HVAC(Heating, Ventilating and Air Conditioning) system is one of the biggest environment-maintaining systems inside a building, and also the most power consuming system . It is crucial to control the usage of HVAC systems in order to reduce overall power consumption.
In this project, we design an airflow sensor node, which is capable to measure air velocity, temperature and humidity. The sensor node is able to log and transmit data via wireless link.
The airflow sensors proposed in this project will greatly help the control of HVAC systems, by
In order to make the node suitable for existing HVAC systems deployment, we need to make the node as small as possible, and as lasting as possible, without loosing accuracy. U.S. Household Electricity Report, http://www.eia.doe.gov/emeu/reps/enduse/er01_us.html [ Details ]
Although the HVAC (Heating, Ventilation and Cooling) system dominate the total power consumption of modern buildings, the IT equipments from PCs to network and server equipment are becoming an increasing contributor to energy bills and carbon emissions. Recent study also shows that much of the energy consumption is due to the IT infrastructure. In a typical office where desktop computers make up a substantial component of working area, the energy savings would have been potentially remarkable if users could be made aware of energy using as well as wasting, and an effective strategy was employed to intelligently control these computers.
In this project, we propose a monitoring and actuation platform to address this issue. Our platform is essentially a system that incorporates several function modules including data sampling, data visualization, notification, analysis and control. The contribution of our platform can be divided into two aspects. One is that we organize meter/sensor data stream efficiently and present them in a way that clients can easily access them. The other is that we analyze the meter/sensor data and build an effective profile model for each user to predict the subjects activities, and further control subjects computer accordingly to reduce unnecessary energy waste. We demonstrate that our approach achieve a 12% energy savings on average. In addition, the rate of accuracy for prediction of occupant activities using our model reaches approximately 90%.[ Details ]
Building sensor networks poses challenges of secure routing, node authentication, data integrity, data confidentiality and access control that are faced in conventional wireless and wired networks as well. In the realm of sensor networks these problems are even more challenging due to the resource constraint nature and the scale of these networks. Only recently, researchers have started developing customized cryptographic solutions for sensor networks. However, current security mechanisms for sensor networks focus on external attacks. They fail to protect against internal attacks where a subset of sensor nodes are compromised. Due to lack of physical security and tamper resistance, adversaries can recover the embedded cryptographic material from these nodes and subsequently pose as authorized nodes in the network. A wide variety of sensor network applications such as forest fire monitoring, anti terrorism, bio/chemical agent monitoring etc. falls into the broad class of sense-response applications, where the system objective is to collaboratively detect the events and report the event detection back to the base station. The detection of an event is followed by some physical response such as sending special personnel, vehicles etc. to the location of the event. Compromised nodes can inject false data about non-existent events and authenticate them correctly to the user using their keys (false positive attacks), or stall the reporting of real events (false negative attacks). Thus, there is a need for developing a secure event reporting protocol.
Cryptographic keys form the backbone of any security protocol; the scale and ad-hoc deployment of nodes coupled with the ability of adversaries to easily recover the cryptographic materials make it a challenging problem to solve. In general the efficacy of any key establishment strategy needs to be gauged on the basis of both security metrics such as resiliency against node capture, node replication, access control measures and also on the complexity aspect such as scalability, storage etc. Existing key establishment techniques rely on a deterministic or probabilistic pre-distribution of keys in the network, trading off its performance on one metric with the other. We believe that a more apt approach in the realm of sensor networks is to derive them deterministically at runtime based on a single master key and unique physical attributes of the nodes.
Although cryptography and authentication help, they alone are not sufficient for the unique characteristics and novel misbehaviors encountered in sensor networks. We believe that in general tools from different domains such as economics theory, statistics and data analysis will have to be combined with cryptography for the development of trustworthy sensor networks. Fundamental to this is the observation that sensor network applications are based on collective interaction between a large numbers of nodes, which do collaborative data gathering, collective data/information processing, and multi-hop data delivery. This decentralized in-network decision-making, which relies on the inherent trust among the sensor nodes, can be abused by internal adversaries to carry out security breaches while generating information. An adversary can potentially insert bogus data to mislead the whole network! Clearly, cryptographic mechanisms alone cannot be used to solve this problem as adversarial nodes can use valid cryptographic keys to authenticate bogus data. Besides malicious attacks, the two other system characteristics that hinder the development of high integrity sensor networks are system faults and sensing channel inconsistencies. Sensor nodes are currently made of cheap hardware components, highly vulnerable to system malfunctioning. Non-malicious behavior such as radios/sensors going bust can also result in the generation of bogus data, bringing equally detrimental effects to the functioning of the whole network. Another distinguishing trait of sensor networks is there strong coupling with the physical world. This gives rise to a unique opportunity for adversaries, whereby instead of abusing the network, they can insert bogus data into the network by abusing the physical world. The very nature of these attacks is completely outside the realm of cryptography. [ Details ]
Many sensor network systems expose general interfaces to system developers for dynamically creating and/or manipulating resources of various kinds. While these interfaces allow programmers to accomplish common system tasks simply and efficiently, they also admit the potential for programmers to mismanage resources, for example through leaked resources or improper resource sharing. These kinds of errors are particularly problematic for sensor networks, given the resource constraints and lack of memory protection on current sensor platforms.
Lighthouse is a static analysis technique that brings the safety of static resource management to systems that dynamically manage resources. Our analysis is based on the observation that sensor network applications often manipulate resources in a producer-consumer pattern. In this style, each resource has a unique owner component at any given point in time, who has both the sole capability to manipulate the resource and the responsibility to properly dispose of the resource or transfer ownership to another component. Our analysis enforces this ownership discipline on components at compile time.Lighthouse Website [ Details ]
There has been a dramatic shift in sensor networks towards the study of motile and mobile systems. Consider the classic target application of such a network – monitoring. Whether it's a forest fire, a platoon of soldiers, or a cosmic phenomenon, the overriding approach involves cheap nodes deployed throughout the area of interest. However, static sensor nodes suffer from numerous drawbacks. The pragmatic issues of network deployment, coverage holes, and sub-optimal density lend great credence to the addition of mobility.
Implementing these modern sensor networks requires a different design philosophy from traditional robotics. By convention, this field emphasizes the capability of a single robot; in contrast, mobile sensor nets leverage teams of coordinated entities. Estrin, et.al. conclude that two key requirements emerge: "support for very large numbers of unattended autonomous nodes and adaptivity to environment and task dynamics." In designing mobile sensor network devices, we discover that the former is actually an implicit benefit while the latter imposes significant design challenges.
Ragobot is the latest mobile sensor node to meet these constraints. Ragobot is smaller than most fully-navigable robots. and is more heavily instrumented (video capture, audio capture, processing, and playback, IR collision avoidance, IR cliff detection, RFID read/write, inertial navigation, and more) and mechanically advanced (capable of 34.9 degree vertical climb) than its smaller counterparts.[ Details ]
The emergence of pervasive networking technologies such as ZigBee and other low power radios, have opened up opportunities to apply wireless communication to several new applications. Control systems, earlier limited to wired star or bus topologies, may now use ad hoc wireless topologies where it facilitates deployment and maintenance. In this research we focus on a class of systems where a control operation is exercised over a system comprising of spatially distributed sensors and actuators that communicate through a wireless ad-hoc network. Such systems are emerging everywhere. A smart workspace that changes the lighting by sensing the user actions; A smart building that continuously reduces structural vibrations due to external disturbances; An intelligent irrigation system that micro-controls the soil conditions for precision agriculture. These are a few examples of a growing class of control applications.
A challenging issue for control over ad-hoc networks is the latency between sensor inputs and actuator outputs. Latency concerns can be addressed by operating the system in a distributed manner. However, an additional challenge then is to ensure coherent operation throughout the system without explicit central coordination. We design distributed ad hoc network algorithms to address these challenges.
A barrier to enabling end-to-end control applications is the difficulty in writing complex distributed embedded software for these systems. We provide a middleware service and a set of reusable components that abstract the low level timing and coordination details and provide an easy programming model for developers to quicly deploy their control applications.