ACM DL

Sensor Networks (TOSN)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Sensor Networks (TOSN), Volume 13 Issue 1, February 2017

A System for Response and Prevention of Security Incidents in Wireless Sensor Networks
Daniele Midi, Salmin Sultana, Elisa Bertino
Article No.: 1
DOI: 10.1145/2996195

Resource constraints, unattended operating environments, and communication phenomena make Wireless Sensor Networks (WSNs) susceptible to operational failures and security attacks. However, applications often impose stringent requirements on data...

Enabling Sensor Network to Smartphone Interaction Using Software Radios
Yongtae Park, Jihun Ha, Hyogon Kim, Jeonggil Ko
Article No.: 2
DOI: 10.1145/3002177

Recent advances in smartphone processing power have opened the possibilities for them to act as the processing component of software-defined radios (SDRs). For low-power sensor network systems using various communication protocols, this means that...

Accelerating the Kamada-Kawai Algorithm for Boundary Detection in a Mobile Ad Hoc Network
Se-Hang Cheong, Yain-Whar Si
Article No.: 3
DOI: 10.1145/3005718

Force-directed algorithms such as the Kamada-Kawai algorithm have shown promising results for solving the boundary detection problem in a mobile ad hoc network. However, the classical Kamada-Kawai algorithm does not scale well when it is used in...

Water Quality Monitoring Using Wireless Sensor Networks: Current Trends and Future Research Directions
Kofi Sarpong Adu-Manu, Cristiano Tapparello, Wendi Heinzelman, Ferdinand Apietu Katsriku, Jamal-Deen Abdulai
Article No.: 4
DOI: 10.1145/3005719

Water is essential for human survival. Although approximately 71% of the world is covered in water, only 2.5% of this is fresh water; hence, fresh water is a valuable resource that must be carefully monitored and maintained. In developing...

Sensor Network Provenance Compression Using Dynamic Bayesian Networks
Changda Wang, Elisa Bertino
Article No.: 5
DOI: 10.1145/2997653

Provenance records the history of data acquisition and transmission. In wireless sensor networks (WSNs), provenance is critical for many different purposes, including assessing the trustworthiness of data acquired and forwarded by sensors,...

Gait-Key: A Gait-Based Shared Secret Key Generation Protocol for Wearable Devices
Weitao Xu, Chitra Javali, Girish Revadigar, Chengwen Luo, Neil Bergmann, Wen Hu
Article No.: 6
DOI: 10.1145/3023954

Recent years have witnessed a remarkable growth in the number of smart wearable devices. For many of these devices, an important security issue is to establish an authenticated communication channel between legitimate devices to protect the...

Encode When Necessary: Correlated Network Coding Under Unreliable Wireless Links
Shuai Wang, Song Min Kim, Zhimeng Yin, Tian He
Article No.: 7
DOI: 10.1145/3023953

Recent research has shown that network coding has great potential to improve network performance in wireless communication. The performance of network coding in real-world scenarios, however, varies dramatically. It is reported that network coding...

Performance Assessment and Feasibility Analysis of IEEE 802.15.4m Wireless Sensor Networks in TV Grayspaces
Luca Bedogni, Andreas Achtzehn, Marina Petrova, Petri Mähönen, Luciano Bononi
Article No.: 8
DOI: 10.1145/3021499

In this article, we assess the viability of underlay sensor networks in frequencies used by an incumbent digital TV broadcasting system, that is, in the so-called TV grayspaces (TVGS). Grayspace operations are particularly interesting when other...