Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks / Edition 1

Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks / Edition 1

ISBN-10:
0367389312
ISBN-13:
9780367389314
Pub. Date:
09/23/2019
Publisher:
Taylor & Francis
ISBN-10:
0367389312
ISBN-13:
9780367389314
Pub. Date:
09/23/2019
Publisher:
Taylor & Francis
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks / Edition 1

Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks / Edition 1

$74.95 Current price is , Original price is $74.95. You
$74.95 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common tools for many people, and it is predicted that wearable sensor networks will greatly improve everyday life as we know it.

By integrating these technologies into a pervasive system, we can access information and use computing resources anytime, anywhere, and with any device. Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks covers these key technologies used in wireless ad hoc networks. The book is divided into three parts, each providing self-contained chapters written by international experts. Topics include networking architectures and protocols, cross-layer architectures, localization and location tracking, time synchronization, QoS and real-time, security and dependability, applications, modeling and performance evaluation, implementation and experience, and much more.

The book is novel in its single source presentation of ad hoc networking and related key technologies and applications over the platforms of personal area, sensory area, and local area networks. It is a valuable resource for those who work in or are interested in learning about the pervasive computing environment.

Product Details

ISBN-13: 9780367389314
Publisher: Taylor & Francis
Publication date: 09/23/2019
Series: Wireless Networks and Mobile Communications
Pages: 664
Product dimensions: 6.12(w) x 9.19(h) x (d)

About the Author

Shih-Lin Wu, Yu-Chee Tseng

Table of Contents

Part I Wireless Personal-Area and Sensory-Area Networks

1 Coverage and Connectivity of Wireless Sensor Networks 3

1.1 Introduction 3

1.2 Computing Coverage of a Wireless Sensor Network 4

1.3 Coverage and Scheduling 14

1.4 Coverage and Connectivity 20

1.5 Conclusions 23

2 Communication Protocols 25

2.1 Introduction 25

2.2 Similarities and Differences between WSNs and MANETs 28

2.3 Communication Patterns in Wireless Sensor Networks 30

2.4 Routing Protocols in WSNs 39

2.5 Comparative Studies 53

2.6 Conclusions and Future Research Directions 56

3 FireFly: A Time-Synchronized Real-Time Sensor Networking Platform 65

3.1 Introduction 65

3.2 The FireFly Sensor Node 67

3.3 RT-Link: A TDMA Link Layer Protocol for Multihop Wireless Networks 71

3.4 Nano-RK: A Resource-Centric RTOS for Sensor Networks 87

3.5 Coal Mine Safety Application 98

3.6 Summary and Concluding Remarks 102

4 Energy Conservation in Sensor and Sensor-Actuator Networks 107

4.1 Introduction 107

4.2 Localized Algorithms Save Energy 110

4.3 Minimum-Energy Broadcasting and Multicasting 113

4.4 Power-Aware Routing 115

4.5 Controlled Mobility for Power-Aware Localized Routing 116

4.6 Power-Efficient Neighbor Communication and Discovery for Asymmetric Links 118

4.7 Challenges of Power-Aware Routing with a Realistic Physical Layer 119

4.8 A Localized Coordination Framework for Wireless Sensor and Actuator Networks 121

4.9 Localized Movement Control Algorithms for Realization of Fault Tolerant Sensor and Sensor-Actuator Networks 128

4.10 Conclusion 130

5 Security in Wireless Sensor Networks 135

5.1 Introduction 136

5.2 Physical Layer Security 136

5.3 Key Management 140

5.4 Link Layer Security 155

5.5 Network Layer Security 157

5.6 Application Layer Security 159

6 Autonomous Swarm-Bot Systems for Wireless Sensor Networks 167

6.1 Introduction 167

6.2 The System Architecture 168

6.3 Cooperative Localization Algorithm 169

6.4 Foraging and Gathering 172

6.5 Minimap Integration 178

6.6 The Collaborative Path Planning Algorithm 181

6.7 Conclusion 184

7 A Smart Blind Alarm Surveillance and Blind Guide Network System on Wireless Optical Communication 191

7.1 Introduction 191

7.2 The Manufacture of Wireless Optical Transceiver 193

7.3 The Design of Wireless Optical Network 196

7.4 Smart Wireless Optical Blind-Guidance Cane and Blind-Guidance Robot 199

7.5 The Design of a Smart Guide System with Wireless Optical Blind-Guidance Cane and a Blind-Guidance Robot 203

7.6 Smart Wireless Optical Communication of Blind Alarm Surveillance System 210

7.7 The Design and Implementation of a Smart Wireless Blind-Guidance Alarm Surveillance System 214

Part II Wireless Local-Area Networks

8 Opportunism in Wireless Networks: Principles and Techniques 223

8.1 Opportunism: Avenues and Basic Principles 223

8.2 Source Opportunism 227

8.3 Spatio-Temporal Opportunism over a Single Link 234

8.4 Spatio-Temporal Opportunism in Ad Hoc Networks 241

8.5 Spatiotemporal-Spectral Opportunism in Ad Hoc Networks 247

8.6 Conclusions 250

9 Localization Techniques for Wireless Local Area Networks 255

9.1 Introduction 255

9.2 Nondedicated Localization Techniques 256

9.3 Location Tracking 272

9.4 Conclusion 274

10 Channel Assignment in Wireless Local Area Networks 277

10.1 Introduction 277

10.2 Preliminaries 280

10.3 Rings 282

10.4 Grids 285

10.5 Interval Graphs 288

10.6 Trees 292

10.7 Conclusion 296

11 Multichannel MAC Protocols for Mobile Ad Hoc Networks 301

11.1 Introduction 301

11.2 Design Issues of Multichannel Protocols 302

11.3 Multichannel Protocols 303

11.4 Comparison of Multichannel MAC Protocols 320

11.5 Open Issues 321

11.6 Conclusions 322

12 Enhancing Quality of Service for Wireless Ad Hoc Networks 325

12.1 Introduction 326

12.2 Background 327

12.3 The Proposed EDCF-DM Protocol 331

12.4 Performance Evaluation 334

12.5 Conclusions 340

13 QoS Routing Protocols for Mobile Ad Hoc Networks 343

13.1 Introduction 343

13.2 Reviews of the QoS Routing Protocols 345

13.3 Our QoS Routing Protocol 348

13.4 Simulation Results 360

13.5 Conclusions 367

14 Energy Conservation Protocols for Wireless Ad Hoc Networks 371

14.1 Introduction 371

14.2 Power Management 371

14.3 Power Control 382

14.4 Topology Control Protocols 387

14.5 Summary 397

15 Wireless LAN Security 399

15.2 WEP and Its Security Weaknesses 399

15.2 802.1X Security Measures 405

15.3 IEEE 802.11i Security 410

15.4 Summary 417

16 Temporal Key Integrity Protocol and Its Security Issues in IEEE 802.11i 419

16.1 Introduction 419

16.2 Wired Equivalent Privacy and Its Weakness 420

16.3 Wi-Fi Protected Access 421

16.4 Temporal Key Integrity Protocol 423

16.5 Fragility of Michael 430

16.6 TKIP Countermeasures 431

16.7 Key Handshake Procedure 433

16.8 Conclusions 434

Part III Integrated Systems

17 Wireless Mesh Networks: Design Principles 439

17.1 Introduction 439

17.2 Generic Architecture and Basic Requirements of Wireless Mesh Networks 439

17.3 Network-Planning Techniques 442

17.4 Self-Configuring Techniques 448

17.5 Conclusions 458

18 Wireless Mesh Networks: Multichannel Protocols and Standard Activities 461

18.1 Introduction 461

18.2 Multichannel MAC Protocols 462

18.3 Multichannel Routing Protocols 473

18.4 Standard Activities of Mesh Networks 478

18.5 Conclusions 481

19 Integrated Heterogeneous Wireless Networks 483

19.1 Introduction 483

19.2 Integration of Infrastructure-Based Heterogeneous Wireless Networks 485

19.3 Heterogeneous Wireless Multihop Networks 492

19.4 Research Issues for Heterogeneous Wireless Networks 500

19.5 Conclusions 502

20 Intrusion Detection for Wireless Network 505

20.1 Introduction 505

20.2 Background on Intrusion Detection 505

20.3 Intrusion Detection for Mobile Ad Hoc Networks 506

20.4 Intrusion Detection for Wireless Sensor Networks 519

20.5 Conclusion 530

21 Security Issues in an Integrated Cellular Network-WLAN and MANET 535

21.1 Introduction 535

21.2 Architecture of the Integrated Network 537

21.3 Security Impacts from the Unique Network Characteristics 540

21.4 Potential Security Threats 542

21.5 An Investigation and Analysis of Security Protocols 554

21.6 New Security Issues and Challenges 564

21.7 Conclusion 566

22 Fieldbus for Distributed Control Applications 571

22.1 Introduction 571

22.2 Review on Distributed Control 577

22.3 Fundamental Aspects of DCS 578

22.4 Standards, Frequency Bands, and Issues 580

22.5 Some of the Major Wireless Fieldbuses 583

22.6 Selecting a Fieldbus 590

22.7 Discussion and Conclusions 591

23 Supporting Multimedia Communication in the Integrated WCDMA/WLAN/Ad Hoc Networks 595

23.1 Introduction 595

23.2 Multiple Accesses in CDMA Uplink 599

23.3 Multiple Accesses in CDMA Downlink 605

23.4 Mobility Management 613

23.5 Design Integration with Ad Hoc Networks 620

Index 629

From the B&N Reads Blog

Customer Reviews