rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780471719762

Sensor Network Operations

by ; ;
  • ISBN13:

    9780471719762

  • ISBN10:

    0471719765

  • Format: Hardcover
  • Copyright: 2006-05-05
  • Publisher: Wiley-IEEE Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $204.00

Summary

This excellent title introduces the concept of mission-oriented sensor networks as distributed dynamic systems of interacting sensing devices that are networked to jointly execute complex real-time missions under uncertainity. It provides the latest, yet unpublished results on the main technical and application challenges of mission-oriented sensor networks. The authors of each chapter are research leaders from multiple disciplines who are presenting their latest innovations on the issues. Together, the editors have compiled a comprehensive treatment of the subject that flows smoothly from chapter to chapter. This interdisciplinary approach significantly enhances the science and technology knowledge base and influences the military and civilian applications of this field.Author Information:Dr. Shashi Phoha is the Guest Editor of IEEE Transactions in Mobile Computing, Special Issue on Mission-Oriented Sensor Networks. She is the Head of the Information Sciences and Technology Division of ARL and Professor of Electrical and Computer Engineering at Pennsylvania State University. She has led major research programs of multimillion dollars for military sensor networks in industry as well as in academia. In addition to more than a hundred journal articles, she authored or co-authored several books in related areas.Dr. Thomas La Porta is the Editor of the IEEE Transactions on Mobile Computing. He received his B.S.E.E. and M.S.E.E. degrees from The Cooper Union, New York, NY and his Ph.D. degree in Electrical Engineering from Columbia University, New York, NY. He joined the Computer Science and Engineering Department at Penn State in 2002 as a Full Professor. He is Director of the Networking Research Center at Penn State.Prior to joining Penn State, Dr. LaPorta was with Bell Laboratories since 1986. He was the Director of the Mobile Networking Research Department Bell Laboratories, Lucent Technologies, where he led various projects in wireless and mobile networking. He is an IEEE Fellow, Bell Labs Fellow, received the Bell Labs Distinguished Technical Staff Award, and an Eta Kappa Nu Outstanding Young Electrical Engineer Award. He has published over 50 technical papers and holds over 20 patents.Christopher Griffin holds a Masters degree in Mathematics from Penn State and is currently pursuing his Ph.D. there. Mr. Griffin has worked as a research engineer at the Penn State Applied Research Laboratory for the last six years on several DARPA and or Army Research Laboratory sponsored programs, including: the Emergent Surveillance Plexus (ESP) program as a lead engineer; the DARPA sponsored Semantic Information Fusion program under the SensIT initiative, where he co-developed a distributed target tracking system and managed the development of a target classification algorithm using Level 1 sensor fusion techniques; as a co-principal software architect for the DARPA Joint Force Component Controller (JFACC) initiative, an adaptive C2 program aimed at improving Air Force response times; and he was the principal software architect for the Boeing/ARFL Insertion of Embedding Infosphere Technology (IEIST) program. His areas of research expertise are distributed tracking systems, mission oriented control, and system modeling.

Author Biography

Dr. Shashi Phoha was the Guest Editor of IEEE Transactions on Mobile Computing, Special Issue on Mission-Oriented Sensor Networks. She is a Professor of Electrical and Computer Engineering at The Pennsylvania State University and the head of the Information Sciences and Technology Division of its Applied Research Laboratory. In 2004, she was appointed as the Director of the Information Technology Laboratory of the National Institute of Standards and Technology. She has held senior positions in industry, academia, and government research labs and led major research programs in surveillance sensor networks and Sensor IT for military sensor networks. </p> <p>Dr. Thomas La Porta is the Editor of the IEEE Transactions on Mobile Computing. He received his BSEE and MSEE degrees from The Cooper Union, New York, and his PhD degree in electrical engineering from Columbia University, New York. He joined the Computer Science and Engineering Department at Penn State in 2002 as a full professor. He is Director of the Networking Research Center at Penn State. <p>Christopher Griffin holds a master's degree in mathematics from Penn State and is currently finishing his PhD there. Mr. Griffin has worked as a research engineer at the Information Science and Technology Division of Penn State Applied Research Laboratory for the last six years on several DARPA and/or Army Research Laboratory&#150;sponsored programs.

Table of Contents

Preface xiii
Contributors xv
I. SENSOR NETWORK OPERATIONS OVERVIEW
1(10)
Overview of Mission-Oriented Sensor Networks
3(8)
Introduction
3(1)
Trends in Sensor Development
4(4)
Mission-Oriented Sensor Networks: Dynamic Systems Perspective
8(3)
References
10(1)
II. SENSOR NETWORK DESIGN AND OPERATIONS
11(576)
Sensor Deployment, Self-Organization, and Localization
13(78)
Introduction
13(1)
Scare: A Scalable Self-Configuration and Adaptive Reconfiguration Scheme for Dense Sensor Networks
14(21)
Robust Sensor Positioning in Wireless Ad Hoc Sensor Networks
35(16)
Trigonometric k Clustering (TKC) for Censored Distance Estimation
51(17)
Sensing Coverage and Breach Paths in Surveillance Wireless Sensor Networks
68(23)
References
86(5)
Purposeful Mobility and Navigation
91(94)
Introduction
91(1)
Controlled Mobility for Efficient Data Gathering in Sensor Networks with Passively Mobile Nodes
92(21)
Purposeful Mobility in Tactical Sensor Networks
113(13)
Formation and Alignment of Distributed Sensing Agents with Double-Integrator Dynamics and Actuator Saturation
126(31)
Modeling and Enhancing the Data Capacity of Wireless Sensor Networks
157(28)
References
179(6)
Lower Layer Issues---MAC, Scheduling, and Transmission
185(78)
Introduction
185(1)
SS-TDMA: A Self-Stabilizing Medium Access Control (MAC) for Sensor Networks
186(32)
Comprehensive Performance Study of IEEE 802.15.4
218(19)
Providing Energy Efficiency for Wireless Sensor Networks Through Link Adaptation Techniques
237(26)
References
257(6)
Network Routing
263(74)
Introduction
263(1)
Load-Balanced Query Protocols for Wireless Sensor Networks
264(27)
Energy-Efficient and MAC-Aware Routing for Data Aggregation in Sensor Networks
291(17)
LESS: Low-Energy Security Solution for Large-scale Sensor Networks Based on Tree-Ripple-Zone Routing Scheme
308(29)
References
329(8)
Power Management
337(84)
Introduction
337(1)
Adaptive Sensing and Reporting in Energy-Constrained Sensor Networks
338(16)
Sensor Placement and Lifetime of Wireless Sensor Networks: Theory and Performance Analysis
354(13)
Algorithms for Maximizing Lifetime of Battery-Powered Wireless Sensor Nodes
367(30)
Battery Lifetime Estimation and Optimization for Underwater Sensor Networks
397(24)
References
416(5)
Distributed Sensing and Data Gathering
421(88)
Introduction
421(1)
Secure Differential Data Aggregation for Wireless Sensor Networks
422(20)
Energy-Conserving Data Gathering Strategy Based on Trade-off Between Coverage and Data Reporting Latency in Wireless Sensor Networks
442(25)
Quality-Driven Information Processing and Aggregation in Distributed Sensor Networks
467(19)
Progressive Approach to Distributed Multiple-Target Detection in Sensor Networks
486(23)
References
504(5)
Network Security
509(78)
Introduction
509(1)
Energy Cost of Embedded Security for Wireless Sensor Networks
510(12)
Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks
522(13)
Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc Networks
535(22)
Fast and Scalable Key Establishment in Sensor Networks
557(14)
Weil Pairing-Based Round, Efficient, and Fault-Tolerant Group Key Agreement Protocol for Sensor Networks
571(16)
References
580(7)
III. SENSOR NETWORK APPLICATIONS
587(130)
Pursuer-Evader Tracking in Sensor Networks
589(20)
Introduction
589(1)
The Problem
590(2)
Evader-Centric Program
592(3)
Pursuer-Centric Program
595(1)
Hybrid Pursuer-Evader Program
596(3)
Efficient Version of Hybrid Program
599(1)
Implementation and Simulation Results
600(5)
Discussion and Related Work
605(4)
References
607(2)
Embedded Soft Sensing for Anomaly Detection in Mobile Robotic Networks
609(22)
Introduction
609(5)
Mobile Robot Simulation Setup
614(1)
Software Anomalies in Mobile Robotic Networks
615(1)
Soft Sensor
616(1)
Software Anomaly Detection Architecture
616(2)
Anomaly Detection Mechanisms
618(1)
Test Bed for Software Anomaly Detection in Mobile Robot Application
619(4)
Results and Discussion
623(3)
Conclusions and Future Work
626(5)
Appendix A
626(1)
Appendix B
627(1)
References
628(3)
Multisensor Network-Based Framework for Video Surveillance: Real-Time Superresolution Imaging
631(18)
Introduction
632(1)
Basic Model of Distributed Multisensor Surveillance System
632(4)
Superresolution Imaging
636(2)
Optical Flow Computation
638(6)
Superresolution Image Reconstruction
644(1)
Experimental Results
644(1)
Conclusion
645(4)
References
646(3)
Using Information Theory to Design Context-Sensing Wearable Systems
649(28)
Introduction
649(2)
Related Work
651(1)
Theoretical Background
651(3)
Adaptations
654(8)
Design Considerations
662(1)
Case Study
663(3)
Results
666(8)
Conclusion
674(3)
Appendix
674(1)
References
675(2)
Multiple Bit Stream Image Transmission over Wireless Sensor Networks
677(12)
Introduction
677(2)
System Description
679(6)
Experimental Results
685(1)
Summary and Discussion
686(3)
References
687(2)
Hybrid Sensor Network Test Bed for Reinforced Target Tracking
689(16)
Introduction
689(1)
Sensor Network Operational Components
690(4)
Sensor Network Challenge Problem
694(1)
Integrated Target Surveillance Experiment
695(3)
Experimental Results and Evaluation
698(3)
Conclusion
701(4)
References
703(2)
Noise-Adaptive Sensor Network for Vehicle Tracking in the Desert
705(12)
Introduction
706(2)
Distributed Tracking
708(2)
Algorithms
710(2)
Experimental Methods
712(2)
Results and Discussion
714(1)
Conclusion
715(2)
References
715(2)
Acknowledgments 717(2)
Index 719(4)
About the Editors 723

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program