O'Reilly logo

Mobile Intelligence by Bala Srinivasan, Ling Tan, Jianhua Ma, Agustinus Borgy Waluyo, Laurence T. Yang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

26.5 NETWORK MODEL

The wireless sensor network model consists of a finite set of sensor nodes given by N = {N1, … , Nn}, where |N| = n. The network also consists of a centralized base station in addition to the sensor nodes. The n sensor nodes of the network consist of sensors with added capabilities and/or administrative and control tasks of the network (cluster heads and data aggregation points), as will be explained in the next paragraph. Victim nodes are defined as a set of nodes T = {T1, … , Tr}, where TN, such that, each target node r of set T is a critical node of the network, and images. The adversary class is defined as the set of malicious nodes in the network and are denoted as A = {A0, A1,…, Ak−1}, where |A| = kn.

Sensor nodes of a typical wireless sensor network operate with the purpose of monitoring and detecting events in their environments for subsequent delivery of their respective observations and readings to a centralized base station. The data can either be delivered to the base station directly by the sensor nodes or through a chain of defined intermediary nodes. We refer to the frequency of communication of messages by the nodes to the base station as the network taxonomy. We classify the data delivery model, that is, network topologies, for transfer of data from sensors to the base station into three most common sensor network classes, namely, flat, cluster-based, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required