12.02.2013 Views

Industrialised, Integrated, Intelligent sustainable Construction - I3con

Industrialised, Integrated, Intelligent sustainable Construction - I3con

Industrialised, Integrated, Intelligent sustainable Construction - I3con

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SUSTAINABLE CONSTRUCTION HANDBOOK 2<br />

138<br />

• WSN tasking to enable configuring sensor nodes for data collection by means of the tasking<br />

middleware.<br />

The WSN architecture assumes the role of service provider as far as data collection and information<br />

management is concerned. This justifies the need for a WSN service interface to be defined and<br />

exposed to the SOA infrastructure, in order to hide the complexity and heterogeneity of the<br />

underlying WSNs.<br />

The WSN architecture is implemented over two sensor platforms, i.e. the sensor node and the<br />

gateway, while at a higher layer of abstraction a Server entity (i.e. Virtual Gateway) is responsible for<br />

managing the WSN nodes. A gateway essentially is a network-bridging device, which connects each<br />

WSN zone to the Intranet/enterprise network. The Virtual Gateway is made aware of various WSN<br />

zones available in the enterprise building and their respective zone gateways by accessing a topology<br />

map. When applications/services require interaction with the WSN architecture as a whole, this occurs<br />

through the relevant WSN service interface that interacts with the Virtual Gateway. The Virtual<br />

Gateway is equipped with an enterprise middleware layer, which is responsible for communicating<br />

with the WSN service interface of the SOA. We used a web services model that constitutes a means<br />

for various software platforms to interoperate, without any prerequisite regarding platform and<br />

framework homogeneity being necessary. A WSN environment is essentially a collection of resources<br />

(i.e. sensors) that continuously monitor their environment (i.e. get measurements). We have therefore<br />

defined a REST-based (REpresentational State Transfer) style SOA to enable integration of the WSN<br />

with enterprise services [5], [6], [7].<br />

By exploiting the aforementioned architecture, an external application has been developed to monitor<br />

the operational health of WSN, identify possible operational problems in the network, and display<br />

these to administrators via a web-based user interface. The application also enables the structure of<br />

the WSN to be browsed through the user interface. The application is regarded as a consumer of WSN<br />

data and a service provider to the external clients (managers or occupants) in the SOA paradigm. The<br />

application assumes that the WSN is comprised of one or more wired gateways, with each gateway<br />

servicing a number of wireless motes in a zone. A mote may contain several sensors, each sampling a<br />

different quantity, e.g. light, temperature, humidity, presence, CO2, etc. Associated with each sensor is<br />

a collection of measurements, each with a time-stamp and a value.<br />

The remainder of this paper is structured as follows. Section 2 briefly describes the WSN generic<br />

security issues and implementation of an access control service. Section 3 provides a brief overview<br />

of related work and then describes the design and configuration of WSN health monitoring<br />

application. Section 4 provides the instructions for the operation of the application. Section 5<br />

discusses the interface of the application to the virtual gateway for accessing to the required data. A<br />

brief summary is given in Section 6.<br />

WSN Security and Access Control Service<br />

Before explaining the WSN health monitoring application that we have developed, here, we briefly<br />

discuss the WSN security as an important and related aspect to the health of WSN. Given the<br />

vulnerabilities of WSNs, security is a highly desirable and necessary function, depending on the<br />

context and the physical environment in which a sensor network may operate [13].<br />

Since WSNs use wireless communications, they are vulnerable to attacks, which are rather simpler to<br />

launch when compared to the wired environment [14]. Many wired networks benefit from their<br />

inherent physical security properties. However, wireless communications are difficult to protect; they<br />

are by nature a broadcast medium, in which adversaries can easily eavesdrop on, intercept, inject, and<br />

alter transmitted data. In addition, adversaries are not restricted to using sensor network hardware.<br />

They can interact with the network from a distance by using radio transceivers and powerful<br />

workstations. Sensor networks are vulnerable to resource consumption attacks. Adversaries can<br />

repeatedly send packets to waste the network bandwidth and drain the nodes’ batteries. Since sensor<br />

networks are often physically deployed in less secure environments, an adversary can steal nodes,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!