You are previewing Technological Breakthroughs in Modern Wireless Sensor Applications.
O'Reilly logo
Technological Breakthroughs in Modern Wireless Sensor Applications

Book Description

Collecting and processing data is a necessary aspect of living in a technologically advanced society. Whether it’s monitoring events, controlling different variables, or using decision-making applications, it is important to have a system that is both inexpensive and capable of coping with high amounts of data. Technological Breakthroughs in Modern Wireless Sensor Applications brings together new ways to process and monitor data, and to put it to work in everything from intelligent transportation systems to healthcare to multimedia applications. This book is an essential reference source for research and development engineers, graduate students, academics, and researchers interested in intelligent engineering, internetworking, routing, and network planning algorithms.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Preface
  6. Acknowledgment
  7. Chapter 1: HTNMote
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. THE HYBRID TECHNOLOGY NETWORKING PROTOCOL
    5. FUTURE RESEARCH DIRECTIONS
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  8. Chapter 2: Energy Efficiency of Coding Schemes for Underwater Wireless Sensor Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. DETAILS OF THE ERROR CORRECTION TECHNIQUES EMPLOYED
    5. UNDERWATER PROPAGATION MODEL
    6. MATHEMATICAL ANALYSIS OF SCHEME ENERGY EFFICENCIES
    7. RESULTS AND DISCUSSION
    8. CONCLUSION AND FURTHER WORK
    9. REFERENCES
    10. ADDITIONAL READING
  9. Chapter 3: Network Design and Performance Evaluation of Wireless Sensor Network for Precision Agriculture
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. SENSOR NETWORK PROTOCOL DESIGN
    4. 3. NETWORK PERFORMANCE MODELING AND EVALUATION
    5. 4. FUTURE WORK
    6. 5. CONCLUSION
    7. ACKNOWLEDGMENT
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  10. Chapter 4: Active RFID System with Embedded Wireless Sensor Network for Reliable Data Communication
    1. ABSTRACT
    2. INTRODUCTION
    3. ZigBee
    4. RFID
    5. LITERATURE REVIEW
    6. REVIEW OF IEEE 802.15.4 PROTOCOL
    7. METHODS OF ANALYSIS AND EVALUATION
    8. CONCLUSION
    9. ACKNOWLEDGMENT
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  11. Chapter 5: Adaptive IEEE 802.15.4 MAC Protocol for Wireless Sensor Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. THE IEEE802.15.4 MAC PROTOCOL: AN OVERVIEW
    4. DYNAMIC CONTENSION ACCESS PERIOD
    5. SIMULATION RESULTS
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  12. Chapter 6: Prevalence of Anomalies in Real World Sensor Network Deployments
    1. ABSTRACT
    2. INTRODUCTION
    3. GREAT DUCK ISLAND (GDI)
    4. REDWOOD FORESTS
    5. INTEL BERKELEY RESEARCH LAB (IBRL)
    6. SENSORSCOPE
    7. GREENORBS
    8. VIGILNET
    9. A SMARTER SUPPLY CHAIN
    10. FUTURE RESEARCH DIRECTIONS
    11. CONCLUSION
    12. REFERENCES
    13. ADDITIONAL READING
    14. KEY TERMS AND DEFINITIONS
    15. ENDNOTES
  13. Chapter 7: Reliability Evaluation Methods for Resilient Wireless Sensor Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. RELIABILITY CHALLENGES AND RELATED ISSUES
    5. SOLUTION
    6. FUTURE RESEARCH DIRECTIONS
    7. CONCLUSION
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  14. Chapter 8: A Taxonomy of Sensor Network Anomalies and Their Detection Approaches
    1. ABSTRACT
    2. INTRODUCTION
    3. NATURAL FAULTS
    4. NETWORK FAILURES
    5. NODE FAILURES
    6. SENSOR DATA FAULTS
    7. MALICIOUS BEHAVIORS
    8. MALICIOUS DATA BEHAVIORS
    9. MALICIOUS NETWORK BEHAVIORS
    10. EVENTS
    11. DATA-CENTRIC ANOMALIES
    12. CHARACTERISTICS OF ANOMALY DETECTION ALGORITHMS
    13. RELATED WORK
    14. CONCLUSION
    15. REFERENCES
    16. ADDITIONAL READING
    17. KEY TERMS AND DEFINITIONS
    18. ENDNOTES
  15. Chapter 9: Fault-Diagnosis and Decision Making Algorithm for Determining Faulty Nodes in Malicious Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. THE PROPOSED ALGORITHM
    4. CONCLUSION AND DISCUSSION
    5. REFERENCES
    6. KEY TERMS AND DEFINITIONS
  16. Chapter 10: RSS-Based Outdoor Localization with Wireless Sensor Networks in Practice
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND AND RELATED RESEARCH
    4. RSS-BASED OUDOR LOCALIZATION ISSUES: MODELLING, SIMULATION, ACTUAL EXPERIMENTS
    5. FUTURE RESEARCH DIRECTIONS
    6. CONCLUSION
    7. REFERENCES
    8. ADDITIONAL READING
    9. KEY TERMS AND DEFINITIONS
  17. Chapter 11: The Development of Mobile Wireless Sensor Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. MAIN FOCUS OF THE CHAPTER
    5. RESOURCE (ENERGY) EFFICIENCY
    6. CONCLUSION
    7. REFERENCES
    8. ADDITIONAL READING
    9. KEY TERMS AND DEFINITIONS
  18. Chapter 12: Object Tracking Algorithms in Wireless Sensor Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. DISTRIBUTED TARGET TRACKING METHODS
    5. CENTRALIZED TARGET TRACKING METHODS
    6. TREE-BASED METHODS
    7. CLUSTER-BASED METHODS
    8. FUTURE WORK
    9. CONCLUSION
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  19. Chapter 13: Distributed Adaptive Parametric Power Spectral Estimation Using Wireless Sensor Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. DISTRIBUTED ADAPTIVE POWER SPECTRAL ESTIMATION
    5. PERFORMANCE EVALUATION
    6. PERFORMANCE ANALYSIS
    7. FUTURE RESEARCH DIRECTIONS
    8. CONCLUSION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
    11. APPENDIX: PROOF OF MATRIX INVERSION LEMMA
  20. Chapter 14: Covert Communication in Wireless Sensor Networks for E-Health Applications
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. COVERT COMMUNICATION
    5. COVERT CHANNEL DETECTION
    6. FUTURE RESEARCH DIRECTIONS
    7. SUMMARY AND CONCLUSION
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  21. Compilation of References
  22. About the Contributors