WIRELESS AD HOC NETWORKING WIRELESS NETWORKS AND MOBILE COMMUNICATIONS Series Editor: Yan Zhang Millimeter Wave Technology in Wireless PAN, LAN, and MAN Shao-Qiu Xiao, Ming-Tuo Zhou and Yan Zhang ISBN: 0-8493-8227-0 Security in Wireless Mesh Networks Yan Zhang, Jun Zheng and Honglin Hu ISBN: 0-8493-8250-5 Resource, Mobility and Security Management in Wireless Networks and Mobile Communications Yan Zhang, Honglin Hu, and Masayuki Fujise ISBN: 0-8493-8036-7 Wireless Mesh Networking: Architectures, Protocols and Standards Yan Zhang, Jijun Luo and Honglin Hu ISBN: 0-8493-7399-9 Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks Shih-Lin Wu and Yu-Chee Tseng ISBN: 0-8493-9254-3 Wireless Metropolitan Area Networks: WiMAX and Beyond Yan Zhang and Hsiao-Hwa Chen ISBN: 0-8493-2624-9 Distributed Antenna Systems: Open Architecture for Future Wireless Communications Honglin Hu, Yan Zhang and Jijun Luo ISBN:1-4200-4288-2 AUERBACH PUBLICATIONS www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: WIRELESS AD HOC NETWORKING Personal-Area, Local-Area, and the Sensory-Area Networks Edited by Shih-Lin Wu Yu-Chee Tseng Boca Raton New York Auerbach Publications is an imprint of the Taylor & Francis Group, an informa business Auerbach Publications Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487‑2742 © 2007 by Taylor & Francis Group, LLC Auerbach is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid‑free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number‑10: 0‑8493‑9254‑3 (Hardcover) International Standard Book Number‑13: 978‑0‑8493‑9254‑2 (Hardcover) This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the conse‑ quences of their use. No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www. copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC) 222 Rosewood Drive, Danvers, MA 01923, 978‑750‑8400. CCC is a not‑for‑profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging‑in‑Publication Data Wireless ad hoc networking : personal‑area, local‑area, and the sensory‑area networks / editors, Shih‑Lin Wu and Yu‑Chee Tseng. p. cm. ‑‑ (Wireless networks and mobile communications) Includes bibliographical references and index. ISBN‑13: 978‑0‑8493‑9254‑2 (alk. paper) ISBN‑10: 0‑8493‑9254‑3 (alk. paper) 1. Wireless LANs. 2. Wireless communication systems. 3. Sensor networks. I. Wu, Shih‑Lin. II. Tseng, Yu‑Chee. III. Title. IV. Series. TK5105.78.W59 2007 004.6’8‑‑dc22 2006031857 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the Auerbach Web site at http://www.auerbach‑publications.com Contents PART I: WIRELESS PERSONAL-AREA AND SENSORY-AREA NETWORKS 1 Coverage and Connectivity of Wireless Sensor Networks . . . . . . 3 1.1 Introduction 3 1.2 Computing Coverage of a Wireless Sensor Network 4 1.3 Coverage and Scheduling 14 1.4 Coverage and Connectivity 20 1.5 Conclusions 23 2 Communication Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.1 Introduction 25 2.2 Similarities and Differences between WSNs and MANETs 28 2.3 Communication Patterns in Wireless Sensor Networks 30 2.4 Routing Protocols in WSNs 39 2.5 Comparative Studies 53 2.6 Conclusions and Future Research Directions 56 3 FireFly: A Time-Synchronized Real-Time Sensor Networking Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 3.1 Introduction 65 3.2 The FireFly Sensor Node 67 3.3 RT-Link: A TDMA Link Layer Protocol for Multihop Wireless Networks 71 3.4 Nano-RK: A Resource-Centric RTOS for Sensor Networks 87 3.5 Coal Mine Safety Application 98 3.6 Summary and Concluding Remarks 102 4 Energy Conservation in Sensor and Sensor-Actuator Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107 4.1 Introduction 107 4.2 Localized Algorithms Save Energy 110 v vi ■ Contents 4.3 Minimum-Energy Broadcasting and Multicasting 113 4.4 Power-Aware Routing 115 4.5 Controlled Mobility for Power-Aware Localized Routing 116 4.6 Power-Efficient Neighbor Communication and Discovery for Asymmetric Links 118 4.7 Challenges of Power-Aware Routing with a Realistic Physical Layer 119 4.8 A Localized Coordination Framework for Wireless Sensor and Actuator Networks 121 4.9 Localized Movement Control Algorithms for Realization of Fault Tolerant Sensor and Sensor- Actuator Networks 128 4.10 Conclusion 130 5 Security in Wireless Sensor Networks. . . . . . . . . . . . . . . . . . . . . . . .135 5.1 Introduction 136 5.2 Physical Layer Security 136 5.3 Key Management 140 5.4 Link Layer Security 155 5.5 Network Layer Security 157 5.6 Application Layer Security 159 6 Autonomous Swarm-Bot Systems for Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 6.1 Introduction 167 6.2 The System Architecture 168 6.3 Cooperative Localization Algorithm 169 6.4 Foraging and Gathering 172 6.5 Minimap Integration 178 6.6 The Collaborative Path Planning Algorithm 181 6.7 Conclusion 184 7 A Smart Blind Alarm Surveillance and Blind Guide Network System on Wireless Optical Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 7.1 Introduction 191 7.2 The Manufacture of Wireless Optical Transceiver 193 7.3 The Design of Wireless Optical Network 196 7.4 Smart Wireless Optical Blind-Guidance Cane and Blind-Guidance Robot 199 7.5 The Design of a Smart Guide System with Wireless Optical Blind-Guidance Cane and a Blind-Guidance Robot 203 7.6 Smart Wireless Optical Communication of Blind Alarm Surveillance System 210 7.7 The Design and Implementation of a Smart Wireless Blind-Guidance Alarm Surveillance System 214 Contents ■ vii PART II: WIRELESS LOCAL-AREA NETWORKS 8 Opportunism in Wireless Networks: Principles and Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 8.1 Opportunism: Avenues and Basic Principles 223 8.2 Source Opportunism 227 8.3 Spatio-Temporal Opportunism over a Single Link 234 8.4 Spatio-Temporal Opportunism in Ad Hoc Networks 241 8.5 Spatiotemporal-Spectral Opportunism in Ad Hoc Networks 247 8.6 Conclusions 250 9 Localization Techniques for Wireless Local Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 9.1 Introduction 255 9.2 Nondedicated Localization Techniques 256 9.3 Location Tracking 272 9.4 Conclusion 274 10 Channel Assignment in Wireless Local Area Networks . . . . . . 277 10.1 Introduction 277 10.2 Preliminaries 280 10.3 Rings 282 10.4 Grids 285 10.5 Interval Graphs 288 10.6 Trees 292 10.7 Conclusion 296 11 MultiChannel MAC Protocols for Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 11.1 Introduction 301 11.2 Design Issues of Multichannel Protocols 302 11.3 Multichannel Protocols 303 11.4 Comparison of Multichannel MAC Protocols 320 11.5 Open Issues 321 11.6 Conclusions 322 12 Enhancing Quality of Service for Wireless Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 12.1 Introduction 326 12.2 Background 327 12.3 The Proposed EDCF-DM Protocol 331 12.4 Performance Evaluation 334 12.5 Conclusions 340 13 QoS Routing Protocols for Mobile Ad Hoc Networks . . . . . . . . 343 13.1 Introduction 343 13.2 Reviews of the QoS Routing Protocols 345 13.3 Our QoS Routing Protocol 348 viii ■ Contents 13.4 Simulation Results 360 13.5 Conclusions 367 14 Energy Conservation Protocols for Wireless Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 14.1 Introduction 371 14.2 Power Management 371 14.3 Power Control 382 14.4 Topology Control Protocols 387 14.5 Summary 397 15 Wireless LAN Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 15.1 WEP and Its Security Weaknesses 399 15.2 802.1X Security Measures 405 15.3 IEEE 802.11i Security 410 15.4 Summary 417 16 Temporal Key Integrity Protocol and Its Security Issues in IEEE 802.11i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 16.1 Introduction 419 16.2 Wired Equivalent Privacy and Its Weakness 420 16.3 Wi-Fi Protected Access 421 16.4 Temporal Key Integrity Protocol 423 16.5 Fragility of Michael 430 16.6 TKIP Countermeasures 431 16.7 Key Handshake Procedure 433 16.8 Conclusions 434 PART III: INTEGRATED SYSTEMS 17 Wireless Mesh Networks: Design Principles . . . . . . . . . . . . . . . . . 439 17.1 Introduction 439 17.2 Generic Architecture and Basic Requirements of Wireless Mesh Networks 439 17.3 Network-Planning Techniques 442 17.4 Self-Configuring Techniques 448 17.5 Conclusions 458 18 Wireless Mesh Networks: Multichannel Protocols and Standard Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 18.1 Introduction 461 18.2 Multichannel MAC Protocols 462 18.3 Multichannel Routing Protocols 473 18.4 Standard Activities of Mesh Networks 478 18.5 Conclusions 481 Contents ■ ix 19 Integrated Heterogeneous Wireless Networks . . . . . . . . . . . . . . . 483 19.1 Introduction 483 19.2 Integration of Infrastructure-Based Heterogeneous Wireless Networks 485 19.3 Heterogeneous Wireless Multihop Networks 492 19.4 Research Issues for Heterogeneous Wireless Networks 500 19.5 Conclusions 502 20 Intrusion Detection for Wireless Network . . . . . . . . . . . . . . . . . . . 505 20.1 Introduction 505 20.2 Background on Intrusion Detection 505 20.3 Intrusion Detection for Mobile Ad Hoc Networks 506 20.4 Intrusion Detection for Wireless Sensor Networks 519 20.5 Conclusion 530 21 Security Issues in an Integrated Cellular Network—WLAN and MANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535 21.1 Introduction 535 21.2 Architecture of the Integrated Network 537 21.3 Security Impacts from the Unique Network Characteristics 540 21.4 Potential Security Threats 542 21.5 An Investigation and Analysis of Security Protocols 554 21.6 New Security Issues and Challenges 564 21.7 Conclusion 566 22 Fieldbus for Distributed Control Applications . . . . . . . . . . . . . . . 571 22.1 Introduction 571 22.2 Review on Distributed Control 577 22.3 Fundamental Aspects of DCS 578 22.4 Standards, Frequency Bands, and Issues 580 22.5 Some of the Major Wireless Fieldbuses 583 22.6 Selecting a Fieldbus 590 22.7 Discussion and Conclusions 591 23 Supporting Multimedia Communication in the Integrated WCDMA/WLAN/Ad Hoc Networks . . . . . . . . . . . . . . . . 595 23.1 Introduction 595 23.2 Multiple Accesses in CDMA Uplink 599 23.3 Multiple Accesses in CDMA Downlink 605 23.4 Mobility Management 613 23.5 Design Integration with Ad Hoc Networks 620 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629