Distributed Sensor Networks, 2nd Edition

Book description

The best-selling Distributed Sensor Networks became the definitive guide to understanding this far-reaching technology. Preserving the excellence and accessibility of its predecessor, Distributed Sensor Networks, Second Edition once again provides all the fundamentals and applications in one complete, self-contained source. Ideal as a tutorial for

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents
  4. Preface to the Second Edition
  5. Preface to the First Edition
  6. Editors
  7. Contributors (1/2)
  8. Contributors (2/2)
  9. Chapter 1 - Coverage-Oriented Sensor Deployment (1/6)
  10. Chapter 1 - Coverage-Oriented Sensor Deployment (2/6)
  11. Chapter 1 - Coverage-Oriented Sensor Deployment (3/6)
  12. Chapter 1 - Coverage-Oriented Sensor Deployment (4/6)
  13. Chapter 1 - Coverage-Oriented Sensor Deployment (5/6)
  14. Chapter 1 - Coverage-Oriented Sensor Deployment (6/6)
  15. Chapter 2 - Deployment of Sensors:: An Overview (1/5)
  16. Chapter 2 - Deployment of Sensors:: An Overview (2/5)
  17. Chapter 2 - Deployment of Sensors:: An Overview (3/5)
  18. Chapter 2 - Deployment of Sensors:: An Overview (4/5)
  19. Chapter 2 - Deployment of Sensors:: An Overview (5/5)
  20. Chapter 3 - Genetic Algorithm for Mobile Agent Routing in Distributed Sensor Networks* (1/5)
  21. Chapter 3 - Genetic Algorithm for Mobile Agent Routing in Distributed Sensor Networks* (2/5)
  22. Chapter 3 - Genetic Algorithm for Mobile Agent Routing in Distributed Sensor Networks* (3/5)
  23. Chapter 3 - Genetic Algorithm for Mobile Agent Routing in Distributed Sensor Networks* (4/5)
  24. Chapter 3 - Genetic Algorithm for Mobile Agent Routing in Distributed Sensor Networks* (5/5)
  25. Chapter 4 - Computer Network: Basic Principles (1/6)
  26. Chapter 4 - Computer Network: Basic Principles (2/6)
  27. Chapter 4 - Computer Network: Basic Principles (3/6)
  28. Chapter 4 - Computer Network: Basic Principles (4/6)
  29. Chapter 4 - Computer Network: Basic Principles (5/6)
  30. Chapter 4 - Computer Network: Basic Principles (6/6)
  31. Chapter 5 - Location-Centric Networking in Distributed Sensor Networks (1/4)
  32. Chapter 5 - Location-Centric Networking in Distributed Sensor Networks (2/4)
  33. Chapter 5 - Location-Centric Networking in Distributed Sensor Networks (3/4)
  34. Chapter 5 - Location-Centric Networking in Distributed Sensor Networks (4/4)
  35. Chapter 6 - Application of Geometric Probability and Integral Geometry to Sensor Field Analysis (1/8)
  36. Chapter 6 - Application of Geometric Probability and Integral Geometry to Sensor Field Analysis (2/8)
  37. Chapter 6 - Application of Geometric Probability and Integral Geometry to Sensor Field Analysis (3/8)
  38. Chapter 6 - Application of Geometric Probability and Integral Geometry to Sensor Field Analysis (4/8)
  39. Chapter 6 - Application of Geometric Probability and Integral Geometry to Sensor Field Analysis (5/8)
  40. Chapter 6 - Application of Geometric Probability and Integral Geometry to Sensor Field Analysis (6/8)
  41. Chapter 6 - Application of Geometric Probability and Integral Geometry to Sensor Field Analysis (7/8)
  42. Chapter 6 - Application of Geometric Probability and Integral Geometry to Sensor Field Analysis (8/8)
  43. Chapter 7 - Directed Diffusion* (1/5)
  44. Chapter 7 - Directed Diffusion* (2/5)
  45. Chapter 7 - Directed Diffusion* (3/5)
  46. Chapter 7 - Directed Diffusion* (4/5)
  47. Chapter 7 - Directed Diffusion* (5/5)
  48. Chapter 8 - Data Security Perspectives (1/4)
  49. Chapter 8 - Data Security Perspectives (2/4)
  50. Chapter 8 - Data Security Perspectives (3/4)
  51. Chapter 8 - Data Security Perspectives (4/4)
  52. Chapter 9 - Sensor Network Security with Random Key Predistribution (1/5)
  53. Chapter 9 - Sensor Network Security with Random Key Predistribution (2/5)
  54. Chapter 9 - Sensor Network Security with Random Key Predistribution (3/5)
  55. Chapter 9 - Sensor Network Security with Random Key Predistribution (4/5)
  56. Chapter 9 - Sensor Network Security with Random Key Predistribution (5/5)
  57. Chapter 10 - Quality of Service Metrics with Applications to Sensor Networks (1/4)
  58. Chapter 10 - Quality of Service Metrics with Applications to Sensor Networks (2/4)
  59. Chapter 10 - Quality of Service Metrics with Applications to Sensor Networks (3/4)
  60. Chapter 10 - Quality of Service Metrics with Applications to Sensor Networks (4/4)
  61. Chapter 11 - Network Daemons for Distributed Sensor Networks (1/5)
  62. Chapter 11 - Network Daemons for Distributed Sensor Networks (2/5)
  63. Chapter 11 - Network Daemons for Distributed Sensor Networks (3/5)
  64. Chapter 11 - Network Daemons for Distributed Sensor Networks (4/5)
  65. Chapter 11 - Network Daemons for Distributed Sensor Networks (5/5)
  66. Chapter 12 - Energy-Latency Trade-Off for Routing in Sensor Networks and the Positive Impact of Mobility (1/10)
  67. Chapter 12 - Energy-Latency Trade-Off for Routing in Sensor Networks and the Positive Impact of Mobility (2/10)
  68. Chapter 12 - Energy-Latency Trade-Off for Routing in Sensor Networks and the Positive Impact of Mobility (3/10)
  69. Chapter 12 - Energy-Latency Trade-Off for Routing in Sensor Networks and the Positive Impact of Mobility (4/10)
  70. Chapter 12 - Energy-Latency Trade-Off for Routing in Sensor Networks and the Positive Impact of Mobility (5/10)
  71. Chapter 12 - Energy-Latency Trade-Off for Routing in Sensor Networks and the Positive Impact of Mobility (6/10)
  72. Chapter 12 - Energy-Latency Trade-Off for Routing in Sensor Networks and the Positive Impact of Mobility (7/10)
  73. Chapter 12 - Energy-Latency Trade-Off for Routing in Sensor Networks and the Positive Impact of Mobility (8/10)
  74. Chapter 12 - Energy-Latency Trade-Off for Routing in Sensor Networks and the Positive Impact of Mobility (9/10)
  75. Chapter 12 - Energy-Latency Trade-Off for Routing in Sensor Networks and the Positive Impact of Mobility (10/10)
  76. Chapter 13 - Traffic Analysis Attacks on Sensor Networks (1/5)
  77. Chapter 13 - Traffic Analysis Attacks on Sensor Networks (2/5)
  78. Chapter 13 - Traffic Analysis Attacks on Sensor Networks (3/5)
  79. Chapter 13 - Traffic Analysis Attacks on Sensor Networks (4/5)
  80. Chapter 13 - Traffic Analysis Attacks on Sensor Networks (5/5)
  81. Chapter 14 - Secure Key Distribution and Revocation for Advanced Metering Infrastructure (1/4)
  82. Chapter 14 - Secure Key Distribution and Revocation for Advanced Metering Infrastructure (2/4)
  83. Chapter 14 - Secure Key Distribution and Revocation for Advanced Metering Infrastructure (3/4)
  84. Chapter 14 - Secure Key Distribution and Revocation for Advanced Metering Infrastructure (4/4)
  85. Chapter 15 - Measurement, Modeling, and Avoidance of IEEE 802.15.4 Radio Transmission Errors in Rotating Sensor Systems (1/3)
  86. Chapter 15 - Measurement, Modeling, and Avoidance of IEEE 802.15.4 Radio Transmission Errors in Rotating Sensor Systems (2/3)
  87. Chapter 15 - Measurement, Modeling, and Avoidance of IEEE 802.15.4 Radio Transmission Errors in Rotating Sensor Systems (3/3)
  88. Chapter 16 - Detecting Sybil Attacks in Vehicular Ad Hoc Networks* (1/6)
  89. Chapter 16 - Detecting Sybil Attacks in Vehicular Ad Hoc Networks* (2/6)
  90. Chapter 16 - Detecting Sybil Attacks in Vehicular Ad Hoc Networks* (3/6)
  91. Chapter 16 - Detecting Sybil Attacks in Vehicular Ad Hoc Networks* (4/6)
  92. Chapter 16 - Detecting Sybil Attacks in Vehicular Ad Hoc Networks* (5/6)
  93. Chapter 16 - Detecting Sybil Attacks in Vehicular Ad Hoc Networks* (6/6)
  94. Chapter 17 - Query Processing in Sensor Networks (1/5)
  95. Chapter 17 - Query Processing in Sensor Networks (2/5)
  96. Chapter 17 - Query Processing in Sensor Networks (3/5)
  97. Chapter 17 - Query Processing in Sensor Networks (4/5)
  98. Chapter 17 - Query Processing in Sensor Networks (5/5)
  99. Chapter 18 - Autonomous Software Reconfiguration (1/3)
  100. Chapter 18 - Autonomous Software Reconfiguration (2/3)
  101. Chapter 18 - Autonomous Software Reconfiguration (3/3)
  102. Chapter 19 - Mobile Code Support (1/3)
  103. Chapter 19 - Mobile Code Support (2/3)
  104. Chapter 19 - Mobile Code Support (3/3)
  105. Chapter 20 - Mobile Agent Framework for Collaborative Processing in Sensor Networks (1/3)
  106. Chapter 20 - Mobile Agent Framework for Collaborative Processing in Sensor Networks (2/3)
  107. Chapter 20 - Mobile Agent Framework for Collaborative Processing in Sensor Networks (3/3)
  108. Chapter 21 - Distributed Services for Self-Organizing Wireless Sensor Networks (1/5)
  109. Chapter 21 - Distributed Services for Self-Organizing Wireless Sensor Networks (2/5)
  110. Chapter 21 - Distributed Services for Self-Organizing Wireless Sensor Networks (3/5)
  111. Chapter 21 - Distributed Services for Self-Organizing Wireless Sensor Networks (4/5)
  112. Chapter 21 - Distributed Services for Self-Organizing Wireless Sensor Networks (5/5)
  113. Chapter 22 - On-Demand Querying in Sensor Networks (1/4)
  114. Chapter 22 - On-Demand Querying in Sensor Networks (2/4)
  115. Chapter 22 - On-Demand Querying in Sensor Networks (3/4)
  116. Chapter 22 - On-Demand Querying in Sensor Networks (4/4)
  117. Chapter 23 - Improving Target Localization and Tracking by Dynamically Prioritized Frequency Band Allocation for Wireless Sensor Networks in Urban Environments (1/4)
  118. Chapter 23 - Improving Target Localization and Tracking by Dynamically Prioritized Frequency Band Allocation for Wireless Sensor Networks in Urban Environments (2/4)
  119. Chapter 23 - Improving Target Localization and Tracking by Dynamically Prioritized Frequency Band Allocation for Wireless Sensor Networks in Urban Environments (3/4)
  120. Chapter 23 - Improving Target Localization and Tracking by Dynamically Prioritized Frequency Band Allocation for Wireless Sensor Networks in Urban Environments (4/4)
  121. Chapter 24 - Distributed Detection of Replica Node Attacks (1/5)
  122. Chapter 24 - Distributed Detection of Replica Node Attacks (2/5)
  123. Chapter 24 - Distributed Detection of Replica Node Attacks (3/5)
  124. Chapter 24 - Distributed Detection of Replica Node Attacks (4/5)
  125. Chapter 24 - Distributed Detection of Replica Node Attacks (5/5)
  126. Chapter 25 - Topology-Aware Routing and Transmission Scheduling for Highway Sensor Networks (1/3)
  127. Chapter 25 - Topology-Aware Routing and Transmission Scheduling for Highway Sensor Networks (2/3)
  128. Chapter 25 - Topology-Aware Routing and Transmission Scheduling for Highway Sensor Networks (3/3)
  129. Chapter 26 - Dynamically Adaptive Multi-Modal Sensor Fusion in Urban Environments (1/6)
  130. Chapter 26 - Dynamically Adaptive Multi-Modal Sensor Fusion in Urban Environments (2/6)
  131. Chapter 26 - Dynamically Adaptive Multi-Modal Sensor Fusion in Urban Environments (3/6)
  132. Chapter 26 - Dynamically Adaptive Multi-Modal Sensor Fusion in Urban Environments (4/6)
  133. Chapter 26 - Dynamically Adaptive Multi-Modal Sensor Fusion in Urban Environments (5/6)
  134. Chapter 26 - Dynamically Adaptive Multi-Modal Sensor Fusion in Urban Environments (6/6)
  135. Chapter 27 - Self-Configuration* (1/9)
  136. Chapter 27 - Self-Configuration* (2/9)
  137. Chapter 27 - Self-Configuration* (3/9)
  138. Chapter 27 - Self-Configuration* (4/9)
  139. Chapter 27 - Self-Configuration* (5/9)
  140. Chapter 27 - Self-Configuration* (6/9)
  141. Chapter 27 - Self-Configuration* (7/9)
  142. Chapter 27 - Self-Configuration* (8/9)
  143. Chapter 27 - Self-Configuration* (9/9)
  144. Chapter 28 - Collective Intelligence for Power-Aware Routing in Mobile Ad Hoc Sensor Networks (1/3)
  145. Chapter 28 - Collective Intelligence for Power-Aware Routing in Mobile Ad Hoc Sensor Networks (2/3)
  146. Chapter 28 - Collective Intelligence for Power-Aware Routing in Mobile Ad Hoc Sensor Networks (3/3)
  147. Chapter 29 - Random Networks and Percolation Theory (1/10)
  148. Chapter 29 - Random Networks and Percolation Theory (2/10)
  149. Chapter 29 - Random Networks and Percolation Theory (3/10)
  150. Chapter 29 - Random Networks and Percolation Theory (4/10)
  151. Chapter 29 - Random Networks and Percolation Theory (5/10)
  152. Chapter 29 - Random Networks and Percolation Theory (6/10)
  153. Chapter 29 - Random Networks and Percolation Theory (7/10)
  154. Chapter 29 - Random Networks and Percolation Theory (8/10)
  155. Chapter 29 - Random Networks and Percolation Theory (9/10)
  156. Chapter 29 - Random Networks and Percolation Theory (10/10)
  157. Chapter 30 - On the Behavior of Communication Links in a Multi-Hop Mobile Environment (1/6)
  158. Chapter 30 - On the Behavior of Communication Links in a Multi-Hop Mobile Environment (2/6)
  159. Chapter 30 - On the Behavior of Communication Links in a Multi-Hop Mobile Environment (3/6)
  160. Chapter 30 - On the Behavior of Communication Links in a Multi-Hop Mobile Environment (4/6)
  161. Chapter 30 - On the Behavior of Communication Links in a Multi-Hop Mobile Environment (5/6)
  162. Chapter 30 - On the Behavior of Communication Links in a Multi-Hop Mobile Environment (6/6)
  163. Chapter 31 - Localization in 3D Wireless Sensor Networks Based on Geometric Computation (1/2)
  164. Chapter 31 - Localization in 3D Wireless Sensor Networks Based on Geometric Computation (2/2)
  165. Chapter 32 - Example DSN Control Hierarchy (1/8)
  166. Chapter 32 - Example DSN Control Hierarchy (2/8)
  167. Chapter 32 - Example DSN Control Hierarchy (3/8)
  168. Chapter 32 - Example DSN Control Hierarchy (4/8)
  169. Chapter 32 - Example DSN Control Hierarchy (5/8)
  170. Chapter 32 - Example DSN Control Hierarchy (6/8)
  171. Chapter 32 - Example DSN Control Hierarchy (7/8)
  172. Chapter 32 - Example DSN Control Hierarchy (8/8)
  173. Chapter 33 - SenSoft: Development of a Collaborative Sensor Network (1/3)
  174. Chapter 33 - SenSoft: Development of a Collaborative Sensor Network (2/3)
  175. Chapter 33 - SenSoft: Development of a Collaborative Sensor Network (3/3)
  176. Chapter 34 - Statistical Approaches to Cleaning Sensor Data (1/4)
  177. Chapter 34 - Statistical Approaches to Cleaning Sensor Data (2/4)
  178. Chapter 34 - Statistical Approaches to Cleaning Sensor Data (3/4)
  179. Chapter 34 - Statistical Approaches to Cleaning Sensor Data (4/4)
  180. Chapter 35 - Plant Monitoring with Special Reference to Endangered Species (1/2)
  181. Chapter 35 - Plant Monitoring with Special Reference to Endangered Species (2/2)
  182. Chapter 36 - Designing Distributed Sensor Applications for Wireless Mesh Networks (1/4)
  183. Chapter 36 - Designing Distributed Sensor Applications for Wireless Mesh Networks (2/4)
  184. Chapter 36 - Designing Distributed Sensor Applications for Wireless Mesh Networks (3/4)
  185. Chapter 36 - Designing Distributed Sensor Applications for Wireless Mesh Networks (4/4)
  186. Chapter 37 - Wireless Sensor Network Test Bed for Target Tracking (1/5)
  187. Chapter 37 - Wireless Sensor Network Test Bed for Target Tracking (2/5)
  188. Chapter 37 - Wireless Sensor Network Test Bed for Target Tracking (3/5)
  189. Chapter 37 - Wireless Sensor Network Test Bed for Target Tracking (4/5)
  190. Chapter 37 - Wireless Sensor Network Test Bed for Target Tracking (5/5)
  191. Chapter 38 - Lightweight Key Management in Multi-Hop Wireless Sensor Networks (1/4)
  192. Chapter 38 - Lightweight Key Management in Multi-Hop Wireless Sensor Networks (2/4)
  193. Chapter 38 - Lightweight Key Management in Multi-Hop Wireless Sensor Networks (3/4)
  194. Chapter 38 - Lightweight Key Management in Multi-Hop Wireless Sensor Networks (4/4)
  195. Chapter 39 - Maritime Domain Awareness (1/6)
  196. Chapter 39 - Maritime Domain Awareness (2/6)
  197. Chapter 39 - Maritime Domain Awareness (3/6)
  198. Chapter 39 - Maritime Domain Awareness (4/6)
  199. Chapter 39 - Maritime Domain Awareness (5/6)
  200. Chapter 39 - Maritime Domain Awareness (6/6)
  201. Chapter 40 - Environmental Monitoring Application (1/6)
  202. Chapter 40 - Environmental Monitoring Application (2/6)
  203. Chapter 40 - Environmental Monitoring Application (3/6)
  204. Chapter 40 - Environmental Monitoring Application (4/6)
  205. Chapter 40 - Environmental Monitoring Application (5/6)
  206. Chapter 40 - Environmental Monitoring Application (6/6)
  207. Back Cover

Product information

  • Title: Distributed Sensor Networks, 2nd Edition
  • Author(s): S. Sitharama Iyengar, Richard R. Brooks
  • Release date: April 2016
  • Publisher(s): Chapman and Hall/CRC
  • ISBN: 9781439862889