Contents. Preface. About Editors. Contributors. Acknowledgments I 1



Similar documents
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

en fi lm af Zhang Yang instruktøren bag den kinesiske fi lmperle Badeanstalten Premiere 31. oktober

A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING TECHNOLOGY APPLICATIONS *

The Board of Directors

CHAPTER 1 INTRODUCTION

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform

Development of cloud computing system based on wireless sensor network protocol and routing

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM

The study on the Coal Mine Safety Integrated Monitoring and Early Warning System DesignUsing the S-MAC Protocol

About the Authors Preface Acknowledgements List of Acronyms

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Wireless Sensor Network: Challenges, Issues and Research

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

Real-Time Communication in IEEE Wireless Mesh Networks: A Prospective Study

INTERNET OF THINGS 1

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

A Secure Key Management Scheme in Wireless Mesh Networks

How To Secure Data Aggregation In A Wireless Sensor Network

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

The design and implementation of the environment monitoring system of smart home based on EnOcean technology

TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY

Internet of Things: Design of a New Layered Architecture and Study of Some Existing Issues

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

Security for Ad Hoc Networks. Hang Zhao

A Network Simulation Experiment of WAN Based on OPNET

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

Research on Trust Management Strategies in Cloud Computing Environment

TOPOLOGIES NETWORK SECURITY SERVICES

Wireless Sensor Network Based Low Power Embedded System Design For Automated Irrigation System Using MSP430

LIST OF CONFERENCE PARTICIPANTS

Capability Service Management System for Manufacturing Equipments in

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

Depiction of Body Area Network in Cloud Environment

Polling based Mobile Data Gathering and weightage based Data Storage Algorithm for Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

Workflow Administration of Windchill 10.2

Tasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article. E-commerce recommendation system on cloud computing

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Routing Analysis in Wireless Mesh Network with Bandwidth Allocation

A Dynamic Approach to Extract Texts and Captions from Videos

Network traffic monitoring system design based on the unconstrained

International Journal of Computer Engineering Science (IJCES)

Some Security Trends over Wireless Sensor Networks

A Security Architecture for. Wireless Sensor Networks Environmental

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

Design of Electronic Medical Record System Based on Cloud Computing Technology

Information Security Practice and Experience

How To Make A Secure Storage On A Mobile Device Secure

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Content of smart wireless sensor network security and its network security policy

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Genetic Algorithm Based Interconnection Network Topology Optimization Analysis

A Catechistic Method for Traffic Pattern Discovery in MANET

Automated Security System using ZigBee

Security in Ad Hoc Network

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

How To Balance Network Load In A Wireless Sensor Network

Introduction. Research methodology

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

Recent advances in security and privacy in big data

An Investigation of DOS Flooding Attack in VANET.

Advances in Network Management

Transcription:

Preface v About Editors vii Contributors ix Acknowledgments xxi I 1 Chapter 1. Architectures and Cross-Layer Design for Cognitive Networks 3 Dzmitry Kliazovich, Fabrizio Granelli, and Nelson L. S. da Fonseca Chapter 2. A Cross-Layer Approach to Reducing Delay and Energy Consumption Based on Data Importance in Sensor Networks 25 Jisu Oh, Kyoung-Don Kang, Jang Young Kim and Mikhail I. Gofman II Medium Access Control 41 Chapter 3. Performance Evaluation of MAC Mechanisms in Wireless Sensor Networks 43 Prasan Kumar Sahoo, and Jang-Ping Sheu Chapter 4. Toward Efficient Wireless Medium Access Control 69 Shiwen Mao, Yihan Li, Prathima Agrawal, and Scott F. Midkiff xxiii

xxiv Contents III Network Formation, Topology Discovery, and Routing 97 Chapter 5. QoS Aware Routing in Wireless Sensor Networks 99 Feng Zou, Donghyun Kim, Xiaofeng Gao, and Dingzhu Du Chapter 6. Obstacle-Resist Routing Protocols for Wireless Sensor Networks 117 Chih Yung Chang and Jang-Ping Sheu Chapter 7. Cooperative Geographical Routing in Wireless Sensor Networks 141 Min Chen, Victor C.M. Leung and Shiwen Mao Chapter 8. The Impact of Node Heterogeneity on ZigBee Network Routing 167 Ling-Jyh Chen, Li-Ping Tung, Tony Sun, and Nia-Chiang Liang Chapter 9. ZigBee Wireless Sensor Network and Its Network Formation Problem 181 Lun-Wu Yeh, Meng-Shiuan Pan and Yu-Chee Tseng Chapter 10. The Latest Researches on Dominating Problems in Wireless Sensor Network 197 Xiaofeng Gao, Feng Zou, Donghyun Kim, and Ding-Zhu Du IV Architecture, Design and Testbed 227 Chapter 11. Elements of Sensornet Testbed Design 229 Divya Sakamuri, and Hongwei Zhang Chapter 12. Time Reversal for Ultra-Wideband Communications: Architecture and Test-Bed 263 N. Guo, R. C. Qiu, Q. Zhang, B. M. Sadler, Z. Hu, P. Zhang, Y. Song, and C. Zhou Chapter 13. Design of Self-Organizing Sensor Networks Using Percolation Theory 311 R. R. Brooks

xxv Chapter 14. Performance of Bridging Algorithms in IEEE 802.15.3 Multi-Piconet Networks 335 Jelena Mišić, Muhi Ahmed Ibne Khair, and Vojislav B. Mišić V Security 355 Chapter 15. Security Trends and Challenges in Wireless Sensor Networks 357 S. A. V. Satya Murty, P. Gireesan Namboothiri and Krishna M. Sivalingam Chapter 16. CBKE: Chord-Based Key Establishment Schemes for Wireless Sensor Networks 399 Zhijie Jerry Shi, Bing Wang and Fan Zhang Chapter 17. Key Management in Wireless Sensor Networks with Multiple Base Stations 419 Yong Wang, Byrav Ramamurthy and Yuyan Xue Chapter 18. Performances of Key Management Schemes in Wireless Sensor Networks 443 Boushra Maala, Hatem Bettahar and Abdelmadjid Bouabdallah Chapter 19. Trust Establishment in Wireless Sensor Networks 459 Chun-Fai Law and Yu-Kwong Kwok Chapter 20. Detection of Compromised Wireless Sensor Nodes 495 Min Song, Gregory E. Patrick, and George Hsieh Chapter 21. SWAT: A Decentralized Self-Healing Mechanism for Wormhole Attacks in Wireless Sensor Networks 511 Chonho Lee and Junichi Suzuki VI Localization and Location Discovery 533 Chapter 22. Node Localization in Wireless Sensor Networks 535 Ziguo Zhong, Jaehoon Jeong, Ting Zhu, Shuo Guo and Tian He

xxvi Contents Chapter 23. Distributed Location Service by Using Quorum Methods 565 Dandan Liu, Xiaohua Jia, and Ivan Stojmenovic VII Energy Efficiency 591 Chapter 24. Energy Considerations for MAC Protocols in Wireless Sensor Networks 593 Feng Shu, Taka Sakurai, Hai L. Vu and Moshe Zukerman Chapter 25. Energy Efficient Approach to Dynamic Clustering in Sensor Networks Using Genetic Algorithm 619 Rahul Khanna, Huaping Liu, and Hsiao-Hwa Chen VIII Multimedia Sensor Networks 655 Chapter 26. Information Collection and Storage in Wireless Multimedia Sensor Network 657 Yuehhua Lee, Kui Wu and Jiming Chen Chapter 27. Secure Image Transmissions in Wireless Multimedia Sensor Networks 675 Wei Wang, Dongming Peng, Honggang Wang, Hamid Sharif and Hsiao-Hwa Chen IX Monitoring and Detection 689 Chapter 28. Environmental Monitoring Sensor Network Design and Deployment 691 R. R. Brooks and Sampada Karandikar C. Post and S. Esswein Chapter 29. Distributed Edge Detection with Error Resilience for Wireless Sensor Networks 719 S. Selvakennedy Chapter 30. Enabling Periodic Monitoring Applications in Wireless Sensor Networks: Design and Analysis of an Efficient MAC Protocol 747 Miguel A. Erazo, Yi Qian, Kejie Lu and Domingo Rodriguez

xxvii Chapter 31. Deadline-Driven Data Gathering in Periodic Monitoring Sensor Networks 765 S. Selvakennedy X Various Good Things 785 Chapter 32. Wireless Passive Sensor Networks: Research Challenges 787 Ozgur B. Akan and M. Talha Isik Chapter 33. Location Management in Multi-Hop Wireless Sensor Networks 805 Stefano Basagni and Maurizio A. Nanni Chapter 34. Sensor Network Economics 835 S. Buchegger and S. Krishnamurthy Chapter 35. Low-Power Circuit Design for Cardiac Data Mining in Medical Sensor Networks 853 Fei Hu, Alexandru Samachisa, Marcin Lukowiak, Daniel Philips and Yang Xiao