Sensor Network Technology
Infrastructure, Security, Data P rocessing, and Deployment
SIGMOD record Issue of December 2003.
Guest Editor: Vijay Kumar.
The growing popularity and near ubiquitous deployment of sensors has significantly impacted
the field of information processing, data management, and system and application security at all
levels. These sensors; mobile and static, have the ability to gather massive amount of spatial as
well as temporally dense data over vast geographical areas. The overa ll potential of sensor network
in terms of data collection and dissemination is being exploited by a number of other disciplines. In
particular, its potential for managing security in communication and information management and
its deployment in biological sciences for capturing, analyzing, and processing information have
become important areas of research and development. In fact this technology is redefining
database architecture and data processing to integrate them seamlessly to nearly all other
disciplines. Its use in Bioinformatics provides an effective way of understanding biological
activities. It is also an effective resource for capturing information about the environment it is
deployed and for managing security.
Embedded sensor networks are massively distributed systems consisting of a large numbers of
autonomous, interconnected sensory nodes, which can continuously sense data of locally occurring
phenomena. They can be deployed on a large scale in resource- limited and harsh environments
such as seismic zones, ecological contamination sites or battlefields, etc. Each sensor of a sensor
network can be programmed to perform specific function to complement other sensors operations.
However, sensors networks are relatively more insecure repository and routers of data, which raises
the need or new security schemes. Their deployment in environments disaster areas,
earthquake/rubble zones or in military battlegrounds can be seriously affected by any kind of sensor
failure or malicious attack/security threats from an enemy.
The sensors have another serious problem, which is related to their power source. A sensor
needs power to function. Its power requirement is satisfied by low capacity and low power battery.
This constraint demands that software modules must not only be efficient but energy efficient as
well, which requires new programming approaches.
This issue of SIGMOD record is devoted to research work in sensor system infrastructure,
security, data processing (data capture, validation and consistency preservation), and biosensor
technology. It aims to unify multi-discipline sensor technology research and development through
the unique link, which is clearly visible when seen but invisible when not seen. The following list
provides an introduction to a part of the scope of the record.
1. Sensor network security
2. Sensor mining and sensor data mining
3. Stream data processing and information management
4. Sensor mobility
5. Ad-hoc Sensor network
6. Distributed Sensor Network Architecture
7. Sensor data capture and validation
8. Distributed sensor system reliability and recovery
9. Sensor deployment
10. Sensor system management
You are invited to submit your work for publication. The submission information is as follows.
Please note that these are hard deadlines.
Paper submission deadline: Monday, Septe mber 15, 2003.
Paper acceptance notification: Monday, October 6, 2003.
Camera ready submission: Monday, October 13, 2003.
Submitted articles are limited to 6 pages, however, under some cases, this limit may be relaxed.
Papers should be submitted electronically in Postscript, PDF or MS Word format. The font size
should be 10 point, single-space, 2-column, 8.5'' by 1'' page size with '' margins and no page
Papers should be sent to: email@example.com
SCE, Computer Networking
University of Missouri-Kansas City
5100 Rockhill Road
Kansas City, MO 64110, USA
Voice: (816) 235 2366
Fax: (816) 235 5159