Sens-ation II - Summer term 2005
DescriptionSensors can be used to measure e.g. a room's light intensity, motion inside of it or its temperature. Thus a room's state described by these parameters and others may be used to derive further information concerning its current situation or the ongoing cooperative process inside that room (e.g. a current meeting).
This project aimed to extend the SensBase architecture to a Service Oriented Architecture (SOA) by using the Broker pattern. It focused on replication of sensor’s data and distribution issues of sensors. This project extended the SensBase architecture (cf. Figure 1) with a broker, service providers, service consumers. A broke is a centralised unit, which holds all information about registered sensors and their locations. Furthermore, it enables standardised communication within among distributed SensBase infrastructures. The broker allows better decoupling of the sensor and the consumer of the sensor services. Each SensBase infrastructure can act as a Web service provider and allow encapsulating and hiding of all specific hardware implementation details of their attached sensors. Furthermore, they provide a simple common interface for other application to obtain real-time sensor data, or persistently stored past sensor data. A service consumer can discover available sensors and their contact information via the broker and can then directly request required sensor data from that service. the service consumer communicate the service according to a well-defined interface, described in the Web Service Description Language (WSDL) that includes function names, required parameters, and results.
Figure 1. Extension of the SensBase architecture with a broker.
We developed in this project XML-schemas for describing sensors and their locations as well as their events (cf. Figure 2).
1 <?xml version="1.0" encoding="UTF-8"?>
2 <Event xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" ID="115">
5 <SensorType>Temperature sensor</SensorType>
28 <Key>Custom key</Key>
29 <Value>Custom value</Value>
Figure 2. Example of formatted sensor event.
Furthermore, we examined some security and privacy concept (e.g. role-based access control , security policies ) enforce access control upon sensors and users for ensuring that a user has the permissions required to access specific sensor's data. In the next term (2005/2006) we will focus on developing of security and privacy aspects for Sens-ation II.
Daniel Moreno Linares
Tom Gross (Supervisor)
Tareg Egla (Supervisor)