Cover image for Wireless ad hoc networking : personal-area, local-area and the sensory-area networks
Title:
Wireless ad hoc networking : personal-area, local-area and the sensory-area networks
Series:
Wireless networks and mobile communications
Publication Information:
Boca Raton, FL : Auerbach Publications, 2007
ISBN:
9780849392542

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010132705 TK5105.78 W574 2007 Open Access Book Book
Searching...
Searching...
30000010088526 TK5105.78 W574 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common tools for many people, and it is predicted that wearable sensor networks will greatly improve everyday life as we know it.

By integrating these technologies into a pervasive system, we can access information and use computing resources anytime, anywhere, and with any device. Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks covers these key technologies used in wireless ad hoc networks. The book is divided into three parts, each providing self-contained chapters written by international experts. Topics include networking architectures and protocols, cross-layer architectures, localization and location tracking, time synchronization, QoS and real-time, security and dependability, applications, modeling and performance evaluation, implementation and experience, and much more.

The book is novel in its single source presentation of ad hoc networking and related key technologies and applications over the platforms of personal area, sensory area, and local area networks. It is a valuable resource for those who work in or are interested in learning about the pervasive computing environment.


Author Notes

Shih-Lin Wu, Yu-Chee Tseng


Table of Contents

Part I Wireless Personal-Area and Sensory-Area Networks
1 Coverage and Connectivity of Wireless Sensor Networksp. 3
1.1 Introductionp. 3
1.2 Computing Coverage of a Wireless Sensor Networkp. 4
1.3 Coverage and Schedulingp. 14
1.4 Coverage and Connectivityp. 20
1.5 Conclusionsp. 23
2 Communication Protocolsp. 25
2.1 Introductionp. 25
2.2 Similarities and Differences between WSNs and MANETsp. 28
2.3 Communication Patterns in Wireless Sensor Networksp. 30
2.4 Routing Protocols in WSNsp. 39
2.5 Comparative Studiesp. 53
2.6 Conclusions and Future Research Directionsp. 56
3 FireFly: A Time-Synchronized Real-Time Sensor Networking Platformp. 65
3.1 Introductionp. 65
3.2 The FireFly Sensor Nodep. 67
3.3 RT-Link: A TDMA Link Layer Protocol for Multihop Wireless Networksp. 71
3.4 Nano-RK: A Resource-Centric RTOS for Sensor Networksp. 87
3.5 Coal Mine Safety Applicationp. 98
3.6 Summary and Concluding Remarksp. 102
4 Energy Conservation in Sensor and Sensor-Actuator Networksp. 107
4.1 Introductionp. 107
4.2 Localized Algorithms Save Energyp. 110
4.3 Minimum-Energy Broadcasting and Multicastingp. 113
4.4 Power-Aware Routingp. 115
4.5 Controlled Mobility for Power-Aware Localized Routingp. 116
4.6 Power-Efficient Neighbor Communication and Discovery for Asymmetric Linksp. 118
4.7 Challenges of Power-Aware Routing with a Realistic Physical Layerp. 119
4.8 A Localized Coordination Framework for Wireless Sensor and Actuator Networksp. 121
4.9 Localized Movement Control Algorithms for Realization of Fault Tolerant Sensor and Sensor-Actuator Networksp. 128
4.10 Conclusionp. 130
5 Security in Wireless Sensor Networksp. 135
5.1 Introductionp. 136
5.2 Physical Layer Securityp. 136
5.3 Key Managementp. 140
5.4 Link Layer Securityp. 155
5.5 Network Layer Securityp. 157
5.6 Application Layer Securityp. 159
6 Autonomous Swarm-Bot Systems for Wireless Sensor Networksp. 167
6.1 Introductionp. 167
6.2 The System Architecturep. 168
6.3 Cooperative Localization Algorithmp. 169
6.4 Foraging and Gatheringp. 172
6.5 Minimap Integrationp. 178
6.6 The Collaborative Path Planning Algorithmp. 181
6.7 Conclusionp. 184
7 A Smart Blind Alarm Surveillance and Blind Guide Network System on Wireless Optical Communicationp. 191
7.1 Introductionp. 191
7.2 The Manufacture of Wireless Optical Transceiverp. 193
7.3 The Design of Wireless Optical Networkp. 196
7.4 Smart Wireless Optical Blind-Guidance Cane and Blind-Guidance Robotp. 199
7.5 The Design of a Smart Guide System with Wireless Optical Blind-Guidance Cane and a Blind-Guidance Robotp. 203
7.6 Smart Wireless Optical Communication of Blind Alarm Surveillance Systemp. 210
7.7 The Design and Implementation of a Smart Wireless Blind-Guidance Alarm Surveillance Systemp. 214
Part II Wireless Local-Area Networks
8 Opportunism in Wireless Networks: Principles and Techniquesp. 223
8.1 Opportunism: Avenues and Basic Principlesp. 223
8.2 Source Opportunismp. 227
8.3 Spatio-Temporal Opportunism over a Single Linkp. 234
8.4 Spatio-Temporal Opportunism in Ad Hoc Networksp. 241
8.5 Spatiotemporal-Spectral Opportunism in Ad Hoc Networksp. 247
8.6 Conclusionsp. 250
9 Localization Techniques for Wireless Local Area Networksp. 255
9.1 Introductionp. 255
9.2 Nondedicated Localization Techniquesp. 256
9.3 Location Trackingp. 272
9.4 Conclusionp. 274
10 Channel Assignment in Wireless Local Area Networksp. 277
10.1 Introductionp. 277
10.2 Preliminariesp. 280
10.3 Ringsp. 282
10.4 Gridsp. 285
10.5 Interval Graphsp. 288
10.6 Treesp. 292
10.7 Conclusionp. 296
11 MultiChannel MAC Protocols for Mobile Ad Hoc Networksp. 301
11.1 Introductionp. 301
11.2 Design Issues of Multichannel Protocolsp. 302
11.3 Multichannel Protocolsp. 303
11.4 Comparison of Multichannel MAC Protocolsp. 320
11.5 Open Issuesp. 321
11.6 Conclusionsp. 322
12 Enhancing Quality of Service for Wireless Ad Hoc Networksp. 325
12.1 Introductionp. 326
12.2 Backgroundp. 327
12.3 The Proposed EDCF-DM Protocolp. 331
12.4 Performance Evaluationp. 334
12.5 Conclusionsp. 340
13 QoS Routing Protocols for Mobile Ad Hoc Networksp. 343
13.1 Introductionp. 343
13.2 Reviews of the QoS Routing Protocolsp. 345
13.3 Our QoS Routing Protocolp. 348
13.4 Simulation Resultsp. 360
13.5 Conclusionsp. 367
14 Energy Conservation Protocols for Wireless Ad Hoc Networksp. 371
14.1 Introductionp. 371
14.2 Power Managementp. 371
14.3 Power Controlp. 382
14.4 Topology Control Protocolsp. 387
14.5 Summaryp. 397
15 Wireless LAN Securityp. 399
15.1 WEP and Its Security Weaknessesp. 399
15.2 802.1X Security Measuresp. 405
153 IEEE 802.11i Securityp. 410
15.4 Summaryp. 417
16 Temporal Key Integrity Protocol and Its Security Issues in IEEE 802.11ip. 419
16.1 Introductionp. 419
16.2 Wired Equivalent Privacy and Its Weaknessp. 420
16.3 Wi-Fi Protected Accessp. 421
16.4 Temporal Key Integrity Protocolp. 423
16.5 Fragility of Michaelp. 430
16.6 TKIP Countermeasuresp. 431
16.7 Key Handshake Procedurep. 433
16.8 Conclusionsp. 434
Part III Integrated Systems
17 Wireless Mesh Networks: Design Principlesp. 439
17.1 Introductionp. 439
17.2 Generic Architecture and Basic Requirements of Wireless Mesh Networksp. 439
17.3 Network-Planning Techniquesp. 442
17.4 Self-Configuring Techniquesp. 448
17.5 Conclusionsp. 458
18 Wireless Mesh Networks: Multichannel Protocols and Standard Activitiesp. 461
18.1 Introductionp. 461
18.2 Multichannel MAC Protocolsp. 462
18.3 Multichannel Routing Protocolsp. 473
18.4 Standard Activities of Mesh Networksp. 478
18.5 Conclusionsp. 481
19 Integrated Heterogeneous Wireless Networksp. 483
19.1 Introductionp. 483
19.2 Integration of Infrastructure-Based Heterogeneous Wireless Networksp. 485
19.3 Heterogeneous Wireless Multihop Networksp. 492
19.4 Research Issues for Heterogeneous Wireless Networksp. 500
19.5 Conclusionsp. 502
20 Intrusion Detection for Wireless Networkp. 505
20.1 Introductionp. 505
20.2 Background on Intrusion Detectionp. 505
20.3 Intrusion Detection for Mobile Ad Hoc Networksp. 506
20.4 Intrusion Detection for Wireless Sensor Networksp. 519
20.5 Conclusionp. 530
21 Security Issues in an Integrated Cellular Network-WLAN and MANETp. 535
21.1 Introductionp. 535
21.2 Architecture of the Integrated Networkp. 537
21.3 Security Impacts from the Unique Network Characteristicsp. 540
21.4 Potential Security Threatsp. 542
21.5 An Investigation and Analysis of Security Protocolsp. 554
21.6 New Security Issues and Challengesp. 564
21.7 Conclusionp. 566
22 Fieldbus for Distributed Control Applicationsp. 571
22.1 Introductionp. 571
22.2 Review on Distributed Controlp. 577
22.3 Fundamental Aspects of DCSp. 578
22.4 Standards, Frequency Bands, and Issuesp. 580
22.5 Some of the Major Wireless Fieldbusesp. 583
22.6 Selecting a Fieldbusp. 590
22.7 Discussion and Conclusionsp. 591
23 Supporting Multimedia Communication in the Integrated WCDMA/WLAN/Ad Hoc Networksp. 595
23.1 Introductionp. 595
23.2 Multiple Accesses in CDMA Uplinkp. 599
23.3 Multiple Accesses in CDMA Downlinkp. 605
23.4 Mobility Managementp. 613
23.5 Design Integration with Ad Hoc Networksp. 620
Indexp. 629