Challenges and Opportunities of Connected K-Covered Wireless Sensor Networks: From Sensor Deployment to Data Gathering

Front Cover
Springer Science & Business Media, Aug 10, 2009 - Computers - 342 pages
0 Reviews

Wireless sensor networks have received significant attention because of their important role and many conveniences in our lives. Indeed, the recent and fast advances in inexpensive sensor technology and wireless communications has made the design and development of large-scale wireless sensor networks cost-effective and appealing to a wide range of mission-critical situations, including civilian, natural, industrial, and military applications, such as health and environmental monitoring, seism monitoring,  industrial process automation, and battlefields surveillance, respectively. A wireless sensor network consists of a large number of tiny, low-powered devices, called sensors, which are randomly or deterministically deployed in a field of interest while collaborating and coordinating for the successful accomplishment of their mission. These sensors suffer from very scarce resources and capabilities, such as bandwidth, storage, CPU, battery power (or energy), sensing, and communication, to name a few, with energy being the most critical one. The major challenge in the design process of this type of network is mainly due to the limited capabilities of the sensors, and particularly, their energy, which makes them unreliable.

This book aims to develop a reader’s thorough understanding of the opportunities and challenges of k-covered wireless sensor networks, where each point in a deployment field is covered (or sensed) by at least k sensors. Following René Descartes’ most elegant methodology of dividing each difficulty into as many parts as might be possible and necessary to best solve it (Discours de la Method, 1637), this book presents a variety of theoretical studies based on percolation theory and computational geometry, as well as protocols that lead to the design of a unified framework, where connected k-coverage, sensor scheduling, and data routing and dissemination are jointly considered.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

I
1
II
2
IV
3
VII
4
IX
5
X
6
XI
7
XII
10
CXVIII
163
CXIX
168
CXXI
171
CXXII
173
CXXIII
174
CXXIV
175
CXXV
176
CXXVII
180

XIII
14
XIV
15
XV
21
XVI
22
XVII
23
XVIII
24
XIX
25
XX
26
XXI
27
XXII
29
XXIII
32
XXV
33
XXVI
37
XXVII
38
XXVIII
41
XXXI
42
XXXIII
46
XXXV
48
XXXVI
50
XXXVII
52
XXXVIII
53
XXXIX
58
XL
61
XLI
62
XLIII
66
XLV
67
XLVIII
68
XLIX
69
L
70
LI
73
LII
75
LV
79
LVI
80
LVII
81
LVIII
82
LIX
84
LX
85
LXII
86
LXIV
87
LXV
89
LXVI
90
LXVII
91
LXVIII
92
LXIX
94
LXXII
96
LXXV
97
LXXVI
98
LXXIX
105
LXXX
107
LXXXI
108
LXXXII
110
LXXXIII
112
LXXXIV
113
LXXXVII
115
LXXXVIII
116
LXXXIX
117
XCI
119
XCIII
120
XCV
121
XCVI
123
XCVIII
127
C
128
CI
130
CII
133
CIII
134
CIV
136
CV
140
CIX
147
CX
148
CXI
151
CXII
152
CXIII
154
CXIV
155
CXV
157
CXVI
159
CXVII
160
CXXIX
181
CXXX
182
CXXXI
183
CXXXII
192
CXXXIV
196
CXXXV
198
CXXXVI
199
CXXXVII
200
CXXXVIII
201
CXXXIX
202
CXLI
204
CXLII
205
CXLIV
206
CXLV
208
CXLVI
210
CXLVII
213
CXLIX
216
CL
218
CLI
225
CLIV
226
CLVI
228
CLVIII
229
CLXI
230
CLXIII
231
CLXV
234
CLXVI
237
CLXVII
238
CLXIX
239
CLXX
241
CLXXI
243
CLXXIII
245
CLXXIV
246
CLXXVI
250
CLXXVII
253
CLXXIX
255
CLXXX
258
CLXXXI
259
CLXXXIV
261
CLXXXV
263
CLXXXVIII
265
CLXXXIX
266
CXC
267
CXCII
268
CXCIII
269
CXCIV
270
CXCV
272
CXCVI
273
CXCVII
274
CXCVIII
276
CC
277
CCI
281
CCIII
282
CCV
285
CCVII
288
CCVIII
291
CCX
293
CCXI
297
CCXII
299
CCXIII
300
CCXIV
303
CCXV
304
CCXVII
307
CCXVIII
308
CCXIX
309
CCXX
310
CCXXI
311
CCXXII
313
CCXXIV
314
CCXXVI
315
CCXXVII
319
CCXXIX
320
CCXXXI
321
CCXXXII
322
CCXXXIII
323
CCXXXIV
335
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information