- •CONTENTS
- •PREFACE
- •CONTRIBUTORS
- •1.1 Introduction
- •1.2 Trends in Sensor Development
- •1.3 Mission-Oriented Sensor Networks: Dynamic Systems Perspective
- •References
- •2 Sensor Deployment, Self-Organization, and Localization
- •2.1 Introduction
- •2.2 SCARE: A Scalable Self-Configuration and Adaptive Reconfiguration Scheme for Dense Sensor Networks
- •2.3 Robust Sensor Positioning in Wireless Ad Hoc Sensor Networks
- •2.4 Trigonometric k Clustering (TKC) for Censored Distance Estimation
- •2.5 Sensing Coverage and Breach Paths in Surveillance Wireless Sensor Networks
- •References
- •3 Purposeful Mobility and Navigation
- •3.1 Introduction
- •3.2 Controlled Mobility for Efficient Data Gathering in Sensor Networks with Passively Mobile Nodes
- •3.3 Purposeful Mobility in Tactical Sensor Networks
- •3.4 Formation and Alignment of Distributed Sensing Agents with Double-Integrator Dynamics and Actuator Saturation
- •3.5 Modeling and Enhancing the Data Capacity of Wireless Sensor Networks
SENSOR NETWORK OPERATIONS
Edited by
Shashi Phoha
Thomas LaPorta
Christopher Griffin
IEEE PRESS
A JOHN WILEY & SONS, INC PUBLICATION
SENSOR NETWORK OPERATIONS
IEEE Press
445 Hoes Lane
Piscataway, NJ 08854
IEEE Press Editorial Board
Mohamed E. El-Hawary, Editor-in-Chief
M. Akay |
R. J. Herrick |
F. M. B. Pereira |
J. B. Anderson |
S. V. Kartalopoulos |
C. Singh |
J. E. Brewer |
M. Montrose |
G. Zobrist |
T. G. Croda |
M. S. Newman |
|
|
Kenneth Moore, Director of IEEE Book and Information |
|
|
Catherine Faduska, Acquisitions Editor, IEEE Press |
|
|
Jeanne Audino, Project Editor, IEEE Press |
|
SENSOR NETWORK OPERATIONS
Edited by
Shashi Phoha
Thomas LaPorta
Christopher Griffin
IEEE PRESS
A JOHN WILEY & SONS, INC PUBLICATION
Copyright C 2006 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved.
Published by John Wiley & Sons, Inc.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or
fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.
Library of Congress Cataloging-in-Publication Data is available.
ISBN-13 978-0-471-71976-2
ISBN-10 0-471-71976-5
Printed in the United States of America
10 9 8 7 6 5 4 3 2 1
To Him in whose presence to present oneself is to find oneself.
—Shashi Phoha
I dedicate this book to Lisa, Abigail, and Sophia.
—Thomas F. LaPorta
For Amy, my darling wife, who put up with me during this project. I love you more than you can imagine.
—CHG
CONTENTS
PREFACE |
xiii |
CONTRIBUTORS |
xv |
I SENSOR NETWORK OPERATIONS OVERVIEW |
1 |
1 Overview of Mission-Oriented Sensor Networks |
3 |
1.1Introduction / 3
1.2Trends in Sensor Development / 4
1.3Mission-Oriented Sensor Networks: Dynamic Systems Perspective / 8 References / 10
II SENSOR NETWORK DESIGN AND OPERATIONS |
11 |
2 Sensor Deployment, Self-Organization, and Localization |
13 |
2.1Introduction / 13
2.2SCARE: A Scalable Self-Configuration and Adaptive Reconfiguration Scheme for Dense Sensor Networks / 14
2.3Robust Sensor Positioning in Wireless Ad Hoc Sensor Networks / 35
2.4Trigonometric k Clustering (TKC) for Censored Distance Estimation / 51
2.5Sensing Coverage and Breach Paths in Surveillance Wireless Sensor Networks / 68
References / 86
3 Purposeful Mobility and Navigation |
91 |
3.1Introduction / 91
3.2Controlled Mobility for Efficient Data Gathering in Sensor Networks with Passively Mobile Nodes / 92
3.3Purposeful Mobility in Tactical Sensor Networks / 113
3.4Formation and Alignment of Distributed Sensing Agents with Double-Integrator Dynamics and Actuator Saturation / 126
vii
viiiCONTENTS
3.5Modeling and Enhancing the Data Capacity of Wireless Sensor Networks / 157
References / 179
4 Lower Layer Issues—MAC, Scheduling, and Transmission |
185 |
4.1Introduction / 185
4.2SS-TDMA: A Self-Stabilizing Medium Access Control (MAC) for Sensor Networks / 186
4.3Comprehensive Performance Study of IEEE 802.15.4 / 218
4.4Providing Energy Efficiency for Wireless Sensor Networks Through Link Adaptation Techniques / 237
References / 257
5 Network Routing |
263 |
5.1Introduction / 263
5.2Load-Balanced Query Protocols for Wireless Sensor Networks / 264
5.3Energy-Efficient and MAC-Aware Routing for Data Aggregation in Sensor Networks / 291
5.4LESS: Low-Energy Security Solution for Large-scale Sensor
Networks Based on Tree-Ripple-Zone Routing Scheme / 308 References / 329
6 Power Management |
337 |
6.1Introduction / 337
6.2Adaptive Sensing and Reporting in Energy-Constrained Sensor Networks / 338
6.3Sensor Placement and Lifetime of Wireless Sensor Networks: Theory and Performance Analysis / 354
6.4Algorithms for Maximizing Lifetime of Battery-Powered Wireless Sensor Nodes / 367
6.5Battery Lifetime Estimation and Optimization for Underwater Sensor Networks / 397
References / 416
7 Distributed Sensing and Data Gathering |
421 |
7.1Introduction / 421
7.2Secure Differential Data Aggregation for Wireless Sensor Networks / 422
7.3Energy-Conserving Data Gathering Strategy Based on Trade-off Between Coverage and Data Reporting Latency in Wireless Sensor Networks / 442
7.4Quality-Driven Information Processing and Aggregation in Distributed Sensor Networks / 467
CONTENTS ix
7.5Progressive Approach to Distributed Multiple-Target Detection in Sensor Networks / 486
References / 504
8 Network Security |
509 |
8.1Introduction / 509
8.2Energy Cost of Embedded Security for Wireless Sensor Networks / 510
8.3Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks / 522
8.4Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc Networks / 535
8.5Fast and Scalable Key Establishment in Sensor Networks / 557
8.6Weil Pairing-Based Round, Efficient, and Fault-Tolerant Group Key Agreement Protocol for Sensor Networks / 571
References / 580
III SENSOR NETWORK APPLICATIONS |
587 |
9 Pursuer–Evader Tracking in Sensor Networks |
589 |
9.1Introduction / 589
9.2The Problem / 590
9.3Evader-Centric Program / 592
9.4Pursuer-Centric Program / 595
9.5Hybrid Pursuer–Evader Program / 596
9.6Efficient Version of Hybrid Program / 599
9.7Implementation and Simulation Results / 600
9.8Discussion and Related Work / 605 References / 607
10 Embedded Soft Sensing for Anomaly Detection in Mobile |
|
Robotic Networks |
609 |
10.1Introduction / 609
10.2Mobile Robot Simulation Setup / 614
10.3Software Anomalies in Mobile Robotic Networks / 615
10.4Soft Sensor / 616
10.5Software Anomaly Detection Architecture / 616
10.6Anomaly Detection Mechanisms / 618
10.7Test Bed for Software Anomaly Detection in Mobile Robot Application / 619
10.8Results and Discussion / 623
10.9Conclusions and Future Work / 626
Appendix A / 626
Appendix B / 627
References / 628
x CONTENTS |
|
11 Multisensor Network-Based Framework for Video |
|
Surveillance: Real-Time Superresolution Imaging |
631 |
11.1Introduction / 632
11.2Basic Model of Distributed Multisensor Surveillance System / 632
11.3Superresolution Imaging / 636
11.4Optical Flow Computation / 638
11.5Superresolution Image Reconstruction / 644
11.6Experimental Results / 644
11.7Conclusion / 645
References / 646
12 Using Information Theory to Design Context-Sensing |
|
Wearable Systems |
649 |
12.1Introduction / 649
12.2Related Work / 651
12.3Theoretical Background / 651
12.4Adaptations / 654
12.5Design Considerations / 662
12.6Case Study / 663
12.7Results / 666
12.8Conclusion / 674
Appendix / 674
References / 675
13 Multiple Bit Stream Image Transmission over Wireless |
|
Sensor Networks |
677 |
13.1Introduction / 677
13.2System Description / 679
13.3Experimental Results / 685
13.4Summary and Discussion / 686 References / 687
14 Hybrid Sensor Network Test Bed for Reinforced Target Tracking |
689 |
14.1Introduction / 689
14.2Sensor Network Operational Components / 690
14.3Sensor Network Challenge Problem / 694
14.4Integrated Target Surveillance Experiment / 695
14.5Experimental Results and Evaluation / 698
14.6Conclusion / 701
References / 703
15 Noise-Adaptive Sensor Network for Vehicle Tracking in the Desert 705
15.1Introduction / 706
15.2Distributed Tracking / 708
CONTENTS xi
15.3 Algorithms / 710
15.4 Experimental Methods / 712
15.5 Results and Discussion / 714
15.6 Conclusion / 715
References / 715
ACKNOWLEDGMENTS |
717 |
INDEX |
719 |
ABOUT THE EDITORS |
723 |