Guide to Wireless Sensor Networks (eBook)
XVII, 725 Seiten
Springer London (Verlag)
978-1-84882-218-4 (ISBN)
Wireless communication technologies continue to undergo rapid advancement. In recent years, there has been a steep growth in research in the area of wireless sensor networks (WSNs). In WSNs, communication takes place with the help of spatially distributed, autonomous sensor nodes equipped to sense specific information. WSNs can be found in a variety of both military and civilian applications worldwide. Examples include detecting enemy intrusion on the battlefield, object tracking, habitat monitoring, patient monitoring and fire detection. Sensor networks are emerging as an attractive technology with great promise for the future. However, challenges remain to be addressed in issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy efficiency and security. This highly useful guide presents a comprehensive account of the fundamental concepts, new ideas and results in the field of WSNs.
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The last few years have experienced a steep growth in research in the area of wireless sensor networks (WSNs). In WSNs, communication takes place with the help of spatially distributedautonomoussensornodesequippedtosensespeci?cinformation. WSNs, especially the ones that have gained much popularity in the recent years, are, ty- cally, ad hoc in nature and they inherit many characteristics/features of wireless ad hoc networks such as the ability for infrastructure-less setup, minimal or no reliance on network planning, and the ability of the nodes to self-organize and self-con?gure without the involvement of a centralized network manager, router, access point, or a switch. These features help to set up WSNs fast in situations where there is no existing network setup or in times when setting up a ?xed infrastructure network is considered infeasible, for example, in times of emergency or during relief- erations. WSNs ?nd a variety of applications in both the military and the civilian population worldwide such as in cases of enemy intrusion in the battle?eld, object tracking, habitat monitoring, patient monitoring, ?re detection, and so on. Even though sensor networks have emerged to be attractive and they hold great promises for our future, there are several challenges that need to be addressed. Some of the well-known challenges are attributed to issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy ef?ciency, and security.
Preface 7
Contents 11
Contributors 14
Chapter 1 Energy Efficient Information Processing in Wireless Sensor Networks 19
1.1 Introduction 19
1.2 Backgrounds 21
1.3 Thoughts for Practitioners 26
1.4 Directions for Future Research 38
1.5 Concluding Remarks 40
Questions 42
References 42
Chapter 2 Topology Management forWireless Sensor Networks 45
2.1 Introduction 45
2.2 Background 46
2.3 Thoughts for Practitioners 47
2.4 Topology Discovery Algorithms 49
2.5 Sleep-Cycle Management Algorithms 51
2.6 Clustering Algorithms 54
2.7 Directions for Future Research 60
2.8 Conclusions 61
Terminologies 62
Questions 62
References 63
Chapter 3 Coverage inWireless Sensor Networks 64
3.1 Introduction 64
3.2 Background 66
3.3 Optimal Geographical Density Control (OGDC) and its Fundamental Base 68
3.4 Sensor Placement in Realistic Environments 74
3.5 Coverage with the Use of Mobile Sensors 84
3.6 Thoughts for Practitioners 91
3.7 Directions for Future Research 91
3.8 Conclusion 92
Terminologies 92
Questions 93
Appendix 1. Proof of Lemma 2 94
Appendix 2. Proof of Lemma 3 95
References 95
Chapter 4 Routing in Wireless Sensor Networks 97
4.1 Introduction 97
4.2 Background 98
4.3 Greedy Packet Forwarding 99
4.4 Planar Graph Routing 105
4.5 Beaconless Routing 110
4.6 Data-Centric Routing 113
4.7 Discussion of the Presented Algorithms 115
4.8 Thoughts for Practitioners 118
4.9 Conclusion 122
Terminologies 123
Questions 124
References 124
Chapter 5 Geometric Routing in Wireless Sensor Networks 128
5.1 Introduction 128
5.2 Background 129
5.3 Geographical Routing 132
5.4 Routing with Virtual Coordinates 135
5.5 Information Discovery and Data-Centric Routing 150
5.6 Location Services and Hierarchical Routing Schemes 157
5.7 Thoughts for Practitioners 162
5.8 Directions for Future Research 163
5.9 Conclusions 164
Terminologies 164
Questions 165
References 166
Chapter 6 Cooperative Relaying inWireless Sensor Networks 173
6.1 Introduction 173
6.2 Background: Relaying in Wireless Networks 174
6.3 Proof of Concept for Cooperative Relaying in Sensor Networks 181
6.4 Cooperative Relaying in Wireless Sensor Networks 184
6.5 Thoughts for Practitioners 191
6.6 Directions for Future Research 192
6.7 Conclusions 193
Terminologies 194
Questions 194
References 195
Chapter 7 Data-Centricity in Wireless Sensor Networks 196
7.1 Introduction 196
7.2 Implementations of Data-Centric Abstractions 198
7.3 Data-Centric Routing 201
7.4 Data Aggregation 205
7.5 Data-Centric Storage Paradigms 211
7.6 Thoughts for Practitioners 213
7.7 Future Research Directions 213
7.8 Conclusions 214
Terminology 214
Questions 215
References 215
Chapter 8 Congestion and Flow Control in Wireless Sensor Networks 218
8.1 Introduction 219
8.2 Background 220
8.3 Challenges and Design Space 225
8.4 Classification of Congestion and Flow Control Approaches 226
8.5 Congestion and Flow Control for Many-to-One Traffic in WSNs 228
8.6 Reliability Requirements in WSNs 240
8.7 Other Related Works 243
8.8 Directions for FutureWork 247
8.9 Summary and Concluding Remarks 247
Questions 249
References 249
Chapter 9 Data Transport Control in Wireless Sensor Networks 252
9.1 Introduction 252
9.2 Data Transport Control in Convergecast 253
9.3 Data Transport Control in Reprogramming 264
9.4 Thoughts for Practitioners 268
9.5 Directions for Future Research 269
9.6 Conclusions 270
Terminologies 270
Exercises 271
References 272
Chapter 10 Fault-Tolerant Algorithms/Protocols in Wireless Sensor Networks 273
10.1 Introduction 273
10.2 Node Placement in Two-Tiered Wireless Sensor Networks 277
10.3 Topology Control 283
10.4 Target and Event Detection 287
10.5 Data Gathering and Aggregation 292
10.6 Sensor Monitoring and Surveillance 297
10.7 Thoughts for Practitioners 300
10.8 Conclusions and Directions for Future Research 301
Terminologies 301
Questions 302
References 302
Chapter 11 Self-Organizing and Self-Healing Schemes in Wireless Sensor Networks 304
11.1 Introduction 304
11.2 Background 306
11.3 Thoughts for Practitioners 311
11.4 Directions for Future Research 311
11.5 Conclusions 311
Terminologies 312
Questions 312
References 313
Chapter 12 Quality of Service inWireless Sensor Networks 316
12.1 Introduction 316
12.2 Background 318
12.3 Thoughts for Practitioners 325
12.4 Directions for Future Research 326
12.5 Conclusions 327
Terminologies 328
Questions 329
References 329
Chapter 13 Embedded Operating Systems in Wireless Sensor Networks 333
13.1 Introduction 333
13.2 Background 334
13.3 Wireless Sensor Operating Systems 334
13.4 Event-Driven Embedded Operating Systems 337
13.5 Thread-Driven EOSs 341
13.6 Contiki Hybrid EOS 345
13.7 Comparison and Analysis 347
13.8 Thoughts for Practitioners 349
13.9 Directions for Future Research 353
13.10 Conclusions 353
Terminologies 354
Questions 355
References 355
Chapter 14 Adaptive Distributed Resource Allocation for Sensor Networks 357
14.1 Introduction 357
14.2 Background 359
14.3 ADRA Scheme 361
14.4 Mode Management in Acoustic Sensor Network 364
14.5 Algorithm Description 365
14.6 Simulation Evaluation 371
14.7 Thoughts for Practitioners: Hardware Implementation 380
14.8 Conclusions and FutureWork 382
Terminologies 383
Questions 384
References 385
Chapter 15 Scheduling Activities in Wireless Sensor Networks 388
15.1 Introduction 388
15.2 Background 391
15.3 Entirely Interference-Free Scheduling 392
15.4 Light Scheduling 396
15.5 Duty Cycling 404
15.6 Application-Oriented Scheduling 410
15.7 Scheduling Under the Protocol Model and SINR Model 415
15.8 Thoughts for Practitioners 421
15.9 Directions for Future Research 421
15.10 Conclusions 422
Terminologies 422
Questions 423
References 424
Chapter 16 Energy-Efficient Medium Access Control in Wireless Sensor Networks 428
16.1 Introduction 428
16.2 Background 431
16.3 MAC Protocols for Sensor Networks 434
16.4 Thoughts for Practitioners 442
16.5 Directions for Future Research 443
16.6 Conclusion 443
Terminologies 444
Questions 445
References 445
Chapter 17 Energy-Efficient Resource Management Techniques in Wireless Sensor Networks 448
17.1 Introduction 448
17.2 Background 450
17.3 Low-Power Techniques at the Physical Layer 451
17.4 Power-Aware Strategies at DLL 454
17.5 Energy-Efficient Packet Routing 463
17.6 Thoughts for Practitioners: Cross-Layer Design for Energy Efficiency 469
17.7 Directions for Future Research 473
17.8 Conclusions 474
Terminologies 475
Questions 476
References 476
Chapter 18 Transmission Power Control Techniques in Ad Hoc Networks 478
18.1 Introduction 478
18.2 Background 481
18.3 Thoughts for Practitioners 485
18.4 Future Challenges in TPC 493
18.5 Conclusions 495
Terminologies 495
Questions 497
References 497
Chapter 19 Security in Wireless Sensor Networks 499
19.1 Introduction 499
19.2 Background 501
19.3 Existing Security Solutions 505
19.4 Thoughts for Practitioners [7, 8] 513
19.5 Directions for Future Research 515
19.6 Conclusions 516
Terminologies 516
Questions 517
References 518
Chapter 20 Key Management in Wireless Sensor Networks 521
20.1 Introduction 521
20.2 Background 522
20.3 Notation for Protocol Specification 523
20.4 Protocol Verification 524
20.5 Key Establishment 525
20.6 Key Refreshment 531
20.7 Key Revocation and Rekeying 532
20.8 Thoughts for Practitioners 535
20.9 Directions for Future Research 535
20.10 Conclusions 535
Terminologies 535
Questions 537
References 538
Chapter 21 Secure Data Aggregation inWireless Sensor Networks 540
21.1 Introduction 540
21.2 Background 541
21.3 Resilient Aggregation 544
21.5 Result Verification 551
21.6 Privacy Homomorphism 558
21.7 Thoughts for Practitioners 561
21.8 Directions for Future Research 561
21.9 Conclusions 562
Terminologies 562
Questions 563
References 564
Chapter 22 Wireless Multimedia Sensor Networks 567
22.1 Introduction 567
22.2 Background 569
22.3 Thoughts for Practitioners 581
22.4 Directions for Future Research 582
22.5 Conclusions 583
Terminologies 583
Questions 584
References 584
Chapter 23 Middleware forWireless Sensor Networks: The ComfortableWay of Application Development 589
23.1 Introduction 589
23.2 Background: Middleware – Definition and Classification 595
23.3 Middleware Approaches for Wireless Sensor Networks 597
23.4 Thoughts for Practitioners 606
23.5 Directions for Future Research 608
23.6 Conclusions 608
Terminologies 609
Questions 609
References 611
Chapter 24 Wireless Mobile Sensor Networks: Protocols and Mobility Strategies 613
24.1 Introduction 613
24.2 Backgrounds 615
24.3 Functionalities and Mobility in the MWSN 619
24.4 Network Lifetime Enhancement in the MWSN 622
24.5 Network Coverage Improvement 627
24.6 Network Connectivity 634
24.7 Future Directions 636
24.8 Thoughts of Practitioners 637
24.9 Conclusion 637
Questions 638
References 639
Chapter 25 Analysis Methods for Sensor Networks 641
25.1 Introduction 641
25.2 Thoughts for Practitioners 650
25.3 Directions for Future Research 659
25.4 Conclusions 660
Terminologies 661
Questions 661
References 662
Chapter 26 Bio-inspired Communications in Wireless Sensor Networks 665
26.1 Introduction 665
26.2 Wireless Sensor Networks and Biological Systems 668
26.3 Immune System andWireless Sensor Networks 670
26.4 Immune-System-Based Distributed Node and Rate Selection 673
26.5 Biological Homeostasis and Wireless Multimedia Sensor Networks 676
26.6 Homeostasis-Based Multimedia Communication in Wireless Multimedia Sensor Networks 678
26.7 Biologically Inspired Coordination Models for Wireless Sensor and Actor Networks 680
26.8 Thoughts for Practitioners 688
26.9 Conclusion 689
Terminologies 689
Questions 690
References 690
Chapter 27 Mobile Ad Hoc and Sensor Systems for Global and Homeland Security Applications 692
27.1 Introduction 692
27.2 Background 694
27.3 Thoughts for Practitioners 697
27.4 International Initiatives 700
27.5 MASS Solutions for Public Safety Applications 702
27.6 Directions for Future Research 706
27.7 Conclusions 709
Terminologies 710
Questions 711
References 712
Biography 714
Index 717
Erscheint lt. Verlag | 29.5.2009 |
---|---|
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Weitere Themen ► Hardware | |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | Communication • Information • Quality of Service • Quality of Service (QoS) • Routing • wireless sensor network • wireless sensor networks |
ISBN-10 | 1-84882-218-9 / 1848822189 |
ISBN-13 | 978-1-84882-218-4 / 9781848822184 |
Haben Sie eine Frage zum Produkt? |
Größe: 9,8 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich