| Dedication | p. V |
| Contributing Authors | p. XIII |
| Preface | p. XIX |
| Network Design and Network Modelling | |
| A Taxonomy-based Approach to Design of Large-scale Sensor Networks | p. 3 |
| Introduction | p. 3 |
| Classification of Sensor Network Applications | p. 7 |
| Salient Features of Sensor Networks | p. 8 |
| Common Design Problems in Sensor Networks | p. 11 |
| Class-specific Problems in Sensor Networks | p. 13 |
| Sensor Network Implementations | p. 21 |
| Conclusions and Future Directions | p. 28 |
| References | p. 30 |
| Algorithms for Robotic Deployment of WSN in Adaptive Sampling Applications | p. 35 |
| Introduction | p. 35 |
| Problem Formulation | p. 37 |
| Communication Models | p. 39 |
| Sampling of Parametrized Fields Based on Closed-Form Information Measures | p. 40 |
| Adaptive Sampling Using the Extended Kalman Filter | p. 50 |
| Potential Fields | p. 53 |
| Conclusions and Future Work | p. 59 |
| References | p. 61 |
| A Scalable Graph Model and Coordination Algorithms for Mobile Sensor Networks | p. 65 |
| Introduction | p. 65 |
| Distributed Graph Model | p. 67 |
| Self-deployment Algorithm | p. 70 |
| Simulation Results | p. 75 |
| Conclusion | p. 81 |
| References | p. 81 |
| Network Management | |
| Medium Access Control Protocols for Wireless Sensor Networks | p. 87 |
| Introduction | p. 87 |
| Characteristics of MAC Protocols in WSNs | p. 89 |
| Scheduled-based MAC Protocols | p. 92 |
| Contention-based Protocols | p. 93 |
| Short Note on the Energy Model in NS2 Network Simulator | p. 106 |
| Conclusion | p. 108 |
| References | p. 109 |
| Topology Control for Wireless Sensor Networks | p. 113 |
| Introduction | p. 113 |
| Geometrical Spanners | p. 116 |
| Geometrical Low-Weight Structures | p. 128 |
| Virtual Backbones | p. 133 |
| Others | p. 138 |
| Conclusion | p. 139 |
| References | p. 140 |
| Boundary Detection for Sensor Networks | p. 149 |
| Introduction | p. 149 |
| Localized Edge Detection | p. 151 |
| Centralized edge determination | p. 162 |
| Distributed Edge Detection | p. 165 |
| Hierarchical edge estimation | p. 169 |
| Conclusion and future work | p. 172 |
| References | p. 174 |
| TPSS: A Time-based Positioning Scheme for Sensor Networks with Short Range Beacons | p. 175 |
| Introduction | p. 175 |
| An Overview on Current Location Discovery Schemes for Sensor Networks | p. 176 |
| Network Model | p. 181 |
| TPSS: A Time-Based Positioning Scheme with Short Range Beacons | p. 181 |
| Performance Evaluation | p. 186 |
| Conclusion | p. 189 |
| References | p. 191 |
| Wakeup Strategies in Wireless Sensor Networks | p. 195 |
| Introduction: The Wakeup Principle | p. 195 |
| Classification | p. 200 |
| On-demand Paging | p. 203 |
| Synchronous Wakeup | p. 205 |
| Asynchronous Wakeup | p. 209 |
| Conclusions | p. 214 |
| References | p. 215 |
| Time-Synchronization Challenges and Techniques | p. 219 |
| Introduction | p. 219 |
| Sensor Network Nodes | p. 220 |
| Influencing Factors | p. 220 |
| Design Challenges | p. 222 |
| Time Synchronization Fundamentals | p. 223 |
| State-of-the-Art Time Synchronization Protocols | p. 226 |
| Conclusions | p. 231 |
| References | p. 232 |
| Location Service, Information Dissemination and Object Tracking in Wireless Sensor Networks by Using Quorum Methods | p. 235 |
| Introduction | p. 235 |
| Location Service | p. 238 |
| Information Dissemination | p. 243 |
| Object Tracking | p. 249 |
| Conclusion | p. 254 |
| References | p. 255 |
| Maximizing the Lifetime of an Always-On Wireless Sensor Network Application: A Case Study | p. 259 |
| Introduction | p. 259 |
| Fine-grained Power Management Schemes | p. 262 |
| The ExScal Application and the XSM Platform | p. 266 |
| Lifetime Analysis of ExScal | p. 270 |
| Conclusion | p. 281 |
| References | p. 282 |
| Data Management | |
| Data Management in Sensor Networks | p. 287 |
| Difference between Data Management Systems In Sensor Networks and In Distributed Database Systems | p. 287 |
| Architecture of Data Management System in Sensor Networks | p. 290 |
| Data Model and Query Language in Sensor Networks | p. 292 |
| Storage and Index Techniques in Sensor Networks | p. 297 |
| Query Processing in Sensor Networks | p. 310 |
| Sensor Network Data Management System | p. 322 |
| References | p. 329 |
| Data Aggregation in Wireless Sensor Networks | p. 331 |
| Introduction | p. 331 |
| Directed Diffusion | p. 332 |
| Low-Energy Adaptive Clustering Hierarchy | p. 335 |
| Tiny Aggregation | p. 337 |
| Greedy Aggregation on Directed Diffusion | p. 338 |
| DCTC | p. 341 |
| Gateway Placement | p. 344 |
| Summary | p. 346 |
| References | p. 347 |
| Performance Comparison of Clustering Schemes in Sensor Networks | p. 349 |
| Introduction | p. 349 |
| Related Work | p. 350 |
| Overview of Algorithms | p. 352 |
| Performance Comparison | p. 355 |
| Conclusion | p. 361 |
| References | p. 362 |
| Reliable and Efficient Information Forwarding and Traffic Engineering in Wireless Sensor Networks | p. 365 |
| Introduction | p. 365 |
| Routing in Ad Hoc Networks | p. 366 |
| Routing in Sensor Networks | p. 368 |
| TE-Routing | p. 373 |
| Conclusions and Research Directions | p. 383 |
| References | p. 383 |
| Modeling Data Gathering in Wireless Sensor Networks | p. 387 |
| Introduction | p. 387 |
| Active Querying with Look-Ahead | p. 389 |
| Cluster-Based Joint Routing and Compression | p. 391 |
| Joint Search and Replication | p. 394 |
| Conclusions | p. 397 |
| References | p. 399 |
| Security | |
| A Survey on Sensor Network Security | p. 403 |
| Introduction | p. 403 |
| Attacks on Sensor Networks | p. 405 |
| Security Objectives for Sensor Networks | p. 411 |
| Key Management in Sensor Networks | p. 412 |
| Secure Routing in Sensor Networks | p. 417 |
| Conclusions | p. 419 |
| References | p. 419 |
| A Passive Approach to Unauthorized Sensor Node Identification | p. 423 |
| Introduction | p. 423 |
| Related Work | p. 425 |
| Organization of a Radio Interface | p. 427 |
| Opportunities for Distinction | p. 427 |
| Using Rate Switching to Detect Unauthorized Nodes | p. 429 |
| Empirical Analysis of Rate Switching | p. 429 |
| An Approach to Sensor Node Identification | p. 431 |
| Experimental Evaluation | p. 433 |
| Conclusion | p. 440 |
| References | p. 441 |
| Table of Contents provided by Ingram. All Rights Reserved. |