All is not lost: Understanding and exploiting packet corruption in outdoor sensor networks

11Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

During phases of transient connectivity, sensor nodes receive a substantial number of corrupt packets. These corrupt packets are generally discarded, losing the sent information and wasting the energy put into transmitting and receiving. Our analysis of one year's data from an outdoor sensor network deployment shows that packet corruption follows a distinct pattern that is observed on all links. We explain the pattern's core features by considering implementation aspects of low-cost 802.15.4 transceivers and independent transmission errors. Based on the insight into the corruption pattern, we propose a probabilistic approach to recover information about the original content of a corrupt packet. Our approach vastly reduces the uncertainty about the original content, as measured by a manifold reduction in entropy.We conclude that the practice of discarding all corrupt packets in an outdoor sensor network may be unnecessarily wasteful, given that a considerable amount of information can be extracted from them. © 2014 Springer International Publishing.

Cite

CITATION STYLE

APA

Hermans, F., Wennerström, H., McNamara, L., Rohner, C., & Gunningberg, P. (2014). All is not lost: Understanding and exploiting packet corruption in outdoor sensor networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8354 LNCS, pp. 116–132). https://doi.org/10.1007/978-3-319-04651-8_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free