We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; ...
Sensor network which operates on battery are used to gather data in a variety of environments. The data collected by each node is communicated through the network to the sink, whi...