Chapter
2.8.1 System-on-chip (SoC) sensor nodes
2.8.2 Augmented general-purpose personal computers (PCs)
2.8.3 Dedicated sensor nodes
3 Wireless sensor network applications: overview and case studies
3.1 Target detection and tracking
3.1.4 Recognition of the target perturbations to the environment (phenomenology)
3.2 Contour and edge detection
3.2.1 Consecutive extremum search
3.2.2 Sensor grouping and contour point finding
3.2.3 Contour line creation
3.3 Types of applications
3.3.1 Environmental applications
3.3.2 Health care applications
3.3.3 Manufacturing process control
3.3.4 Intelligent and smart home
3.3.6 Underwater applications
3.3.8 Military applications
4 Medium access in wireless sensor networks
4.1 Medium access control in wireless networks
4.1.1 S-MAC: An energy-efficient protocol
4.1.2 L-MAC: a light-weight medium access protocol
4.1.3 Dynamic scheduling MAC protocol
4.1.4 Energy-efficient QoS-aware medium access (Q-MAC) protocol
4.1.5 Energy-efficient application aware medium access protocol
4.1.6 Location-aware access control protocol
4.1.7 An energy-efficient MAC approach for mobile wireless sensor networks
4.1.8 O-MAC: a receiver-centric power management protocol
4.1.9 PMAC: an adaptive energy-efficient MAC protocol for wirelesssensor networks
4.2 MAC issues in wireless sensor networks
5 Routing in wireless sensor networks
5.1 Fundamentals of routing and challenges in WSNs
5.2 Network architecture-based routing protocols for wireless sensor networks (WSNs)
5.2.1 Multi-hop flat routing
5.2.2 Hierarchical/cluster-based routing schemes
5.2.3 Location-based routing schemes
5.3 WSN routing protocols based on the nature of operation
5.3.1 Query-based routing approach
5.3.2 Multipath routing schemes
5.3.3 Coherent and non-coherent processing
5.3.4 Quality-of-service (QoS)-based routing schemes
5.3.5 Negotiation-based routing schemes
6 Transport protocols for wireless sensor networks
6.1 Transport protocol requirements for WSNs
6.1.1 Performance metrics
6.2 Internet transport protocols and their suitability for use in WSNs
6.3 Existing transport protocols for WSNs
6.3.2 Congestion and flow control-centric protocols
6.3.3 Reliability-centric protocols
7 Localization and tracking
7.1.1 Distance estimation techniques
7.1.2 Time difference of arrival (TDOA)
7.1.3 Angle of arrival (AOA), digital compasses
7.1.4 Localization algorithms
7.2.1 Single target tracking
7.2.2 Multi-target tracking
8 Topology management and control
8.2 Taxonomy of topology management
8.2.2 Sleep cycle management
8.3.2 Network connectivity
9 Performance evaluation of wireless sensor networks
9.1 Background information
9.2 Wireless sensor networks (WSNs) modeling
9.4 Modeling the behavior of sensors and sensor networks
9.4.2 Cooperative algorithms
9.4.3 Security mechanisms
9.4.4 Energy-aware requirement
9.5 Simulation tools for wireless sensor networks (WSNs)
10 Security issues in wireless sensor networks
10.1.1 Software updating in WSNs
10.3 Security requirements in WSNs
10.4 Vulnerabilities and attacks specific to wireless sensor networks (WSNs)
10.5 Physical attacks on WSNs
10.6 Recent security issues in WSNs
10.7 Secure protocols for wireless sensor networks
10.8 Denial of service (DoS) in WSNs and related defenses
11 Wireless mobile sensor networks
11.1 Coverage and mobile sensors
11.1.1 Voronoi diagram-based approaches
11.1.2 Virtual force-based approaches
11.1.3 Grid-based approach
11.2 Network lifetime improvement
11.2.1 Predictable and controllable mobile sink
11.2.2 Predictable but uncontrollable mobile sink
11.2.3 Unpredictable and uncontrollable sink
11.2.4 Mobile relays and data mules
12 Wireless multimedia sensor networks
12.1 Network applications
12.1.1 Multimedia surveillance
12.1.2 Traffic management
12.1.3 Advanced health care
12.1.4 Environmental monitoring
12.1.5 Industrial process control
12.2.1 Resource constraints
12.2.2 Variable channel capacity
12.2.3 Multimedia coding technique
12.2.4 Redundancy removal
12.3 Different architecture of WMSNs
12.3.1 Traditional WSN architecture
12.3.2 Heterogeneous, single-tier, clustered architecture
12.3.3 Heterogeneous, multiple-tier architecture
12.3.4 Integrated architecture
12.4 Comparison of different architectures
12.5 Multimedia sensor node architecture
12.6 Existing sensor node platforms
12.7 Communication layers
12.7.6 Cross-layer issues
13 Underwater sensor networks
13.1 Characteristics, properties, and applications of UWSNs
13.2 Underwater physics and dynamics
13.3 UWSN design: communication model and networking protocols
13.3.3 Localization services
13.3.4 UWSN protocol design
14 Wireless underground sensor networks
14.1.1 Soil property monitoring
14.1.2 Environment monitoring
14.1.3 Border surveillance
14.1.4 Mining safety vigilance
14.1.5 Infrastructure monitoring
14.1.6 Location determination
14.2 Challenges in designing WUGSNs
14.2.1 Underground communication channel design
14.2.5 Environmental hazards
14.3 Network architecture
14.3.1 Topologies for WUGSNs buried underground
14.3.2 Topologies for WUGSNs deployed in mines and tunnels
14.4 Communication architecture
14.4.5 Cross-layer design
14.4.6 Extremely opportunistic routing
14.4.7 Underground opportunistic routing protocol
14.5 Wireless underground channels
14.5.1 Wireless underground channel properties
14.6 Effects of soil properties on wireless underground channels
14.6.1 Volumetric water content
14.6.4 Size of soil particles
14.6.6 Operating frequency
14.7 Underground channel models
14.7.1 Communication channels for WUGSNs buried underground
14.7.2 Communication channels for WUGSNs deployed in mines and tunnels