|
|
1 | (22) |
|
|
2 | (5) |
|
1.2 Wireless Sensor Networks |
|
|
7 | (5) |
|
1.2.1 Historical Perspective, Aloha Networks |
|
|
7 | (1) |
|
1.2.2 Background on Wireless Sensor Networks |
|
|
8 | (4) |
|
|
12 | (5) |
|
1.4 WSN Common Communication Standards |
|
|
17 | (6) |
|
|
19 | (1) |
|
|
20 | (3) |
|
2 Topology, Routing, and Modeling Tools |
|
|
23 | (14) |
|
2.1 Topology and Routing Protocols in WSNs |
|
|
23 | (7) |
|
|
23 | (1) |
|
2.1.2 Routing Protocols in WSNs |
|
|
24 | (6) |
|
|
30 | (7) |
|
|
30 | (3) |
|
2.2.2 Delaunay Triangulations |
|
|
33 | (2) |
|
|
35 | (1) |
|
|
35 | (2) |
|
|
37 | (46) |
|
3.1 Components of a Wireless Sensor Node |
|
|
38 | (29) |
|
3.1.1 Sensors and Actuators |
|
|
39 | (15) |
|
3.1.2 Microcontrollers and Microprocessors |
|
|
54 | (10) |
|
3.1.3 Radios Transceivers and Antennas |
|
|
64 | (3) |
|
3.2 Layered Network Architecture |
|
|
67 | (16) |
|
|
68 | (1) |
|
|
69 | (1) |
|
3.2.3 Medium Access Protocols in WSNs |
|
|
70 | (4) |
|
|
74 | (1) |
|
|
74 | (4) |
|
|
78 | (1) |
|
|
79 | (4) |
|
|
83 | (34) |
|
4.1 Why WSNs are Predisposed to Attacks? |
|
|
83 | (1) |
|
4.2 Security Requirements |
|
|
84 | (2) |
|
4.3 WSN Attacks and Defenses |
|
|
86 | (8) |
|
4.3.1 Physical Layer Attacks |
|
|
86 | (1) |
|
4.3.2 Physical Layer Defenses |
|
|
87 | (1) |
|
|
88 | (1) |
|
4.3.4 Link Layer Defenses |
|
|
88 | (1) |
|
4.3.5 Network Layer Attacks |
|
|
89 | (3) |
|
4.3.6 Network Layer Defenses |
|
|
92 | (1) |
|
4.3.7 Transport Layer Attacks |
|
|
92 | (1) |
|
4.3.8 Transport Layer Defenses |
|
|
92 | (1) |
|
4.3.9 Application Layer Attacks |
|
|
93 | (1) |
|
4.3.10 Application Layer Defenses |
|
|
93 | (1) |
|
4.4 Cryptography in Sensor Networks |
|
|
94 | (4) |
|
4.4.1 Symmetric Key Cryptography in WSNs |
|
|
94 | (3) |
|
4.4.2 Asymmetric Key Cryptography in WSNs |
|
|
97 | (1) |
|
|
98 | (19) |
|
|
98 | (1) |
|
4.5.2 Sensor Faults in WSNs |
|
|
99 | (3) |
|
4.5.3 Mathematical Models for Sensor Faults |
|
|
102 | (9) |
|
|
111 | (1) |
|
|
112 | (5) |
|
5 Coverage and Connectivity |
|
|
117 | (38) |
|
5.1 Modeling Sensor Networks Using Graphs |
|
|
118 | (4) |
|
5.1.1 Communication Graphs |
|
|
119 | (3) |
|
|
122 | (5) |
|
|
124 | (3) |
|
|
127 | (6) |
|
|
129 | (4) |
|
5.4 Coverage Models Using Voronoi Diagrams |
|
|
133 | (1) |
|
|
134 | (7) |
|
5.5.1 From WSNs to Simplicial Complexes |
|
|
135 | (2) |
|
5.5.2 Comparison of Cech Complex and Rips Complex |
|
|
137 | (2) |
|
5.5.3 Subcomplexes with Planar Topology |
|
|
139 | (2) |
|
5.6 Simplicial Homology and Coverage Holes |
|
|
141 | (3) |
|
|
144 | (1) |
|
|
145 | (10) |
|
|
149 | (1) |
|
|
150 | (5) |
|
6 Localization and Tracking in WSNs |
|
|
155 | (24) |
|
|
155 | (1) |
|
6.2 Design and Evaluation of Localization Algorithms |
|
|
156 | (1) |
|
6.3 Categorization of Localization Approaches |
|
|
157 | (11) |
|
6.3.1 Range-Based Methods |
|
|
157 | (7) |
|
|
164 | (4) |
|
6.4 Comparing Design Paradigms: Centralized vs. Distributed Techniques |
|
|
168 | (1) |
|
6.5 Localization in Mobile WSNs |
|
|
168 | (3) |
|
6.5.1 Benefits of Node Mobility |
|
|
168 | (3) |
|
|
171 | (8) |
|
6.6.1 Tree-Based Tracking |
|
|
171 | (1) |
|
6.6.2 Cluster-Based Tracking |
|
|
172 | (1) |
|
6.6.3 Prediction-Based Tracking |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (4) |
|
|
179 | (18) |
|
|
179 | (3) |
|
7.2 QoS Provisioning in WSNs |
|
|
182 | (15) |
|
7.2.1 Topology Management |
|
|
182 | (2) |
|
7.2.2 Localization Techniques |
|
|
184 | (1) |
|
|
185 | (3) |
|
|
188 | (1) |
|
|
188 | (4) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
195 | (2) |
|
|
197 | |
|
|
197 | (1) |
|
8.2 WSN Hardware Platforms |
|
|
197 | (12) |
|
|
198 | (2) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
8.2.6 iSense Core Module 3 (CM30x) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (2) |
|
8.2.9 Shimmer Wireless Node |
|
|
208 | (1) |
|
8.2.10 ADVANTICSYS XM1000 |
|
|
209 | (1) |
|
|
209 | |
|
8.3.1 ns-2 (Network Simulator-2) |
|
|
210 | (1) |
|
|
211 | (1) |
|
8.3.3 TinyOS Simulator (TOSSIM) |
|
|
212 | (1) |
|
8.3.4 Optimized Network Engineering Tool (OPNET) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | |