We propose algorithms for resource allocations, fusion rules, and network security.
In the first part of this thesis, we consider the centralized detection and calculate the optimal transmit power allocation and the optimal number of quantization bits for each SN.
\A Shadow Zone Aware Routing Protocol for Underwater Sensor Nodes with Power Controlled and Movable Transducer". Paper C is an extension of Paper 1 and 3 while Paper D is an extension of Paper 2.
\Secure Many to Many Routing for Wireless Sensor and Actuator Networks". Paper 4, 5, 6 and 7 have been added to constitute Part II of this thesis and are named Paper A, B, C and D respectively.
But as this rule requires a-priori knowledge that is difficult to attain in practice, suboptimal fusion rules are proposed that are realizable in practice.
The second part considers a fully distributed detection framework and we propose a two-step distributed quantized fusion rule algorithm where in the first step the SNs collaborate with their neighbors through error-free, orthogonal channels.Contribution 2: Propose a routing algorithm to provide reliable com- munications for underwater sensor networks.Sensor devices running our algorithm can actively move out of shadow zones areas, which causes net- work disconnection, to keep themselves connected. \A Shadow Zone Aware Routing Protocol for Tactical Acoustic Undersea Surveillance Networks". Invited paper in the 2nd International Conference on Security of Information and Networks (SIN 2009), Oct 6-10, 2009, North Cyprus. On the other hand, the mobility pattern as well as resource constraints of ad hoc devices make security design more di cult. \Secure Many to Many Routing for Wireless Sensor and Actuator Networks". IEEE Communications Letters, Vol.13, Issue 5, pages 366-368, May 2009. In Proceedings of the 4th International Conference on Autonomous and Trusted Computing (ATC'07), Jul 11-13, 2007; LNCS 4610 pages 3-12, Hong Kong, PRC. On the one hand, the inherent characteristics of wireless environment contribute serious system vulnerabilities if the security requirements are not met.Four papers in Part II are grouped into two categories.Paper A and B are the applications of identity-based cryptography for securing wireless and ad hoc applications.Paper C and D are solutions for secure and reliable communications in wireless sensor networks.This thesis addresses the problem of detection of an unknown binary event. on Networking, IEEE Journal on Selected Areas in Communications, IEEE Trans. on Industrial Informatics, IEEE Communications Magazine, IEEE Communication Letters, IEEE Network Magazine, IEEE Intelligent Systems, ACM Trans.