An Integrated Communications Framework for ...

2 downloads 0 Views 942KB Size Report
598–603. [16] S. H. Lo, C. H. Wu, and Y. C. Chung, “Cooperative localization with ... has been involved in several European Space Agency (ESA) and INTELSAT.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 4, MAY 2009

379

An Integrated Communications Framework for Context Aware Continuous Monitoring with Body Sensor Networks Francesco Chiti, Member, IEEE, Romano Fantacci, Fellow, IEEE, Francesco Archetti, Enza Messina, and Daniele Toscani Abstract—This paper deals with a wireless pervasive communication system to support advanced healthcare applications. The proposed system is based on an ad hoc interaction of mobile body sensor networks with independent wireless sensor networks already deployed within the environments in order to allow a continuous and context aware health monitoring for patients along their daily life scenarios with an unprecedented precision and flexibility of sensing. After an accurate protocol characterization, simulation results are provided, underlining remarkable performance with respect to existing solutions, for different mobility models and node density values. Index Terms—Body Sensor Networks, Context Awareness, Communications Protocols, Localization.

I. I NTRODUCTION VER the past decade, the miniaturization and cost reduction brought about by the semiconductor industry have made feasible the realization of smaller and more powerful computers, paving the floor to the ubiquitous computing era. Similarly, advances in wireless communication, sensor design, and energy storage technologies have enabled the concept of a truly pervasive wireless Body Sensor Network (BSN) to rapidly become affordable [1]. This specialized family of WSN has the potential to reshape the general practice of clinical medicine by supporting a continuous health monitoring and diagnostic. In fact, the mere monitoring of the patients in a hospital, an intensive care unit or simply an ambulatory might not be able:

O

1) to capture exceptional episodes or transient abnormalities during real life physiological states; 2) to prevent the onset of a fatal illness initially for at-risk patients; Manuscript received 24 July 2008. This work was supported in part by This work was supported in part by the EU STREP FP6-IST-045299-STREP “DustBot,” by MIUR-FIRB Integrated System for Emergency “InSyEme” project under the grant RBIP063BPH and by by the Italian National Project “Wireless multiplatfOrm mimo active access netwoRks for QoS-demanding muLtimedia Delivery (WORLD),” under grant number 2007R989S. F. Chiti and R. Fantacci are with the Department of Electronics and Telecommunications - University of Florence, via di S. Marta 3, 50139 Florence, Italy phone: +39-055-4796270; fax: +39-055-494569 (e-mail: [email protected]). F. Archetti and E. Messina are with the DISCO- Department of Computer Science, Systems and Communication, University of Milano Bicocca, viale Sarca, 336, Building U14, 20126 Milan, Italy; phone: +39-0264487833; fax: +39-0266106842 (e-mail: [email protected]). D. Toscani is with Consorzio Milano Ricerche, Via Cozzi 53, 20125 Milan, Italy; phone: +39 02 66119011; fax: +39 0266106842 (e-mail: [email protected]). Digital Object Identifier 10.1109/JSAC.2009.090503.

3) to support long term rehabilitation or therapies for chronicle diseases, as the personalized drug delivering with a continuous feedback; 4) to help applied life science research. This novel sensing paradigm involves a couple of key research topics that are still open; first of all, host mobility needs to be addressed and possibly managed by tracking the patient’s physical location in typical daily life environments (work, home entertainments). In addition to that, in order to improve the appropriateness of gathered data, information related to the context need to be extracted and correlated with the on body sensing. This property, usually referred as context awareness, could be achieved by means of spontaneous networking with WSNs embedded into different environments and idle as long as a mobile BSN is out of their range. To this purpose, the most relevant issues to be addressed are the efficient power management to prevent battery depletion by managing sleep and active states, an efficient use of directional antennas and localization information of mobile BSNs. As these aspects belong to both the Physical (PHY) and Medium Access Control (MAC) layers, they might be integrated to achieve overall energy efficiency: the way to accomplish this goal effectively relies on the so called crosslayer protocol design principle [2]. However, the increased system complexity needs to be addressed and possibly limited as well as the capability of quickly setting up an end-to-end communication path, even in the presence of unpredictable mobility. The paper is organized as follow: in Section II, the main features of context-aware sensing for health care applications are presented, whilst the characteristic of the proposed communications framework protocol are subsequently described. In particular, the overall functional architecture, the MDSTAR MAC protocol together with its cooperative localization capabilities are addressed in Section III. The overall communications protocol performance is presented, in terms of network life time gain, setup latency, collision probability in Section IV. Finally some conclusions are drawn explaining the future directions of the present research activity. II. C HALLENGES OF C ONTEXT-AWARE S ENSING Albeit context awareness in BSNs can tap the tool box developed for WSN, there are some specific needs which are to be met by ad hoc methods. First, in indoor environments, the quality of data can be significantly degraded in unpredictable

c 2009 IEEE 0733-8716/09/$25.00  Authorized licensed use limited to: Universita degli Studi di Firenze. Downloaded on June 18, 2009 at 06:51 from IEEE Xplore. Restrictions apply.

380

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 4, MAY 2009

ways since the absorbing effect of wall’s construction materials may interfere with high frequency radio signals: therefore we need an observation model general and robust enough to accommodate missing data, uncertain information and also malicious behaviors. Second, the state transition model must be flexible enough to capture the generally continuous nature of human behavior and to detect significant deviations from the common pattern of activities. The first step toward context awareness is exploratory data analysis consisting of clustering and feature selection. The clustering approach more suitable for BSN is Self Organizing Maps (SOM) driven by a k-means clustering [3], [4] which does not require fixing a priori the number of clusters. This approach is fairly general, basically unsupervised and does not need any prior information: this character is bound to make it relatively inefficient in that it does not exploit contextual information and training examples usually available in fields like health monitoring. For this reason, more principled approaches based on Bayesian theory have been recently suggested. To apply these methods, the minimum subsets of features which are relevant to recognize the context need to be selected. This also allows a reduction in data transmissions and therefore in energy consumption that is of paramount importance for wireless monitoring devices used in healthcare applications. The simplest Bayesian approaches are the nave classifiers which, based on the assumption of conditional independence of the features, can perform surprisingly well, but suffer when some features can be referred to multiple contexts [5]. In this paper we focus on more general probabilistic models of particular interest for pervasive communications systems to allow high quality healthcare. In particular, Bayesian Networks (BN), outlined in Section C , permits to have an unambiguous factorization of joint probability distributions. While BN are best suited for representing the causal interrelationships, Hidden Markov Models (HMMs) focus on representing the mechanism of context transition: the state sequence is hidden and only the observations are visible. HMMs can also be structured in multiple layers to model the hierarchical nature of complex human activities [6]. The advantages of these two approaches could be reaped using Dynamic Bayesian Networks: we have now tools, which will be discussed later on, for performing inference, probability updating and therefore context recognition also for streaming data. A further step not be discussed in this paper is the use of relational models which do not require problem instances to be independent identically distributed (iid [7]: BSNs due to their localized and highly correlated features seem to offer an ideal challenge for RDBN (Relational Dynamic Bayesian Networks). III. DYNAMIC C OMMUNICATIONS P ROTOCOLS A. Overall functional architecture The reference application scenario is a special case of the Ambient Intelligent (AmI) vision represented by a continuous and ubiquitous patient health monitoring. In particular, it is assumed the presence of at least one BAN comprised of heterogeneous sensors, worn by a person, and connected to

Fig. 1. Functional architecture pointing out the pervasive and context aware patient health monitoring.

a cluster head (CH) that is in charge of collecting and preprocessing data. Moreover, CH are able to dynamically connect with stand alone WSNs deployed in the environment and to interact with them in order to get a high degree of context awareness. In particular, some WSN nodes act as gateway allowing CH to remotely deliver data to a Remote Control Center (RCC). Within this module, priorities and rules are established enabling a Decision Support System (DSS) to achieve a situation awareness. At DSS, the data coming from BSN are organized into a Data Base (DB) which supports complex, intertemporal probabilistic queries and the basic function of localization, enabling tracking and detection of anomalous behavior and analysis of time-spatial correlations. The outcome of these applications allows inference of ADL (Activities of Daily Living), detection of anomalies and support to the operator the optimal diagnosis or treatment [8]. Within the operating strategy, BSNs can operate autonomously. The overall architecture is pointed out in Fig. 1. This involves a careful system design, with particular regard to the communications and control protocols. To this end, some promising issues to be addressed are the management of sleep and active states, the on board integration of directional antennas and the addressing of nodes mobility [9]. In particular, the adoption of smart antennas allows the gain maximization toward the desired directions by concentrating the energy in a smaller area 1 . In addition to this, the higher antenna gain might compensate the reduced coverage range due to higher frequencies (for realizing small size nodes) or preserve connectivity in networks and efficiently use the node energy thus increasing its lifetime. However, the increased system complexity needs to be limited; in particular, the requirements related to in vivo sensors miniaturization make feasible the adoption of directional antennas only on fixed WSN gateway hardware onboard. As these aspects belong to both the Physical (PHY) and Medium Access Control (MAC) layers, they might be integrated to achieve overall energy efficiency: it could be 1 This permits a transmitted power decreasing, a received power increasing, a power consumption reduction, a coverage range increasing and an error probability reduction.

Authorized licensed use limited to: Universita degli Studi di Firenze. Downloaded on June 18, 2009 at 06:51 from IEEE Xplore. Restrictions apply.

CHITI et al.: AN INTEGRATED COMMUNICATIONS FRAMEWORK FOR CONTEXT AWARE CONTINUOUS MONITORING

feasible by jointly managing the duty cycle and the transmitting (receiving) antenna gain, together with implicit nodes localization according to the context aware paradigm. The way to accomplish this goal effectively relies on the so called crosslayer protocol design principle [2], which allows effectively controlling the capability of quickly setting up an end-to-end communication path, even in the presence of unpredictable mobility. B. Proposed communications framework The proposed MD-STAR MAC protocol permits to achieve space-time synchronization for mesh topology in the presence of node or even sub-networks mobility, as it represent the more general case of ad hoc networking. According to the basic scheme (D-STAR) [10], each node (periodically sends to its neighbors its own phase φ, i.e., the time in which it will be available for data exchange (time synchronization). The destination node, upon the reception of a packet, can identify the relative angular position θ of the sender with respect to its own angular reference system (space synchronization). This information can be regarded as a ranging metric useful for localize the mobile BSN, i.e. its local data sink, as explained in Section III.C. Moreover the proposed protocol is inspired to the cross-layer principle as φ and θ are jointly used, whilst belonging to different layers (MAC and PHY, respectively). In addressing a scenario in which several sensor nodes usually worn by patients might be mobile, MD-STAR protocol has been presently introduced to allow dynamic joining of mobile nodes (i.e., the BSN CHs) with the fixed WSN gateways. The resulting topology is hybrid, as the higher tier nodes (CHs and gateways) form a mesh, while each sub-network maintains its original topology. The related state diagram is shown in Figure 2. According to it, every BSN CH wakes up independently, entering an initial idle mode (init), in which it remains for a time interval necessary to perform the elementary CPU operations and to be completely switched on (Tinit,j ). Then it enters the discovery phase trying to identify the neighbor WSNs via their gateways and to establish a logical synchronization with them. This represents the case of a patient entering a particular environment and trying to establish a connection with embedded WSNs. Within this phase, the operation mode of j-th node is duty cycled with a periodic alternation of listening and sleeping sub-periods, whose durations are Tl,j and Ts,j , respectively. For the sake of generality, it has been supposed that the generic j-th node has a specific frame period Tf,j = Tl,j + Ts,j , and duty cycle δj = Tl,j /Tf,j with j = 1, ..., N , where N is the total number of nodes in the network. Moreover, it has been assumed that the wake up time is randomly selected by each node. In the discovery phase each mobile node (sink) remains in a listening mode for a time interval Tset−up such that Tset−up ≥ maxj {Tf,j } and begins to broadcast one HELLO message to each angular sector (i.e., the coverage area within a certain side lobe) sending its ID and phase (and additionally a ranging metric). Then it waits for a fixed time duration τs in search of reply messages and switches to the following angular sector, repeating the procedure until Tset−up is expired. The

381

overall messages exchange related to the discovery phase is sketched in Figure 3. In particular, it has been assumed that Node A has two neighbors belonging to two different angular sectors. Node A begins the channel sensing procedure sending one HELLO message per angular sector. Upon the successful reception of this message, each node adds Node A to the list of its own active neighbors. The procedure is repeated until the discovery phase is expired, i.e., for a time interval Tset−up . This condition can be alternatively expressed as nf = Nf d , where nf is the number of frame periods spent from the beginning of the discovery phase and Nf d represents its maximum value, as shown again in Figure 2. Once the discovery phase is expired, each node enters the regime phase, according to Figure 2. Every associated node sends HELLO messages in a unicast way to the neighbors belonging to different angular sectors, according to the phase transmitted in previous HELLO message. In addition to that, several HELLO messages are sent in background with the proper period to potentially unknown neighbors lying in empty angular sectors. Moreover, during the regime phase, nodes are able to move within the operative area. In the following, a Random Waypoint Model (RWM) has been adopted with a velocity vc uniformly at random in the interval [vmin , vmax ]. As a mobile node reaches its intermediate waypoint, it stops for a predefined pause time (Tcp ) broadcasting a HELLO message per sector in search of connectivity by notifying its presence. Once Tc is expired, it keeps moving again. The channel access is managed by means of the carrier sense multiple access with collision avoidance (CSMA/CA) scheme, as specified in [11].This mechanism is very effective in reducing collisions, while the problem of hidden node [12] is still partially unsolved [13]. Each node remains in the regime phase until there is at least one neighbor, otherwise if there are no active neighbors (i.e., the number of empty angular sectors is equal to Ns ) 2 it reenters the discovery phase in search of connectivity. In Figure 4, the signaling occurring within the regime phase is pointed out following the previously introduced in the case of a mobile node. To complete the protocol characterization, whenever a node battery is depleted, this node turns off, entering an off phase. This is again represented in Figure 2. C. Cooperative Localization Protocols The quality of radio signals is affected by many factors in addition to the distance between transmitting and receiving devices; for instance, RSSI (Received Signal Strength Indication) and S/N (signal/noise ratio) are dependent on the number of walls or other obstacles, the relative humidity, interference with other RF devices, etc. All of these variables are usually unknown and make the location problem a challenging task in a real-world environment. Such problem is commonly solved using predictive statistical methods such as Bayesian Networks combined with Markov Chain Monte Carlo. In this paper we propose the use of Dynamic Bayesian Network in order to take into account not only the uncertainty but also the 2 It might be due to the fact that a node could have joined the network extremely late or even have changed its position.

Authorized licensed use limited to: Universita degli Studi di Firenze. Downloaded on June 18, 2009 at 06:51 from IEEE Xplore. Restrictions apply.

382

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 4, MAY 2009

non-descendants in the graph given the state of its parents. To each node Zi is associated a CPD (Conditional Probability Distribution) ΘZi |ΠZi = PB (Zi |ΠZi ), where ΠZi denotes the set of parents of Zi . Using the independence statements encoded in the network, the joint probability distribution is uniquely determined by these local conditional distributions [17]: PB (Z) =

k 

PB (Zi |ΠZi ) =

i=1

Fig. 2. Finite state machine description of the proposed MD-STAR protocol, involving the transitions occurring among init, discovery, regime, and off phases.

dynamic of the system and make fully use of the information given by the previous estimated localization. BNs and other probabilistic graphical models have been regarded as a tool for WSN configuration and management [14]. Only very recently Bayesian modeling has matured to the point of providing online computation of posterior probability, through sequential Monte Carlo methods, making possible their efficient application to complex dynamical models [15]. In this paper, following [16], we propose a scheme for dynamic localization based on Dynamic Bayesian Networks (DBN). We represent the area in which a BSN can move as a two dimensional space; to localize the BSN we need to know its position w.r.t. a set of N waypoints, whose coordinates are known (location-aware points). To this purpose, MD-STAR communications framework capabilities of self-diagnosis and message exchange can be used; once a mobile CH enters the the discovery phase, it broadcasts HELLO messages to all possible neighbor WSN gateways. This procedure can be regarded as a special case of multilateration approach according as each HELLO message contains the unique identifier i, 1 ≤ i ≤ N , of its emitter and an implicit information concerning the solid angle which it subtends w.r.t. to each fixed gateway 3 . Transmitted ranging information signals can be affected by several sources of noise and it is practically impossible to develop a closed equation set to solve for location in a real-world environment. Accordingly, such problems are commonly solved using predictive statistical methods such as Bayesian networks, an extension of Kalman Filters, which are able to deal with missing data and distributions more complex than the Gaussian, using Markov Chain Monte Carlo simulations to improve the accuracy and precision of the target location estimation. 1) Dynamic Bayesian Networks for localization: A Bayesian Network (BN) models real world’s data as realizations of stochastic variables (nodes). Nodes and their dependencies define the BN structure, represented by a Directed Acyclic Graph (DAG) meaning that, if a node depends on another, either directly or through a chain of dependencies, then the reverse cannot be true. Following the conditional independence principle, each variable is independent on its 3 This information can be considered a sort of Direction of Arrival (DoA) estimation.

k 

(ΘZi |ΠZi )

(1)

i=1

A Dynamic Bayesian Network (DBN) is a BN that describes a temporal dynamic model; it represents sequences of values produced by complex stochastic processes evolving over time. Every time slice of a DBN corresponds to a state of the system and movements between time slices reflect a change of state. Two assumptions limit the complexity of the model: process stationarity (i.e., CPDs does not change over time) and first order Markov hypothesis, i.e., the value of state Zt at time t depends only on the previous state Zt−1 . The conditional probability P (Zt |Zt−1 ) describes the transition model, while the sensor model P (ot |Zt ) describes how the observation variables ot (sensor) are affected by the actual state Zt . The complete formulation includes also the initial state distribution P (Z0 ). The structure of our localization DBN is depicted in Figure 5. Xt is the position of the BSN at time t, represented by coordinates (xt , yt ). Ot is a vector containing the Rt of DoA measurements from the message sent by locationaware points and the vector Pt of signal powers. Links between subsequent positions X are governed by the transition model; edges between Xt and observation Ot are described by the observation model. Learning consists in estimating transition and observation models from observations, it is executed offline from training data; in particular, the CPDs are estimated through likelihood maximization by using the EM algorithm [18]; this a has heavy computational requirements. An efficient version of EM is presented in [19], in which learning can be executed online by selecting input data through an adaptive sliding window. 2) Inference of position through Particle Filtering: Executing the inference over the DBN consists in obtaining a posterior distribution over Xt of the model, conditioned to Rt and Pt . In particular, the recursive estimation of location probability is given by the formula: P (Xt |Rt , Pt ) = ηP (Rt |Xt , Pt ) |   | P (Xt |Xt−1 ) P (Xt−1 |Rt−1 , Pt−1 ) dXt−1 (2) where η is a normalization constant. We execute inference by applying a particle filtering probabilistic algorithm. The idea [20]–[22] is to draw an identical independently distributed set of S samples (particles) from a target probability distribution function (PDF), namely P (Xt−1 |Rt−1 , Pt−1 ). By following the transition model P (Xt |Xt−1 ) these samples evolve and once observations Ot become available, they are weighted according to their likelihood, following the sensor model P (Rt |Xt , Pt ). The weighted particles are then sampled to approximate the target PDF P (Xt |Rt , Pt ) with the

Authorized licensed use limited to: Universita degli Studi di Firenze. Downloaded on June 18, 2009 at 06:51 from IEEE Xplore. Restrictions apply.

CHITI et al.: AN INTEGRATED COMMUNICATIONS FRAMEWORK FOR CONTEXT AWARE CONTINUOUS MONITORING

Fig. 3.

Message passing occurring within the discovery phase of the proposed MD-STAR protocol.

Fig. 4.

Message passing occurring within the regime phase of the proposed MD-STAR protocol.

empirical point mass function. It is possible to proof that this algorithm is consistent, i.e. it gives correct states probabilities for N that goes to infinity. The computational complexity of particle filtering is proportional to the number of particles that we want to produce; empirical experiments show that this procedure is efficient and effective [23], since often it can give a good approximation of the real posterior distribution of the variables also using a reduced number of samples. 3) Probabilistic querying of location: We empower the localization system through a procedure inspired by [24], which allows replying to probabilistic queries over the estimated positions as if they were stored into a database. We apply a model-based view of a database, i.e., an abstraction of relational tables whose content is fed by the inference model, either periodically through Particle Filtering or online, only when queries are posed. In our model, the Position Table (Figure 6) contains the following attributes: •

Time: the time t to which the position refers;

• • •

383

xt and yt : probability distribution of the coordinates (x, y) in the position vector Xt of the BSN at time t; Rti : measurement extracted from message received from location i at time t; Pti : power of the signal emitted by location i at time t.

Associated to the Position Table, a Particle Table holds for each time instant the particles are sampled (1 ≤ s ≤ S), from which the location distributions and the corresponding weight wts have been estimated. A portion of the Particle Table is depicted in Figure 7. The Position Table can be queried to extract, e.g., the position at a given time or the most probable position in a time interval. Queries, formulated in standard querying language, like SQL, are processed and converted into single or multiple queries over the probabilistic position table. This scheme allows replying also to queries over a probabilistic attribute and/or confidence value, e.g., to filter out less probable localization hypotheses.

Authorized licensed use limited to: Universita degli Studi di Firenze. Downloaded on June 18, 2009 at 06:51 from IEEE Xplore. Restrictions apply.

384

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 4, MAY 2009

Time 1 1 1 ··· Fig. 7. Fig. 5.

s 1 2 3 ···

xst x11 x21 x31 ···

yts y11 y12 y13 ···

wts w11 w12 w13 ···

Schema of Particle Table.

Structure of the localization DBN. TABLE I PARAMETERS VALUES ADOPTED WITHIN THE NUMERICAL SIMULATION CAMPAIGN . Parameter

Fig. 6.

Schema of Position Table.

IV. P ERFORMANCE A NALYSIS A. System model To evaluate the performance of the proposed MD-STAR protocol as for the power consumption and latency minimization, extensive numerical simulations have been conducted over a realistic scenario. In fact, it focuses on a challenging scenario comprised of stationary and mobile nodes, which can effectively model a continuous and seamless health monitoring application where the adoption of a novel and cross-layer inspired approach is recommended, representing an evolution of [25]. The most relevant simulation parameters assumed in deriving numerical results are summarized in Table I. In particular, it has been assumed a typical indoor scenario for what the signal propagation is concerned (with a Packet Error rate equal to 5%) and a pedestrian mobility model with velocity in the range [2 - 4] m/s. The adopted antenna model is an ideal switched beam antenna, adopting a group of N almost non-overlapping beams that together result in omnidirectional coverage, so that the patterns main lobes are adjacent. The microcontroller at each node is able to scan the channel according to the MD-STAR protocol, switching to the correct beam corresponding with the user wishing to communicate at that time. In particular, an antenna is able to radiate in a fixed arc or sector of, say, 2π/N radians, thus providing increased gain over a restricted range of azimuths as compared to an omnidirectional antenna. B. Numerical results To give an insight on the protocol energy efficiency, in Figure 8, the relative lifetime as a function of the number of network nodes is presented in the case of directive receiving antennas with two, four, six and eight angular sector, respectively, normalized to the lifetime achieved by using omnidirectional antennas. The remarkable gain provided by the introduction of directive antennas on the fixed WSN

Monitored Area [m2 ] Number of nodes Number of angular sectors Duty cycle δ Frame duration Tf [s] Transmitted power [dBm] Receiver attenuation [dBm] Receiver sensitivity [dBm] Transmitting antenna gain Gt Receiving antenna gain Gr Battery initial level [mAh] HELLO packet transmission cost [mAh] HELLO pkt reception/channel sensing cost [mA/s] Sleeping cost [mA/s] MAC CSMA-CA max backoffs Time duration of a channel sensing attempt [s] HELLO packet size (payload) [B] Transmission Bit-rate [kb/s] Packet error-rate [%] Minimum velocity [ m s ] Maximum velocity [ m s ] Change position time-out [s] Simulated time interval [s]

Value 50 × 50 [10, . . . , 50] [1, 2, 4, 6, 8] 3% 93 0 -50 -90 [0.5, 0.707, 1, 1.225, 1.414] [0.5, 0.707, 1, 1.225, 1.414] 2500 6 · 10−5 2.777 · 10−3 2.97 · 10−6 6 0.02 8 250 5 2 4 300 86400

gateway nodes is evident in the figure In particular, it increases at the increasing of the node density (underlying an optimal scalability property), reaching a maximum value of 800%. The energy efficiency of the proposed MD-STAR protocol can be evaluated by also focusing on the collision probability that depends mainly upon the node density and the presence of the hidden node effect. The underlying CSMA/CA mechanism might fail indeed if neighbor nodes get extremely close or if two or more nodes not belonging to the same coverage area attempt to transmit toward the same node. To get an insight on this aspect, in Figure 9, the collision probability as a function of the number of network nodes is depicted, again in the case of omnidirectional antennas and directive antennas with two, four, six, eight possible angular sectors, respectively. It could be noticed that the adoption of omnidirectional antennas minimizes the residual packets collisions, even in the case of densely deployed nodes, while the converse is true for directive antennas mostly due to the presence of hidden nodes, since the coverage area gets smaller in terms of azimuth and an increasing number of nodes become invisible 4 . However, as the angular resolution increases, a lower number of nodes might overlap with a third node when transmitting and the communication becomes really point-to-point. This effect is more evident in the case of directive antennas with a number 4 It could be noticed than in any case the maximum value for collision probability remains lowers that 2%.

Authorized licensed use limited to: Universita degli Studi di Firenze. Downloaded on June 18, 2009 at 06:51 from IEEE Xplore. Restrictions apply.

CHITI et al.: AN INTEGRATED COMMUNICATIONS FRAMEWORK FOR CONTEXT AWARE CONTINUOUS MONITORING

Fig. 10. Fig. 8.

385

Latency as a function of the number of nodes.

Normalized network lifetime as a function of the number of nodes.

V. C ONCLUSION

Fig. 9.

Collision probability as a function of the number of nodes.

of possible angular sectors greater than four, since a kind of spatial deafness occurs in the case of lower values 5 . In this case, a mobile BSN might interact with a higher number of fixed WSNs without interfering. Nevertheless, the slight performance degradation does not affect the overall energy balance, as highlighted in Figure 8. To conclude this analysis, latency has been investigated in Figure 10. According to these results, the omnidirectional scheme takes the longer time to deliver a packet, due to the higher probability of finding the channel busy. The last characteristic to be addressed is the mean localization error for a pedestrian mobility for an indoor residential scenario. In Figure 11, it is represented as a function of the number of available WSN gateway collecting the ranging information of mobile BSNs (or rather the CH worn by a patient). It is immediate to notice the satisfactory results in terms of the underlying application requirements in the light of the worst propagation characteristics in terms of non line of sight (NLoS) propagation regime. 5 This statement is true in the case of a symmetric link that is with the same antenna at the receiver and transmitting sides. Otherwise, the performance is limited by the antenna with the lower directivity.

TThe BSNs application is widely considered as the most promising concept for providing an intelligent, context aware sensing architecture for the development of pervasive health care monitoring systems; however, this could be pursued by means of effective protocols design, since wearable or implantable sensor nodes present specific constraints, as far as the limited resources and size, while having a high degree of mobility. In particular, a scenario comprised of a mobile BSN dynamically joining with deployed WSNs has been focused on to allow a context aware monitoring paradigm capable of data and alarm delivering together with target localization. Moreover, the paper has considered a communications framework able to energy effectively manage sleep/active states, together with integrate the presence of directional antennas, according to a cross-layer design. A novel MAC layer protocol, namely MD-STAR, has been proposed, aiming at improving the capabilities of synchronization/localization in a scenario in which a mobile BSN interacts with fixed WSNs, without excessively affecting the setup latency, but achieving a reduction in energy consumption. MD-STAR protocol has been characterized in terms of functional characteristics, together with presenting the overall performance, in terms of network lifetime gain, collision probability setup latency, and localization accuracy, pointing out a remarkable gain with respect to the existing approaches and makes it suitable for applications in a wireless pervasive communication network devoted to facilitate high quality healthcare. R EFERENCES [1] G. Z. Yang, Body Sensor Networks. London: Springer-Verlag, 2006. [2] S. Shakkottai, T. S. Rappaport, and P. C. Karlsson, “Cross-layer Design for Wireless Networks,” IEEE Commun, Mag,, vol. 41, pp. 74–80, oct 2003. [3] K. V. Laerhoven, “Combining the self-organizing map and k-means clustering for on-line classification of sensor data,” in Proc. International Conference on Artificial Neural Networks (ICANN ’01). London, UK: Springer-Verlag, 2001, pp. 464–469. [4] F. Archetti, E. Messina, D. Toscani, and M. Frigerio, “Koinos: Knowledge from observations and inference in networks of sensors,” in Proc. IASTED International Conference on Sensor Networks (SN2008), 2008. [5] P. Korpip¨aa¨ , M. Koskinen, J. Peltola, S. M. M¨akel¨a, and T. Sepp¨anen, “Bayesian approach to sensor-based context awareness,” Personal and Ubiquitous Computing, vol. 7, no. 2, pp. 113–124, 2003.

Authorized licensed use limited to: Universita degli Studi di Firenze. Downloaded on June 18, 2009 at 06:51 from IEEE Xplore. Restrictions apply.

386

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 4, MAY 2009

[6] G. Chambers, S. Venkatesh, G. West, and H. Bui, “Hierarchical recognition of intentional human gestures for sports video annotation,” in Proc. 16th International Conference on Pattern Recognition, vol. 2, 2002, pp. 1082–1085. [7] L. J. Guibas, “Sensing, tracking and reasoning with relations,” IEEE Signal Processing Mag., vol. 19, no. 2, pp. 73–85, mar 2002. [8] J. Boger, P. Poupart, J. Hoey, C. Boutilier, G. Fernie, and A. Mihailidis, “A planning system based on markov decision processes to guide people with dementia through activities of daily living,” IEEE Trans. Inform. Technol. Biomed., vol. 10, no. 2, pp. 323–333, apr 2006. [9] F. Chiti and R. Fantacci, “Wireless sensor network paradigm: Overview on communication protocols design and application to practical scenarios,” EURASIP Newsletter, vol. 17, no. 4, pp. 6–27, dec 2006. [10] G. Manes, R. Fantacci, F. Chiti, M. Ciabatti, G. Collodi, D. D. Palma, A. Manes, and I. Nelli, “Efficient MAC Protocols for Wireless Sensor Networks Endowed with Directive Antennas: a Cross Layer Solution,” EURASIP JWCN Special Issue on Cross-Layer Optimized Wireless Sensor Networks, vol. 2007, no. Article ID 37910, 2007. [11] 802.15.4-2003: part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Std., oct 2003. [Online]. Available: www.ieee.org [12] P. Mohapatra and S. V. Krishnamurthy, Ad Hoc Networks-Technologies and Protocols. Springer Science & Business Media Inc., 2005. [13] A. P. Subramanian and S. R. Das, “Using Directional Antennas in MultiHop Wireless Networks: Deafness and Directional Hidden Terminal Problems,” in Proc. ICNP’05, nov 2005. [14] N. J. Gordon and M. Bedworth, “Bayesian sensor resource allocation,” in Proc. SPIE, vol. 3373, apr 1998, pp. 377–398. [15] A. Chhetri, D. Morrell, A. Papandreou-Suppappola, C. Chakrabarti, A. Spanias, and J. Zhang, “A unified bayesian decision theory perspective to sensor networks,” in Proc. IEEE International Symposium on Intelligent Control, Mediterrean Conference on Control and Automation, jun 2005, pp. 598–603. [16] S. H. Lo, C. H. Wu, and Y. C. Chung, “Cooperative localization with pre-knowledge using bayesian network for wireless sensor networks,” in Proc. International Conference on Parallel Processing Workshops (ICPPW ’07), sep 2007, pp. 69–74. [17] F. V. Jensen, Bayesian Networks and Decision Graphs. Springer, 2001. [18] A. P. Dempster, N. M. Laird, and D. B. Rubin, “Maximum likelihood from incomplete data via the em algorithm,” J. Royal Statistical Society. Series B, vol. 39, pp. 1–38, 1977. [19] H. Cho and S. Fadali, “Online estimation of dynamic bayesian network parameter,” in Proc. International Joint Conference on Neural Networks (IJCNN ’06), 2006, pp. 3363–3370. [20] N. J. Gordon, D. J. Salmond, and A. F. M. Smith, “Novel approach to nonlinear and non-gaussian bayesian state estimation,” Radar and Signal Processing, IEE Proceedings F, vol. 140, no. 2, pp. 107–113, apr 1993. [21] A. Raj, A. Subramanya, D. Fox, and J. Bilmes, “Rao-blackwellized particle filters for recognizing activities and spatial context from wearable sensors,” pp. 211–221, 2008. [22] H. Ren, M. Q. H. Meng, and L. Xu, “Indoor patient position estimation using particle filtering and wireless body area networks,” in Proc. 29th Annual International Conference of the IEEE EMBS, Cit Internationale, Lyon, France, aug 2007, pp. 2277–2280. [23] F. Caron, M. Davy, E. Duflos, and P. Vanheeghe, “Particle filtering for multisensor data fusion with switching observation models: Application to land vehicle positioning,” IEEE Trans. Signal Processing, vol. 55, no. 6, pp. 2703–2719, jun 2007. [24] B. Kanagal and A. Deshpande, “Online filtering, smoothing and probabilistic modeling of streaming data,” in Proc. 24th International Conference on Data Engineering (ICDE ’08), apr 2008, pp. 1160–1169. [25] “EU STREP FP6-IST-045299-STREP DustBot - Networked and Cooperating Robots for Urban Hygiene.” [Online]. Available: http://www.dustbot.org

Francesco Chiti Francesco Chiti (M’01) received the degree in Telecommunications Engineering and the PhD degrees in Informatics and Telecommunications Engineering from the University of Florence in 2000 and 2004. His current research topics are devoted to Link and Network layers protocols design for Ad Hoc and sensor networks. He took part in several European research projects as REGPOT AgroSense, IP GoodFood, STREP DustBot, NoEs NEWCOM and CRUISE, GJU TWIST, ETSI STF179 and COST 289 action.

Romano Fantacci Romano Fantacci, (F’05) born in Pistoia, Italy, graduated from the Engineering School of the Universit di Firenze, Florence, Italy, with a degree in electronics in 1982. He received his Ph.D. degree in telecommunications in 1987. After joining the Dipartimento di Elettronica e Telecomunicazioni as an assistant professor, he was appointed associate professor in 1991 and full professor in 1999. His current research interests are digital communications, computer communications, queuing theory, satellite communication systems, wireless broadband communication networks, ad-hoc and sensor networks. He has been involved in several European Space Agency (ESA) and INTELSAT advanced research projects. He is the author of numerous articles published in prestigious communication science journals. He guest edited special issues in IEEE Journals and Magazines and served as Symposium Chair of several IEEE conferences, including VTC, ICC and Globecom. Professor Fantacci received the IEE IERE Benefactor premium in 1990 and IEEE COMSOC Award Distinguished Contributions to Satellite Communications in 2002. He is currently serving as Associate Editor for Telecommunication Systems, International J. Comm. Systems, IEEE Trans. Commun. and Area Editor for IEEE Transactions on Wireless Communications. Francesco Archetti Francesco Archetti is Full Professor at the Department of Computer Science at the University of Milano Bicocca, Milan, Italy. His main research interests are in machine learning, sensor networks, ambient intelligence, environmental data analysis and bioinformatics. He’s also Director of Consorzio Milano Ricerche.

Enza Messina Enza Messina is Associate Professor at the Department of Computer Science of the University of Milano Bicocca, Milan, Italy. Her main research activity is devoted to decision models under uncertainty and machine learning methods applied to the analysis of sequential data.

Daniele Toscani Daniele Toscani is currently researcher at Consorzio Milano Ricerche. He received the Master’s Degree and PhD in Computer Science at the University of Milano Bicocca respectively in 2004 and 2008. His main research interests are the development of software systems for sensor networks and ambient intelligence, data mining and machine learning applied to sequential data analysis.

Authorized licensed use limited to: Universita degli Studi di Firenze. Downloaded on June 18, 2009 at 06:51 from IEEE Xplore. Restrictions apply.