6 H. M. Ammari
In Part 3, titled “Routing,” Chap.7 presents a classification of energy-aware
routing algorithms and shows various issues with respect to data-aggregation, routing
overhead, the energy hole phenomenon, and collisions/interferences. Chapter 8
discusses several utility-based routing protocols for wireless sensor networks and
classifies them based on their utility properties, such as delay, cost, and packet deliv-
ery ratio. Moreover, it discusses the composition-based utility for wireless networks
and its extensions in low duty-cycle wireless sensor networks.
In Part 4, titled “Topology and Mobility Management,” Chap.9 describes existing
networktopology management techniques for node failure tolerance. Also, it provides
an analysis of the impact of node failure on network connectivity in wireless sensor
networks, and proposes a classification of existing recovery schemes. Chapter10
focuses on the problem of mobility in wireless sensor networks and its implica-
tions on sensing coverage, communication connectivity, and energy consumption.
Precisely, it deals with target tracking in mobile wireless sensor networks using the
Bayesian estimation theory. Also, it presents a purposeful and distributed mobility
management scheme as a potential probabilistic solution to the problem of mobility
management.
In Part 5, titled “Localization and Task Management,” Chap.11 surveys a vari-
ety of range-free localization techniques in wireless sensor networks, and provides
a qualitative comparison of them. Also, it discusses current research directions in
range-free localization. Chapter 12 considers two energy-aware task management
protocols, which assign sensors to tasks based on their remaining energy while
achieving balanced load among all the sensors. Also, it gives a comparison of these
two protocols with an optimal task assignment protocol as well as energy-oblivious
protocols with respect to the network lifetime.
In Part 6, titled “Data Management,” Chap. 13 introduces a data management
perspective on large-scale sensor environments applications whose goal is to meet
non-functional requirements, such as timeliness, re-liability and accuracy, as well
as functional needs of data collection. Chapter 14 presents geometric ideas to orga-
nize sensor data based on location information. It considers distributed methods for
managing queries regarding isolated events, mobile objects, and general signal fields.
In Part 7, titled “Data Gathering,” Chap.15 considers two case studies of wire-
less sensor network monitoring systems, namely Life Under Your Feet and RACNet,
in order to show the different components that constitute data collection networks.
While the first system focuses on extreme duty-cycling and low data rate communi-
cations, the second one emphasizes high throughput and efficient channel utilization.
Chapter16 reviews existing techniques for data aggregation and presents their classi-
fication. In addition, it discusses a variety of tree-based and cell-based data collection
algorithms. Also, it shows the dependency between those data aggregation and data
collection techniques and potential applications.
In Part 8, titled “Security,” Chap.17 presents challenges for ensuring security
in wireless sensor networks. It describes existing solutions, such as cryptography
schemes, key management schemes, as well as some mechanisms for attack detection
and prevention mechanisms. Also, it considers the problem of security in routing,
localization, and data aggregation. Chapter18 presents the technologies that are used