mobile ad hoc networking (cutting edge directions) || index
TRANSCRIPT
INDEX
Absorptioncoefficient, 808
Fisher and Simmons formula, 810loss, 809Thorp’s formula, 809
Access control, 539, 581, 676Acknowledgment, 521, 522ackPBSM, 525Acoustic modems, 781, 787, 789, 792,
795–797, 835, 837Ad hoc – large scale deployment, 546Advanced safety vehicles (ASVs),
593Analog to digital converter (ADC), 780,
782–783, 789Anchor paging controller (APC), 589Anchors, 534Anonymous keys, 677ANSWER, 665Anti-dos, 674Application categories (ACs), 605Applications in DTN
content search, 341–344email, 324–326floating content, 352–357web, 336–339XMPP, 326–328
Application mechanismsapplication semantics, 323proxies and gateways, 331–334
security, 323, 328–331transport protocols, 322user interfaces, 334–335
Application scenariosunderground mining, 318–320, 346–349urban environments, 320–322
AquaNode, 775, 786–789, 795, 798Arbitration Inter Frame Space (AIFS), 605Artificial ant colonies, 754Artificial light, 710Attacker, 668Attenuation, 809, 810Authentication, 674, 676Autonomous underwater vehicle (AUV),
770–771, 773Availability, 669AWS, 651
Background traffic (BK), 605Backoff timer (BT), 601bandwidth efficiency in UAN, 815, 819, 820,bandwidth in UAN, 808, 818, 822Basic Service Set (BSS), 605Beacon, 522Best effort traffic (BE), 605Bit error rate (BER) in UAN, 815, 822Black burst, 523, 531Bluetooth in UAN, 786–787, 789, 796BMV, 670BPAB, 531
Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition. Edited by Stefano Basagni,Marco Conti, Silvia Giordano, and Ivan Stojmenovic.© 2013 by The Institute of Electrical and Electronics Engineers, Inc. Published 2013 by John Wiley & Sons, Inc.
853
854 INDEX
Broadband Wireless Access (BWA), 37–43Broadcasting, 520
CA (Certification Authority), 667CaaS (Cooperation as a Service), 656Cabernet, 580CafNet, 580Calibration, 220, 223Capacitor, 710CAR (Connectivity-Aware Routing), 534Car following, 547Carmeq GmbH, 592CarTel Project, 579CarTorrent protocol, 589CBRF (Connection-Based Restricted
Forwarding), 533CC - Cloud computing, 650CCA (cooperative collision avoidance), 527CCH interval (CCHI), 604Cell-based model, 548Channel access time, 602Channel coherence time, 813Channel equalization, 816Channel impulse response, 813Charging efficiency, 706Chromophoric dissolved organic matter
(CDOM), 787, 790–792, 794Clusterhead (CH), 610Clustering, 500–501
Fielder clustering, 501K-Clique, 501
Code-division multiple access (CDMA), 606CodeTorrent, 589Cognitive radio vehicular Ad Hoc networks
applications, 628–629architecture, 629–630characteristics, 622–628definition, 621security, 637simulation tools, 638–640
Coherence bandwidth, 815Coherent modulation, 815Collision avoidance systems (CCA), 601Community structure, 441Confidentiality, 669Congestion, 528Connected dominating set, 525Connectivity, 523, 547, 565, 422
almost connected networks, 423
connectivity islands, 424sparse networks, 424
Contact aggregation, 440Contact graph, 439
contact aggregation, 440unweighted graph, 441weighted graph, 440–441
ContentPlace, 460dissemination strategies, 462knapsack problem, 460performance results, 463utility function, 461
Content sharing, 589Contention-based forwarding (CBF)
protocol, 591Contention window (CW), 607Control channel (CCH), 605Conversion efficiency, 713Covariance, 771–773, 775–777, 790–796CSMA/CA, 607CTP, 580CVeT testbed, 589Crowd computing, 491–494, 498, 508,
510–512
Data center for VC, 658Data isolation for VC, 674Data leak for VC, 670DEAR (Distance-aware epidemic routing),
534Dedicated short-range communications
(DSRC), 578, 590–591, 595, 602Decentralized control algorithm, controller,
771, 773, 775–778, 789Decentralized depth controller, 787,
789–792, 793–797Decentralized gradient-descent, 773,
775–786, 789–792Decision feedback equalizer (DFE), 816Delay tolerant networks (DTNs), 134, 317,
578, 582applications, 135bundle layer, 135hierarchical identity-based cryptography
(HIBC), 136–137security issues, 136
Denial of service in VANETs, 670Depth adjustment, 771–772, 774, 786–787,
789, 793, 796–800
INDEX 855
Depth first search, 538DieselNet, 581Differentially coherent, 815Digital signatures, 675Direct-sequence code division multiple
access (DS-CDMA), 819, 826Direct-sequence spread-spectrum (DSSS),
818Discharging efficiency, 706, 708Discharging rate, 719Dissemination of data in VANETs, 520Dissociative node (DN), 615Distributed computation, 491, 493–494,
496, 498, 501, 510–512Diversity gain, 821, 827D-minCost, 536DMV, 672Doppler spread, 807, 813, 814, 816, 820DOT (Department of transportation),
649DPP, 529DSRC, 521, 646Duty-cycle, 704, 722, 723, 726, 727DV-CAST, 533Dynamic voltage and frequency scaling
(DVFS), 718, 720
EB3 (Elastic book store), 651EC2 (Elastic compute cloud), 651EDR (Event data recorder), 648Effective communication range, 568Electric field, 709Electromagnetic, 709, 710Electrostatic, 709, 710EMDOR, 528Energy availability, 703, 715, 717, 721Energy buffer, 705, 726Energy consumption, 707, 720, 728Energy harvested, 707, 708, 714, 715, 721Energy harvester, 705, 714Energy harvesting-based wireless sensor
networks (EHWSNs), 703, 704,715, 717
Energy harvesting techniquesacoustic noise, 712, 713biochemical, 712electromagnetic, 710, 713electrostatic, 710, 713mechanical, 709
photovoltaic, 710, 713piezoelectric, 709, 713pyroelectric, 711, 713resonant, 711RF, 711, 713thermal, 710thermoelectric, 710, 713wind, 712, 713wireless, 711
Energy neutral operation (ENO), 722Energy neutrality, 720Energy overflow, 720Energy prediction models, 714–715
ETH predictor, 715exponentially weighted moving-average
(EWMA), 714pro-energy, 715weather conditioned moving average
(WCMA), 714Energy source, 718Energy storage, 705, 706, 708, 718, 719,
721, 724Energy types, 709Enhanced Distributed Channel Access
(EDCA), 605Entropy, 773Environmental source, 704Epidemic routing, 534Event-driven messages, 600Experimental platforms, 194, 834
APE, 194DOME, 195MAC layer emulators, 198mobile emulab, 195physical layer emulators, 197QuRiNet, 195
Faraday’s law, 710Fairness, 282, 602
max-min, 282proportional, 282
FCC (Federal CommunicationsCommission), 646
Feedback-based path selection, 280, 307gateway-driven solutions, 307GLWB, 307load balancing, 280, 307online algorithms, 307residual capacity, 308
856 INDEX
Field-programmable gate array (FPGA),781–782, 797
FleetNet project, 591Flooding, 534Focused coverage, 745FRAM, 784–785Frequency-division multiple access
(FDMA), 606, 822Frequency-shift keying (FSK), 814Friis free space model, 561
Gaussian, 773, 777–778, 790, 792–793Genetic algorithm, 757Geocasting, 520, 525, 527, 593Geometric spreading
cylindrical, 808spherical, 808
Geometric spreading loss, 808GeOpps, 538Global optimization for impatient users,
469delay-utility function, 470optimal solution, 472performance results, 473query counting replication (QCR)
scheme, 472social welfare, 471
Global positioning system (GPS), 602GrooveNet, 557Guard interval (GI), 606GyTAR, 538
HERO protocol, 586Highway capacity manual
(HCM), 565HOV, 661
IaaS (infrastructure as a service), 651IEEE 1609 WAVE Standards, 603
IEEE 1609.1, 603IEEE 1609.2, 603IEEE 1609.3, 603IEEE 1609.4, 603, 626
IEEE-802.11e, 605IEEE 802.11s, 44–48
medium access control (MAC),46–48
routing, 45–46IEEE 802.11n, 48–49
IEEE 802.11p, 50–53, 564, 605, 621, 629GeoNetworking, 51–53medium access control (MAC), 51physical layer, 50–51
IEEE 802.11z, 49IEEE 802.15.5, 53–57
address allocation, 56mobility, 57network formation, 55routing, 56–57
IEEE 802.16d (mesh), 37–40centralized mode, 37–39distributed mode, 39–40
IEEE 802.16j, 40–43non-transparent relaying, 42–43transparent relaying, 41–42
IEEE 802.21, 65–67IEEE 802.22, 621IETF IPv6 over Low-power WPAN
(6LoWPAN) Working Group,60–61
IETF Routing Over Low-power and Lossynetworks (ROLL) Working Group,61
ILD (inductive loop detectors), 649Induction, 710Inductive coupling
resonant, 711strong, 712weak, 712
Informational messages, 601Integer division theorem, 611Integrated simulator, 546, 557Integrity, 669Intelligent transportation system (ITS),
579, 599Intercarrier interference (ICI), 820Inter-contact times (ICTs), 584,Interference model, 244
physical model, 245protocol model, 244
Intermittent connectivity, 524Intersymbol interference (ISI), 813, 814,
815, 820IT (information technology), 651ITS (Intelligent transportation systems),
545, 646
Journey (path over time), 571
INDEX 857
Key assignment, 678Key revocation, 679Key verification, 679
Lag time, 824Layered architecture, 833Leakage, 706, 707, 710, 721Limited mobility, 769–771, 775, 786,
789–790Location security, 683Log-normal path loss, 562, 566
Mac layer, 212back-off procedure, 214bugs and errors, 213implementation accuracy, 213manufacturer idiosyncrasies, 213standard interpretation, 213transmission rate, 214
Magnetic field, 710Mathematical programming of Mesh
resource managementcolumn generation, 250, 256, 267cooperation graph, 263formulation, 246–247, 249–250,
255–256, 258–259, 262–263, 269path generation, 256superlink, 264–265supernode, 264
MapReduce, 492, 498, 510–511Minimum-cost path selection techniques,
280optimization-based path selection
techniques, 279taxonomy, 279
MaxProp protocol, 582MCTRP, 615Mechanical energy harvesting, 709, 710Medium access control (MAC) for WSNs
energy adaptive (EA-MAC), 723, 725multi-tier probabilistic polling (MTTP),
724, 725on-demand (ODMAC), 722, 725probabilistic polling (PP-MAC), 723, 725
Medium access control (MAC) forVANETs, 600–638
Medium access control (MAC) forUW-ASNs
ALOHA-based, 822, 823
CDMA-based, 822, 826CSMA-based, 822, 824FDMA-based, 822, 823TDMA-based, 822, 823
Mesh networksarchitectures, 155–156, 166–167bash, 164–166end-user mobility definitions and
challenges, 156–158IEEE 802.21, 168–169iMesh, 162macromobility support, 168–181micromobility support, 158–181properties, 162–163SMesh, 172–178SyncScan, 158–159WiOptiMo, 178–181
Message aggregation, 683Message content, 524MHVB (Multihop vehicular broadcast),
528Microcontroller, 705Microscopic traffic applet, 554Military applications
communication, 79coordination, 81distributed sensing, 81UAVs, 81, 90
Mission (WSN appropriate task)assignment, 721critical, 722leader, 721
MobEyes protocol, 589MOBIL, 549Mobile ad hoc networks (MANETs)
architecture, 6challenges, 25–26cross-layer architectures, 10–14cross-layer issues, 9–10enabling technologies, 6energy-efficiency, 9IETF MANET working group, 6middleware, 8MobileMAN, 12–13routing and forwarding protocols, 7–8security and cooperation, 10socioeconomic aspects, 16testbeds, 15
Mobility, 510, 512, 445
858 INDEX
Mobility management in Cellular/4GNetworks, 588
Mobility model analysis in VANETs,578, 586
Mobility model in VANETs, 546–547Mobility simulator, 546, 551Modular sensor network, 779Modulation
coherent, 815multicarrier, 820noncoherent, 814spatial, 814
Mote, 774MOVE, 556Multi-application platform, 784Multicarrier modulation, 820Multi-hop ad hoc networking
mesh networks, 17–18, 154–157opportunistic networks, 19–21sensor networks, 23–24vehicular ad hoc networks (VANETs),
22–23Multipath, 807, 813, 814Multipath delay spread, 815, 816Multiple access interference (MAI), 827Multiple access techniques, 822Multiple frequency-shift keying (MFSK),
815Multiple-input-multiple-output (MIMO),
821, 827Multiplexing gain, 821, 827Mutual information, 773Multi-lane traffic, 549
NaaS (Network as a Service), 654Nakagami fading, 563, 566NCTUns, 557Neighbour elimination, 522, 526Neighbour knowledge, 521Neponset river, 790, 794Network connectivity applications
interplanetary internet, 81municipal systems, 84rural communication, 83
one laptop per child project, 83SARI project, 83Kiosknet, 83network layer, 829
Network simulator, 546
NHTSA (National Highway Traffic SafetyAdministration), 648
Node deregistration, 688Node registration, 686Noise in UW-A, 807, 811Noncoherent modulation, 814NOW project, 592NS-2 in VANETs, 546, 557, 566NS-3 in VANETs, 557
Objective function, 773, 776, 778, 792,794–795
Omnet++ in VANETs, 546, 557On-board unit (OBU), 684OPERA, 529OPNET in VANETs, 557Opportunistic computing, 24–25Opportunistic networks, 491, 493, 500, 511
contact time analysis, 370–374data dissemination, 453
ContentPlace, 459global optimization for impatient
users, 469PodNet, 455Pub/sub overlay, 465Push-and-Track, 475taxonomy, 455universal swarms for data
dissemination, 479delay-capacity tradeoff, 396–397delay-energy tradeoff, 413–414delay-load balance tradeoff, 398–399experimental data, 363–366, 392–393,
396flight length analysis, 378–380inter-contact time analysis, 361–372IRTF Delay-Tolerant Networking
Research Group (DTNRG), 20Levy walk and Levy flight, 384, 407–408mobile data offloading, 409–412mobility models, 360–414pause time analysis, 377–378programming, 491–492, 510–512social structure, 402–406socially aware task farming, 510–511spatial context distribution, 386–389
Opportunistic routing, 538, 578, 586, 419BubbleRap, 442, 467delegation forwarding, 442, 444
INDEX 859
encounter-based routing (EBR), 447epidemic routing immunization, 430epidemic routing, 429–430flooding, 428–430gossiping, 430hybrid routing, 444–447limited-time flooding, 430minimum estimated expected delay
(MEED), 443minimum expected delay (MED), 443ORWAR, 444PRoPHET, 403–405, 437, 443, 445,
446, 510randomized flooding, 430RAPID, 444redundancy-based routing, 422, 428
coding based schemes, 433controlled replication, 431
SimBet, 442, 446, 510SLEF, 430space-time path, 428spray and focus, 446spray and wait, 431store-carry-forward, 421, 428two-hop routing, 430utility-based routing, 436
contact-based utility, 436non-contact-based utility, 444
Optical modem, 787, 789, 796–797Optimization-based path selection, 279, 280
elastic demands, 283LMMBA, 284MMBA, 284
fixed demands, 285flow bandwidth allocation vector, 281link bandwidth allocation vector, 281network utility maximization, 284saturated flows, 289
MaLB, 289SWARM, 290
Stochastic demands, 288throughput maximization, 279, 281traffic awareness, 291unknown demands, 286
Optimum velocity model, 548Orthogonal frequency-division
multiplexing (OFDM), 820Overhead in IEEE 802.11p, 605Overlay in VANETs, 539
P2P, 646PaaS (Platform as a Service), 651PARAMICS, 551Park-and-plug, 658Path loss, 807, 808Pay-as-you-go, 652Peercast, 614Periodic messages, 600Personal Area Networks (PAN), 53–65Personal Content Dissemination
Applications, 96BlueTorrent, 97Haggle Project, 97WiFi Direct, 97
PKI (Public Key Infrastructure), 667Phase-shift keying (PSK), 815Photovoltaic, 710Physical layer, 813Physical layer modeling, 199
adjacent co-channel interference, 205bonnmotion, 220carrier sense, 204capture effect, 205cooperative transmission, 263directional antenna, 261interference, 204, 208mobility, 209reception model, 204radio propagation model, 203, 206
free space propagation, 206two-ray ground propagation, 206Rayleigh propagation, 206Ricean propagation, 207shadowing, 206, 207
transmission preamble, 203Physical layer modeling in MESH, 243
multiple channels, 243, 257–258power control, 252rate adaptation, 252
Piezoelectric, 709, 710Planned evacuation, 663PodNet, 455
channels, 456dissemination strategies, 457performance results, 458
Power density, 713Power management , 705, 779,
783, 787PP-CSMA, 613
860 INDEX
Predictionerror, 714interval, 715model, 713, 719, 722
Pressure, 709Privacy breach, 670Propagation delay, 807, 822Proxy MIPv6, 65Psychophysical model, 548Pub/sub overlay, 465
broker election, 467brokers, 464closeness centrality, 467community detection, 466performance results, 468
Pure ALOHA, 823Purely phase-coherent, 815Push-and-track, 475
objective function, 475performance results, 477The offloading concept, 475when-strategies, 476whom-strategies, 476
Puzzle check, 676Pyroelectric, 711
Quadrature amplitude modulation(QAM), 815
Quadrature phase shift keying (QPSK), 820Quality of Service (QoS), 276, 605
definition, 277hard QoS, 278relative QoS, 278routing, 276soft QoS, 278
QUALNET in VANETs, 557QuickWiFi, 580
Radio transceiver, 705Random access, 611Range, 807, 808RAPID protocol, 583Rayleigh fading, 563RBVT (Road-based vehicular traffic
routing), 538Receiver consensus, 529Recharge cycle, 708Rechargeable batteries, 706, 708Reinforcement learning, 623
Re-keying, 678Reliability, 525, 526, 602Repudiation, 670Resource aggregation, 683RF, 711Rician fading, 563Ring founder node (RFN), 615–616Road-side infrastructure, 646Road-side unit (RSU), 585, 602Robot dispatch, 764Robot-assisted wireless sensor networks,
737Round trip time (RTT), 813Routing metrics, 280, 291
ALARM, 298C2WB, 299CATT, 298Configurability, 306CWB, 299DARM, 304design principles, 292EDR, 304EETT, 298EFW, 296ELP, 297ETN, 295ETP, 290, 298ETT, 295ETX, 295full-path scope, 300GARM, 296IAR, 297iAWARE, 302iETT, 301ILA, 302INX, 298LAETT, 299link and path measurements, 292, 396link-restricted scope, 294MCR, 302MD, 296mETX, 295MIC, 300MIND, 303MTM, 295neighborhood-restricted scope, 298PEF, 305RARE, 297stability, 306
INDEX 861
WCETT, 300WCETT-LB, 301WEED, 303
Routing in VANETs, 520, 529, 534RSS (received signal strength), 526RSU, 684Routing protocols (energy efficient), 725
D-APOLLO, 726, 727DEHAR, 726E-WME, 727EHOR, 726GREES-L, 727, 728GREES-M, 727, 728HESS, 725, 726R-MF, 727
Routing protocols in MESH, 276Routing protocols for UW-A, 829
geographical, 829location-based, 830–831non-location-based routing protocols,
831–833proactive, 829reactive, 829
Routing protocols in validation, 217RPL, 61–64
S3 (Simple Storage Service), 651SaaS (Software as a Service), 652SADV, 537Safe distance model, 548Safety information dissemination, 592Sanitization, 674SCH interval (SCHI), 604Search and rescue applications, 89–90
area exploration, 90stigmergy, 91Ants algorithm, 91Brick & Mortar, 92UAV, 90
Self-discharge, 706, 707, 708Semi-dissociative node (SDN), 615Sensor
maintenance, 762placement, 740, 748relocation, 751
Sensor networksarchitectures, 182FLEXOR, 184–186MIPv6, 182
mobile phone sensing, 24–25mobile sinks, 182–184modular design, 185mules, 182–183opportunistic sensing, 24participatory sensing, 24IEEE 802.14.5, 182
Service channels (SCHs), 602ShanghaiGrid, 584Skewed degree distribution, 441Signal-to-noise ratio (SNR), 812Simulation-testbed interoperability, 226Simulation tools, 192
GloMoSim, 193, 219, 221, 222ns-2, 193, 219, 221, 222ns-3, 193, 219, 221, 222Opnet, 193, 219, 221, 222Omnet++, 194, 219, 221, 222QualNet, 193, 219, 221, 222Jist, 194, 219, 221, 222
Single-input-single-output (SISO), 827SINR(signal-to-interference-noise ratio),561Slotted p-persistence, 526SmartAHS, 554Small world, 441SNR, 561Social graph, 439
contact aggregation, 440weighted graph, 440
Social networks, 494, 500, 511–512centrality, 494, 503, 511community, 494, 500–503, 510–512
Solar, 710, 713, 714, 715, 716Spatial modulation, 820Spectrum management
cognitive cycle, 623control channel, 626primary User, 622public safety communication, 628software defined radio, 622, 634spectrum access, 634spectrum horizon, 634spectrum selection, 634spectrum sensing
mobile sensing, 636–637sensing techniques, 632spectrum cooperation, 633–634spectrum database, 632spectrum measurements, 631
862 INDEX
Spoofing, 670StandardsStimulus-response model, 547Store-carry-forward, 571, 578SUMO, 555, 569Spreading factor, 808Super-capacitor, 706, 707, 721, 722, 725SWANS, 557SWANS++, 557Sybil attack, 674Symmetric algorithms, 675Sync interval (SI), 603
Taking turns, 615Tampering, 670Task
allocation, 717, 721aperiodic, 717, 718deadline, 717, 718, 719, 720dependent, 717execution time, 718, 719, 720independent, 717multi-version, 717network, 717, 718node, 717, 718non-preemptive, 717, 719periodic, 717, 718, 719, 720power requirement, 718, 719preemptive, 717, 718, 719reward, 718, 719running speed, 718, 720scheduling, 717, 718, 720utility, 720virtual, 719
Task farming, 491, 493, 498–507, 510–511Task scheduling algorithms
adaptive scheduling DVFS (AS-DVFS),720
earliest deadline with energy guarantee(EDeg), 719
energy-aware DVFS (EA-DVFS), 720harvesting-aware DVFS (HA-DVFS),
720lazy scheduling algorithm (LSA), 718multi-version scheduling algorithm
(MVSA), 719smooth to average method (STAM),
718smooth to full utilization (STFU), 718
TBD (Trajectory-Based Data Forwarding),536
TEMIC Speech Dialog Systems GmbH,591
Thermal, 710, 711Thermocouple, 711Thermoelectric, 710, 711Thermopile, 710Throughput, 602Throwbox, 581Time delay, 528, 536Time-Division Multiple Access (TDMA),
248, 606, 819TO-GO, 533Token Holder node (THN), 615TOPO, 538TraCI, 558TRADE, 532Traffic condition perception, 586Trajectory-based model, 548TraNS, 557Transmission loss, 808Trust management, 683TSIS-CORSIM, 551Turbine, 712, 716Turbo equalizer, 817Two-ray ground reflection model, 562
UART, 781–783, 785UDG (uniform disk graph), 560Unattended wireless sensor networks
(UWSNs), 125authentication, 129backward secrecy, 128data survivability, 126forward secrecy, 128self-key healing, 128smart adversary, 128–129
Underwater acoustic (UW-A)channel, 807
horizontal, 813, 815impulse response, 813overspread, 814underspread, 814vertical, 813, 816
communications, 807deep water, 808, 826shallow water, 808, 826
propagation speed, 813
INDEX 863
Underwater acoustic sensor networks(UW-ASNs), 822
Underwater robot see: autonomousunderwater vehicle
Underwater sensor network, 771–775,789–790
Universal swarms for data dissemination,479
individual swarm, 479BARON heuristic, 481stability region, 480
Unplanned evacuation, 663Urban air quality sensing, 588
Validation, 220, 223V2I (vehicles to the infrastructure), 518,
577, 650V2V (vehicles to vehicle), 518, 577, 650VADD (vehicle-assisted data delivery), 536VANET applications, 519VanetMobiSim, 555VC (vehicular cloud), 647, 653VDEB (Vehicle density-based emergency
broadcasting), 533Vehicle tracking, 585Vehicular ad hoc networks (VANETs)
advantages and problems, 137alert messages, 138announcement messages, 138dedicated short-range communications
(DSRC), 137design goals and challenges, 139identity-based group signatures, 143message aggregation, 140–141on-board units (OBUs), 137privacy, 139, 141roadside units (RSUs), 137scalability, 139, 140security, 139, 141Sybil attack, 142
Vehicular network applications, 93coordination, 94
PATH program, 94driving safety support systems (DSSS), 93DSRC, 93intelligent transport systems, 95
CarTel, 96traffic avoidance, 96CATE, 96
notification systems, 94epidemic dissemination, 94publish/subscribe, 94FeetNet, 95CarTalk, 95DieselNet, 95CarView, 95GeOpps, 95
vehicle to vehicle, 93Vehicular networking, 646, 649Vehicular self-organized MAC
(VeSOMAC), 607Vehicular surveillance and sensing system
(VS3), 587Veins, 557VeMAC, 608Verification, 220, 223VGSIM, 557vibration for mechanical energy harvesting,
709, 710Video traffic (VI), 605ViFi protocol, 583Virtualization, 657, 685VISSIM, 551VM (virtual machines), 669Voice traffic (VO), 605Voltage, 707
Water filling, 529WAVE, 563Weather, 714, 715, 716WiFi monitoring, 581Winch, 775, 786–787, 788, 792, 798Wind, 712, 713, 714, 716Wireless access in vehicular environments
(WAVE), 603Wireless Ad Hoc networks
features, 109security challenges, 108
Wireless local access (WLAN), 43–53Wireless Mesh networks (WMNs)
architecture, 242, 275–276backbone, 130countermeasures, 132gateway, 277interference, 276Mesh routers, 130MIMO, 290optimization
864 INDEX
Wireless Mesh networks (Continued)channel assignment, 257link activation, 245–246routing, 254–255scheduling, 247, 254
routing, 276–277security challenges, 132traffic types, 277
Wireless signal propagation model,547, 561
Wireless sensor network applications, 84animal monitoring, 88
ZebraNet, 88WildSensing, 89
body and health monitoring, 85environmental monitoring, 87industrial monitoring, 86internet of things, 86smart homes, 85
Wireless sensor networks (WSNs) securityattacks taxonomy, 112Black and Sink Hole attack, 117data integrity, 123desynchronization, 121eavesdropping, 122flooding, 121IEEE 802.15.4, 110jamming, 111–113privacy, 121Sybil attack, 119tampering, 114trafic analysis, 123wormhole attack, 118ZigBee, 111
ZigBee, 57–59mobility, 59routing, 58