Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
747 sensor network operation-1-187.pdf
Скачиваний:
4
Добавлен:
13.12.2023
Размер:
2.1 Mб
Скачать

86 SENSOR DEPLOYMENT, SELF-ORGANIZATION, AND LOCALIZATION

which increases the deployment cost. Similar qualitative and/or quantitative inferences about the relationships between various other parameters can also be made. Wireless sensor networks are prone to failures. Furthermore, the sensor nodes die due to their limited energy resources. Therefore, the failures of sensor nodes must be modelled and incorporated into the breach path calculations in the future. Simulating the reliability of the network throughout the entire life of the wireless sensor network is also required. Lastly, especially for the perimeter surveillance applications, the obstacles in the environment play a critical role in terms of sensing and must be incorporated in the field model.

REFERENCES

1.D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, “Next century challenges: Mobile networking for smart dust,” in Proceedings of the MOBICOM, Seattle, 1999, pp. 271–278.

2.G. J. Pottie and W. Kaiser, “Wireless sensor networks,” Communications of the ACM, vol. 43, pp. 51–58, 2000.

3.K. M. Alzoubi, P. J. Wan, and O. Frieder, “Distributed heuristics for connected dominating sets in wireless ad hoc networks,” Journal of Communications and Networks, vol. 4, pp. 1–8, 2002.

4.J. H. Y. Xu and D. Estrin, “Geography informed energy conservation for ad hoc routing,” in

Proceedings of the MOBICOM, Rome, 2001, pp. 70–84.

5.B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, “Span: An energy-efficient co-ordination algorithm for topology maintenance in ad hoc wireless networks,” in Proceedings of the MOBICOM, Rome, 2001, pp. 85–96.

6.C. Schurgers, V. Tsiatsis, and M. B. Srivastava, “Stem: Topology management for energy-efficient sensor networks,” in Proceedings of the IEEE Aero Conference, Big Sky Montana, 2002, pp. 135– 145.

7.D. Tian and N. D. Georganas, “A coverage-preserving node scheduling scheme for large wireless sensor networks,” in Proceedings of the WSNA, Atlanta, 2002, pp. 32–41.

8.W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networksw. r. heinzelman, a. chandrakasan and h. balakrishnan,” in Proceedings of the HICSS, Maui, Hawaii, 2000, pp. 3005–3014.

9.J. H. Y. Xu and D. Estrin, “Adaptive energy conservating routing for multihop ad hoc routing,” Technical Report 527, USC/ISI, 2000.

10.C. S. Raghavendra and S. Singh, “Pamas: Power-aware multi-access protocol with signaling for ad hoc networks,” ACM Communications Review, vol. 28, pp. 5–26, 1998.

11.K. Sohrabi and G. J. Pottie, “Performance of a novel self-organization protocol for wireless ad hoc sensor networks,” in Proceedings of the IEEE VTC, 1999, pp. 1222–1226.

12.P. Bergamo and G. Mazzini, “Localization in sensor networks with fading and mobility,” in Proceedings of the PIMRC, Lisbon, Portugal, 2002.

13.B. Hoffman-Wellenhof, H. Lichteneger, and J. Collins, Global Positioning System: Theory and Practice, 4th ed., Vienna, Austria: Springer-Verlag, 1997.

14.N. Patwari and R. J. O’Dea, “Relative location in wireless networks,” in Proceedings of the IEEE VTC, vol. 2, 1991, pp. 1149–1153.

15.K. Whitehouse and D. Culler, “Calibration as parameter estimation in sensor networks,” in Proceedings of the WSNA, Atlanta, 2002, pp. 59–67.

16.L. Girod and D. Estrin, “Robust range estimation for localization in ad hoc sensor networks,” Technical Report CS-TR-2000XX, University of California, Los Angeles, 2000.

REFERENCES 87

17.N. H. Vaidya, P. H. Krishna, M. Chatterjee, and D. K. Pradhan, “A cluster-based approach for routing in dynamic networks,” ACM Computer Communications Review, vol. 27, pp. 49–65, Apr. 1997.

18.M. Gerla and J. T. Tsai, “Multicluster, mobile, multimedia radio network,” Wireless Networks, vol. 1, pp. 255–265, Oct. 1995.

19.S. Basagni, “Distributed clustering for ad hoc networks,” in Proceedings of the ISPAN, Fremantle, Australia, 1999, pp. 310–315.

20.“Wireless integrated network systems,” http://wins.rsc.rockwell.com.

21.“Ash transceiver’s designers guide,” http://www.rfm.com.

22.Wireless LAN Medium Access Control and Physical Layer Specifications, IEEE 802.11 Standard (IEEE LAN MAN Standards Committee), Aug. 1999.

23.J. Broch, D. Maltz, D. Johnson, Y. Su, and J. Jetcheva, “A performance comparison of multi-hop wireless ad hoc network routing protocols,” in Proceedings of the MOBICOM, Dallas, 1998, pp. 85–97.

24.E. Biagioni and K. Bridges, “The application of remote sensor technology to assist the recovery of rare and endangered species,” International Journal of High Performance Computing Applications, vol. 16, no. 3, Aug. 2002, special issue on Distributed Sensor Networks.

25.A. Cerpa, J. Elson, L. G. D. Estrin, M. Hamilton, and J. Zhao, “Habitat monitoring: Application driver for wireless communications technology,” in Proceedings of the ACM SIGCOMM Workshop on Data Communications, San Francisco, 2001.

26.A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson, “Wireless sensor networks for habitat monitoring,” in Proceedings of ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, Sept. 2002.

27.H. Wang, J. Elson, L. Girod, D. Estrin, and K. Yao, “Target classification and localization in habitat monitoring,” in Proceedings of the IEEE ICASSP, Hong Kong, Apr. 2003.

28.I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, 2002.

29.L. Schwiebert, S. K. S. Gupta, and J. Weinmann, “Research challenges in wireless networks of biomedical sensors,” in Proceedings of Mobile Computing and Networking, Rome, 2001, pp. 151–165.

30.P. Boettcher, J. A. Sherman, and G. A. Shaw, “Target localization using acoustic time-difference of arrival in distributed sensor networks,” in Proceedings of the SPIE Forty-Seventh Annual Meeting, Seattle, 2002.

31.E. Howden, “Networked sensors for the objective force,” in Proceedings of SPIE Forty-Seventh Annual Meeting, Seattle, 2002.

32.“Alert systems,” http://www.alertsystems.org/.

33.“Corie observations,” http://www.ccalmr.ogi.edu/CORIE/.

34.D. C. Steere, A. Baptista, D. McNamee, C. Pu, and J. Walpole, “Research challenges in environmental observation and forecasting systems,” in Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, 2000, pp. 292–299.

35.J. Hill, R. Szewczyk, A. Woo, S. Holar, D. Culler, and K. S. J.Pister, “System architecture directions for networked sensors,” Operating Systems Review, vol. 34, pp. 93–104, 2000.

36.N. Bulusu, J. Heidemann, and D. Estrin, “Gps-less lowcost outdoor localization for very small devices,” IEEE Personal Communications, vol. 7, no. 5, pp. 28–34, 2000.

37.S. Capkun, M. Hamdi, and J.-P. Hubaux, “Gps-free positioning in mobile ad-hoc networks,” in

Hawaii International Conference on System Sciences (HICSS-34), Maui, HI, Jan. 2001, pp. 3841– 3490.

38.F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, “A two-tier data dissemination model for large-scale wireless sensor networks,” in MOBICOM, Atlanta, 2002.

88 SENSOR DEPLOYMENT, SELF-ORGANIZATION, AND LOCALIZATION

39.D. Niculescu and B. Nath, “Ad-hoc positioning system,” in Proceedings of IEEE GlobeCom, San Antonio, Texas, Nov. 2001.

40.C. Savarese, J. Rabaey, and J. Beutel, “Locationing in distributed ad-hoc wireless sensor networks,” in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Salt Lake City, UT, May 2001, pp. 2037–2040.

41.A. Savvides, C.-C. Han, and M. Srivastava, “Dynamic fine-grained localization in ad-hoc networks of sensors,” in Seventh ACM International Conference on Mobile Computing and Networking (Mobicom), Rome, Italy, July 2001, pp. 166–179.

42.N. Priyantha, A. Chakraborty, and H. Padmanabhan, “The cricket location support system,” in Sixth ACM MOBICOM, Boston, MA, Aug. 2000.

43.D. Niculescu and B. Nath, “Ad hoc positioning system (aps) using aoa,” in INFOCOM, Apr. 2003.

44.N. Bulusu, J. Heidemann, and D. Estrin, “Adapive beacon placement,” in Proceedings of the Twenty-First International Conference on Distributed Computing Systems (ICDCS-21), Phoeniz, AZ, Apr. 2001.

45.N. Bulusu, J. Heidemann, V. Bychkovskiy, and D. Estrin, “Density-adaptive beacon placement algorithms for localization in ad hoc wireless networks,” in IEEE Infocom 2002, New York, June 2002.

46.A. Savarese, “Robust positioning algorithms for distributed ad hoc wireless sensor networks,” Master’s thesis, University of California, Berkeley, 2002.

47.I. Borg and P. Groenen, Modern Multidimensional Scaling Theroy and Applications, Berlin: Springer, 1997.

48.P. Green, F. Caromone, and S. Smith, Multidimensional Scaling: Concepts and Applications, Newton, MA: Allyn and Bacon, 1989.

49.N. Metropolis, A. Rosenbluth, M. Rosenbluth, A. Teller, and E. Teller, “Equations of state calculations by fast computing machines,” Journal of Chemical Physics, vol. 21, pp. 1087–1092, 1953.

50.S. Schiffman, M. Reynolods, and F. Young, Introduction to Multidimensional Scaling, New York: Academic, 1981.

51.L. Doherty, K. Pister, and L. E. Ghaoui, “Convex position estimation in wireless sensor networks,” in IEEE Infocom 2001, Anchorage, AK, Apr. 2001.

52.N. Bulusu, J. Heidemann, and D. Estrin, “Gps-less low cost outdoor localization for very small devices,” IEEE Personal Communications Magazine, vol. 7, no. 5, pp. 28–34, Oct. 2000. Available: http://lecs.cs.ucla.edu/˜bulusu/papers/Bulusu00a.html.

53.D. Niculescu and B. Nath, “Ad hoc positioning system (aps),” in IEEE GLOBECOM, Nov. 2001.

54.D. Niculescu and B. Nath, “Dv based positioning in ad hoc networks,” Kluwer Journal of Telecommunication Systems, pp. 267–280, 2003.

55.S. N. Simic and S. Sastry, “Distributed localization in wireless ad hoc networks,” Technical Report UCB/ERL M02/26, University of California at Berkeley, 2002.

56.A. Savvides, C.-C. Han, and M. B. Strivastava, “Dynamic fine-grained localization in ad-hoc networks of sensors,” in Proceedings of Mobile Computing and Networking, Rome, 2001, pp. 166– 179.

57.J. R. Chris Savares and K. Langendoen, “Robust positioning algorithms for distributed ad-hoc wireless sensor networks,” paper presented at the USENIX Technical Annual Conference, June 2002.

58.K. Whitehouse, “The design of calamari: An ad-hoc localization system for sensor networks,” Master’s thesis, University of California at Berkeley, 2002.

REFERENCES 89

59.M. I. J. XuanLong Nguyen and B. Sinopoli, “A kernel-based learning approach to ad hoc sensor network localization,” ACM Trans. Sensor Networks, vol. 1, no. 1, pp. 134–152, 2005.

60.R. H. K. J. M. Kahn and K. S. J. Pister, “Mobile networking for smart dust,” paper presented at the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 99), Seattle, Aug. 17–19, 1999.

61.B. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins, Global Positioning System: Theory and Practice, Berlin: Springer-Verlag, 1992.

62.“Sychip gps module,” http://www.sychip.com/gps-module.html, June 2005.

63.A. Ward, A. Jones, and A. Hopper, “A new location technique for the active office,” IEEE Personal Communications, vol. 4, no. 5, pp. 42–47, Oct. 1997.

64.L. Girod and D. Estrin, “Robust range estimation using acoustic and multimodal sensing,” in

IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Maui, HI, Oct. 2001.

65.K. Whitehouse, paper submitted at the USENIX Technical Annual Conference, June 2002, submitted to Sensys.

66.K. Whitehouse and D. Culler, “Macro-calibration in sensor/actuator networks,” Mobile Networks and Applications Journal (MONET), special issue on Wireless Sensor Networks, vol. 8, no. 4,

pp.463–472, June 2003.

67.J. B. Kruskal, “Multidimensional scaling,” Quantitative Applications in the Social Science, SAGE Publications Thousand Oaks, CA, 1978.

68.K. Whitehouse, http://www.cs.berkeley.edu/ kamin/calamari/index.html, June 2005.

69.A. Woo, “Mica sensor board,” http://today.cs.berkeley.edu/tos/hardware/hardware.html, June 2005.

70.H. Zhang and C.-J. Hou, “On deriving the upper bound of α-lifetime for large sensor networks,” Technical Report UIUCDCS-R-2004-2410, Department of Computer Science, University of Illinois at Urbana-Champaign, 2004.

71.T. Clouqueur, V. Phipatanasuphorn, P. Ramanathan, and K. K. Saluja, “Sensor deployment strategy for detection of targets traversing a region,” Mobile Networks and Applications, vol. 8, no. 4,

pp.453–461, Aug. 2003.

72.Y. Zou and K. Chakrabarty, “Sensor deployment and target localization based on virtual forces,” in Proceedings of the IEEE INFOCOM, San Francisco, Apr. 2003, pp. 1293–1303.

73.A. Howard, M. J. Mataric, and G. S. Sukhatme, “An incremental self-deployment algorithm for mobile sensor networks,” Autonomous Robots, vol. 13, no. 2, pp. 113–126, Sept. 2002.

74.S. Tilak, N. B. Abu-Ghazaleh, and W. Heinzelman, “Infrastructure tradeoffs for sensor networks,” in Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, 2002, pp. 49–58.

75.S. Megerian, F. Koushanfar, G. Qu, G. Veltri, and M. Potkonjak, “Exposure in wireless sensor networks: Theory and practical solutions,” Wireless Networks, vol. 8, no. 5, pp. 443–454, Sept. 2002.

76.T. He, S. Krishnamurthy, T. A. J. A. Stankovic, L. Luo, R. Stoleru, T. Yan, and L. Gu, “Energyefficient surveillance system using wireless sensor networks,” in Proceedings of the Second International Conference on Mobile Systems, Applications, and Services, Boston, June 2004,

pp.270–283.

77.D. Kazakos and P. Papantoni-Kazakos, Detection and Estimation, New York: Computer Science Press, 1990.

78.G. Xing, C. Lu, R. Pless, and J. A. O’Sullivan, “Co-grid: An efficient coverage maintenance protocol for distributed sensor networks,” in Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, Apr. 2004, pp. 414–423.

90 SENSOR DEPLOYMENT, SELF-ORGANIZATION, AND LOCALIZATION

79.T. S. Rappaport, Wireless Communications: Principles and Practice, Upper Saddle River, NJ: Prentice-Hall, 1996.

80.M. A. Weiss, Data Structures and Algorithm Analysis in C++, 2nd ed., Reading, MA: AddisonWesley, 1999.

81.V. Phipatanasuphorn and P. Ramanathan, “Vulnerability of sensor networks to unauthorized traversal and monitoring,” IEEE Transactions on Computers, vol. 53, no. 3, pp. 364–369, Mar. 2004.