ACM DL

Sensor Networks (TOSN)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Sensor Networks (TOSN), Volume 8 Issue 2, March 2012

Data authenticity and availability in multihop wireless sensor networks
Erman Ayday, Farshid Delgosha, Faramarz Fekri
Article No.: 10
DOI: 10.1145/2140522.2140523

Security services such as data confidentiality, authenticity, and availability are critical in wireless sensor networks (WSNs) deployed in adversarial environments. Due to the resource constrain's of sensor nodes, the existing protocols currently...

Self-localizing smart camera networks
Babak Shirmohammadi, Camillo J. Taylor
Article No.: 11
DOI: 10.1145/2140522.2140524

This article describes a novel approach to localizing networks of embedded cameras and sensors. In this scheme, the cameras and the sensors are equipped with controllable light sources (either visible or infrared), which are used for signaling....

Delay optimal event detection on ad hoc wireless sensor networks
Premkumar Karumbu, Venkata K. Prasanthi, Anurag Kumar
Article No.: 12
DOI: 10.1145/2140522.2140525

We consider a small extent sensor network for event detection, in which nodes periodically take samples and then contend over a random access network to transmit their measurement packets to the fusion center. We consider two procedures at...

Practical RSA signature scheme based on periodical rekeying for wireless sensor networks
Shih-Ying Chang, Yue-Hsun Lin, Hung-Min Sun, Mu-En Wu
Article No.: 13
DOI: 10.1145/2140522.2140526

Broadcast is an efficient communication channel on wireless sensor networks. Through authentic broadcast, deployed sensors can perform legitimate actions issued by a base station. According to previous literature, a complete solution for authentic...

Information-theoretic modeling of false data filtering schemes in wireless sensor networks
Zhen Cao, Hui Deng, Zhi Guan, Zhong Chen
Article No.: 14
DOI: 10.1145/2140522.2140527

False data filtering schemes are designed to filter out false data injected by malicious sensors; they keep the network immune to bogus event reports. Theoretic understanding of false data filtering schemes and guidelines to further improve their...

Quantization, channel compensation, and optimal energy allocation for estimation in sensor networks
Xusheng Sun, Edward J. Coyle
Article No.: 15
DOI: 10.1145/2140522.2140528

In clustered networks of wireless sensors, each sensor collects noisy observations of the environment, quantizes these observations into a local estimate of finite length, and forwards them through one or more noisy wireless channels to the...

Event prediction in a hybrid camera network
Uĝur Murat Erdem, Stan Sclaroff
Article No.: 16
DOI: 10.1145/2140522.2140529

Given a hybrid camera layout—one containing, for example, static and active cameras—and people moving around following established traffic patterns, our goal is to predict a subset of cameras, respective camera parameter settings, and...

Utility-based bandwidth adaptation in mission-oriented wireless sensor networks
Sharanya Eswaran, Archan Misra, Flavio Bergamaschi, Thomas La Porta
Article No.: 17
DOI: 10.1145/2140522.2140530

This article develops a utility-based optimization framework for resource sharing by multiple competing missions in a mission-oriented wireless sensor network (WSN) environment. Prior work on network utility maximization (NUM) based optimization...

A dynamic programming approach to maximizing a statistical measure of the lifetime of sensor networks
Muhammad U. Ilyas, Hayder Radha
Article No.: 18
DOI: 10.1145/2140522.2140531

The inherent many-to-one flow of traffic in wireless sensor networks (WSNs) produces a skewed distribution of energy consumption rates, leading to the early demise of those sensors that are critical to the ability of surviving nodes to communicate...