Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
747 sensor network operation-1-187.pdf
Скачиваний:
1
Добавлен:
26.10.2023
Размер:
2.1 Mб
Скачать

SENSOR NETWORK OPERATIONS

Edited by

Shashi Phoha

Thomas LaPorta

Christopher Griffin

IEEE PRESS

A JOHN WILEY & SONS, INC PUBLICATION

SENSOR NETWORK OPERATIONS

IEEE Press

445 Hoes Lane

Piscataway, NJ 08854

IEEE Press Editorial Board

Mohamed E. El-Hawary, Editor-in-Chief

M. Akay

R. J. Herrick

F. M. B. Pereira

J. B. Anderson

S. V. Kartalopoulos

C. Singh

J. E. Brewer

M. Montrose

G. Zobrist

T. G. Croda

M. S. Newman

 

 

Kenneth Moore, Director of IEEE Book and Information

 

 

Catherine Faduska, Acquisitions Editor, IEEE Press

 

 

Jeanne Audino, Project Editor, IEEE Press

 

SENSOR NETWORK OPERATIONS

Edited by

Shashi Phoha

Thomas LaPorta

Christopher Griffin

IEEE PRESS

A JOHN WILEY & SONS, INC PUBLICATION

Copyright C 2006 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved.

Published by John Wiley & Sons, Inc.

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or

fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.

Library of Congress Cataloging-in-Publication Data is available.

ISBN-13 978-0-471-71976-2

ISBN-10 0-471-71976-5

Printed in the United States of America

10 9 8 7 6 5 4 3 2 1

To Him in whose presence to present oneself is to find oneself.

—Shashi Phoha

I dedicate this book to Lisa, Abigail, and Sophia.

—Thomas F. LaPorta

For Amy, my darling wife, who put up with me during this project. I love you more than you can imagine.

—CHG

CONTENTS

PREFACE

xiii

CONTRIBUTORS

xv

I SENSOR NETWORK OPERATIONS OVERVIEW

1

1 Overview of Mission-Oriented Sensor Networks

3

1.1Introduction / 3

1.2Trends in Sensor Development / 4

1.3Mission-Oriented Sensor Networks: Dynamic Systems Perspective / 8 References / 10

II SENSOR NETWORK DESIGN AND OPERATIONS

11

2 Sensor Deployment, Self-Organization, and Localization

13

2.1Introduction / 13

2.2SCARE: A Scalable Self-Configuration and Adaptive Reconfiguration Scheme for Dense Sensor Networks / 14

2.3Robust Sensor Positioning in Wireless Ad Hoc Sensor Networks / 35

2.4Trigonometric k Clustering (TKC) for Censored Distance Estimation / 51

2.5Sensing Coverage and Breach Paths in Surveillance Wireless Sensor Networks / 68

References / 86

3 Purposeful Mobility and Navigation

91

3.1Introduction / 91

3.2Controlled Mobility for Efficient Data Gathering in Sensor Networks with Passively Mobile Nodes / 92

3.3Purposeful Mobility in Tactical Sensor Networks / 113

3.4Formation and Alignment of Distributed Sensing Agents with Double-Integrator Dynamics and Actuator Saturation / 126

vii

viiiCONTENTS

3.5Modeling and Enhancing the Data Capacity of Wireless Sensor Networks / 157

References / 179

4 Lower Layer Issues—MAC, Scheduling, and Transmission

185

4.1Introduction / 185

4.2SS-TDMA: A Self-Stabilizing Medium Access Control (MAC) for Sensor Networks / 186

4.3Comprehensive Performance Study of IEEE 802.15.4 / 218

4.4Providing Energy Efficiency for Wireless Sensor Networks Through Link Adaptation Techniques / 237

References / 257

5 Network Routing

263

5.1Introduction / 263

5.2Load-Balanced Query Protocols for Wireless Sensor Networks / 264

5.3Energy-Efficient and MAC-Aware Routing for Data Aggregation in Sensor Networks / 291

5.4LESS: Low-Energy Security Solution for Large-scale Sensor

Networks Based on Tree-Ripple-Zone Routing Scheme / 308 References / 329

6 Power Management

337

6.1Introduction / 337

6.2Adaptive Sensing and Reporting in Energy-Constrained Sensor Networks / 338

6.3Sensor Placement and Lifetime of Wireless Sensor Networks: Theory and Performance Analysis / 354

6.4Algorithms for Maximizing Lifetime of Battery-Powered Wireless Sensor Nodes / 367

6.5Battery Lifetime Estimation and Optimization for Underwater Sensor Networks / 397

References / 416

7 Distributed Sensing and Data Gathering

421

7.1Introduction / 421

7.2Secure Differential Data Aggregation for Wireless Sensor Networks / 422

7.3Energy-Conserving Data Gathering Strategy Based on Trade-off Between Coverage and Data Reporting Latency in Wireless Sensor Networks / 442

7.4Quality-Driven Information Processing and Aggregation in Distributed Sensor Networks / 467

CONTENTS ix

7.5Progressive Approach to Distributed Multiple-Target Detection in Sensor Networks / 486

References / 504

8 Network Security

509

8.1Introduction / 509

8.2Energy Cost of Embedded Security for Wireless Sensor Networks / 510

8.3Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks / 522

8.4Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc Networks / 535

8.5Fast and Scalable Key Establishment in Sensor Networks / 557

8.6Weil Pairing-Based Round, Efficient, and Fault-Tolerant Group Key Agreement Protocol for Sensor Networks / 571

References / 580

III SENSOR NETWORK APPLICATIONS

587

9 Pursuer–Evader Tracking in Sensor Networks

589

9.1Introduction / 589

9.2The Problem / 590

9.3Evader-Centric Program / 592

9.4Pursuer-Centric Program / 595

9.5Hybrid Pursuer–Evader Program / 596

9.6Efficient Version of Hybrid Program / 599

9.7Implementation and Simulation Results / 600

9.8Discussion and Related Work / 605 References / 607

10 Embedded Soft Sensing for Anomaly Detection in Mobile

 

Robotic Networks

609

10.1Introduction / 609

10.2Mobile Robot Simulation Setup / 614

10.3Software Anomalies in Mobile Robotic Networks / 615

10.4Soft Sensor / 616

10.5Software Anomaly Detection Architecture / 616

10.6Anomaly Detection Mechanisms / 618

10.7Test Bed for Software Anomaly Detection in Mobile Robot Application / 619

10.8Results and Discussion / 623

10.9Conclusions and Future Work / 626

Appendix A / 626

Appendix B / 627

References / 628

x CONTENTS

 

11 Multisensor Network-Based Framework for Video

 

Surveillance: Real-Time Superresolution Imaging

631

11.1Introduction / 632

11.2Basic Model of Distributed Multisensor Surveillance System / 632

11.3Superresolution Imaging / 636

11.4Optical Flow Computation / 638

11.5Superresolution Image Reconstruction / 644

11.6Experimental Results / 644

11.7Conclusion / 645

References / 646

12 Using Information Theory to Design Context-Sensing

 

Wearable Systems

649

12.1Introduction / 649

12.2Related Work / 651

12.3Theoretical Background / 651

12.4Adaptations / 654

12.5Design Considerations / 662

12.6Case Study / 663

12.7Results / 666

12.8Conclusion / 674

Appendix / 674

References / 675

13 Multiple Bit Stream Image Transmission over Wireless

 

Sensor Networks

677

13.1Introduction / 677

13.2System Description / 679

13.3Experimental Results / 685

13.4Summary and Discussion / 686 References / 687

14 Hybrid Sensor Network Test Bed for Reinforced Target Tracking

689

14.1Introduction / 689

14.2Sensor Network Operational Components / 690

14.3Sensor Network Challenge Problem / 694

14.4Integrated Target Surveillance Experiment / 695

14.5Experimental Results and Evaluation / 698

14.6Conclusion / 701

References / 703

15 Noise-Adaptive Sensor Network for Vehicle Tracking in the Desert 705

15.1Introduction / 706

15.2Distributed Tracking / 708

CONTENTS xi

15.3 Algorithms / 710

15.4 Experimental Methods / 712

15.5 Results and Discussion / 714

15.6 Conclusion / 715

References / 715

ACKNOWLEDGMENTS

717

INDEX

719

ABOUT THE EDITORS

723