— Existing mechanisms for querying wireless sensor networks leak client interests to the servers performing the queries. The leaks are not only in terms of specific regions but ...
Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pea...
Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...
Reputation and Trust-based Monitoring Systems (RTMSs) have provided a ubiquitous framework for secure Wireless Sensor Network (WSN) computing. Employing sensors for neighborhood m...
Abstract—Wireless sensor networks need very efficient network protocols due to the sensors’ limited communication and computation capabilities. Network planarization – find...
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...