References
- Cardei, M.. and Wu, J. “Coverage in wireless sensor networks”, handbook of sensor networks: Compact Wireless and Wired Sensing Systems. CRC Press LLC. July, 2004.
- Meguerdichian, S., Koushanfar, F., Potkonjak, M., & Srivastava, M. “Worst and best-case coverage in sensor networks”, proceeding of IEEE Transactions on Mobile Computing, 4(1), 84-92. doi:10.1109/TMC.2005.15.
- D. J. Baker and A. Ephremides, “The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm”, IEEE Transactions on Communications, Vol.29, No.11, November, 1981, pp.1694-1701. https://doi.org/10.1109/TCOM.1981.1094909
- A.D. Amis, R. Prakash, T.H.P. Vuong and D. T. Huynh, “ Max-Min D-Cluster Formation in Wireless Ad Hoc Networks”, in Proceedings of IEEE INFOCOM, March, 2000. https://doi.org/10.1109/INFCOM.2000.832171
- A. Ephremides, J.E. W. and D.J.B., “A Design concept for Reliable Mobile Radio Networks with Frequency Hopping Signaling”, Proceeding of IEEE, Vol.75, 1987, pp.56-73. https://doi.org/10.1109/PROC.1987.13705
- W.R. Heinzelman, A.C. and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, in Proceedings of IEEE HICSS, January, 2000. https://doi.org/10.1109/HICSS.2000.926982
- J. Janssen, M. Ditzel, C. Lageweg, Arne Theil, “Multi-target Data Aggregation and Tracking in Wireless Sensor Networks” in proceeding of journal of networks, Vol.3, No.1, January, 2008.
- T. He, P. Vicaire, T. Yan, L. Luo, L. Gu, G. Zhou, R. Stoleru, Q. Cao, J.Stankovic, and T. Abdelzaher, “Achieving real-time target tracking using wireless sensor networks,” Proc. IEEE Real-Time and Embedded Technology and Applications Symposium, 2006.
- S. G. Foss and S. A. Zuyev, “On a Voronoi Aggregative Process Related to a Bivariate Poisson Process”, Advances in Applied Probability, Vol.28, No.4, 1996, pp.965-981. https://doi.org/10.2307/1428159
- T. Camp, J. Boleng, and V. Davies, A Survey of Mobility Models for Ad Hoc Network Research, in Wireless Communication and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, Vol.2, No.5, 2002, pp.483-502.
- B. Liang, Z. J. Haas, Predictive Distance-Based Mobility Management for PCS Networks, in Proceedings of IEEE information Communications Conference (INFOCOM 1999), April, 1999. https://doi.org/10.1109/INFCOM.1999.752157
- L. Lima, J. Barros, ”Random Walks on Sensor Networks,” the 5th International Symposium on Modeling and optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt 2007), Limassol, Cyprus, April, 2007.
- C. Bettstetter, G. Resta, and P. Santi, ”The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks”, IEEE Transactions on Mobile Computing, Vol.2, No.3, July-Sept, 2003, pp.257-269. https://doi.org/10.1109/TMC.2003.1233531
Cited by
- Multiple 3D object position estimation and tracking using double filtering on multi-core processor vol.63, pp.1, 2013, https://doi.org/10.1007/s11042-012-1029-9
- Building a Smooth Medical Service for Operating Room Using RFID Technologies vol.2014, 2014, https://doi.org/10.1155/2014/984721
- A low-latency communication protocol for target tracking in wireless sensor networks vol.2016, pp.1, 2016, https://doi.org/10.1186/s13638-016-0517-4
- Conditions for target tracking with range-only information vol.75, 2016, https://doi.org/10.1016/j.robot.2015.10.003
- On the security and improvement of a two-factor user authentication scheme in wireless sensor networks vol.17, pp.5, 2013, https://doi.org/10.1007/s00779-012-0540-3
- Optimal Mobile Sensor Scheduling for a Guaranteed Coverage Ratio in Hybrid Wireless Sensor Networks vol.9, pp.4, 2013, https://doi.org/10.1155/2013/740841
- Efficient security mechanism to counter the malicious attack in wireless sensor networks vol.2, pp.1, 2014, https://doi.org/10.1007/s40012-014-0042-8
- An energy-efficient self-deployment with the centroid-directed virtual force in mobile sensor networks vol.88, pp.10, 2012, https://doi.org/10.1177/0037549711411314
- User authentication schemes for wireless sensor networks: A review vol.27, 2015, https://doi.org/10.1016/j.adhoc.2014.11.018
- Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks vol.9, pp.9, 2013, https://doi.org/10.1155/2013/169638
- Data Aggregation and Transmission Mechanism for Energy Adaptive Node in Wireless Sensor Networks vol.36, pp.11A, 2011, https://doi.org/10.7840/KICS.2011.36A.11.903
- Lifetime maximization considering target coverage and connectivity in directional image/video sensor networks vol.65, pp.1, 2013, https://doi.org/10.1007/s11227-011-0646-9
- A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps vol.63, 2016, https://doi.org/10.1016/j.future.2016.04.016
- A Routing Algorithm Based on Dynamic Forecast of Vehicle Speed and Position in VANET vol.9, pp.6, 2013, https://doi.org/10.1155/2013/390795
- Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines pp.1868-5145, 2018, https://doi.org/10.1007/s12652-018-0712-8