To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The two opposite requirements of tightly synchronizing the network with a minimum number of RF transmissions and with high accuracy can be efficiently addressed using the approach suggested by the FTSP, where multiple inactive nodes can hear the synchronization messages transmitted by the master node in one-way timing cells exchange mechanisms. To increase the utility of this one-way mechanism, Maroti et al. proposed the synchronization of nodes present in the communication range of the master node (broadcasting the timing beacons), where each node receiving the timing cells transmitted by the master node estimates its own clock parameters and synchronizes with the master node accordingly. However, the similar situation pertaining to the two-way timing exchange mechanism, i.e., the framework in which the nodes located in the common broadcast region of a master and slave node can overhear the time synchronization packets between them and exploit the acquired information to achieve clock synchronization remained largely unnoticed until the PBS protocol introduced it (as discussed in detail in Chapter 8). Note that although the idea of SRS is quite old and has most famously been used in NTP for a long time, it is due to the wireless nature of communication channels in sensornets that the technique of synchronization of silent nodes located in their common broadcast region can be exploited. Therefore, the clock synchronization requirements can be reasonably met without paying any price on the network lifetime (i.e., without exchanging additional messages for clock synchronization purposes and thereby reducing battery life) or node hardware (e.g., by improving the quality of the quartz crystals or by utilizing more expensive power-efficient batteries).
With the help of technological advances in micro-electro-mechanical systems (MEMS) and wireless communications, low-cost, low-power, and multi-functional wireless sensing devices have been developed. When these devices are deployed over a wide geographical region, they can collect information about the environment and efficiently collaborate to process such information by forming a distributed communication network, called a wireless sensor network (WSN), as illustrated in Figure 1.1. A WSN is a special case of an ad-hoc wireless network, and assumes a multi-hop communication framework with no common infrastructure, where the sensors spontaneously cooperate to deliver information by forwarding packets from a source to a destination. The number of practical applications involving WSNs keeps growing rapidly, and WSNs have been regarded as providing the fundamental infrastructure for future communications due to a variety of promising potential applications: monitoring the health status of humans, animals, plants, and the environment; control and instrumentation of industrial machines and home appliances; homeland security; detection of chemical and biological threats and leaks, etc.
When designing sensor networks, there are a number of important factors to be considered such as tolerance to node failures, scalability, dynamic network topology, hardware constraints, production cost, and power consumption. In general, the lifetime of a sensor network is proportional to that of a battery since the sensor nodes are usually inaccessible after deployment. Moreover, due to the space limitations and other practical constraints in sensor nodes, power is a scarce resource for practical WSNs. For these reasons, energy efficiency in general has top priority when designing WSNs out of all the above mentioned design considerations.
Up to now, various schemes have been proposed for estimating the clock offset and skew. However, estimating the clock of a node using a linear model is useful only for short-term applications, examples of which are object tracking and surveillance. It is not sufficient for certain applications with stringent and long-term clock synchronization requirements, such as efficient duty cycling and synchronized sampling, because they spend a lot of energy on resynchronization during a given time interval.
To elaborate on this point, consider the following examples. In FTSP the nodes in the network have to be resynchronized every minute to achieve a 90 μs synchronization error, even though it is the most efficient time synchronization protocol reported thus far and has been implemented on real testbeds with very good results. In addition, the Center for Embedded Networked Sensing (CENS) deployment at James Reserves uses RBS to synchronize the nodes after every 5 minutes and the shooter localization system implements FTSP to synchronize once every 45 seconds. Due to the difficulties associated with long-term synchronization, although RBS and FTSP estimate the clock skew alongside clock offset using linear regression, they are not adequate in practice to achieve long-term synchronization since they are confined to estimating only the first-order parameter (clock skew). Hence, to achieving the goal of long-term synchronization, a better modeling of the relationship between the clock and the reference node is required. In this chapter, this problem is targeted through extending the linear model between two clocks to a quadratic one and then the clock parameters of clock offset, skew, and drift are jointly estimated.
Assuming both symmetric and asymmetric exponentially distributed network link delays, this chapter is focused on finding the BLUE-OS and the MVUE for the clock offset between two nodes and evaluates their performance in terms of the MSE, which is chosen as the performance criterion throughout this book. The timing exchange mechanism between the two nodes is the same classical two-way message exchange mechanism adopted in protocols such as TPSN, NTP, etc.
The main topics in this chapter are as follows. First, BLUE-OS, an estimation scheme that has gone largely unnoticed in engineering literature, is investigated in the context of clock offset and the relevant clock offset estimators are derived. Second, the Rao–Blackwell–Lehmann–Scheffé theorem is used to derive the MVUE and it is shown that the MVUE coincides with the BLUE-OS. Therefore, in the class of unbiased estimators, BLUE-OS is the optimal solution and no other estimator can be found with less MSE (or variance, which is the same as MSE in the unbiased case) than MVUE. For the sake of completeness, the clock offset estimators are also derived for two scenarios, namely when the mean of the exponential link delays is known for each direction and when it is unknown for each direction. Third, a short commentary on whether the MVUE is the best possible solution as compared to the other estimators, such as the MLE, is presented.
We now turn our attention to a more accurate model defining the relationship between two clocks by the addition of clock skew. In practice, the time synchronization problem in WSNs generally involves two steps: synchronizing the nodes in the network to one common absolute time by adjusting clock phase offset (clock offset) among the nodes, and correcting the clock frequency offset (clock skew) relative to a certain standard frequency. The second step is required because the imperfections in quartz crystals and environmental conditions induce different clocks to run at slightly different frequencies. Actually, the effect of clock skew is the main reason why clock offset keeps drifting apart. Hence, adjusting clock skew guarantees long-term reliability of synchronization, and therefore reduces network-wide energy consumption in synchronization procedures. Indeed, developing long-term and network-wide time synchronization protocols that are energy-efficient represents one of the key strategies for the successful deployment of long-lived WSNs.
The main topics in this chapter are as follows. First, the MLE and the corresponding CRLB for the conventional clock offset model in a general sender–receiver protocol assuming a Gaussian model for the noise are derived. Second, the joint MLE and corresponding CRLB using a more realistic linear clock offset and skew model assuming Gaussian random delays are obtained. Third, the CRLB for the clock offset for the exponential delay model is derived as a performance threshold. Fourth, the joint MLE for the clock offset and skew under the exponential delay model is obtained and the corresponding algorithms to find these estimators are described in detail.
Much attention has been paid to WSNs due to their capability of serving a variety of purposes. Time synchronization is a significant factor in WSNs, and a number of fundamental operations, such as data fusion, power management, and transmission scheduling, require accurate time synchronization. Since the conventional time synchronization protocol for the Internet cannot be directly applied to WSNs, a number of synchronization protocols have been proposed to meet the unique requirements of sensor network applications.
The importance of time synchronization also comes from the evolution of WSNs which has been driven by technological advances in diverse areas. For instance, unlike the currently deployed WSNs, the next generation of sensor networks may consist of dynamic mobile sensors or a mixture of static and dynamic sensors. In this scenario, far more sophisticated time synchronization protocols that efficiently deal with the mobility of sensors will be required. Indeed, as the sensor network becomes more complicated, the role of time synchronization will become much more important.
In this book, the basic features and theoretical background of the time synchronization problem in WSNs were introduced and then the basic approaches were analyzed and compared to reveal the general ideas and features of time synchronization protocols in WSNs. In addition, a survey of existing time synchronization protocols in the literature was provided including the most recent results.
As a main feature of this book, the problem of time synchronization was studied from a statistical signal processing point of view. This book targeted the clock synchronization problem in a general sender–receiver and receiver–receiver timing packet exchange scenario.
Data bits are mathematical entities that have no physical attributes. To send them over a channel, one needs to first map them into some physical signal, which is then “fed” into a channel to produce a physical signal at the channel's output. For example, when we send data over a telephone line, the data bits are first converted to an electrical signal, which then influences the voltage measured at the other end of the line. (We use the term “influences” because the signal measured at the other end of the line is usually not identical to the channel input: it is typically attenuated and also corrupted by thermal noise and other distortions introduced by various conversions in the telephone exchange system.) Similarly, in a wireless system, the data bits are mapped to an electromagnetic wave that then influences the electromagnetic field measured at the receiver antenna. In magnetic recording, data bits are written onto a magnetic medium by a mapping that maps them to a magnetization pattern, which is then measured (with some distortion and some noise) by the magnetic head at some later time when the data are read.
In the first example the bits are mapped to continuous-time waveforms corresponding to the voltage across an impedance, whereas in the last example the bits are mapped to a spatial waveform corresponding to different magnetizations at different locations across the magnetic medium. While some of the theory we shall develop holds for both cases, we shall focus here mainly on channels of the former type, where the channel input signal is some function of time rather than space.
Claude Shannon, the father of Information Theory, described the fundamental problem of point-to-point communications in his classic 1948 paper as “that of reproducing at one point either exactly or approximately a message selected at another point.” How engineers solve this problem is the subject of this book. But unlike Shannon's general problem, where the message can be an image, a sound clip, or a movie, here we restrict ourselves to bits. We thus envision that the original message is either a binary sequence to start with, or else that it was described using bits by a device outside our control and that our job is to reproduce the describing bits with high reliability. The issue of how images or text files are converted efficiently into bits is the subject of lossy and lossless data compression and is addressed in texts on information theory and on quantization.
The engineering solutions to the point-to-point communication problem greatly depend on the available resources and on the channel between the points. They typically bring together beautiful techniques from Fourier Analysis, Hilbert Spaces, Probability Theory, and Decision Theory. The purpose of this book is to introduce the reader to these techniques and to their interplay.
The book is intended for advanced undergraduates and beginning graduate students. The key prerequisites are basic courses in Calculus, Linear Algebra, and Probability Theory. A course in Linear Systems is a plus but not a must, because all the results from Linear Systems that are needed for this book are summarized in Chapters 5 and 6.