20
Springer Series on SIGNALS AND COMMUNICATION TECHNOLOGY

Springer Series on SIGNALS AND COMMUNICATION TECHNOLOGY978-0-387-49592-7/1.pdf · Methods and Applications R. I Hammoud (Ed.) ISBN 3-540-33214-6 ContinuousTime Signals ISBN 1-4020-4817-3

Embed Size (px)

Citation preview

Springer Series on SIGNALS AND COMMUNICATION TECHNOLOGY

SIGNALS AND COMMUNICATION TECHNOLOGY

Foundations and Applications of Sensor Management A.O. Hero III, D. Castañón, D. Cochran, and K. Kastella (Eds.) ISBN 978-0-387-27892-6 Human Factors and Voice Interactive Systems, Second Edition D. Gardner-Bonneau and H. Blanchard ISBN 978-0-387-25482-1 Wireless Communications: 2007 CNIT Thyrrenian Symposium S. Pupolin ISBN 978-0-387-73824-6 Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches T. Ogunfunmi ISBN 978-0-387-26328-1 Wireless Network Security Y. Xiao, X. Shen, and D.Z. Du (Eds.) ISBN 978-0-387-28040-0 Satellite Communications and Navigation Systems E. Del Re and M. Ruggieri ISBN: 0-387-47522-2 Wireless Ad Hoc and Sensor Networks A Cross-Layer Design Perspective R. Jurdak ISBN 0-387-39022-7 Cryptographic Algorithms on Reconfigurable Hardware F. Rodriguez-Henriquez, N.A. Saqib, A. Díaz Pérez, and C.K. Koc ISBN 0-387-33956-6 Multimedia Database Retrieval A Human-Centered Approach P. Muneesawang and L. Guan ISBN 0-387-25627-X Broadband Fixed Wireless Access A System Perspective M. Engels and F. Petre ISBN 0-387-33956-6 Distributed Cooperative Laboratories Networking, Instrumentation, and Measurements F. Davoli, S. Palazzo and S. Zappatore (Eds.) ISBN 0-387-29811-8

The Variational Bayes Method in Signal Processing V. Šmídl and A. Quinn ISBN 3-540-28819-8

Topics in Acoustic Echo and Noise Control Selected Methods for the Cancellation of Acoustical Echoes, the Reduction of Background Noise, and Speech Processing E. Hänsler and G. Schmidt (Eds.) ISBN 3-540-33212-x

EM Modeling of Antennas and RF Components for Wireless Communication Systems F. Gustrau, D. Manteuffel ISBN 3-540-28614-4

Interactive Video Methods and Applications R. I Hammoud (Ed.) ISBN 3-540-33214-6

ContinuousTime Signals Y. Shmaliy ISBN 1-4020-4817-3

Voice and Speech Quality Perception Assessment and Evaluation U. Jekosch ISBN 3-540-24095-0

Advanced ManMachine Interaction Fundamentals and Implementation K.-F. Kraiss ISBN 3-540-30618-8

Orthogonal Frequency Division Multiplexing for Wireless Communications Y. (Geoffrey) Li and G.L. Stüber (Eds.) ISBN 0-387-29095-8

Circuits and Systems Based on Delta Modulation Linear, Nonlinear and Mixed Mode Processing D.G. Zrilic ISBN 3-540-23751-8

Functional Structures in Networks AMLn—A Language for Model Driven Development of Telecom Systems T. Muth ISBN 3-540-22545-5

RadioWave Propagation for Telecommunication Applications H. Sizun ISBN 3-540-40758-8

Electronic Noise and Interfering Signals Principles and Applications G. Vasilescu ISBN 3-540-40741-3

DVB The Family of International Standards for Digital Video Broadcasting, 2nd ed. U. Reimers ISBN 3-540-43545-X

(continued at the end of book)

SIGNALS AND COMMUNICATION TECHNOLOGY

(continued from page ii)

Digital Interactive TV and Metadata Future Broadcast Multimedia A. Lugmayr, S. Niiranen, and S. Kalli ISBN 3-387-20843-7

Adaptive Antenna Arrays Trends and Applications S. Chandran (Ed.) ISBN 3-540-20199-8

Digital Signal Processing with Field Programmable Gate Arrays U. Meyer-Baese ISBN 3-540-21119-5

Neuro-Fuzzy and Fuzzy Neural Applications in Telecommunications P. Stavroulakis (Ed.) ISBN 3-540-40759-6

SDMA for Multipath Wireless Channels Limiting Characteristics and Stochastic Models I.P. Kovalyov ISBN 3-540-40225-X

Digital Television A Practical Guide for Engineers W. Fischer ISBN 3-540-01155-2

Speech Enhancement J. Benesty (Ed.) ISBN 3-540-24039-X

Multimedia Communication Technology Representation, Transmission and Identification of Multimedia Signals J.R. Ohm ISBN 3-540-01249-4

Information Measures Information and its Description in Science and Engineering C. Arndt ISBN 3-540-40855-X

Processing of SAR Data Fundamentals, Signal Processing, Interferometry A. Hein ISBN 3-540-05043-4

Operating Principles, Analysis Methods, and Performance Evalutation F.C.M. Lau and C.K. Tse ISBN 3-540-00602-8

Adaptive Signal Processing Application to Real-World Problems J. Benesty and Y. Huang (Eds.) ISBN 3-540-00051-8

Multimedia Information Retrieval and Management Technological Fundamentals and Applications D. Feng, W.C. Siu, and H.J. Zhang (Eds.) ISBN 3-540-00244-8

Structured Cable Systems A.B. Semenov, S.K. Strizhakov,and I.R. Suncheley ISBN 3-540-43000-8

UMTS The Physical Layer of the Universal Mobile Telecommunications System A. Springer and R. Weigel ISBN 3-540-42162-9

Advanced Theory of Signal Detection Weak Signal Detection in Generalized Obeservations I. Song, J. Bae, and S.Y. Kim ISBN 3-540-43064-4

M. Taferner and E. Bonek ISBN 3-540-42551-9

Wireless Internet Access over GSMand UMTS

Chaos-Based Digital Communication Systems

Edited by Yingshu Li My T. Thai Weili Wu

Wireless Sensor Networks and Applications

Yingshu Li My T. Thai Georgia State University University of Florida Atlanta, GA Gainesville, FL

Weili Wu University of Texas at Dallas Richardson, TX

Library of Congress Control Number: 2007934546

ISBN 978-0-387-49591-0 e-ISBN 978-0-387-49592-7 Printed on acid-free paper.

All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject

9 8 7 6 5 4 3 2 1

springer.com

© 2008 Springer Science+Business Media, LLC

to proprietary rights.

USA USA

USA

This book is dedicated to our families

Contents

Dedication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . V

Contributing Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XIII

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XIX

SECTION I Network Design and Network Modelling

Chapter 1A Taxonomy-based Approach to Design of Large-scale SensorNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Aravind Iyer, Sunil S. Kulkarni, Vivek Mhatreand Catherine P. Rosenberg

1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32. Classification of Sensor Network Applications . . . . . . . . . . . . . . . . . . . . . . . . . 73. Salient Features of Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84. Common Design Problems in Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . 115. Class-specific Problems in Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 136. Sensor Network Implementations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217. Conclusions and Future Directions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Chapter 2Algorithms for Robotic Deployment of WSN inAdaptive Sampling Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Dan O. Popa and Frank L. Lewis1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352. Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373. Communication Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Closed-Form Information Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405. Adaptive Sampling Using the Extended Kalman Filter . . . . . . . . . . . . . . . . 506. Potential Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .537. Conclusions and Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

4. Sampling of Parametrized Fields Based on

VII

VIII

1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652. Distributed Graph Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673. Self-deployment Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .704. Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .755. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

SECTION II Network Management

Chapter 4

Ali Abu-el Humos, Mihaela Cardei, Bassem Alhalabi and Sam Hsu1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 872. Characteristics of MAC Protocols in WSNs . . . . . . . . . . . . . . . . . . . . . . . . . . . 893. Scheduled-based MAC Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924. Contention-based Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935. Short Note on the Energy Model in NS2 Network Simulator . . . . . . . . . 1066. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

Chapter 5Topology Control for Wireless Sensor Networks . . . . . . . . . . . . . . . . 113

Yu Wang1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1132. Geometrical Spanners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1163. Geometrical Low-Weight Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1284. Virtual Backbones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1335. Others . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1386. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

Chapter 6Boundary Detection for Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . .149

Ren-Shiou Liu, Lifeng Sang and Prasun Sinha1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1492. Localized Edge Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1513. Centralized edge determination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1624. Distributed Edge Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1655. Hierarchical edge estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1696. Conclusion and future work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .172References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

Contents

Chapter 3A Scalable Graph Model and Coordination Algorithmsfor Mobile Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65

Jindong Tan

Medium Access Control Protocols for Wireless Sensor Networks 87. .

IX

Chapter 7TPSS: A Time-based Positioning Scheme forSensor Networks with Short Range Beacons . . . . . . . . . . . . . . . . . . . . .175

Fang Liu, Xiuzhen Cheng, Dong Hua and Dechang Chen1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1752. An Overview on Current Location Discovery Schemes for SensorNetworks3. Network Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181

5. Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1866. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

Chapter 8Wakeup Strategies in Wireless Sensor Networks . . . . . . . . . . . . . . . . 195

Curt Schurgers1. Introduction: The Wakeup Principle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1952. Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2003. On-demand Paging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2034. Synchronous Wakeup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2055. Asynchronous Wakeup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2096. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

Chapter 9Time-Synchronization Challenges and Techniques . . . . . . . . . . . . . . 219

Weilian Su1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2192. Sensor Network Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2203. Influencing Factors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2204. Design Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2225. Time Synchronization Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2236. State-of-the-Art Time Synchronization Protocols . . . . . . . . . . . . . . . . . . . . .2267. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232

Chapter 10Location Service, Information Dissemination and Object Trackingin Wireless Sensor Networks by Using Quorum Methods . . . . . . 235

Dan-Dan Liu and Xiao-Hua Jia1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2352. Location Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2383. Information Dissemination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2434. Object Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2495. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254

Contents

References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

176. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

4. TPSS: A Time-Based Positioning Scheme with Short Range Beacons 181. ..

.

X

Chapter 11Maximizing the Lifetime of an Always-OnWireless Sensor Network Application: A Case Study . . . . . . . . . . .259

Santosh Kumar, Anish Arora and Ten H. Lai1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2592. Fine-grained Power Management Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . 2623. The ExScal Application and the XSM Platform . . . . . . . . . . . . . . . . . . . . . . 2664. Lifetime Analysis of ExScal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2705. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282

SECTION III Data Management

Chapter 12Data Management in Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . .287

Jinbao Li, Zhipeng Cai and Jianzhong Li1. Difference between Data Management Systems In Sensor Networksand In Distributed Database Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2872. Architecture of Data Management System in Sensor Networks . . . . . . . 2903. Data Model and Query Language in Sensor Networks . . . . . . . . . . . . . . . . 2924. Storage and Index Techniques in Sensor Networks . . . . . . . . . . . . . . . . . . . 2975. Query Processing in Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3106. Sensor Network Data Management System . . . . . . . . . . . . . . . . . . . . . . . . . . .322References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329

Chapter 13Data Aggregation in Wireless Sensor Networks . . . . . . . . . . . . . . . . . 331

Kai-Wei Fan, Sha Liu and Prasun Sinha1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3312. Directed Diffusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3323. Low-Energy Adaptive Clustering Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . 3354. Tiny Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3375. Greedy Aggregation on Directed Diffusion . . . . . . . . . . . . . . . . . . . . . . . . . . . 3386. DCTC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .341

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3448. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .346References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347

Chapter 14Performance Comparison of Clustering Schemes in SensorNetworks

Yadi Ma and Maggie Cheng

7. Gateway Placement

349. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Contents

1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3. Overview of Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

349335052

XI

4. Performance Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Chapter 15Reliable and Efficient Information Forwarding andTraffic Engineering in Wireless Sensor Networks . . . . . . . . . . . . . . . .

Fernand S. Cohen, Joshua Goldberg and Jaudelice C. de Oliveira1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. Routing in Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3. Routing in Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4. TE-Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5. Conclusions and Research Directions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Chapter 16Modeling Data Gathering in Wireless Sensor Networks . . . . . . . .

Bhaskar Krishnamachari1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. Active Querying with Look-Ahead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3. Cluster-Based Joint Routing and Compression . . . . . . . . . . . . . . . . . . . . . . .4. Joint Search and Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

SECTION IV Security

Chapter 17A Survey on Sensor Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . .4

Xiaojiang Du and Yang Xiao1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42. Attacks on Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43. Security Objectives for Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44. Key Management in Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45. Secure Routing in Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Chapter 18A Passive Approach to Unauthorized Sensor Node

4Cherita Corbett, John Copeland and Raheem Beyah

333

566

512

36363333

56

56

68738338

873

333333

87899999

1479

30

0035

111111

2799

32

Contents

1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42. Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43. Organization of a Radio Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

322257

3

Identi cationfi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

XII

5. Using Rate Switching to Detect Unauthorized Nodes . . . . . . . . . . . . . . . . .46. Empirical Analysis of Rate Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47. An Approach to Sensor Node Identification . . . . . . . . . . . . . . . . . . . . . . . . . . 48. Experimental Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

229913

334410

Contents

4. Opportunities for Distinction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427

Contributing Authors

Bassem AlhalabiDepartment of Computer Science & EngineeringFlorida Atlantic UniversityBoca Raton, FL 33431E-mail: [email protected]

Anish AroraDepartment of Computer Science & EngineeringOhio State UniversityColumbus, OH 43210E-mail: [email protected]

Raheem BeyahDepartment of Computer ScienceGeorgia State UniversityAtlanta, GA 30303E-mail: [email protected]

Zhipeng CaiDepartment of Computing ScienceUniversity of AlbertaEdmonton, Alberta, T6G2E8, CanadaE-mail: [email protected]

Mihaela CardeiDepartment of Computer Science & EngineeringFlorida Atlantic UniversityBoca Raton, FL 33431E-mail: [email protected]

Dechang ChenDepartment of Preventive Medicine and BiometricsUniformed Services University of the Health SciencesBethesda, MD 20814E-mail: [email protected]

Maggie ChengComputer Science DepartmentUniversity of MissouriRolla, MO 65401E-mail: [email protected]

XIII

XIV

Xiuzhen ChengDepartment of Computer ScienceGeorge Washington UniversityWashington, DC 20052E-mail: [email protected]

Fernand S. CohenElectrical and Computer Engineering DepartmentDrexel UniversityPhiladelphia, PA 19103E-mail: [email protected]

John CopelandSchool of Electrical and Computer EngineeringGeorgia Institute of TechnologyAtlanta, GA 30332E-mail: [email protected]

Cherita CorbettSchool of Electrical and Computer EngineeringGeorgia Institute of TechnologyAtlanta, GA 30332E-mail: [email protected]

Jaudelice C. de OliveiraElectrical and Computer Engineering DepartmentDrexel UniversityPhiladelphia, PA 19103E-mail: [email protected]

Xiaojiang DuDepartment of Computer ScienceNorth Dakota State UniversityFargo, ND 58105E-mail: [email protected]

Kai-Wei FanComputer Science and Engineering DepartmentOhio State UniversityColumbus, OH 43210E-mail: [email protected]

AuthorsContributing

XV

Joshua GoldbergElectrical and Computer Engineering DepartmentDrexel UniversityPhiladelphia, PA 19103E-mail: [email protected]

Sam HsuDepartment of Computer Science & EngineeringFlorida Atlantic UniversityBoca Raton, FL 33431E-mail: [email protected]

Dong HuaDepartment of Computer ScienceGeorge Washington UniversityWashington, DC 20052E-mail: [email protected]

Ali Abu-el HumosDepartment of Computer Science & EngineeringFlorida Atlantic UniversityBoca Raton, FL 33431E-mail: [email protected]

Aravind IyerSchool of Electrical and Computer EngineeringPurdue UniversityWest Lafayette, IN 47907E-mail: [email protected]

Xiao-Hua JiaDepartment of Computer ScienceCity University of HongKongKowloon, Hong KongComputer SchoolWuhan UniversityWuhan 430072, ChinaE-mail: [email protected]

Bhaskar KrishnamachariDepartment of Electrical Engineering-SystemsViterbi School of EngineeringUniversity of Southern CaliforniaLos Angeles, CA 90089

AuthorsContributing

E-mail: [email protected]

XVI

Sunil S. KulkarniSchool of Electrical and Computer EngineeringPurdue UniversityWest Lafayette, IN 47907E-mail: [email protected]

Santosh KumarDepartment of Computer ScienceUniversity of MemphisMemphis, TN 38152E-mail: [email protected]

Ten H. LaiDepartment of Computer Science and EngineeringOhio State UniversityColumbus, OH 43210E-mail: [email protected]

Frank L. LewisAutomation and Robotics Research Institute (ARRI)University of Texas at ArlingtonArlington, TX 76118E-mail: [email protected]

Jianzhong LiSchool of Computer Science & TechnologyHarbin Institute of TechnologyHarbin 150001, ChinaE-mail: [email protected]

Jinbao LiSchool of Computer Science & TechnologyHarbin Institute of TechnologyHarbin 150001, ChinaE-mail: [email protected]

Dan-Dan LiuComputer SchoolWuhan UniversityWuhan 430072, ChinaE-mail: [email protected]

AuthorsContributing

XVII

Fang LiuDepartment of Computer ScienceGeorge Washington UniversityWashington, DC 20052E-mail: [email protected]

Ren-Shiou LiuComputer Science and EngineeringOhio State UniversityColumbus, OH 43210E-mail: [email protected]

Sha LiuComputer Science and Engineering DepartmentOhio State UniversityColumbus, OH 43210E-mail: [email protected]

Yadi MaComputer Science DepartmentUniversity of MissouriRolla, MO 65401E-mail: [email protected]

Vivek MhatreSchool of Electrical and Computer EngineeringPurdue UniversityWest Lafayette, IN 47907E-mail: [email protected]

Dan O. PopaAutomation and Robotics Research Institute (ARRI)University of Texas at ArlingtonArlington, TX 76118E-mail: [email protected]

Catherine P. RosenbergDepartment of Electrical and Computer EngineeringUniversity of WaterlooWaterloo, ON N2L3G1, CanadaE-mail: [email protected]

AuthorsContributing

XVIII

Columbus, OH 43210E-mail: [email protected]

Prasun SinhaComputer Science and Engineering DepartmentOhio State UniversityColumbus, OH 43210E-mail: [email protected]

Curt SchurgersElectrical and Computer Engineering DepartmentUniversity of CaliforniaSan Diego, CA 92093E-mail: [email protected]

Weilian SuDepartment of Electrical and Computer EngineeringNaval Postgraduate SchoolMonterey 93943, Canada

E-mail: [email protected]

Jindong TanDepartment of Electrical and Computer EngineeringMichigan Technological UniversityHoughton, MI 49931E-mail: [email protected]

Yu WangDepartment of Computer ScienceUniversity of North Carolina at CharlotteCharlotte, NC 28223E-mail: [email protected]

Yang XiaoDepartment of Computer ScienceUniversity of MemphisMemphis, TN 38152E-mail: [email protected]

AuthorsContributing

Lifeng SangComputer Science and EngineeringOhio State University

833 Dyer Road, Rm. 452, Spanagel Bldg. 232

Preface

Wireless sensor networks are being employed in a variety applications rang-ing from medical to military, and from home to industry. The principle aim ofthis book is to provide a reference tool for the increasing number of scientistswho depend upon sensor networks in some way. The book is organized intoseveral sections, each including chapters exploring a specific topic.

Wireless sensor networks are attracting great attention and there are manyresearch topics yet to be studied. In this book, the topics covered include net-work design and modelling, network management, data management, securityand applications.

The articles presented in the book are expository, but of a scholarly nature,including the appropriate history background, a review of the state-of-the-artthinking relative to the topic, as well as a discussion of unsolved problemsthat are of special interest.

The target readers of this book include the researchers in computer sci-ence, computer engineering, and applied mathematics, as well as students inthese subjects. Specialists as well as general readers will find the articles stim-ulating and helpful.

Book Organization

The book is organized into five sections. Section I introduces the designand modelling of sensor networks. Chapter 1, by Iyer, Kulkarni, Mhatre, andRosenberg, presents a taxonomy of wireless sensor networks, based on theirapplication level objectives, traffic characteristics and data delivery require-ments. Popa and Lewis in Chapter 2 describe some algorithms for systematicexploration of unknown environments using a mobile wireless sensor network.In Chapter 3, Tan illustrates a distributed graph model for dynamic coveragein a mobile sensor network.

Section II presents some network management techniques. In Chapter 4,Humos, Cardei, Alhalabi, and Hsu address the Medium Access Control pro-tocols in wireless sensor networks. Wang presents in Chapter 5 an overview ofvarious techniques for topology control protocols in wireless sensor networks.Chapter 6 by Liu, Sang and Sinha discusses some recent techniques for de-tecting boundaries in sensor networks. In Chapter 7, a time-based localizationscheme which uses only short-range beacons is presented by Liu, Cheng, Hua,and Chen. Chapter 8 by Schurgers covers three distinct classes of wake-upsolutions. Su introduces in Chapter 9 the factors influencing time synchro-nization and the design challenges encountered in determining guidelines fordeveloping time synchronization protocols. In Chapter 10, Liu and Jia showhow to apply the quorum method to some problems including location service,information dissemination and object tracking. In Chapter 11, Kumar, Arora,

XIX

XX

and Lai present a case study of ExScal — a wireless sensor network deployed

management techniques are also discussed.Section III is devoted to data management, which is a very important

task as well as a big challenge for sensor networks. Chapter 12, by Li, Cai,and Li, gives a detailed survey of data management in sensor networks. Dataaggregation is introduced by Fan, Liu, and Sinha, in Chapter 13. In Chapter14, Ma and Cheng compare some clustering-based schemes in sensor networks.Cohen, Goldberg, and de Oliveira present in Chapter 15 a new approach toconstrained traffic engineering routing. Krishnamachari surveys in Chapter 16some models for data gathering in sensor networks.

Section IV discusses security issues in sensor networks. In Chapter 17,Du and Xiao summarize the typical attacks on sensor networks and presentthe current state-of-art of research on sensor network security. Chapter 18by Corbett, Copeland, and Beyah introduces the use of spectral analysis todifferentiate homogeneous sensor nodes from sensors with a different radiointerface composition in order to address the problem of unauthorized access.

Acknowledgement

We would like to acknowledge all the contributing authors, who are ex-perts in sensor networks and have done extensive work in this area. We alsoappreciate the help of the referees who have devoted much time in reviewingthe submissions. We are also grateful to the publisher who made this bookpossible.

Yingshu LiDepartment of Computer ScienceGeorgia State UniversityEmail: [email protected]

My T. ThaiDepartment of Computer and Information Science and EngineeringUniversity of FloridaEmail: [email protected]

Weili WuDepartment of Computer ScienceUniversity of Texas at DallasEmail: [email protected]

to detect and classify intruders of different kinds. Several fine-grained power

Preface