Вы находитесь на странице: 1из 33

WARFARE REMOTE STATERGY

ACQUIRING AND IMPLIMENTATION OF


SOLDIER SYSTEM
Abstract
In todays world enemy warfare is an important factor in any nations
security. The national security mainly depends on army (ground), navy
(sea), air-force (air).The important and vital role is played by the army
soldiers. There are many concerns regarding the safety of these soldiers.
As soon as any soldier enters the enemy lines it is very vital for the army
base station to know the location as well as the health status of all soldiers
.In our project we have come up with an idea of tracking the soldier as
well as to give the health status of the soldier during the war, which enables the army personnel to plan the war strategies. Also the soldier can
ask for directions to the army base unit in case he feels that he is lost. By
using the location sent by the GPS the base station can guide the soldier
to safe area. What is soldier tracking system:-: Consider an example
of the terrorist attack, in this situation the soldiers and the commander
should be in contact .The Commander should know the exact position
and condition of soldiers and should track each soldier. Our project gives
the, Position of the all soldiers to the commander, Status of each soldier,
Pro- vides continuous communication between soldier and commander
,Alert to soldiers and commander. This system is very useful to better
plan- ning and synchronization so as create strategy and denitely helps for
completion of mission. This unit is mounted on the soldier body. It has
mainly four segments: Global Positional System(GPS) Receiver, Biomedical(Temperature) sensor,Passive Infrared (PIR)Sensor,RF transmitter. A
channel model for time-variant multi-link wireless body area networks
(WBANs) is proposed in this paper, based on an extensive measurement
campaign using a multi-port channel sounder. A total of 12 nodes were
placed on the body to measure the multi-link channel within the created
WBAN. The resulting empirical model takes into account the received
power, the link fading statistics, and the link auto- and cross-correlations.
The distance dependence of the received power is investigated, and the
link fading is modeled by a log-normal distribution. The link autocorrelation function is divided into a decaying component and a sinusoidal
component to account for the periodical movement of the limbs caused
by walking. The cross-correlation between dierent links is also shown
to be high for a number of specic on-body links. Finally, the model is
validated by considering several extraction- independent validation metrics: multi-hop link capacity, level crossing rate (LCR) and average fade
duration (AFD). The capacity aims at validating the path-loss and fading
1 model, while the LCR and AFD aim at validating the temporal behavior.
For all validation metrics, the model is shown to satisfactorily reproduce
the measurements, whereas its limits are pointed out.

Introduction

Recent years have witnessed a growing interest in the search for low-power, lowdata-rate and body-centric wireless communications. Academic and industrial
eorts in this research eld have led to the emergence of a new kind of promising
networks, called the wireless body area networks (WBANs). WBANs consist
of a set of wearable biosensor nodes, which collect or relay physiological and
contextual signals proling the human body activities. Typical applications include real-time monitoring of heart activity, blood pressure, breathing rate, or
skin temperature; continuous diagnostics; and remote medical treatment of a
patient. The close proximity of sensors to one another and to the human body
demands challenging optimizations to limit the radiated power, the consumption
as well as the interference with other sensors and coexistent networks. Hence,
a detailed knowledge of on-body multi-link propagation is crucial to properly
design relevant systems at the physical and access network layers. There have
been immense advancements in eld of technology over the past years. Small
size, low cost sensor networks have been developed which are capable of collecting, analyzing and transmitting information to a central processor node for
further analysis and report generation. Wireless Sensor Network is a term for
densely deployed sensor nodes which are capable of collecting real time information. These networks provide advantages over traditional sensing devices as
they provide low cost network deployment and are fault tolerant and robust. A
sensor network consists of large no of sensor nodes deployed in random topology.
Sensor networks are deployed close to the phenomenon which is to be observed.
Instead of sending collected data directly to processor node, sensor nodes uses
its processing capabilities and transmit partially processed data to task manager node via satellite for further processing as . The communication power
of transceiver is limited therefore information is communicated to Base station
or Sink by multihop path . Wireless Sensor Network (WSN) has become a vital research area, due to their wide ranging applications. WSN based systems
have been deployed widely in many applications including civilian, industrial,
agricultural, and military applications . A sensor network is composed of sensor nodes which are small in size, low in cost, and have short communication
range. A sensor node usually consists of four sub-systems: a. A computing
subsystem: this is responsible for functions such as execution of the communication protocols and control of sensors, b. A sensing subsystem: this subsystem
is responsible for sensing the environmental characteristics, such as using temperature, humidity, or acoustic sensor, c. A communication subsystem: this
consists of a short radio range used to communicate with neighboring nodes,
d. A power supply subsystem: this includes a battery which provides energy
to sensor node. Researchers have focused on dierent aspects of WSN, such
as hardware de- sign, routing, data aggregation, and localization. One of the
critical issues which needs to be taken into consideration is localizing objects
through distributed sensor network. Node localization is the problem of nding
the geographical location of each target node (the object with unknown location)
based on other reference nodes (nodes with known location). Localizing sensor
nodes is one of the fundamental and dicult problems that must be solved for
WSN. Track- ing and localization systems have been deployed to track civilian,
soldiers, and animals. depicts the idea of tracking mobile targets through WSNs,
and trans2

mit the localization information to a base station. The WSN based localization and tracking issues have received much attention recently driven by the
need to achieve high localization accuracy with the minimum cost. This is because: Sensor eld Local monitoring a. In several applications, the location itself
is the information of interest, b. Transferring sensors measurements without incurring the sensors locations is an ineective task, c. Several routing protocols
are based on the locations of sensor nodes. There are many issues aecting the
eciency of the tracking system includ- ing: the cost of extra localization hardware, number of reference nodes in the tracking area, and the communication
range for the target and reference nodes. These issues have to be taken into
account before developing a WSN-based tracking system. A wide range of node
localization and tracking systems have been proposed recently. According to ,
most of the WSN-based localization solutions are either range-based or rangefree . Range-based approaches deploy various techniques (ultrasound, infrared,
and GPS devices) to rst determine the distance between reference and target
nodes, and then compute the location using geometric principles. In order to
calculate the distance between the target and reference nodes, an additional
hardware is usually required to be attached to each wireless sensor device. On
the other hand, in range-free approaches, distances are not computed directly,
as the number of hops between the target and reference nodes is calculated. As
soon as the hop counts are calculated, dis- tances between nodes (reference and
target nodes) are computed based on the average distance per hop. And then,
geometric principles are used to calculate the targets location. Range-free techniques are not accurate as range-based ones and often require a high number of
messages to be transmitted before cal- culating the targets locations . Since,
range-based systems require attaching additional hardware to each target and
reference nodes, which increases both the cost and power consumption for sensor nodes. But, range-based approaches oer better localization accuracy than
the range-free systems. Furthermore, range free approaches require scattering
a large number of reference nodes in order to oer ecient localization accuracy .
Therefore, this paper focuses on range based systems as they oer better localization accuracy than range free systems. The existing WSN-based localization
systems are discussed in details . However, in this paper, we aim to discuss the
existing WSN based localization approaches which could be used for Threats detection and tracking in military applications, and point out the key issues which
need to be taken into consid- eration before designing and implementing a WSN
based localization approach for Threats detection and tracking. The idea of the
researchs goal is depicted . Our contribution lies on the following aspects: i.
Study the existing WSN-based localization and tracking systems, ii. Present,
discuss, and compare WSN based localization and tracking methods which could
be deployed in military appli- cations, iii. Present the key issues which need
to be taken into consideration before designing and developing a WSN-based
localization system for Threats detection and tracking applications. This paper is organized as follows: presents a classication of WSN-based tracking and
localization. discusses the strengths and weaknesses of the existing localization
and tracking systems. Recommen- dations for WSN developers in order to design and implement a WSN-based tracking system for military applications are
. And nally, conclusions and future work presented.

LITERATURE SURVEY

WSN is one of the fastest growing technologies in ubiquitous networking today. Standardization eorts, such as IEEE 802.15.4 , are geared to reduce costs,
provide device customizability for diverse applications and create standards for
interoperability. The IEEE 802.15.4 standard was developed to address a demand for low-power and low-cost in low-rate wireless personal area networks
(LR-WPAN). Dealing with low data rates, IEEE 802.15.4 oers very long battery life (months or even years) and very low complexity. The IEEE standard
802.15.4 denes the physical layer (PHY) and medium access control (MAC) sublayer specications for LR-WPAN in the 2.4 GHz and 868/915 MHz bands. A
free license to use the industrial, scientic and medical (ISM) 2.4 GHz band is
available worldwide, while the ISM 868 MHz and 915 MHz bands are only available in Europe and North America, respectively. A total of 27 channels with
three dierent data rates are allocated in IEEE 802.15.4, including 16 channel
with a data rate of 250 Kbps in the 2.4 GHz band, 10 channels with a data rate
of 40 Kb/s in the 915 MHz band and 1 channel with a data rate of 20 Kb/s
in the 868 MHz band. Channel sharing is achieved using carrier-sense multiple
access (CSMA), and acknowledgments are provided for reliability. Addressing
modes for 64-bit (long) and 16-bit (short) addresses are provided with unicast
and broadcast capabilities. The main characteristics of WSN devices are small
physical size, low-power consumption, limited processing power, short-range
communication capability and small storage capacity. A number of studies and
projects have focused on novel ubiquitous healthcare systems utilizing WSN
technology to simplify methods of monitoring and treating patients. A case in
point is the MobiHealth project, which developed a system for ambulant patient
monitoring over public wireless networks based on a body area network (BAN)
. Another example is the Ubiquitous Monitoring Environment for Wearable and
Implantable Sensors project (UbiMon) [33] at Imperial College London, which
aims to provide a continuous and unobtrusive monitoring system for patients to
capture transient, but life-threatening events. CodeBlue was designed to operate across a wide range of devices, including low-power motes, PDAs and PCs,
and it addresses the special robustness and security requirements of medical
care settings. Rapid technological development, ease of use and falling costs
have made mobile devices increasingly popular, producing great changes in todays lifestyle. During the past decade, the development of wireless mobile and
information technologies (IT) has helped to extend the concept of ubiquitous
coverage to new segments of society. Thus, many applications that were initially
available at a xed location only have been transformed into ubiquitous applications, to be used wirelessly and exibly at anytime, anywhere. The same trend
has been observed in the medical eld. Over the years, many telemedicine and
healthcare related societies and authorities have turned to wireless technologies to overcome the poor mobility of desktop PC-based healthcare monitoring systems. As a result, the possibility to monitor biomedical signals using a
mobile device is no longer an unachievable dream. In this work, an Androidbased smartphone is used as monitoring terminal due to its smart functions and
computer-like features. Compared to other smartphone operation systems, the
Android device has many advantages, such as openness. Moreover, all applications are equal, there are no boundaries between applications and its development is fast. Furthermore, the Android smartphone is currently one of the
4

most popular smartphones on the market.Android, provided by Google and


the Open Handset Alliance (OHA), is an open-source software stack for mobile
de- vices that includes an operating system, middleware and key applications.
OHA is a group of approximately technology and mobile companies, which combine their eorts toward the goal of accelerating innovations in mobile networks
and toward oering a better mobile experience to the customer. Android is built
on an open Linux kernel that includes such core system services as security,
memory management, process management, network stack and drivers. Further, the kernel acts as an abstraction layer between hardware and the software
stack and can be extended to incorporate new cutting edge technologies. Using
a Linux kernel as a hardware abstraction layer, allows Android to be ported to
a wide variety of platforms. Eclipse is a multi-language software development
environment comprising an integrated development environment (IDE) and an
extensible plug-in system. For the development of applications, a software development kit (SDK) is provided with the necessary tools and API. Eclipse SDK
is meant for Java developers, who can extend its abilities by installing plug-ins
written for the Eclipse platform, such as development toolkits for other programming languages, as well as create their own plug-in modules. All applications
are written in the Java programming language. The application layer includes
a set of core applications preinstalled on every Android device, including email,
maps, contacts, web browser, phone dialler, calendar, text message and Android
Market. Further, Android applications can utilize the functionalities of other
applications and services. A service is an application component without a user
interface that runs in the background for an indenite period of time.

EXISTING METHOD

DISCUSSION AND CRITICAL ANALYSIS WSN-based tracking system can


be used to oer critical tasks for military applications, such as localizing and
tracking mobile targets (vehicles, and soldiers). Practically, designing and developing a localization method for WSN is a complicated task due to the limited
capabilities of sensor devices. The analysis of the existing WSN localization and
tracking systems is presented in this section.

3.1

Analysis of the Existing WSN based Approaches

In this section, we study and compare the eciency of the existing systems in
terms of their strengths and weaknesses. We start with GPS-based approaches.
GPS-based systems oer reasonable localization accuracy and have been deployed in several applications including military, civilian and industrial. However, using GPS-based systems for Threats detection and tracking tasks is an inecient for several reasons: First, each threat object is required to be at- tached
with a GPS receiver and transceiver, and this is not applicable in mili- tary
Threats detection and tracking applications. Second, GPS systems require a
straight line of sight between the receiver and GPS satellites, and this re- quirement is not valid for indoor tracking, due to the obstacles and walls found
between the senders and receivers. And third, attaching additional hardware
to each sensor node will increase both the sensors size and cost. Therefore,
GPS-based systems are considered as inecient tracking system for Threats detection and tracking applications. Lets move to the second approach discussed
in the literature, the camera-based approach. Camera-based systems oer efcient localization accuracy, as these systems track positions and identities of
mobile targets, without the need for attaching any device to suspect objects.
The same with GPS approaches, camera-based systems suer from a high cost,
in addition to the requirement of a straight line of sight to be existed between
the camera (reference node) and target object, in order to compute the targets
locations. One the other hand, camera-based approaches require to be used in
day time in order to be able to detect the targets positions. A night camera can
be used to track objects; however this solution is an ineective in terms of cost.
Consequently, using the camera approach in WSN-based tracking system is not
a practical tracking solution for several reasons: a. The requirement of installation and maintenance, including periodic lens cleaning, b. Performance aected
by inclement weather such as fog, rain, and snow, c. Reliable night-time signal
actuation requires street lighting, d. Some models are susceptible to camera
motion caused by strong winds or vibration of camera mounting structure. RFbased approach was the third approach taken into consideration for de- tecting
and tracking Threats. RF-based systems can be deployed to track targets with
low cost, as there is no need to attach special hardware to each reference and
target wireless sensor nodes. These approaches oer cost-wise localization solutions, but oering low localization accuracy. RF-based systems dont re- quire
attaching any additional device or sensor to each target node except the transmitter and receiver found at each sensor device; however the sensors cost is
not expensive as in the camera and GPS-based systems. The last approach discussed in the literature was the acoustic-based approach. This kind of sys- tems
oer ecient localization information and considered as cost wise systems,as they
6

require installing an inexpensive microphone to each reference node. Though,


each target object requires emitting a voice in order to be sensed by reference
nodes. As a result, reference nodes might then be able to detect the position of
that target object.

3.2

Comparing the Existing WSN based Approaches

In this section, we compare the exiting WSN based approaches which have
been discussed in the literature. Table 1 compares the existing localization
techniques in terms of accuracy, the requirement of additional hardware (HW),
cost, den- sity, deployability, and power consumption. In terms of tracking
GPS and camera-based systems oer reasonable localization accuracy, but GPS
tracking systems require attaching an expensive hardware to each target object,
which increases cost, complexity, and power consumption for each sensor node.
The to additional hardware is a critical requirement in Threats detec- tion
and tracking systems. GPS, and RF-based approaches require each suspect
(target) object to be attached with an additional hardware, in order to be localized. While, there is no need for any additional hardware to be attached to
the target node when the camera or acoustic-based systems are used. In terms
of , GPS and camera-based systems are considered as high cost localization
solutions. GPS systems require attaching a GPS receiver and transceiver to
each target object, while an additional camera sensor is required to be added
to each reference node in the camera-based tracking systems. In acoustic-based
systems, an additional hardware is needed (acoustic sensor), however its considered as a low cost sensor compared to GPS receiver, transceiver, and camera
sensors. RF-based systems oer low cost localization system, as there is no
requirement to attach any special device (microphone, ultrasonic, or camera) to
reference and target wireless sensor nodes, as this kind of systems depends only
on the radio signals transmitted from reference nodes .GPS tracking systems do
not require a high density of sensor nodes to be deployed in the tracking area of
interest, as the targets coordinates computed through the values received from
the satellites. However, vision-based systems require a high density of reference
nodes. The density of reference nodes in the RF-based systems is based on
the transmission range. In the acoustic-based systems, the density of reference
nodes is based on the voice emitted by the target node.

3.3

Challenges of WSN Threats Detection and Tracking


Systems

The constrained computation power, battery power, storage capacity, and communication bandwidth of the tiny sensor devices pose challenging problems in
the design and deployment of Threats detection and tracking systems. Threats
detection and tracking systems pose many challenges when deployed for military applications. One of the key technological challenges is how to track threat
objects without attaching any additional device (sensor) to those targets. In
RF and GPS-based tracking system, its essentially to attach a device (GPS
receiver and transceiver, or RF module) in order to be able to detect and track
Threats positions. One more challenge is how to track Threats with the lowest
cost possible. Attaching additional hardware (camera, or GPS) to each threat
object is inecient too, because it rises up the tracking systems cost. Using
7

acoustic sensor might reduce the tracking complexity and cost. Acoustic-based
systems require attaching a simple acoustic sensor to each reference node, in
contrast to GPS and camera-based systems. Now, using an acoustic method to
detect and track the position of target objects might overcome some of those
challenges.

KEY ISSUES

Through discussing and analyzing the existing approaches for military tasks,
there are many recommendations must to be taken into consideration before
designing and implementing a military tracking system. As result, developers
need to consider the following issues: 1. Accuracy: the designed system must
oer reasonable localization accuracy for Threats detection and tracking systems, as obstacles and walls could be existed in the tracking area of interest,
and hence achieves low localization accuracy. 2. Cost: adding a supplementary
hardware to hundreds or thousands of nodes is a highly inecient solution in
terms of cost. The localization technique must be cheap in cost in order to be
attractive solution for WSN systems . 3. Power consumption: in WSN, energy
is mainly consumed by three subsystems: signal processing, data transmission,
and hardware operations. Consuming less energy in WSN based tracking systems is a primary objective in designing a WSN application, as each sensor node
is usually equipped with batteries which could be hard to replace. 4. Coverage:
the localization system should cover the tracking area of interest in order to
sense any suspicious object, and then achieve the goal that was designed for . 5.
Density of reference node: a high density of reference nodes will increase both
the cost and power consumption for WSN system. Therefore, the total number
of reference nodes should be as minimum as possible 6. Delay time: the sink
node (administrator) must be informed about the threats position as soon as
one of the reference nodes detects its position 7. Deployability : usually, sensor nodes are scattered or deployed using airplanes. The tracking system must
be easy to deploy with no need for a hard installation . 8. Accessibility: the
designed tracking system must be able to work indoors and outdoors. As the
system could be deployed where a number of obstacles (such as tree, wall, or
vehicle) found in the tracking area of interest. 9. Form factor: attaching additional hardware or sensor device to each sensor node will increase the sensors
size. In Threats detection and tracking system, its critical to keep the sensor
nodes size as tiny as possible in order to be invisible for Threats objects.

SYSTEM ARCHITECTURE

The KNOWME network employs a three-tier architecture , depicted in Fig.


1. The rst tier is the WBAN layer or sensor layer, which wirelessly provides
physiological signals. The second tier is the mobile phone, which acts as a data
collection hub for the external sensor data. The mobile phone also processes
data locally and provides simple feedback to the user instantly. The last layer
is a back-end server that can provide additional processing as well as data storage. The WBAN layer is comprised of the on-body sensors and the mobile
device. As noted earlier, due to the eld deploymentrequirement, we used only
o-the-shelf sensors and mobile devices to build KNOWME. KNOWME consists of a Nokia N95, as well as a Bluetooth-enabled oximeter (OXI) and an
electrocardiograph (ECG) from Alive Technologies arranged in a star topology
with the mobile phone being the hub. While there are newer and more energyecient wireless protocols such as Zigbee, we were restricted to using Bluetooth
for communication with the sensors since the N95 supports only the Bluetooth
wireless protocol for sensor interfacing.1 Additionally, sensor data are collected
from in-built N95 sensors: an ACC and a global positioning system (GPS).
The mobile application must gather data from multiple sensors with minimal
user intervention and with no interruption to regular mobile device functionality. To achieve continuous long-term data collection (e.g., 12 h/day for multiple
weeks), mobile application robustness is necessary. In addition to application
robustness, voluntary user participation is essential for data collection. Hence,
satisfying the users primary purpose of using a mobile phone takes priority over
KNOWME. KNOWMEs execution priority is lower than other higher-priority
tasks, such as incoming and outgoing calls. Whenever there is resource contention with higher-priority tasks, the mobile phone will simply terminate the
KNOWME application.The mobile application is divided into two components:
a background process (KMCore) and a client interface application (KMClient).
The KMCore is comprised of seven components arranged in a four-layered hierarchy: Device manager (bottom) Data collector Data analyzer, local storage
manager, data transmitter Service manager (top) Figure shows how various
components in the KMCore interact with each other. There is one thread per
sensor, providing robustness to errors from individual failing sensors as could
occur with a single manager for all devices. The data collector thread receives
and synchronizes sensor data from each device manager, resulting in a single
health record; health records are collected, buered, and sent to the local storage, the transmitter, and the analyzer. The local storage manager writes the
data to ash storage and handles conguration data as well. The trans- mitter
module that transfers data to the back-end handles data compression and encryption for privacy and energy saving. The analyzer modules imple- ment a
simplied version of the physical activity detection methods detailed later; while
the back-end server currently implements the full-blown classier. We observe
that much eort was employed in designing and operating KM- Core key elements that are a direct consequence of the implemented Bluetooth standard
and the time-division multiple access (TDMA) strategy. In fact, if a codedivision multiple access strategy were employed, most of the functionality of
the device manager and data collector could be absorbed into the data analyzer. Non-functioning sensors would be determined during analysis and would
not change any of the data collection or formatting. Due to the fact that only a
10

modest number of sensors are being employed, long spreading sequences would
be unnecessary. The complexity of multi-user detection is comparable or less
than that of the activity detection methods that we have already implemented
on the mobile phone and are described in the sequel. Finally, the KMCore service manager communicates with the KMClient graphical user interface (GUI).
The framework is fairly complex and resource intensive, but not critical to data
collection. If mobile phone resources (memory, computation power) are limited,
the KMClient is shut down without aecting the KMCore since the GUI and
data collection systems are separate.

11

Figure 1: KNOWME system architecture flow diagram and screen shot from
the sedentary behavior analyzer implemented on the mobile platform.JPG
.

12

LEARNED FROM SYSTEM DESIGN

Energy Consumption Energy consumption to support KNOWME operations


is signicant and motivates the design of a host of schemes to improve battery
life. In KNOWME, the sensors simply transmit data to the mobile phone fusion
center; the Nokia N95 performs all the coordination, processing, and computation tasks. The energy consumption (in Joules) of the three sensors followed by
their sampling rates and their transmission rates (samples/sec) using Bluetooth
over a 10 minute interval were: phone ACC (37.8 J, 30, 30); ECG (114.8 J, 300,
4); OXI (1374 J, 100, 10). As the sensors were not programmable, task scheduling and sensor data compression were impossible. However, in KNOWME, the
primary energy bottleneck was the mobile phone. Sensors operated comfortably
during the course of a day; as such, our energy eciency research was centered
on the mobile phone. If data are collected from all sensors (ECG, OXI, ACC,
GPS) and written to a local ash drive on the N95 without buering, the bat- tery
life is 4 h. This is in sharp contrast to the N95s 10 h of rated talk time and
200 standby hours. By using a combination of data buering, adaptive sensor
throttling, and dynamic selection of data transmission methods, battery life can
be improved by nearly 200 percent [9]. In KNOWME, the most complex data
analysis function is user state detection. State detection can take place either
on the phone or on the back-end server, which incurs no computation cost to the
phone, but does incur a transmission energy cost. Figure 2 shows the energy
cost associated with physical activity detection for local and remote computation based on 10 minutes of ECG and ACC data. We see that the energy
consumption of back-end computation is a function of the three transmission
options (EDGE, 3G, and WiFi) coupled with compression costs at the mobile
phone. When WiFi is available, it is energy ecient to perform remote computation. One anomaly worth noting is that when using compression and WiFi
transmission, the energy cost is higher than sending uncompressed data. The
reason for this discrepancy is that the energy cost of compressing on the phone
far outweighed the reduced communication energy on WiFi radio. When the
user is roaming, local computation can be better. Through this experiment, we
demonstrate that there is no single, static, best choice when it comes to trading
o the energy costs of computation with communication; the choice of remote or
local is a complex function of compression, computation and transmission costs.
Application Stability An inherent challenge is developing a mobile application to reside on a mobile device not originally designed for use in a WBAN.
Limited memory and computational resources of the mobile phone present major
challenges to system stability e.g., an incoming call may receive higher priority, competing for system memory with the KNOWME application, resulting in
a non-repeatable memory allocation failure for KNOWME. Debugging crashes
during complex system interactions suggested the design approach of separating
critical data collection from visualization/data analysis functions. The choices
of available programming paradigms on mobile phones are also limited. For
instance, the N95 supports Python, J2ME, or Native Symbian. Each paradigm
provides a trade-o between programmer productivity and execution overhead.
Due to limited debugging capability, we employed an emulator, which may not
faithfully capture mobile phone behavior. Hence, most of the system design eort
was focused on the WBAN design with the primary goal of providing robustness
under unpredictable operating conditions. Functional Support Typical signal
13

processing methods employ complex


oating-point computations that are not currently supported by the N95 hardware. Such operations are executed as a software routine, consuming both
signicant power as well as time. Thus, naive implementation of signal processing algorithms on the mobile phone can cause dramatic application slowdowns.
We used either approximations or pre-computed values to reduce this impact.
As shown in Fig. 3a, the KNOWME Network automatically recognizes physical activities by fusing multimodal sensor signals as well as multidomain subsystems. Machine learning methods are employed in order to perform accurate
physical state detection. We have designed and analyzed a signicant number of
novel features, extracted from the biometric signals. Within these feature sets,
we have assessed the most informative features. We have employed personalized
models tailored to individuals resulting in further performance enhancement.
Finally, we underscore that our approaches account for the inherent variability
found within a single individuals behavior due to variations in context.

14

ENERGY-EFFICIENT SENSOR SELECTION

As noted, our selected set of o-the-shelf biometric sensors is Bluetooth en- abled.
Bluetooth is an access protocol/technology for the exchange of data over short
distances between both xed and mobile platforms. Several modulation formats
have been considered since the inception of the standard; currently 8- dierential
phase shift keying is possible to achieve a 3 Mb/s data rate. To achieve a desired
spectral mask, frequency- hopped spread spectrum is em- ployed, although not
exploited for multiple access. The Bluetooth protocol is packet-based and enables a master-slave system wherein a single master may have up to seven slaves
in a piconet. It is this master-slave piconet that com- prises our WBAN. The
system works in a time-division multiple access mode wherein slaves communicate with the master in a round-robin fashion; although it is the master (the
mobile phone) that determines with which slave it will communicate. As previously noted, in contrast to the traditional view of a sensor network, it is the cell
phone fusion center that is the energy bottleneck of our system.Coordinating and
listening to the Bluetooth transmissions from the biometric sensors consumes
much more energy for the cell phone than the transmission of those signals from
the sensors. As such, to maximize system life, we need to optimally determine
which sensors to listen to and for how long this is the sensor selection problem. In particular, we have considered the problem of allocating a xed number
of transmission samples across the sensors while balancing between classication
error and energy consumption. Further- more, the evolution of physical activity
state during the day can be modeled as a dynamic stochastic system. We explicitly considered these properties to determine sequential allocations exploiting
stochastic control methods. Finally, a unique feature of WBANs with heterogeneous sensors is that each sensor has dierent discriminative properties as well
as dierent energy costs. Ideally, we would derive an optimal sampling protocol
based on the SVM classier. Such an approach faces two important challenges:
There is no closed form expression for the performance of the SVM to optimize.
The top performing SVM uses a large feature set and complexity of optimal
feature selection would be prohibitive for implementation on a mobile device.
Thus, we considered a single exemplary feature per sensor, exploited Gaus- sian
models for the sensor measurements, and further approximated the proba- bility of classication error in order to convert a combinatorial integer-programming
problem into a continuous vector-valued optimization. This approximation effort is largely motivated by the need to implement the sampling strategy on the
mobile phone. When the optimal sampling strategy derived in this manner is
applied to the SVM classier, signicant energy savings are experienced with no
performance loss. We extended our work in by modeling our allocation problem as a partially observable Markov decision process (POMDP) to capture the
systems se- quential nature. POMDPs are well matched to our problem as we
can model the dynamics of physical state change via a Markov chain (Fig. 4b).
Dy- namic programming (DP) and greedy search strategies are employed to
opti- mize the trade-o between classication error and energy cost, and signicant
energy gains are obtained . We observe that other sensor selection strategies
for WBANs often assume correct knowledge of the current PA state .presents
a simplied form of our proposed sensor selection scheme. The individ- ual is
alternating between a set of physical activities and during this process, a set
of measurements is generated and communicated to the fusion center, which
15

then estimates the underlying activity. This estimate is used to update the
fusion centers belief on the underlying true activity (belief state) that in turn
determines the subsequent samples allocation.

16

Related Work

From early measurements, it became quickly obvious that body movements


play an important role in WBAN fading characteristics and should therefore be
ac- counted in order to develop accurate and reliable channel models. Despite
the huge number of publications related to body communications, only few papers characterize the time-variant properties of the channel, most likely owing
to technical diculties for performing measurements. In 2007, the IEEE 802.15
Task Group 6 (TG6) was formed to address specic communication standards
for WBANs: the associated on-body channel model is known as CM3. In a
channel sounder was used for measuring 10 channels congured in a star topology. The lognormal distribution seemed to match best in static scenarios while
the Nakagami-m and Weibull distributions showed good agreement in moderate
to severe fading conditions. This work was extended . Authors in also pointed
out the scenario-dependent behavior of WBAN propagation, and argued that
a single comprehensive channel model would not be suitable to describe the
particular features of each transmission scenario. In addition to IEEE 802.15
TG6, a mixed-parameter distribution and a Nakagami-m distribution [8] were
suggested by Cotton et al. formodeling on-body fading statistics. In , a preliminary analysis of time series is presented using autoregressive transfer functions.
Other statistical parameters, including level crossing rate (LCR) and average
fade duration (AFD), are also extracted from these measurements . More recently, has investigated the eect of arm waving using a dynamic phantom to
mimic human walking and running motions. However, the study is focused on
on- and o-body single links in the horizontal plane. By contrast, is focused on
measuring multi-link cross-correlations in a wireless BAN using ZigBee sensor
nodes at 2.4 GHz. While little information is given on the other channel parameters, the correlation properties are discussed as a function of the on-body
sensor locations and the various motion patterns. Correlation levels are in general very low. In , multi-link correlations are statistically characterized based
on full wave simulations of a voxel model, but no experimental validation is
proposed. Finally, the activities of the Special Interest Group E (SIG-E) of
the COST 2100 action were focusing on dierent aspectsof the dynamic on-body
channels. The contributing authors presented a statistical model of about 20
time-variant channels for dierent scenarios [16]. By applying a sliding time
window, a correlated lognormally-distributed large-scale fading was separated
from the small-scale fading component. The latter was shown to be Ricean
or Rayleigh distributed depending on the motion mode. Moreover, an analytical model based on a threecylinder representation was introduced in , while
Doppler and correlation issues are experimentally characterized . In both cases,
multi-link correlations were found to vary signicantly as a function of the motion pattern and the involved nodes. Contributions In this paper, a model
for dynamic multi-sensor WBANs is de- rived from an extensive measurement
campaign, which considers a (nearly) full mesh topology of 12 nodes. Multi-link
channels are measured with tangentially and orthogonally polarized antennas.
To the best of the authors knowledge, this is one of the very rst measurements
campaign to measure a large amount of links of the WBAN simultaneously for
long periods of time. The main features of the model are the following: 1) a
scenario-based approach is used, where the received power and fading statistics
are characterized on a per-link basis; 2) the link auto-correlation is modeled,
17

taking into account the in uence of the body movement; 3) the multi-link crosscorrelation is also modeled on a perlink basis. Finally, the proposed model
is compared with the original measurements by considering several validation
metrics.

18

Figure 2: a Picture of the measurement b Node placement on body.JPG


.

19

MEASUREMENT CAMPAIGN

A measurement campaign was performed to measure the multi-link dynamic


body area propagation channel. The WBAN consisted of 12 nodes, placed as
shown in Fig. 1(a) and referred to as shown in Fig. 1(b). The measurements
were taken in a room of approximately 5 by 10 m. All furniture of the room
had been removed as to create an empty space of size approximately 5 by 5
m. In these conditions, the main re ections were from the walls, as well as
from the channel sounder used for the measurement (3 metallic boxes of size
m). During the measurements, the person was walking freely around the room.
The nodes were terminated by SMT-3TO10M-A Skycross antennas. Theses
antennas have a return loss of around 10 dB in the considered bandwidth, and
a omnidirectional radiation pattern in the azimuth plane. Two polarizations
were measured, vertically and normally to the body (see Fig. 2). The person
used for the measurement was a male subject (1.87 m, 85 kg). A MIMO 8 8
Elektrobit channel sounder, whose transmit and receive units shared a common
clock to avoid phase drift, was used to measure the wireless channel [19]. The
measurements were performed with 1 (or 2) node(s) transmitting and 7 (or 6)
nodes receiving simultaneously, the positions of the transmit and receive nodes
being changed between measurements to get a statistical characterization of
almost all of the 12 12 channels. The parameters of the sounder are given
in Table I. Each node was connected to the channel sounder with a 6 mSMA
cable. A pre-measurement calibration showed that the cables did not in uence
the channelmeasurements.Note that the center frequency of 4.2 GHz is due to
the channel sounder center frequency. The channel burst sample rate is about 20
Hz. Each burst consist of four successive measurements that will be averaged
to increase the measurement SNR. For each measurement run, 3000 channel
measurements were recorded (representing about 35 s for each dataset). Note
that given the approximate speed of movement of our subject, a burst rate of
20 Hz corresponds to a measurement approximately every . As a consequence,
the sample rate might be too low to capture some of the deeper fades that
occur in this scenario. The model described in this paper should thus be used
cautiously when considering deep fades in WBANs. In conclusion, for each
position of the transmitter, 7 (or 6) channels are measured simultaneously, for
about 35 s. This enables to characterize the time-variant channel for each link,
the narrowband channel between transmitter and receiver being denoted as ,
as well as the correlation between links with an identical transmitter but with
dierent receivers. center frequency 4.2GHz bandwidth 100GHz Transmit Power
6dBm Channel Sample Rate 169.70Hz Channel Samples/ burst 4 Burst rate
20Hz

20

10

MULTI-LINK ON-BODY CHANNEL MODEL

In WBAN, the radio channel depends on a large number of parameters: body


condition and movements, tissue properties, frequency, antenna localization and
polarization, surrounding environment, etc. All these mechanisms will have a
dierent impact on the channel when the human body is moving: antenna orientation and separation changes, direct transmissions and/or multipaths appear
or vanish. Subsequently, the WBAN channel exhibits large time-variations superimposing both shadowing and interference eects.As it is almost impossible to
distinguish between these eects, we will not try to model them separately. The
present section illustrates the various components of the model, which can be
summarized as follows: 1) each individual link is assigned an average received
power (a power- distance law can be used for this, although the high spreads
around the re- gression curve suggest that the average power should be considered to be a deterministic value); 2) each link is given a fading mechanism (the
statistical distribution of the fading is identical for all links, albeit with dierent
parameter values); 3) each link is given a temporal autocorrelation function, to
correlate suc- cessive time samples of the channel; 4) nally, the dierent links
are cross-correlated (it will be shown from the measurements that certain links
show high (anti-)correlation, that cannot be neglected from a system point of
view.)

10.1

SECURITY CHALLENGES AND BIOMETRICS

To ensure security of the overall system, BAN/BASN must be protected, for example, against eavesdropping, injection, and modication of packets. Se- curity
issues in BANs/BASNs for telemedicine and m-health are particularly important
because sensitive medical information must be protected from unau- thorized
use for personal advantage andfraudulent acts that might be hazardous to a
users life (e.g., alteration of system settings, drug dosages, or treatment procedures). Although the security issues in networks are always considered top
priority, studies carried out in this area for BANs/BASNs were few. The very
limited work found in this area is not applicable to BASN in telemedicine and
mhealth because the biosensors in a BASN must operate with extremely stringent constraints, a requirement that was relatively relaxed in generic BANs.
Less threatening than eavesdropping and tampering problems, but as important, is avoidance of interference between BASNs of dierent individuals, because communications of BASNs could easily cross over to each other when
many people have their own BASNs in the future. Therefore, the problem of
anti-interference must also be taken care of in the development of a BASN.
Even though the two challenges seem to be unrelated to each other, the problems could be converged into one simple question: how can sensors or nodes
of a BASN know that they belong to the same individual? In this article we
intend to present and investigate the system performance of a novel biometric
solution to this question. Biometrics is a technique commonly known as the automatic identication or verication of an individual by his or her physiological
or behavioral characteristics. In order to be a practical biometrics system,it is
postulated that the utilized characteristics should be : Universal: possessed by
the majority, if not the entire population Distinc- tive: suciently dierent in any
two individuals Permanent: suciently in- variant, with respect to the matching
21

criterion, over a reasonable period of time Collectable: easily collected and measured quantitatively Eective: yield a biometric system with good performance;
that is, given limited resources in terms of power consumption, computation
complexity, and memory storn age, the characteristic should be able to be processed at a fast speed with recognized accuracy Acceptable: willingness of the
general public to use as an identier Invulnerable: relatively dicult to reproduce
such that the biometric system would not be easily circumvented by fraudulent
acts Instead of applying bio- metrics generally in user authentication of common cryptosystems, we intend to develop a technique that would authenticate
sensors nodes and/or secure cipher key transmission among them in BASN. As
illustrated in Fig. , since the human body is physiologically and biologically
well-known to consist of its own trans- mission or transportation systems (e.g.,
the blood circulation system), we would like to investigate how to make use of
these secured communication pathways available specically in BASN but not
other wireless networks. It is believed that if used properly, these systems can
be naturally secured conduits for in- formation transmission within a BASN,
where other techniques (e.g., hardware or software programming) must be used
in generic wireless networks to achieve the same purpose. The idea is particularly practical in securing BASN with a telemedicine or m-Health application,
as nodes of these BASN would already comprise biosensors for collecting medical data, which could be physiological characteristics uniquely representing an
individual. If these intrinsic character- istics can be used to verify whether two
sensors belong to the same individual, the multiple usages of the recorded physiological signals will certainly save re- sources while adequate security measures
are employed.

22

Figure 3: Capacities are represented by the stacked chart.JPG.


.

23

Figure 4: Level crossing rate for measurement and model for vertical polarization.JPG.

Figure 5: average fade duration for measurement.JPG

24

11

EXPERIMENTAL TESTING AND RESULTS

We used data collected previously from two experiments, of which the original purpose was to simultaneously capture electrocardiogram (ECG) and photoplethysmogram (PPG) data for the estimation of blood pressure. In-house
circuits were designed for capturing ECG and PPG via stainless steel electrodes
and infrared optical sensors. In one experiment 14 healthy subjects were recruited and two PPGs captured from the index ngers of the two hands of each
subject, and an ECG captured from three ngers of the subjects were recorded
simultaneously for 23 min. In another experiment [12], 85 subjects were recruited, and within a 2-month period, ECG and PPG were captured for 23 min
on 3 4 days. ECG and PPG were both sampled at 1000 Hz. An algorithm was
developed to mark the peak of the R-wave of ECG and the foot of the PPG
pulse. We divided the ECG and PPG pairs into segments such that the corresponding ECG segment contained exactly 68 R-waves (resulting in 67 IPIs). A
total of 838 data segments were obtained from the 99 subjects. As shown in Fig.
3, IPIs were obtained independent from the dierent physiological signals, and the
sequence of IPIs in one segment was coded into a binary sequence b of 128 bits.
Since the Hamming distance was used to evaluate the dissimilarity be- tween
two binary sequences b and c, the encoding method was carefully selected such
that the Hamming distance of the binary codes corresponding to any two similar
IPIs would be small. Two binary sequences would only be considered matched
if the Hamming distance was smaller than a threshold. Ideally, b and c should
match only if they were recorded from the same person during the same period
of time. Similar to the generic biometric verication systems, we evaluated the
performance of the proposed biometric approach by two types of errors: False
rejection rate (FRR), the rate of which b and c measured from the same person
during the same period of time were unmatched (i.e., corresponding to a node
in the same BASN being rejected by the judging node) False acceptance rate
(FAR), the rate of which b matched c measured from a dierent person or at
a dierent time (i.e., corresponding to a node of another BASN or an impostor
being accepted as a legal node). In addition to the conditions stated above, we
investigated the performance of the operating system when the number of IPIs
used for each b was reduced from 67 IPIs to 34 IPIs so that b would have 64 bits
instead of 128 bits. We also studied the scenario when both ECG and PPG were
downsampled from 1000 Hz to 200 Hz. The left and right panels of Fig. 4 show,
respectively, the half total error rate (HTER = 1/2(FAR + FRR)) against the
distance, and the genuine acceptance rate against the false acceptance rate for
the dierent test conditions.

25

12

Threats Detection and Tracking Systems for


Military Applications using WSNs

A Sensor node consists of following components A. Power Unit A sensor node


consumes power for sensing, processing and transmitting data. A power source
can be both a chargeable and non chargeable battery. For chargeable power
source solar cells can be used. Power unit is an important component of sensor
node as lifetime of node depends on lifetime of its battery. B. Sensors A sensor
is a small hardware device which is capable of generating response to change in
physical environment. Although sensors are of dierent type which are application specic but desired characteristics of a sensor node are small size and low
power consumption. C. ADC Convertor Sensor node produces analog signals
so ADC convertors are embedded to convert analog signals to digital signals.
These digital signals now can be sent for further processing. D. Storage and
Processing Unit Sensor nodes are designed for processing data before transmitting. A little processing is done at node level. For processing data, storage unit
is required. Memory requirement is too application dependent. But usually ash
memories are used because they are cost eective. E. Transceiver Transceivers are
needed for co-ordination with other nodes. To send and receive data transceiver
is needed. To minimize energy consump- tions transceivers are usually turned o
rather remaining in idle mode because idle mode consumes almost same power
as the transmitting mode. For trans- mitting data in wireless sensor network
RF (radio frequency), Infrared or optical communications (LASER) are possible
choice

12.1

USING WBANS TO DETERMINE ENERGY EXPENDITURE

As alluded to in the Introduction, the actual physical state of an individual


is typically not the end-goal of health monitoring. In the context of pediatric
obesity specically and obesity in general, one is concerned with how much energy the individual is expending. Energy expenditure is notoriously challenging
to assess over the long term due to the expense and bulkof typical measurement strategies. A common gold standard for energy measurement is the rate
of consumption of oxygen (O2). In our studies [14], calibration of our energy
expenditure prediction methods was done against a MedGraphics Cardio II
metabolic cart, which measures the rates of O2 and CO2 consumption and expiration. Metabolic carts are expensive and bulky. In a typical experiment, the
test subject wears a mask that nearly obscures the entire face; a large tube from
the mask feeds into the measurement system. Clearly, this technique does not
scale well to free-living studies. More portable carts exist; however, they are still
cumbersome and prohibitively expensive. On-body sensors, particularly inertial sensors, represent a cost-eective alternative without sacricing accuracy. The
particular problem we studied was the computation of energy expenditure due
to walking using body-worn inertial sensors. An inertial sensor is a device that
captures the movement of the object to which it is attached. Our fundamental
hypothesis was that the movement descriptors captured using inertial sensors
could be used to estimate caloric expenditure. Since no Bluetooth-based inertial
sensor was available at the time, we developed our own prototype model to test

26

our algorithms. A single, custom-developed hip-mounted inertial sensor consisting of a triaxial ACC and a triaxial gyroscope was employed . An important component in our study [14] was to compare the ecacy of gyroscope-based
models against ACC-only solutions with respect to predicting energy expenditure. Gyroscopes are much more useful in tracking dynamic activities and do
not suer from the problems of gravitational bias as do accelerometers. Our further innovation was the development of data-driven kinematic motion models
mapping movement to energy for walking, which exploited the inherently cyclical nature of walk. We designed three prediction methods that show signicant improvement over simple linear regression tting: Least Squares Regression
(LSR), Bayesian Linear Regression (BLR), and Gaussian Process Regression
(GPR). Many accelerometry-based studies on physical activity in the area of
health focus on the use of uniaxial ACCs. Not surprisingly, triaxial information
is more accurate than uniaxial information. Our data-driven statistical models
allowed us to bypass count-based techniques and the use of thresholds yielding
improvements over . However,a surprise from our study was the fact that gyroscopic information yielded prediction accuracy equivalant to, if not better, than
ACCs. This result was important because it demonstrated the use of a sensor
alternative to accelerometers in measuring energy expenditure.

12.2

LESSONS LEARNED FROM ENERGY EXPENDITURE ESTIMATOR DESIGN

Our analysis showed that LSR-based approaches are prone to outlier sensitivity and overtting. Nonlinear regression methods showed better prediction accuracy, but required an order of magnitude increase in runtime. Our study showed
how probabilistic models in conjunction with joint modeling of triaxial accelerations and rotational rates could improve energy expenditure prediction for
steady-state treadmill walking, closely matching ground truth. Another signicant contribution of our work was that our sensors transmitted data via Bluetooth to secondary devices as opposed to local storage. We have success- fully
connected sensors to both traditional PCs and Android-based smartphones to
receive streaming data. Range and the number of simultaneously transmitting Bluetooth devices limited the maximum data transmission rate using Bluetooth. We are currently examining the integration of these inertial sensors into
KNOWME.

27

Figure 6: communication infrastructure.JPG


.

28

Figure 7: Sensor node architecture.JPG


.

29

13

CONCLUSION

In this paper, time-variant multi-sensor WBANs were investigated. An experimental campaign was performed to measure the dierent links of a full-mesh
WBAN simultaneously for long periods of time, using a multi-port channel
sounder and two polarizations (vertical and normal). A stochastic channel model
was then derived from the measurements. The power of the dierent links cannot be modeled satisfactorily with a simple power-distance law. Therefore, a
scenario-based approach is chosen, where the powers of each link are modeled
as deterministic values. The channel fading was modeled with a log-normal
distribution. The autocorrelation of each link was modeled by combining an
exponential decay and a sinusoidal component, the latter being related to the
periodical movement of the arms and legs when walking. The parameters of the
autocorrelation model were extracted from the measurements with a MMSE
estimator. The correlation between the dierent links were measured, and were
shown to be high for certain links, especially for links with nodes on the limbs.
The channel model was eventually validated with a number of validation metrics. The multi-link capacity was used to determine whether the channel model
was able to reproduce the received power and fading statistics of each link, individually and taken in a multi-link setup. It was shown that there is a good
match between the measurements and the model. The multi-link capacity also
revealed that, for certain nodes, the fact of using one (or two) relay(s) may signicantly improve the link reliability. Finally, the time-variant behavior of the
model was successfully validated by comparing the LCR and the AFD for both
measurements and model, except for very low received power levels, thereby
illustrating the limits of the log-normal distribution for modeling the fading
statistics. Our main objective was to study the exiting localization approaches
which can be deployed in WSN and could serve military applications, in order
to bring out few key issues for designing and implementing a tracking system to
detect and track Threats through border security area. And have outlined how
the tracking approach can meet these requirements. It stands for integrating
the acoustic device with wireless sensor nodes in order to be able to detect and
track the positions of threat objects. The major contribution of this paper includes classication the exiting WSN-based tracking and localization systems.
For future work, we aim to develop and design an acoustic-based system for
Threats detection and tracking. This kind of systems is based only on emitting
a voice by a threat object. Moreover, acoustic sensors are considered as an effective cost solution. Further improvements would be considered to enhance the
localization accuracy for the proposed system, by integrating ultrasonic sensor
to track the positions of silent Threats. Wireless Sensor Networks are emerging
as a great way of data collection of monitoring. Its applications are not limited
to Military Services but extend to vast area of human activities. The exibility,
fault tolerance, high sensing delity, low-cost and rapid deployment characteristics of sensor networks create many new and exciting application areas for
remote sensing. In the future, this wide range of application areas will make
sensor networks an integral part of our life.

30

14

REFERENCES

1.Stephane van Roy, Francois Quitin, LingFeng Liu, Claude Oestges,Dynamic


channel modeling for multy-sensor body area networks.IEEE TRANSACTIONS
ON ANTENNAS AND PROPAGATION, VOL. 61, NO. 4, APRIL 2013
2.Carmen C. Y. Poon and Yuan-Ting Zhang, The Chinese University of Hong
Kong,A novel biometrics method to secure wirless body area sensoe network
telemedicine and M-Health.IEEE Communications Magazine April 2006
3.Urbashi Mitra, B. Adar Emken, Sangwon Lee, and Ming Li,A case study
in wireless body area sensor network design. IEEE Communications Magazine
May 2012
4.International journal of advanced in computer science and software engineering.Volume 2, Issue 11, November 2012.
5.A study on threats detection and tracking system for military application using WSNs.International Journal of Computer Applications (0975 8887)
Volume 40 No.15, February 2012.
6. P. S. Hall and Y. Hao, Antennas and Propagation for Body-Centric
Wireless Communications. Norwood, MA, USA: Artech House, 2006.
7. K. Y. Yazdandoost and K. Sayraan-Pou, Channel model for body area
network (BAN). IEEE p802.15-08-0780-09-0006, Apr. 2009, IEEE 802.15 Working Group Document, Tech. Rep..
8. M. Kim and J.-I. Takada, Statistical property of dynamic ban channel gain
at 4.5 GHz,. IEEE p802.15-08-0489-01-0006 Sep. 2008, IEEE 802.15Working
Group Document, Tech. Rep..
9. K. Takizawa, K. Y. Yazdandoost, T. Aoyagi, N. Katayama, J.-I. Takada,
T. Kobayashi, H.-B. Li, and R. Kohno, Preliminary channel models for wearable WBAN. IEEE 802.15-08-0416-02-0006, Mar. 2008, IEEE 802.15 Working
Group Document, Tech. Rep..
10. T. Aoyagi, J.-I. Takada, K. Takizawa, H. Sawada, N. Katayama, K.Y.
Yazdandoost, T. Kobayashi, H.-B. Li, and R. Kohno, Channel models for wearable and implantable WBANs. IEEE 802.15-08-0416-03-0006 Sep. 2008,IEEE
802.15 Working Group Document, Tech. Rep..
11. D. Miniutti, L. Hanlen, D. Smith, A. Zhang, D. Lewis, D. Rodda,
and B. Gilbert, Narrowband channel characterization for body area networks.
IEEEp802.15-08-0421-00-0006 Jul. 2008, IEEE 802.15 Working Group Document, Tech. Rep..
12. S. L. Cotton, W.G. Scanlon, and J.Guy, The distribution applied to the
analysis of fading in body to body communication channels for re and rescue
personnel, IEEE Antennas Wireless Propag. Lett., vol.7, pp. 6669, 2008.
13. W. Scanlon and S. Cotton, Understanding on-body fading channels at
2.45 GHz using measurements based on user state and environment, in Proc.
Loughborough Antennas and Propag. Conf. (LAPC), 2008
14. S. Cotton, G. Conway, and W. Scanlon, A time-domain approach to the
analysis and modeling of on-body propagation characteristics using synchronized measurements at 2.45 GHz, IEEE Trans. Antennas Propag., vol. 54, no.
4, pp. 943955, Apr. 2009.
15. Z. Hu, Y. Nechayev, P. Hall, C. Constantinou, and Y. Hao, Measurements and statistical analysis of on-body, channel fading at 2.45 GHz, IEEE
Antennas Wireless Propag. Lett., vol. 6, pp. 612615, 2007.

31

16. S. Cotton and W. Scanlon, An experimental investigation into the in


uence of user state and environment on fading characteristics in wireless body
area networks at 2.45 GHz, IEEE Trans.Wireless Commun., vol. 8, pp. 612,
2009 . 17. K. Ogawa and K. Honda, BAN shadowing properties of an armwaving dynamic phantom, in Proc. 6th Eur. Conf. Antennas Propag. (EUCAP), Apr. 2012.
18. M. Kim, K. Wangchuk, and J.-I. Takada, Link correlation property in
WBAN at 2.4 GHz by multi-link channel measurement, in Proc. 6th Eur.
Conf. Antennas Propag. (EUCAP), Apr. 2012.
19. C.Oliveira,M.Mackowiak, andL.M. Correia,Correlation analysis in onbody communications, in Proc. 6th Eur. Conf. Antennas Propag. (EUCAP),
Apr. 2012.
20. R. Verdone and A. Zanella, Pervasive Mobile and Ambient Wireless
CommunicationsCOST Action 2100. New York, NY,USA: Springer, 2012.
21. R. DErrico and L. Ouvry, A statistical model for on-body dynamic
channels, Int. J. Wireless Inf. Networks, vol. 17, no. 34, pp. 92104, 2010.
22. L. Liu, R. DErrico, L. Ouvry, P. De Doncker, and C. Oestges, Dynamic
channel modeling at 2.4 GHz for on-body area networks, Advances in Electronics and TelecommunicationsRadio Communication Series: Recent Advances
in Wireless Communication Networks, vol. 2, no. 4, Dec. 2011.
23. R. DErrico and L. Ouvry, Doppler characteristics and correlation proprieties of on-body channels, in Proc. 5th Eur. Conf. Antennas Propag.
(EUCAP), Apr. 2011.
24. K. Kalliola and P. Vainikainen, Characterization system for radio channel of adaptive array antennas, in Proc. Personal, Indoor and Mobile Radio
Commun. Waves of the Year 2000. PIMRC 97., 8th IEEE Int. Symp., Sep.
1997, vol. 1, pp. 9599, vol.1

32

Item
Widgets
Gadgets

Quantity
42
13

Table 1: An example table.

14.1

How to add Tables

14.2

How to write Mathematics

LATEX is great at typesetting mathematics. Let X1 , X2 , . . . , Xn be a sequence of


independent and identically distributed random variables with E[Xi ] = and
Var[Xi ] = 2 < , and let
n

X1 + X2 + + Xn
1X
Sn =
=
Xi
n
n i
denote their mean. Then as n approaches infinity, the random variables
) converge in distribution to a normal N (0, 2 ).

14.3

n(Sn

How to create Sections and Subsections

Use section and subsections to organize your document. Simply use the section
and subsection buttons in the toolbar to create them, and well handle all the
formatting and numbering automatically.

14.4

How to add Lists

You can make lists with automatic numbering . . .


1. Like this,
2. and like this.
. . . or bullet points . . .
Like this,
and like this.
We hope you find Overleaf useful, and please let us know if you have any
feedback using the help menu above.

33

Вам также может понравиться