to play in the design, development and
deployment of pervasive sensor systems. It will probably be the private sector which, in
the long run, will actually produce and deploy the necessary systems. However, in the
shorter run, buildings and equipment, whether public or private, must be monitored
against physical, biological or chemical intrusion, and systems of various types against
wear and degradation in performance. Also, many major public (water, sewer, transit,
etc.) systems are built, and in some cases maintained and operated by the private sector,
which in such cases, assumes many of the concerns identified with local governments
(above).
For some time, steps have been underway to facilitate improved international
coordination in response to major disasters (floods, earthquakes, epidemics,
environmental disasters, etc.). One of the positive developments after September 11,
2001 has been the response of the international community to accelerating and improving
such efforts. Countries that not too recently were hostile toward each other have begun to
talk of joint security measures since it is clear that every nation is vulnerable to terrorist
attack as well as natural disasters. It seems evident that, in this context, the broad
deployment of networked sensor systems can do much to help anticipate, detect and
improve response to such problems.
5.8 Recommendations
A serious effort must be made to educate people about the importance of security and in
using security as a regular part of their communications.
1
http://hpwren.ucsd.edu.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-92
At the same time, the technology of security must be made even more transparent and
embedded into systems so that users are not disadvantaged in using it. As part of this
effort, we need to develop a lightweight IPSec.
We need to provide incentives so that scientists who collect data in the field will share
this data with other scientists and homeland security researchers.
We need to vigorously pursue a spread spectrum bill of rights for software defined radios.
It seems clear that the effectiveness of homeland security is based on unlicensed radio,
especially in rural areas. An interesting article on this issue is Free the Airwaves! by
Kevin Werbach. 1
1
This is available on the Web in various places including
http://www.edventure.com/conversation/article.cfm?Counter=5774525
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-93
Chapter 6. Proposed Additional Workshops
We have placed conclusions in the chapters where they were most relevant. Here we
collected the recommendations for additional workshops. It is clear that the first
workshop was only a good start, and that much additional work needs to be done. To this
end, we propose that the following workshops be developed by in the near future. The
workshops are listed in order ranging from ones that are primarily technological in nature
to ones that are primarily societal and political in nature.
Workshop #1: Low Power Technology for Sensors
One of the chief constraints on deploying sensors is getting enough power to them. There
are two complementary approaches to this problem: developing better power sources and
reducing the power consumption at the sensor package. A workshop dedicated to these
issues seems of utmost importance.
Workshop #2: Wireless Sensor System Architecture
This workshop will focus on designing interoperable modular sensor systems. Some chief
design requirements will be that systems be survivable. Some specific topics that need to
be explored are the use of software and hardware agents, techniques of data gathering,
transmission, storage and archiving. Data processing and data mining are also of great
interest.
Workshop #3: Advanced Visualization Technologies
With dramatic increases in the amount of data being collected, it becomes imperative to
display this data as effectively as possible. There are many non-trivial questions to be
examined in connection with this task. One of these questions is melding sensor data with
the simulations in virtual reality environments.
Workshop #4: Security and Privacy
The increased needs for security seem to clash directly with people's desires for privacy.
It is essential to have a workshop that will focus on these issues and produce concrete
recommendations for how the new sensor-equipped environments of the future can be
designed to respect the privacy of individuals.
Workshop #5: Intellectual Property Workshop – Ownership of Data
Of great importance is the question of who owns the data that is collected by these new,
extensive sensor systems that will be built. These issues are currently being dealt with in
an ad hoc manner. It is essential that a systematic approach be taken.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page- 94
Workshop #6: Crisis Management
While our initial workshop touched somewhat on the issues of crisis management, its
main focus was on sensor systems. We recommend that there be a workshop that
examines the practical issues of crisis management from the view of local and state
governments, the Federal government, first responders, influential agencies, and nongovernmental organizations (NGOs).
Workshop #7: Outreach and Education
There is much to do in educating the research and crisis management communities in the
capabilities and uses of sensors and related systems. Such a workshop can survey
available technologies, describe their costs and performances, survey capital and
operational costs, and cover legal and societal factors relating to the use of such
technologies.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page- 95
Appendix A
Biographies of Speakers
Gregory Bonito is an ecosystem scientist with a focus on soil and biogeochemical
processes. Currently, he is Research Assistant with the LTER (Long Term Ecological
Research) Network Office and is involved in creating a resource/database on
environmental in situ sensors.
Capt Dennis "Mike" Egan is a graduate of the USCG Academy (1972). He completed
the Adm. Rickover program at MIT (1977) with an MS in Mechanical Engineering and
the Professional Degree of Ocean Engineer. He graduated from the Naval War College
(CNCS) and Salve Regina College in 1987 with MA degrees in Strategic Analysis of
National Security and International Relations respectively. In 1991 he graduated from the
Sloan School of Management at MIT, as a Sloan Fellow with a MS degree in
Management with emphasis on Negotiation.
He served on six different Arctic and Antarctic deployments and was the Engineer
Officer of the icebreakers Northwind and Polar Star. During a follow-on assignment as
the Naval Engineer of the Second Coast Guard District in St. Louis, MO he was
recognized as the Coast Guard's Federal Engineer of the Year and received the Federal
Energy Award for innovative design and construction of new, integrated Coast Guard
barges and new modular configuration towboats that were the first river tenders to carry a
mixed gender crew.
Following graduation from the Naval War College, he served as the Coast Guard's
Liaison to the Republic of the Philippines during the first two years of the Aquino
Administration (1987-1989) and was posted at the Joint US Military Assistance Group as
the J-2 and Support Division Officer. He served as Vessel Support Branch Chief at
MLCLANT (1989-1990) and was appointed as a Sloan Fellow (MIT). He served as a
member of the Commandant's Strategic Planning Staff and was detailed to the staff of
Vice President Al Gore as a Special Assistant to the Director of the National Performance
Review (NPR) (1992-1994), for which service he received the Legion of Merit.
He served as Commander, Group Honolulu and Base Commanding Officer of CG
facilities at Sand Island, Honolulu. During his tour (1994-1996), his units distinguished
themselves in several major AMIO cases, inter-island counter-narcotics cooperative
actions with state and local authorities, and over 500 search and rescue cases. He was
transferred to the Seventeenth Coast Guard District as the Chief of the Maritime Plans
and Policy Division where he also coordinated regional Russian and Canadian programs.
In addition, he served as the Alaska Regional Response Team Co-Chairman, Exercise
Director of Exercise Northern Edge (1997-1999), the First Spill of International
Significance Exercise in Sakhalin, Russia (1998) and Chairman of the D17 Intelligence
Coordination Council. He transferred to Commandant (G-OPF) in August 1999. Captain
Egan is a registered Professional Engineer and a Lifetime member of the US Naval
Institute.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-96
During the periods of Y2K and the disastrous events of 9-11, he served as the Chief of he
Coast Guard's National Command Center and the National Response Center, the nation's
first alert and notification center for weapons of mass destruction and terrorist attack. He
served as the Coast Guard's senior contingency planner during the weapons of mass
destruction national exercise TOPOFF and was a co-founder of the Multi-Sector Crisis
Management Consortium, bridging the world of research and cutting edge
communications and information technology with the world of the practical emergency
responder. He recently retired from the Coast Guard after over 34 years and now is Chief
Scientist and Director of Homeland Security Intermodal Transportation at the System
Planning Corporation in Arlington, VA.
Rich Holm holds a B.S .in electrical engineering and M.S. in nuclear engineering from
the University of Illinois. He served in the United States Navy as a nuclear trained
Machinist Mate/Engineering Laboratory Technician for eight and a half years. During
that period he was an Engineering Watch Supervisor aboard a nuclear submarine and an
instructor in chemistry, radiological controls, mechanical and hydraulic systems at a
nuclear prototype unit. He has worked as a consultant to Northern States Power
Company and the International Atomic Energy Agency developing training programs in
health physics and nuclear engineering.
Mr. Holm is currently the reactor administrator for the University of Illinois Nuclear
Reactor Laboratory. He is responsible for all aspects of the operation and safety of the
University of Illinois Advanced TRIGA and LOPRA nuclear reactors including the
following: compliance with Technical Specifications and Federal regulations, license
amendments, safety evaluations, equipment/system design changes and experiment
review and authorization. He also performs special projects for the College of
Engineering including coordinating activities for the University of Illinois Program for
Security Technology.
Dave Hughes is a partner of Old Colorado City Communications, a Colorado Springs,
Colorado, USA Internet ISP, which does research and consulting in advanced forms of
wireless data communications. His company has been located since 1984 in the Old
Colorado City District of westside Colorado Springs.
Hughes is a West Point graduate, Class of 1950, who served in the Korean and Vietnam
wars, was a researcher and staff officer in the Office of the Secretary of Defense in the
1960s. He retired as Colonel, US Army, in 1973. He has been researching, developing,
and operating, online dial up, or wirelessly connected systems since 1979. He has
assembled a variety of communication systems in rural areas such as the Big Sky
Telegraph system in Montana in the late 1980's.
In 1998 Wired Magazine named Hughes one of the leading "Wired 25" pioneers in the
world. He consulted for the Congressional Office of Technology Assessment in 1990 and
more recently advised the Federal Communications Commission (FCC) use of wireless
for education under the 1996 Telecommunications Act. He is a lecturer worldwide. He
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-97
published most recently in the April 1998 issue of Scientific American and the MIT Press
'First Hundred Feet' compendium in May 1999.
In 1993 Hughes was awarded the Telecommunications Pioneer Award in by the
Electronic Frontier Foundation (EFF) of Washington, DC for his effective work in grass
roots connectivity. He informally assisted the Puerto Rican Office of Management and
Budget when it started its Wireless Project in 1997. He has been an invited speaker at the
Puerto Rican Governor's Conferences on Information Technologies in 1998 and 1999.
For the past 4 years he has been the Principal Investigator for 4 National Science
Foundation projects doing Field Tests of advanced wireless technologies for education
particularly no-license spread spectrum devices.
He designed a novel Field Science by Wireless Project for educators in Lewistown
Montana, in 1997-98, and directed the implementation of Wireless connectivity for
educational and science institutions in Ulaanbataar, Mongolia in 1995-96.
He has been sought out after as a lecturer and conference panelist worldwide for the past
20 years. He is currently Principal Investigator for a 3 year NSF project that will model
Field Science by solar powered wireless connections from remote sensors in frigid
climates and tropical rain forests to the Internet, in support of biological sciences and
environmental monitoring.
Tim Kratz is a Senior Scientist at the Center for Limnology at University of WisconsinMadison and Director of the Center’s Trout Lake Station in northern Wisconsin. He is an
ecosystem ecologist with interests in the long-term landscape ecology of lakes, landwater interactions, and lake biogeochemistry. He is a Co-Principal Investigator of the
North Temperate Lakes Long-Term Ecological Research project. Over the past several
years he has been involved with developing and deploying instrumented buoys to
measure various physical, chemical, and biological dynamics of lakes.
William Lane is currently the Chief Technologist of Wireless Telecommunications
Bureau for the Federal Communications Commission.
Since January 1999, Mr. Lane was the Chief Scientist with Femme Comp Incorporated
and served on the staff of the Director for Information Systems for Command, Control,
Communications and Computers (DISC4) at Headquarters, Department of the Army,
where he was responsible for the Joint Tactical Radio System Program.
Previously, he completed a career as a US army Signal Corps Officer culminating with
the rank of Colonel and assignment as the Deputy Head of the Department of Electrical
Engineering and Computer Science at the United States Military Academy. His
assignments and responsibilities included a broad range of tactical communications
ranging from special operations to division and corps level communications as well as
strategic level communications with the former Defense Communications Agency. In
addition, he served as an Instructor in the Electrical Engineering Department at the
United States Military Academy and as the Special Projects Officer for the Chief of the
Army Section of the Joint United States Military Mission for Aid to Turkey.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-98
He received his Ph.D. from the Georgia Institute of Technology, his MBA degree from
Long Island University, and his BS degree from the United States Military Academy. He
is a senior member of the Institute for Electrical and Electronics Engineers (IEEE) AND
IS A registered Professional Engineer in the state of Virginia.
George Markowsky is currently Professor and Chair of the Computer Science
Department at the University of Maine. He is also the Chair of the Mathematics &
Statistics Department. George Markowsky has published 69 papers on various aspects of
Computer Science and Mathematics. He has written an additional 19 technical reports
and 6 books on various aspects of computing. He also holds a patent on mechanisms that
implement Universal Hashing. His interests range from pure mathematics to the
application of mathematics and computer science to biological problems.
He has also built voice controlled and enhanced keyboard terminals for use by paralyzed
individuals. George Markowsky received a grant from NSF to found the Agent Institute
at the University of Maine to focus research on agent-based computing. He is also a co-PI
on the University of Maine’s Internet 2 grant. George Markowsky served as the President
of the Maine Software Developers Association (MeSDA) since its inception in spring
1993 until May 1998. The Association has grown from 18 members to over 200 and now
employs a full-time Executive Director. MeSDA works closely with companies and state
agencies to promote the development of the software industry in Maine.
George Markowsky founded a software company, Trefoil Corporation in February 1994.
Trefoil Corporation developed the O*NET software for the U. S. Department of Labor
that will replace the Dictionary of Occupational Titles. The O*NET software was
released nationally in 1998. In addition, Trefoil has handled tasks ranging from software
reengineering and testing, to the marketing of a product called PC-Pedal™. Trefoil is
currently working on a Phase II SBIR for the National Institutes of Health.
Since that time he has founded several companies, including Ayers Island, LLC, which is
developing a research/commercialization complex two miles from the university of
Maine on a 63-acre island, and Maine Venture Capital. He served as Secretary of the
Multi-Sector Crisis Management Consortium from 2001 through 2003. For details about
the projects cited above and others check: http://www.umcs.maine.edu/~markov.
David J. Nagel graduated (magna cum laude) from the University of Notre Dame (B.S.
in Engineering Science 1960), and performed graduate work at the University of
Maryland (M.S. in Physics 1969, and Ph.D. in Engineering Materials 1977). During
active duty with the Navy, he was Navigator aboard the USS ARNEB on OPERATION
DEEPFREEZE (1960-2), and then served as a Technical Liaison Officer at the Naval
Research Laboratory (NRL) (1962-4). After joining the civilian staff of the NRL in 1964,
he held positions of increasing responsibility as a Research Physicist, Section Head,
Branch Head and, finally, Superintendent of the Condensed Matter and Radiation
Sciences Division. In the last position, he was a member of the Senior Executive Service,
and managed the experimental and theoretical research and development efforts of 150
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-99
government and contractor personnel. At the NRL, Dr. Nagel’s research interests
centered on radiation physics, especially x-ray spectroscopy, and on materials sciences,
with applications to materials analysis, plasma diagnostics, integrated circuit production,
environmental studies, "cold fusion", and MicroElectroMechanical Systems (MEMS).
He has written or co-authored over 150 technical articles, reports, book chapters and
encyclopedia articles. He is lead-author of a patent on x-ray lithography, which formed
the basis of a 100-person startup company in Rochester NY.
After serving as Commanding Officer of three Reserve units and the national Technology
Mobilization Program, Dr. Nagel retired as a Captain in the United States Naval Reserve
in 1990. He left Government Service, and became a Research Professor in the School of
Engineering and Applied Science of The George Washington University, in 1998. He is
now working on the development and applications of MEMS and microsystems for the
military and other sectors, with special attention to radio frequency and acoustic systems.
Robert Nowak managed advanced energy technologies projects aimed at reducing the
logistics, weight, and volume burden of military power sources while lowering acoustic
and thermal signatures for the Defense Advanced Research Project Agency (DARPA).
Advanced battery and capacitor technology, mobile electric power, portable power, and
energy harvesting projects have been and are supported by this program. Rechargeable
lithium batteries and capacitor efforts have been transitioned to the Army and Air Force
for further development for specific mission needs. The mobileMElectric Power Program
succeeded in producing fuel processing technology that can process high sulfur content
diesel and jet fuels for use in large (tens of kilowatts) fuel cell systems. This program has
been transitioned to the Navy, who, in cooperation with the Coast Guard and other
agencies, is developing fuel cell systems for shipboard use. Recent projects are portable
power and energy harvesting. The portable power effort seeks to develop highperformance, logistically fueled power sources in the range of hundreds of watts. For
lower power ranges, other fuels, such as methanol and novel hydrogen sources, are being
integrated with small fuel cells; however, logistics fueled systems are preferred by the
military and are the long-term goal of these programs. The Energy Harvesting Program
seeks new concepts to reduce or eliminate the dependence on batteries in smallunattended sensors or soldier systems by accumulating energy from environmental
sources for immediate or deferred use. Prior to his tenure with DARPA, Dr. Nowak was a
program manager at the Office of Naval Research and managed the Navy's basic research
program in electrochemistry as well as undersea propulsion programs. He was a staff
scientist and section head at the Naval Research Laboratory. He received postdoctoral
training at the University of North Carolina, Chapel Hill, a doctorate in chemistry from
the University of Cincinnati, and bachelor's and master's degrees from Oakland
University in Rochester, Michigan.
Leslie D. Owens is currently employed as the Technical Director, Wireless Security for
the Global Professional Services group of Nortel Networks. In this role, he is responsible
leading the development of global wireless security solutions sets and for security support
to ensure solution sets offer security capabilities within the Wireless Internet segment.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-100
Prior to joining GPS, Mr. Owens was Principal Security Architect / Strategist and
Director, Network Security Services within the Enterprise Solutions organization. He was
responsible for defining the cross-product security strategy and security implementation
in the Nortel enterprise voice and data products. He worked with security architects and
product line managers in the various product groups to determine consistent, robust, and
interoperable security features to ensure the end-to-end security of Nortel products. Prior
to joining Nortel, Mr. Owens was responsible for the strategic development and
implementation of the overall enterprise-wide network security and fraud management
program for Iridium LLC, its gateways and service providers worldwide. Before Iridium,
Mr. Owens established and led AT&T Wireless Services’ nationwide, cross-divisional
network security efforts. For 5 years, at GTE Laboratories, Mr. Owens was involved in
applied cryptography and security research for GTE’s wireless and wireline business
units, directed the cellular industry’s fraud laboratory and chaired the US digital cellular
security group. Earlier experience includes quick-reaction digital logic and
microprocessor design work at the National Security Agency. Mr. Owens has been
involved in network security and fraud control for more than 15 years. He has published
and spoken both nationally and internationally on network security and fraud control and
holds four patents and has 4 patents pending on inventions for fraud control,
cryptography and network security. Mr. Owens is a writer and editor for Wireless
Security Perspectives (www.cnp-wireless.com) and is an Adjunct Professor in Computer
Science at Georgetown University. Mr. Owens holds a BS in Electrical Engineering from
Virginia Tech, an MS in EE from George Washington University, and completed all
except the dissertation for a Ph.D. in EE from Northeastern University.
Larry Smarr was the founding director of NCSA and the National Computational
Science Alliance, while a professor of astronomy and physics at the University of Illinois
at Urbana-Champaign.
In August 2000, he moved to the University of California San Diego, where he is a
professor of computer science and engineering. In December 2000, he became the
founding director of UC's California Institute for Telecommunications and Information
Technology, which has a focus on the software, wireless, and photonic technologies
necessary for extending the capabilities of the Internet into a global grid. He is a member
of both the President's Information Technology Advisory Committee and the Advisory
Committee to the Director of NIH. He is also a Member of the National Academy of
Engineering, and a Fellow of the American Physical Society and the American Academy
of Arts and Sciences.
Jim Wilson of Georgetown University is a pediatrician with extensive experience with
infectious diseases and remote sensing (e.g., correlation of climatic and vegetation
changes with outbreaks of disease such as Ebola, Rift Valley Fever and VEE).
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-101
Appendix B
Biographies of Participants
Alexander Akhmanov is Head of the department and Senior Scientist in the Institute on
Laser and Information Technologies, Russian Academy of Sciences ( ILIT RAS). (1999 to present date).
Bill Bellamy is a former member of the EPA Drinking Water Advisory Committee and is
a recognized expert in water treatment technology and policy issues. He is also an expert
in disinfection, which is a significant aspect of water system security, as well as in
chemical contaminants. Bill is very knowledgeable about the specific agents that are of
concern from a drinking water perspective, the effectiveness of current water treatment
technologies in removing such constituents, and system vulnerabilities.
Michael R. Chritton RISS ESH&Q Manager from CH2M HILL.
Kevin Fall, Research Computer Scientist at Intel Research lab, Berkley. You can see
some of the work at http://tinyos.millennium.berkeley.edu/ .
Kevin Gamble - ADEC (American Distance Education Consortium). He is a non-profit
ISP for universities – especially research scientists - connecting to the Internet via
Satellites – such as Tachyon systems. He spoke at the Organization of Biological Field
Stations in September, with lots of info on costs, technical challenges and choices.
http://www.adec.edu/satellite-resources.html.
Brad Hutchens is a Senior Project Manager/Environmental Engineer in the Directorate
of Health Risk Management of the US Army Center for Health Promotion and Preventive
Medicine (USACHPPM). He is primarily responsible for environmental surveillance
for military deployments and is the Program Manager for European Command (EUCOM)
environmental surveillance. Currently he directs environmental method development
initiatives for military deployments at USACHPPM and has developed the “Deployment
Environmental Surveillance Database” which has become the template for the
Department of Defense Occupational Health Readiness System (DOHRS) environmental
module. Mr. Hutchens’ past professional experience includes directing environmental
field surveys, and sampling and evaluating of military sites. This included environmental
sampling in support of Ballistic Missile Defense incentives. He is also experienced in
conducting environmental compliance inspections and has conducted environmental
compliance and sampling training. He has a bachelor’s degree in Civil Engineering from
Virginia Polytechnic Institute and State University and a master’s degree in
Environmental Engineering from Johns Hopkins University. He is a registered
Professional Engineer in the State of Maryland.
Anna Komarova is Professor of Linguistics, Head of the Department of Foreign
Languages for Geography (1996- to present date) - Lomonosov Moscow State
University.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-102
Richard E. Morley is best known as the father of the programmable controller and is the
leading visionary in the field of advanced technological development. He is also an
entrepreneur whose consistent successes in the founding of high technology companies
has been demonstrated through more than three decades of revolutionary achievements.
Mr. Morley is the recipient of the Franklin Institute's prestigious Howard N. Potts Award
and is an inductee of the Automation Hall of Fame. He holds more than twenty US and
foreign patents, including those for the parallel inference machine, the hand-held
terminal, the programmable logic controller and magnetic thin film.
Using his studies in physics at the Massachusetts Institute of Technology as a
springboard, Dick Morley has become an internationally recognized pioneer in the fields
of computer design, artificial intelligence, automation and technology trend forecasting.
As an inventor, author, consultant and engineer, Dick Morley has provided the Research
and Development community with world changing innovations.
For many years, Dick Morley was a contributing columnist to Manufacturing Systems
Magazine. He has also written articles for magazines and journals worldwide including
Manufacturing Automation Magazine. In recognition for his ground breaking
contributions, Mr. Morley has received numerous awards and honors from such diverse
groups as Inc. Magazine (Entrepreneur of the Year), and the Society of Manufacturing
Engineers (Albert M. Sargent Progress Award)
Dick Morley lives on a farm in New Hampshire and works out of a renovated barn on his
property. He has raised over two dozen children and loves skiing. He drives a 1995
Chevrolet Impala SS and rides a Harley-Davidson Sturgis motorcycle.
John Porter is a Research Assistant Professor of Environmental Sciences at the
University of Virginia. He works with the Virginia Coast Reserve Long-Term Ecological
Research Project, which, with the help David Hughes and Tom Williams, has established
an Internet-connected wireless network linking research, sites on Hog Island (8 miles off
the Eastern Shore of Virginia). For additional information, see the project web site at:
http://www.VCRLTER.virginia.edu.
Janet Thot-Thompson, Director ACCESS Center. Janet is the National Center for
Supercomputing Applications Associate Director for the Alliance Center for
Collaboration, Education, Science and Software (ACCESS). She helped conceptualize,
design, deploy, and now manages this advanced technology and learning center in
Arlington, Virginia for the National Computational Science Alliance (the Alliance). The
Center opened April 1999. See: http://calder.ncsa.uiuc.edu/ACCESS/
Additionally, she is the Acting Executive Director for the Multi-Sector Crisis
Management Consortium (http:// www.mscmc.org). The MSCMC is a 501-C (3) nonprofit tax-deductible organization.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-103
ACCESS is a high-end computing, communications and information technology center
for technology demonstration, presentation, training, digital video collaboration and
distance learning Center for the Alliance. The center helps showcase advanced and
emerging software, hardware, and communications technologies from across the
Alliance. The National Computational Science Alliance (Alliance) is a partnership among
more than 50 academic, government, and industrial organizations from across the United
States to prototype an advanced computational infrastructure for the 21st century. This
model infrastructure, called the Grid, will link together advanced supercomputers,
visualization environments, and mass storage devices into a powerful, flexible problemsolving environment.
Janet has more than 29 years of experience managing customer service organizations in
both the private and public sectors and as a director for two technology centers. She was
an active participant with the U.S. National Performance Review to reinvent government
through advanced technologies, specifically the Reinvention Laboratory, RegNet, and has
given numerous presentations before professional associations. Software Publishing
Corporation recognized her work in March 1999 in the Washington Post and in
Government Computer News in March 1991 for innovative, systematic application of
software. She was also recognized in Federal Computer Week in numerous articles as
the founding member and Chair of the World Wide Web Federal Consortium during
1995-1996. Ms. Thot-Thompson received the second highest honor granted by the
Nuclear Regulatory Commission to an individual, the Meritorious Service Award,
received for Management Excellence. She was a panel member at the National Press
Club March 23, 2000 "cyber cocktail" on the future of the Internet. She coauthored (with
Mary Bea Walker, NCSA Senior Research Scientist and Karen S. Green, NCSA
Assistant Director of Communications) a white paper on Innovative Collaborative
Learning and Research Environments in Academia and Government: Developing the
NCSA ACCESS Center. Most recently she consulted with the Asian Development Bank
(ADB) in Manila, Philippines, and presented on advanced technologies and use of
potential applications to reduce poverty. As a result, ADB is budgeting to join the MultiSector Crisis Management Consortium and also for an ACCESS-like advanced
technology center.
As Acting Executive Director for the Multi-Sector Crisis Management Consortium, she is
dedicated to harnessing the power of supercomputing, communications, and advanced
applications and visualization development to enhance international crisis management
prevention, mitigation, response and consequence management activities.
Michael Wartell is a chemistry Professor and the chairman of the Defense Intelligence
Agencies Science Board.
Anytime, Anywhere, Any Size and Any Signal Workshop Proceedings
page-104