PART I: WIRELESS PERSONAL-AREA AND SENSORY-AREA NETWORKS |
|
|
1 Coverage and Connectivity of Wireless Sensor Networks |
|
|
3 | |
|
|
3 | |
|
1.2 Computing Coverage of a Wireless Sensor Network |
|
|
4 | |
|
1.3 Coverage and Scheduling |
|
|
14 | |
|
1.4 Coverage and Connectivity |
|
|
20 | |
|
|
23 | |
|
2 Communication Protocols |
|
|
25 | |
|
|
25 | |
|
2.2 Similarities and Differences between WSNs and MANETs |
|
|
28 | |
|
2.3 Communication Patterns in Wireless Sensor Networks |
|
|
30 | |
|
2.4 Routing Protocols in WSNs |
|
|
39 | |
|
|
53 | |
|
2.6 Conclusions and Future Research Directions |
|
|
56 | |
|
3 FireFly: A Time-Synchronized Real-Time Sensor Networking Platform |
|
|
65 | |
|
|
65 | |
|
3.2 The FireFly Sensor Node |
|
|
67 | |
|
3.3 RT-Link: A TDMA Link Layer Protocol for Multihop Wireless Networks |
|
|
71 | |
|
3.4 Nano-RK: A Resource-Centric RTOS for Sensor Networks |
|
|
87 | |
|
3.5 Coal Mine Safety Application |
|
|
98 | |
|
3.6 Summary and Concluding Remarks |
|
|
102 | |
|
4 Energy Conservation in Sensor and Sensor-Actuator Networks |
|
|
107 | |
|
|
107 | |
|
4.2 Localized Algorithms Save Energy |
|
|
110 | |
|
4.3 Minimum-Energy Broadcasting and Multicasting |
|
|
113 | |
|
|
115 | |
|
4.5 Controlled Mobility for Power-Aware Localized Routing |
|
|
116 | |
|
4.6 Power-Efficient Neighbor Communication and Discovery for Asymmetric Links |
|
|
118 | |
|
4.7 Challenges of Power-Aware Routing with a Realistic Physical Layer |
|
|
119 | |
|
4.8 A Localized Coordination Framework for Wireless Sensor and Actuator Networks |
|
|
121 | |
|
4.9 Localized Movement Control Algorithms for Realization of Fault Tolerant Sensor and Sensor-Actuator Networks |
|
|
128 | |
|
|
130 | |
|
5 Security in Wireless Sensor Networks |
|
|
135 | |
|
|
136 | |
|
5.2 Physical Layer Security |
|
|
136 | |
|
|
140 | |
|
|
155 | |
|
5.5 Network Layer Security |
|
|
157 | |
|
5.6 Application Layer Security |
|
|
159 | |
|
6 Autonomous Swarm-Bot Systems for Wireless Sensor Networks |
|
|
167 | |
|
|
167 | |
|
6.2 The System Architecture |
|
|
168 | |
|
6.3 Cooperative Localization Algorithm |
|
|
169 | |
|
6.4 Foraging and Gathering |
|
|
172 | |
|
|
178 | |
|
6.6 The Collaborative Path Planning Algorithm |
|
|
181 | |
|
|
184 | |
|
7 A Smart Blind Alarm Surveillance and Blind Guide Network System on Wireless Optical Communication |
|
|
191 | |
|
|
191 | |
|
7.2 The Manufacture of Wireless Optical Transceiver |
|
|
193 | |
|
7.3 The Design of Wireless Optical Network |
|
|
196 | |
|
7.4 Smart Wireless Optical Blind-Guidance Cane and Blind-Guidance Robot |
|
|
199 | |
|
7.5 The Design of a Smart Guide System with Wireless Optical Blind-Guidance Cane and a Blind-Guidance Robot |
|
|
203 | |
|
7.6 Smart Wireless Optical Communication of Blind Alarm Surveillance System |
|
|
210 | |
|
7.7 The Design and Implementation of a Smart Wireless Blind-Guidance Alarm Surveillance System |
|
|
214 | |
PART II: WIRELESS LOCAL-AREA NETWORKS |
|
|
8 Opportunism in Wireless Networks: Principles and Techniques |
|
|
223 | |
|
8.1 Opportunism: Avenues and Basic Principles |
|
|
223 | |
|
|
227 | |
|
8.3 Spatio-Temporal Opportunism over a Single Link |
|
|
234 | |
|
8.4 Spatio-Temporal Opportunism in Ad Hoc Networks |
|
|
241 | |
|
8.5 Spatiotemporal-Spectral Opportunism in Ad Hoc Networks |
|
|
247 | |
|
|
250 | |
|
9 Localization Techniques for Wireless Local Area Networks |
|
|
255 | |
|
|
255 | |
|
9.2 Nondedicated Localization Techniques |
|
|
256 | |
|
|
272 | |
|
|
274 | |
|
10 Channel Assignment in Wireless Local Area Networks |
|
|
277 | |
|
|
277 | |
|
|
280 | |
|
|
282 | |
|
|
285 | |
|
|
288 | |
|
|
292 | |
|
|
296 | |
|
11 MultiChannel MAC Protocols for Mobile Ad Hoc Networks |
|
|
301 | |
|
|
301 | |
|
11.2 Design Issues of Multichannel Protocols |
|
|
302 | |
|
11.3 Multichannel Protocols |
|
|
303 | |
|
11.4 Comparison of Multichannel MAC Protocols |
|
|
320 | |
|
|
321 | |
|
|
322 | |
|
12 Enhancing Quality of Service for Wireless Ad Hoc Networks |
|
|
325 | |
|
|
326 | |
|
|
327 | |
|
12.3 The Proposed EDCF-DM Protocol |
|
|
331 | |
|
12.4 Performance Evaluation |
|
|
334 | |
|
|
340 | |
|
13 QoS Routing Protocols for Mobile Ad Hoc Networks |
|
|
343 | |
|
|
343 | |
|
13.2 Reviews of the QoS Routing Protocols |
|
|
345 | |
|
13.3 Our QoS Routing Protocol |
|
|
348 | |
|
|
360 | |
|
|
367 | |
|
14 Energy Conservation Protocols for Wireless Ad Hoc Networks |
|
|
371 | |
|
|
371 | |
|
|
371 | |
|
|
382 | |
|
14.4 Topology Control Protocols |
|
|
387 | |
|
|
397 | |
|
|
399 | |
|
15.1 WEP and Its Security Weaknesses |
|
|
399 | |
|
15.2 802.1X Security Measures |
|
|
405 | |
|
15.3 IEEE 802.11i Security |
|
|
410 | |
|
|
417 | |
|
16 Temporal Key Integrity Protocol and Its Security Issues in IEEE 802.11i |
|
|
419 | |
|
|
419 | |
|
16.2 Wired Equivalent Privacy and Its Weakness |
|
|
420 | |
|
16.3 Wi-Fi Protected Access |
|
|
421 | |
|
16.4 Temporal Key Integrity Protocol |
|
|
423 | |
|
16.5 Fragility of Michael |
|
|
430 | |
|
16.6 TKIP Countermeasures |
|
|
431 | |
|
16.7 Key Handshake Procedure |
|
|
433 | |
|
|
434 | |
PART III: INTEGRATED SYSTEMS |
|
|
17 Wireless Mesh Networks: Design Principles |
|
|
439 | |
|
|
439 | |
|
17.2 Generic Architecture and Basic Requirements of Wireless Mesh Networks |
|
|
439 | |
|
17.3 Network-Planning Techniques |
|
|
442 | |
|
17.4 Self-Configuring Techniques |
|
|
448 | |
|
|
458 | |
|
18 Wireless Mesh Networks: Multichannel Protocols and Standard Activities |
|
|
461 | |
|
|
461 | |
|
18.2 Multichannel MAC Protocols |
|
|
462 | |
|
18.3 Multichannel Routing Protocols |
|
|
473 | |
|
18.4 Standard Activities of Mesh Networks |
|
|
478 | |
|
|
481 | |
|
19 Integrated Heterogeneous Wireless Networks |
|
|
483 | |
|
|
483 | |
|
19.2 Integration of Infrastructure-Based Heterogeneous Wireless Networks |
|
|
485 | |
|
19.3 Heterogeneous Wireless Multihop Networks |
|
|
492 | |
|
19.4 Research Issues for Heterogeneous Wireless Networks |
|
|
500 | |
|
|
502 | |
|
20 Intrusion Detection for Wireless Network |
|
|
505 | |
|
|
505 | |
|
20.2 Background on Intrusion Detection |
|
|
505 | |
|
20.3 Intrusion Detection for Mobile Ad Hoc Networks |
|
|
506 | |
|
20.4 Intrusion Detection for Wireless Sensor Networks |
|
|
519 | |
|
|
530 | |
|
21 Security Issues in an Integrated Cellular NetworkWLAN and MANET |
|
|
535 | |
|
|
535 | |
|
21.2 Architecture of the Integrated Network |
|
|
537 | |
|
21.3 Security Impacts from the Unique Network Characteristics |
|
|
540 | |
|
21.4 Potential Security Threats |
|
|
542 | |
|
21.5 An Investigation and Analysis of Security Protocols |
|
|
554 | |
|
21.6 New Security Issues and Challenges |
|
|
564 | |
|
|
566 | |
|
22 Fieldbus for Distributed Control Applications |
|
|
571 | |
|
|
571 | |
|
22.2 Review on Distributed Control |
|
|
577 | |
|
22.3 Fundamental Aspects of DCS |
|
|
578 | |
|
22.4 Standards, Frequency Bands, and Issues |
|
|
580 | |
|
22.5 Some of the Major Wireless Fieldbuses |
|
|
583 | |
|
22.6 Selecting a Fieldbus |
|
|
590 | |
|
22.7 Discussion and Conclusions |
|
|
591 | |
|
23 Supporting Multimedia Communication in the Integrated WCDMA/WLAN/Ad Hoc Networks |
|
|
595 | |
|
|
595 | |
|
23.2 Multiple Accesses in CDMA Uplink |
|
|
599 | |
|
23.3 Multiple Accesses in CDMA Downlink |
|
|
605 | |
|
|
613 | |
|
23.5 Design Integration with Ad Hoc Networks |
|
|
620 | |
Index |
|
629 | |