Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Contains the most current techniques and advances in sensor networks
The topic covered in each chapter is given expository but also scholarly treatment
Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon reliable sensor networks.
The book is divided into five sections: design and modeling, network management, data management, security, and applications. The eighteen self-contained chapters are authored by experts in wireless networking. Each chapter is given expository but also scholarly treatment, covering the history of its specific topic, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest.
*Explores different access control protocols and wake up strategies in wireless sensor networks;
*Discusses several time-synchronization techniques and challenges, i.e., directed diffusion, tiny aggression, greedy aggression on directed diffusion;
*Provides insights in network security, i.e., secure routing, and proper management;
*Elaborates on numerous wireless sensor network applications, i.e., the ExScal application and the XSM platform.
The topics covered within this book are intended for researchers, computer engineers, applied mathematicians, and graduate students interested in wireless sensor networks, but uninformed readers may also find this volume stimulating and helpful.
SECTION I. Network Design and Network Modelling
Chapter 1. A Taxonomy-based Approach to Design Large-scale Sensor Networks (Aravind Iyer, Sunil S. Kulkarni, Vivek Mhatre and Catherine P. Rosenberg)
Chapter 2. Algorithms for Robotic Deployment of WSN in Adaptive Sampling Applications (Dan O. Popa and Frank L. Lewis)
Chapter 3. A Scalable Graph Model and Coordination Algorithms for Mobile Sensor Networks (Jindong Tan)
SECTION II. Network Management
Chapter 4. Medium Access Control Protocols for Wireless Sensor Networks (Ali Abu-el Humos, Mihaela Cardei, Bassem Alhalabi and Sam Hsu)
Chapter 5. Topology Control for Wireless Sensor Networks (Yu Wang)
Chapter 6. Boundary Detection for Sensor Networks (Ren-Shiou Liu, Lifeng Sang and Prasun Sinha)
Chapter 7. TPSS: A Time-based Positioning Scheme for Sensor Networks with Short Range Beacons (Fang Liu, Xiuzhen Cheng, Dong Hua and Dechang Chen)
Chapter 8. Wakeup Strategies in Wireless Sensor Networks (Curt Schurgers)
Chapter 9. Time-Synchronization Challenges and Techniques (Weilian Su)
Chapter 10. Location Service, Information Dissemination and Object Tracking in Wireless Sensor Networks by Using Quorum Methods (Dan-Dan Liu and Xiao-Hua Jia)
Chapter 11. Maximizing the Lifetime of an Always-On Wireless Sensor Network Application: A Case Study (Santosh Kumar, Anish Arora and Ten H. Lai)
SECTION III. Data Management
Chapter 12. Data Management in Sensor Networks (Jinbao Li, Zhipeng Cai and Jianzhong Li)
Chapter 13. Time-Synchronization Challenges and Techniques (Kai-Wei Fan, Sha Liu and Prasun Sinha)
Chapter 14. Performance Comparison of Clustering Schemes in Sensor Networks (Yadi Ma and Maggie Cheng)
Chapter 15. Reliable and Efficient Information Forwarding and Traffic Engineering in Wireless Sensor Networks (Fernand S. Cohen, Joshua Goldberg and Jaudelice C. de Oliveira)
Chapter 16. Modeling Data Gathering in Wireless Sensor Networks (Bhaskar Krishnamachari)
SECTION IV. Security
Chapter 17. A Survey on Sensor Network Security (Xiaojiang Du and Yang Xiao)
Chapter 18. A Passive Approach to Unauthorized Sensor Node Identication (Cherita Corbett, John Copeland and Raheem Beyah)