Dedication | p. V |
Contributing Authors | p. XIII |
Preface | p. XIX |
Network Design and Network Modelling | |
A Taxonomy-based Approach to Design of Large-scale Sensor Networks | p. 3 |
Introduction | p. 3 |
Classification of Sensor Network Applications | p. 7 |
Salient Features of Sensor Networks | p. 8 |
Common Design Problems in Sensor Networks | p. 11 |
Class-specific Problems in Sensor Networks | p. 13 |
Sensor Network Implementations | p. 21 |
Conclusions and Future Directions | p. 28 |
References | p. 30 |
Algorithms for Robotic Deployment of WSN in Adaptive Sampling Applications | p. 35 |
Introduction | p. 35 |
Problem Formulation | p. 37 |
Communication Models | p. 39 |
Sampling of Parametrized Fields Based on Closed-Form Information Measures | p. 40 |
Adaptive Sampling Using the Extended Kalman Filter | p. 50 |
Potential Fields | p. 53 |
Conclusions and Future Work | p. 59 |
References | p. 61 |
A Scalable Graph Model and Coordination Algorithms for Mobile Sensor Networks | p. 65 |
Introduction | p. 65 |
Distributed Graph Model | p. 67 |
Self-deployment Algorithm | p. 70 |
Simulation Results | p. 75 |
Conclusion | p. 81 |
References | p. 81 |
Network Management | |
Medium Access Control Protocols for Wireless Sensor Networks | p. 87 |
Introduction | p. 87 |
Characteristics of MAC Protocols in WSNs | p. 89 |
Scheduled-based MAC Protocols | p. 92 |
Contention-based Protocols | p. 93 |
Short Note on the Energy Model in NS2 Network Simulator | p. 106 |
Conclusion | p. 108 |
References | p. 109 |
Topology Control for Wireless Sensor Networks | p. 113 |
Introduction | p. 113 |
Geometrical Spanners | p. 116 |
Geometrical Low-Weight Structures | p. 128 |
Virtual Backbones | p. 133 |
Others | p. 138 |
Conclusion | p. 139 |
References | p. 140 |
Boundary Detection for Sensor Networks | p. 149 |
Introduction | p. 149 |
Localized Edge Detection | p. 151 |
Centralized edge determination | p. 162 |
Distributed Edge Detection | p. 165 |
Hierarchical edge estimation | p. 169 |
Conclusion and future work | p. 172 |
References | p. 174 |
TPSS: A Time-based Positioning Scheme for Sensor Networks with Short Range Beacons | p. 175 |
Introduction | p. 175 |
An Overview on Current Location Discovery Schemes for Sensor Networks | p. 176 |
Network Model | p. 181 |
TPSS: A Time-Based Positioning Scheme with Short Range Beacons | p. 181 |
Performance Evaluation | p. 186 |
Conclusion | p. 189 |
References | p. 191 |
Wakeup Strategies in Wireless Sensor Networks | p. 195 |
Introduction: The Wakeup Principle | p. 195 |
Classification | p. 200 |
On-demand Paging | p. 203 |
Synchronous Wakeup | p. 205 |
Asynchronous Wakeup | p. 209 |
Conclusions | p. 214 |
References | p. 215 |
Time-Synchronization Challenges and Techniques | p. 219 |
Introduction | p. 219 |
Sensor Network Nodes | p. 220 |
Influencing Factors | p. 220 |
Design Challenges | p. 222 |
Time Synchronization Fundamentals | p. 223 |
State-of-the-Art Time Synchronization Protocols | p. 226 |
Conclusions | p. 231 |
References | p. 232 |
Location Service, Information Dissemination and Object Tracking in Wireless Sensor Networks by Using Quorum Methods | p. 235 |
Introduction | p. 235 |
Location Service | p. 238 |
Information Dissemination | p. 243 |
Object Tracking | p. 249 |
Conclusion | p. 254 |
References | p. 255 |
Maximizing the Lifetime of an Always-On Wireless Sensor Network Application: A Case Study | p. 259 |
Introduction | p. 259 |
Fine-grained Power Management Schemes | p. 262 |
The ExScal Application and the XSM Platform | p. 266 |
Lifetime Analysis of ExScal | p. 270 |
Conclusion | p. 281 |
References | p. 282 |
Data Management | |
Data Management in Sensor Networks | p. 287 |
Difference between Data Management Systems In Sensor Networks and In Distributed Database Systems | p. 287 |
Architecture of Data Management System in Sensor Networks | p. 290 |
Data Model and Query Language in Sensor Networks | p. 292 |
Storage and Index Techniques in Sensor Networks | p. 297 |
Query Processing in Sensor Networks | p. 310 |
Sensor Network Data Management System | p. 322 |
References | p. 329 |
Data Aggregation in Wireless Sensor Networks | p. 331 |
Introduction | p. 331 |
Directed Diffusion | p. 332 |
Low-Energy Adaptive Clustering Hierarchy | p. 335 |
Tiny Aggregation | p. 337 |
Greedy Aggregation on Directed Diffusion | p. 338 |
DCTC | p. 341 |
Gateway Placement | p. 344 |
Summary | p. 346 |
References | p. 347 |
Performance Comparison of Clustering Schemes in Sensor Networks | p. 349 |
Introduction | p. 349 |
Related Work | p. 350 |
Overview of Algorithms | p. 352 |
Performance Comparison | p. 355 |
Conclusion | p. 361 |
References | p. 362 |
Reliable and Efficient Information Forwarding and Traffic Engineering in Wireless Sensor Networks | p. 365 |
Introduction | p. 365 |
Routing in Ad Hoc Networks | p. 366 |
Routing in Sensor Networks | p. 368 |
TE-Routing | p. 373 |
Conclusions and Research Directions | p. 383 |
References | p. 383 |
Modeling Data Gathering in Wireless Sensor Networks | p. 387 |
Introduction | p. 387 |
Active Querying with Look-Ahead | p. 389 |
Cluster-Based Joint Routing and Compression | p. 391 |
Joint Search and Replication | p. 394 |
Conclusions | p. 397 |
References | p. 399 |
Security | |
A Survey on Sensor Network Security | p. 403 |
Introduction | p. 403 |
Attacks on Sensor Networks | p. 405 |
Security Objectives for Sensor Networks | p. 411 |
Key Management in Sensor Networks | p. 412 |
Secure Routing in Sensor Networks | p. 417 |
Conclusions | p. 419 |
References | p. 419 |
A Passive Approach to Unauthorized Sensor Node Identification | p. 423 |
Introduction | p. 423 |
Related Work | p. 425 |
Organization of a Radio Interface | p. 427 |
Opportunities for Distinction | p. 427 |
Using Rate Switching to Detect Unauthorized Nodes | p. 429 |
Empirical Analysis of Rate Switching | p. 429 |
An Approach to Sensor Node Identification | p. 431 |
Experimental Evaluation | p. 433 |
Conclusion | p. 440 |
References | p. 441 |
Table of Contents provided by Ingram. All Rights Reserved. |