Update cookies preferences

E-book: Building Wireless Sensor Networks: Application to Routing and Data Diffusion

Edited by (University of Haute-Alsace, France)
  • Format: PDF+DRM
  • Pub. Date: 26-Sep-2017
  • Publisher: ISTE Press Ltd - Elsevier Inc
  • Language: eng
  • ISBN-13: 9780081024133
Other books in subject:
  • Format - PDF+DRM
  • Price: 129,61 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
  • Format: PDF+DRM
  • Pub. Date: 26-Sep-2017
  • Publisher: ISTE Press Ltd - Elsevier Inc
  • Language: eng
  • ISBN-13: 9780081024133
Other books in subject:

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

Building Wireless Sensor Networks: Application to Routing and Data Diffusion discusses challenges involved in securing routing in wireless sensor networks with new hybrid topologies. An analysis of the security of real time data diffusion-a protocol for routing in wireless sensor networks-is provided, along with various possible attacks and possible countermeasures. Different applications are introduced, and new topologies are developed. Topics include audio video bridging (AVB) switched Ethernet, which uses the representation of a network of wireless sensors by a grayscale image to construct routing protocols, thereby minimizing energy consumption and data sharing in vehicular ad-hoc networks.

Existing wireless networks aim to provide communication services between vehicles by enabling the vehicular networks to support wide range applications. New topologies are proposed first, based on the graphiton models, then the wireless sensor networks (WSN) based on the IEEE 802.15.4 standard (ZigBee sensors, and finally the Pancake graphs as an alternative to the Hypercube for interconnecting processors in parallel computer networks.

  • Presents an analysis and protocol for routing in wireless sensor networks
  • Presents ways to prevent attacks against this protocol
  • Introduces different applications
  • Develops new topologies
Preface ix
Introduction xiii
Smain Femmam
Chapter 1 A Survey of Switched Ethernet Solutions for Real-time Audio/Video Communications
1(30)
Xiaoting Li
Laurent George
1.1 Introduction
1(6)
1.1.1 Automotive industry
2(1)
1.1.2 Aviation industry
3(2)
1.1.3 Industrial automation
5(2)
1.2 Ethernet AVB solution
7(5)
1.2.1 Physical and MAC layers
7(1)
1.2.2 Ethernet AVB standard family
8(3)
1.2.3 Evolution: Ethernet TSN
11(1)
1.3 AVB deterministic RT communications
12(13)
1.3.1 Class A/B RT constraints
13(1)
1.3.2 CBSA (credit-based shaping algorithm)
13(3)
1.3.3 End-to-end communication delays
16(9)
1.4 A representative automotive configuration
25(3)
1.5 Conclusion
28(1)
1.6 Bibliography
28(3)
Chapter 2 Representation of Networks of Wireless Sensors with a Grayscale Image: Application to Routing
31(36)
Marc Gilg
2.1 Introduction
31(2)
2.2 The image analogy
33(3)
2.2.1 Gray level images
33(1)
2.2.2 Construction of a gray level image for a network
34(1)
2.2.3 Virtual neighbors
35(1)
2.3 Image processing algorithm
36(7)
2.3.1 Convolution filters
36(1)
2.3.2 Mean filter
37(1)
2.3.3 Gradient filter
37(1)
2.3.4 Gaussian filter
38(2)
2.3.5 Sobel filter
40(1)
2.3.6 Deformable models for border detection
41(1)
2.3.7 Potential energy
42(1)
2.3.8 Minimal energy curve
43(1)
2.3.9 Discretion
43(1)
2.4 Routing algorithms
43(18)
2.4.1 Routing algorithm based on the Sobel filter
43(4)
2.4.2 Routing protocol with the mean filter
47(4)
2.4.3 Routing protocol using deformations
51(10)
2.5 Conclusion
61(2)
2.6 Bibliography
63(4)
Chapter 3 Routing and Data Diffusion in Vehicular Ad Hoc Networks
67(30)
Frederic Drouhin
Sebastien Bindel
3.1 Introduction
67(1)
3.2 Background and challenges
68(8)
3.2.1 Communication standard
69(1)
3.2.2 Signal disturbance
70(6)
3.3 Routing
76(11)
3.3.1 Neighbor selection
77(5)
3.3.2 Routing protocols
82(5)
3.4 VANET security
87(6)
3.4.1 Security requirements in VANET
88(1)
3.4.2 VANET security threats
88(4)
3.4.3 VANET security mechanisms: IEEE 1609.2-2016 standard
92(1)
3.5 Conclusion
93(1)
3.6 Bibliography
94(3)
Chapter 4 New "Graphiton" Model: A Computational Discrete Space, Self-Encoded as Trivalent Spin Networks
97(18)
Smain Femmam
Raymond Aschheim
4.1 Introduction
97(1)
4.2 Graphitation, bottom-up approach
98(6)
4.2.1 Construction
99(3)
4.2.2 Global topology of space
102(1)
4.2.3 Lattice regularity
102(1)
4.2.4 Intrinsic space
103(1)
4.2.5 Space as a network
104(1)
4.3 Mathematical formalism
104(6)
4.3.1 Definitions
104(6)
4.4 Perturbation tolerance
110(1)
4.5 Conclusion
111(1)
4.6 Bibliography
112(3)
Chapter 5 Beacon Cluster-Tree Construction for ZigBee/IEEE802.15.4 Networks
115(30)
Smain Femmam
Mohamed Ikbal Benakila
Laurent George
5.1 Introduction
115(3)
5.2 IEEE 802.15.4 overview
118(6)
5.2.1 EEE 802.15.4 physical layer
118(1)
5.2.2 IEEE 802.15.4 MAC sub-layer overview
119(3)
5.2.3 Non-beacon-enabled network
122(1)
5.2.4 Beacon-enabled network
123(1)
5.3 Beacon frame collision problem in a Cluster-Tree topology
124(3)
5.3.1 Direct beacon frame collision
124(2)
5.3.2 Indirect beacon frame collision
126(1)
5.4 Proposed new approach
127(3)
5.5 Narrowband multipath fading model
130(4)
5.6 Model multipath simulation
134(3)
5.7 Test bed bench
137(4)
5.8 Conclusion
141(1)
5.9 Bibliography
142(3)
Chapter 6 One-by-One Embedding of the Twisted Hypercube into Pancake Graph
145(26)
Smain Femmam
Faouzi M. Zerarka
6.1 Introduction
145(1)
6.2 Preliminaries theory analysis
146(6)
6.2.1 Definition 6.1 construction
146(1)
6.2.2 Definition 6.2 construction
147(3)
6.2.3 Definition 6.3 construction
150(1)
6.2.4 Notations
151(1)
6.3 Embedding n-dimensional twisted hypercube graph into n-dimensional twisted pancake graph
152(10)
6.3.1 Embed node(node) algorithm
152(5)
6.3.2 Embed_edge(nodedep, nodearr) algorithm
157(1)
6.3.3 Embed1_edge(nodedep, nodearr) algorithm
157(2)
6.3.4 Embed2_edge(nodedep, nodearr) algorithm
159(1)
6.3.5 Embed3_edge(nodedep, nodarr) algorithm
160(2)
6.4 Dilations of many-to-one n-dimensional twisted hypercube embedded into n-dimensional pancake
162(4)
6.4.1 Lemma 6.1
162(2)
6.4.2 Lemma 6.2
164(2)
6.5 Conclusion
166(1)
6.6 Bibliography
167(4)
List of Authors 171(2)
Index 173
Smain Femmam is currently Senior Director of Research at the University of Haute-Alsace in France and is on the editorial board of several journals. His research interests include signal processing for wireless communication-computers, estimation theory, adaptive filtering, array processing, distributed and embedding systems, complex theory and robotics.