Radio interference may lead to packet losses, thus negatively affecting the performance of sensornet applications. In this paper, we experimentally assess the impact of external i...
Carlo Alberto Boano, Thiemo Voigt, Nicolas Tsiftes...
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Networked Surfaces are surfaces which provide network connectivity to specially augmented objects, when these objects are physically placed on top of the surface. When an object (...
James Scott, Frank Hoffmann, Mike Addlesee, Glenfo...
RTS-CTS handshake based protocols achieve “reliable unicast” by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently gene...