000 03664cam a2200337 a 4500
008 150325s2016 flu b 001 0 eng
010 _a 2015009941
020 _a9781482230062
040 _aDLC
_beng
_cDLC
_dDLC
042 _apcc
050 0 0 _aTK7872.D48
_b.M84 2016
082 0 0 _a681/.2
_223
100 1 _aMukherjee, Nandini
245 1 0 _aBuilding wireless sensor networks :
_btheoretical & practical perspectives
_cNandini Mukherjee ; Sarmistha Neogy ; Sarbani Roy
260 _aBoca Raton :
_bCRC Press,
_cc2016.
300 _axxiv, 254 p. :
_bill. ;
_c24 cm.
504 _aIncludes bibliographical references and index.
650 0 _aWireless sensor networks
700 1 _aNeogy, Sarmistha
700 1 _aRoy, Sarbani
035 _a(IMchF)fol15648908
520 _aBuilding Wireless Sensor Networks: Theoretical and Practical Perspectives presents the state of the art of wireless sensor networks (WSNs) from fundamental concepts to cutting-edge technologies. Focusing on WSN topics ideal for undergraduate and postgraduate curricula, this book: Provides essential knowledge of the contemporary theory and practice of wireless sensor networking Describes WSN architectures, protocols, and operating systems Details the routing and data aggregation algorithms Addresses WSN security and energy efficiency Includes sample programs for experimentation The book offers overarching coverage of this exciting field, filling a critical gap in the existing literature.
505 0 _aIntroductionSensorsSensor Node ArchitectureSensor Network ArchitectureMote TechnologyComparison of MANET and WSNRequirements of a WSNChallenges for a WSNWSN ApplicationsChapter NotesBibliographyWireless Sensor Networks ArchitectureIntroductionNetwork Protocol StackCommunication StandardsIEEE 802.11IEEE 802.15.4ZigBee6LoWPANSummaryBibliographyInformation GatheringIntroductionRoutingFlat-based Routing AlgorithmsHierarchical Routing AlgorithmsInformation Gathering Based on Geographic LocationsLocalizationGeographical RoutingLandmark-based RoutingData AggregationContent-based NamingSummary BibliographyEnergy Management in WSNIntroductionDuty CyclingIndependent StrategiesDependent StrategiesIndependent Sleep/Wakeup SchemesAsynchronous SchemesTDMA-based MAC ProtocolsContention-based MAC ProtocolsHybrid MAC ProtocolsData-driven ApproachesData PredictionData SensingEnergy-Aware Routing ProtocolsHierarchical Energy-Aware RoutingLocation-based RoutingData Aggregation-based RoutingRemarksSummaryBibliographySecurity in WSNIntroductionChallenges in WSNAttacks in WSNAttack CategorizationProtection Against AttacksCryptography in WSNKey ManagementKey Management in Distributed WSNKey Management in Hierarchical WSNSecure Routing in WSNsAttacks on Routing ProtocolsCountermeasures for Attacks Intrusion Detection in WSNIntrusion Detection SystemsSummaryBibliographyOperating Systems for WSNsIntroductionArchitectureMonolithicMicro-kernelVirtual MachineExecution ModelEvent-basedThread-basedHybrid ModelsSchedulingPower ManagementCommunicationCase Study: Popular Operating SystemsTinyOS ContikiMagnetOSMantis OSSummaryBibliographyProgramming WSNsIntroductionTinyOSTOSSIMTinyOS InstallationCTP in TinyOSModified SPIN in TinyOSContikiCOOJAContiki InstallationBroadcast Example in ContikiCastaliaModules under CastaliaCastalia InstallationT MAC in CastaliaNS-3 InstallationMobility Model in NS-3SummaryBibliography.
650 7 _aTechnology & Engineering
_xTechnical & Manufacturing Industries & Trades
_2sears
650 7 _aTechnology
_2sears
650 7 _aEngineering
_2sears
005 20170126101056.0
001 63688
003 UOWD
942 _cREGULAR
999 _c28839
_d28839