Professional Documents
Culture Documents
Hillen
Technology Overview
The individual nodes that constitute a wireless sensor network are generally small
in size and use power-efficient batteries to extend their operational longevity. Depending
on its function, each node has a sensor board that facilitates the detection and
measurement of heat, vibrations, air-pressure and magnetic fields (among other things).
The “motes” developed at UC Berkeley are a typical example of such devices. Motes
have a range of about 100 feet and feature a 7Mhz processor, 4Kb of RAM, 128Kb of
programmable memory space, and utilize a ChipCon CC1000 radio for communication.
Due to their deployment simplicity and low cost of about $200 per unit, motes can be
distributed in spatially dense configurations within a given area. Motes make use of Tiny
Using less than half the capacity of an AA battery, Tiny OS can effectively run
assemble into ad-hoc networks, allowing data to be transferred to and from any node in
The nodes in wireless sensor networks can be employed to capture data about
-1-
Anthony F. Hillen
geographic locations otherwise inaccessible by human beings; from the nether ocean to
positioned by hand. In terms of the most basic military applications, such networks can
be used to detect, classify, and track targets in a given territory (other applications will be
discussed later). Civilian use of wireless sensor networks range from environmental
purposes such as pollution and ecosystem analysis to law-enforcement activity like traffic
Development Status
research efforts. Some recent developments have been academic in nature, like tracking
maintenance. There are numerous examples of how wireless sensor networks are
currently being used, for instance, biologists at UC Berkeley interested in studying how
trees affect the temperature and humidity in their surrounding canopy use a network of
trunk-attached motes to monitor the microclimates around the redwood trees in their
-2-
Anthony F. Hillen
spectrum, these radio devices would utilize “opportunistic spectrum access”. Such
systems would facilitate faster and more efficient communication since static allotment
nodes utilizing such technology would access unused spectrum, detect, authorize and
networks to facilitate asset management and multimedia streaming. Mobile swarms are
clusters of sensor nodes located in close physical proximity to each other and possess
similar mobility patterns. For example, a group of tanks or UAVs could constitute a
swarm, presumably equipped with qualitatively superior sensors like hi-res cameras, and
longer range radios with higher channel bandwidths than conventional motes. Sensor
nodes attached to the swarm members can gather information about that individual
member, like location or operating status, but it can also relay data captured by its “host”
to other nodes in the swarm, other mobile swarms, or to a command center through a
There are three primary motivations supporting research and development in the
field of wireless sensor networks: academic interest, corporate profit, civil value, and of
course, military application. These strong and mutually supportive driving forces suggest
a promising future for the technology. Although motes currently cost about $200 per unit,
-3-
Anthony F. Hillen
prices have been dropping steadily and are expected to continue falling. Some projections
suggest that the price will fall to around $10 a piece within the next few years and that the
units themselves will shrink in size to about 2 cubic mm. It is safe to assume that the
smaller and cheaper these sensors get, the more widely used they will become. Moore’s
law indicates that in about ten years, devices as small as a mote will have processing and
Madden, 2003)
Software development, for instance, has been particularly troublesome. This is primarily
due to the sensor’s hardware limitations. Modern sensors like motes suffer from a dearth
in processing speed, memory, radio bandwidth, and energy capacity. The problems with
processing speed and memory are likely to be resolved in the near future. However, the
shortage in bandwidth is due to insufficient energy, and because the energy density of
commercial batteries has not changed much in the last ten years, it is unlikely that the
challenges posed by battery capacity and radio bandwidth will be overcome anytime
undertake a variety of different tasks and creating reliable security protocols to ensure
network integrity and guard against intrusion and denial-of-service threats. (Hellerstein,
to violate widely held standards of personal privacy implies that there are also social and
legal obstacles to many of its civil applications. Critics are quick to point out the ways
such technology can be misused, from tracking ones every movement to remotely
-4-
Anthony F. Hillen
accessing personal information. It is not difficult to imagine scenarios whereby one need
merely walk by the wrong person in a grocery store to share one’s home address, credit
card number, or other identity information. These are valid concerns that warrant
Security Implications
networks must be fully understood, embraced, and implemented without delay. Until
now, the United States’ military use of sensor technology has been limited to basic and
relatively crude detectors that utilize sensor technology, the Unattended Ground Sensor
(UGS) system and the AN/GSQ-187 Remote Battlefield Sensor System (REMBASS) are
typical examples of such devices. Although technically “wireless” by definition (in the
sense that they do not require external cables to function), these devices do not utilize the
technology discussed in this report, nor do they form ad-hoc networks of any kind. These
systems are capable of detecting vehicle and personnel activity, but would be incapable
audio/video data.
Wireless sensor networks can also provide a strategic advantage in urban and
close-quarter combat situations. For instance, an orbiting UAV could automatically detect
friendly forces in the area and transmit aerial reconnaissance data directly to a heads-up
display build into the helmets of troops on the ground. If a ground unit required a
topographical map of an area, it could transmit the request to a nearby tank or UAV
which would then acquire the information from a satellite or databank at a command
center.
-5-
Anthony F. Hillen
rich environment will ultimately depend on the quality of their training. US combat
statistics from the first Gulf War indicate that an abundance of battlefield information
actually degrades combat performance. Its recipients could not process all the
information at every level of command so units in critical need of information had to sift
through too much irrelevant data to locate the specific details they required. The
training and tactical reform measures whenever new technology is introduced. (Davis,
2007)
It should be noted that military use of wireless sensor networks need not be
limited to information awareness purposes. While not the most creative of individuals, I
can think of a few applications omitted from existing literature on the subject. First,
mine be detonated, the remaining mines/nodes in the network would detect the
detonation’s location and adjust themselves accordingly, either filling in any gaps in the
mine field or congregating in the area of activity. Another application might involve
attaching wireless sensor nodes to handheld weapons. Potential benefits could include
AO), or perhaps “talking” with other weapons in the unit and automatically
environment data.
-6-
Anthony F. Hillen
and security implications, necessitating a response in the form of policy formulation. Any
military seeking to become or remain a formidable force should carefully consider the
strategic opportunities wireless sensor networking technology can provide. Given the cost
of military conflict, in terms of both monetary expense and potential casualties, a prudent
strategist must pay close attention to technologies that could result in an advantage of any
sort. Military history suggests that success is not achieved by those who first acquire a
new technology, but by those who accept it and learn to wield it effectively.
-7-
Anthony F. Hillen
References
T. Clouqueur, P. Veradej, P. Ramanathan, K. Saluja, “Sensor Deployment Strategy for
Detection of Targets Traversing a Region,” Mobile Networks and Applications,
2003.
D. Davis “Synthetic Battlespace Test-bed for the Analysis of New Intelligence Sensors,
Platforms and Techniques: A National Intelligence Simulation Center,”
University of Southern California, 2007.
XG Working Group, “The XG Vision: Request for Comments,” DARPA, Version 2.0
-8-