... using these protocols. The
main purpose of these nodes is to gather information or events occurring from their targets. The
main functions associated with sensor nodes include: collecting information ... functionalities in terms of
one base station participating in one system. It is important to remember that with an increase in
a sensor network there’s an increase in the distance separating the base ... issues faced in WSNs.
In particular, the
focuses on LEAP protocol taking into consideration its advantages and
LEAP is also a very popular security solution inWirelessSensorNetworks and...
... for wirelesssensor networks, ” in Proc. ACM WSNA,
Atlanta, GA, Sep. 2002, pp. 1–11.
[13] J. Zhao and R. Govindan, “Understanding packet delivery performance
in dense wirelesssensor networks, ” in ... and tracking insensor networks, ” Proc. IEEE, vol. 91, no. 8, pp.
1163–1171, Aug. 2003.
[2] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion for
wireless sensor networking,” IEEE/ACM ... 10.1109/TNET.2005.857076
Fig. 1. Typical sensor network topology with event and sink. The sink is only
interested in collective information of sensor nodes within the event radius and
not in their individual data.
To...
... discussed, inserting training symbols is a heuristic way to improve the performance. It is shown in the
25
Decentralized estimation over orthogonal multiple-
access fading channels inwirelesssensornetworks
optimal ... communication SNR levels. It
is interesting to see that using more training symbols does not improve the performance of the MLE as
expected, because inserting training symbols will reduce the energy ... transmission codebook design in fading channels for decentralized estima-
tion inwirelesssensor networks. in IEEE International Conference on Acoustics, Speech, and Signal
Processing, ICASSP’ 09, (Apr...
... unable to distinguish x from −x when using this
messaging function.
In order to handle the phase ambiguity problem inherent in the codebook C
tn
, we can simply insert
training symbols into the transmit ... communication SNR levels. It
is interesting to see that using more training symbols does not improve the performance of the MLE as
expected, because inserting training symbols will reduce the energy ... designed in [10–12]. The optimal trade-off between the number of active sensors
and the quantization bit rate of each sensor is investigated u nd e r total energy constraint in [13]. In binary
2
During...
... Washington, 1279–1284
(November 2007)
23. D Ma, MJ Er, B Wang, HB Lim, K-hop statistics inwirelesssensor networks,
in Proc International Conference on Intelligent Sensors, SensorNetworks and
Information ... localization in
wirelesssensor networks
Deyun Gao
1
, Ping Chen
2
, Chuan Heng Foh
3*
and Yanchao Niu
1
Abstract
In wirelesssensornetworks (WSNs), location information plays an imp ortant role in many ... Electronics and Information Engineering, Beijing Jiaotong
University, Beijing 100044, PR China
2
TEDA College, Nankai University, Tianjin
300457, PR China
3
School of Computer Engineering, Nanyang...
... manage-
ment inwirelesssensornetworks by leveraging initial trust,”
SDL Technical Report SRI-SDL-04-02, 2004.
EURASIP Journal on Wireless Communications and Networking 3
Key management
in WSNs
Using ... Cuti, C. Gardiner, C. Lynn, and
P. Kruus, “TinyPK: securing sensornetworks with public key
technology,” in Proceedings of the 2004 ACM Workshop on
Security of Ad Hoc and SensorNetworks (SASN ... remaining of the paper. Each sensor node i, including
the base station, maintains the following variables.
(i) Father
i
: the father of the sensorin the final spanning
tree. The base station is...
... estimation inwirelesssensor networks, ” in Proceedings of
the 4th International Symposium on Information Processing in
SensorNetworks (IPSN ’05), pp. 324–331, April 2005.
[12] A. Srinivasan, ... statistical
methods for securing wireless localization insensor networks, ”
in Proceedings of the 4th International Symposium on Informa-
tion Processing inSensorNetworks (IPSN ’05), pp. 91–98, ... 2005.
[9] D. Liu, P. Ning, and W. K. Du, “Attack-resistant location
estimation insensor networks, ” in Proceedings of the 4th
International Symposium on Information Processing in Sensor
Networks (IPSN...
... the diversity gain. In the future, we intend to investigate
the effects of fading, link failure, and other practical condi-
tions when utilizing the DAC algorithm inwireless sensor
networks.
References
[1] ... algorithm inwirelesssensornetworks is stated in the
following theorem.
Theorem 1. Consider the M-th order DAC algorithm in
(2) in a time-invariant, connected, undirected wireless sensor
network, ... “A scheme for robust distributed
sensor fusion based on average consensus,” in Proceedings of
the 4th International Symposium on Information Processing in
SensorNetworks (IPSN ’05), pp. 63–70,...
... multipath
routing inwirelesssensor networks, ” ACM Wireless Networks,
vol. 14, no. 4, pp. 465–478, 2008.
[22] A. B. Bagula and K. G. Mazandu, “Energy constrained
multipath routing inwirelesssensor networks, ” ... multi-constrained
QoS inwirelesssensornetworks by mapping a path-based
model into a probabilistic routing scheme. Using the work
done in [21]asbenchmark,weproposedin[22] the
Energy Constrained Multipath ... routing to improve the reliability and packet delivery
in wirelesssensornetworks while maintaining lower power
consumption levels and (2) proposing an implementation
model supporting QoS in...
... “Distributed environmental mon-
itorning using random sensor networks, ” in Proceedings of
the 2nd International Workshop on Information Processing in
Sensor Networks, pp. 582–592, Palo Alto, Calif, ... surrounding this
area: in the example in Figure 1(a) there are six sensors.
(In the remainder of this paper, by sensor we will denote
the wireless transceiver which includes the sensing element.
However, ... U. Mitra, “Boundary estimation in sensor
networks: theory and methods,” in Proceedings of the 2nd
International Workshop on Information Processing in Sensor
Networks, pp. 80–95, Palo Alto, Calif,...
... jamming attacks,”
in Proceedings of the ACM Symposium on Applied Computing,
pp. 1985–1992, 2010.
[13] D. Liu and P. Ning, “Establishing pairwise keys in distributed
sensor networks, ” in Proceedings ... scheme for wirelesssensornetworks using
deployment knowledge,” in Proceedings of the 23rd Annual
Hindawi Publishing Corporation
EURASIP Journal on Wireless Communications and Networking
Volume ... Societies (INFOCOM ’06), Barcelona,
Spain, April 2006.
[19] T. Vu, R. Safavi-Naini, and C. Williamson, “Securing wireless
sensornetworks against large-scale node capture attacks,”
in Proceedings of...
... analog forwarding transmission in an inhomoge-
neous gaussian sensor network,” in Proceedings of the 6th
IEEE Workshop on Signal Processing Advances in Wireless
14 EURASIP Journal on Wireless Communications ... performance gain compared to a uniform power allocation scheme.
1. Introduction
Wireless sensor networking is an emerging technology which
finds application in many fields including environment
and ... policy
follows waterfilling on channel SNR, that is, P
i
increases with increasing ζ
i
;andforζ
i
>ζ
(o)
i
, the
power allocation is according to inversion in the
channel SNR, that is, increasing ζ
i
decreases...
... very
little work on the incomplete cooperative game theory in
wireless networks. In [9, 10], authors used the concept of
incomplete cooperative game theory inwirelessnetworks for
first time and ... theory inwirelesssensor networks, ” in Pro-
ceedings of the IEEE Wireless Communications and Networking
Conference (WCNC ’08), pp. 1483–1488, April 2008.
[11] L. Zhao, J. Zhang, and H. Zhang, “Using ... nodes to assign channel access insensor nodes.
In sensor networks, each node has a direct in uence
on its neighboring nodes while accessing the channel.
So, these interactions between nodes and...
... a single state point. To avoid degeneracy, we
apply resampling, consisting in eliminating particles with low importance weights and replicating
those in high-probability regions [45, 46].
In ... suitability of several Bayesian filtering techniques for
the problem of tracking a moving device by a set of wirelesssensor nodes in indoor environments. In
particular, we consider a setup where ... made available soon.
Bayesian filtering for indoor localization and tracking inwireless sensor
networks
EURASIP Journal on Wireless Communications and Networking 2012,
2012:21 doi:10.1186/1687-1499-2012-21
Anup...
... 2007.
[2]A.Mainwaring,J.Polastre,R.Szewczyk,D.Culler,andJ.
Anderson, Wirelesssensornetworks for habitat monitoring,”
in Proceedings of the ACM International Workshop on Wireless
SensorNetworks ... processing
and computation at the sensor nodes has brought wireless
sensornetworks (WSNs) into a wide range of applications
such as environmental monitoring, habitat studies, object
tracking, ... 13
WB
WB
MEMEX
CMP
FWD
0
Mux
1
0
Mux
1
0
Mux
1
0
Mux
1
0
Mux
1
EX/MEM
ALUOp
Inst. [3-0]
ALU
control
ALU
Zero
ALUSrc
Branch
ID/EX
MemtoReg
Branch
Control
Inst. [28-26]
Inst. [27]
Inst. [25-21]
Inst. [15-0]
Inst. [20-16]
Inst. [15-11]
Inst. [20-16]
AND
Add
Address
Instruction...