You are previewing Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures.
O'Reilly logo
Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures

Book Description

The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these technologies must be addressed in order to effectively utilize them. The Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures is a pivotal reference source for the latest research on recent innovations and developments in the field of wireless sensors. Examining the advantages and challenges presented by the application of these networks in various areas, this book is ideally designed for academics, researchers, students, and IT developers.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  6. Preface
    1. ORGANIZATION OF THE BOOK
    2. OBJECTIVE OF THE BOOK
    3. TARGET AUDIENCE
  7. Chapter 1: Sensing Coverage in Three-Dimensional Space
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. DESIGN CHALLENGES
    4. 3. APPLICATIONS AND TYPES OF WIRELESS SENSOR NETWORKS
    5. 4. COVERAGE PROBLEM
    6. 5. SPHERE PACKING PROBLEM
    7. 6. SPACE-FILLING POLYHEDRON BASED 3D COVERAGE
    8. 7. CONCLUSION
    9. REFERENCES
  8. Chapter 2: Multi-Sensor Data Fusion (MSDF)
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. WHAT IS DATA FUSION?
    4. 3. SENSORS AND LEVELS
    5. 4. DATA FUSION MODELS
    6. 5. FUSION ARCHITECTURES
    7. 6. APPLICATIONS
    8. 7. CONCLUSION
    9. REFERENCES
  9. Chapter 3: Connected Dominating Set in Wireless Sensor Network
    1. ABSTRACT
    2. INTRODUCTION
    3. NETWORK MODEL AND RELATED DEFINITIONS
    4. CDS AS VIRTUAL BACKBONES IN WIRELESS SENSOR NETWORK
    5. EVALUATION CRITERIA OF CDS AS VIRTUAL BACKBONE
    6. CDS CONSTRUCTION ALGORITHMS
    7. ROTATION OF CDS
    8. CONCLUSION
    9. REFERENCES
  10. Chapter 4: Routing Protocols in Wireless Sensor Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. DESIGN ISSUES FOR ROUTING PROTOCOLS IN WSN
    4. PROTOCOLS CLASSIFICATION
    5. COMPARATIVE ANALYSIS AND CONCLUSION
    6. REFERENCES
    7. KEY TERMS AND DEFINITIONS
  11. Chapter 5: Wireless Mesh Sensor Networks with Mobile Devices
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. MESH NETWORKS IMPLEMENTED WITH MOBILE DEVICES
    4. 3. PATH SELECTION AND ROUTING PROTOCOLS FOR MESH NETWORKS
    5. 4. METRICS FOR WIRELESS MESH NETWORKS
    6. 5. ENERGY-AWARE ROUTING METRICS
    7. 6. A REAL TESTBED WITH OPEN802.11S AND B.A.T.M.A.N
    8. 7. CONCLUSION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  12. Chapter 6: Energy Aware Optimized Routing Protocols for Wireless Ad Hoc Sensor Network
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. ENERGY EFFICIENT ROUTING IN WASN
    5. ENERGY AWARE ROUTING PROTOCOLS FOR WASN WITH ACTIVE CLUSTERING
    6. HIERARCHICAL HYBRID ENERGY AWARE ROUTING PROTOCOLS FOR WASN
    7. OPTIMIZATION STRATEGIES FOR ENERGY AWARE ROUTING IN WASN
    8. SWARM INTELLIGENCE BASED ROUTING ALGORITHMS
    9. CONCLUSION
    10. REFERENCES
  13. Chapter 7: Impact of the Structure of the Data Gathering Trees on Node Lifetime and Network Lifetime in Wireless Sensor Networks
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. GENERIC ALGORITHMS TO DETERMINE BOTTLENECK WEIGHT-BASED DATA GATHERING TREES
    4. 3. SIMULATIONS
    5. 4. CONCLUSION
    6. REFERENCES
  14. Chapter 8: Design of WSN in Real Time Application of Health Monitoring System
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BACKGROUND
    4. 3. ARCHITECTURE OF WSN NETWORK
    5. 4. COMPONENTS OF WSN ARCHITECTURE
    6. 5. EXPERIMENTAL SETUP TO SENSING DATA IN WIRELESS ENVIRONMENT
    7. 6. RESULTS AND DISCUSSIONS
    8. 7. CONCLUSION
    9. REFERENCES
  15. Chapter 9: Performance Evaluation of Quality of Service in IEEE 802.15.4-Based Wireless Sensor Networks
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. QUALITY OF SERVICE REQUIREMENTS IN WSNs
    4. 3. OVERVIEW OF IEEE 802.15.4 STANDARD
    5. 4. RELATED WORK
    6. 5. QoS ANALYSIS IN IEEE 8021.5.4 STAR TOPOLOGY
    7. 6. CONCLUSION
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  16. Chapter 10: Spectral Efficiency in Wireless Networks through MIMO-OFDM System
    1. ABSTRACT
    2. INTRODUCTION
    3. CHARACTERISTICS OF WIRELESS CHANNEL
    4. MULTI-CARRIER SYSTEM
    5. MIMO SYSTEM
    6. MIMO-OFDM SYSTEM
    7. CHANNEL ESTIMATION FOR MULTI-CARRIER SYSTEM
    8. CONCLUSION
    9. REFERENCES
  17. Chapter 11: Techniques to Enhance the Lifetime of MANET
    1. ABSTRACT
    2. 1. INTRODUCTION TO MANET
    3. 2. BACKGROUND OF ENERGY EFFICIENCY
    4. 3. TECHNIQUES TO ENHANCE MANET LIFETIME
    5. 4. CONCLUSION AND FUTURE DIRECTION
    6. REFERENCES
  18. Chapter 12: Security Threats in Wireless Sensor Networks
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. SECURITY REQUIREMENTS IN WSN
    4. 3. CLASSIFICATIONS
    5. 4. LAYER-DEPENDENT ATTACKS
    6. 5. LAYER-INDEPENDENT ATTACKS
    7. 6. ATTACK ANALYSIS
    8. 7. DEFENSE MECHANISMS
    9. 8. SUMMARY
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  19. Chapter 13: Intrusion Detection in MANET for Network Layer
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BACKGROUND
    4. 3. ATTACKS IN MANETs
    5. 4. METHODS TO PREVENT FROM ATTACK
    6. 5. INTRUSION DETECTION IN MANETs
    7. 6. CONCLUSION
    8. REFERENCES
  20. Chapter 14: Internet of Things Services, Applications, Issues, and Challenges
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. ISSUES AND CHALLENGES
    4. 3. APPLICATIONS OF IoT
    5. 4. FUTURE RESEARCH DIRECTIONS
    6. CONCLUSION
    7. REFERENCES
  21. Chapter 15: Security Issues and Challenges in Internet of Things
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BACKGROUND AND RELATED WORK
    4. 3. SECURITY VULNERABILITIES
    5. 4. CHALLENGES
    6. 5. SECURITY RISKS
    7. 6. AUTHENTICATION AND ACCESS CONTROL
    8. 7. THREATS AND ATTACKS
    9. 8. PRIVACY OF NETWORK OF “THINGS”
    10. 9. FEATURES THAT IoT NEEDS TO SUPPORT
    11. 10. MEASURES FOR SECURING NETWORK OF THINGS
    12. 11. CONCLUSION
    13. REFERENCES
  22. Chapter 16: A Comprehensive Study of Security in Cloud Computing
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BACKGROUND STUDY ON CLOUD COMPUTING
    4. 3. CLOUD SECURITY ISSSUES
    5. 4. SECURITY SOLUTIONS AND TECHNIQUES IN CLOUD COMPUTING
    6. 5. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  23. Chapter 17: Energy Efficient Wireless Body Area Network (WBAN)
    1. ABSTRACT
    2. INTRODUCTION
    3. SENSORS
    4. SECURITY IN WBAN
    5. CONCLUSION
    6. REFERENCES
  24. Chapter 18: Empowering IT with Green Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. VIRTUALIZATION
    4. FUTURE
    5. MIMO
    6. PERFORMANCE OF MIMO
    7. FUNCTIONS OF MIMO
    8. NEED OF MIMO
    9. FORMS OF MIMO
    10. COGNITIVE RADIO
    11. DEFINITION OF COGNITIVE RADIO
    12. FEATURES OF COGNITIVE RADIO
    13. COGNITIVE RADIO AND OTHER RADIO
    14. FUNCTIONS OF COGNITIVE RADIO
    15. GRID COMPUTING
    16. SUMMARY
    17. REFERENCES
  25. Compilation of References
  26. About the Contributors