Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

Download Mobile Ad Hoc Networking (Cutting Edge Directions) || Index

Post on 10-Dec-2016




1 download


INDEXAbsorptioncoefficient, 808Fisher and Simmons formula, 810loss, 809Thorps formula, 809Access control, 539, 581, 676Acknowledgment, 521, 522ackPBSM, 525Acoustic modems, 781, 787, 789, 792,795797, 835, 837Ad hoc large scale deployment, 546Advanced safety vehicles (ASVs),593Analog to digital converter (ADC), 780,782783, 789Anchor paging controller (APC), 589Anchors, 534Anonymous keys, 677ANSWER, 665Anti-dos, 674Application categories (ACs), 605Applications in DTNcontent search, 341344email, 324326floating content, 352357web, 336339XMPP, 326328Application mechanismsapplication semantics, 323proxies and gateways, 331334security, 323, 328331transport protocols, 322user interfaces, 334335Application scenariosunderground mining, 318320, 346349urban environments, 320322AquaNode, 775, 786789, 795, 798Arbitration Inter Frame Space (AIFS), 605Artificial ant colonies, 754Artificial light, 710Attacker, 668Attenuation, 809, 810Authentication, 674, 676Autonomous underwater vehicle (AUV),770771, 773Availability, 669AWS, 651Background traffic (BK), 605Backoff timer (BT), 601bandwidth efficiency in UAN, 815, 819, 820,bandwidth in UAN, 808, 818, 822Basic Service Set (BSS), 605Beacon, 522Best effort traffic (BE), 605Bit error rate (BER) in UAN, 815, 822Black burst, 523, 531Bluetooth in UAN, 786787, 789, 796BMV, 670BPAB, 531Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition. Edited by Stefano Basagni,Marco Conti, Silvia Giordano, and Ivan Stojmenovic. 2013 by The Institute of Electrical and Electronics Engineers, Inc. Published 2013 by John Wiley & Sons, Inc.853854 INDEXBroadband Wireless Access (BWA), 3743Broadcasting, 520CA (Certification Authority), 667CaaS (Cooperation as a Service), 656Cabernet, 580CafNet, 580Calibration, 220, 223Capacitor, 710CAR (Connectivity-Aware Routing), 534Car following, 547Carmeq GmbH, 592CarTel Project, 579CarTorrent protocol, 589CBRF (Connection-Based RestrictedForwarding), 533CC - Cloud computing, 650CCA (cooperative collision avoidance), 527CCH interval (CCHI), 604Cell-based model, 548Channel access time, 602Channel coherence time, 813Channel equalization, 816Channel impulse response, 813Charging efficiency, 706Chromophoric dissolved organic matter(CDOM), 787, 790792, 794Clusterhead (CH), 610Clustering, 500501Fielder clustering, 501K-Clique, 501Code-division multiple access (CDMA), 606CodeTorrent, 589Cognitive radio vehicular Ad Hoc networksapplications, 628629architecture, 629630characteristics, 622628definition, 621security, 637simulation tools, 638640Coherence bandwidth, 815Coherent modulation, 815Collision avoidance systems (CCA), 601Community structure, 441Confidentiality, 669Congestion, 528Connected dominating set, 525Connectivity, 523, 547, 565, 422almost connected networks, 423connectivity islands, 424sparse networks, 424Contact aggregation, 440Contact graph, 439contact aggregation, 440unweighted graph, 441weighted graph, 440441ContentPlace, 460dissemination strategies, 462knapsack problem, 460performance results, 463utility function, 461Content sharing, 589Contention-based forwarding (CBF)protocol, 591Contention window (CW), 607Control channel (CCH), 605Conversion efficiency, 713Covariance, 771773, 775777, 790796CSMA/CA, 607CTP, 580CVeT testbed, 589Crowd computing, 491494, 498, 508,510512Data center for VC, 658Data isolation for VC, 674Data leak for VC, 670DEAR (Distance-aware epidemic routing),534Dedicated short-range communications(DSRC), 578, 590591, 595, 602Decentralized control algorithm, controller,771, 773, 775778, 789Decentralized depth controller, 787,789792, 793797Decentralized gradient-descent, 773,775786, 789792Decision feedback equalizer (DFE), 816Delay tolerant networks (DTNs), 134, 317,578, 582applications, 135bundle layer, 135hierarchical identity-based cryptography(HIBC), 136137security issues, 136Denial of service in VANETs, 670Depth adjustment, 771772, 774, 786787,789, 793, 796800INDEX 855Depth first search, 538DieselNet, 581Differentially coherent, 815Digital signatures, 675Direct-sequence code division multipleaccess (DS-CDMA), 819, 826Direct-sequence spread-spectrum (DSSS),818Discharging efficiency, 706, 708Discharging rate, 719Dissemination of data in VANETs, 520Dissociative node (DN), 615Distributed computation, 491, 493494,496, 498, 501, 510512Diversity gain, 821, 827D-minCost, 536DMV, 672Doppler spread, 807, 813, 814, 816, 820DOT (Department of transportation),649DPP, 529DSRC, 521, 646Duty-cycle, 704, 722, 723, 726, 727DV-CAST, 533Dynamic voltage and frequency scaling(DVFS), 718, 720EB3 (Elastic book store), 651EC2 (Elastic compute cloud), 651EDR (Event data recorder), 648Effective communication range, 568Electric field, 709Electromagnetic, 709, 710Electrostatic, 709, 710EMDOR, 528Energy availability, 703, 715, 717, 721Energy buffer, 705, 726Energy consumption, 707, 720, 728Energy harvested, 707, 708, 714, 715, 721Energy harvester, 705, 714Energy harvesting-based wireless sensornetworks (EHWSNs), 703, 704,715, 717Energy harvesting techniquesacoustic noise, 712, 713biochemical, 712electromagnetic, 710, 713electrostatic, 710, 713mechanical, 709photovoltaic, 710, 713piezoelectric, 709, 713pyroelectric, 711, 713resonant, 711RF, 711, 713thermal, 710thermoelectric, 710, 713wind, 712, 713wireless, 711Energy neutral operation (ENO), 722Energy neutrality, 720Energy overflow, 720Energy prediction models, 714715ETH predictor, 715exponentially weighted moving-average(EWMA), 714pro-energy, 715weather conditioned moving average(WCMA), 714Energy source, 718Energy storage, 705, 706, 708, 718, 719,721, 724Energy types, 709Enhanced Distributed Channel Access(EDCA), 605Entropy, 773Environmental source, 704Epidemic routing, 534Event-driven messages, 600Experimental platforms, 194, 834APE, 194DOME, 195MAC layer emulators, 198mobile emulab, 195physical layer emulators, 197QuRiNet, 195Faradays law, 710Fairness, 282, 602max-min, 282proportional, 282FCC (Federal CommunicationsCommission), 646Feedback-based path selection, 280, 307gateway-driven solutions, 307GLWB, 307load balancing, 280, 307online algorithms, 307residual capacity, 308856 INDEXField-programmable gate array (FPGA),781782, 797FleetNet project, 591Flooding, 534Focused coverage, 745FRAM, 784785Frequency-division multiple access(FDMA), 606, 822Frequency-shift keying (FSK), 814Friis free space model, 561Gaussian, 773, 777778, 790, 792793Genetic algorithm, 757Geocasting, 520, 525, 527, 593Geometric spreadingcylindrical, 808spherical, 808Geometric spreading loss, 808GeOpps, 538Global optimization for impatient users,469delay-utility function, 470optimal solution, 472performance results, 473query counting replication (QCR)scheme, 472social welfare, 471Global positioning system (GPS), 602GrooveNet, 557Guard interval (GI), 606GyTAR, 538HERO protocol, 586Highway capacity manual(HCM), 565HOV, 661IaaS (infrastructure as a service), 651IEEE 1609 WAVE Standards, 603IEEE 1609.1, 603IEEE 1609.2, 603IEEE 1609.3, 603IEEE 1609.4, 603, 626IEEE-802.11e, 605IEEE 802.11s, 4448medium access control (MAC),4648routing, 4546IEEE 802.11n, 4849IEEE 802.11p, 5053, 564, 605, 621, 629GeoNetworking, 5153medium access control (MAC), 51physical layer, 5051IEEE 802.11z, 49IEEE 802.15.5, 5357address allocation, 56mobility, 57network formation, 55routing, 5657IEEE 802.16d (mesh), 3740centralized mode, 3739distributed mode, 3940IEEE 802.16j, 4043non-transparent relaying, 4243transparent relaying, 4142IEEE 802.21, 6567IEEE 802.22, 621IETF IPv6 over Low-power WPAN(6LoWPAN) Working Group,6061IETF Routing Over Low-power and Lossynetworks (ROLL) Working Group,61ILD (inductive loop detectors), 649Induction, 710Inductive couplingresonant, 711strong, 712weak, 712Informational messages, 601Integer division theorem, 611Integrated simulator, 546, 557Integrity, 669Intelligent transportation system (ITS),579, 599Intercarrier interference (ICI), 820Inter-contact times (ICTs), 584,Interference model, 244physical model, 245protocol model, 244Intermittent connectivity, 524Intersymbol interference (ISI), 813, 814,815, 820IT (information technology), 651ITS (Intelligent transportation systems),545, 646Journey (path over time), 571INDEX 857Key assignment, 678Key revocation, 679Key verification, 679Lag time, 824Layered architecture, 833Leakage, 706, 707, 710, 721Limited mobility, 769771, 775, 786,789790Location security, 683Log-normal path loss, 562, 566Mac layer, 212back-off procedure, 214bugs and errors, 213implementation accuracy, 213manufacturer idiosyncrasies, 213standard interpretation, 213transmission rate, 214Magnetic field, 710Mathematical programming of Meshresource managementcolumn generation, 250, 256, 267cooperation graph, 263formulation, 246247, 249250,255256, 258259, 262263, 269path generation, 256superlink, 264265supernode, 264MapReduce, 492, 498, 510511Minimum-cost path selection techniques,280optimization-based path selectiontechniques, 279taxonomy, 279MaxProp protocol, 582MCTRP, 615Mechanical energy harvesting, 709, 710Medium access control (MAC) for WSNsenergy adaptive (EA-MAC), 723, 725multi-tier probabilistic polling (MTTP),724, 725on-demand (ODMAC), 722, 725probabilistic polling (PP-MAC), 723, 725Medium access control (MAC) forVANETs, 600638Medium access control (MAC) forUW-ASNsALOHA-based, 822, 823CDMA-based, 822, 826CSMA-based, 822, 824FDMA-based, 822, 823TDMA-based, 822, 823Mesh networksarchitectures, 155156, 166167bash, 164166end-user mobility definitions andchallenges, 156158IEEE 802.21, 168169iMesh, 162macromobility support, 168181micromobility support, 158181properties, 162163SMesh, 172178SyncScan, 158159WiOptiMo, 178181Message aggregation, 683Message content, 524MHVB (Multihop vehicular broadcast),528Microcontroller, 705Microscopic traffic applet, 554Military applicationscommunication, 79coordination, 81distributed sensing, 81UAVs, 81, 90Mission (WSN appropriate task)assignment, 721critical, 722leader, 721MobEyes protocol, 589MOBIL, 549Mobile ad hoc networks (MANETs)architecture, 6challenges, 2526cross-layer architectures, 1014cross-layer issues, 910enabling technologies, 6energy-efficiency, 9IETF MANET working group, 6middleware, 8MobileMAN, 1213routing and forwarding protocols, 78security and cooperation, 10socioeconomic aspects, 16testbeds, 15Mobility, 510, 512, 445858 INDEXMobility management in Cellular/4GNetworks, 588Mobility model analysis in VANETs,578, 586Mobility model in VANETs, 546547Mobility simulator, 546, 551Modular sensor network, 779Modulationcoherent, 815multicarrier, 820noncoherent, 814spatial, 814Mote, 774MOVE, 556Multi-application platform, 784Multicarrier modulation, 820Multi-hop ad hoc networkingmesh networks, 1718, 154157opportunistic networks, 1921sensor networks, 2324vehicular ad hoc networks (VANETs),2223Multipath, 807, 813, 814Multipath delay spread, 815, 816Multiple access interference (MAI), 827Multiple access techniques, 822Multiple frequency-shift keying (MFSK),815Multiple-input-multiple-output (MIMO),821, 827Multiplexing gain, 821, 827Mutual information, 773Multi-lane traffic, 549NaaS (Network as a Service), 654Nakagami fading, 563, 566NCTUns, 557Neighbour elimination, 522, 526Neighbour knowledge, 521Neponset river, 790, 794Network connectivity applicationsinterplanetary internet, 81municipal systems, 84rural communication, 83one laptop per child project, 83SARI project, 83Kiosknet, 83network layer, 829Network simulator, 546NHTSA (National Highway Traffic SafetyAdministration), 648Node deregistration, 688Node registration, 686Noise in UW-A, 807, 811Noncoherent modulation, 814NOW project, 592NS-2 in VANETs, 546, 557, 566NS-3 in VANETs, 557Objective function, 773, 776, 778, 792,794795Omnet++ in VANETs, 546, 557On-board unit (OBU), 684OPERA, 529OPNET in VANETs, 557Opportunistic computing, 2425Opportunistic networks, 491, 493, 500, 511contact time analysis, 370374data dissemination, 453ContentPlace, 459global optimization for impatientusers, 469PodNet, 455Pub/sub overlay, 465Push-and-Track, 475taxonomy, 455universal swarms for datadissemination, 479delay-capacity tradeoff, 396397delay-energy tradeoff, 413414delay-load balance tradeoff, 398399experimental data, 363366, 392393,396flight length analysis, 378380inter-contact time analysis, 361372IRTF Delay-Tolerant NetworkingResearch Group (DTNRG), 20Levy walk and Levy flight, 384, 407408mobile data offloading, 409412mobility models, 360414pause time analysis, 377378programming, 491492, 510512social structure, 402406socially aware task farming, 510511spatial context distribution, 386389Opportunistic routing, 538, 578, 586, 419BubbleRap, 442, 467delegation forwarding, 442, 444INDEX 859encounter-based routing (EBR), 447epidemic routing immunization, 430epidemic routing, 429430flooding, 428430gossiping, 430hybrid routing, 444447limited-time flooding, 430minimum estimated expected delay(MEED), 443minimum expected delay (MED), 443ORWAR, 444PRoPHET, 403405, 437, 443, 445,446, 510randomized flooding, 430RAPID, 444redundancy-based routing, 422, 428coding based schemes, 433controlled replication, 431SimBet, 442, 446, 510SLEF, 430space-time path, 428spray and focus, 446spray and wait, 431store-carry-forward, 421, 428two-hop routing, 430utility-based routing, 436contact-based utility, 436non-contact-based utility, 444Optical modem, 787, 789, 796797Optimization-based path selection, 279, 280elastic demands, 283LMMBA, 284MMBA, 284fixed demands, 285flow bandwidth allocation vector, 281link bandwidth allocation vector, 281network utility maximization, 284saturated flows, 289MaLB, 289SWARM, 290Stochastic demands, 288throughput maximization, 279, 281traffic awareness, 291unknown demands, 286Optimum velocity model, 548Orthogonal frequency-divisionmultiplexing (OFDM), 820Overhead in IEEE 802.11p, 605Overlay in VANETs, 539P2P, 646PaaS (Platform as a Service), 651PARAMICS, 551Park-and-plug, 658Path loss, 807, 808Pay-as-you-go, 652Peercast, 614Periodic messages, 600Personal Area Networks (PAN), 5365Personal Content DisseminationApplications, 96BlueTorrent, 97Haggle Project, 97WiFi Direct, 97PKI (Public Key Infrastructure), 667Phase-shift keying (PSK), 815Photovoltaic, 710Physical layer, 813Physical layer modeling, 199adjacent co-channel interference, 205bonnmotion, 220carrier sense, 204capture effect, 205cooperative transmission, 263directional antenna, 261interference, 204, 208mobility, 209reception model, 204radio propagation model, 203, 206free space propagation, 206two-ray ground propagation, 206Rayleigh propagation, 206Ricean propagation, 207shadowing, 206, 207transmission preamble, 203Physical layer modeling in MESH, 243multiple channels, 243, 257258power control, 252rate adaptation, 252Piezoelectric, 709, 710Planned evacuation, 663PodNet, 455channels, 456dissemination strategies, 457performance results, 458Power density, 713Power management , 705, 779,783, 787PP-CSMA, 613860 INDEXPredictionerror, 714interval, 715model, 713, 719, 722Pressure, 709Privacy breach, 670Propagation delay, 807, 822Proxy MIPv6, 65Psychophysical model, 548Pub/sub overlay, 465broker election, 467brokers, 464closeness centrality, 467community detection, 466performance results, 468Pure ALOHA, 823Purely phase-coherent, 815Push-and-track, 475objective function, 475performance results, 477The offloading concept, 475when-strategies, 476whom-strategies, 476Puzzle check, 676Pyroelectric, 711Quadrature amplitude modulation(QAM), 815Quadrature phase shift keying (QPSK), 820Quality of Service (QoS), 276, 605definition, 277hard QoS, 278relative QoS, 278routing, 276soft QoS, 278QUALNET in VANETs, 557QuickWiFi, 580Radio transceiver, 705Random access, 611Range, 807, 808RAPID protocol, 583Rayleigh fading, 563RBVT (Road-based vehicular trafficrouting), 538Receiver consensus, 529Recharge cycle, 708Rechargeable batteries, 706, 708Reinforcement learning, 623Re-keying, 678Reliability, 525, 526, 602Repudiation, 670Resource aggregation, 683RF, 711Rician fading, 563Ring founder node (RFN), 615616Road-side infrastructure, 646Road-side unit (RSU), 585, 602Robot dispatch, 764Robot-assisted wireless sensor networks,737Round trip time (RTT), 813Routing metrics, 280, 291ALARM, 298C2WB, 299CATT, 298Configurability, 306CWB, 299DARM, 304design principles, 292EDR, 304EETT, 298EFW, 296ELP, 297ETN, 295ETP, 290, 298ETT, 295ETX, 295full-path scope, 300GARM, 296IAR, 297iAWARE, 302iETT, 301ILA, 302INX, 298LAETT, 299link and path measurements, 292, 396link-restricted scope, 294MCR, 302MD, 296mETX, 295MIC, 300MIND, 303MTM, 295neighborhood-restricted scope, 298PEF, 305RARE, 297stability, 306INDEX 861WCETT, 300WCETT-LB, 301WEED, 303Routing in VANETs, 520, 529, 534RSS (received signal strength), 526RSU, 684Routing protocols (energy efficient), 725D-APOLLO, 726, 727DEHAR, 726E-WME, 727EHOR, 726GREES-L, 727, 728GREES-M, 727, 728HESS, 725, 726R-MF, 727Routing protocols in MESH, 276Routing protocols for UW-A, 829geographical, 829location-based, 830831non-location-based routing protocols,831833proactive, 829reactive, 829Routing protocols in validation, 217RPL, 6164S3 (Simple Storage Service), 651SaaS (Software as a Service), 652SADV, 537Safe distance model, 548Safety information dissemination, 592Sanitization, 674SCH interval (SCHI), 604Search and rescue applications, 8990area exploration, 90stigmergy, 91Ants algorithm, 91Brick & Mortar, 92UAV, 90Self-discharge, 706, 707, 708Semi-dissociative node (SDN), 615Sensormaintenance, 762placement, 740, 748relocation, 751Sensor networksarchitectures, 182FLEXOR, 184186MIPv6, 182mobile phone sensing, 2425mobile sinks, 182184modular design, 185mules, 182183opportunistic sensing, 24participatory sensing, 24IEEE 802.14.5, 182Service channels (SCHs), 602ShanghaiGrid, 584Skewed degree distribution, 441Signal-to-noise ratio (SNR), 812Simulation-testbed interoperability, 226Simulation tools, 192GloMoSim, 193, 219, 221, 222ns-2, 193, 219, 221, 222ns-3, 193, 219, 221, 222Opnet, 193, 219, 221, 222Omnet++, 194, 219, 221, 222QualNet, 193, 219, 221, 222Jist, 194, 219, 221, 222Single-input-single-output (SISO), 827SINR(signal-to-interference-noise ratio),561Slotted p-persistence, 526SmartAHS, 554Small world, 441SNR, 561Social graph, 439contact aggregation, 440weighted graph, 440Social networks, 494, 500, 511512centrality, 494, 503, 511community, 494, 500503, 510512Solar, 710, 713, 714, 715, 716Spatial modulation, 820Spectrum managementcognitive cycle, 623control channel, 626primary User, 622public safety communication, 628software defined radio, 622, 634spectrum access, 634spectrum horizon, 634spectrum selection, 634spectrum sensingmobile sensing, 636637sensing techniques, 632spectrum cooperation, 633634spectrum database, 632spectrum measurements, 631862 INDEXSpoofing, 670StandardsStimulus-response model, 547Store-carry-forward, 571, 578SUMO, 555, 569Spreading factor, 808Super-capacitor, 706, 707, 721, 722, 725SWANS, 557SWANS++, 557Sybil attack, 674Symmetric algorithms, 675Sync interval (SI), 603Taking turns, 615Tampering, 670Taskallocation, 717, 721aperiodic, 717, 718deadline, 717, 718, 719, 720dependent, 717execution time, 718, 719, 720independent, 717multi-version, 717network, 717, 718node, 717, 718non-preemptive, 717, 719periodic, 717, 718, 719, 720power requirement, 718, 719preemptive, 717, 718, 719reward, 718, 719running speed, 718, 720scheduling, 717, 718, 720utility, 720virtual, 719Task farming, 491, 493, 498507, 510511Task scheduling algorithmsadaptive scheduling DVFS (AS-DVFS),720earliest deadline with energy guarantee(EDeg), 719energy-aware DVFS (EA-DVFS), 720harvesting-aware DVFS (HA-DVFS),720lazy scheduling algorithm (LSA), 718multi-version scheduling algorithm(MVSA), 719smooth to average method (STAM),718smooth to full utilization (STFU), 718TBD (Trajectory-Based Data Forwarding),536TEMIC Speech Dialog Systems GmbH,591Thermal, 710, 711Thermocouple, 711Thermoelectric, 710, 711Thermopile, 710Throughput, 602Throwbox, 581Time delay, 528, 536Time-Division Multiple Access (TDMA),248, 606, 819TO-GO, 533Token Holder node (THN), 615TOPO, 538TraCI, 558TRADE, 532Traffic condition perception, 586Trajectory-based model, 548TraNS, 557Transmission loss, 808Trust management, 683TSIS-CORSIM, 551Turbine, 712, 716Turbo equalizer, 817Two-ray ground reflection model, 562UART, 781783, 785UDG (uniform disk graph), 560Unattended wireless sensor networks(UWSNs), 125authentication, 129backward secrecy, 128data survivability, 126forward secrecy, 128self-key healing, 128smart adversary, 128129Underwater acoustic (UW-A)channel, 807horizontal, 813, 815impulse response, 813overspread, 814underspread, 814vertical, 813, 816communications, 807deep water, 808, 826shallow water, 808, 826propagation speed, 813INDEX 863Underwater acoustic sensor networks(UW-ASNs), 822Underwater robot see: autonomousunderwater vehicleUnderwater sensor network, 771775,789790Universal swarms for data dissemination,479individual swarm, 479BARON heuristic, 481stability region, 480Unplanned evacuation, 663Urban air quality sensing, 588Validation, 220, 223V2I (vehicles to the infrastructure), 518,577, 650V2V (vehicles to vehicle), 518, 577, 650VADD (vehicle-assisted data delivery), 536VANET applications, 519VanetMobiSim, 555VC (vehicular cloud), 647, 653VDEB (Vehicle density-based emergencybroadcasting), 533Vehicle tracking, 585Vehicular ad hoc networks (VANETs)advantages and problems, 137alert messages, 138announcement messages, 138dedicated short-range communications(DSRC), 137design goals and challenges, 139identity-based group signatures, 143message aggregation, 140141on-board units (OBUs), 137privacy, 139, 141roadside units (RSUs), 137scalability, 139, 140security, 139, 141Sybil attack, 142Vehicular network applications, 93coordination, 94PATH program, 94driving safety support systems (DSSS), 93DSRC, 93intelligent transport systems, 95CarTel, 96traffic avoidance, 96CATE, 96notification systems, 94epidemic dissemination, 94publish/subscribe, 94FeetNet, 95CarTalk, 95DieselNet, 95CarView, 95GeOpps, 95vehicle to vehicle, 93Vehicular networking, 646, 649Vehicular self-organized MAC(VeSOMAC), 607Vehicular surveillance and sensing system(VS3), 587Veins, 557VeMAC, 608Verification, 220, 223VGSIM, 557vibration for mechanical energy harvesting,709, 710Video traffic (VI), 605ViFi protocol, 583Virtualization, 657, 685VISSIM, 551VM (virtual machines), 669Voice traffic (VO), 605Voltage, 707Water filling, 529WAVE, 563Weather, 714, 715, 716WiFi monitoring, 581Winch, 775, 786787, 788, 792, 798Wind, 712, 713, 714, 716Wireless access in vehicular environments(WAVE), 603Wireless Ad Hoc networksfeatures, 109security challenges, 108Wireless local access (WLAN), 4353Wireless Mesh networks (WMNs)architecture, 242, 275276backbone, 130countermeasures, 132gateway, 277interference, 276Mesh routers, 130MIMO, 290optimization864 INDEXWireless Mesh networks (Continued)channel assignment, 257link activation, 245246routing, 254255scheduling, 247, 254routing, 276277security challenges, 132traffic types, 277Wireless signal propagation model,547, 561Wireless sensor network applications, 84animal monitoring, 88ZebraNet, 88WildSensing, 89body and health monitoring, 85environmental monitoring, 87industrial monitoring, 86internet of things, 86smart homes, 85Wireless sensor networks (WSNs) securityattacks taxonomy, 112Black and Sink Hole attack, 117data integrity, 123desynchronization, 121eavesdropping, 122flooding, 121IEEE 802.15.4, 110jamming, 111113privacy, 121Sybil attack, 119tampering, 114trafic analysis, 123wormhole attack, 118ZigBee, 111ZigBee, 5759mobility, 59routing, 58


View more >