Advertisement

Introduction

  • Muhammad UsmanEmail author
  • Vallipuram Muthukkumarasamy
  • Xin-Wen Wu
  • Surraya Khanum
Chapter
  • 448 Downloads

Abstract

A fundamental feature of resource-limited wireless sensor networks (WSNs) which distinguishes them from traditional networking paradigms is their data-centric nature.

References

  1. 1.
    F. Li, J. Luo, W. Wang, Y. He, Autonomous deployment for load balancing k-surface coverage in sensor networks. IEEE Trans. Wirel. Commun. 14(1), 279–293 (2015)CrossRefGoogle Scholar
  2. 2.
    B. Fateh, M. Govindarasu, Joint scheduling of tasks and messages for energy minimization in interference-aware real-time sensor networks. IEEE Trans. Mob. Comput. 14(1), 86–98 (2015)CrossRefGoogle Scholar
  3. 3.
    M.A. Serna, A. Bermudez, R. Casado, Hull-based approximation to forest fires with distributed wireless sensor networks, Melbourne, Australia (2013), pp. 265–270Google Scholar
  4. 4.
    L. Lin, C. Yang, K.J. Wong, H. Yan, J. Shen, S.J. Phee, An energy efficient mac protocol for multi-hop swallowable body sensor networks. Sensors 14(10), 19457–19476 (2014)CrossRefGoogle Scholar
  5. 5.
    M. Dong, K. Ota, L.T. Yang, S. Chang, H. Zhu, Z. Zhou, Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks. Comput. Netw. 74, 58–70 (2014)Google Scholar
  6. 6.
    A. Fuggetta, G.P. Picco, G. Vigna, Understanding code mobility. IEEE Trans. Softw. Eng. 24(5), 342–361 (1998)CrossRefGoogle Scholar
  7. 7.
    H. Qi, S.S. Iyengar, K. Chakrabarty, Multiresolution data integration using mobile agents in distributed sensor networks. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 31(3), 383–391 (2001)CrossRefGoogle Scholar
  8. 8.
    D.B. Lange, M. Oshima, Dispatch your agents; shut off your machine. Commun. ACM 42(3), 88–89 (1999)CrossRefGoogle Scholar
  9. 9.
    S. Khan, A.-S.K. Pathan, N.A. Alrajeh, Wireless Sensor Networks: Current Status and Future Trends, 1st edn. (CRC Press Inc., Boca Raton, FL, USA, 2012)CrossRefGoogle Scholar
  10. 10.
    E.U. Gaura, J. Brusey, R. Wilins, Barnham J., Wireless sensing for the built environment: enabling innovation towards greener, healthier homes, United Kingdom (2011), pp. 1–6Google Scholar
  11. 11.
    Y. Xue, X. Chang, S. Zhong, Y. Zhuang, An efficient energy hole alleviating algorithm for wireless sensor networks. IEEE Trans. Consum. Electron. 60(3), 347–355 (2014)CrossRefGoogle Scholar
  12. 12.
    S. Han, M. Xie, B. Tian, S. Parvin, Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)CrossRefGoogle Scholar
  13. 13.
    C. O’Reilly, A. Gluhak, M.A. Imran, S. Rajasegarar, Anomaly detection in wireless sensor networks in a non-stationary environment. IEEE Commun. Surv. Tutor. 16(3), 1413–1432 (2014)Google Scholar
  14. 14.
    M. Moshtaghi, C. Leckie, S. Karunasekera, S. Rajasegarar, An adaptive elliptical anomaly detection model for wireless sensor networks. Comput. Netw. 64, 195–207 (2014a)CrossRefGoogle Scholar
  15. 15.
    H. Kumarage, I. Khalil, Z. Tari, A. Zomaya, Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling. J. Parallel Distrib. Comput. 73(6), 790–806 (2013a)CrossRefGoogle Scholar
  16. 16.
    M. Xie, J. Hu, S. Han, H.-H. Chen, Scalable hypergrid k-nn-based online anomaly detection in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(8), 1661–1670 (2013a)CrossRefGoogle Scholar
  17. 17.
    J. Waterman, G.W. Challen, M. Welsh, Peloton: Coordinated resource management for sensor networks, Switzerland (2009), pp. 1–5Google Scholar
  18. 18.
    P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer, D. Culler, Tinyos: an operating system for sensor networks, in Ambient Intelligence, ed. by W. Weber, J.M. Rabaey, E. Aarts (Springer, Berlin, 2005), pp. 115–148Google Scholar
  19. 19.
    F. Ahmad, I. Fakhir, S.A. Khan, Y.D. Khan, Petri net-based modeling and control of the multi-elevator systems. Neural Comput. Appl. 24(7–8), 1601–1612 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Muhammad Usman
    • 1
    Email author
  • Vallipuram Muthukkumarasamy
    • 2
  • Xin-Wen Wu
    • 2
  • Surraya Khanum
    • 1
  1. 1.Department of Computer SciencesQuaid-I-Azam UniversityIslamabadPakistan
  2. 2.School of Information and Communication TechnologyGriffith UniversityGold CoastAustralia

Personalised recommendations