Sensor Networks (TOSN)


Search Issue
enter search term and/or author name


ACM Transactions on Sensor Networks (TOSN), Volume 6 Issue 2, February 2010

A computational geometry method for localization using differences of distances
Xiaochun Xu, Nageswara S. V. Rao, Sartaj Sahni
Article No.: 10
DOI: 10.1145/1689239.1689240

We present a computational geometry method for the problem of estimating the location of a source in the plane using measurements of distance-differences to it. Compared to existing solutions to this well-studied problem, this method is: (a)...

The impact of quasi-equally spaced sensor topologies on signal reconstruction
Alessandro Nordio, Carla-Fabiana Chiasserini, Emanuele Viterbo
Article No.: 11
DOI: 10.1145/1689239.1689241

A wireless sensor network with randomly deployed nodes can be used to provide an irregular sampling of a physical field of interest. We assume that a sink node collects the data gathered by the sensors and uses a linear filter for the...

On link asymmetry and one-way estimation in wireless sensor networks
Lifeng Sang, Anish Arora, Hongwei Zhang
Article No.: 12
DOI: 10.1145/1689239.1689242

Link asymmetry is one of the unique challenges that wireless sensor networks pose in the design of network protocols. We observe, based on testbed experiments, that a substantial percentage of links are asymmetric, many are even unidirectional. We...

Using mobile phones to determine transportation modes
Sasank Reddy, Min Mun, Jeff Burke, Deborah Estrin, Mark Hansen, Mani Srivastava
Article No.: 13
DOI: 10.1145/1689239.1689243

As mobile phones advance in functionality and capability, they are being used for more than just communication. Increasingly, these devices are being employed as instruments for introspection into habits and situations of individuals and...

Query privacy in wireless sensor networks
Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pearce, Venu Vasudevan
Article No.: 14
DOI: 10.1145/1689239.1689244

Existing mechanisms for querying wireless sensor networks leak client interests to the servers performing the queries. The leaks are not only in terms of specific regions of interest but also of client access patterns. In this article we introduce...

Dealing with random and selective attacks in wireless sensor systems
Jinfeng Ni, Li Zhou, Chinya V. Ravishankar
Article No.: 15
DOI: 10.1145/1689239.1689245

We present a framework for analyzing the effects of random and selective compromises (using order statistics) in sensor networks. We discuss the problem of ensuring data integrity at the source and during transit in sensor networks, and present an...

An empirical study of low-power wireless
Kannan Srinivasan, Prabal Dutta, Arsalan Tavakoli, Philip Levis
Article No.: 16
DOI: 10.1145/1689239.1689246

We present empirical measurements of the packet delivery performance of the latest sensor platforms: Micaz and Telos motes. In this article, we present observations that have implications to a set of common assumptions protocol designers make...

SensorScope: Application-specific sensor network for environmental monitoring
François Ingelrest, Guillermo Barrenetxea, Gunnar Schaefer, Martin Vetterli, Olivier Couach, Marc Parlange
Article No.: 17
DOI: 10.1145/1689239.1689247

SensorScope is a turnkey solution for environmental monitoring systems, based on a wireless sensor network and resulting from a collaboration between environmental and network researchers. Given the interest in climate change, environmental...

Fusion of threshold rules for target detection in wireless sensor networks
Mengxia Zhu, Song Ding, Qishi Wu, R. R. Brooks, N. S. V. Rao, S. S. Iyengar
Article No.: 18
DOI: 10.1145/1689239.1689248

We propose a binary decision fusion rule that reaches a global decision on the presence of a target by integrating local decisions made by multiple sensors. Without requiring a priori probability of target presence, the fusion threshold bounds...