Research in Wireless Camera Networks

The Purdue-Olympus A-Cubed Project



Project Description


Wireless camera networks are more complex than wireless sensor networks simply because cameras generate a lot more information than simple scalar sensors and also because cameras are directional devices. This research program, supported by Olympus, aims to uncover and solve the fundamental problems in wireless camera networks.

Our research envisions a protocol stack for the operation of wireless camera networks. In spirit, this is very much like the protocol stack for the TCP/IP networks --- but the similarity ends there. The engineering of the protocol stack for a wireless camera network is driven by a clustering protocol that allows the network nodes to cluster together so that information can be extracted from the image data in a cooperative manner. With the clustering protocol in place, one can envision higher application- level protocols for solving useful problems of interest, and lower-level protocols that operate at the MAC layer and that allow the clustering protocol to operate more efficiently.

Shown below is the protocol stack we are developing in our laboratory. We refer to this as the Camnet protocol stack. The heart of the stack is the node clustering protocol described in our publication Medeiros et al. [Medeiros 2007]. Since wireless networks are by nature wide open to intrusion, it is difficult to think of any meaningful application where security would not be an issue. We therefore envision a security layer on top of the clustering layer, as shown in the figure below. For this purpose, we are in the process of implementing a security protocol we call CamnetSSL. It is based on the ECC (Elliptic-Curve Cryptography) Diffie-Hellman for the generation of symmetric keys for fast and secure data transfer between the nodes. Below the clustering layer comes the MAC (Media Access Control) layer for the efficient operation of the clustering layer.

The MAC layer protocol, called CamnetMAC, uses a combination of TDMA and CSMA. TDMA is used to assign specific time slots to each node in a cluster and CSMA to allow new nodes to join a cluster and for inter-cluster communications when the border nodes of two neighboring clusters are within one-hop communication range. The time interval that is divided up by TDMA contains windows for CSMA communications to take place.

Our application layer protocols entails the integration of three different agent-based sensing modules: S-Eye, A-Eye, and T-eye. A group of S-Eyes will be rigidly fixed to an environment to gather and integrate spatial information and generate an abstract level of knowledge of dynamic environments and objects. An A-Eye will be attached to a user to observe an outer-world (environment) with a viewpoint of the user's interest. Finally, T-Eye will observe the internal physiological and/or mental states of the human user. The integration of these three modules will provide a required level of privacy and security to the users in the environment. Although we intend to develop all three types of these sensing modules in the A-Cubed Project, our immediate goal will be to focus on only S-Eye and A-Eye. See Figure 1 for a sketch describing the basic concept and initial goals of the A-Cubed project.

Figure 1: A sketch describing the basic concept and initial goals of A-Cubed project

We have several other projects that are under the A-Cubed project. The links to these projects are also available below.

Project Team


Kihyun Hong Donghun Kim
Akio Kosaka Henry Medeiros
Johnny Park Paul Shin
Gaurav Srivastava Josiah Yoder

Publications


Related Projects