enter search term and/or author name
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes
Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
Article No.: 11
Recent literature contains proposals for key predistribution schemes for sensor networks in which nodes are deployed in separate groups. In this article we consider the implications of group deployment for the connectivity and resilience of a key...
Leveraging redundancy in sampling-interpolation applications for sensor networks: A spectral approach
Periklis G. Liaskovitis, Curt Schurgers
Article No.: 12
An important class of sensor network applications aims at estimating the spatiotemporal behavior of a physical phenomenon, such as temperature variations over an area of interest. In such a scenario, the network essentially acts as a distributed...
Coverage properties of clustered wireless sensor networks
Renita Machado, Wensheng Zhang, Guiling Wang, Sirin Tekinay
Article No.: 13
This article studies clustered wireless sensor networks (WSNs), a realistic topology resulting from common deployment methods. We study coverage in naturally clustered networks of wireless sensor nodes, as opposed to WSNs where clustering...
Modeling the fundamental performance limits of Wireless Sensor Networks (WSNs) is of paramount importance to understand their behavior under the worst-case conditions and to make the appropriate design choices. This is particular relevant for...
Not all wireless sensor networks are created equal: A comparative study on tunnels
Luca Mottola, Gian Pietro Picco, Matteo Ceriotti, Ştefan Gunǎ, Amy L. Murphy
Article No.: 15
Wireless sensor networks (WSNs) are envisioned for a number of application scenarios. Nevertheless, the few in-the-field experiences typically focus on the features of a specific system, and rarely report about the characteristics of the target...
An integral part of most security- and safety-critical applications is a dependable and timely alarm notification. However, owing to the resource constraints of wireless sensor nodes (i.e., their limited power and spectral diversity), ensuring a...
Statistical anomaly detection with sensor networks
Ioannis Ch. Paschalidis, Yin Chen
Article No.: 17
We seek to detect statistically significant temporal or spatial changes in either the underlying process the sensor network is monitoring or in the network operation itself. These changes may point to faults, adversarial threats, misbehavior, or...
Quality of monitoring of stochastic events by periodic and proportional-share scheduling of sensor coverage
David K. Y. Yau, Nung Kwan Yip, Chris Y. T. Ma, Nageswara S. V. Rao, Mallikarjun Shankar
Article No.: 18
We analyze the quality of monitoring (QoM) of stochastic events by a periodic sensor which monitors a point of interest (PoI) for q time every p time. We show how the amount of information captured at a PoI is affected by the...
Analyzing MAC protocols for low data-rate applications
Koen Langendoen, Andreas Meier
Article No.: 19
The fundamental WSN requirement to be energy-efficient has produced a whole range of specialized Medium Access Control (MAC) protocols. They differ in how performance (latency, throughput) is traded off for a reduction in energy consumption. The...