| Dedication | p. V |
| Contributing Authors | p. XIII |
| Preface | p. XIX |
| Network Design and Network Modelling | |
| A Taxonomy-based Approach to Design of Large-scale Sensor Networks | p. 3 |
| Introduction | p. 3 |
| Classification of Sensor Network Applications | p. 7 |
| Salient Features of Sensor Networks | p. 8 |
| Common Design Problems in Sensor Networks | p. 11 |
| Class-specific Problems in Sensor Networks | p. 13 |
| Sensor Network Implementations | p. 21 |
| Conclusions and Future Directions | p. 28 |
| References | p. 30 |
| Algorithms for Robotic Deployment of WSN in Adaptive Sampling Applications | p. 35 |
| Introduction | p. 35 |
| Problem Formulation | p. 37 |
| Communication Models | p. 39 |
| Sampling of Parametrized Fields Based on Closed-Form Information Measures | p. 40 |
| Adaptive Sampling Using the Extended Kalman Filter | p. 50 |
| Potential Fields | p. 53 |
| Conclusions and Future Work | p. 59 |
| References | p. 61 |
| A Scalable Graph Model and Coordination Algorithms for Mobile Sensor Networks | p. 65 |
| Introduction | p. 65 |
| Distributed Graph Model | p. 67 |
| Self-deployment Algorithm | p. 70 |
| Simulation Results | p. 75 |
| Conclusion | p. 81 |
| References | p. 81 |
| Network Management | |
| Medium Access Control Protocols for Wireless Sensor Networks | p. 87 |
| Introduction | p. 87 |
| Characteristics of MAC Protocols in WSNs | p. 89 |
| Scheduled-based MAC Protocols | p. 92 |
| Contention-based Protocols | p. 93 |
| Short Note on the Energy Model in NS2 Network Simulator | p. 106 |
| Conclusion | p. 108 |
| References | p. 109 |
| Topology Control for Wireless Sensor Networks | p. 113 |
| Introduction | p. 113 |
| Geometrical Spanners | p. 116 |
| Geometrical Low-Weight Structures | p. 128 |
| Virtual Backbones | p. 133 |
| Others | p. 138 |
| Conclusion | p. 139 |
| References | p. 140 |
| Boundary Detection for Sensor Networks | p. 149 |
| Introduction | p. 149 |
| Localized Edge Detection | p. 151 |
| Centralized edge determination | p. 162 |
| Distributed Edge Detection | p. 165 |
| Hierarchical edge estimation | p. 169 |
| Conclusion and future work | p. 172 |
| References | p. 174 |
| TPSS: A Time-based Positioning Scheme for Sensor Networks with Short Range Beacons | p. 175 |
| Introduction | p. 175 |
| An Overview on Current Location Discovery Schemes for Sensor Networks | p. 176 |
| Network Model | p. 181 |
| TPSS: A Time-Based Positioning Scheme with Short Range Beacons | p. 181 |
| Performance Evaluation | p. 186 |
| Conclusion | p. 189 |
| References | p. 191 |
| Wakeup Strategies in Wireless Sensor Networks | p. 195 |
| Introduction: The Wakeup Principle | p. 195 |
| Classification | p. 200 |
| On-demand Paging | p. 203 |
| Synchronous Wakeup | p. 205 |
| Asynchronous Wakeup | p. 209 |
| Conclusions | p. 214 |
| References | p. 215 |
| Time-Synchronization Challenges and Techniques | p. 219 |
| Introduction | p. 219 |
| Sensor Network Nodes | p. 220 |
| Influencing Factors | p. 220 |
| Design Challenges | p. 222 |
| Time Synchronization Fundamentals | p. 223 |
| State-of-the-Art Time Synchronization Protocols | p. 226 |
| Conclusions | p. 231 |
| References | p. 232 |
| Location Service, Information Dissemination and Object Tracking in Wireless Sensor Networks by Using Quorum Methods | p. 235 |
| Introduction | p. 235 |
| Location Service | p. 238 |
| Information Dissemination | p. 243 |
| Object Tracking | p. 249 |
| Conclusion | p. 254 |
| References | p. 255 |
| Maximizing the Lifetime of an Always-On Wireless Sensor Network Application: A Case Study | p. 259 |
| Introduction | p. 259 |
| Fine-grained Power Management Schemes | p. 262 |
| The ExScal Application and the XSM Platform | p. 266 |
| Lifetime Analysis of ExScal | p. 270 |
| Conclusion | p. 281 |
| References | p. 282 |
| Data Management | |
| Data Management in Sensor Networks | p. 287 |
| Difference between Data Management Systems In Sensor Networks and In Distributed Database Systems | p. 287 |
| Architecture of Data Management System in Sensor Networks | p. 290 |
| Data Model and Query Language in Sensor Networks | p. 292 |
| Storage and Index Techniques in Sensor Networks | p. 297 |
| Query Processing in Sensor Networks | p. 310 |
| Sensor Network Data Management System | p. 322 |
| References | p. 329 |
| Data Aggregation in Wireless Sensor Networks | p. 331 |
| Introduction | p. 331 |
| Directed Diffusion | p. 332 |
| Low-Energy Adaptive Clustering Hierarchy | p. 335 |
| Tiny Aggregation | p. 337 |
| Greedy Aggregation on Directed Diffusion | p. 338 |
| DCTC | p. 341 |
| Gateway Placement | p. 344 |
| Summary | p. 346 |
| References | p. 347 |
| Performance Comparison of Clustering Schemes in Sensor Networks | p. 349 |
| Introduction | p. 349 |
| Related Work | p. 350 |
| Overview of Algorithms | p. 352 |
| Performance Comparison | p. 355 |
| Conclusion | p. 361 |
| References | p. 362 |
| Reliable and Efficient Information Forwarding and Traffic Engineering in Wireless Sensor Networks | p. 365 |
| Introduction | p. 365 |
| Routing in Ad Hoc Networks | p. 366 |
| Routing in Sensor Networks | p. 368 |
| TE-Routing | p. 373 |
| Conclusions and Research Directions | p. 383 |
| References | p. 383 |
| Modeling Data Gathering in Wireless Sensor Networks | p. 387 |
| Introduction | p. 387 |
| Active Querying with Look-Ahead | p. 389 |
| Cluster-Based Joint Routing and Compression | p. 391 |
| Joint Search and Replication | p. 394 |
| Conclusions | p. 397 |
| References | p. 399 |
| Security | |
| A Survey on Sensor Network Security | p. 403 |
| Introduction | p. 403 |
| Attacks on Sensor Networks | p. 405 |
| Security Objectives for Sensor Networks | p. 411 |
| Key Management in Sensor Networks | p. 412 |
| Secure Routing in Sensor Networks | p. 417 |
| Conclusions | p. 419 |
| References | p. 419 |
| A Passive Approach to Unauthorized Sensor Node Identification | p. 423 |
| Introduction | p. 423 |
| Related Work | p. 425 |
| Organization of a Radio Interface | p. 427 |
| Opportunities for Distinction | p. 427 |
| Using Rate Switching to Detect Unauthorized Nodes | p. 429 |
| Empirical Analysis of Rate Switching | p. 429 |
| An Approach to Sensor Node Identification | p. 431 |
| Experimental Evaluation | p. 433 |
| Conclusion | p. 440 |
| References | p. 441 |
| Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.