Image Processing Reference
In-Depth Information
The security in a sensor network is a hard problem that still needs to be solved. Like almost any other
protocol in this sort of networks, it has contradictory requirements: the schemes employed should be
as light as possible while achieving the best results possible. he usual protection schemes require too
much memory and too much computation power to be employed (the keys themselves are sometimes
too big to fit into the limited available memory).
A real problem is how to control the sensor network itself. he sensor nodes will be too many to be
individually accessible to a single user and might also be deployed in an inaccessible environment. By
control, we understand issues as deployment and installation, configuration, calibration and tuning,
maintenance, discovery, and reconfiguration. Debugging the code running in the network is com-
pletely infeasible, as at any point inside, the user has access only to the high-level-aggregated results.
The only real debugging and testing can be done with simulators that prove to be invaluable resources
in the design and analysis of the sensor networks.
3.5 Conclusions
This chapter was a brief introduction to the new field of wireless sensor networks. It provided a short
overview of the main characteristics of this new set of tools that will soon enhance our perception
capabilities regarding the ambient world.
he major challenges have been identified, some initial steps have been taken and early prototypes
are already working. he following chapters of the topic will focus on particular issues, giving more
insight to the current state of the art in the ield. he research in this area will certainly continue and
there may come a time when sensor networks will be deployed all around us and will become regular
instruments available to everyone.
References
. Consortium: Smartdust. http://robotics.eecs.berkeley.edu/pister/SmartDust ().
. Weiser, M.: The computer for the st century. SIGMOBILE Mobile Computing and Communications
Review () -.
. Whitehouse, K., Culler, D.: Calibration as parameter estimation in sensor networks. In: Proceedings
of ACM International Workshop on Wireless Sensor Networks and Applications (WSNA') , Atlanta,
Georgia ().
. Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Transactions on
Information Systems  () -.
. Estrin, D., Govindan, R., Heidemann, J., Kumar, S.: Next century challenges: Scalable coordination in
sensor networks. In: MobiCom ': Proceedings of the th Annual ACM/IEEE International Conference
on Mobile Computing and Networking, New York, ACM () pp. -.
. Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey. Com-
puter Networks (Elsevier) Journal  () -.
. Brooks, R.R., Ramanathan, P., Sayeed, A.M.: Distributed target classification and tracking in sensor
networks. Proceedings of the IEEE  () -.
. Polastre, J., Szewczyk, R., Mainwaring, A., Culler, D., Anderson, J. In: Analysis of Wireless Sensor Net-
works for Habitat Monitoring. Kluwer Academic Publishers, Norwell, MA () -.
. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L., Rubenstein, D.: Energy-efficient computing
for wildlife tracking: Design tradeoffs and early experiences with zebranet. In: ASPLOS-X ,SanJose,
California ().
. Yang, S.: Redwoods go hightech: Researchers use wireless sensors to study California's state tree.
UCBerkeley News ().
 
Search WWH ::




Custom Search