Advertisement

Establishing New Research Initiatives for Theoretical and Algorithmic Aspects of Sensor and Ad Hoc Networks

  • S. Kami Makki
  • Abdelmounaam Rezgui
  • Wuxu Peng
  • Kia Makki
  • Chung-Horng Lung
  • Niki Pissinou
  • Shamila Makki
  • Masoumeh Karimi
  • Mohamed Eltowiessy
Chapter
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 7)

Introduction

The rapid advances in mobile and wireless technology and the growing popularity of smart devices facilitate access to a variety of sources of information without the constraints of location and time. However, this availability of information does not provide the assurance of advancement in all areas of mobile and wireless technology as there are still many uncharted research areas. Many unanswered questions exist that require dedicated investigation by the enthusiastic researchers in this field. The workshop on “Theoretical and Algorithmic Aspects of Sensor and Ad Hoc Networks” held on June 28–29, 2007 in Miami, Florida, aimed to closely examine some of these research areas and investigate the opportunities for other uncharted research areas. To achieve these objectives, the technical program chairs and committee members meticulously selected the best and the most relevant submitted research papers for inclusion into the workshop program. These research papers covered...

Keywords

Global Position System Sensor Network Sensor Node Cluster Head Receive Signal Strength 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    M.S. Corson, J.P. Macker, and G.H. Cirincione. Internet-based mobile ad hoc networking. IEEE Internet Computing, 3 (4), July–August, 1999.Google Scholar
  2. 2.
    R.B. Dilmaghani and R.R. Rao. Hybrid communication infrastructure and social implications for disaster management. In HICSS, IEEE Computer Society, p. 22, 2007.Google Scholar
  3. 3.
    K. Viswanath and K. Obraczka. Interoperability of multicast routing protocols in wireless ad hoc networks: Research articles. Wireless Communications and Mobile Computing, 6 (2):225–234, 2006.Google Scholar
  4. 4.
    N. Ahmed, K. Jamshaid, and O.Z. Khan. Safire: A self-organizing architecture for information exchange between first responders. In Proceedings of the 2 nd IEEE Workshop on Networking Technologies for Software Defined Radio (SDR) Networks (held in conjunction with the IEEE SECON), IEEE, 2007.Google Scholar
  5. 5.
    F.J. Villanueva, D. Villa, F. Moya, J. Barba, F. Rinc´on, and J.C. L´opez. Lightweight middleware for seamless hw-sw interoperability, with application to wireless sensor networks. In DATE ’07: Proceedings of the conference on Design, automation and test in Europe, New York, USA, ACM Press, pp. 1042–1047, 2007.Google Scholar
  6. 6.
    Kenneth Black, Jon Currey, Jaakko Kangasharju, Jari Lnsi and Kimmo Raatikainen. OMG. Wireless access and terminal mobility in CORBA. Technical report, Version 1.2. May, 2005.Google Scholar
  7. 7.
    L. Lima Jr. and A. Calsavara. A framework for corba interoperability in ad hoc networks. In SAC ’07: Proceedings of the 2007 ACM symposium on Applied computing, New York, USA, ACM Press, pp. 930–934, 2007.Google Scholar
  8. 8.
    J. Kopena, E. Sultanik, G. Naik, I. Howley, M. Peysakhov, V.A. Cicirello, M. Kam, and W. Regli. Service-based computing on manets: Enabling dynamic interoperability of first responders. IEEE Intelligent Systems, 20(5):17–25, 2005.CrossRefGoogle Scholar
  9. 9.
    A. Rezgui and M. Eltoweissy. Service-oriented sensor-actuator networks. IEEE Communications, To Appear. Computer Communications Volume 30 Issue 13 pp. 2627–2648, 2007.Google Scholar
  10. 10.
    A. Abrahams, D. Eyers, and J. Bacon. An asynchronous rule-based approach for business process automation using obligations. In Proceedings of the ACM SIGPLAN Workshop on Rule-Based Programming, pp. 323–345, 2002.Google Scholar
  11. 11.
    A. Johnson. Emergence: The Connected Lives of Ants, Brains, Cities, and Software, Scribner, 2002.Google Scholar
  12. 12.
    J. Suzuki and T. Suda. A middleware platform for a biologically inspired network architecture supporting autonomous and adaptive applications, IEEE Journal on Selected Areas in Communications (JSAC), February, 2005.Google Scholar
  13. 13.
    W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless sensor networks. In Proceedings of the Hawaii International Conference System Sciences, January, 2000.Google Scholar
  14. 14.
    P. Dutta, J. Hui, J. Jeong, S. Kim, C. Sharp, J. Taneja, G. Tolle, K. Whitehouse, and D. Culler. Trio: Enabling sustainable and scalable outdoor wireless sensor network deployments. In IPSN ’06: Proceedings of the 5th International Conference on Information Processing in Sensor Networks, New York, USA, ACM Press, pp. 407–415, 2006.Google Scholar
  15. 15.
    T. Moscibroda. The worst-case capacity of wireless sensor networks. In IPSN’07: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, New York, USA, ACM Press, pp. 1–10, 2007.CrossRefGoogle Scholar
  16. 16.
    H. Pishro-Nik. Analysis of finite unreliable sensor grids. In Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Boston, MA, 2006.Google Scholar
  17. 17.
    W.L. Leow and H. Pishro-Nik. Results on coverage for finite wireless networks. In Proceedings of the ACM International Wireless Communications and Mobile Computing Conference, ACM, 2007.Google Scholar
  18. 18.
    S. Padhy and D. Goswami. Self-stabilizing energy-aware routing algorithm in wireless sensor networks with limited mobility. In Proceedings of the Distributed Computing And Internet Technology: 2 nd International Conference, ICDCIT Springer, Berlin Allemagne, 2005.Google Scholar
  19. 19.
    S. Makki and S.V. Wunnava. Application of mobile agent technology in managing the traffic and improving the reliability and quality of service, IAENG International Journal of Computer Science, 32(4):479–482, 2006.Google Scholar
  20. 20.
    W. Peng, X. Zhang, and K. Makki. Locality caching multiroot multigeneration routing algorithm in mobile ad hoc networks. In Proceedings of the 12th International Conference on Computer Communications and Networks, Dallas, Texas, October 20–22, 2003.Google Scholar
  21. 21.
    X. Li, T.D. Nguyen, and R.P. Martin. An analytic model predicting the optimal range of maximizing 1-Hop broadcast coverage in dense wireless networks. In Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: 4th International Conference, Vancouver, Canada, July 22–24, 2004.Google Scholar
  22. 22.
    J.P. Sheu, Y.S.Chen, and C.Y.Chang. Energy Conservation for Broadcast and Multicast Routing in Wireless Ad Hoc Networks. Chapter 11, Handbook on Theoretical and Algorithmic Aspect of Sensor, Ad Hoc Wireless, and Peer-to-peer Networks, 2006.Google Scholar
  23. 23.
    T.K. Chan, K. Fung, J.K. Liu, and V.K. Wei. Blind spontaneous anonymous group signature for ad hoc groups. In Proceedings of the Security in Ad-hoc And Sensor Networks: 1st European Workshop, ESAS 2004, Heidelberg, Germany, 2004.Google Scholar
  24. 24.
    D.D. Hwang, B.C. Lai, and I. Verbauwhede. Energy-memory-security tradeoffs in distributed sensor networks. In Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: 3rd International Conference, Vancouver, Canada, July 22–24, 2004.Google Scholar
  25. 25.
    W. Peng, Y. Wang, and K. Makki. Dynamic key management for secure routing. In LCMRMG MANET: Proceedings of the 13th International Conference on Computer Communications and Networks, Chicago, Illinois, October 11–13, 2004.Google Scholar
  26. 26.
    X. Li, P. Wan, and O. Frieder. Coverage in wireless ad hoc sensor networks, IEEE Transactions on Computers, 52(6):753–763, June, 2003.CrossRefGoogle Scholar
  27. 27.
    B. Liu and D. Towsley. On the coverage and detectability of large-scale wireless sensor networks. Workshop on Modeling and Optimization in Mobile Ad Hoc Wireless Networks, March, 2003.Google Scholar
  28. 28.
    W. Peng, X. Jia, and E. Reeves. Detectability in incomplete sensor networks. In Proceedings of the International Workshop on Theoretical and Algorithmic Aspects of Sensor and Ad-hoc Networks, June, 2007.Google Scholar
  29. 29.
    H. Tian and H. Shen. An optimal coverage scheme for wireless sensor network. In Proceedings of the International Conference on Networking, April 17–21, 2005.Google Scholar
  30. 30.
    R. Shah and J. Rabaey. Energy aware routing for low energy ad hoc sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNS), March, 2002.Google Scholar
  31. 31.
    A.P. Chandrakasan, W.B. Heinzelman, and H. Balakrishnan. An application-specific protocol architecture for wireless micro sensor networks, IEEE Transactions on Communications, 1(4):660–670, October, 2002.Google Scholar
  32. 32.
    S. Makki, N. Pissinou, and S.V. Khare. Simulation of wireless sensor networks based on energy aware routing approach. In Proceedings of the International Conference on Wireless Networks (ICWN’04), pp. 982–987, Brooks Cole, 2004.Google Scholar
  33. 33.
    S. Lindsey and C.S. Raghavendra. PEGASIS: Power efficient GAthering in sensor information systems. In Proceedings of the IEEE Aerospace Conference, March, 2002.Google Scholar
  34. 34.
    K. Akkaya and M. Younis. An energy-aware qos routing protocol for wireless sensor networks. In Proceedings of the IEEE Workshop on Mobile and Wireless Networks (MWN 2003), May, 2003.Google Scholar
  35. 35.
    L. Hai, P. Wan, C. Yi, X. Jia, S.K. Makki, and N. Pissinou. Maximizing lifetime of sensor surveillance systems, IEEE/ACM Transactions on Networking, Vol. 15(2), pp. 334–345, April, 2007. Google Scholar
  36. 36.
    W. Du, J. Deng, Y.S. Han, and P. Varshney. A Witness-Based Approach for Data Fusion Assurance in Wireless Sensor Networks, IEEE 2003 Global Communications Conference (GLOBECOM). San Francisco, CA, USA. December 1–5, 2003.Google Scholar
  37. 37.
    S. Makki, N. Pissinou, and T. Bhowmick. LEACH protocol for assigning cluster-heads using a deterministic and stochastic approach for wireless sensor networks. In Proceedings of the International Conference on Wireless Networks (ICWN ’04), pp. 963–968, Brooks Cole, 2004.Google Scholar
  38. 38.
    A.D. Wood, L. Fang, J.A. Stankovic, and T. He. SIGF: A family of configurable, secure routing protocols for wireless sensor networks. Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, ACM, 2006.Google Scholar
  39. 39.
    P. Adrian, S. Robert, W. Victor, C. David, and J.D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of the 7th Annual International Conference on Mobile Computing and Networks MOBICOM 2001, July, 2001.Google Scholar
  40. 40.
    S. Makki, N. Pissinou, and H. Huang. The security issues in the ad-hoc on demand distance vector routing protocol (AODV). In Proceedings of the Security and Management (SAM’ 04), pp. 427–432, LNCS series (Springer), 2004.Google Scholar
  41. 41.
    S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks, IEEE INFOCOM, March, 2005.Google Scholar
  42. 42.
    X. Chen, K. Makki, K. Yen, and N. Pissinou. Node compromise modeling and its applications in sensor networks. In proceedings of the IEEE ISCC, Aveiro, Portugal, July, 2007.Google Scholar
  43. 43.
    H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang. URSA: Ubiquitous and robust access control for mobile ad hoc networks, IEEE/ACM Transactions on Networking (TON), 12(6): 1049–1063, October, 2004.CrossRefGoogle Scholar
  44. 44.
    Z. Cao, J. Hu, Z. Chen, M. Xu, and X. Zhou. Feedback: Towards dynamic behavior and secure routing for wireless sensor networks. In Proceedings of the 20th International Conference on Advanced Information Networking and Applications – Volume 2, (AINA'06). IEEE Computer Society, Washington. DC. USA, April, 2006.Google Scholar
  45. 45.
    S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, May, 2004.Google Scholar
  46. 46.
    D. Liu, P. Ning, and W. Du. Attack-resistant location estimation in sensor networks. In Proceedings of the 4th International Conference on Information Processing in Sensor Networks (IPSN), April, 2005.Google Scholar
  47. 47.
    B. Krishnamachari and S. Iyengar. Distributed bayesian algorithms for fault-tolerant event region detection in wireless sensor networks, IEEE Transactions on Computers, 53(3): 241–250, March, 2004.CrossRefGoogle Scholar
  48. 48.
    S.K. Makki, P. Reiher, K. Makki, N. Pissinou, and S. Makki (Editors). Mobile and Wireless Network Security and Privacy, ISBN 978-0-387-71057-0, Springer, p. 223, August, 2007.Google Scholar
  49. 49.
    MoteLab . http://motelab.eecs.harvard.edu/index.php. Accessed November 1, 2007.
  50. 50.
    D. Raychaudhuri, I. Seskar, M. Ott, S. Ganu, K. Ramachandran, H. Kremo, R. Siracusa, H. Liu, and M. Singh. Overview of the orbit radio grid testbed for evaluation of next generation wireless network protocols. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), IEEE, 2005.Google Scholar
  51. 51.
    P. De, R. Krishnan, A. Raniwala, K. Tatavarthi, N.A. Syed, J. Modi, and T.-C Chiueh. Mint-m: An autonomous mobile wireless experimentation platform. In Proceedings of the Mobisys, ACM, 19–22 June, 2006.Google Scholar
  52. 52.
    Roofnet . http://pdos.csail.mit.edu/roofnet/doku.php. Accessed October 12, 2007.
  53. 53.
    V. Handziski, A. Köpke, A. Willig, and A. Wolisz. Twist: A scalable and reconfigurable testbed for wireless indoor experiments with sensor networks. In REALMAN ’06: Proceedings of the 2 nd International Workshop on Multi-hop Ad Hoc Networks: From Theory to Reality, New York, USA, ACM Press, pp. 63–70, 2006.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • S. Kami Makki
    • 1
  • Abdelmounaam Rezgui
  • Wuxu Peng
  • Kia Makki
  • Chung-Horng Lung
  • Niki Pissinou
  • Shamila Makki
  • Masoumeh Karimi
  • Mohamed Eltowiessy
  1. 1.University of ToledoToledoUSA

Personalised recommendations