Atjaunināt sīkdatņu piekrišanu

E-grāmata: Wireless Sensor Networks: Security, Coverage, and Localization

  • Formāts: PDF+DRM
  • Izdošanas datums: 02-Nov-2016
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319467696
  • Formāts - PDF+DRM
  • Cena: 77,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 02-Nov-2016
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319467696

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics.  A brief introductory chapter covers common applications and communication protocols for WSNs. Next, the authors review basic mathematical models such as Voroni diagrams and Delaunay triangulations. Sensor principles, hardware structure, and medium access protocols are examined. Security challenges ranging from defense strategies to network robustness are explored, along with quality of service measures. Finally, this book discusses recent developments and future directions in WSN platforms.  Each chapter concludes with classroom-tested exercises that reinforce key conc

epts. This book is suitable for researchers and for practitioners in industry. Advanced-level students in electrical engineering and computer science will also find the content helpful as a textbook or reference.

Introduction.- Background.- WSN Architecture.- Security in WSNs.- Coverage and Connectivity.- Localization and Tracking in WSNs.- Quality of Service.- WSN Platforms.

Recenzijas

The book is a good source for understanding the core concepts of the field. This book covers essential information about WSNs. it can also be easily read by people who are new to the field. It also has a list of references and questions at the end, so it could be used as a textbook. It is a valuable source for learning the foundational principles of WSNs. (Computing Reviews, August, 2017) 

1 Introduction
1(22)
1.1 Sensor Networks
2(5)
1.2 Wireless Sensor Networks
7(5)
1.2.1 Historical Perspective, Aloha Networks
7(1)
1.2.2 Background on Wireless Sensor Networks
8(4)
1.3 WSN Applications
12(5)
1.4 WSN Common Communication Standards
17(6)
Questions and Exercises
19(1)
References
20(3)
2 Topology, Routing, and Modeling Tools
23(14)
2.1 Topology and Routing Protocols in WSNs
23(7)
2.1.1 Topology in WSNs
23(1)
2.1.2 Routing Protocols in WSNs
24(6)
2.2 Modeling Tools
30(7)
2.2.1 Voronoi Diagrams
30(3)
2.2.2 Delaunay Triangulations
33(2)
Questions and Exercises
35(1)
References
35(2)
3 WSN Architecture
37(46)
3.1 Components of a Wireless Sensor Node
38(29)
3.1.1 Sensors and Actuators
39(15)
3.1.2 Microcontrollers and Microprocessors
54(10)
3.1.3 Radios Transceivers and Antennas
64(3)
3.2 Layered Network Architecture
67(16)
3.2.1 Physical Layer
68(1)
3.2.2 Link Layer
69(1)
3.2.3 Medium Access Protocols in WSNs
70(4)
3.2.4 Network Layer
74(1)
3.2.5 Transport Layer
74(4)
Questions and Exercises
78(1)
References
79(4)
4 Security in WSNs
83(34)
4.1 Why WSNs are Predisposed to Attacks?
83(1)
4.2 Security Requirements
84(2)
4.3 WSN Attacks and Defenses
86(8)
4.3.1 Physical Layer Attacks
86(1)
4.3.2 Physical Layer Defenses
87(1)
4.3.3 Link Layer Attacks
88(1)
4.3.4 Link Layer Defenses
88(1)
4.3.5 Network Layer Attacks
89(3)
4.3.6 Network Layer Defenses
92(1)
4.3.7 Transport Layer Attacks
92(1)
4.3.8 Transport Layer Defenses
92(1)
4.3.9 Application Layer Attacks
93(1)
4.3.10 Application Layer Defenses
93(1)
4.4 Cryptography in Sensor Networks
94(4)
4.4.1 Symmetric Key Cryptography in WSNs
94(3)
4.4.2 Asymmetric Key Cryptography in WSNs
97(1)
4.5 Faults in WSNs
98(19)
4.5.1 Fault-Aware WSNs
98(1)
4.5.2 Sensor Faults in WSNs
99(3)
4.5.3 Mathematical Models for Sensor Faults
102(9)
Questions and Exercises
111(1)
References
112(5)
5 Coverage and Connectivity
117(38)
5.1 Modeling Sensor Networks Using Graphs
118(4)
5.1.1 Communication Graphs
119(3)
5.2 Coverage
122(5)
5.2.1 Coverage Holes
124(3)
5.3 Connectivity
127(6)
5.3.1 Graph Laplacian
129(4)
5.4 Coverage Models Using Voronoi Diagrams
133(1)
5.5 Simplicial Complexes
134(7)
5.5.1 From WSNs to Simplicial Complexes
135(2)
5.5.2 Comparison of Cech Complex and Rips Complex
137(2)
5.5.3 Subcomplexes with Planar Topology
139(2)
5.6 Simplicial Homology and Coverage Holes
141(3)
5.7 K-Coverage
144(1)
5.8 Coverage Control
145(10)
Questions and Exercises
149(1)
References
150(5)
6 Localization and Tracking in WSNs
155(24)
6.1 Introduction
155(1)
6.2 Design and Evaluation of Localization Algorithms
156(1)
6.3 Categorization of Localization Approaches
157(11)
6.3.1 Range-Based Methods
157(7)
6.3.2 Range-Free Methods
164(4)
6.4 Comparing Design Paradigms: Centralized vs. Distributed Techniques
168(1)
6.5 Localization in Mobile WSNs
168(3)
6.5.1 Benefits of Node Mobility
168(3)
6.6 Tracking in WSNs
171(8)
6.6.1 Tree-Based Tracking
171(1)
6.6.2 Cluster-Based Tracking
172(1)
6.6.3 Prediction-Based Tracking
173(1)
Questions and Exercises
174(1)
References
175(4)
7 Quality of Service
179(18)
7.1 QoS Building Blocks
179(3)
7.2 QoS Provisioning in WSNs
182(15)
7.2.1 Topology Management
182(2)
7.2.2 Localization Techniques
184(1)
7.2.3 Data Aggregation
185(3)
7.2.4 Load Balancing
188(1)
7.2.5 Optimal Routing
188(4)
7.2.6 Coverage
192(1)
7.2.7 Synchronization
193(1)
Questions and Exercises
194(1)
References
195(2)
8 WSN Platforms
197
8.1 Introduction
197(1)
8.2 WSN Hardware Platforms
197(12)
8.2.1 IRIS
198(2)
8.2.2 WiSense
200(1)
8.2.3 Digi XBee® ZigBee
201(1)
8.2.4 Intel® Mote 2
202(1)
8.2.5 Mulle
203(1)
8.2.6 iSense Core Module 3 (CM30x)
204(1)
8.2.7 Fleck3
205(1)
8.2.8 Cricket
206(2)
8.2.9 Shimmer Wireless Node
208(1)
8.2.10 ADVANTICSYS XM1000
209(1)
8.3 WSN Simulation Tools
209
8.3.1 ns-2 (Network Simulator-2)
210(1)
8.3.2 OMNETT++
211(1)
8.3.3 TinyOS Simulator (TOSSIM)
212(1)
8.3.4 Optimized Network Engineering Tool (OPNET)
212(1)
8.3.5 Avrora
213(1)
References
213