Wireless integrated network sensors, Commun. ACM, vol.43, issue.5, pp.51-58, 2000. ,
Picoradio supports ad hoc ultra-low power wireless networking, Computer, vol.33, issue.7, pp.42-48, 2000. ,
A survey on sensor networks, Communications Magazine, IEEE, vol.40, issue.8, p.6, 2002. ,
Real-time communication and coordination in embedded sensor networks, Proceedings of the IEEE, vol.91, issue.7, pp.1002-1022, 2002. ,
Wireless Sensor Networks: A Networking Perspective, vol.2, p.4, 2009. ,
, Wireless Sensor Networks, p.4, 2010.
, Fundamentals of Wireless Sensor Networks: Theory and Practice, 2004.
, Wireless Sensor Networks: Technology, Protocols, and Applications, 2007.
Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet, 2002. ,
A line in the sand: A wireless sensor network for target detection, classification, and tracking, Comput. Netw, vol.46, issue.5, pp.605-634, 2004. ,
Wireless sensor network design for tactical military applications : Remote large-scale environments, Military Communications Conference, pp.1-7, 2009. ,
Topology control, Topology Control in Wireless Sensor Networks, pp.61-70, 2009. ,
,
Investigating the energy consumption of a wireless network interface in an ad hoc networking environment, INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, vol.3, pp.1548-1557, 2001. ,
Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks, Wirel. Netw, vol.8, issue.5, pp.481-494, 2002. ,
,
Cross-layer scheduling for power efficiency in wireless sensor networks, INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, vol.3, pp.1740-1750, 2004. ,
Pamas—power aware multiaccess protocol with signalling for ad hoc networks, SIGCOMM Comput ,
, Commun. Rev, vol.28, issue.3, pp.5-26, 1998.
Mac protocols for wireless sensor networks: a survey, Communications Magazine, IEEE, vol.44, issue.4, pp.115-121, 2006. ,
Design and evaluation of a versatile and efficient receiver-initiated link layer for low-power wireless, Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems, ser. SenSys '10, pp.1-14, 2010. ,
An adaptive energy-efficient and low-latency mac for tree-based data gathering in sensor networks: Research articles, Wirel. Commun. Mob. Comput, vol.7, issue.7, p.109, 2007. ,
Versatile low power media access for wireless sensor networks, Proceedings of the 2Nd International Conference on Embedded Networked Sensor Systems, ser. SenSys '04, vol.9, p.79, 2004. ,
An adaptive energy-efficient mac protocol for wireless sensor networks, Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, ser. SenSys '03, vol.21, p.42, 2003. ,
Medium access control with coordinated adaptive sleeping for wireless sensor networks, IEEE/ACM Trans. Netw, vol.12, issue.3, p.42, 2004. ,
X-mac: A short preamble mac protocol for duty-cycled wireless sensor networks, Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, ser. SenSys '06, vol.27, p.79, 2006. ,
Mac essentials for wireless sensor networks, Commun. Surveys Tuts, vol.12, issue.2, pp.222-248, 2010. ,
A survey of beacon-enabled ieee 802.15.4 mac protocols in wireless sensor networks, Communications Surveys Tutorials, IEEE, vol.16, issue.2, pp.856-876 ,
, Low-rate wireless personal area networks (lr-wpans) amendment 1: Mac sublayer, IEEE Std, vol.4, p.16, 2012.
An energy-efficient low-latency multi-sink mac protocol for alarm-driven wireless sensor networks," in Wireless Systems and Mobility in Next Generation Internet, ser. Lecture Notes in Computer Science, vol.4396, pp.87-101, 2007. ,
, , p.42
Energy-efficient, collision-free medium access control for wireless sensor networks, Wireless Networks, vol.12, issue.1, p.42, 2006. ,
Supporting bursty traffic in wireless sensor networks through a distributed advertisement-based tdma protocol (atma), vol.40, p.42, 2012. ,
Risk management in intrusion detection applications with wireless video sensor networks, IEEE WCNC, vol.12, p.43, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00530724
Improving the ieee 802.15.4 slotted csma/ca mac for timecritical events in wireless sensor networks, Proc. of the 2nd Workshop on Real Time Networks, vol.19, pp.574-579, 2006. ,
Medium access control with a dynamic duty cycle for sensor networks, Wireless Communications and Networking Conference, vol.3, p.22, 2004. ,
iqueue-mac: A traffic adaptive duty-cycled mac protocol with dynamic slot allocation, Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2013 10th Annual IEEE Communications Society Conference on, pp.95-103, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00905822
Implementation and performance evaluation of nanomac; a low power mac solution for high density wireless sensor networks, Int. J. Sen. Netw, vol.2, issue.5/6, pp.341-349, 2007. ,
Energy and latency control in low duty cycle mac protocols, p.25, 2005. ,
Wisenet: an ultralowpower wireless sensor network solution, Computer, vol.37, issue.8, p.108, 2004. ,
Spatial tdma and csma with preamble sampling for low power ad hoc wireless sensor networks, Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02) ,
, , p.685, 2002.
The contikimac radio duty cycling protocol, p.27, 2011. ,
Aloha with preamble sampling for sporadic traffic in ad hoc wireless sensor networks, IEEE International Conference on, vol.5, p.28, 2002. ,
The aloha system: Another alternative for computer communications, Proceedings of the, pp.281-285, 1970. ,
Z-mac: A hybrid mac for wireless sensor networks, IEEE/ACM Transactions on, vol.16, issue.3, p.38, 2008. ,
Randomized dining philosophers to tdma scheduling in wireless sensor networks, Tech. Rep, p.30, 2004. ,
Qos for wireless sensor networks: Enabling service differentiation at the mac sub-layer using cosens, Ad Hoc Networks (II), vol.10, p.109, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00645512
An implicit prioritized access protocol for wireless sensor networks, Real-Time Systems Symposium, 2002. RTSS 2002. 23rd IEEE, vol.33, pp.39-48, 2002. ,
A new approach to channel access scheduling for ad hoc networks, Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, ser. MobiCom '01, pp.210-221, 2001. ,
, Wireless Sensor Networks, ser, Lecture Notes in Computer Science, vol.3868, p.35, 2006.
Pedamacs: power efficient and delay aware medium access protocol for sensor networks, Mobile Computing, vol.5, p.35, 2006. ,
Firefly: A cross-layer platform for real-time embedded wireless networks, Real-Time Syst, vol.37, issue.3, pp.183-231, 2007. ,
Pr-mac: Path-oriented real-time mac protocol for wireless sensor network, Embedded Software and Systems, ser. Lecture Notes in Computer Science, vol.4523, pp.530-539, 2007. ,
Dual-mode real-time mac protocol for wireless sensor networks: A validation/simulation approach, Proceedings of the First International Conference on Integrated Internet Ad Hoc and Sensor Networks, ser. InterSense '06, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00405095
,
An asynchronous scheduled mac protocol for wireless sensor networks, Computer Networks, vol.57, issue.1, p.79, 2013. ,
Ultra-low duty cycle mac with scheduled channel polling, Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, ser. SenSys '06, pp.321-334, 2006. ,
A hybrid mac protocol for emergency response wireless sensor networks, Ad Hoc Networks, vol.20, issue.0, p.42, 2014. ,
Dw-mac: A low latency, energy efficient demand-wakeup mac protocol for wireless sensor networks, Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, ser. MobiHoc '08, vol.38, p.66, 2008. ,
Rmac: A routing-enhanced duty-cycle mac protocol for wireless sensor networks, INFOCOM 2007. 26th IEEE International Conference on Computer Communications, vol.38, pp.1478-1486, 2007. ,
A predictive duty cycle adaptation framework using augmented sensing for wireless camera networks, ACM Trans. Sen. Netw, vol.10, issue.2, 2014. ,
A wireless sensor networks mac protocol for real-time applications, Personal Ubiquitous Comput, vol.12, issue.2, pp.111-122, 2008. ,
Adv-mac: Analysis and optimization of energy efficiency through data advertisements for wireless sensor networks, Ad Hoc Netw, vol.9, issue.5, p.41, 2011. ,
A low-latency and energy-efficient mac protocol for cooperative wireless sensor networks, Global Communications Conference (GLOBECOM), p.41, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00931828
Delay of intrusion detection in wireless sensor networks, Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, ser. MobiHoc '06, pp.155-165, 2006. ,
Wireless image sensor networks: event acquisition in attack-prone and uncertain environments, Multidimensional Systems and Signal Processing, vol.20, pp.135-164, 2009. ,
,
Evaluation of coordination strategies for heterogeneous sensor networks aiming at surveillance applications, Sensors, vol.46, pp.591-596, 2009. ,
Priority-based node selection and scheduling for wireless multimedia sensor networks, Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on, vol.46, pp.151-158, 2010. ,
Experimental evaluation of a video streaming system for wireless multimedia sensor networks, Ad Hoc Networking Workshop (Med-Hoc-Net), vol.46, pp.165-170, 2011. ,
A survey of intrusion detection systems in wireless sensor networks, Communications Surveys Tutorials, IEEE, vol.16, issue.1, pp.266-282, 2014. ,
Connected sensor cover: self-organization of sensor networks for efficient query execution, IEEE/ACM Transactions on, vol.14, issue.1, pp.55-67, 2006. ,
Unreliable sensor grids: coverage, connectivity and diameter, INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, vol.2, p.46, 2003. ,
Differentiated surveillance for sensor networks, Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, ser. SenSys '03, pp.51-62, 2003. ,
Probabilistic approach to provisioning guaranteed qos for distributed event detection, INFOCOM 2008. The 27th Conference on Computer Communications, p.47, 2008. ,
Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications, Journal of Network and Computer Applications, vol.34, issue.2, p.59, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00530355
Performance study of multiple cover-set strategies for mission-critical video surveillance with wireless video sensors, Wireless and Mobile Computing, Networking and Communications (WiMob), vol.48, p.50, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00530727
Scheduling randomly-deployed heterogeneous video sensor nodes for reduced intrusion detection time, Distributed Computing and Networking, ser. Lecture Notes in Computer Science, vol.6522, pp.303-314, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00530743
Network lifetime and stealth time of wireless video sensor intrusion detection systems under risk-based scheduling, Wireless and Pervasive Computing (ISWPC), vol.54, pp.1-6, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-01093548
Low cost wireless image sensor networks for visual surveillance and intrusion detection applications, 12th IEEE International Conference on Networking, Sensing and Control (ICNSC), p.57, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01912903
An image sensor board based on arduino due and ucamii camera ,
Schedule adaptation of low-power-listening protocols for wireless sensor networks, Mobile Computing, vol.9, p.79, 2010. ,
, Mission critical intrusion detection system
, The communication protocol stack
, Multiple camera system developed in our team's work, p.12
17 2.2 IEEE 802.15.4 beacon-enabled SuperFrame structure, vol.18 ,
, 20 2.4 TMAC downsizes active period lengths to further save energy. The arrows in the figure indicate transmitted and received frames
23 2.6 The basic idea of the iQueue-MAC. A variable TDMA period and a CSMA period are integrated to handle adaptive traffic, p.24 ,
, Conceptual depiction of WiseMAC [36]
, An example of XMAC: Source node A transmitting to Destination node B
29 2.10 A data gathering tree and its DMAC implementation, p.30 ,
, An example of how CoSenS works [43]
, , p.33
,
,
,
, The Behavior curve functions
, Bezier curve for high-criticality level
, Bezier curve for low-criticality level
, Image sensor built with Arduino (Due or MEGA) and uCAM camera 57
, Criticality model having criticality level of 0.8 adapted to the image sensor hardware
, Criticality model having criticality level of 0.2 adapted to the image sensor hardware
, Node's frame capture rate under the criticality scheduling with criticality level 0
, Node's frame capture rate under the criticality scheduling with criticality level of 0
Mission-critical intrusion detection system, p.65 ,
Active and Sleep periods of the MAC layer, p.66 ,
Sentry node selection at the end of phase 1, p.67 ,
,
, Duty cycle of follower nodes
, , p.70
73 4.9 Number of acknowledgements received per intrusion for sentry node 10 74 4.10 Number of sentries whose alerts are acknowledged by 1, 2, 3 or 4 followers 74 4.11 Number of missed alert messages, vol.87 ,
71 5.1 Total consumed power in Joules for all 5 follower nodes per cycle (3000 ms) ,