Skip to main content Accessibility help
×
Home
Hostname: page-component-99c86f546-zzcdp Total loading time: 1.74 Render date: 2021-12-06T21:05:42.959Z Has data issue: true Feature Flags: { "shouldUseShareProductTool": true, "shouldUseHypothesis": true, "isUnsiloEnabled": true, "metricsAbstractViews": false, "figures": true, "newCiteModal": false, "newCitedByModal": true, "newEcommerce": true, "newUsageEvents": true }

References

Published online by Cambridge University Press:  05 December 2014

Mohammad S. Obaidat
Affiliation:
Monmouth University, New Jersey
Sudip Misra
Affiliation:
Indian Institute of Technology
Get access
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aghaei, R. G., Rahman, M. A., Gueaieb, W. and Saddik, A. E., “Ant colony-based reinforcement learning algorithm for routing in wireless sensor networks,” in Instrumentation and Measurement Technology Conference (IMTC), Warsaw, Poland, 2007.Google Scholar
Ahmed, N., Dong, Y., Bokareva, T. et al., “Detection and tracking using wireless sensor networks,” in Proceedings of the 2007 International Conference on Embedded Networked Sensor Systems, pp. 425–426, Sydney, Australia, November 2007.Google Scholar
Ahmed, N., Kanhere, S. S. and Jha, S., “Ensuring area coverage in hybrid wireless sensor networks,” in Proceedings of the 3rd international Conference on Mobile ad-hoc and Sensor Networks (MSN’07), Zhang, H., Olariu, S., Cao, J. and Johnson, D. B., Ed. Berlin, Heidelberg: Springer-Verlag, pp. 548–560, 2007.CrossRefGoogle Scholar
Ai, J., Kong, J. and Turgut, D., “An adaptive coordinated medium access control for wireless sensor networks,” in Proceedings of the International Symposium on Computers and Communications, Vol. 1, pp. 214–219, July 2004.
Ainslie, M. A., Principles of Sonar Performance Modelling, Springer, ISBN: , 2010.CrossRefGoogle Scholar
Akkaya, K. and Younis, M., “An energy-aware QoS routing protocol for wireless sensor network,” in Proceedings of the 23rd International Conference on Distributed Computing Systems, pp. 710–715, May 2003.
Akkaya, K. and Younis, M., “A survey on routing protocols for wireless sensor networks,” Ad hoc Networks, Vol. 3, No. 3, pp. 325–349, 2005.CrossRefGoogle Scholar
Akyildiz, I. F., Pompili, D. and Melodia, T., “Underwater acoustic sensor networks: research challenges,” Journal of Ad Hoc Networks, Elsevier, Vol. 3, No. 3, pp. 257–279, March 2005.CrossRefGoogle Scholar
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. and Cayirci, E., “A survey on sensor networks,” IEEE Communications Magazine, pp. 102–114, August 2002.CrossRefGoogle Scholar
Akyildiz, I., Su, W., Sankarasubramaniam, Y. and Cayirci, E., “A survey on sensor networks,” IEEE Communications Magazine, Vol. 40, No. 8, pp. 102–114, August 2002.CrossRefGoogle Scholar
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. and Cayirci, E., “A survey on sensor networks,” IEEE Communications Magazine, Vol. 40, No. 8, pp. 102–114, Aug. 2002.CrossRefGoogle Scholar
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. and Cayirci, E., “A survey on sensor networks,” IEEE Communication Magazine, Vol. 40, No. 8, pp. 102–114, 2002.CrossRefGoogle Scholar
Akyildiz, I. F., Pompili, D. and Melodia, T., “Underwater acoustic sensor networks: research challenges,” Ad Hoc Networks, Vol. 3, No. 3, pp. 257–279, May 2005.CrossRefGoogle Scholar
Akyildiz, I. F., Melodia, T. and Chowdhury, K. R., “A survey on wireless multimedia sensor networks,” Computer Networks, Vol. 51, No. 4, p. 921, 2007.CrossRefGoogle Scholar
Akyildiz, I. F., Melodia, T. and Chowdhury, K. R., “Wireless multimedia sensor networks: applications and testbeds,” Proceedings of the IEEE, Vol. 96, No. 10, pp. 1588–1605, Oct. 2008.CrossRefGoogle Scholar
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. and Cayirci, E., “Wireless sensor networks: a survey,” Computer Networks, Vol. 38, pp. 393–422, March 2002.CrossRefGoogle Scholar
Akyildiz, I. F., Pompili, D. and Melodia, T., “Underwater acoustic sensor networks: research challenges,”Ad Hoc Networks, Vol. 2, No. 3, pp. 257–279, 2005.CrossRefGoogle Scholar
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. and Cayirci, E., “Wireless sensor networks: a survey,” Computer Networks, Vol. 38, No. 4, pp. 393–422, 2002.CrossRefGoogle Scholar
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. and Cayirci, E., “A survey on sensor networks,” IEEE Communications Magazine, Vol. 40, No. 8, pp. 102–114, 2002.CrossRefGoogle Scholar
Akyildiz, I. F., Pompili, D. and Melodia, T., “State of the art in protocol research for underwater acoustic sensor networks,” Mobile Computing and Communications Review, Vol. 11, No. 4, 2007.CrossRefGoogle Scholar
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. and Cayirci, E., “Wireless sensor networks: a survey,” Computer Networks Journal (Elsevier), Vol. 38, No. 4, pp. 393–422, March 2002.CrossRefGoogle Scholar
Akyildiz, I. F. and Stuntebeck, E. P., “Wireless underground sensor networks: research challenges,” Ad-Hoc Networks Journal (Elsevier), Vol. 4, pp. 669–686, July 2006.CrossRefGoogle Scholar
Akyildiz, I. F., Sun, Z. and Vuran, M. C., “Signal propagation techniques for wireless underground communication networks,” Physical Communication Journal (Elsevier), Vol. 2, No. 3, pp. 167–183, Sept. 2009.CrossRefGoogle Scholar
Al-Dhalaan, A. and Lambadaris, I., “Semidefinite programming for wireless sensor localization with lognormal shadowing,” in Proceedings of the 2009 IEEE International Conference on Sensor Technologies and Applications, pp. 187–193, 2009.CrossRefGoogle Scholar
Al-Karaki, J. N., Ul-Mustafa, R. and Kamal, A., “Data aggregation in wireless sensor networks – exact and approximate algorithms,” in Proceedings of IEEE Workshop on High Performance Switching and Routing (HPSR), pp. 241–245, Phoenix, Arizona, April 2004.Google Scholar
Almalkawi, I. T., Zapata, M. G., Al-Karaki, J. N. and Pozo, J. M., “Wireless multimedia sensor networks: current trends and future directions,” Sensor, Vol. 10, No. 7, pp. 6662–6717, Jul. 2010CrossRefGoogle ScholarPubMed
Alsindi, N. A., Pahlavan, K. and Alavi, B., “An error propagation aware algorithm for precise cooperative indoor localization,” in Proceedings of IEEE Military Communications Conference (MILCOM), pp. 1–7, Washington, DC, USA, 2006.Google Scholar
Altman, E., Basar, T., Jimenez, T. and Shimkin, N., “Competitive routing in networks with polynomial costs,” IEEE Transactions on Automatic Control, Vol. 47, No. 1, pp. 92–96, 2002.CrossRefGoogle Scholar
Anastasi, G., Conti, M. and Di Francesco, M., “Data collection in sensor networks with data mules: an integrated simulation analysis,” in Proceedings of IEEE Symposium on Computers and Communications, 2008 (ISCC 2008), Marrakech, Morocco, 2008, pp. 1096–1102.CrossRefGoogle Scholar
Anastasi, G., Conti, M., Di Francesco, M. and Passarella, A., “Energy conservation in wireless sensor networks: a survey,” Ad Hoc Networks, Vol. 7, No. 3, pp. 537–568, 2009.CrossRefGoogle Scholar
Arora, A., Dutta, P., Bapat, S. et al., “A Line in the Sand: a wireless sensor network for target detection, classification, and tracking,” Computer Networks, Vol. 46, No. 5, pp. 605–634, December 2004.CrossRefGoogle Scholar
Au Whitlow, W. L., The Sonar of Dolphins, Springer, ISBN: , 1993.Google Scholar
Awad, M., Wong, K. and Li, Z., “An integrated overview of the open literature’s empirical data on the indoor radiowave channel’s delay properties,” Proceedings of the IEEE Transactions on Antennas and Propagation, Vol. 56, No. 5, May 2008.Google Scholar
Awduche, D. O., “MPLS and traffic engineering in IP networks,” IEEE Communications Magazine, Vol. 37, No. 12, pp. 42–47, Dec. 1999.CrossRefGoogle Scholar
Ayaz, M. and Abdullah, A., “Underwater wireless sensor networks: routing issues and future challenges,” in Proceedings of the 7th ACM International Conference on Advances in Mobile Computing & Multimedia, Kuala Lumpur, Malaysia, pp. 370–375, 2009.Google Scholar
Bachrach, J. and Taylor, C., “Localization in sensor networks,” Handbook of Sensor Networks: Algorithms and Architectures, ISBN: , 2005.CrossRefGoogle Scholar
Bagtzoglou, A. and Novikov, A., “Chaotic behavior and pollution dispersion characteristics in engineered tidal embayments: a numerical investigation,” Journal of American Water Resources Association, Vol. 43, No. 1, pp. 207–219, 2007.CrossRefGoogle Scholar
Bagtzoglou, A. and Novikov, A., “Chaotic behavior and pollution dispersion characteristics in engineered tidal embayments: a numerical investigation,” Journal of American Water Resources Association, Vol. 43, No. 1, pp. 207–219, 2007.CrossRefGoogle Scholar
Bai, X., Yun, Z., Xuan, D., Jia, W. and Zhao, W., “Pattern mutation in wireless sensor deployment,” in Proceedings IEEE International Conference on Computer Communications, 2010, DOI: .
Balister, P., Bollobas, B., Sarkar, A. and Kumar, S., “Reliable density estimates for coverage and connectivity in thin strips of finite length,” in Proceedings of the ACM International Conference on Mobile Computer Networks, pp. 75–86, 2007.
Bao, F., Hu, R., Li, R. and Cheng, L., “Principles and implementation challenges of cooperative transmission for realistic WSNs,” Proceedings of the Second International Conference on Signal Processing Systems (ICSPS), Vol. 2, pp.V2-334–V2-338, 5–7 July 2010.Google Scholar
Barr, R., Bicket, J. C., Dantas, D. S. et al., “On the need for system-level support for ad hoc and sensor networks,” Operating System Review, Vol. 36, No. 2, pp. 1–5, 2002.CrossRefGoogle Scholar
Batalin, M. and Sukhatme, G., “Coverage, exploration and deployment by a mobile robot and communication network,” Telecommunication Systems, Vol. 26, No. 2–4, pp. 181–196, 2004.CrossRefGoogle Scholar
Benini, L. and DeMicheli, G., Dynamic Power Management: Design Techniques and CAD Tools, Norwell, MA: Springer, 1997.Google Scholar
Berg, M., Cheong, O., Kreveld, M. and Overmars, M., Computational Geometry: Algorithms and Applications, 3rd ed. Berlin: Springer-Verlag, 2008.CrossRefGoogle Scholar
Bergamo, P. and Mazzini, G., “Localization in sensor networks with fading and mobility,” in Proceedings of International Symposium on Personal, Indoor and Mobile Radio Networks, pp. 750–754, 2002.
Bhattacharjee, S., Roy, P., Ghosh, S., Misra, S. and Obaidat, M. S., “Wireless sensor network-based fire detection, alarming, monitoring and prevention system for bord-and-pillar coal mines,” Journal of Systems and Software, Vol. 83, No. 3, pp. 571–581, March 2012.CrossRefGoogle Scholar
Bhattacharjee, S., Roy, P., Ghosh, S., Misra, S. and Obaiclat, M. S, “Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines,” Journal of systems and software, Vol. 85 (3), pp. 571–581, March 2012.CrossRefGoogle Scholar
Bhatti, S. and Xu, J., “Survey of target tracking protocols using wireless sensor network,” in Proceedings of International Conference on Wireless and Mobile Communications (ICWMC), Cannes, La Bocca, pp. 110–115, 2009.Google Scholar
Bi, Y., Sun, L., Ma, J., et al., “HUMS: an autonomous moving strategy for mobile sinks in data-gathering sensor networks,” in EURASIP Journal on Wireless Communications and Networking, Vol. 2007, 2007.
Biswas, S. and Momis, R., ExOR: Opportunistic Multihop Routing for Wireless Networks, SIGCOMM’05, Pennsylvania, USA, 2005.CrossRefGoogle Scholar
Blough, D., Leoncini, M., Resta, G. and Santi, P., “On the symmetric range assignment problem in wireless ad hoc networks,” in Proceedings IFIP 17th World Computer Congress/TC1 Stream/2nd IFIP International Conference Theor. Comput. Sci., Found. Inf. Technol. Era Netw. Mobile Comput., pp. 71–82, 2002.
Bojkovic, Z. S., Bakmaz, B. M. and Bakmaz, M. R., “Security issues in wireless sensor networks,” International Journal of Communications, Issue 1, Vol. 2, pp. 108–110, 2008.Google Scholar
Bokareva, T., Hu, W., Kanhere, S. et al., “Wireless sensor networks for battlefield surveillance,” in Proceedings of Land Warfare Conference, Brisbane, October 2006.Google Scholar
Borg, I. and Groenen, P., Modern Multidimensional Scaling, Theory and Applications, 2nd ed. New York: Springer, 2005.Google Scholar
Boudec, J.-Y. L. and Thiran, P., “Network calculus,” in LNCS, Vol. 2050, New York: Springer-Verlag, 2001.Google Scholar
Boudriga, N. and Obaidat, M. S., “Mobility and security issues in wireless ad-hoc sensor networks,” in Proceedings of IEEE Globcom 2005 Conference, 2005.
Boukerche, A., Feng, J., Werner, R., Du, Y. and Huang, Y., “Reconstructing the plenoptic function from wireless multimedia sensor networks,” in Proceedings of 33rd IEEE Conference on Local Computer Networks (LCN), Montreal, Quebec, Canada, pp. 74–81, Oct. 2008.Google Scholar
Boukerche, A., Du, Y., Feng, J. and Pazzi, R., “A reliable synchronous transport protocol for wireless image sensor networks,” in Proceedings of IEEE Symposium on Computers and Communications, ISCC 2008, Marrakech, Morocco, pp. 1083–1089, July 2008.CrossRefGoogle Scholar
Boulis, A. and Srivastava, M., “Node-level energy management for sensor networks in the presence of multiple applications,” in Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom), Dallas, USA, pp. 41–49, 2003.Google Scholar
Braginsky, D. and Estrin, D., “Rumor routing algorithm for sensor networks,” in Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, GA, October 2002.Google Scholar
Bravn, S. and Screenen, C. J., “A new model for updating software in wireless sensor networks,” IEEE Network, Vol. 20, No. 6, pp. 42–47, Nov./Dec. 2006.Google Scholar
Brekhovskikh, L. M., Fundamentals of Ocean Acoustics, 3rd ed. Springer, ISBN: , 2003.Google Scholar
Bulusu, N., Heidemann, J. and Estrin, D., “GPS-less low cost outdoor localization for very small devices,” Computer Science Department, University of Southern California, Technical Report 00–729, Apr. 2000.
Bulusu, N., Heidemann, J. and Estrin, D., “Adaptive beacon placement,” in Proceedings of the 21st International Conference on Distributed Computing Systems, Phoenix, Arizona, April 2001.Google Scholar
Bulusu, N., Bychkovskiy, V., Estrin, D. and Heidemann, J., “Scalable, ad hoc deployable RF-based localization,” in Proceedings of Grace Hopper Celebration of Women in Computing Conference, Vancouver, British Columbia, Canada, 2002.Google Scholar
Burgner, D. E. and Wahsheh, L. A., “Security of wireless sensor networks,” in Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations, pp. 315–320, 2011.
Busse, M., Haenselmann, T. and Effelsberg, W., “TECA: a topology and energy control algorithm for wireless sensor networks,” in International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM ‘06), Torremolinos, Malaga, Spain, ACM, Oct. 2–6, 2006.Google Scholar
Caccamo, M., Zhang, L., Lui, S. and Buttazzo, G., “An implicit prioritized access protocol for wireless sensor networks,” in Proceedings of 23rd IEEE Real-Time Systems Symposium, pp. 39–48, Dec. 2002.
Callaway, Jr E.., Wireless Sensor Networks: Architectures and Protocols, Auerbach Publications, 2003.CrossRefGoogle Scholar
Camp, T., Boleng, J. and Davies, V., “A survey of mobility models for ad hoc network research,” Wireless Communication and Mobile Computing, Vol. 2, No. 5, pp. 483–502, 2002.CrossRefGoogle Scholar
Campbell, J., Gibbons, P. B., Nath, S., et al., “IrisNet: an internet-scale architecture for multimedia sensors,” in Proceedings of the 13th Annual ACM International Conference on Multimedia, New York, USA, pp. 81–88, 2005.CrossRefGoogle Scholar
Cao, H., Parker, K. and Arora, A., “O-MAC: a receiver centric power management protocol,” in Proceedings of the 2006 IEEE International Conference on Network Protocols, pp.  311–332, 2006.
Capkun, S., Hamdi, M. and Hubaux, J., “GPS-free positioning in mobile ad-hoc networks,” in Proceedings of the 34th Annual Hawaii International Conference on System Sciences, pp. 3481–3490, 2001.
Capkun, S., Cagalj, M. and Srivastava, M., “Secure localization with hidden and mobile base stations,” in Proceedings of the 2006 IEEE INFOCOM, 2006.
Carbone, N. M. and Hodgkiss, W. S., “Effects of tidally driven temperature fluctuations on shallow-water acoustic communications at 18 kHz,” IEEE Journal of Oceanic Engineering, Vol. 25, No. 1, pp. 84–94, 2000.CrossRefGoogle Scholar
Cardei, M., Wu, J. and Yang, S., “Topology control in ad hoc wireless networks with hitch-hiking,” in Proceedings of the IEEE Communications Society Conference on Sensory Ad Hoc Communication Networks, pp. 480–488, 2005.
Carman, D. W., Kruus, P. S. and Matt, B. J., “Constraints and approaches for distributed sensor network security,” NAI Labs Tech. Rep. No. 00–010, 2000.
Carman, W., Kruus, P. S. and Matt, B. J., “Constraints and approaches for distributed sensor network security,” Tech. Rep. 00–010, NAI Labs, Network Associates, Inc., Glenwood, MD, 2000.
Caruso, M. J. and Withanawasam, L. S., “Vehicle detection and compass applications using AMR magnetic sensors, AMR sensor documentation,”
Cerasoli, C., “RF propagation in tunnel environments,” in Proceedings IEEE Military Communications Conference, MILCOM’04, Vol. 1, pp. 363–369, Nov. 2004.
Chakrabarti, A., Sabharwal, A. and Aazhang, B., “Using predictable observer mobility for power efficient design of sensor networks,” in Proceedings of the 2nd International Conference on Information Processing in Sensor Networks (IPSN’03), Zhao, F. and Guibas, L., Ed. Berlin, Heidelberg: Springer-Verlag, pp. 129–145, 2003.CrossRefGoogle Scholar
Chalak, A., Misra, S. and Obaidat, M. S., “A cluster-head selection algorithm for wireless sensor networks,” in Proceedings of the 2010 IEEE International Conference on Electronics, Circuits and Systems, ICECS 2010, pp. 130–133, Athens, Greece, Dec. 2010.CrossRefGoogle Scholar
Chandrakasan, A. and Brodersen, R., Low Power CMOS Digital Design, Norwell, MA: Springer, 1996.Google Scholar
Chandrakasan, A., Min, R., Bhardawi, M., Cho, S.-H. and Wang, A., “Power aware wireless microsensor systems,” in Proceedings of the 2002 International European Solid-State Device Research Conference, ESSDERC’02, pp. 47–54, Florence, Italy, 2002.Google Scholar
Chandrasekar, R., Obaidat, M. S., Misra, S. and Peña-Mora, F., “A secure and energy-efficient scheme for group-based routing in heterogeneous ad-hoc sensor networks and its simulation analysis,” SIMULATION: Transactions of the Society for Modeling and Simulation International, Vol. 84, No. 2/3, pp. 131–146, Feb. 2008.Google Scholar
Chang, J. and Tassiulas, L., “Energy conserving routing in wireless ad hoc networks,” in Proceedings of the Nineteenth International Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2000.Google Scholar
Chang, J.-H. and Tassiulas, L., “Maximum lifetime routing in wireless sensor networks,” IEEE/ACM Transactions on Networking, Vol. 12, No. 4, pp. 609–619, Aug. 2004.CrossRefGoogle Scholar
Chang, W.-R., Lin, H.-T. and Cheng, Z.-Z., “CODA: a continuous object detection and tracking algorithm for wireless ad hoc sensor networks,” in Proceedings of IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, pp. 168–174, 2008.CrossRefGoogle Scholar
Chang, X., “Network simulations with OPNET,” in Proceedings of the 1999 Winter Simulation Conference, pp. 307–314, 1999.
Cheekiralla, S. and Engels, D. W., “A functional taxonomy of wireless sensor network devices,” Proceedings of the 2005 International Conference on Broadband Networks Conference, BroadNets 2005, Vol. 2, pp. 949–956, 2005.Google Scholar
Chen, B., Jamieson, K., Balakrishnan, H. and Morris, R., “SPAN: an energy-efficient coordination algorithm for topology maintenance in ad-hoc wireless networks,” Wireless Networks, Vol. 8, No. 5, pp. 481–494, Sep. 2002.CrossRefGoogle Scholar
Chen, W.-P., Hou, J. C. and Sha, L., “Dynamic clustering for acoustic target tracking in wireless sensor networks,” IEEE Transactions on Mobile Computing, Vol. 3, No. 3, pp. 258–271, 2004.CrossRefGoogle Scholar
Chen, Y.-S. and Liao, Y.-J., “HVE-mobicast: a hierarchical-variant-egg-based mobicast routing protocol for wireless sensornets,” in Proceedings of Wireless Communications and Networking Conference (WCNC), Las Vegas, NV, pp. 697–702, 2006.Google Scholar
Chen, B., Jamieson, K., Balakrishnan, H. and Morris, R., “Span: an energy efficient coordination algorithm for topology maintenance in ad-hoc wireless networks,” Mobicom, Rome, Italy, pp. 70–84, July 2001.
Chen, A., Kumar, S. and Lai, T., “Designing localized algorithms for barrier coverage,” in Proceedings ACM International Conference on Mobile Computer Networks, pp. 63–74, 2007.
Chen, S., Yang, G. and Chen, S., “A security routing mechanism against Sybil attack for wireless sensor networks,” in Proceedings of the 2010 International Conference on Communications and Mobile Computing, Vol. 1, pp. 142–146, 2010.
Chen, C. T. and Millero, F. J., “Speed of sound in seawater at high pressures,” Journal of the Acoustical Society of America, Vol. 62, No. 5, pp. 1129–1135, 1977.CrossRefGoogle Scholar
Chen, W., Sun, Y. and Xu, H., “Clustering chain-type topology for wireless underground sensor networks,” in Proceedings of 8th World Congress on Intelligent Control and Automation, Jinan, China, July 6–9 2010.Google Scholar
Cheng, K.-Y., Lui, K.-S. and Tam, V., “Localization in sensor networks with limited number of anchors and clustered placement,” in Proceedings of Wireless Communications and Networking Conference (WCNC), Kowloon, pp. 4425–4429, 2007.Google Scholar
Cheng, S., Li, J. and Horng, G., “An adaptive cluster-based routing mechanism for energy conservation in mobile ad hoc networks,” Personal Communication, June 2012.
Cheng, W., Li, M., Liu, K., et al., “Sweep coverage with mobile sensors,” in Proceedings of the IEEE International Symposium on Parallel Distribution Processes, 2008, DOI: .
Cheong, E., Liebman, J., Liu, J. and Zhao, F., “TinyGALS: a programming model for event-driven embedded systems,” in Proceedings of the 2003 Annual ACM Symposium on Applied Computing, SAC 2003, pp. 698–704, Melbourne, FL, March 2003.Google Scholar
Chiasserini, C. and Magli, E., “Energy consumption and image quality in wireless video-surveillance networks,” in Proceedings of 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 2357–2361, Sept. 2002.
Cho, Y., Bao, L. and Michael, T., “LAAC: a location-aware access control protocol,” in Proceedings of the 2006 Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, pp. 1–7, July 2006.
Chong, C.-Y. and Kumar, S. P., “Sensor networks: evolution, opportunities, and challenges,” Proceedings of IEEE, Vol. 91, No. 8, pp. 1247–1256, 2006.CrossRefGoogle Scholar
Chong, C.-Y. and Kumar, S. P., “Sensor networks: evolution, opportunities, and challenges,” Proceedings of the IEEE, Vol. 91, No. 8, pp. 1247–1256, August 2003.CrossRefGoogle Scholar
Chraibi, Y., “Localization in wireless sensor networks,” Master’s Degree Project, Stockholm, Sweden, 2005.
Chu, M., Haussecker, H. and Zhao, F., “Scalable information-driven sensor querying and routing for ad hoc heterogeneous sensor networks,” in The International Journal of High Performance Computing Applications, Vol. 16, No. 3, pp. 293–313, August 2002.
Clay, C. S. and Medwin, H., Acoustical Oceanography: Principles and Applications. New York: John Wiley & Sons, ISBN: , 1977, pp. 88 and 98–99.Google Scholar
Climent, S., Capella, J. V., Meratnia, N. and Serrano, J. J., “Underwater sensor networks: a new energy efficient and robust architecture,” SENSORS, Vol. 12, pp. 704–731, 2012.CrossRefGoogle ScholarPubMed
Coates, R. F. W., Underwater Acoustic Systems, John Wiley & Sons, ISBN: , 1989.Google Scholar
Conti, M., Di Pietro, R., Mancini, L. V. and Mei, A., “Requirements and open issues in distributed detection of node identity replicas in WSN,” in Proceedings of the 2006 IEEE International Conference on Systems, Man and Cybernetics, pp. 1468–1473, Oct. 2006.
Crossbow, Wireless Sensor Platform, website:
Cruz, R., “A calculus for network delay. I. Network elementsin isolation,” IEEE Transactions on Information Theory, Vol. 37, pp. 114–131, Jan. 1991.CrossRefGoogle Scholar
Cui, J.-H., Kong, J., Gerla, M. and Zhou, S., “Challenges: building scalable mobile underwater wireless sensor networks for aquatic applications,” University of Connecticut, USA, UCONN CSE technical report UbiNET-TR05–02; last update, September 2005.
Cui, J.-H. et al., “Challenges: building scalable mobile underwater wireless sensor networks for aquatic applications,” UCONN CSE technical report UbiNET-TR05–02; last update, Sept. 2005.
Cui, J.-H., Kong, J., Gerla, M. and Zhou, S., “Challenges: building scalable mobile underwater wireless sensor networks for aquatic applications,” IEEE Network, Vol. 20, No. 3, pp. 12–18, 2006.Google Scholar
Dam, T. V. and Langendoen, K., “An adaptive energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of International Conference on Embedded Networked Sensor Systems (SenSys), pp. 171–180, Nov. 2003.
Dargie, W. and Poellabauer, C., Fundamentals of Wireless Sensor Networks: Theory and Practice, John Wiley & Sons, 2010.CrossRefGoogle Scholar
Dargie, W. and Poellabauer, C., Fundamentals of Wireless Sensor Networks, John Wiley & Sons, 2010.CrossRefGoogle Scholar
, 29 Feb. 2012.
Deb, B., Bhatnagar, S. and Nath, B., “A topology discovery algorithm for sensor networks with applications to network management,” Technical Report, Rutgers University, May 2001.
Deb, B., Bhatnagar, S. and Nath, B., “Multi-resolution state retrieval in sensor networks,” in Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 19–29,11 May 2003.
Demirkol, I., Ersoy, C. and Alagöz, F., “MAC protocols for wireless sensor networks: a survey,” IEEE Communications Magazine, Vol. 44, No. 4, pp. 115–121, April 2006.CrossRefGoogle Scholar
Deng, J., Han, Y., Heinzelman, W. and Varshney, P., “Balanced-energy sleep scheduling scheme for high density cluster-based sensor networks,” in Proceedings of the 4th Workshop on Applications and Services in Wireless Networks (ASWN), 2004.
Deng, J., Han, R. and Mishra, S., “Defending against path-based DoS attacks in wireless sensor networks,” in Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005.
Deng, J., Han, R. and Mishra, S., “Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks,” Pervasive and Mobile Computing Journal, Elsevier, Vol. 2, No. 2, pp. 159–186, 2006.CrossRefGoogle Scholar
Denny, M. W., How the Ocean Works: an Introduction to Oceanography, Princeton University Press, ISBN: , 2008.Google Scholar
Dhurandher, S., Misra, S., Obaidat, M. S. and Khairwal, S., “UWSim: a simulator for underwater wireless sensor networks,” Simulation: Transactions of the Society for Modeling and Simulation International, SCS, Vol. 84, No. 7, pp. 327–338, July 2008.CrossRefGoogle Scholar
Dhurandher, S. K., Misra, S., Obaidat, M. S. and Gupta, N., “QDV: a quality-based distance vector routing for wireless sensor networks using ant colony optimization,” in Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications: The First International Workshop in Wireless and Mobile Computing, Networking and Communications (IEEE SecPriWiMob’08), pp. 598–602, Avignon, France, October 12–14, 2008.Google Scholar
Dhurandher, S., Khairwal, S., Obaidat, M. S. and Misra, S., “Efficient data acquisition in underwater wireless sensor ad hoc networks,” IEEE Wireless Communications, Vol. 16, No. 6, pp. 70–78, December 2009.CrossRefGoogle Scholar
Dhurandher, S. K., Misra, S., Obaidat, M. S. and Khairwal, S., “UWSim: a simulator for underwater wireless sensor networks,” Simulation: Transactions of the Society for Modeling and Simulation International, SCS, Vol. 84, No. 7, pp. 327–338, July 2008.CrossRefGoogle Scholar
Dhurandher, S., Obaidat, M. S., Jain, G., Ganesh, I. Mani and Shashidhar, V., “An efficient and secure routing protocol for wireless sensor networks using multicasting,” in Proceedings of the IEEE/ACM International Conference on Green Computing and Communications, Green Com 2010, pp. 374–379, Hangzhou, China, December 2010.Google Scholar
Dhurandher, S. K., Obaidat, M. S., Gupta, D., Gupta, N. and Asthana, A., “Energy efficient routing for wireless sensor networks in urban environments,” in Proceedings of the 2010 Workshop on Web and Pervasive Security (WPS)-GlobCom 2010, Miami, FL, 2010.Google Scholar
Dhurandher, S. K., Khairwal, S., Obaidat, M. S. and Misra, S., “Efficient data acquisition in underwater wireless sensor ad hoc networks,” IEEE Wireless Communications, Vol. 16, No. 6, pp. 70–78, Dec. 2009.CrossRefGoogle Scholar
Dhurandher, S. K., Misra, S., Mittal, H., Agarwal, A. and Woungang, I., “Using ant-based agents for congestion control in ad-hoc wireless sensor networks,” Cluster Computing (Springer), Vol. 14, pp. 41–53, 2011.CrossRefGoogle Scholar
Dhurandher, S., Misra, S., Obaidat, M. S. and Khairwal, S., “UWSim: a simulator for underwater wireless sensor networks,” Simulation: Transactions of the Society for Modeling and Simulation International, SCS, Vol. 84, No. 7, pp. 327–338, July 2008.CrossRefGoogle Scholar
Dhurandher, S. K., Obaidat, M. S. and Gupta, M., “An efficient technique for geocast region holes in underwater sensor networks and its performance evaluation,” Simulation: Modeling Practice and Theory, Elsevier, Vol. 19, No. 9, pp. 2102–2116, Sep. 2011.Google Scholar
Dhurandher, S., Obaidat, M. S., Misra, S. and Khairwal, S., “Efficient data acquisition in underwater wireless sensor ad-hoc networks,” IEEE Wireless Communications, Vol. 16, No. 6, pp. 70–78, Dec. 2009.CrossRefGoogle Scholar
Dhurandher, S., Misra, S., Obaidat, M. S. and Gupta, N., “An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks,” Security and Communications Networks, Wiley, Vol. 2, No. 2, pp. 215–224, March/April, 2009.CrossRefGoogle Scholar
Dhurandher, S., Obaidat, M. S., Jain, G., Ganesh, I. Mani and Shashidhar, V., “An efficient and secure routing protocol for wireless sensor networks using multicasting,” in Proceedings of the IEEE/ACM International Conference on Green Computing and Communications, Green Com 2010, pp. 374–379, Hangzhou, China, Dec. 2010.Google Scholar
Dhurandher, S., Obaidat, M. S., Gupta, D., Gupta, N. and Asthana, A., “Network layer based secure routing protocol for wireless ad hoc sensor networks in urban environments,” in Proceedings of the IEEE ICETE 2010-International Conference on Wireless Information Networks and Systems, WINSYS 2010, pp. 23–30, Athens, Greece, 2010.Google Scholar
Dimitrievski, A., Pejovska, V. and Davcev, D., “Security issues and approaches in WSN,” International Journal of Peer to Peer Networks (IJP2P), Vol. 2, No. 2, pp. 24–42, April 2011.Google Scholar
Dobrescu, R. et al., “Embedding wireless sensors in UPnP services networks,” NAUN International Journal of Communications, Vol. 1, No. 2, pp. 62–67, 2007.Google Scholar
Dorigo, M., Colorni, A. and Maniezzo, V., “The ant system: optimization by a colony of cooperating agents,” IEEE Transactions on System, Man, and Cybernetics–Part B, Vol. 26, No. 1, pp. 1–13, 1996.CrossRefGoogle ScholarPubMed
Dorigo, M., Caro, D. G. and Gambardella, L. M., “Ant algorithms for discrete optimization,” Artificial Life, Vol. 5(2), pp. 137–172, 1999.CrossRefGoogle ScholarPubMed
DS-UWB, website:
DS-UWB, website:
Du, X. and Chen, H.-H., “Security in wireless sensor networks,” IEEE Wireless Communications, Vol. 15, No. 4, pp. 60–66, Aug. 2008.Google Scholar
Duarte, M. and Hu, Y., “Vehicle classification in distributed sensor networks,” Journal of Parallel and Distributed Computing, Vol. 64, No. 7, pp. 826–838, July 2004.CrossRefGoogle Scholar
Dulman, S., Nieberg, T., Wu, J. and Havinga, P., “Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks,” in WCNC Workshop, Vol. 3, pp. 1918–1922, New Orleans, LA, March 2003.Google Scholar
Dunkels, A., Voigt, T., Alonso, J. and Ritter, H., “Distributed TCP caching for wireless sensor networks,” in Proceedings of the Mediterranean Ad Hoc Networking Workshop (MedHoc-Net), June 2004.
Durresia, A., Paruchuri, V. and Barolli, L., “Clustering protocol for sensor networks,” in 20th International Conference, AINA 2006, Vol. 2, pp. 18–20, April 2006.
Dushaw, B. D., Worcester, P. F., Cornuelle, B. D. and Howe, B. M., “On equations for the speed of sound in seawater,” Journal of the Acoustical Society of America, Vol. 93, No. 1, pp. 255–275, 1993.CrossRefGoogle Scholar
Dutta, P. K. and Arora, A. K., “Sensing Civilians, Soldiers, and Cars,” The Ohio State University Department of Computer and Information Science Technical Report OSU-CISRC-12/03-TR66, 2003.
Eddy, W., “A new convex hull algorithm for planar sets,” ACM Transactions on Mathematical Software, Vol. 3, No. 4, pp. 398–403, 1977.CrossRefGoogle Scholar
Ee, C. T. and Bajcsy, R., “Congestion control and fairness for many-to-one routing in sensor networks,” in Proceedings of ACM Sensys’04, Baltimore, MD, Nov. 3–5, 2004, pp. 148–161.Google Scholar
Emslie, A. G., Lagace, R. L. and Strong, P. F., “Theory of the propagation of UHF radio waves in coal mine tunnels,” IEEE Transactions on Antennas and Propagation, Vol. 23, No. 2, pp. 192–205, 1975.CrossRefGoogle Scholar
Enz, C., Scolari, N. and Yodprasit, U., “Ultra low-power radio design for wireless sensor networks,” in Proceedings of the 2005 IEEE International Workshop on Radio-Frequency Integration Technology: Integrated Circuits for Wideband Communication and Wireless Sensor Networks, pp. 1–17, 30 Nov./Dec. 2005.
Erol, M., Vieira, L. F. M. and Gerla, M., “Localization with DiveNRise (DNR) beacons for underwater acoustic sensor networks,” in Proceedings of ACM WUWNet, pp. 97–100, 2007.
Erol-Kantarci, M., Mouftah, H. T. and Oktug, S., “A survey of architectures and localization techniques for underwater acoustic sensor networks,” IEEE Communications Surveys and Tutorials, Vol. 13, No. 3, pp. 487–502, 2011.CrossRefGoogle Scholar
Eschenauer, L. and Gligor, V. D., “A key management scheme for distributed sensor networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47, 2002.
Eschenauer, L. and Giligor, V. D., “A key management scheme for distributed sensor networks,” in Proceedings of the Adaptive Random Key Distribution Schemes for Wireless Sensor Networks, 2002.
Fallon, M. F., Papadopoulos, G., Leonard, J. J. and Patrikalakis, N. M., “Cooperative AUV navigation using a single maneuvering surface craft,” International Journal of Robotics Research, Vol. 29, pp. 1461–1474, 2010.CrossRefGoogle Scholar
Fan, G., Chen, H., Xie, L. and Wang, K., “A hybrid reservation-based MAC protocol for underwater acoustic sensor networks,” Ad Hoc Networks, Vol. 11, No. 3, pp. 1178–1192, 2013.CrossRefGoogle Scholar
Fang, Q., Zhao, F. and Guibas, L., “Lightweight sensing and communication protocols for target enumeration and aggregation,” in Proceedings of the 4th ACM International Symposium on Mobile Ad-hoc Networking and Computing (MOBIHOC), pp. 165–176, 2003.
Feng, W., Code, B., Kaiser, E., Shea, M. and Feng, W., “Panoptes: scalable low-power video sensor networking technologies,” in Proceedings of the Eleventh ACM International Conference on Multimedia, pp. 90–91, Nov. 2003.
Feng, W. C., Kaiser, E. and LeBaillif, M., “Panoptes: scalable low-power video sensor networking technologies,” ACM Transactions on Multimedia Computing, Communications, and Applications, Vol. 1, No. 2, pp. 151–167, May 2005.CrossRefGoogle Scholar
Fitzpatrick, S. and Meertens, L., “Diffusion based localization,” private communication, 2004.
Frank, R., Understanding Smart Sensors, 2nd ed. Norwood, MA: Artech House, 2000.Google Scholar
Franke, A. E., King, T.-J. and Howe, R. T., “Integrated MEMS technologies,” MRS Bulletin, Vol. 26, No. 4, pp. 291–295, 2001.CrossRefGoogle Scholar
Fullmer, C. L. and Garcia-Luna-Aceves, J. J., “Floor acquisition multiple access (FAMA) for packet-radio networks,” in Proceedings of SIGCOMM, pp. 262–273, 1995.
Ganeriwal, S., Kansal, A. and Srivastava, M., “Self aware actuation for fault repair in sensor networks,” in Proceedings IEEE International Conference Robotics and Automation, Vol. 5, pp. 5244–5249, 2004.
Ganeriwal, S., Capkun, S., Han, C. and Srivastava, M., “Secure time synchronization service for sensor networks,” in Proceedings of the ACM Workshop on Wireless Security (WSNA’05), 2005.
García-Hernández, C. F., Ibargüengoytia-González, P. H., García-Hernández, J. and Pérez-Díaz, J. A., “Wireless sensor networks and applications: a survey,” International Journal of Computer Science and Network Security, Vol. 7, No. 3, pp. 264–273, March 2007.Google Scholar
Gerla, M. and Xu, K., “Multimedia streaming in large-scale sensor networks with mobile swarms,” Special Interest Group on Management of Data, Vol. 32, pp. 72–76, 2003.Google Scholar
Ghanbari, M. C., Hughes, J., Sinclair, M. C. and Eade, J. P., Principles of Performance Engineering for Telecommunication and Information Systems, Hertfordshire, United Kingdom: IEE, 1997.CrossRefGoogle Scholar
Ghosh, A., “Estimating coverage holes and enhancing coverage in mixed sensor networks,” in Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN ’04), Washington, DC, USA, 2004, pp. 68–76.CrossRefGoogle Scholar
Giancoli, E., Jabour, F. and Pedroza, A., “CTCP: reliable transport control protocol for sensor networks,” in Proceedings of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Sydney, Australia, December 2008, pp. 493–498.Google Scholar
Girod, B., Aaron, A., Rane, S. and Monedero, D., “Distributed video coding,” Proceedings of the IEEE, Vol. 93, pp. 71–83, 2005.CrossRefGoogle Scholar
Godfrey, B. P. and Ratajczak, D., “Naps: scalable, robust topology management in wireless ad-hoc networks,” ISPN’04, Berkeley, CA, ACM, April 26–27, 2004.Google Scholar
Graham, R. L., “An efficient algorithm for determining the convex hull of a finite planar set,” Information Processing Letters, Vol. 1, pp. 132–133, 1972.CrossRefGoogle Scholar
Granjal, J., Silva, R. and Silva, J., “Security in wireless sensor networks”, CISUC UC, June 2008.Google Scholar
Green, D., “Acoustic modems, navigation aids, and networks for undersea operations,” in Proceedings of IEEE Oceans, Sydney, Australia, pp. 1–6, 2010.Google Scholar
Guangyu, P., Gerla, M. and Hong, X., “LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility,” in Mobile and Ad Hoc Networking and Computing (MobiHOC), Boston, USA, pp. 11–18, Aug. 2000.Google Scholar
Guo, P., Zhu, G. and Fang, L., “An adaptive coverage algorithm for large-scale mobile sensor networks,” Ubiquitous Intelligence and Computing, Lecture Notes in Computer Science, Vol. 4159/2006, pp. 468–477, 2006.CrossRefGoogle Scholar
Gupta, M., Obaidat, M. S. and Dhurandher, S., “Energy-efficient wireless sensor networks,” in Green Information and Communication Systems, Obaidat, M. S., Alagan, A. and Woungang, I., Eds. Elsevier, 2013.Google Scholar
Hadim, S. and Mohamed, N., “Middleware challenges and approaches for wireless sensor networks,” IEEE Distributed Systems Online, Vol. 7, No. 3, pp. 1–13, March 2006.CrossRefGoogle Scholar
Hall, R., “An improved geocast for mobile ad hoc networks,” IEEE Transactions on Mobile Computing, Vol. 10, No. 2, pp. 254–266, Feb. 2011.CrossRefGoogle Scholar
Handcock, R. N., Swain, D. L., Bishop-Hurley, G. J., et al., “Monitoring animal behaviour and environmental interactions using wireless sensor networks, GPS collars and satellite remote sensing,” Sensors, Vol. 9, No. 5, pp. 3586–3603, 2009.CrossRefGoogle ScholarPubMed
He, T., Stankovic, J. A., Chenyang, L. and Abdelzaher, T., “SPEED: a stateless protocol for real-time communication in sensor networks,” in Proceedings of 23rd International Conference on Distributed Computing Systems, pp. 46–55, Providence, RI, May 2003.Google Scholar
He, T., Huang, C., Blum, B. M., Stankovic, J. A. and Abdelzaher, T., “Range-free localization schemes for large scale sensor networks,” in Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, San Diego, California, USA, pp. 81–95, 2003.Google Scholar
Heidemann, J. et al., “Underwater sensor networking: research challenges and potential applications,” USC/ISI technical report ISI-TR-2005–603.
Heidemann, J., Stojanovic, M. and Zorzi, M., “Underwater sensor networks: applications, advances and challenges,” Philosophical Transactions of the Royal Society A, Vol. 370, pp. 158–175, 2012.CrossRefGoogle ScholarPubMed
Heidemann, J., Ye, W., Wills, J., Syed, A. and Li, Y., “Research challenges and applications for underwater sensor networking,” in Proceedings of IEEE Wireless Communication and Networking Conference, Las Vegas, NV, USA, pp. 228–235, 2006.Google Scholar
Heinzelman, W., Chandrakasan, A. and Balakrishnan, H., “Energy-efficient communication protocols for wireless microsensor networks,” in Proceedings of the Hawaii International Conference on Systems Sciences, Vol. 8, Jan. 2000.
Heinzelman, W., Chandrakasan, A. and Balakrishnan, H., “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Hawaii International Conference on System Sciences, Vol. 8, p. 8020, January 2000.
Heinzelman, W., Chandrakasan, A. and Balakrishnan, H., “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, Vol. 1, No. 4, pp. 660–670, Oct. 2002.CrossRefGoogle Scholar
Heinzelman, W., Kulik, J. and Balakrishnan, H., “Adaptive protocols for information dissemination in wireless sensor networks,” in Proceedings of the ACM/IEEE Mobicom Conference (MobiCom ‘99), pp. 174–185, Seattle, WA, August, 1999.Google Scholar
Heinzelman, W., Chandrakasan, A. and Balakrishnan, H., “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS ’00), Vol. 2, p. 10, January 2000.
Heinzelman, W. R., Chandrakasan, A. and Balakrishnan, H., “Energy efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Jan. 4–7, 2000.
Heinzelman, W. B. et al., “Application specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, pp. 660–670, 2002.CrossRefGoogle Scholar
Heinzelman, W. R., Chandrakasan, A. and Balakrishnan, H., “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the Hawaii International Conference on System Sciences, Vol. 2, p. 10, Jan. 2000.
Heinzelman, W. R., Kulik, J. and Balakrishnan, H., “Adaptive protocols for information dissemination in wireless sensor networks,” in Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, pp. 174–185, 1999.
Hengstler, S. and Aghajan, H., “WiSNAP: a wireless image sensor network application platform,” in Proceedings of 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, Barcelona, Spain, pp. 6–12, Mar. 2006.Google Scholar
Hightower, J. and Borriello, G., “Location systems for ubiquitous computing,” in IEEE Computer, Vol. 34, No. 8, pp. 57–66, Aug. 2001.
Hill, J., Szewczyk, R., Woo, A. et al., “System architecture directions for networked sensors,” in Proceedings of the 9th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 93–104, Cambridge, MA, USA, Nov. 2000.Google Scholar
Hill, J., Szewczyk, R., Woo, A. et al., “System architecture directions for network sensors”, in Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), ASPLOS 2000, Cambridge, November 2000.Google Scholar
Hill, J. and Culler, D., “Mica: a wireless platform for deeply embedded networks,” IEEE Micro, Vol. 22, No. 6, pp. 12–24, Nov.–Dec. 2002.CrossRefGoogle Scholar
Hong, X. and Liang, Q., “An access based energy efficient communication protocol for wireless microsensor networks,” in 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2004), Vol. 2, pp. 1022–1026, Sept. 5–8, 2004.
Howard, A., Mataric, M. and Sukhatme, G., “Mobile sensor network deployment using potential fields: a distributed, scalable solution to the area coverage problem,” Distrib. Autonom. Robot. Syst., Vol. 5, pp. 299–308, 2002.Google Scholar
Howard, A. and Mataric, M., “Cover me! A self-deployment algorithm for mobile sensor networks,” in Proceedings of the International Conference on Robotics Automation, Washington, DC, USA, 2002, DOI: .Google Scholar
Howard, A., Mataric, M. J. and Sukhatme, G. S., “Mobile sensor network deployment using potential fields: a distributed, scalable solution to the area coverage problem,” in Proceedings of the 6th International Symposium on Distributed Autonomous Robotics Systems (DARS02), Fukuoka, Japan, June 2002.Google Scholar
Hu, Y.-C., Perrig, A. and Johnson, D. B., “Packet leashes: a defense against wormhole attacks in wireless networks,” in Proceedings of IEEE Infocom, 2003.
Huang, R., Zaruba, G. V. and Huber, M., “Complexity and error propagation of localization using interferometric ranging,” in Proceedings of IEEE International Conference on Communications (ICC), Glasgow, Scotland, pp. 3063–3069, 2007.Google Scholar
Huang, C. and Tseng, Y., “The coverage problem in a wireless sensor network,” Mobile Network Applications, Vol. 10, pp. 519–528, 2005.CrossRefGoogle Scholar
Hui, J. and Culler, D., “The dynamic behavior of a data dissemination protocol for network programming at scale,” in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys), pp. 81–94, 2004.
Hull, B., Jamieson, K. and Balakrishnan, H., “Mitigating congestion in wireless sensor networks,” in Proceedings of ACM Sensys’04, Baltimore, MD, Nov. 3–5, 2004.Google Scholar
Ikeda, M., Kulla, E., Barolli, L. and Takizawa, M., “Wireless ad-hoc networks performance evaluation using NS-2 and NS-3 network simulators,” in Proceedings of the IEEE 2011 International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 40–45, 2011.
Ilyas, M. and Mahgoub, I., Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, Boca Raton, FL: CRC Press, 2004.CrossRefGoogle Scholar
Intanagonwiwat, C., Govindan, R. and Estrin, D., “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” in Proceedings of ACM MobiCom 2000, pp. 56–67, Boston, MA, 2000.Google Scholar
Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J. and Silva, F., “Directed diffusion for wireless sensor networking,” IEEE/ACM Transactions on Networking, Vol. 11, No. 1, pp. 2–16, Feb. 2003.CrossRefGoogle Scholar
Intanagonwiwat, C., Govindan, R. and Estrin, D., “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” in Proceedings of the ACM MobiCom’00, Boston, MA, pp. 56–67, 2000.Google Scholar
Intille, S., “Designing a home of the future,” IEEE Pervasive Computing, Vol. 1, No. 2, pp. 76–82, April 2002.CrossRefGoogle Scholar
Isik, M. T. and Akan, O. B., “A three dimensional localization algorithm for underwater acoustic sensor networks,” IEEE Transactions on Wireless Communications, Vol. 8, No. 9, pp. 4457–4463, 2009.CrossRefGoogle Scholar
Iyer, R. and Kleinrock, L., “QoS control for sensor networks,” in Proceedings of the 2003 IEEE International Conference on Communications, Vol. 1, May 2003.
Iyer, Y. G., Gandham, S. and Venkatesan, S., “STCP: a generic transport layer protocol for wireless sensor networks,” in Proceedings of 14th International Conference on Computer Communications and Networks (ICCCN 05), San Diego, California USA, Oct. 17–19, 2005, pp. 449–454.Google Scholar
Iyer, Y. G., Gandham, S. and Venkatesan, S., “STCP: a generic transport layer protocol for wireless sensor networks,” in Proceedings of IEEE International Conference on Computer Communications and Networks (ICCCN), USA, pp. 449–454, 2005.Google Scholar
Jacobson, V., “Congestion avoidance and control,” in Proceedings on Communications Architectures and Protocols (SIGCOMM ‘88), Cerf, V. (Ed.), ACM, New York, NY, USA, pp. 314–329, 1988.Google Scholar
Jain, R., The Art of Computer Systems Performance Analysis, New York: Wiley, 1991.Google Scholar
Johnson, D. and Maltz, D., “Dynamic source routing in ad hoc wireless networks,” in Mobile Computing, Imelinsky, T. and Korth, H., Eds., Kluwer Academic Publishers, pp. 153–181, 1996.CrossRefGoogle Scholar
Jones, J. and Atiquzzaman, M., “Transport protocols for wireless sensor networks: state-of-the-art and future directions,” International Journal of Distributed Sensor Networks, Vol. 3, No. 1, pp. 119–133, 2007.CrossRefGoogle Scholar
Jun, J. H., Xie, B. and Agrawal, D. P., “Wireless mobile sensor networks: protocols and mobility strategies,” in Guide to Wireless Sensor Networks, Misra, S., Woungang, I. and Misra, S. C., Ed. Springer, 2009, pp. 607–634.CrossRefGoogle Scholar
Juneja, D., Arora, N. and Bansal, S., “An ant-based routing algorithm for detecting attacks in wireless sensor networks,” International Journal of Computational Intelligence Research, Vol. 6, No. 2, pp. 311–330, 2010.Google Scholar
Jurdak, R., Lopes, C. V. and Baldi, P., “Software acoustic modems for short range mote-based underwater sensor networks,” in Proceedings of IEEE Oceans, Singapore, pp. 1–7, May 2006.Google Scholar
Jurdak, R., Aguiar, P. M. Q., Baldi, P. and Lopes, C. V., “Software modems for underwater sensor networks,” in Proceedings of Oceans, pp. 1–6, June 2007.
Jurdak, R., Ruzzelli, A. G., O’Hare, G. M. P. and Lopes, C. V., “Mote-based underwater sensor networks: opportunities, challenges, and guidelines,” Telecommunication System, Vol. 37, No. 1–3, pp. 37–47, 2008.CrossRefGoogle Scholar
Kalita, H. K. and Kar, A., “Simulator based performance analysis of wireless sensor network – a new approach,” in First IEEE International Workshop on Wireless Communication and Networking Technologies for Rural Enrichment, pp. 461–465, 2011.
Kannan, V., and Ahmed, S., “A resource perspective to wireless sensor network security,” in Proceedings of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 94–99, 2011.
Kant, K., Introduction to Computer System Performance Evaluation, New York: McGraw-Hill, 1992.Google Scholar
Karaki, J. N. and Kamal, A. E., “Routing techniques in wireless sensor networks: a survey,” IEEE Wireless Communications, Vol. 11, No. 6, pp. 6–28, Dec. 2004.CrossRefGoogle Scholar
Karlof, C. and Wagner, D., “Secure routing in wireless sensor networks: attacks and countermeasures,” AdHoc Networks (Elsevier), Vol. 1, pp. 299–302, 2003.Google Scholar
Karlof, C., Sastry, N. and Wagner, D., “Tinysec: a link layer security architecture for wireless sensor networks,” in Second ACM Conference on Embedded Networked Sensor Systems (SensSys 2004), Nov. 2004.
Karlof, C. and Wagner, D., “Secure routing in wireless sensor networks: attacks and countermeasures,” Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, in First IEEE International Workshop on Sensor Network Protocols and Applications, University of California at Berkeley, Berkeley, USA, 2003.Google Scholar
Karn, P., “MACA – a new channel access method for packet radio,” in Proceedings of the 9th ARRL Computer Networking Conference, London, Ontario, Canada, 1990.Google Scholar
Karp, B. and Kung, H. T., “GPSR: greedy perimeter stateless routing for wireless sensor networks,” in Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom ‘00), Boston, MA, Aug. 2000.Google Scholar
Kavitha, T. and Sridharan, D., “Security vulnerabilities in wireless sensor networks: a survey,” Journal of Information Assurance and Security, Vol. 5, No. 1, pp. 31–44, 2010.Google Scholar
Kay, S. M., Fundamentals of Statistical Signal Processing: Estimation Theory. Upper Saddle River, New Jersey: Prentice-Hall, 1993.Google Scholar
Kim, S., Pakzad, S., Culler, D., et al., “Health monitoring of civil infrastructures using wireless sensor networks,” in Proceedings of Information Processing in Sensor Networks (IPSN), pp. 254–263, 2007.
Kim, J., Kim, S., Kim, D. and Lee, W., “Low-energy efficient clustering protocol for ad-hoc wireless sensor network,” in 15th International Symposium on Personal, Indoor and Mobile Radio Communications, 2004 (PIMRC 2004), Vol. 2, pp. 1022–1026, Sept. 5–8, 2004.
Kirousis, L., Kranakis, E., Krizanc, D. and Pelc, A., Power Consumption in Packet Radio Networks STACS 97, vol. 1200. Berlin: Springer-Verlag, 1997, pp. 363–374.Google Scholar
Kong, J. et al., “Building underwater ad-hoc networks and sensor networks for large scale real-time aquatic application,” Proceedings IEEE MILCOM, 2005.Google Scholar
Kong, J., Cui, J.-H., Wu, D. and Gerla, M., “Building underwater ad-hoc networks and sensor networks for large scale real-time aquatic applications,” in Proceedings of IEEE Military Communication Conference, Atlantic City, NJ, USA, pp. 1535–1541, 2005.Google Scholar
Kraub, C., Schneider, M. and Eckert, C., “Defending against false endorsement-based DoS attacks in wireless sensor networks,” in Proceedings of the 1st ACM Conference on Wireless Network Security, 2008.
Kraub, C., Schneider, M. and Eckert, C., “An enhanced scheme to defend against false-endorsement-based DoS attacks in WSNs,” in Proceedings of the IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, 2008.
Kredo, K. and Mohapatra, P., “Medium access control in wireless sensor networks,” in Computer Networks Journal, Vol. 51, pp. 961–994, 2007.
Kredo, K., Djukic, P. and Mohapatra, P., “STUMP: exploiting position diversity in the staggered TDMA underwater MAC protocol,” in Proceedings of IEEE INFOCOM Mini-Conference, Rio de Janeiro, Brazil, pp. 2961–2965, 2009.Google Scholar
Kredo, K. and Mohapatra, P., “Medium access control in wireless sensor networks,” Computer Networks (Elsevier), Vol. 51, No. 4, March 2007.CrossRefGoogle Scholar
Krishnamurthi, N. and Yang, S. J., “Feasibility and performance analysis of sensor modeling in OPNET,” in Online Proceedings of OPNETWORK 2007, Washington, DC, Aug. 2007.Google Scholar
Kuhn, F., Wattenhofer, R. and Zollinger, A., “Worst-case optimal and average-case efficient geometric ad-hoc routing,” in Proceedings of the 4th ACM International Conference on Mobile Computing and Networking, pp. 267–278, 2003.
Kulik, J., Heinzelman, W. R. and Balakrishnan, H., “Negotiation-based protocols for disseminating information in wireless sensor networks,” Wireless Networks, Vol. 8, No. 2–3, pp. 169–185, March/May 2002.CrossRefGoogle Scholar
Kulik, J., Heinzelman, W. and Balakrishnan, H., “Negotiation-based protocols for disseminating information in wireless sensor networks,” Wireless Networks, Vol. 8, pp. 169–185, 2002.CrossRefGoogle Scholar
Kulkarni, P., Ganesan, D., Shenoy, P. and Lu, Q., “SensEye: a multi-tier camera sensor network,” in Proceedings of the 13th Annual ACM International Conference on Multimedia, New York, USA, pp. 229–238, 2005.CrossRefGoogle Scholar
Kumar, D., Aseri, T. C. and Patel, R. B., “EEHC: energy efficient heterogeneous clustered scheme for wireless sensor networks,” Computer Communications, Vol. 32, issue 4, pp. 662–667, March 2009.CrossRefGoogle Scholar
Kumar, S., Lai, T. and Arora, A., “Barrier coverage with wireless sensors,” in Proceedings of the ACM International Conference on Mobile Computer Networks, pp. 284–298, 2005.
Lambrou, T. P. and Panayiotou, C. G., “Collaborative area monitoring using wireless sensor networks with stationary and mobile nodes,” EURASIP Journal on Advances in Signal Processing, Vol. 2009, 2009.CrossRefGoogle Scholar
Langendoen, K. and Reijers, N., “Distributed localization in wireless sensor networks: a quantitative comparison,” Computer Networks, Vol. 43, pp. 499–518, 2003.CrossRefGoogle Scholar
Lazos, L., Capkun, S. and Poovendran, R., “ROPE: robust position estimation in wireless sensor network,” in Proceedings of the Fourth International Conference on Information Processing in Sensor Networks (IPSN’ 05), 2005.
Lecuire, V., Faundez, C. D. and Krommenacker, N., “Energy-efficient image transmission in sensor networks,” International Journal of Sensor Networks, Vol. 4, pp. 37–47, 2008.CrossRefGoogle Scholar
Lee, J. C. et al., “Key management issues in wireless sensor networks: current proposals and future developments,” IEEE Wireless Communications, Vol. 14, No. 5, pp. 76–84, Oct. 2007.CrossRefGoogle Scholar
Lee, H. J. et al., “Centroid-based movement assisted sensor deployment schemes in wireless sensor networks,” in Proceedings of the 70th IEEE Vehicular Technology Conference Fall (VTC 2009-Fall), Anchorage, Alaska, USA, Sep. 2009.Google Scholar
Leung, S., Gomez, W. and Kim, J. J., “Zigbee mesh network simulation using Opnet and study of routing selection,” ENSC 427: Communication Networks, final project, 2009.
Levis, P. and Culler, D., “Mote: a tiny virtual machine for sensor networks,” in Proceedings of the 2002 International Conference on Architectural Support for Programming Languages and Operating Systems, ASLOS’2002, pp. 85–95, San Jose, CA, 2002.Google Scholar
Levis, P., Patel, N., Culler, D. and Shenker, S., “Trickle: a self regulating algorithm for code propagation and maintenance in wireless sensor networks,” in Proceedings of the 1st USENIX/ACM Symposium on Networked Systems Design and Implementation, pp. 15–28, 2004.
Levis, P., Patel, N., Culler, D. and Shenker, S., “Trickle: a self regulating algorithm for code propagation and maintenance in wireless sensor networks,” in Proceedings of 1st Symposium on Networked Systems Design and Implementation, San Francisco, CA, Mar. 29–31, 2004.Google Scholar
Li, L. and Halpern, J. Y., “Minimum-energy mobile wireless networks revisited,” in IEEE International Conference on Communications (ICC) 2001, Vol. 1, pp. 278–283, 2001.
Li, Q., Aslam, J. and Rus, D., “Hierarchical power-aware routing in sensor networks,” in Proceedings of the DIMACS Workshop on Pervasive Networking, May 2001.
Li, B. M., Li, Z. and Vasilakos, A. V., “A survey on topology control in wireless sensor networks: taxonomy, comparative study, and open issues,” Proceedings of the IEEE, Vol. 25, No. 10, pp. 2367–2380, 2013.Google Scholar
Li, N., Hou, J. and Sha, L., “Design and analysis of an MST-based topology control algorithm,” IEEE Transactions on Wireless Communications, Vol. 4, No. 3, pp. 1195–1206, May 2005.Google Scholar
Li, Z., Dehaene, W. and Gielen, G., “A 3-tier UWB-based indoor localization system for ultra-low-power sensor networks,” IEEE Transactions on Wireless Communications, Vol. 8, No. 6, pp. 2813–2818, June 2009.Google Scholar
Li, C., Wang, P., Chen, H.-H. and Guizani, M., “A cluster based on-demand multi-channel MAC protocol for wireless multimedia sensor networks,” in Proceedings of IEEE International Conference on Communications, Beijing, China, pp. 2371–2376, May 2008.Google Scholar
Li, S., Neelisetti, R., Liu, C. and Lim, A., “Delay-constrained high throughput protocol for multi-path transmission over wireless multimedia sensor networks,” in International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Newport Beach, USA, pp. 1–8, June 2008.Google Scholar
Li, S., Lim, A., Kulkarni, S. and Liu, C., “EDGE: a routing algorithm for maximizing throughput and minimizing delay in wireless sensor networks,” in Proceedings of the 26th Military Communications Conference (MILCOM’07), Oct. 2007.
Li, M. and Liu, Y., “Underground structure monitoring with wireless sensor networks,” in 6th International Symposium on Information Processing in Sensor Networks (ISPN), 2007.
Liao, P.-K., Chang, M.-K. and Kuo, C., “Contour line extraction with wireless sensor networks,” Proceedings of the 2005 IEEE International Conference on Communications, ICC 2005, Vol. 5, pp. 3202–3206, May 2005.CrossRefGoogle Scholar
Lilja, D. J., Measuring Computer Performance, Cambridge: Cambridge University Press, 2000.CrossRefGoogle Scholar
Lim, H. and Hou, J. C., “Localization for anisotropic sensor networks,” in Proceedings of INFOCOM, Vol. 1, pp. 138–149, 2005.
Lin, S., Zhang, J., Zhou, G. et al., “ATPC: adaptive transmission power control for wireless sensor networks,” in Proceedings of the ACM International Conference on Embedded Network Sensor Systems, 2006, DOI: .
Lin, P., Qiao, C. and Wang, X., “Medium access control with a dynamic duty cycle for sensor networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Vol. 3, pp. 1534–1539, March 2004.
Lin, W., Li, D., Tan, Y., Chen, J. and Sun, T., “Architecture of underwater acoustic sensor networks: a survey,” in Proceedings of Intelligent Networks and Intelligent Systems, pp. 155–159, 2008.
Lindsey, S. and Raghavendra, C., “PEGASIS: power-efficient gathering in sensor information systems,” IEEE Aerospace Conference Proceedings, Vol. 3, pp. 1125–1130, 2002.Google Scholar
Lindsey, S. and Raghavendra, C. S., “PEGASIS: power-efficient gathering in sensor information systems,” in IEEE Aerospace Conference Proceedings, 2002.
Liu, Y., Elhanany, I. and Qi, H., “An energy-efficient QoS-aware media access control protocol for wireless sensor networks,” in Proceedings of IEEE MASS 2005.
Liu, B. and Towsley, D., “A study of the coverage of large-scale sensor networks,” in Proceedings of the IEEE International Conference on Mobile Ad-Hoc Sensor Systems, pp. 475–483, 2004.
Liu, B., Dousse, O., Wang, J. and Saipulla, A., “Strong barrier coverage of wireless sensor networks,” in Proceedings ACM International Symposium on Mobile Ad Hoc Network Computers, pp. 411–420, 2008.
Liu, J. and Li, B., “Mobilegrid: capacity-aware topology control in mobile ad hoc networks,” in Proceedings of the 11th International Conference Computer Communications Networks, pp. 570–574, 2002.
Liu, X., Wang, Q., Sha, L. and He, W., “Optimal QoS sampling frequency assignment for real-time wireless sensor networks,” in Proceedings of 24th IEEE Real-Time Systems Symposium, pp. 308–319, Dec. 2003.
Lu, G., Krishnamachari, B. and Raghavendra, C., “An adaptive energy-efficient and low-latency MAC for data gathering in sensor networks,” in Proceedings of the Fourth International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (WMAN), 2004.
Lu, K. et al., “A framework for a distributed key management scheme in heterogeneous wireless sensor networks,” IEEE Transactions on Wireless Communications, Vol. 7, No. 2, pp. 639–647, Feb. 2008.Google Scholar
Lu, S., Bharghavan, V. and Srikant, R., “Fair scheduling in wireless packet networks,” IEEE/ACM Trans. Network, Vol. 7, pp. 473–489, Aug. 1999.Google Scholar
Luby, M., Mitzenmacher, M., Shokrollahi, A., Spielman, D. and Stemann, V., “Practical loss-resilient codes,” in Proceedings of ACM Symposium on Theory of Computing, pp. 150–159, 1997.
Luo, J. and Hubaux, J. P., “Joint mobility and routing for lifetime elongation in wireless sensor networks,” in Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM, 2005), Miami, FL, USA, Vol. 3, 2005, pp. 1735–1746.Google Scholar
Mackenzie, K. V., “Discussion of sea water sound-speed determinations,” Journal of the Acoustical Society of America, Vol. 70, No. 3, pp. 801–806, 1981.CrossRefGoogle Scholar
MacRuairi, R., Keane, M. T. and Coleman, G., “A wireless sensor network application requirements taxonomy,” in 2008 IEEE International Conference on Sensor Technologies and Applications, IEEE Computer Society, pp. 209–216, 2008.
Maimour, M., Pham, C. and Amelot, J., “Load repartition for congestion control in multimedia wireless sensor networks with multipath routing,” in Proceedings of 3rd International Symposium on Wireless Pervasive Computing, ISWPC, pp. 11–15, Oct. 2008.
Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D., and Anderson, J., “Wireless sensor networks for habitat monitoring,” in Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous’05, pp. 479–481, July 2005.
Mainwaring, J., Polastre, R., Szewczyk, R., Culler, D. and Anderson, J., “Wireless sensor networks for habitat monitoring,” in Proceedings of 2002 ACM International Workshop on Wireless Sensor Networks and Applications, pp. 88–97, Sept. 2002.
Malan, D., Fulford-Jones, T., Welsh, M. and Moulton, S., “Codeblue: an ad hoc sensor network infrastructure for emergency medical care,” in Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks, 2004.
Mamun, Q., Ramakrishnan, S. and Srinivasan, B., “Multi-chain oriented logical topology for wireless sensor networks,” in 2nd International Conference, Computer Engineering and Technology (ICCET), April 16–18, 2010.
Manjeshwar, A. and Agarwal, D. P., “TEEN: a routing protocol for enhanced efficiency in wireless sensor networks,” in Proceedings of the 15th International Workshop on Parallel and Distributed Computing: Issues in Wireless Networks and Mobile Computing, pp. 2009–2015, April 2001.
Manjeshwar, A. and Agarwal, D. P., “APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks,” in Proceedings of the 2002 International Parallel and Distributed Processing Symposium, IPDPS, pp. 195–202, 2002.
Mansouri, V., MohammadNia-Awal, M., Ghiassi-Farrokhfal, Y. and Khalaj, B., “Dynamic scheduling MAC protocol for large scale sensor networks,” in Proceedings of the 2005 IEEE Mobile Adhoc and Sensor Systems Conference, Nov. 2005.
Mao, G., Fidan, B. and Anderson, B. D. O., “Wireless sensor network localization techniques,” Computer Networks, Vol. 51, No. 10, pp. 2529–2553, 2007.CrossRefGoogle Scholar
Marco, A., Casas, R., Sevillano, J. L. et al., “Synchronization of multi-hop wireless sensor networks at the application layer,” IEEE Wireless Communications, Vol. 18, No. 1, pp. 82–88, Feb. 2011.CrossRefGoogle Scholar
Marghescu, C., Pantazica, M., Brodeala, A. and Svasta, P., “Simulation of a wireless sensor network using OPNET,” in Proceedings of the 2011 IEEE International Symposium for Design and Technology in Electronic Packaging (SIITME 2011), pp. 249–252, 2011.
Marina, M. and Das, S., “Routing performance in the presence of unidirectional links in multihop wireless networks,” in Proceedings of the ACM International Symposium on Mobile Ad Hoc Network Computing, pp. 12–23, 2002.
Maroti, M., Kusy, B., Balogh, G., et al., “Radio interferometric geolocation,” in Proceedings of International Conference on Embedded Networked Sensor Systems (SenSys), pp. 1–12, 2005.
MBOFDM-UWB, website:
Mehmet, L. L., Vurany, C. and Akyildiz, I. F.Characteristics of underground channel for wireless underground sensor networks,” Physical Communication, Vol. 2, No. 3, pp. 167–183, Sept. 2009.Google Scholar
Melodia, T., Kulhandjian, H., Kuo, L. C. and Demirors, E., “Advances in underwater acoustic networking,” in Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition, Basangni, S. et al., Ed. John Wiley & Sons, 2013, pp. 804–852.CrossRefGoogle Scholar
Mendes, L. D. P. and Rodrigues, J. J. P. C., “A survey on cross-layer solutions for wireless sensor networks,” Journal of Network and Computer Applications, Vol. 34, No. 2, pp. 523–534, 2011.CrossRefGoogle Scholar
Methley, S., Essentials of Wireless Mesh Networking, Cambridge University Press, 2009.CrossRefGoogle Scholar
Michel, J., “Assessment and recovery of submerged oil: current state analysis,” Research & Development Center, U.S. Coast Guard, 2006; (accessed May 10, 2008).
Misra, S., Abraham, K., Obaidat, M. S. and Krishna, P., “LAID: a learning automata based scheme for intrusion detection in wireless sensor networks,” Security and Communications Networks, Wiley, Vol. 2, No. 2, pp. 105–115, March/April 2009.CrossRefGoogle Scholar
Misra, S., Obaidat, M. S., Sanchita, S. and Mohanta, D., “An energy-efficient, and secured routing protocol for wireless sensor networks,” in Proceedings of the 2009 SCS/IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2009, pp. 185–192, Istanbul, Turkey, July 2009.Google Scholar
Misra, S., Abraham, K. I., Obaidat, M. S. and Krishna, P. V., “Intrusion detection in wireless sensor networks: the S-model learning automata approach,” in Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications: The First International Workshop in Wireless and Mobile Computing, Networking and Communications (IEEE SecPriWiMob’08), pp. 603–607, Avignon, France, October 12–14, 2008.Google Scholar
Misra, S., Tiwari, V. and Obaidat, M. S., “Adaptive learning solution for congestion avoidance in wireless sensor networks,” in Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, pp. 478–484, Rabat, Morocco, May 2009.CrossRefGoogle Scholar
Misra, S., Tiwari, V. and Obaidat, M. S., “LACAS: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks,” IEEE Journal on Selected Area on Communications (JSAC), Vol. 27, No. 4, pp. 466–479, May 2009.CrossRefGoogle Scholar
Misra, S., Kumar, M. P. and Obaidat, M. S., “Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks,” Computer Communication Journal, Elsevier, Vol. 34, No. 12, pp. 1484–1496, 2011.CrossRefGoogle Scholar
Misra, S., Tiwari, V. and Obaidat, M. S., “LACAS: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks,” IEEE Journal on Selected Areas in Communications, Vol. 27, No. 4, pp. 466–479, May 2009.CrossRefGoogle Scholar
Misra, S. and Khatua, M., “Cross-layer techniques and applications in wireless sensor networks,” in Rashvand, H. and Kavian, Y. (Eds.), Using Cross-Layer Techniques for Communication Systems, pp. 94–119, 2012, Hershey, PA: Information Science Reference. .CrossRefGoogle Scholar
Misra, S. and Singh, S., “Localized policy-based target tracking using wireless sensor networks,” ACM Transactions on Sensor Networks, Vol. 8, No. 3, pp. 27:1–27:30, 2012.CrossRefGoogle Scholar
Misra, S., Woungang, I. and Misra, S. C., Guide to Wireless Sensor Networks, London: Springer-Verlag, 2009.CrossRefGoogle Scholar
Misra, S., Tiwari, V. and Obaidat, M. S., “LACAS: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks,” IEEE Journal on Selected Area on Communications (JSAC), Vol. 27, No. 4, pp. 466–479, May 2009.CrossRefGoogle Scholar
Misra, S. and Obaidat, M. S., “Fire monitoring and alarm system for underground coal mines bord-and-pillar panel using wireless sensor networks,” Journal of Systems and Software, Vol. 85, No. 3, pp. 571–581, 2012.Google Scholar
Misra, S., Abraham, K., Obaidat, M. S. and Krishna, P., “LAID: a learning automata based scheme for intrusion detection in wireless sensor networks,” Security and Communications Networks, Wiley, Vol. 2, No. 2, pp. 105–115, March/April, 2009.CrossRefGoogle Scholar
Misra, S., Dash, S., Khatua, M., Vasilakos, A. V. and Obaidat, M. S., “Jamming in underwater sensor networks: detection and mitigation,” IET Communications, Vol. 6, No. 14, pp. 2178–2188, 2012.CrossRefGoogle Scholar
Misra, S., Ghosh, A., Sagar, A. and Obaidat, M. S., “Detection of identity-based attacks in wireless sensor networks using signalprints,” in 2010 IEEE GlobCom 2010 Workshop on Web and Pervasive Security (WPS), Miami, FL, Dec. 2010.Google Scholar
Misra, S., Obaidat, M. S., Sanchita, S. and Mohanta, D., “An energy-efficient, and secured routing protocol for wireless sensor networks,” in Proceedings of the 2009 SCS/IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2009, pp. 185–192, Istanbul, Turkey, July 2009.Google Scholar
Misra, S., Abraham, K. I., Obaidat, M. S. and Krishna, P. V., “Intrusion detection in wireless sensor networks: the S-model learning automata approach,” in Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications: The First International Workshop in Wireless and Mobile Computing, Networking and Communications (IEEE SecPriWiMob’08), pp. 603–607, Avignon, France, Oct. 12–14, 2008.Google Scholar
Misra, S. and Ghosh, A. A., “The effects of variable sound speed on localization in underwater sensor networks,” in Proceedings of Australasian Telecommunication Networks and Applications Conference, pp. 1–4, 2011.
Misra, S. and Khatua, M., “Cross-layer techniques and applications in wireless sensor networks,” in Using Cross-Layer Techniques for Communication Systems, Rashvand, H. F. and Kavian, Y. S., Ed. USA: IGI Global, 2012, pp. 94–119.CrossRefGoogle Scholar
Molins, M. and Stojanovic, M., “Slotted FAMA: a MAC protocol for underwater acoustic networks,” in Proceedings of IEEE Oceans, pp. 1–6, 2006.
Moore, D., Leonard, J., Rus, D. and Teller, S., “Robust distributed network localization with noisy range measurements,” in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, pp. 50–61, 2004.CrossRefGoogle Scholar
Nancharaiah, B., Sudha, G. F. and Murthy, M. B. R., “A scheme for efficient topology management of wireless ad hoc networks using the MARI algorithm,” in 16th IEEE International Conference on Networks, ICON 2008, Dec. 12–14, 2008.
Narayanaswamy, S., Kawadia, V., Sreenivas, R. and Kumar, P., “Power control in ad-hoc networks: theory, architecture, algorithm and implementation of the COMPOW protocol,” in Proceedings of the European Wireless Conference, 2002. [Online.] Available: .
Nath, S., Ke, Y., Gibbons, P. B., Karp, B. and Seshan, S., “A distributed filtering architecture for multimedia sensors technical report IRP-TR-04–16,” in First Workshop on Broadband Advanced Sensor Networks (BaseNets), Aug. 2004.
Nicopolitidis, P., Obaidat, M. S., Papadimitriou, G. I. and Pomportsis, A. S., Wireless Networks, John Wiley & Sons, 2003.Google Scholar
Nicopolitidis, P., Obaidat, M. S. and Papadimitriou, G., Wireless Networks, Wiley, 2003.Google Scholar
Nicopolitidis, P., Obaidat, M. S. and Papadimitriou, G. I., Wireless Networks, John Wiley & Sons, 2003.Google Scholar
Niculescu, D. and Nath, B., “Trajectory-based forwarding and its applications,” in Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom), 2003.
Niculescu, D. and Nath, B., “Ad hoc positioning system (APS) using AoA,” in Proceedings of INFOCOM, pp. 1734–1743, 2003.
Nieberg, T., Dulman, S., Havinga, P., van Hoesel, L. and Wu, J., “Collaborative algorithms for communication in wireless sensor networks,” in Workshop on European Research on Middleware and Architectures for Complex and Embedded Systems, Pisa, Italy, April 2003.Google Scholar
Niu, X., Huang, X., Zhao, Z., et al., “The design and evaluation of a wireless sensor network for mine safety monitoring,” in Global Telecommunications Conference, 2007, GLOBECOM’07 IEEE, 2007.
Noh, Y., Lee, U., Wang, P., Choi, B. S. C. and Gerla, M., “VAPR: void-aware pressure routing for underwater sensor networks,” IEEE Transactions on Mobile Computing, Vol. 12, No. 5, pp. 895–908, 2013.CrossRefGoogle Scholar
Novikov, A. and Bagtzoglou, A., “Hydrodynamic model of the lower Hudson River estuarine system and its application for water quality management,” Water Resources Management, Vol. 20, No. 2, pp. 257–276, 2006.CrossRefGoogle Scholar
Novikov, A. and Bagtzoglou, A., “Hydrodynamic model of the lower Hudson River estuarine system and its application for water quality management,” Water Resources Management, Vol. 20, No. 2, pp. 257–276, 2006.CrossRefGoogle Scholar
Obaidat, M. S., Nicopolitidis, P. and Li, J.-S., “Security in wireless sensor networks,” Security and Communications Networks, Wiley, Vol. 2, No. 2, pp. 101–103, March/April 2009.CrossRefGoogle Scholar
Obaidat, M. S., “On the characterization of ultrasonic transducers using pattern recognition techniques,” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 23, No. 5, pp. 1443–1450, Sep./Oct. 1993.CrossRefGoogle Scholar
Obaidat, M. S. and Ekis, J. W., “An automated system for characterizing ultrasonic transducers using pattern recognition,” IEEE Transactions on Instrumentation and Measurement, Vol. 40, No. 5, pp. 847–850, October 1991.CrossRefGoogle Scholar
Obaidat, M. S. and Abu-Saymeh, D. S., “Methodologies for characterizing ultrasonic transducers using neural network paradigms,” IEEE Transactions on Industrial Electronics, Vol. 39, No. 6, pp. 529–536, Dec. 1992.CrossRefGoogle Scholar
Obaidat, M. S., Khalid, H. and Sadoun, B., “Ultrasonic transducers characterization by neural networks,” Information Sciences Journal, Elsevier, Vol. 107, No. 1–4, pp. 195–215, June 1998.CrossRefGoogle Scholar
Obaidat, M. S. and Khalid, H., “Performance evaluation of neural network paradigms for ultrasonic transducers characterization,” in Proceedings of the IEEE International Conference on Electronics, Circuits and Systems, pp. 370–376, Dec. 1995.
Obaidat, M. S. and Abu-Saymeh, D. S., “Performance comparison of neural networks and pattern recognition techniques for classifying ultrasonic transducers,” in Proceedings of the 1992 ACM Symposium on Applied Computing, pp. 1234–1242, Kansas City, MO, March 1992.Google Scholar
Obaidat, M. S. and Abu-Saymeh, D. S., “Neural network and pattern recognition techniques for characterizing ultrasonic transducers,” in Proceedings of the 1992 IEEE Phoenix Conference on Computers and Communications, pp. 729–735, April 1992.
Obaidat, M. S. and Boudriga, N., Security of e-Systems and Computer Networks, Cambridge University Press, 2007.CrossRefGoogle Scholar
Obaidat, M. S., Fundamentals of Performance Evaluation of Computer and Telecommunication Systems, Wiley, 2010.CrossRefGoogle Scholar
Obaidat, M. S. and Papadimitriou, G. I., Eds., Applied System Simulation: Methodologies and Applications, Springer, 2003.CrossRef
Obaidat, M. S., “Advances in performance evaluation of computer and telecommunications networking,” Computer Communication Journal, Elsevier, Vol. 25, Nos. 11–12, pp. 993–996, 2002.CrossRefGoogle Scholar
Obaidat, M. S., “ATM systems and networks: basics issues, and performance modeling and simulation,” Simulation: Transactions of the Society for Modeling and Simulation International, SCS, Vol. 78, No. 3, pp. 127–138, 2003.CrossRefGoogle Scholar
Obaidat, M. S., “Performance evaluation of telecommunication systems: models issues and applications,” Computer Communications Journal, Elsevier, Vol. 34, No. 9, pp. 753–756, 2003.Google Scholar
Obaidat, M. S. and Boudriga, N., Security of e-Systems and Computer Networks, Cambridge University Press, 2007.CrossRefGoogle Scholar
Obaidat, M. S. and Boudriga, N., Fundamentals of Performance Evaluation of Computer and Telecommunication Systems, Wiley, 2010.CrossRefGoogle Scholar
Obaidat, M. S., Alagan, A. and Woungang, I., Eds., Handbook of Green Information and Communications Systems, Elsevier, 2013.
Obaidat, M. S., Nicopolitidis, P. and Li, J.-S., “Security in wireless sensor networks,” Security and Communications Networks, Wiley, Vol. 2, No. 2, pp. 101–103, March/April, 2009.CrossRefGoogle Scholar
Obaidat, M. S. and Boudriga, N., Security of e-Systems and Computer Networks, Cambridge University Press, 2007.CrossRefGoogle Scholar
Ojha, T. and Misra, S., “HASL: high-speed AUV-based silent localization for underwater sensor networks,” in Proceedings of the International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, LNICST 115, pp. 128–140, Greater Noida, India, 2013.CrossRefGoogle Scholar
Ojha, T. and Misra, S., “MobiL: a 3-dimensional localization scheme for mobile underwater sensor networks,” in Proceedings of National Conference on Communications (NCC), pp. 1–5, New Delhi, India, 2013.Google Scholar
Ojha, T., Khatua, M. and Misra, S., “Tic-tac-toe-arch: a self-organizing virtual architecture for underwater sensor networks,” IET Wireless Sensor Systems, Vol. 3, No. 4, pp. 307–316, Dec. 2013.CrossRefGoogle Scholar
Ojha, T. and Misra, S., “HASL: high-speed AUV-based silent localization for underwater sensor networks,” in Proceedings of the International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, LNICST 115, Greater Noida, India, pp. 128–140, 2013.CrossRefGoogle Scholar
Ojha, T. and Misra, S., “MobiL: a 3-dimensional localization scheme for mobile underwater sensor networks,” in Proceedings of National Conference on Communications, New Delhi, India, pp. 1–5, 2013.Google Scholar
Padmavathi, G. and Shanmugapriya, D., “A survey of attacks, security mechanisms and challenges in wireless sensor networks,” International Journal of Computer Science and Information Security (IJCSIS), Vol. 4, Nos. 1 & 2, pp. 1–9, 2009.Google Scholar
Padmavathi, G. and Shanmugapriya, D., “A survey of attacks, security mechanisms and challenges in wireless sensor networks,” International Journal of Computer Science and Information Security, Vol. 4, Nos. 1 & 2, 2009.Google Scholar
Paduan, J. B., Caress, D. W., Clague, D. A., Paull, C. K. and Thomas, H., “High-resolution mapping of mass wasting, tectonic, and volcanic hazards using the MBARI mapping AUV,” in International Conference on Seafloor Mapping for Geohazard Assessment, Forio d’Ischia, Italy, May 11–13, 2009.Google Scholar
Pal, A., “Localization algorithms in wireless sensor networks: current approaches and future challenges,” Network Protocols and Algorithms, Vol. 2, No. 1, 2010.CrossRefGoogle Scholar
Papadimition, G. I., Pomportisis, A. S., Nicopolitidis, P. and Obaidat, M. S., Wireless Network, Wiley, 2002.
Park, S.-J., Vedantham, R., Sivakumar, R. and Akyildiz, I. F., “GARUDA: achieving effective reliability for downstream communication in wireless sensor networks,” IEEE Transactions on Mobile Computing, Vol. 7, No. 2, pp. 214–230, Feb. 2008.CrossRefGoogle Scholar
Partan, J., Kurose, J. and Levine, B. N., “A survey of practical issues in underwater networks,” ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 11, No. 4, pp. 23–33, 2007.CrossRefGoogle Scholar
Pattem, S., Krishnamachari, B. and Govindan, R., “The impact of spatial correlation on routing with compression in wireless sensor networks,” in Proceedings of the Third International Symposium on Information Processing in Sensor Networks (IPSN), 2004.
Paul, K., Choudhuri, R. R. and Bandyopadhyay, S., “Survivability analysis of ad hoc wireless network architecture,” in Proceedings of the IFTP-TC6/European Commission International Workshop on Mobile and Wireless Communication Networks, Springer, Vol. 1818, pp. 31–46, 2000.CrossRefGoogle Scholar
Perillo, M. and Heinzelman, W., “DAPR: a protocol for wireless sensor networks utilizing an application-based routing cost,” in Proceedings of the 2004 IEEE Wireless Communications and Networking Conference (WCNC), Vol. 3, pp. 1540–1545, March 2004.
Perillo, M. and Heinzelman, W., “Sensor management policies to provide application QoS,” Ad Hoc Networks (Elsevier), Vol. 1, No. 2–3, pp. 235–246, 2003.CrossRefGoogle Scholar
Pering, T., Burd, T. and Brodersen, R., “The simulation and evaluation of dynamic voltage scaling algorithm,” in Proceedings of the 1998 International Symposium on Low Power Electronics and Design, ISLPED’98, pp. 76–81, Monterey, CA, 1998.Google Scholar
Perrig, A., Stankovic, J. and Wagner, D., “Security in wireless sensor networks,” Communications of the ACM, Vol. 47, No. 6, pp. 53–57, 2004.CrossRefGoogle Scholar
Perrig, A., Szewzyk, R., Tygar, J. D., Wen, V. and Culler, D. E., “SPINS: security protocols for sensor networks,” Wireless Networks, Vol. 8, No. 5, pp. 521–534, 2002.CrossRefGoogle Scholar
Perrig, A., Stankovic, J. and Wagner, D., “Security in wireless sensor networks,” Communications of the ACM, Vol. 47, No. 6, pp. 53–57, June 2004.CrossRefGoogle Scholar
Perrig, A., “Secure routing in sensor networks.” .
Perrig, A., Stankovic, J. and Wagner, D., “Security in wireless sensor networks,” Communications of the ACM, Vol. 47, No. 6, pp. 53–57, June 2004.CrossRefGoogle Scholar
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V. and Culler, D. E., “SPINS: security protocols for sensor networks,” Wireless Networks Journal, Vol. 8, pp. 521–534, 2002.CrossRefGoogle Scholar
Pham, H. and Jha, S., “An adaptive mobility-aware MAC protocol for sensor networks (MS-MAC),” in Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, pp. 558–560, October 2004.
Pham, H. and Jha, S., “An adaptive mobility-aware MAC protocol for sensor networks (MS-MAC),” in Proceedings of IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), pp. 214–226, Oct. 2004.
Pierret, R. F., Introduction to Microelectronics Fabrication, Menlo Park, CA: Addison-Wesley, 1990.Google Scholar
Pinet, P. R., Invitation to Oceanography, 5th Edition, Jones & Bartlett Learning, ISBN: , 2008.Google Scholar
Polastre, J., Szewczyk, R. and Culler, D., “Telos: enabling ultra-low power wireless research,” in Proceedings of the 2005 International Symposium on Information Processing, PSN 2005, pp. 364–369, April 2005.
Polastre, J., Hill, J. and Culler, D., “Versatile low power media access for wireless sensor networks,” in Proceedings of the International Conference on Embedded Network Sensor Systems, pp. 95–107, 2004.
Pompili, D., Melodia, T. and Akyildiz, I. F., “Deployment analysis in underwater acoustic wireless sensor networks,” in Proceedings of ACM Workshop on Underwater Networks, Los Angeles, California, USA, pp. 48–55, September 2006.Google Scholar
Pompili, D., Melodia, T. and Akyildiz, I. F., “Three-dimensional and two-dimensional deployment analysis for underwater acoustic sensor networks,” Ad Hoc Networks, Vol. 7, No. 4, pp. 778–790, 2009.CrossRefGoogle Scholar
Pompili, D. and Melodia, T., “An architecture for ocean bottom underwater acoustic sensor networks (UWASN),” in Proceedings of Mediterranean Ad Hoc Networking Workshop, Bodrum, Turkey, 2004.Google Scholar
Porrat, D., “Radio propagation in hallways and streets for UHF communications,” Ph.D. thesis, Stanford University, 2002.
Pottie, G. J. and Kaiser, W. J., “Wireless integrated network sensors,” Communications of the ACM, Vol. 43, No. 5, pp. 51–58, May 2000.CrossRefGoogle Scholar
Pottie, G. J. and Kaiser, W. J., “Embedding the internet: wireless integrated network sensors,” Communications of the ACM, Vol. 43, No. 5, pp. 51–58, May 2000.CrossRefGoogle Scholar
Preisig, J., “Acoustic propagation considerations for underwater acoustics communications network development,” ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 11, No. 4, Oct. 2007.CrossRefGoogle Scholar
Priyantha, N. B., Balakrishnan, H., Demaine, E., and Teller, S., “Anchor-free distributed localization in sensor networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, California, USA, p. 340, 2003.CrossRefGoogle Scholar
Proakis, J., Sozer, E., Rice, J. and Stojanovic, M., “Shallow water acoustic networks,” Proceedings of IEEE Communication Magazine, Vol. 39, pp. 114–119, 2001.CrossRefGoogle Scholar
Puri, R., Majumdar, A., Ishwar, P. and Ramchandran, K., “Distributed video coding in wireless sensor networks,” IEEE Signal Processing Magazine, Vol. 23, pp. 94–106, 2006.CrossRefGoogle Scholar
Römer, K. and Mattern, F., “The design space of wireless sensor networks,” IEEE Wireless Communications, Vol. 11, No. 6, pp. 54–61, Dec. 2004.CrossRefGoogle Scholar
Rabaey, J., Ammer, J., da Silva, J., Patel, D. and Roundy, S., “Picoradio supports ad hoc ultra-low power wireless networking,” IEEE Computer Magazine, pp. 42–48, July 2002.Google Scholar
Radha, H., Schaar, M. and Chen, Y., “The MPEG-4 fine-grained scalable video coding method for multimedia streaming over IP,” IEEE Transactions Multimedia, Vol. 3, pp. 53–68, 2001.CrossRefGoogle Scholar
Raghavendra, C. S., Meesookho, C. and Narayanan, S., “Collaborative classification applications in sensor networks,” in Proceedings of 2002 IEEE Sensor Array and Multichannel Signal Processing Workshop, pp. 370–374, August 2002.
Raghunathan, V., Schurgers, C., Park, S. and Srivastava, M., “Energy-aware wireless microsensor networks,” IEEE Signal Processing Magazine, Vol. 19, No. 2, pp. 40–50, March 2002.CrossRefGoogle Scholar
Rahimi, M., Baer, R., Warrior, J., Estrin, D. and Srivastava, M., “Cyclops: in situ image sensing and interpretation in wireless sensor networks,” in Proceedings of ACM Conference on Embedded Networked Sensor Systems (SENSYS), 2005.
Rahman, M. A., El Saddik, A. and Gueaieb, W., “Wireless sensor network transport layer: state of the art,” in Sensors, LNEE 21, Mukhopadhyay, S. C. and Huang, R. Y. M. (Eds.), Springer, 2008, pp. 221–245.CrossRefGoogle ScholarPubMed
Rahman, M., Aghaei, R. G., Saddik, A. E. and Gueaieb, W., “M-IAR: biologically inspired routing protocol for wireless multimedia sensor networks,” in Proceedings Instrumentation and Measurement Technology Conference (IMTC), Victoria, British Columbia, Canada, pp. 1823–1827, October 2008.Google Scholar
Rahul, C. and Rabaey, J., “Energy aware routing for low energy ad hoc sensor networks,” in IEEE Wireless Communications and Networking Conference (WCNC), Vol. 1, pp. 350–355, Orlando, FL, March 2002.Google Scholar
Rajendran, V., Garcia-Luna-Aceves, J. and Obraczka, K., “Energy-efficient, application-aware medium access for sensor networks,” in Proceedings of the 2005 IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, Nov. 2005.
Rajendran, V., Obraczka, K. and Garcia-Luna-Aceves, J., “Energy-efficient collision-free medium access control for wireless sensor networks,” in Proceedings of the 2003 International Conference on Embedded Networked Sensor Systems, Nov. 2003.
Ramachandran, C., Obaidat, M. S., Misra, S. and Pena-Mora, F., “A secure, and energy-efficient scheme for group-based routing in heterogeneous ad-hoc sensor networks and its simulation analysis,” Simulation: Transactions of the Society for Modeling and Simulation International, Vol. 84, No. 2–3, pp. 131–146, Feb./March 2008.CrossRefGoogle Scholar
Ramachandran, C., Obaidat, M. S., Misra, S. and Pena-Mora, F., “A secure, and energy-efficient scheme for group-based routing in heterogeneous ad-hoc sensor networks and its simulation analysis,” Simulation: Transactions of the Society for Modeling and Simulation International, Vol. 84, No. 2–3, pp. 131–146, Feb./March 2008.CrossRefGoogle Scholar
Ramachandran, C., Obaidat, M. S., Misra, S. and Pena-Mora, F., “A secure, and energy-efficient scheme for group-based routing in heterogeneous ad-hoc sensor networks and its simulation analysis,” Simulation: Transactions of the Society for Modeling and Simulation International, Vol. 84, No. 2–3, pp. 131–146, Feb./March 2008.CrossRefGoogle Scholar
Rathod, V. and Mehta, M., “Security in wireless sensor network: a survey,” GANPAT University Journal of Engineering & Technology, Vol. 1, No. 1, pp. 24–43, 2011.Google Scholar
Ratnasamy, S. and Karp, B., “GHT: a geographic hash table for data-centric storage,” in Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), 2002.
Raviraj, P., Sharif, H., Hempel, M. and Ci, S., “An energy efficient MAC approach for mobile wireless sensor networks systems communications,” in Proceedings of the 2005 IEEE Computer Systems and Applications, pp. 370–375, 2005.
Raymond, D. R. and Midkiff, S. F., “Denial-of-service in wireless sensor networks: attacks and defenses,” IEEE Pervasive Computing, Vol. 7, pp. 74–81, March 2008.CrossRefGoogle Scholar
Raymond, D. et al., “Effects of denial of sleep attacks on wireless sensor network MAC protocols,” in Proceedings of the 7th Annual IEEE Systems, Man, and Cybernetics (SMC) Information Assurance Workshop (IAW), IEEE Press, pp. 297–304, 2006.Google Scholar
Rentala, P., Musunuri, R., Gandham, S. and Saxena, U., “Survey on sensor networks,” in Proceedings of International Conference on Mobile Computing and Networking, 2001.
Rodoplu, V. and Meng, T. H., “Minimum energy mobile wireless networks,” IEEE Journal Selected Areas in Communications, Vol. 17, No. 8, pp. 1333–1344, Aug. 1999.CrossRefGoogle Scholar
Rodoplu, V. and Meng, T., “Minimum energy mobile wireless networks,” IEEE Journal on Selected Areas in Communication, Vol. 17, No. 8, pp. 1333–1344, Aug. 1999.CrossRefGoogle Scholar
O’Rourke, J., “Convex hulls in 2D,” Chapter 3 in Computational Geometry in C, 2nd ed. Cambridge University Press, 1998.CrossRefGoogle Scholar
Sadagopan, N., Krishnamachari, B. and Helmy, A., “The ACQUIRE mechanism for efficient querying in sensor networks,” in Proceedings of the First International Workshop on Sensor Network Protocol and Applications, pp. 149–155, May 2003.
Sah, N., Prakash, N., Kumar, A., Da Kumar, and De Kumar, , “Optimizing the path loss of wireless indoor propagation models using CSP algorithms,” in Second International Conference on Computer and Network Technology, pp. 324–328, 2010.
Saipulla, A., Westphal, C., Liu, B. and Wang, J., “Barrier coverage of line-based deployed wireless sensor networks,” in Proceedings IEEE International Conference on Computer Communications, pp. 127–135, 2009.
Sankarasubramaniam, Y., Akan, O. B. and Akyildiz, I. F., “ESRT: event-to-sink reliable transport in wireless sensor networks,” in Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc ‘03), ACM, New York, NY, USA, 2003, pp. 177–188.Google Scholar
Santi, P. and Blough, D., “The critical transmitting range for connectivity in sparse wireless ad hoc networks,” IEEE Transactions Mobile Computing, Vol. 2, No. 1, pp. 25–39, Jan.–Mar. 2003.CrossRefGoogle Scholar
Sarisaray, P., Gur, G., Baydere, S. and Harmanc, E., “Performance comparison of error compensation techniques with multipath transmission in wireless multimedia sensor networks,” in 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Istanbul, Turkey, pp. 73–86, Oct. 2007.Google Scholar
Savvides, A. and Srivastava, M., “A distributed computation platform for wireless embedded sensing,” in Proceedings of the 2002 International Conference on Computer Design, ICCD02, pp. 220–225, Sep. 2002.
Savvides, A., Han, C.-C. and Srivastava, M., “Dynamic fine-grained localization in ad-hoc networks of sensors,” in Proceedings of the Seventh ACM Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 166–179, July 2001.
Savvides, A., Han, C. C. and Srivastava, M. B., “Dynamic fine grained localization in ad hoc networks of sensors,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy, pp. 166–179, 2001.Google Scholar
Saxena, N., Roy, A. and Shin, J., “Dynamic duty cycle and adaptive contention window based Qos-MAC protocol for wireless multimedia sensor networks,” Computer Networks, Vol. 52, pp. 2532–2542, 2008.CrossRefGoogle Scholar
Schulkin, M. and Marsh, H. W., “Sound absorption in sea water,” Journal of the Acoustical Society of America, Vol. 34, pp. 864–865, 1962.CrossRefGoogle Scholar
Schurgers, C., Tsiatsis, V., Ganeriwal, S. and Srivastava, M., “Optimizing sensor networks in the energy-latency-density design space,” IEEE Transactions on Mobile Computing, Vol. 1, No. 1, pp. 70–80, January/March 2002.CrossRefGoogle Scholar
Schurgers, C. and Srivastava, M. B., “Energy efficient routing in wireless sensor networks,” in Proceedings on Communications for Network-Centric Operations: Creating the Information Force-MILCOM, McLean, VA, 2001.Google Scholar
Schurgers, C., Tsiatsis, V. and Srivastava, M. B., “STEM: topology management for energy efficient sensor networks,” in Aerospace Conference Proceedings, IEEE, 2002.
Schurgers, C., Tsiatsis, V., Ganeriwal, S. and Srivastava, M. B., “Topology management for sensor networks: exploiting latency and density,” MOBIHOC’02, Lausanne, Switzerland, ACM, June 9–11, 2002.Google Scholar
Seada, K. and Helmy, A., “Efficient and robust geocasting protocols for sensor networks,” Computer Communications, Vol. 29, No. 2, pp. 151–161, 2006.CrossRefGoogle Scholar
Seah, W. K., Eu, Z. A. and Tan, H-P., “Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP) – survey and challenges,” in Proceedings of the 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronics Systems Technology, Wireless VITAE 2009, pp. 1–5, May 2009.
Seah, W. K. G. and Tan, H.-X., “Multipath virtual sink architecture for underwater sensor networks,” in Proceedings of IEEE Oceans, Singapore, pp. 1–6, 2006.Google Scholar
Seema, A. and Reisslein, M., “Towards efficient wireless video sensor networks: a survey of existing node architectures and proposal for a flexi-WVSNP design,” Communications Surveys & Tutorials, IEEE, Vol. 13, Issue 3, pp. 462–486, 2011.CrossRefGoogle Scholar
Senturia, S. D., Microsystems Design, Norwell, MA: Springer, 2001.Google Scholar
Shah, R. C. and Rabaey, J., “Energy aware routing for low energy ad hoc sensor networks,” in IEEE Wireless Communications and Networking Conference (WCNC), Vol. 1, pp. 350–355, Orlando, FL, March 2002.Google Scholar
Shah, R. C., Roy, S., Jain, S. and Brunette, W., “Data MULEs: modeling a three-tier architecture for sparse sensor networks,” in Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, Alaska, USA, 2003, pp. 30–41.CrossRefGoogle Scholar
Shang, Y., Ruml, W., Zhang, Y. and Fromherz, M. P. J., “Localization from mere connectivity,” in Proceedings of the 4th ACM International Symposium on Mobile ad hoc Networking & Computing, Annapolis, Maryland, USA, pp. 201–212, 2003.Google Scholar
Sharif, A., V. Potdar and Chang, E., “Wireless multimedia sensor network technology: a survey,” in 7th IEEE International Conference on Industrial Informatics, pp. 606–613, June 2009.
Sharma, K. and Ghose, M. K., “Wireless sensor networks: an overview on its security threats,” International Journal of Computer Applications (IJCS), Special Issue on Mobile Ad-hoc Networks, pp. 42–45, 2010.Google Scholar
Shen, C.-C., Srisathapornphat, C. and Jaikaeo, C., “Sensor information networking architecture and applications,” IEEE Personal Communications, pp. 52–59, August 2001.CrossRefGoogle Scholar
Shi, E. and Perrig, A., “Designing secure sensor networks,” IEEE Wireless Communications, pp. 38–43, December 2004.Google Scholar
Shi, E. and Perrig, A., “Designing secure sensor networks,” IEEE Communications Magazine, Vol. 44, No. 4, 2004.Google Scholar
Shi, E. and Perrig, A., “Designing secure sensor networks,” IEEE Wireless Communications Magazine, pp. 38–43, Dec. 2004.Google Scholar
Shu, L., Zhang, Y., Yang, L. T., Wang, Y. and Hauswirth, M., “Geographic routing in wireless multimedia sensor networks,” in Proceedings of International Conference on Future Generation Communication and Networking, pp. 68–73, 2008.
Simic, S. N. and Sastry, S., “Distributed environmental monitoring using random sensor networks,” in Proceedings of Information Processing in Sensor Networks, IPSN 2003, pp. 582–592, 2003.
Singh, S., Woo, M., and Raghavendra, C., “Power-aware routing in mobile ad hoc networks,” in Proceedings of the Fourth ACM/IEEE International Conference on Mobile Computing, 2005.
Singh, S., Webster, S., Freitag, L., et al., “Acoustic communication performance of the WHOI micro-modem in sea trials of the Nereus vehicle to 11000m depth,” in Proceedings of IEEE Oceans, Biloxi, MS, pp. 1–6, 2009.Google Scholar
Sinopoli, B., Sharp, C., Schenato, L., Schaffert, S. and Sastry, S., “Distributed control applications within sensor networks,” Proceedings of the IEEE, Vol. 91, No. 8, pp. 1235–1246, Aug. 2003.CrossRefGoogle Scholar
Sivakumar, R., Sinha, P. and Bharghavan, V., “CEDAR: a core-extraction distributed ad hoc routing algorithm,” IEEE Journal of Selected Areas in Communications, Vol. 17, No. 8, pp. 1454–1465, 1999.CrossRefGoogle Scholar
Skordas, A., Chirstopoulos, C. and Ebrahimi, T., “The JPEG 2000 still image compression standard,” IEEE Signal Processing Magazine, Vol. 18, No. 5, pp. 36–58, Sept. 2001.Google Scholar
Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S. and Srivastava, M. B., “On communication security in wireless ad-hoc sensor networks,” in Proceedings of 11th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE2002, June 2002.
Sohrabi, K. and Pottie, G., “Performance of a novel self organization protocol for wireless ad hoc sensor networks,” in Proceedings of the IEEE 50th Vehicular Technology Conference, pp. 1222–1226, 1999.
Sohrabi, K., and Pottie, J., “Protocols for self-organization of a wireless sensor networks,” IEEE Personal Communications, Vol. 7, No. 5, pp. 16–27, Oct. 2000.CrossRefGoogle Scholar
Sohraby, K., Minoli, D. and Znati, T., Wireless Sensor Networks: Technology, Protocols, and Applications, John Wiley & Sons, 2007.CrossRefGoogle Scholar
Sojdehei, J., Wrathal, P. and Dinn, D., “Magneto-inductive (MI) communications,” in OCEANS, 2001. MTS/IEEE Conference and Exhibition, Vol. 1, pp. 513–519, 2001.
Son, B., Her, Y.-S. and Kim, J., “A design and implementation of forest-fires surveillance system based on wireless sensor networks for South Korea mountains,” International Journal of Computer Science and Network Security (IJCSNS), Vol. 6, No. 9, pp. 124–130, 2006.Google Scholar
Stann, F., and Heidemann, J., “RMST: reliable data transport in sensor networks,” in Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003, pp. 102–112.
Stargate Platform, Crossbox, website:
Stathopoulos, T., Heidemann, J. and Estrin, D., “A remote code update mechanism for wireless sensor networks,” Tech. Rep. CENS-TR-30, University of California, Los Angeles, Center for Embedded Networked Computing, Nov. 2003. .
Stemm, M. and Katz, R. H., “Measuring and reducing energy consumption of network interfaces in hand-held devices,” IEICE Transactions on Communications, Vol. E80-B, No. 8, pp. 1125–1131, Aug. 1997.Google Scholar
Stojanovic, M., “Underwater acoustic communication,” Encyclopedia of Electrical and Electronics Engineering, Webster, J. G., Ed., Wiley, 1999, Vol. 22, pp. 688–98.Google Scholar
Stojanovic, M., “Recent advances in high speed under water acoustic communication,” IEEE Journal of Oceanic Engineering, Vol. 21, No. 2, pp. 125–36, 1996.CrossRefGoogle Scholar
Stojanovic, M., “On the relationship between capacity and distance in an underwater acoustic channel,” in Proceedings of ACM Workshop on Underwater Networks, pp. 41–47, 2006.
Stojanovic, M., “Recent advances in high-speed underwater acoustic communications,” IEEE Journal of Oceanic Engineering, Vol. 21, No. 2, pp. 125–136, 1996.CrossRefGoogle Scholar
Stojanovic, M., “Underwater acoustic communications,” in Encyclopedia of Electrical and Electronics Engineering, Webster, John G., ed. John Wiley and Sons, 1999, pp. 688–698.Google Scholar
Stojmenovic, I. and Lin, X., “GEDIR: loop-free location based routing in wireless networks,” in Proceedings of the 1999 International Conference on Parallel and Distributed Computing and Systems, Boston, MA, USA, Nov. 3–6, 1999.
Su, L., Liu, C., Song, H. and Cao, G., “Routing in intermittently connected sensor networks,” in Proceedings of the 2008 IEEE International Conference on Network Protocols (ICNP), 2008.
Subramanian, L. and Katz, R. H., “An architecture for building self configurable systems,” in Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, pp. 63–73, Boston, MA, August 2000.Google Scholar
Sun, Y., Ma, H., Liu, L. and Zheng, Y., “ASAR: an ant-based service-aware routing algorithm for multimedia sensor networks,” Frontiers of Electrical and Electronic Engineering, China, Vol. 3, pp. 25–33, 2008.CrossRefGoogle Scholar
Sun, Z. and Akyildiz, I. F., “Channel modeling and analysis for wireless networks in underground mines and road tunnels,” IEEE Transactions on Communications, Vol. 58, No. 6, June 2010.CrossRefGoogle Scholar
Sun, Z. and Akyildiz, I. F., “Magnetic induction communications for wireless underground sensor networks,” IEEE Transactions on Antennas and Propagation, Vol. 58, No.7, July 2010.Google Scholar
Sun, Z. and Akyildiz, I. F., “Underground wireless communication using magnetic induction,” in IEEE International Conference on Communications 2009, ICC 09, pp. 1–5, 2009.
Sundani, H., Li, H., Devabhaktuni, V., Alam, M. and Bhattacharya, P., “A survey and comparisons on wireless sensor network simulators,” International Journal of Computer Networks (IJCN), Vol. 2, No. 5, pp. 249–261, 2010.Google Scholar
Sundresh, S., Wooyoung, K. and Agha, G., “SENS: a sensor environment and network simulator”, in Proceedings of 37th Annual Simulation Symposium, pp. 221–228, Apr. 2004.CrossRefGoogle Scholar
Swami, A., Zhao, Q., Hong, Y.-W. and Tong, L. (Eds.), Wireless Sensor Networks: Signal Processing and Communication Perspectives, John Wiley & Sons, 2007.CrossRef
Technical Report: International Association for Oil and Gas Producers, “Fundamentals of underwater sound,” Report No. 406, May 2008.
Teng, L. and Zhang, Y., “SeRA: a secure routing algorithm against sinkhole attacks for mobile wireless sensor networks,” in Proceedings of the 2010 Second International Conference on Computer Modeling and Simulation, Vol. 4, pp. 79–82, 2010.
Tezcan, N. and Wang, W., “ART: an asymmetric and reliable transport mechanism for wireless sensor networks,” International Journal of Sensor Networks, Vol. 2, Nos. 3–4, pp. 188–200, 2007.CrossRefGoogle Scholar
Thorp, W. H. and Browning, D. G., “Attenuation of low frequency sound in the ocean,” Journal of Sound and Vibration, Vol. 26, pp. 576–578, 1973.CrossRefGoogle Scholar
Tilak, S., Abu-Ghazaleh, N. B. and Heinzelman, W., “A taxonomy of sensor network communication models,” Mobile Computing and Communication Review, Vol. 6, No. 2, pp. 28–36, April 2002.CrossRefGoogle Scholar
Timm-Giel, A., Murray, K., Becker, M., et al., “Comparative simulations of WSN,” ICT-MobileSummit, 2008.Google Scholar
Tseng, Y.-C., Pan, M.-S. and Tsai, Y.-Y., “Wireless sensor networks for emergency navigation,” IEEE Computer, Vol. 39, No. 7, pp. 55–62, 2006.CrossRefGoogle Scholar
Tseng, Y., Hsu, C. and Hsieh, T., “Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks,” Computer Networks, Vol. 43, No. 3, pp. 317–337, 2003.CrossRefGoogle Scholar
Van Dam, T. and Langendoen, K., “An adaptive energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the ACM International Conference on Embedded Network Sensor Systems, pp. 171–180, 2003.
van Hoesel, L. and Havinga, P., “A lightweight medium access protocol (LMAC) for wireless sensor networks: reducing preamble transmissions and transceiver state switch,” in Proceedings of the 1st International Workshop on Networked Sensing Systems, pp. 205–208, Tokyo, Japan, 2004.Google Scholar
Vasilescu, I., Kotay, K., Rus, D., Dunbabin, M. and Corke, P., “Data collection, storage, and retrieval with an underwater sensor network,” in Proceedings of ACM SenSys, San Diego, CA, pp. 154–165, Nov. 2005.Google Scholar
Veeravalli, V. V. and Chamberland, J. F., “Detection in sensor networks,” in Wireless Sensor Networks: Signal Processing and Communications Perspectives, Swami, A., Zhao, Q., Hong, Y. W. and Tong, L. (Eds.), John Wiley & Sons, 2007, pp. 119–148.Google Scholar
Vlajic, N. and Stevanovic, D., “Sink mobility in wireless sensor networks: when theory meets reality,” Proceedings of the 32nd International Conference on Sarnoff Symposium (SARNOFF’09), NJ, USA, 2009.Google Scholar
Vogt, H., “Exploring message authentication in sensor networks,” in Security in Ad-hoc and Sensor Networks (ESAS), First European Workshop, Vol. 3313 of Lecture Notes in Computer Science, pp. 19–30. Springer, 2004.Google Scholar
Vuran, M. C., Gungor, V. C. and Akan, O. B., “On the interdependence of congestion and contention in wireless sensor networks,” in Proceedings of the Third International Workshop on Measurement, Modeling, and Performance Analysis of Wireless Sensor Networks, San Diego, CA, USA, 2005.Google Scholar
Intrusion detection in wireless networks – Krishnan, Micheal. .
Wan, C.-Y., Eisenman, S. B. and Campbell, A. T., “CODA: congestion detection and avoidance in sensor networks,” in Proceedings of ACM Sensys’03, Los Angeles, CA, Nov. 5–7, 2003.Google Scholar
Wan, C.-Y., Eisenman, S. B., Campbell, A. T. and Crowcroft, J., “Siphon: overload traffic management using multi radio virtual sinks in sensor networks,” in Proceedings of ACM Sensys’05, San Diego, CA, Nov. 2–4, 2005.Google Scholar
Wan, C.-Y., Campbell, A. T. and Krishnamurthy, L., “PSFQ: a reliable transport protocol for wireless sensor networks,” in Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications (WSNA’02), Atlanta, Georgia, USA, Sept. 2002.Google Scholar
Wang, C., Sohraby, K., Lawrence, V., Bo, L. and Hu, Y., “Priority–based congestion control in wireless sensor networks,” IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), 2006.CrossRefGoogle Scholar
Wang, C., Li, B., Sohraby, K., Daneshmand, M. and Hu, Y., “Upstream congestion control in wireless sensor networks through cross-layer optimization,” IEEE Journal on Selected Areas in Communications, Vol. 25, No. 4, pp. 786–795, 2007.CrossRefGoogle Scholar
Wang, X., Xing, G., Zhang, Y., et al., “Integrated coverage and connectivity configuration in wireless sensor networks,” in Proceedings ACM International Conference Embedded Network Sensor Systems, pp. 28–39, 2003.
Wang, G., Cao, G. and La Porta, T., “Movement-assisted sensor deployment,” IEEE Transactions on Mobile Computing, Vol. 5, No. 6, pp. 640–652, June 2006.CrossRefGoogle Scholar
Wang, G., Cao, G. and LaPorta, T., “A bidding protocol for deploying mobile sensors,” in Proceedings of the IEEE International Conference on Networks protocols, pp. 315–324, 2003.
Wang, Q. and Yang, W., “Energy consumption model for power management in wireless sensor networks,” in Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON ‘2007, pp. 142–151, June 2007.
Wang, W., “Traffic analysis, modeling and their applications in energy-constrained wireless sensor networks – on network optimization and anomaly detection,” PhD Thesis, No. 78, Dept of Information Technology and Media, Mid Sweden University, Sundsvall, Sweden, 2010.
Wang, Y., Attebury, G. and Ramamurthy, B., “A survey of security issues in wireless sensor networks,” IEEE Communication Surveys, Vol. 8, No. 2, pp. 2–23. 2006.CrossRefGoogle Scholar
Wang, B., Lim, H. B. and Ma, D., “A survey of movement strategies for improving network coverage in wireless sensor networks,” Computer Communications, Vol. 32, Nos. 13–14, pp. 1427–1436, 2009.CrossRefGoogle Scholar
Wang, G., Cao, G. and Porta, T. L., “Movement-assisted sensor deployment,” IEEE Transactions on Mobile Computing, Vol. 5, No. 6, pp. 640–652, 2006.CrossRefGoogle Scholar
Wang, G., Cao, G., Berman, P. and La Porta, T. F., “Bidding protocols for deploying mobile sensors,” IEEE Transactions on Mobile Computing, Vol. 6, No. 5, pp. 563–576, 2007.CrossRefGoogle Scholar
Wang, Y. C., Peng, W. C., Chang, M. H. and Tseng, Y. C., “Exploring load-balance to dispatch mobile sensors in wireless sensor networks,” in Proceedings of 16th International Conference on Computer Communications and Networks,(ICCCN 2007), Honolulu, HI, 2007, pp. 669–674.Google Scholar
Wang, G., Wang, T., Jia, W., Guo, M., and Li, J., “Adaptive location updates for mobile sinks in wireless sensor networks,” The Journal of Supercomputing, Vol. 47, No. 2, pp. 127–145, 2009.CrossRefGoogle Scholar
Wang, W., Srinvasan, V. and Chua, K., “Using mobile relays to prolong the lifetime of wireless sensor networks,” in Proceedings of the 11th Annual International Conference on Mobile Computing and Networking (MobiCom ’05), ACM, New York, NY, USA, 2005, pp. 270–283.Google Scholar
Wang, W., Peng, D., Wang, H., Sharif, H. and Chen, H. H., “Energy-constrained distortion reduction optimization for wavelet-based coded image transmission in wireless sensor networks,” Multimedia, Vol. 10, pp. 1169–1180, 2008.Google Scholar
Wang, Y., Reibman, A. and Lin, S., “Multiple description coding for video delivery,” Proceedings of the IEEE, Vol. 93, pp. 57–70, 2005.CrossRefGoogle Scholar
Wang, J., Li, D., Zhou, M. and Ghosal, D., “Data collection with multiple mobile actors in underwater sensor networks,” in Proceedings of IEEE Workshop on Delay/Disruption-Tolerant Mobile Networks, pp. 216–221, 2008.
Weinmann, S., Kochhal, M. and Schwiebert, L., “Power efficient topologies for wireless sensor networks,” in Proceedings of the 2001 International Conference on Parallel Processing, ICPP 2001, pp. 156–163, Valencia, Spain.
Weisstein, E. W., “Cassini ovals”, From MathWorld – A Wolfram Web Resource [Online] .
Wielens, S., Galetzka, M. and Schneider, P., “Design support for wireless sensor networks based on the IEEE 802.15.4 standard,” in Proceedings of the 2008 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, pp. 1–5, Sept. 2008.
Wieselthier, J. E., Nguyen, J. and Ephremides, A., “On the construction of energy-efficient broadcast and multicast trees in wireless networks,” in Proceedings of the IEEE International Conference on Computer Communications, Vol. 2, pp. 585–594, 2000.
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11.
WISEBED, website:
Woithe, H., Boehm, D. and Kremer, U., “Improving Slocum glider dead reckoning using a Doppler velocity log,” in Proceedings of MTS/IEEE OCEANS, Waikoloa, HI, pp. 1–5, 2011.Google Scholar
Wong, S. and MacDonald, B., “A topological coverage algorithm for mobile robots,” in Proceedings of the IEEE/RSJ International Conference on Intelligent Robots Systems, Vol. 2, pp. 1685–1690, 2003.
Woo, A. and Culler, D., “A transmission control scheme for media access in sensor networks,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, Vol. 6, No. 5, pp. 221–235, Rome, Italy, 2001.Google Scholar
Wood, A. D. and Stankovic, J. A., “Denial of service attacks in sensor networks,” IEEE Computer Magazine, pp. 54–62, 2002.CrossRefGoogle Scholar
Wu, G., Chen, X. and Obaidat, M. S., “A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set,” Security and Communication Networks, Wiley, Vol. 6, No. 2, pp. 230–238, 2013.CrossRefGoogle Scholar
Wu, J. and Yang, S., “SMART: a scan-based movement-assisted sensor deployment method in wireless sensor networks,” in Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), Miami, USA, Vol. 4, 2005, pp. 2313–2324.Google Scholar
Xie, P., Cui, J.-H. and Lao, L., “VBF: vector-based forwarding protocol for underwater sensor networks,” in Proceedings of IFIP Networking, pp. 1216–1221, 2006.
Xie, P. and Cui, J.-H., “An FEC-based reliable data transport protocol for underwater sensor networks,” in Proceedings of International Conference on Computer Communications and Networks, Honolulu, HI, pp. 747–753, 2007.Google Scholar
Xie, P., Zhou, Z., Peng, Z., Cui, J.-H. and Shi, Z., “SDRT: a reliable data transport protocol for underwater sensor networks,” Ad Hoc Networks, Vol. 8, No. 7, pp. 708–722, 2010.CrossRefGoogle Scholar
Xing, K., Sundhar, S., Srinivasan, R., et al., “Attacks and countermeasures in sensor networks: a survey,” in Network Security, Huang, S., MacCallum, D. and Du, D.-Z., Ed. Springer, 2005, pp. 1–28.Google Scholar
Xu, Y., Heidemann, J. and Estrin, D., “Geography-informed energy conservation for ad-hoc routing,” in Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 70–84, 2001.
Xu, Y., Winter, J. and Lee, W.-C., “Prediction-based strategies for energy saving in object tracking sensor networks,” in Proceedings of the IEEE International Conference on Mobile Data Management (MDM), pp. 346–357, 2004.
Xu, Y., Bien, S., Mori, Y., Heidemann, J. and Estrin, D., “Topology control protocols to conserve energy in wireless ad-hoc networks,” Technical Report 6, University of California, Los Angeles, Center for Embedded Networked Computing, January 2003.
Xu, W., Ma, K., Trappe, W. and Zhang, Y., “Jamming sensor networks: attack and defense strategies,” IEEE Network, Vol. 20, No. 3, pp. 41–47, Spring, 2006.Google Scholar
Yaghmaee, M. and Adjeroh, D., “A model for differentiated service support in wireless multimedia sensor networks,” in Proceedings of 17th International Conference on Computer Communications and Networks, Virgin Islands, USA, pp. 1–6, Aug. 2008.Google Scholar
Yan, H., Shi, Z. J. and Cui, J.-H., “DBR: depth-based routing for underwater sensor networks,” in Proceedings of the IFIP-TC6 Networking Conference on AdHoc and Sensor Networks, Wireless Networks, Next Generation Internet, pp. 72–86, 2008.
Yang, Z. and Liu, Y., “Quality of trilateration: confidence-based iterative localization,” IEEE Transactions on Parallel and Distributed Systems, Vol. 21, No. 5, pp. 631–640, 2010.CrossRefGoogle Scholar
Yang, H. and Sikdar, B., “A protocol for tracking mobile targets using sensor networks,” in Proceedings of IEEE International Workshop on Sensor Network Protocols and Applications, pp. 71–81, 2003.
Yang, T., Mino, G., Spaho, E., et al., “A simulation system for multi mobile events in wireless sensor networks,” in Proceedings of the IEEE 2011 International Conference on Advanced Information Networking and Applications, pp. 411–418, 2011.
Yang, Y., Fonoage, M. I. and Cardei, M., “Improving network lifetime with mobile wireless sensor networks,” Computer Communications, Vol. 33, No. 4, pp. 409–419, 2010.CrossRefGoogle Scholar
Yao, F., Demers, A. and Shenker, S., “A scheduling model for reduced CPU energy,” in Proceedings of the 1995 Annual Symposium on Foundations of Computer Science, FOCS’95, pp. 374–382, October 1995.
Yao, Y. and Gehrke, J., “The Cougar approach to in-network query processing in sensor networks”, SIGMOD Record, Vol. 31, No. 3, Sep. 2002.CrossRefGoogle Scholar
Yarkan, S. and Arslan, H., “Statistical wireless channel propagation characteristics in underground mines at 900MHz,” in IEEE Military Communications Conference, 2007, MILCOM 2007, pp. 1–7, 2007.
Ye, W., Heidemann, J. and Estrin, D., “An energy-efficient MAC protocol for wireless sensor networks”, in 21st Annual Joint Conference of the IEEE INFOCOM, Vol. 3, pp. 1567–1576, June 2002.
Ye, W., Heidemann, J. and Estrin, D., “An energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the 2200 IEEE INFOCOM, pp. 1567–1567, June 2002.
Ye, F., Luo, H., Cheng, J., Lu, S. and Zhang, L., “A two-tier data dissemination model for large-scale wireless sensor networks,” in Proceedings of ACM/IEEE MOBICOM, 2002.
Ye, M., Li, C., Chen, G. and Wu, J., “EECS, an energy efficient clustering scheme in wireless sensor networks,” in 24th IEEE International Performance, Computing and Communication ConferenceIPCCC, pp. 535–554, April 7–9, 2005.Google Scholar
Ye, W., Heidemann, J. and Estrin, D., “An energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the IEEE International Conference on Computer Communications, Vol. 3, pp. 1567–1576, 2002.
Ye, W., Silva, F. and Heidemann, J., “Ultra-low duty cycle MAC with scheduled channel polling,” in Proceedings 4th International Conference on Embedded Network Sensor Systems, pp. 321–334, 2006.
Yeow, W.-L., Tham, C.-K. and Wong, W.-C., “Energy efficient multiple target tracking in wireless sensor networks,” IEEE Transactions on Vehicular Technology, Vol. 56, No. 2, pp. 918–928, 2007.CrossRefGoogle Scholar
Yeow, W.-L., Tham, C.-K., and Wong, W.-C., “A novel target movement model and energy efficient target tracking in sensor networks,” in Proceedings of IEEE VTC – Spring, pp. 2825–2829, 2005.
Yick, J., Mukherjee, B. and Ghosal, D., “Wireless sensor network survey,” Computer Networks (Elsevier), Vol. 52, No. 12, pp. 2292–2330, 2008.CrossRefGoogle Scholar
Yick, J., Mukherjee, B. and Ghosal, D., “Wireless sensor network survey,” Elsevier’s Computer Networks Journal, Vol. 52, No. 12, pp. 2292–2330, 2008.CrossRefGoogle Scholar
Yick, J., Mukherjee, B. and Ghosal, D., “Wireless sensor network survey,” Elsevier’s Computer Networks Journal, Vol. 52, No. 12, pp. 2292–2330, Aug. 2008.CrossRefGoogle Scholar
Younis, O. and Fahmy, S., “Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach,” in Proceedings of the Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2004.
Yu, Y., Estrin, D. and Govindan, R., “Geographical and energy-aware routing: a recursive data dissemination protocol for wireless sensor networks,” UCLA Computer Science Department Technical Report, UCLA-CSD TR-01–0023, May 2001.
Zamalloa, M., Seada, K., Krishnamachari, B. and Helmy, A., “Efficient geographic routing over lossy links in wireless sensor networks,” ACM Transactions on Sensor Networks, Vol. 4, No. 3, pp. 1–33, 2008.CrossRefGoogle Scholar
Zhang, H., Arora, A., Choi, Y. and Gouda, M. G., “Reliable bursty convergecast in wireless sensor networks,” Computer Communications, Vol. 30, No. 13, pp. 2560–2576, 2007.CrossRefGoogle Scholar
Zhang, H. and Shen, H., “Energy-efficient beaconless geographic routing in wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 21, No. 6, pp. 881–896, 2010.CrossRefGoogle Scholar
Zhang, W. and Cao, G., “DCTC: dynamic convoy tree-based collaboration for target tracking in sensor networks,” IEEE Transactions on Wireless Communications, Vol. 3, No. 5, pp. 1689–1701, 2004.CrossRefGoogle Scholar
Zhang, H. and Hou, J., “Maintaining sensing coverage and connectivity in large sensor networks,” Urbana, Vol. 1, pp. 89–124, 2003.Google Scholar
Zhang, H. and Hou, J., “On deriving the upper bound of α-lifetime for large sensor networks,” in Proceedings of the 5th ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc ’04), New York, NY, USA, 2004, pp. 121–132.CrossRefGoogle Scholar
Zhang, Y. P., Zheng, G. X. and Sheng, J. H., “Excitation of UHF radio waves in tunnels,” Microwave and Optical Technology Letters, Vol. 22, No. 6, pp. 408–410, 1999.3.0.CO;2-T>CrossRefGoogle Scholar
Zhao, F. and Guibas, L., Wireless Sensor Networks: An Information Processing Approach, San Francisco, CA: Morgan Kaufmann, 2004.Google Scholar
Zhao, F., Shin, J. and Reich, J., “Information-driven dynamic sensor collaboration for tracking applications,” IEEE Signal Processing Magazine, Vol. 19, No. 2, pp. 61–72, March 2002.CrossRefGoogle Scholar
Zhao, F. and Guibas, L. J., Wireless Sensor Networks: An Information Processing Approach, Morgan Kaufmann, ISBN: , 2004.Google Scholar
Zheng, J. and Jamalipour, A., Wireless Sensor Networks: A Networking Perspective, John Wiley & Sons, 2009.CrossRefGoogle Scholar
Zheng, J. and Jamalipour, A., Wireless Sensor Networks – A Networking Perceptive, Hoboken, NJ: Wiley, 2009.Google Scholar
Zheng, J. and Jamalipour, A. (Eds.), Wireless Sensor Networks: A Networking Perspective, Wiley, 2009.CrossRef
Zheng, R., Hou, J. and Sha, L., “Asynchronous wakeup for ad hoc networks,” in Proceedings of the 2003 ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 35–45, 2003.
Zheng, T., Radhakrishnan, S. and Sarangan, V., “PMAC: an adaptive energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the 2005 IEEE Parallel and Distributed Processing Symposium, April 2005.
Zheng, J. and Jamalipour, A., Wireless Sensor Networks: A Networking Perspective, Wiley, 2009.CrossRefGoogle Scholar
Zheng, R., Hou, J. and Sha, L., “Asynchronous wakeup for ad hoc networks,” in Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Network Computers, pp. 35–45, 2003.
Zhou, L. and Haas, Z. J., “Securing ad hoc networks,” IEEE Network Magazine, Vol. 13, No. 6, pp. 24–30, Nov./Dec. 1999.CrossRefGoogle Scholar
Zhou, Y., Fang, Y. and Zhang, Y., “Security wireless sensor networks: a survey,” IEEE Communication Surveys, Vol. 10, No. 3, 3rd Quarter 2008.CrossRefGoogle Scholar
Zhu, S., Setia, S. and Jajodia, S., “Leap: efficient security mechanisms for large-scale distributed sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 62–72, 2003.