ACM DL

Sensor Networks (TOSN)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Sensor Networks (TOSN), Volume 4 Issue 4, August 2008

Defending wireless sensor networks from radio interference through channel adaptation
Wenyuan Xu, Wade Trappe, Yanyong Zhang
Article No.: 18
DOI: 10.1145/1387663.1387664

Radio interference, whether intentional or otherwise, represents a serious threat to assuring the availability of sensor network services. As such, techniques that enhance the reliability of sensor communications in the presence of radio...

Activity recognition via user-trace segmentation
Jie Yin, Qiang Yang, Dou Shen, Ze-Nian Li
Article No.: 19
DOI: 10.1145/1387663.1387665

A major issue of activity recognition in sensor networks is automatically recognizing a user's high-level goals accurately from low-level sensor data. Traditionally, solutions to this problem involve the use of a location-based sensor model that...

A distributed and self-organizing scheduling algorithm for energy-efficient data aggregation in wireless sensor networks
Supriyo Chatterjea, Tim Nieberg, Nirvana Meratnia, Paul Havinga
Article No.: 20
DOI: 10.1145/1387663.1387666

Wireless sensor networks (WSNs) are increasingly being used to monitor various parameters in a wide range of environmental monitoring applications. In many instances, environmental scientists are interested in collecting raw data using...

Optimally balancing energy consumption versus latency in sensor network routing
Wei Lai, Ioannis C. Paschalidis
Article No.: 21
DOI: 10.1145/1387663.1387667

We consider wireless sensor networks with nodes switching ON (awake) and OFF (sleeping) to preserve energy, and transmitting data over channels with varying quality. The objective is to determine the best path from each node to a single gateway....

Implementing public-key infrastructure for sensor networks
David J. Malan, Matt Welsh, Michael D. Smith
Article No.: 22
DOI: 10.1145/1387663.1387668

We present a critical evaluation of the first known implementation of elliptic curve cryptography over F2p for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. We offer, along the way, a primer for those interested in...

Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks
Hui Song, Sencun Zhu, Wensheng Zhang, Guohong Cao
Article No.: 23
DOI: 10.1145/1387663.1387669

Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying, and revoking compromised sensors, and other network maintenance. Employing mobile sinks however...

The impact of spatial correlation on routing with compression in wireless sensor networks
Sundeep Pattem, Bhaskar Krishnamachari, Ramesh Govindan
Article No.: 24
DOI: 10.1145/1387663.1387670

The efficacy of data aggregation in sensor networks is a function of the degree of spatial correlation in the sensed phenomenon. The recent literature has examined a variety of schemes that achieve greater data aggregation by routing data with...

Asynchronous in-network prediction: Efficient aggregation in sensor networks
Pavan Edara, Ashwin Limaye, Krithi Ramamritham
Article No.: 25
DOI: 10.1145/1387663.1387671

Given a sensor network and aggregate queries over the values sensed by subsets of nodes in the network, how do we ensure that high quality results are served for the maximum possible time? The issues underlying this question relate to the...

MAX: Wide area human-centric search of the physical world
Kok-KIONG Yap, Vikram Srinivasan, Mehul Motani
Article No.: 26
DOI: 10.1145/1387663.1387672

We propose MAX, a system that facilitates human-centric search of the physical world. Instead of organizing objects a priori, it allows humans to search for and locate them as needed. Designed for the following objectives: (i) human-centric...