Abstract
Although previous bio-inspired models have concentrated on invertebrates, such as ants, mammals, such as primates with higher cognitive function, are valuable for modeling the increasingly complex problems in engineering. Understanding primates’ social and communication systems and applying what is learned from them to engineering domains will likely lead to solutions to a number of problems. Scent-marking is an important behavior among primates and many other mammals. In this article, inspired by primates’ scent-marking activity, we propose and study a collaboration strategy for mobile and static sensors with RFID tags, where mobile sensors can be treated as robots or mobile actuators and can leave information to direct others to find them. Mobile sensors are equipped with RFID tags (or sensors) that can be deployed whenever needed, and RFID tags (or sensors) carry related information for other robots to pick up. We propose several primate-inspired communication mechanisms, including delayed-and-relayed and scent-trail communication among robots. We analytically model and simulate scent-trail communication. We also study a tracking and pursuing scheme of mobile sensors using simulations in terms of robot speeds, searching function, deployment density, turning function, and so on. We assume that robots (mobile sensors or mobile actuators) are capable of deploying/throwing-out sensors/RFID tags.
- Abrams, Z., Goel, A., and Plotkin, S. 2004. Set k-cover algorithms for energy efficient monitoring in wireless sensor networks. In Proceedings of the International Symposium on Information Processing in Sensor Networks (IPSN). Google Scholar
Digital Library
- Amundson, I., Sallai, J., Koutsoukos, X., Ledeczi, A., and Maroti, M. 2011. RF angle of arrival-based node localization. Int. J. Sens. Netw. 9, 3/4, 209--224. Google Scholar
Digital Library
- Arienzo, L. and Longo, M. 2011. Energy-efficient collaborative tracking in wireless sensor networks. Int. J. Sens. Netw. 9, 3/4, 124--38. Google Scholar
Digital Library
- Azad, A. P. and Chockalingam, A. 2011. Enhancing lifetime of wireless sensor networks using multiple data sinks. Int. J. Sens. Netw. 9, 3/4, 139--157. Google Scholar
Digital Library
- Boubiche, D. and Bilami, A. 2011. HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering. Int. J. Sens. Netw. 10, 1/2, 2011, 25--35. Google Scholar
Digital Library
- Brass, P. 2007. Bounds on coverage and target detection capabilities for models of networks of mobile sensors. ACM Trans. Sens. Netw. 3, 2. Google Scholar
Digital Library
- Dias, M. B. and Stentz, A. 2000. A free market architecture for distributed control of a multirobot system In Proceedings of the 6th International Conference on Intelligent Autonomous Systems (IAS). 115--122.Google Scholar
- Dixson, A. F. and Brancoft, J. 1998. Primate Sexuality. Oxford University Press, 14--50.Google Scholar
- Fiorie, A. D., Link, A., and Stevenson, P. R. 2006. Scent marking in two western Amazonian populations of Woolly monkeys (Lagothrix Lagotricha). Amer. J. Primatology 68, 637--649.Google Scholar
Cross Ref
- Gupta, H., Das, S., and Gu, Q. 2003. Connected sensor cover: Self organization of sensor networks for efficient query execution. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). Google Scholar
Digital Library
- Jaggi, N. and Kar, K. 2011. Multi-sensor activation for temporally correlated event monitoring with renewable energy sources. Int. J. Sens. Netw. 10, 1/2, 42--58. Google Scholar
Digital Library
- Jedermann, R., Becker, M., Gorg, C., and Lang, W. 2011. Testing network protocols and signal attenuation in packed food transports. Int. J. Sens. Netw. 9, 3/4, 2011, 170--181. Google Scholar
Digital Library
- Kafetzoglou, S. and Papavassiliou, S. 2011. Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies. Int. J. Sens. Netw. 10, 1/2, 23--13. Google Scholar
Digital Library
- Krontiris, I. and Dimitriou, T. 2011. Scatter---Secure code authentication for efficient reprogramming in wireless sensor networks. Int. J. Sens. Netw. 10, 1/2, 14--24. Google Scholar
Digital Library
- Lewis, R. J. 2006. Research article scent marking in Sifaka: No one function explains it all. Amer. J. Primatology 68, 622--636.Google Scholar
Cross Ref
- Li, F. 2011. Adaptive resource allocation in multiuser cooperative networks with proportional rate constraints. Int. J. Sens. Netw. 10, 1/2, 104--110. Google Scholar
Digital Library
- Liu, C., Wu, K., Xiao, Y., and Sun, B. 2006. Random coverage with guaranteed connectivity: Joint scheduling for WSNs. IEEE Trans. Parall. Distrib. Syst. 17, 6, 562--575. Google Scholar
Digital Library
- Lu, J. and Suda, T. 2007. Differentiated surveillance for static and random mobile sensor networks. In Proceedings of the IEEE Gobal Communications Conference (GLOBECOM). 1102--1107.Google Scholar
- Lu, L., Wu, J. C., and Chen, S. 2011. A cluster-based algorithm for redundant nodes discovery in dense sensor networks. Int. J. Sens. Netw. 10, 1/2, 59--72. Google Scholar
Digital Library
- Majumdar, A. and Ward, R. K. 2011. Increasing energy efficiency in sensor networks: Blue noise sampling and non-convex matrix completion. Int. J. Sens. Netw. 9, 3/4, 158--169. Google Scholar
Digital Library
- Miao, L., Qi, H., and Wang, F. 2005. Self-deployable mobile sensor networks for on-demand surveillance. In Proceedings of SPIE, vol. 5778, 496.Google Scholar
- Morreale, P., Qi, F., and Croft, P. 2011. A green wireless sensor network for environmental monitoring and risk identification. Int. J. Sens. Netw. 10, 1/2, 73--82. Google Scholar
Digital Library
- Olteanu, A., Xiao, Y., Wu, K., and Du, X. 2010. Weaving a proper net to catch large objects in wireless sensor networks. IEEE Trans. Wirel. Comm. 9, 4, 1360--1369. Google Scholar
Digital Library
- Peng, M., Xiao, Y., and Wang, P. 2009. Error analysis and kernel density approach of scheduling sleeping nodes in cluster-based wireless sensor networks. IEEE Trans. Veh. Technol. 58, 9, 5105--5114.Google Scholar
Cross Ref
- Poornima, A. S. and Amberker, B. B. 2011. PERSEN: Power-efficient logical ring based key management for clustered sensor networks. Int. J. Sens. Netw. 10, 1/2, 94--103. Google Scholar
Digital Library
- Rao, R. and Kesidis, G. 2004. Purposeful mobility for relaying and surveillance in mobile ad hoc networks. IEEE Trans. Mobile Comput. 3, 3, 225--232. Google Scholar
Digital Library
- Shakkottai, S., Srikant, R., and Shroff, N. 2003. Unreliable sensor grids: Coverage, connectivity and diameter. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM).Google Scholar
- Shen, C., Hong, Y.-W. P., Chao, C., and Yang, S. 2011. Editorial. Int. J. Sens. Netw. 9, 3/4, 121--123.Google Scholar
- Simmons, R., Apfelbaum, D., Burgard, W., Fox, D., Moors, M., and Thrun, S. 2000. Coordination for multi-robot exploration and mapping. In Proceedings of the National Conference on Artificial Intelligence (AAAI). Google Scholar
Digital Library
- Smuts, B. B., Cheney, D. L., and Seyfarth, R. M. 1987. Primate societies. In The National Academies, 400--500.Google Scholar
- Soliman, H. and Al-Otaibi, M. 2011. Enhancing AODV routing protocol over mobile ad hoc sensor networks. Int. J. Sens. Netw. 10, 1/2, 36--41. Google Scholar
Digital Library
- Snowdon, C. T., Brown, C. H., and Peterson, M. R. 1985. Primate Communication. Cambridge University Press, 283--293.Google Scholar
- Taniguchi, Y., Kitani, T., and Leibnitz, K. 2011. A uniform airdrop deployment method for large-scale wireless sensor networks. Int. J. Sens. Netw. 9, 3/4, 182--191. Google Scholar
Digital Library
- Tran, T. D., Agbinya, J. I., and Al-Jumaily, A. A. 2011. Per node deployment based detection of controlled link establishment attack in distributed sensor networks. Int. J. Sens. Netw. 9, 3/4, 192--208. Google Scholar
Digital Library
- Tseng, C., Lee, S., Prasad, N. R., and Wódczak, M. 2011. Editorial. Int. J. Sens. Netw. 10, 1/2, 1--2.Google Scholar
- Wang, L. and Xiao, Y. 2006. A survey of energy-efficient scheduling mechanisms in sensor networks, ACM/Springer Mob. Netw. Appl. 11, 5, 723--740. Google Scholar
Digital Library
- Wodczak, M. 2011. Autonomic cooperative networking for wireless green sensor systems. Int. J. Sens. Netw. 10, 1/2, 83--93. Google Scholar
Digital Library
- Wu, K., Gao, Y., Li, F., and Xiao, Y. 2005. Lightweight deployment-aware scheduling for wireless sensor networks. ACM/Springer Mob. Netw. Appl. 10, 6, 837--852. Google Scholar
Digital Library
- Xiao, Y. and Liang, X. 2009. Bio-inspired communications among robots, sensors, and RFID tags. In Proceedings of the IEEE International Conference on Mechatronics and Automation (ICMA). 3573--3578.Google Scholar
- Xiao, Y. and Zhang, Y. 2009. Surveillance and tracking system with collaboration of robots, sensor nodes, and RFID tags. In Proceedings of the 18th International Conference on Computer Communications and Networks (ICCCN). Google Scholar
Digital Library
- Xiao, Y. and Zhang, Y. 2011a. Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags. Wireless Comm. Mob. Comput. (Special Issue Emerging Techniques for Wireless Vehicular Communications). John Wiley & Sons. To appear. Google Scholar
Digital Library
- Xiao, Y. and Zhang, Y. 2011b. A critical line based boundary surveillance strategy in wireless sensor networks. Telecomm. Syst. J. (Special Issue on Challenges in Next-Generation and Resource-Constrained Networks). To appear.Google Scholar
- Xiao, Y., Chen, H., Wu, K., Sun, B., Zhang, Y., Sun, X., and Liu, C. 2010. Coverage and detection of a randomized scheduling algorithm in wireless sensor networks. IEEE Trans. Comput. 59, 4, 507--521. Google Scholar
Digital Library
- Yamauchi, B. 1998. Frontier-based exploration using multiple robots. In Proceedings of the 2nd International Conference on Autonomous Agents. 47--53. Google Scholar
Digital Library
- Zhang, Y. and Xiao, Y. 2009a. A boundary surveillance strategy based on critical line in wireless sensor networks. In Proceedings of the IEEE International Conference on Mechatronics and Automation (ICMA). 459--464.Google Scholar
- Zhang, Y. and Xiao, Y. 2009b. Primate-inspired scent marking for mobile and static sensors and RFID tags. In Proceedings of the 18th International Conference on Computer Communications and Networks (ICCCN). Google Scholar
Digital Library
- Zhang, Y. and Xiao, Y. 2011. A patrolling scheme in wireless sensor and robot networks. In Proceedings of the 3rd International Workshop on Wireless Sensor, Actuator and Robot Networks (WiSARN) in conjunction with IEEE INFOCOM.Google Scholar
- Zhang, Y., Xiao, Y., and Bales, K. L. 2009. Primate social systems, scent-marking, and their applications in mobile and static sensor networks. Int. J. Sens. Netw. 5, 4, 210--222. Google Scholar
Digital Library
- Zlot, R. M., Stentz, A., Dias, M. B., and Thayer, S. 2002. Multi-robot exploration controlled by a market economy. In Proceedings of the IEEE International Conference on Robotics and Automation.Google Scholar
Index Terms
Primate-Inspired Communication Methods for Mobile and Static Sensors and RFID Tags
Recommendations
Robot Navigation System with RFID and Sensors
CDCIEM '12: Proceedings of the 2012 International Conference on Computer Distributed Control and Intelligent Enviromental MonitoringThe paper proposed a method enable robot to navigate in indoor space is indicated. The system use RFID tags as landmarks to locate the robot. A topological map corresponding to the real environment is used for robot navigation. The robot goes along the ...
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
SAC'05: Proceedings of the 12th international conference on Selected Areas in CryptographyThe ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the tag attached to it, changes hands during the course of its lifetime. After ...
Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags
Sensor networks are adopted in many surveillance applications. A traditional method for such applications is to deploy sensor nodes all over the surveillance region in order to cover as much area as possible. However, this way not only waste huge ...






Comments