Building wireless sensor networks : theoretical & practical perspectives Nandini Mukherjee ; Sarmistha Neogy ; Sarbani Roy
Material type: TextPublication details: Boca Raton : CRC Press, c2016.Description: xxiv, 254 p. : ill. ; 24 cmISBN:- 9781482230062
- 681/.2 23
- TK7872.D48 .M84 2016
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 681.2 MU BU (Browse shelf(Opens below)) | Available | T0054045 |
Includes bibliographical references and index.
Building Wireless Sensor Networks: Theoretical and Practical Perspectives presents the state of the art of wireless sensor networks (WSNs) from fundamental concepts to cutting-edge technologies. Focusing on WSN topics ideal for undergraduate and postgraduate curricula, this book: Provides essential knowledge of the contemporary theory and practice of wireless sensor networking Describes WSN architectures, protocols, and operating systems Details the routing and data aggregation algorithms Addresses WSN security and energy efficiency Includes sample programs for experimentation The book offers overarching coverage of this exciting field, filling a critical gap in the existing literature.
IntroductionSensorsSensor Node ArchitectureSensor Network ArchitectureMote TechnologyComparison of MANET and WSNRequirements of a WSNChallenges for a WSNWSN ApplicationsChapter NotesBibliographyWireless Sensor Networks ArchitectureIntroductionNetwork Protocol StackCommunication StandardsIEEE 802.11IEEE 802.15.4ZigBee6LoWPANSummaryBibliographyInformation GatheringIntroductionRoutingFlat-based Routing AlgorithmsHierarchical Routing AlgorithmsInformation Gathering Based on Geographic LocationsLocalizationGeographical RoutingLandmark-based RoutingData AggregationContent-based NamingSummary BibliographyEnergy Management in WSNIntroductionDuty CyclingIndependent StrategiesDependent StrategiesIndependent Sleep/Wakeup SchemesAsynchronous SchemesTDMA-based MAC ProtocolsContention-based MAC ProtocolsHybrid MAC ProtocolsData-driven ApproachesData PredictionData SensingEnergy-Aware Routing ProtocolsHierarchical Energy-Aware RoutingLocation-based RoutingData Aggregation-based RoutingRemarksSummaryBibliographySecurity in WSNIntroductionChallenges in WSNAttacks in WSNAttack CategorizationProtection Against AttacksCryptography in WSNKey ManagementKey Management in Distributed WSNKey Management in Hierarchical WSNSecure Routing in WSNsAttacks on Routing ProtocolsCountermeasures for Attacks Intrusion Detection in WSNIntrusion Detection SystemsSummaryBibliographyOperating Systems for WSNsIntroductionArchitectureMonolithicMicro-kernelVirtual MachineExecution ModelEvent-basedThread-basedHybrid ModelsSchedulingPower ManagementCommunicationCase Study: Popular Operating SystemsTinyOS ContikiMagnetOSMantis OSSummaryBibliographyProgramming WSNsIntroductionTinyOSTOSSIMTinyOS InstallationCTP in TinyOSModified SPIN in TinyOSContikiCOOJAContiki InstallationBroadcast Example in ContikiCastaliaModules under CastaliaCastalia InstallationT MAC in CastaliaNS-3 InstallationMobility Model in NS-3SummaryBibliography.
There are no comments on this title.