Sensor Networks (TOSN)


Search Issue
enter search term and/or author name


ACM Transactions on Sensor Networks (TOSN), Volume 7 Issue 1, August 2010

RF doppler shift-based mobile sensor tracking and navigation
Branislav Kusý, Isaac Amundson, Janos Sallai, Peter Völgyesi, Akos Lédeczi, Xenofon Koutsoukos
Article No.: 1
DOI: 10.1145/1806895.1806896

Mobile wireless sensors require position updates for tracking and navigation. We present a localization technique that uses the Doppler shift in radio transmission frequency observed by stationary sensors. We consider two scenarios. In the first,...

Real-time data aggregation in contention-based wireless sensor networks
Jun Zhang, Xiaohua Jia, Guoliang Xing
Article No.: 2
DOI: 10.1145/1806895.1806897

We investigate the problem of delay constrained maximal information collection for CSMA-based wireless sensor networks. We study how to allocate the maximal allowable transmission delay at each node, such that the amount of information collected...

Resilient localization for sensor networks in outdoor environments
Youngmin Kwon, Kirill Mechitov, Sameer Sundresh, Wooyoung Kim, Gul Agha
Article No.: 3
DOI: 10.1145/1806895.1806898

The process of determining the physical locations of nodes in a wireless sensor network is known as localization. Self-localization is critical for large-scale sensor networks, because manual or assisted localization is often impractical...

Speed control and scheduling of data mules in sensor networks
Ryo Sugihara, Rajesh K. Gupta
Article No.: 4
DOI: 10.1145/1806895.1806899

Unlike traditional multihop forwarding among stationary sensor nodes, use of mobile devices for data collection in wireless sensor networks has recently been gathering more attention. The use of mobility significantly reduces the energy...

Toward trusted wireless sensor networks
Wen Hu, Hailun Tan, Peter Corke, Wen Chan Shih, Sanjay Jha
Article No.: 5
DOI: 10.1145/1806895.1806900

This article presents the design and implementation of a trusted sensor node that provides Internet-grade security at low system cost. We describe trustedFleck, which uses a commodity Trusted Platform Module (TPM) chip to extend the capabilities...

Reliable and efficient reprogramming in sensor networks
Chris Miller, Christian Poellabauer
Article No.: 6
DOI: 10.1145/1806895.1806901

Retasking and remote programming of sensor networks is an essential functionality to make these networks practical and effective. As the availability of more capable sensor nodes increases and new functional implementations continue to be...

RaPTEX: Rapid prototyping tool for embedded communication systems
Jun Bum Lim, Beakcheol Jang, Suyoung Yoon, Mihail L. Sichitiu, Alexander G. Dean
Article No.: 7
DOI: 10.1145/1806895.1806902

Advances in microprocessors, memory, and radio technology have enabled the emergence of embedded systems that rely on communication systems to exchange information and coordinate their activities in spatially distributed applications. However,...

Modeling latency—lifetime trade-off for target detection in mobile sensor networks
Chao Wang, Parameswaran Ramanathan, Kewal K. Saluja
Article No.: 8
DOI: 10.1145/1806895.1806903

Two important measures of performance for the surveillance applications of the mobile sensor networks are detection latency and system lifetime. Previous work on modeling detection delay has assumed that sensor measurements are delivered to the...

Everywhere sparse approximately optimal minimum energy data gathering and aggregation in sensor networks
Konstantinos Kalpakis
Article No.: 9
DOI: 10.1145/1806895.1806904

We consider two related data gathering problems for wireless sensor networks (WSNs). The MLDA problem is concerned with maximizing the system lifetime T so that we can perform T rounds of data gathering with in-network aggregation,...

Analyzing MAC protocols for low data-rate applications
Koen Langendoen, Andreas Meier
Article No.: 10
DOI: 10.1145/1806895.1806905

The fundamental wireless sensors network (WSN) requirement to be energy-efficient has produced a whole range of specialized medium access control (MAC) protocols. They differ in how performance (latency, throughput) is traded off for a reduction...