Misra / Woungang | Guide to Wireless Sensor Networks | E-Book | www.sack.de
E-Book

E-Book, Englisch, 725 Seiten

Reihe: Computer Communications and Networks

Misra / Woungang Guide to Wireless Sensor Networks


1. Auflage 2009
ISBN: 978-1-84882-218-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 725 Seiten

Reihe: Computer Communications and Networks

ISBN: 978-1-84882-218-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



Wireless communication technologies continue to undergo rapid advancement. In recent years, there has been a steep growth in research in the area of wireless sensor networks (WSNs). In WSNs, communication takes place with the help of spatially distributed, autonomous sensor nodes equipped to sense specific information. WSNs can be found in a variety of both military and civilian applications worldwide. Examples include detecting enemy intrusion on the battlefield, object tracking, habitat monitoring, patient monitoring and fire detection. Sensor networks are emerging as an attractive technology with great promise for the future. However, challenges remain to be addressed in issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy efficiency and security. This highly useful guide presents a comprehensive account of the fundamental concepts, new ideas and results in the field of WSNs.

Misra / Woungang Guide to Wireless Sensor Networks jetzt bestellen!

Weitere Infos & Material


1;Preface;7
2;Contents;11
3;Contributors;14
4;Chapter 1 Energy Efficient Information Processing in Wireless Sensor Networks;19
4.1;1.1 Introduction;19
4.2;1.2 Backgrounds;21
4.3;1.3 Thoughts for Practitioners;26
4.4;1.4 Directions for Future Research;38
4.5;1.5 Concluding Remarks;40
4.6;Questions;42
4.7;References;42
5;Chapter 2 Topology Management forWireless Sensor Networks;45
5.1;2.1 Introduction;45
5.2;2.2 Background;46
5.3;2.3 Thoughts for Practitioners;47
5.4;2.4 Topology Discovery Algorithms;49
5.5;2.5 Sleep-Cycle Management Algorithms;51
5.6;2.6 Clustering Algorithms;54
5.7;2.7 Directions for Future Research;60
5.8;2.8 Conclusions;61
5.9;Terminologies;62
5.10;Questions;62
5.11;References;63
6;Chapter 3 Coverage inWireless Sensor Networks;64
6.1;3.1 Introduction;64
6.2;3.2 Background;66
6.3;3.3 Optimal Geographical Density Control (OGDC) and its Fundamental Base;68
6.4;3.4 Sensor Placement in Realistic Environments;74
6.5;3.5 Coverage with the Use of Mobile Sensors;84
6.6;3.6 Thoughts for Practitioners;91
6.7;3.7 Directions for Future Research;91
6.8;3.8 Conclusion;92
6.9;Terminologies;92
6.10;Questions;93
6.11;Appendix 1. Proof of Lemma 2;94
6.12;Appendix 2. Proof of Lemma 3;95
6.13;References;95
7;Chapter 4 Routing in Wireless Sensor Networks;97
7.1;4.1 Introduction;97
7.2;4.2 Background;98
7.3;4.3 Greedy Packet Forwarding;99
7.4;4.4 Planar Graph Routing;105
7.5;4.5 Beaconless Routing;110
7.6;4.6 Data-Centric Routing;113
7.7;4.7 Discussion of the Presented Algorithms;115
7.8;4.8 Thoughts for Practitioners;118
7.9;4.9 Conclusion;122
7.10;Terminologies;123
7.11;Questions;124
7.12;References;124
8;Chapter 5 Geometric Routing in Wireless Sensor Networks;128
8.1;5.1 Introduction;128
8.2;5.2 Background;129
8.3;5.3 Geographical Routing;132
8.4;5.4 Routing with Virtual Coordinates;135
8.5;5.5 Information Discovery and Data-Centric Routing;150
8.6;5.6 Location Services and Hierarchical Routing Schemes;157
8.7;5.7 Thoughts for Practitioners;162
8.8;5.8 Directions for Future Research;163
8.9;5.9 Conclusions;164
8.10;Terminologies;164
8.11;Questions;165
8.12;References;166
9;Chapter 6 Cooperative Relaying inWireless Sensor Networks;173
9.1;6.1 Introduction;173
9.2;6.2 Background: Relaying in Wireless Networks;174
9.3;6.3 Proof of Concept for Cooperative Relaying in Sensor Networks;181
9.4;6.4 Cooperative Relaying in Wireless Sensor Networks;184
9.5;6.5 Thoughts for Practitioners;191
9.6;6.6 Directions for Future Research;192
9.7;6.7 Conclusions;193
9.8;Terminologies;194
9.9;Questions;194
9.10;References;195
10;Chapter 7 Data-Centricity in Wireless Sensor Networks;196
10.1;7.1 Introduction;196
10.2;7.2 Implementations of Data-Centric Abstractions;198
10.3;7.3 Data-Centric Routing;201
10.4;7.4 Data Aggregation;205
10.5;7.5 Data-Centric Storage Paradigms;211
10.6;7.6 Thoughts for Practitioners;213
10.7;7.7 Future Research Directions;213
10.8;7.8 Conclusions;214
10.9;Terminology;214
10.10;Questions;215
10.11;References;215
11;Chapter 8 Congestion and Flow Control in Wireless Sensor Networks;218
11.1;8.1 Introduction;219
11.2;8.2 Background;220
11.3;8.3 Challenges and Design Space;225
11.4;8.4 Classification of Congestion and Flow Control Approaches;226
11.5;8.5 Congestion and Flow Control for Many-to-One Traffic in WSNs;228
11.6;8.6 Reliability Requirements in WSNs;240
11.7;8.7 Other Related Works;243
11.8;8.8 Directions for FutureWork;247
11.9;8.9 Summary and Concluding Remarks;247
11.10;Questions;249
11.11;References;249
12;Chapter 9 Data Transport Control in Wireless Sensor Networks;252
12.1;9.1 Introduction;252
12.2;9.2 Data Transport Control in Convergecast;253
12.3;9.3 Data Transport Control in Reprogramming;264
12.4;9.4 Thoughts for Practitioners;268
12.5;9.5 Directions for Future Research;269
12.6;9.6 Conclusions;270
12.7;Terminologies;270
12.8;Exercises;271
12.9;References;272
13;Chapter 10 Fault-Tolerant Algorithms/Protocols in Wireless Sensor Networks;273
13.1;10.1 Introduction;273
13.2;10.2 Node Placement in Two-Tiered Wireless Sensor Networks;277
13.3;10.3 Topology Control;283
13.4;10.4 Target and Event Detection;287
13.5;10.5 Data Gathering and Aggregation;292
13.6;10.6 Sensor Monitoring and Surveillance;297
13.7;10.7 Thoughts for Practitioners;300
13.8;10.8 Conclusions and Directions for Future Research;301
13.9;Terminologies;301
13.10;Questions;302
13.11;References;302
14;Chapter 11 Self-Organizing and Self-Healing Schemes in Wireless Sensor Networks;304
14.1;11.1 Introduction;304
14.2;11.2 Background;306
14.3;11.3 Thoughts for Practitioners;311
14.4;11.4 Directions for Future Research;311
14.5;11.5 Conclusions;311
14.6;Terminologies;312
14.7;Questions;312
14.8;References;313
15;Chapter 12 Quality of Service inWireless Sensor Networks;316
15.1;12.1 Introduction;316
15.2;12.2 Background;318
15.3;12.3 Thoughts for Practitioners;325
15.4;12.4 Directions for Future Research;326
15.5;12.5 Conclusions;327
15.6;Terminologies;328
15.7;Questions;329
15.8;References;329
16;Chapter 13 Embedded Operating Systems in Wireless Sensor Networks;333
16.1;13.1 Introduction;333
16.2;13.2 Background;334
16.3;13.3 Wireless Sensor Operating Systems;334
16.4;13.4 Event-Driven Embedded Operating Systems;337
16.5;13.5 Thread-Driven EOSs;341
16.6;13.6 Contiki Hybrid EOS;345
16.7;13.7 Comparison and Analysis;347
16.8;13.8 Thoughts for Practitioners;349
16.9;13.9 Directions for Future Research;353
16.10;13.10 Conclusions;353
16.11;Terminologies;354
16.12;Questions;355
16.13;References;355
17;Chapter 14 Adaptive Distributed Resource Allocation for Sensor Networks;357
17.1;14.1 Introduction;357
17.2;14.2 Background;359
17.3;14.3 ADRA Scheme;361
17.4;14.4 Mode Management in Acoustic Sensor Network;364
17.5;14.5 Algorithm Description;365
17.6;14.6 Simulation Evaluation;371
17.7;14.7 Thoughts for Practitioners: Hardware Implementation;380
17.8;14.8 Conclusions and FutureWork;382
17.9;Terminologies;383
17.10;Questions;384
17.11;References;385
18;Chapter 15 Scheduling Activities in Wireless Sensor Networks;388
18.1;15.1 Introduction;388
18.2;15.2 Background;391
18.3;15.3 Entirely Interference-Free Scheduling;392
18.4;15.4 Light Scheduling;396
18.5;15.5 Duty Cycling;404
18.6;15.6 Application-Oriented Scheduling;410
18.7;15.7 Scheduling Under the Protocol Model and SINR Model;415
18.8;15.8 Thoughts for Practitioners;421
18.9;15.9 Directions for Future Research;421
18.10;15.10 Conclusions;422
18.11;Terminologies;422
18.12;Questions;423
18.13;References;424
19;Chapter 16 Energy-Efficient Medium Access Control in Wireless Sensor Networks;428
19.1;16.1 Introduction;428
19.2;16.2 Background;431
19.3;16.3 MAC Protocols for Sensor Networks;434
19.4;16.4 Thoughts for Practitioners;442
19.5;16.5 Directions for Future Research;443
19.6;16.6 Conclusion;443
19.7;Terminologies;444
19.8;Questions;445
19.9;References;445
20;Chapter 17 Energy-Efficient Resource Management Techniques in Wireless Sensor Networks;448
20.1;17.1 Introduction;448
20.2;17.2 Background;450
20.3;17.3 Low-Power Techniques at the Physical Layer;451
20.4;17.4 Power-Aware Strategies at DLL;454
20.5;17.5 Energy-Efficient Packet Routing;463
20.6;17.6 Thoughts for Practitioners: Cross-Layer Design for Energy Efficiency;469
20.7;17.7 Directions for Future Research;473
20.8;17.8 Conclusions;474
20.9;Terminologies;475
20.10;Questions;476
20.11;References;476
21;Chapter 18 Transmission Power Control Techniques in Ad Hoc Networks;478
21.1;18.1 Introduction;478
21.2;18.2 Background;481
21.3;18.3 Thoughts for Practitioners;485
21.4;18.4 Future Challenges in TPC;493
21.5;18.5 Conclusions;495
21.6;Terminologies;495
21.7;Questions;497
21.8;References;497
22;Chapter 19 Security in Wireless Sensor Networks;499
22.1;19.1 Introduction;499
22.2;19.2 Background;501
22.3;19.3 Existing Security Solutions;505
22.4;19.4 Thoughts for Practitioners [7, 8];513
22.5;19.5 Directions for Future Research;515
22.6;19.6 Conclusions;516
22.7;Terminologies;516
22.8;Questions;517
22.9;References;518
23;Chapter 20 Key Management in Wireless Sensor Networks;521
23.1;20.1 Introduction;521
23.2;20.2 Background;522
23.3;20.3 Notation for Protocol Specification;523
23.4;20.4 Protocol Verification;524
23.5;20.5 Key Establishment;525
23.6;20.6 Key Refreshment;531
23.7;20.7 Key Revocation and Rekeying;532
23.8;20.8 Thoughts for Practitioners;535
23.9;20.9 Directions for Future Research;535
23.10;20.10 Conclusions;535
23.11;Terminologies;535
23.12;Questions;537
23.13;References;538
24;Chapter 21 Secure Data Aggregation inWireless Sensor Networks;540
24.1;21.1 Introduction;540
24.2;21.2 Background;541
24.3;21.3 Resilient Aggregation;544
24.4;21.5 Result Verification;551
24.5;21.6 Privacy Homomorphism;558
24.6;21.7 Thoughts for Practitioners;561
24.7;21.8 Directions for Future Research;561
24.8;21.9 Conclusions;562
24.9;Terminologies;562
24.10;Questions;563
24.11;References;564
25;Chapter 22 Wireless Multimedia Sensor Networks;567
25.1;22.1 Introduction;567
25.2;22.2 Background;569
25.3;22.3 Thoughts for Practitioners;581
25.4;22.4 Directions for Future Research;582
25.5;22.5 Conclusions;583
25.6;Terminologies;583
25.7;Questions;584
25.8;References;584
26;Chapter 23 Middleware forWireless Sensor Networks: The ComfortableWay of Application Development;589
26.1;23.1 Introduction;589
26.2;23.2 Background: Middleware – Definition and Classification;595
26.3;23.3 Middleware Approaches for Wireless Sensor Networks;597
26.4;23.4 Thoughts for Practitioners;606
26.5;23.5 Directions for Future Research;608
26.6;23.6 Conclusions;608
26.7;Terminologies;609
26.8;Questions;609
26.9;References;611
27;Chapter 24 Wireless Mobile Sensor Networks: Protocols and Mobility Strategies;613
27.1;24.1 Introduction;613
27.2;24.2 Backgrounds;615
27.3;24.3 Functionalities and Mobility in the MWSN;619
27.4;24.4 Network Lifetime Enhancement in the MWSN;622
27.5;24.5 Network Coverage Improvement;627
27.6;24.6 Network Connectivity;634
27.7;24.7 Future Directions;636
27.8;24.8 Thoughts of Practitioners;637
27.9;24.9 Conclusion;637
27.10;Questions;638
27.11;References;639
28;Chapter 25 Analysis Methods for Sensor Networks;641
28.1;25.1 Introduction;641
28.2;25.2 Thoughts for Practitioners;650
28.3;25.3 Directions for Future Research;659
28.4;25.4 Conclusions;660
28.5;Terminologies;661
28.6;Questions;661
28.7;References;662
29;Chapter 26 Bio-inspired Communications in Wireless Sensor Networks;665
29.1;26.1 Introduction;665
29.2;26.2 Wireless Sensor Networks and Biological Systems;668
29.3;26.3 Immune System andWireless Sensor Networks;670
29.4;26.4 Immune-System-Based Distributed Node and Rate Selection;673
29.5;26.5 Biological Homeostasis and Wireless Multimedia Sensor Networks;676
29.6;26.6 Homeostasis-Based Multimedia Communication in Wireless Multimedia Sensor Networks;678
29.7;26.7 Biologically Inspired Coordination Models for Wireless Sensor and Actor Networks;680
29.8;26.8 Thoughts for Practitioners;688
29.9;26.9 Conclusion;689
29.10;Terminologies;689
29.11;Questions;690
29.12;References;690
30;Chapter 27 Mobile Ad Hoc and Sensor Systems for Global and Homeland Security Applications;692
30.1;27.1 Introduction;692
30.2;27.2 Background;694
30.3;27.3 Thoughts for Practitioners;697
30.4;27.4 International Initiatives;700
30.5;27.5 MASS Solutions for Public Safety Applications;702
30.6;27.6 Directions for Future Research;706
30.7;27.7 Conclusions;709
30.8;Terminologies;710
30.9;Questions;711
30.10;References;712
30.11;Biography;714
31;Index;717



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.