... networks
optimal and suboptimal estimators
Xin Wang
∗ 1
and Chenyang Yang
1
1
School of Electronics and Information Engineering, Beihang University, Beijing 100191, China
Email: Xin Wang
∗
- athody@vip.sina.com; ... discussed, inserting training symbols is a heuristic way to improve the performance. It is shown in the
25
Decentralized estimation over orthogonal multiple-
access fading channels inwirelesssensornetworks
optimal ... transmission codebook design in fading channels for decentralized estima-
tion inwirelesssensor networks. in IEEE International Conference on Acoustics, Speech, and Signal
Processing, ICASSP’ 09, (Apr...
... designed in [10–12]. The optimal trade-off between the number of active sensors
and the quantization bit rate of each sensor is investigated u nd e r total energy constraint in [13]. In binary
2
During ... communication SNR levels. It
is interesting to see that using more training symbols does not improve the performance of the MLE as
expected, because inserting training symbols will reduce the energy ... Furthermore, since the estimation quality of the first stage is available, we use BLUE to obtain
ˆ
θ for exploiting the quality information instead of using the MLE in the M-step as in the standard EM
algorithm.
During...
... High-Order Distributed Average Consensus Algorithm in
WirelessSensor Networks
Gang Xiong and Shalinee Kishore
Department of Electrical and Computer Engineering, Lehigh University, Bethlehem, PA 18015, ... processing represents the temporal
advantage, and the optimal convergence rate can be viewed
as the diversity gain. In the future, we intend to investigate
the effects of fading, link failure, and ... when utilizing the DAC algorithm inwireless sensor
networks.
References
[1] R. Olfati-Saber, J. A. Fax, and R. M. Murray, “Consensus and
cooperationinnetworkedmulti-agentsystems,”Proceedings of
the...
... routing to improve the reliability and packet delivery
in wirelesssensornetworks while maintaining lower power
consumption levels and (2) proposing an implementation
model supporting QoS in ... constrained
multipath routing inwirelesssensor networks, ” in Proceedings
of the 5th International Conference on Ubiquitous Intelligence
and Computing (UIC ’08), vol. 5061 of Lecture Notes in
Computer ... routing to
improve the reliability and packet delivery inwirelesssensornetworks while maintaining lower power consumption levels. Building
uponapreviousbenchmark,weproposeatraffic engineering...
... monitoring and surveillance,
and underwater wirelesssensornetworks (UWSNs) for
marine environment monitoring [1, 2]. A wireless sensor
network (WSN) consists of spatially distributed sensors ... power allocation scheme.
1. Introduction
Wireless sensor networking is an emerging technology which
finds application in many fields including environment
and habitat monitoring, health care, automation, ... Cui, and A. J. Goldsmith, “Power-
efficient analog forwarding transmission in an inhomoge-
neous gaussian sensor network,” in Proceedings of the 6th
IEEE Workshop on Signal Processing Advances in Wireless
14...
... a single state point. To avoid degeneracy, we
apply resampling, consisting in eliminating particles with low importance weights and replicating
those in high-probability regions [45, 46].
In ... formatted
PDF and full text (HTML) versions will be made available soon.
Bayesian filtering for indoor localization and tracking inwireless sensor
networks
EURASIP Journal on Wireless Communications and ... effect (bias) and LOS/NLOS
Bayesian filtering for indoor localization and
tracking inwirelesssensor networks
Anup Dhital
1,2
, Pau Closas
∗3
and Carles Fern
´
andez-Prades
3
1
Universitat Polit
`
ecnica...
... and Security inWirelessSensor Networks, " FRONTS 2nd
Winterschool Braunschweig, Germany, 2009.
[26] Chris Karlof David Wagner. In Secure Routing inWirelessSensor Networks: Attacksand ... topologies used
for sensornetworks include star, mesh, star-mesh etc. [2]
In Wirelesssensornetworks there are two kinds of wireless nodes; sensorand base station
nodes. The main function of ... threats include passive information gathering, Sink-hole attacks, Wormhole attacks,
false node and malicious data and so forth.
International Journal of Computer Science & Engineering Survey...
... Electrical and Computer
Engineering, and Director of the Broadband and
Wireless Networking Laboratory, Georgia Institute
of Technology, Atlanta. His current research interests
are insensornetworksand ... 10.1109/TNET.2005.857076
Fig. 1. Typical sensor network topology with event and sink. The sink is only
interested in collective information of sensor nodes within the event radius and
not in their individual data.
To ... same sensor node and simulation configurations provided in
AKAN AND AKYILDIZ: EVENT-TO-SINK RELIABLE TRANSPORT INWIRELESSSENSORNETWORKS 1005
While the information read and packetized by each sensor...
... Lifetime Scheduling inWirelessSensor Networks
Wireless SensorNetworks – Technology and Protocols
18
Figure 10. Chain-based data gathering and aggregation scheme
The main elements of ... Berman, P., Calinescu, G., Shah, C. & Zelikovsky, A. [2005]. Efficient energy management
in sensor networks, In Ad Hoc andSensor Networks, WirelessNetworksand Mobile
Computing .
[5] Brinza, D. ... the same battery and are the
bottleneck, sensor id’s can be used to break ties).
39
Maximum Lifetime Scheduling inWirelessSensor Networks
Wireless SensorNetworks – Technology and Protocols...
... Washington, 1279–1284
(November 2007)
23. D Ma, MJ Er, B Wang, HB Lim, K-hop statistics inwirelesssensor networks,
in Proc International Conference on Intelligent Sensors, SensorNetworks and
Information ... localization in
wirelesssensor networks
Deyun Gao
1
, Ping Chen
2
, Chuan Heng Foh
3*
and Yanchao Niu
1
Abstract
In wirelesssensornetworks (WSNs), location information plays an imp ortant role in many ... Hoc
Networking and Computing (MobiHoc), Lausanne, Switzerland, 80–91
(June 2002)
26. A Savvides, C-C Han, MB Strivastava, Dynamic fine-grained localization in
ad-hoc networks of sensors, in Proc International...
... on Wireless Communications and Networking
[11] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar,
“SPINS: security protocols for sensor networks, ” in Proceed-
ings of the 7th Annual International ... Computer and Communications Security, pp. 41–
47, November 2002.
[15] D. Liu, P. Ning, and L. I. Rongfang, “Establishing pairwise
keys in distributed sensor networks, ” ACMTransactionson
Information and ... Chen, and P. K. Varshney,
“A key management scheme for wirelesssensor networks
using deployment knowledge,” in Proceedings of the IEEE
International Conference on Computer Communications (IEEE
INFOCOM...
... 2005.
[9] D. Liu, P. Ning, and W. K. Du, “Attack-resistant location
estimation insensor networks, ” in Proceedings of the 4th
International Symposium on Information Processing in Sensor
Networks (IPSN ... Liu, and P. Ning, “Cluster-based minimum
mean square estimation for secure and resilient localization
in wirelesssensor networks, ” in Proceedings of the 2nd Annual
International Conference on Wireless ... Proceedings of the 4th International Symposium on Informa-
tion Processing inSensorNetworks (IPSN ’05), pp. 91–98, April
2005.
[16] F. Anjum, S. Pandey, and P. Agrawal, “Secure localization
in sensor...
... N. Simic and S. Sastry, “Distributed environmental mon-
itorning using random sensor networks, ” in Proceedings of
the 2nd International Workshop on Information Processing in
Sensor Networks, ... and U. Mitra, “Boundary estimation in sensor
networks: theory and methods,” in Proceedings of the 2nd
International Workshop on Information Processing in Sensor
Networks, pp. 80–95, Palo Alto, Calif, ... surrounding this
area: in the example in Figure 1(a) there are six sensors.
(In the remainder of this paper, by sensor we will denote
the wireless transceiver which includes the sensing element.
However,...
... Computer
and Communications Societies (INFOCOM ’06), Barcelona,
Spain, April 2006.
[19] T. Vu, R. Safavi-Naini, and C. Williamson, “Securing wireless
sensornetworks against large-scale node capture attacks, ”
in ... Chen, and P. K. Varshney, “A
key management scheme for wirelesssensornetworks using
deployment knowledge,” in Proceedings of the 23rd Annual
Hindawi Publishing Corporation
EURASIP Journal on Wireless ... only in charge of disseminating initial keys to
its neighboring ordinary nodes and replies those request
messages which are consistent with what its two neighboring
ordinary nodes claim. In other...
... L. Zhao, H. Zhang, and J. Zhang, “Using incompletely
cooperative game theory inwirelesssensor networks, ” in Pro-
ceedings of the IEEE Wireless Communications and Networking
Conference (WCNC ... work on the incomplete cooperative game theory in
wireless networks. In [9, 10], authors used the concept of
incomplete cooperative game theory inwirelessnetworks for
first time and proposed ... more challenging task
for self-organizing and distributed networks as there are no
central nodes to assign channel access insensor nodes.
In sensor networks, each node has a direct in uence
on...