DescriptionThis excellent title introduces the concept of mission-oriented sensor networks as distributed dynamic systems of interacting sensing devices that are networked to jointly execute complex real-time missions under uncertainity. It provides the latest, yet unpublished results on the main technical and application challenges of mission-oriented sensor networks.
The authors of each chapter are research leaders from multiple disciplines who are presenting their latest innovations on the issues. Together, the editors have compiled a comprehensive treatment of the subject that flows smoothly from chapter to chapter. This interdisciplinary approach significantly enhances the science and technology knowledge base and influences the military and civilian applications of this field.
Dr. Shashi Phoha is the Guest Editor of IEEE Transactions in Mobile Computing, Special Issue on Mission-Oriented Sensor Networks. She is the Head of the Information Sciences and Technology Division of ARL and Professor of Electrical and Computer Engineering at Pennsylvania State University. She has led major research programs of multimillion dollars for military sensor networks in industry as well as in academia. In addition to more than a hundred journal articles, she authored or co-authored several books in related areas.
Dr. Thomas La Porta is the Editor of the IEEE Transactions on Mobile Computing. He received his B.S.E.E. and M.S.E.E. degrees from The Cooper Union, New York, NY and his Ph.D. degree in Electrical Engineering from Columbia University, New York, NY. He joined the Computer Science and Engineering Department at Penn State in 2002 as a Full Professor. He is Director of the Networking Research Center at Penn State.
Prior to joining Penn State, Dr. LaPorta was with Bell Laboratories since 1986. He was the Director of the Mobile Networking Research Department Bell Laboratories, Lucent Technologies, where he led various projects in wireless and mobile networking. He is an IEEE Fellow, Bell Labs Fellow, received the Bell Labs Distinguished Technical Staff Award, and an Eta Kappa Nu Outstanding Young Electrical Engineer Award. He has published over 50 technical papers and holds over 20 patents.
Christopher Griffin holds a Masters degree in Mathematics from Penn State and is currently pursuing his Ph.D. there. Mr. Griffin has worked as a research engineer at the Penn State Applied Research Laboratory for the last six years on several DARPA and or Army Research Laboratory sponsored programs, including: the Emergent Surveillance Plexus (ESP) program as a lead engineer; the DARPA sponsored Semantic Information Fusion program under the SensIT initiative, where he co-developed a distributed target tracking system and managed the development of a target classification algorithm using Level 1 sensor fusion techniques; as a co-principal software architect for the DARPA Joint Force Component Controller (JFACC) initiative, an adaptive C2 program aimed at improving Air Force response times; and he was the principal software architect for the Boeing/ARFL Insertion of Embedding Infosphere Technology (IEIST) program. His areas of research expertise are distributed tracking systems, mission oriented control, and system modeling.
I SENSOR NETWORK OPERATIONS OVERVIEW.
1 Overview of Mission-Oriented Sensor Networks.
1.2 Trends in Sensor Development.
1.3 Mission-Oriented Sensor Networks: Dynamic Systems Perspective.
II SENSOR NETWORK DESIGN AND OPERATIONS.
2 Sensor Deployment, Self-Organization, and Localization.
2.2 SCARE: A Scalable Self-Configuration and Adaptive Reconfiguration Scheme for Dense Sensor Networks.
2.3 Robust Sensor Positioning in Wireless Ad Hoc Sensor Networks.
2.4 Trigonometric k Clustering (TKC) for Censored Distance Estimation.
2.5 Sensing Coverage and Breach Paths in Surveillance Wireless Sensor Networks.
3 Purposeful Mobility and Navigation.
3.2 Controlled Mobility for Efficient Data Gathering in Sensor Networks with Passively Mobile Nodes.
3.3 Purposeful Mobility in Tactical Sensor Networks.
3.4 Formation and Alignment of Distributed Sensing Agents with Double-Integrator Dynamics and Actuator Saturation.
3.5 Modeling and Enhancing the Data Capacity of Wireless Sensor Networks.
4 Lower Layer Issues—MAC, Scheduling, and Transmission.
4.2 SS-TDMA: A Self-Stabilizing Medium Access Control (MAC) for Sensor Networks.
4.3 Comprehensive Performance Study of IEEE 802.15.4.
4.4 Providing Energy Efficiency for Wireless Sensor Networks Through Link Adaptation Techniques.
5 Network Routing.
5.2 Load-Balanced Query Protocols for Wireless Sensor Networks.
5.3 Energy-Efficient and MAC-Aware Routing for Data Aggregation in Sensor Networks.
5.4 LESS: Low-Energy Security Solution for Large-scale Sensor Networks Based on Tree-Ripple-Zone Routing Scheme.
6 Power Management.
6.2 Adaptive Sensing and Reporting in Energy-Constrained Sensor Networks.
6.3 Sensor Placement and Lifetime of Wireless Sensor Networks: Theory and Performance Analysis.
6.4 Algorithms for Maximizing Lifetime of Battery-Powered Wireless Sensor Nodes.
6.5 Battery Lifetime Estimation and Optimization for Underwater Sensor Networks.
7 Distributed Sensing and Data Gathering.
7.2 Secure Differential Data Aggregation for Wireless Sensor Networks.
7.3 Energy-Conserving Data Gathering Strategy Based on Trade-off Between Coverage and Data Reporting Latency in Wireless Sensor Networks.
7.4 Quality-Driven Information Processing and Aggregation in Distributed Sensor Networks.
7.5 Progressive Approach to Distributed Multiple-Target Detection in Sensor Networks.
8 Network Security.
8.2 Energy Cost of Embedded Security for Wireless Sensor Networks.
8.3 Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks.
8.4 Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc Networks.
8.5 Fast and Scalable Key Establishment in Sensor Networks.
8.6 Weil Pairing-Based Round, Efficient, and Fault-Tolerant Group Key Agreement Protocol for Sensor Networks.
III SENSOR NETWORK APPLICATIONS.
9 Pursuer–Evader Tracking in Sensor Networks.
9.2 The Problem.
9.3 Evader-Centric Program.
9.4 Pursuer-Centric Program.
9.5 Hybrid Pursuer–Evader Program.
9.6 Efficient Version of Hybrid Program.
9.7 Implementation and Simulation Results.
9.8 Discussion and Related Work.
10 Embedded Soft Sensing for Anomaly Detection in Mobile Robotic Networks.
10.2 Mobile Robot Simulation Setup.
10.3 Software Anomalies in Mobile Robotic Networks.
10.4 Soft Sensor.
10.5 Software Anomaly Detection Architecture.
10.6 Anomaly Detection Mechanisms.
10.7 Test Bed for Software Anomaly Detection in Mobile Robot Application.
10.8 Results and Discussion.
10.9 Conclusions and Future Work.
11 Multisensor Network-Based Framework for Video Surveillance: Real-Time Superresolution Imaging.
11.2 Basic Model of Distributed Multisensor Surveillance System.
11.3 Superresolution Imaging.
11.4 Optical Flow Computation.
11.5 Superresolution Image Reconstruction.
11.6 Experimental Results.
12 Using Information Theory to Design Context-Sensing Wearable Systems.
12.2 Related Work.
12.3 Theoretical Background.
12.5 Design Considerations.
12.6 Case Study.
13 Multiple Bit Stream Image Transmission over Wireless Sensor Networks.
13.2 System Description.
13.3 Experimental Results.
13.4 Summary and Discussion.
14 Hybrid Sensor Network Test Bed for Reinforced Target Tracking.
14.2 Sensor Network Operational Components.
14.3 Sensor Network Challenge Problem.
14.4 Integrated Target Surveillance Experiment.
14.5 Experimental Results and Evaluation.
15 Noise-Adaptive Sensor Network for Vehicle Tracking in the Desert.
15.2 Distributed Tracking.
15.4 Experimental Methods.
15.5 Results and Discussion.
ABOUT THE EDITORS.
"...a very good monograph [that]...will probably never be removed from your bookshelf once you do." (Computing Reviews.com, November 15, 2006)