mobile ad hoc networking (cutting edge directions) || index

12
INDEX Absorption coefficient, 808 Fisher and Simmons formula, 810 loss, 809 Thorp’s formula, 809 Access control, 539, 581, 676 Acknowledgment, 521, 522 ackPBSM, 525 Acoustic modems, 781, 787, 789, 792, 795–797, 835, 837 Ad hoc – large scale deployment, 546 Advanced safety vehicles (ASVs), 593 Analog to digital converter (ADC), 780, 782–783, 789 Anchor paging controller (APC), 589 Anchors, 534 Anonymous keys, 677 ANSWER, 665 Anti-dos, 674 Application categories (ACs), 605 Applications in DTN content search, 341–344 email, 324–326 floating content, 352–357 web, 336–339 XMPP, 326–328 Application mechanisms application semantics, 323 proxies and gateways, 331–334 security, 323, 328–331 transport protocols, 322 user interfaces, 334–335 Application scenarios underground mining, 318–320, 346–349 urban environments, 320–322 AquaNode, 775, 786–789, 795, 798 Arbitration Inter Frame Space (AIFS), 605 Artificial ant colonies, 754 Artificial light, 710 Attacker, 668 Attenuation, 809, 810 Authentication, 674, 676 Autonomous underwater vehicle (AUV), 770–771, 773 Availability, 669 AWS, 651 Background traffic (BK), 605 Backoff timer (BT), 601 bandwidth efficiency in UAN, 815, 819, 820, bandwidth in UAN, 808, 818, 822 Basic Service Set (BSS), 605 Beacon, 522 Best effort traffic (BE), 605 Bit error rate (BER) in UAN, 815, 822 Black burst, 523, 531 Bluetooth in UAN, 786–787, 789, 796 BMV, 670 BPAB, 531 Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition. Edited by Stefano Basagni, Marco Conti, Silvia Giordano, and Ivan Stojmenovic. © 2013 by The Institute of Electrical and Electronics Engineers, Inc. Published 2013 by John Wiley & Sons, Inc. 853

Upload: ivan

Post on 10-Dec-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

INDEX

Absorptioncoefficient, 808

Fisher and Simmons formula, 810loss, 809Thorp’s formula, 809

Access control, 539, 581, 676Acknowledgment, 521, 522ackPBSM, 525Acoustic modems, 781, 787, 789, 792,

795–797, 835, 837Ad hoc – large scale deployment, 546Advanced safety vehicles (ASVs),

593Analog to digital converter (ADC), 780,

782–783, 789Anchor paging controller (APC), 589Anchors, 534Anonymous keys, 677ANSWER, 665Anti-dos, 674Application categories (ACs), 605Applications in DTN

content search, 341–344email, 324–326floating content, 352–357web, 336–339XMPP, 326–328

Application mechanismsapplication semantics, 323proxies and gateways, 331–334

security, 323, 328–331transport protocols, 322user interfaces, 334–335

Application scenariosunderground mining, 318–320, 346–349urban environments, 320–322

AquaNode, 775, 786–789, 795, 798Arbitration Inter Frame Space (AIFS), 605Artificial ant colonies, 754Artificial light, 710Attacker, 668Attenuation, 809, 810Authentication, 674, 676Autonomous underwater vehicle (AUV),

770–771, 773Availability, 669AWS, 651

Background traffic (BK), 605Backoff timer (BT), 601bandwidth efficiency in UAN, 815, 819, 820,bandwidth in UAN, 808, 818, 822Basic Service Set (BSS), 605Beacon, 522Best effort traffic (BE), 605Bit error rate (BER) in UAN, 815, 822Black burst, 523, 531Bluetooth in UAN, 786–787, 789, 796BMV, 670BPAB, 531

Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition. Edited by Stefano Basagni,Marco Conti, Silvia Giordano, and Ivan Stojmenovic.© 2013 by The Institute of Electrical and Electronics Engineers, Inc. Published 2013 by John Wiley & Sons, Inc.

853

Page 2: Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

854 INDEX

Broadband Wireless Access (BWA), 37–43Broadcasting, 520

CA (Certification Authority), 667CaaS (Cooperation as a Service), 656Cabernet, 580CafNet, 580Calibration, 220, 223Capacitor, 710CAR (Connectivity-Aware Routing), 534Car following, 547Carmeq GmbH, 592CarTel Project, 579CarTorrent protocol, 589CBRF (Connection-Based Restricted

Forwarding), 533CC - Cloud computing, 650CCA (cooperative collision avoidance), 527CCH interval (CCHI), 604Cell-based model, 548Channel access time, 602Channel coherence time, 813Channel equalization, 816Channel impulse response, 813Charging efficiency, 706Chromophoric dissolved organic matter

(CDOM), 787, 790–792, 794Clusterhead (CH), 610Clustering, 500–501

Fielder clustering, 501K-Clique, 501

Code-division multiple access (CDMA), 606CodeTorrent, 589Cognitive radio vehicular Ad Hoc networks

applications, 628–629architecture, 629–630characteristics, 622–628definition, 621security, 637simulation tools, 638–640

Coherence bandwidth, 815Coherent modulation, 815Collision avoidance systems (CCA), 601Community structure, 441Confidentiality, 669Congestion, 528Connected dominating set, 525Connectivity, 523, 547, 565, 422

almost connected networks, 423

connectivity islands, 424sparse networks, 424

Contact aggregation, 440Contact graph, 439

contact aggregation, 440unweighted graph, 441weighted graph, 440–441

ContentPlace, 460dissemination strategies, 462knapsack problem, 460performance results, 463utility function, 461

Content sharing, 589Contention-based forwarding (CBF)

protocol, 591Contention window (CW), 607Control channel (CCH), 605Conversion efficiency, 713Covariance, 771–773, 775–777, 790–796CSMA/CA, 607CTP, 580CVeT testbed, 589Crowd computing, 491–494, 498, 508,

510–512

Data center for VC, 658Data isolation for VC, 674Data leak for VC, 670DEAR (Distance-aware epidemic routing),

534Dedicated short-range communications

(DSRC), 578, 590–591, 595, 602Decentralized control algorithm, controller,

771, 773, 775–778, 789Decentralized depth controller, 787,

789–792, 793–797Decentralized gradient-descent, 773,

775–786, 789–792Decision feedback equalizer (DFE), 816Delay tolerant networks (DTNs), 134, 317,

578, 582applications, 135bundle layer, 135hierarchical identity-based cryptography

(HIBC), 136–137security issues, 136

Denial of service in VANETs, 670Depth adjustment, 771–772, 774, 786–787,

789, 793, 796–800

Page 3: Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

INDEX 855

Depth first search, 538DieselNet, 581Differentially coherent, 815Digital signatures, 675Direct-sequence code division multiple

access (DS-CDMA), 819, 826Direct-sequence spread-spectrum (DSSS),

818Discharging efficiency, 706, 708Discharging rate, 719Dissemination of data in VANETs, 520Dissociative node (DN), 615Distributed computation, 491, 493–494,

496, 498, 501, 510–512Diversity gain, 821, 827D-minCost, 536DMV, 672Doppler spread, 807, 813, 814, 816, 820DOT (Department of transportation),

649DPP, 529DSRC, 521, 646Duty-cycle, 704, 722, 723, 726, 727DV-CAST, 533Dynamic voltage and frequency scaling

(DVFS), 718, 720

EB3 (Elastic book store), 651EC2 (Elastic compute cloud), 651EDR (Event data recorder), 648Effective communication range, 568Electric field, 709Electromagnetic, 709, 710Electrostatic, 709, 710EMDOR, 528Energy availability, 703, 715, 717, 721Energy buffer, 705, 726Energy consumption, 707, 720, 728Energy harvested, 707, 708, 714, 715, 721Energy harvester, 705, 714Energy harvesting-based wireless sensor

networks (EHWSNs), 703, 704,715, 717

Energy harvesting techniquesacoustic noise, 712, 713biochemical, 712electromagnetic, 710, 713electrostatic, 710, 713mechanical, 709

photovoltaic, 710, 713piezoelectric, 709, 713pyroelectric, 711, 713resonant, 711RF, 711, 713thermal, 710thermoelectric, 710, 713wind, 712, 713wireless, 711

Energy neutral operation (ENO), 722Energy neutrality, 720Energy overflow, 720Energy prediction models, 714–715

ETH predictor, 715exponentially weighted moving-average

(EWMA), 714pro-energy, 715weather conditioned moving average

(WCMA), 714Energy source, 718Energy storage, 705, 706, 708, 718, 719,

721, 724Energy types, 709Enhanced Distributed Channel Access

(EDCA), 605Entropy, 773Environmental source, 704Epidemic routing, 534Event-driven messages, 600Experimental platforms, 194, 834

APE, 194DOME, 195MAC layer emulators, 198mobile emulab, 195physical layer emulators, 197QuRiNet, 195

Faraday’s law, 710Fairness, 282, 602

max-min, 282proportional, 282

FCC (Federal CommunicationsCommission), 646

Feedback-based path selection, 280, 307gateway-driven solutions, 307GLWB, 307load balancing, 280, 307online algorithms, 307residual capacity, 308

Page 4: Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

856 INDEX

Field-programmable gate array (FPGA),781–782, 797

FleetNet project, 591Flooding, 534Focused coverage, 745FRAM, 784–785Frequency-division multiple access

(FDMA), 606, 822Frequency-shift keying (FSK), 814Friis free space model, 561

Gaussian, 773, 777–778, 790, 792–793Genetic algorithm, 757Geocasting, 520, 525, 527, 593Geometric spreading

cylindrical, 808spherical, 808

Geometric spreading loss, 808GeOpps, 538Global optimization for impatient users,

469delay-utility function, 470optimal solution, 472performance results, 473query counting replication (QCR)

scheme, 472social welfare, 471

Global positioning system (GPS), 602GrooveNet, 557Guard interval (GI), 606GyTAR, 538

HERO protocol, 586Highway capacity manual

(HCM), 565HOV, 661

IaaS (infrastructure as a service), 651IEEE 1609 WAVE Standards, 603

IEEE 1609.1, 603IEEE 1609.2, 603IEEE 1609.3, 603IEEE 1609.4, 603, 626

IEEE-802.11e, 605IEEE 802.11s, 44–48

medium access control (MAC),46–48

routing, 45–46IEEE 802.11n, 48–49

IEEE 802.11p, 50–53, 564, 605, 621, 629GeoNetworking, 51–53medium access control (MAC), 51physical layer, 50–51

IEEE 802.11z, 49IEEE 802.15.5, 53–57

address allocation, 56mobility, 57network formation, 55routing, 56–57

IEEE 802.16d (mesh), 37–40centralized mode, 37–39distributed mode, 39–40

IEEE 802.16j, 40–43non-transparent relaying, 42–43transparent relaying, 41–42

IEEE 802.21, 65–67IEEE 802.22, 621IETF IPv6 over Low-power WPAN

(6LoWPAN) Working Group,60–61

IETF Routing Over Low-power and Lossynetworks (ROLL) Working Group,61

ILD (inductive loop detectors), 649Induction, 710Inductive coupling

resonant, 711strong, 712weak, 712

Informational messages, 601Integer division theorem, 611Integrated simulator, 546, 557Integrity, 669Intelligent transportation system (ITS),

579, 599Intercarrier interference (ICI), 820Inter-contact times (ICTs), 584,Interference model, 244

physical model, 245protocol model, 244

Intermittent connectivity, 524Intersymbol interference (ISI), 813, 814,

815, 820IT (information technology), 651ITS (Intelligent transportation systems),

545, 646

Journey (path over time), 571

Page 5: Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

INDEX 857

Key assignment, 678Key revocation, 679Key verification, 679

Lag time, 824Layered architecture, 833Leakage, 706, 707, 710, 721Limited mobility, 769–771, 775, 786,

789–790Location security, 683Log-normal path loss, 562, 566

Mac layer, 212back-off procedure, 214bugs and errors, 213implementation accuracy, 213manufacturer idiosyncrasies, 213standard interpretation, 213transmission rate, 214

Magnetic field, 710Mathematical programming of Mesh

resource managementcolumn generation, 250, 256, 267cooperation graph, 263formulation, 246–247, 249–250,

255–256, 258–259, 262–263, 269path generation, 256superlink, 264–265supernode, 264

MapReduce, 492, 498, 510–511Minimum-cost path selection techniques,

280optimization-based path selection

techniques, 279taxonomy, 279

MaxProp protocol, 582MCTRP, 615Mechanical energy harvesting, 709, 710Medium access control (MAC) for WSNs

energy adaptive (EA-MAC), 723, 725multi-tier probabilistic polling (MTTP),

724, 725on-demand (ODMAC), 722, 725probabilistic polling (PP-MAC), 723, 725

Medium access control (MAC) forVANETs, 600–638

Medium access control (MAC) forUW-ASNs

ALOHA-based, 822, 823

CDMA-based, 822, 826CSMA-based, 822, 824FDMA-based, 822, 823TDMA-based, 822, 823

Mesh networksarchitectures, 155–156, 166–167bash, 164–166end-user mobility definitions and

challenges, 156–158IEEE 802.21, 168–169iMesh, 162macromobility support, 168–181micromobility support, 158–181properties, 162–163SMesh, 172–178SyncScan, 158–159WiOptiMo, 178–181

Message aggregation, 683Message content, 524MHVB (Multihop vehicular broadcast),

528Microcontroller, 705Microscopic traffic applet, 554Military applications

communication, 79coordination, 81distributed sensing, 81UAVs, 81, 90

Mission (WSN appropriate task)assignment, 721critical, 722leader, 721

MobEyes protocol, 589MOBIL, 549Mobile ad hoc networks (MANETs)

architecture, 6challenges, 25–26cross-layer architectures, 10–14cross-layer issues, 9–10enabling technologies, 6energy-efficiency, 9IETF MANET working group, 6middleware, 8MobileMAN, 12–13routing and forwarding protocols, 7–8security and cooperation, 10socioeconomic aspects, 16testbeds, 15

Mobility, 510, 512, 445

Page 6: Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

858 INDEX

Mobility management in Cellular/4GNetworks, 588

Mobility model analysis in VANETs,578, 586

Mobility model in VANETs, 546–547Mobility simulator, 546, 551Modular sensor network, 779Modulation

coherent, 815multicarrier, 820noncoherent, 814spatial, 814

Mote, 774MOVE, 556Multi-application platform, 784Multicarrier modulation, 820Multi-hop ad hoc networking

mesh networks, 17–18, 154–157opportunistic networks, 19–21sensor networks, 23–24vehicular ad hoc networks (VANETs),

22–23Multipath, 807, 813, 814Multipath delay spread, 815, 816Multiple access interference (MAI), 827Multiple access techniques, 822Multiple frequency-shift keying (MFSK),

815Multiple-input-multiple-output (MIMO),

821, 827Multiplexing gain, 821, 827Mutual information, 773Multi-lane traffic, 549

NaaS (Network as a Service), 654Nakagami fading, 563, 566NCTUns, 557Neighbour elimination, 522, 526Neighbour knowledge, 521Neponset river, 790, 794Network connectivity applications

interplanetary internet, 81municipal systems, 84rural communication, 83

one laptop per child project, 83SARI project, 83Kiosknet, 83network layer, 829

Network simulator, 546

NHTSA (National Highway Traffic SafetyAdministration), 648

Node deregistration, 688Node registration, 686Noise in UW-A, 807, 811Noncoherent modulation, 814NOW project, 592NS-2 in VANETs, 546, 557, 566NS-3 in VANETs, 557

Objective function, 773, 776, 778, 792,794–795

Omnet++ in VANETs, 546, 557On-board unit (OBU), 684OPERA, 529OPNET in VANETs, 557Opportunistic computing, 24–25Opportunistic networks, 491, 493, 500, 511

contact time analysis, 370–374data dissemination, 453

ContentPlace, 459global optimization for impatient

users, 469PodNet, 455Pub/sub overlay, 465Push-and-Track, 475taxonomy, 455universal swarms for data

dissemination, 479delay-capacity tradeoff, 396–397delay-energy tradeoff, 413–414delay-load balance tradeoff, 398–399experimental data, 363–366, 392–393,

396flight length analysis, 378–380inter-contact time analysis, 361–372IRTF Delay-Tolerant Networking

Research Group (DTNRG), 20Levy walk and Levy flight, 384, 407–408mobile data offloading, 409–412mobility models, 360–414pause time analysis, 377–378programming, 491–492, 510–512social structure, 402–406socially aware task farming, 510–511spatial context distribution, 386–389

Opportunistic routing, 538, 578, 586, 419BubbleRap, 442, 467delegation forwarding, 442, 444

Page 7: Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

INDEX 859

encounter-based routing (EBR), 447epidemic routing immunization, 430epidemic routing, 429–430flooding, 428–430gossiping, 430hybrid routing, 444–447limited-time flooding, 430minimum estimated expected delay

(MEED), 443minimum expected delay (MED), 443ORWAR, 444PRoPHET, 403–405, 437, 443, 445,

446, 510randomized flooding, 430RAPID, 444redundancy-based routing, 422, 428

coding based schemes, 433controlled replication, 431

SimBet, 442, 446, 510SLEF, 430space-time path, 428spray and focus, 446spray and wait, 431store-carry-forward, 421, 428two-hop routing, 430utility-based routing, 436

contact-based utility, 436non-contact-based utility, 444

Optical modem, 787, 789, 796–797Optimization-based path selection, 279, 280

elastic demands, 283LMMBA, 284MMBA, 284

fixed demands, 285flow bandwidth allocation vector, 281link bandwidth allocation vector, 281network utility maximization, 284saturated flows, 289

MaLB, 289SWARM, 290

Stochastic demands, 288throughput maximization, 279, 281traffic awareness, 291unknown demands, 286

Optimum velocity model, 548Orthogonal frequency-division

multiplexing (OFDM), 820Overhead in IEEE 802.11p, 605Overlay in VANETs, 539

P2P, 646PaaS (Platform as a Service), 651PARAMICS, 551Park-and-plug, 658Path loss, 807, 808Pay-as-you-go, 652Peercast, 614Periodic messages, 600Personal Area Networks (PAN), 53–65Personal Content Dissemination

Applications, 96BlueTorrent, 97Haggle Project, 97WiFi Direct, 97

PKI (Public Key Infrastructure), 667Phase-shift keying (PSK), 815Photovoltaic, 710Physical layer, 813Physical layer modeling, 199

adjacent co-channel interference, 205bonnmotion, 220carrier sense, 204capture effect, 205cooperative transmission, 263directional antenna, 261interference, 204, 208mobility, 209reception model, 204radio propagation model, 203, 206

free space propagation, 206two-ray ground propagation, 206Rayleigh propagation, 206Ricean propagation, 207shadowing, 206, 207

transmission preamble, 203Physical layer modeling in MESH, 243

multiple channels, 243, 257–258power control, 252rate adaptation, 252

Piezoelectric, 709, 710Planned evacuation, 663PodNet, 455

channels, 456dissemination strategies, 457performance results, 458

Power density, 713Power management , 705, 779,

783, 787PP-CSMA, 613

Page 8: Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

860 INDEX

Predictionerror, 714interval, 715model, 713, 719, 722

Pressure, 709Privacy breach, 670Propagation delay, 807, 822Proxy MIPv6, 65Psychophysical model, 548Pub/sub overlay, 465

broker election, 467brokers, 464closeness centrality, 467community detection, 466performance results, 468

Pure ALOHA, 823Purely phase-coherent, 815Push-and-track, 475

objective function, 475performance results, 477The offloading concept, 475when-strategies, 476whom-strategies, 476

Puzzle check, 676Pyroelectric, 711

Quadrature amplitude modulation(QAM), 815

Quadrature phase shift keying (QPSK), 820Quality of Service (QoS), 276, 605

definition, 277hard QoS, 278relative QoS, 278routing, 276soft QoS, 278

QUALNET in VANETs, 557QuickWiFi, 580

Radio transceiver, 705Random access, 611Range, 807, 808RAPID protocol, 583Rayleigh fading, 563RBVT (Road-based vehicular traffic

routing), 538Receiver consensus, 529Recharge cycle, 708Rechargeable batteries, 706, 708Reinforcement learning, 623

Re-keying, 678Reliability, 525, 526, 602Repudiation, 670Resource aggregation, 683RF, 711Rician fading, 563Ring founder node (RFN), 615–616Road-side infrastructure, 646Road-side unit (RSU), 585, 602Robot dispatch, 764Robot-assisted wireless sensor networks,

737Round trip time (RTT), 813Routing metrics, 280, 291

ALARM, 298C2WB, 299CATT, 298Configurability, 306CWB, 299DARM, 304design principles, 292EDR, 304EETT, 298EFW, 296ELP, 297ETN, 295ETP, 290, 298ETT, 295ETX, 295full-path scope, 300GARM, 296IAR, 297iAWARE, 302iETT, 301ILA, 302INX, 298LAETT, 299link and path measurements, 292, 396link-restricted scope, 294MCR, 302MD, 296mETX, 295MIC, 300MIND, 303MTM, 295neighborhood-restricted scope, 298PEF, 305RARE, 297stability, 306

Page 9: Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

INDEX 861

WCETT, 300WCETT-LB, 301WEED, 303

Routing in VANETs, 520, 529, 534RSS (received signal strength), 526RSU, 684Routing protocols (energy efficient), 725

D-APOLLO, 726, 727DEHAR, 726E-WME, 727EHOR, 726GREES-L, 727, 728GREES-M, 727, 728HESS, 725, 726R-MF, 727

Routing protocols in MESH, 276Routing protocols for UW-A, 829

geographical, 829location-based, 830–831non-location-based routing protocols,

831–833proactive, 829reactive, 829

Routing protocols in validation, 217RPL, 61–64

S3 (Simple Storage Service), 651SaaS (Software as a Service), 652SADV, 537Safe distance model, 548Safety information dissemination, 592Sanitization, 674SCH interval (SCHI), 604Search and rescue applications, 89–90

area exploration, 90stigmergy, 91Ants algorithm, 91Brick & Mortar, 92UAV, 90

Self-discharge, 706, 707, 708Semi-dissociative node (SDN), 615Sensor

maintenance, 762placement, 740, 748relocation, 751

Sensor networksarchitectures, 182FLEXOR, 184–186MIPv6, 182

mobile phone sensing, 24–25mobile sinks, 182–184modular design, 185mules, 182–183opportunistic sensing, 24participatory sensing, 24IEEE 802.14.5, 182

Service channels (SCHs), 602ShanghaiGrid, 584Skewed degree distribution, 441Signal-to-noise ratio (SNR), 812Simulation-testbed interoperability, 226Simulation tools, 192

GloMoSim, 193, 219, 221, 222ns-2, 193, 219, 221, 222ns-3, 193, 219, 221, 222Opnet, 193, 219, 221, 222Omnet++, 194, 219, 221, 222QualNet, 193, 219, 221, 222Jist, 194, 219, 221, 222

Single-input-single-output (SISO), 827SINR(signal-to-interference-noise ratio),561Slotted p-persistence, 526SmartAHS, 554Small world, 441SNR, 561Social graph, 439

contact aggregation, 440weighted graph, 440

Social networks, 494, 500, 511–512centrality, 494, 503, 511community, 494, 500–503, 510–512

Solar, 710, 713, 714, 715, 716Spatial modulation, 820Spectrum management

cognitive cycle, 623control channel, 626primary User, 622public safety communication, 628software defined radio, 622, 634spectrum access, 634spectrum horizon, 634spectrum selection, 634spectrum sensing

mobile sensing, 636–637sensing techniques, 632spectrum cooperation, 633–634spectrum database, 632spectrum measurements, 631

Page 10: Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

862 INDEX

Spoofing, 670StandardsStimulus-response model, 547Store-carry-forward, 571, 578SUMO, 555, 569Spreading factor, 808Super-capacitor, 706, 707, 721, 722, 725SWANS, 557SWANS++, 557Sybil attack, 674Symmetric algorithms, 675Sync interval (SI), 603

Taking turns, 615Tampering, 670Task

allocation, 717, 721aperiodic, 717, 718deadline, 717, 718, 719, 720dependent, 717execution time, 718, 719, 720independent, 717multi-version, 717network, 717, 718node, 717, 718non-preemptive, 717, 719periodic, 717, 718, 719, 720power requirement, 718, 719preemptive, 717, 718, 719reward, 718, 719running speed, 718, 720scheduling, 717, 718, 720utility, 720virtual, 719

Task farming, 491, 493, 498–507, 510–511Task scheduling algorithms

adaptive scheduling DVFS (AS-DVFS),720

earliest deadline with energy guarantee(EDeg), 719

energy-aware DVFS (EA-DVFS), 720harvesting-aware DVFS (HA-DVFS),

720lazy scheduling algorithm (LSA), 718multi-version scheduling algorithm

(MVSA), 719smooth to average method (STAM),

718smooth to full utilization (STFU), 718

TBD (Trajectory-Based Data Forwarding),536

TEMIC Speech Dialog Systems GmbH,591

Thermal, 710, 711Thermocouple, 711Thermoelectric, 710, 711Thermopile, 710Throughput, 602Throwbox, 581Time delay, 528, 536Time-Division Multiple Access (TDMA),

248, 606, 819TO-GO, 533Token Holder node (THN), 615TOPO, 538TraCI, 558TRADE, 532Traffic condition perception, 586Trajectory-based model, 548TraNS, 557Transmission loss, 808Trust management, 683TSIS-CORSIM, 551Turbine, 712, 716Turbo equalizer, 817Two-ray ground reflection model, 562

UART, 781–783, 785UDG (uniform disk graph), 560Unattended wireless sensor networks

(UWSNs), 125authentication, 129backward secrecy, 128data survivability, 126forward secrecy, 128self-key healing, 128smart adversary, 128–129

Underwater acoustic (UW-A)channel, 807

horizontal, 813, 815impulse response, 813overspread, 814underspread, 814vertical, 813, 816

communications, 807deep water, 808, 826shallow water, 808, 826

propagation speed, 813

Page 11: Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

INDEX 863

Underwater acoustic sensor networks(UW-ASNs), 822

Underwater robot see: autonomousunderwater vehicle

Underwater sensor network, 771–775,789–790

Universal swarms for data dissemination,479

individual swarm, 479BARON heuristic, 481stability region, 480

Unplanned evacuation, 663Urban air quality sensing, 588

Validation, 220, 223V2I (vehicles to the infrastructure), 518,

577, 650V2V (vehicles to vehicle), 518, 577, 650VADD (vehicle-assisted data delivery), 536VANET applications, 519VanetMobiSim, 555VC (vehicular cloud), 647, 653VDEB (Vehicle density-based emergency

broadcasting), 533Vehicle tracking, 585Vehicular ad hoc networks (VANETs)

advantages and problems, 137alert messages, 138announcement messages, 138dedicated short-range communications

(DSRC), 137design goals and challenges, 139identity-based group signatures, 143message aggregation, 140–141on-board units (OBUs), 137privacy, 139, 141roadside units (RSUs), 137scalability, 139, 140security, 139, 141Sybil attack, 142

Vehicular network applications, 93coordination, 94

PATH program, 94driving safety support systems (DSSS), 93DSRC, 93intelligent transport systems, 95

CarTel, 96traffic avoidance, 96CATE, 96

notification systems, 94epidemic dissemination, 94publish/subscribe, 94FeetNet, 95CarTalk, 95DieselNet, 95CarView, 95GeOpps, 95

vehicle to vehicle, 93Vehicular networking, 646, 649Vehicular self-organized MAC

(VeSOMAC), 607Vehicular surveillance and sensing system

(VS3), 587Veins, 557VeMAC, 608Verification, 220, 223VGSIM, 557vibration for mechanical energy harvesting,

709, 710Video traffic (VI), 605ViFi protocol, 583Virtualization, 657, 685VISSIM, 551VM (virtual machines), 669Voice traffic (VO), 605Voltage, 707

Water filling, 529WAVE, 563Weather, 714, 715, 716WiFi monitoring, 581Winch, 775, 786–787, 788, 792, 798Wind, 712, 713, 714, 716Wireless access in vehicular environments

(WAVE), 603Wireless Ad Hoc networks

features, 109security challenges, 108

Wireless local access (WLAN), 43–53Wireless Mesh networks (WMNs)

architecture, 242, 275–276backbone, 130countermeasures, 132gateway, 277interference, 276Mesh routers, 130MIMO, 290optimization

Page 12: Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

864 INDEX

Wireless Mesh networks (Continued)channel assignment, 257link activation, 245–246routing, 254–255scheduling, 247, 254

routing, 276–277security challenges, 132traffic types, 277

Wireless signal propagation model,547, 561

Wireless sensor network applications, 84animal monitoring, 88

ZebraNet, 88WildSensing, 89

body and health monitoring, 85environmental monitoring, 87industrial monitoring, 86internet of things, 86smart homes, 85

Wireless sensor networks (WSNs) securityattacks taxonomy, 112Black and Sink Hole attack, 117data integrity, 123desynchronization, 121eavesdropping, 122flooding, 121IEEE 802.15.4, 110jamming, 111–113privacy, 121Sybil attack, 119tampering, 114trafic analysis, 123wormhole attack, 118ZigBee, 111

ZigBee, 57–59mobility, 59routing, 58