ACM DL

Sensor Networks (TOSN)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Sensor Networks (TOSN), Volume 7 Issue 2, August 2010

Key predistribution for homogeneous wireless sensor networks with group deployment of nodes
Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
Article No.: 11
DOI: 10.1145/1824766.1824767

Recent literature contains proposals for key predistribution schemes for sensor networks in which nodes are deployed in separate groups. In this article we consider the implications of group deployment for the connectivity and resilience of a key...

Leveraging redundancy in sampling-interpolation applications for sensor networks: A spectral approach
Periklis G. Liaskovitis, Curt Schurgers
Article No.: 12
DOI: 10.1145/1824766.1824768

An important class of sensor network applications aims at estimating the spatiotemporal behavior of a physical phenomenon, such as temperature variations over an area of interest. In such a scenario, the network essentially acts as a distributed...

Coverage properties of clustered wireless sensor networks
Renita Machado, Wensheng Zhang, Guiling Wang, Sirin Tekinay
Article No.: 13
DOI: 10.1145/1824766.1824769

This article studies clustered wireless sensor networks (WSNs), a realistic topology resulting from common deployment methods. We study coverage in naturally clustered networks of wireless sensor nodes, as opposed to WSNs where clustering...

Dimensioning and worst-case analysis of cluster-tree sensor networks
Petr Jurcik, Anis Koubâa, Ricardo Severino, Mário Alves, Eduardo Tovar
Article No.: 14
DOI: 10.1145/1824766.1824770

Modeling the fundamental performance limits of Wireless Sensor Networks (WSNs) is of paramount importance to understand their behavior under the worst-case conditions and to make the appropriate design choices. This is particular relevant for...

Not all wireless sensor networks are created equal: A comparative study on tunnels
Luca Mottola, Gian Pietro Picco, Matteo Ceriotti, Ştefan Gunǎ, Amy L. Murphy
Article No.: 15
DOI: 10.1145/1824766.1824771

Wireless sensor networks (WSNs) are envisioned for a number of application scenarios. Nevertheless, the few in-the-field experiences typically focus on the features of a specific system, and rarely report about the characteristics of the target...

Detection of reactive jamming in sensor networks
Mario Strasser, Boris Danev, Srdjan Čapkun
Article No.: 16
DOI: 10.1145/1824766.1824772

An integral part of most security- and safety-critical applications is a dependable and timely alarm notification. However, owing to the resource constraints of wireless sensor nodes (i.e., their limited power and spectral diversity), ensuring a...

Statistical anomaly detection with sensor networks
Ioannis Ch. Paschalidis, Yin Chen
Article No.: 17
DOI: 10.1145/1824766.1824773

We seek to detect statistically significant temporal or spatial changes in either the underlying process the sensor network is monitoring or in the network operation itself. These changes may point to faults, adversarial threats, misbehavior, or...

Quality of monitoring of stochastic events by periodic and proportional-share scheduling of sensor coverage
David K. Y. Yau, Nung Kwan Yip, Chris Y. T. Ma, Nageswara S. V. Rao, Mallikarjun Shankar
Article No.: 18
DOI: 10.1145/1824766.1824774

We analyze the quality of monitoring (QoM) of stochastic events by a periodic sensor which monitors a point of interest (PoI) for q time every p time. We show how the amount of information captured at a PoI is affected by the...

Analyzing MAC protocols for low data-rate applications
Koen Langendoen, Andreas Meier
Article No.: 19
DOI: 10.1145/1824766.1824775

The fundamental WSN requirement to be energy-efficient has produced a whole range of specialized Medium Access Control (MAC) protocols. They differ in how performance (latency, throughput) is traded off for a reduction in energy consumption. The...