enter search term and/or author name
Cooperative node localization using nonlinear data projection
Li Li, Thomas Kunz
Article No.: 1
Cooperative node localization schemes that employ nonlinear data reduction often deliver higher network node position accuracy compared to many other approaches. Other advantages of such algorithms are that they require only a minimum number of...
A security and robustness performance analysis of localization algorithms to signal strength attacks
Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin
Article No.: 2
Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens their viability for sensor applications. In this work, we examine several localization...
This article presents two lifetime models that describe two of the most common modes of operation of sensor nodes today, trigger-driven and duty-cycle driven. The models use a set of hardware parameters such as power consumption per task, state...
Design and evaluation of a hybrid sensor network for cane toad monitoring
Wen Hu, Nirupama Bulusu, Chun Tung Chou, Sanjay Jha, Andrew Taylor, Van Nghia Tran
Article No.: 4
This article investigates a wireless acoustic sensor network application—monitoring amphibian populations in the monsoonal woodlands of northern Australia. Our goal is to use automatic recognition of animal vocalizations to census the...
Network lifetime has become the key characteristic for evaluating sensor networks in an application-specific way. Especially the availability of nodes, the sensor coverage, and the connectivity have been included in discussions on network...
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Yee Wei Law, Marimuthu Palaniswami, Lodewijk Van Hoesel, Jeroen Doumen, Pieter Hartel, Paul Havinga
Article No.: 6
A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help to prevent the...
Localization and routing in sensor networks by local angle information
Jehoshua Bruck, Jie Gao, Anxiao (Andrew) Jiang
Article No.: 7
Location information is useful both for network organization and for sensor data integrity. In this article, we study the anchor-free 2D localization problem by using local angle measurements. We prove that given a unit disk graph and the angles...
Variable radii connected sensor cover in sensor networks
Zongheng Zhou, Samir R. Das, Himanshu Gupta
Article No.: 8
One of the useful approaches to exploit redundancy in a sensor network is to keep active only a small subset of sensors that are sufficient to cover the region required to be monitored. The set of active sensors should also form a connected...
Achieving long-term surveillance in VigilNet
Pascal Vicaire, Tian He, Qing Cao, Ting Yan, Gang Zhou, Lin Gu, Liqian Luo, Radu Stoleru, John A. Stankovic, Tarek F. Abdelzaher
Article No.: 9
Energy efficiency is a fundamental issue for outdoor sensor network systems. This article presents the design and implementation of multidimensional power management strategies in VigilNet, a major recent effort to support long-term surveillance...