Industrialised, Integrated, Intelligent sustainable Construction - I3con
Industrialised, Integrated, Intelligent sustainable Construction - I3con
Industrialised, Integrated, Intelligent sustainable Construction - I3con
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
SUSTAINABLE CONSTRUCTION HANDBOOK 2<br />
138<br />
• WSN tasking to enable configuring sensor nodes for data collection by means of the tasking<br />
middleware.<br />
The WSN architecture assumes the role of service provider as far as data collection and information<br />
management is concerned. This justifies the need for a WSN service interface to be defined and<br />
exposed to the SOA infrastructure, in order to hide the complexity and heterogeneity of the<br />
underlying WSNs.<br />
The WSN architecture is implemented over two sensor platforms, i.e. the sensor node and the<br />
gateway, while at a higher layer of abstraction a Server entity (i.e. Virtual Gateway) is responsible for<br />
managing the WSN nodes. A gateway essentially is a network-bridging device, which connects each<br />
WSN zone to the Intranet/enterprise network. The Virtual Gateway is made aware of various WSN<br />
zones available in the enterprise building and their respective zone gateways by accessing a topology<br />
map. When applications/services require interaction with the WSN architecture as a whole, this occurs<br />
through the relevant WSN service interface that interacts with the Virtual Gateway. The Virtual<br />
Gateway is equipped with an enterprise middleware layer, which is responsible for communicating<br />
with the WSN service interface of the SOA. We used a web services model that constitutes a means<br />
for various software platforms to interoperate, without any prerequisite regarding platform and<br />
framework homogeneity being necessary. A WSN environment is essentially a collection of resources<br />
(i.e. sensors) that continuously monitor their environment (i.e. get measurements). We have therefore<br />
defined a REST-based (REpresentational State Transfer) style SOA to enable integration of the WSN<br />
with enterprise services [5], [6], [7].<br />
By exploiting the aforementioned architecture, an external application has been developed to monitor<br />
the operational health of WSN, identify possible operational problems in the network, and display<br />
these to administrators via a web-based user interface. The application also enables the structure of<br />
the WSN to be browsed through the user interface. The application is regarded as a consumer of WSN<br />
data and a service provider to the external clients (managers or occupants) in the SOA paradigm. The<br />
application assumes that the WSN is comprised of one or more wired gateways, with each gateway<br />
servicing a number of wireless motes in a zone. A mote may contain several sensors, each sampling a<br />
different quantity, e.g. light, temperature, humidity, presence, CO2, etc. Associated with each sensor is<br />
a collection of measurements, each with a time-stamp and a value.<br />
The remainder of this paper is structured as follows. Section 2 briefly describes the WSN generic<br />
security issues and implementation of an access control service. Section 3 provides a brief overview<br />
of related work and then describes the design and configuration of WSN health monitoring<br />
application. Section 4 provides the instructions for the operation of the application. Section 5<br />
discusses the interface of the application to the virtual gateway for accessing to the required data. A<br />
brief summary is given in Section 6.<br />
WSN Security and Access Control Service<br />
Before explaining the WSN health monitoring application that we have developed, here, we briefly<br />
discuss the WSN security as an important and related aspect to the health of WSN. Given the<br />
vulnerabilities of WSNs, security is a highly desirable and necessary function, depending on the<br />
context and the physical environment in which a sensor network may operate [13].<br />
Since WSNs use wireless communications, they are vulnerable to attacks, which are rather simpler to<br />
launch when compared to the wired environment [14]. Many wired networks benefit from their<br />
inherent physical security properties. However, wireless communications are difficult to protect; they<br />
are by nature a broadcast medium, in which adversaries can easily eavesdrop on, intercept, inject, and<br />
alter transmitted data. In addition, adversaries are not restricted to using sensor network hardware.<br />
They can interact with the network from a distance by using radio transceivers and powerful<br />
workstations. Sensor networks are vulnerable to resource consumption attacks. Adversaries can<br />
repeatedly send packets to waste the network bandwidth and drain the nodes’ batteries. Since sensor<br />
networks are often physically deployed in less secure environments, an adversary can steal nodes,