—This paper proposes a framework to maximize the lifetime the wireless sensor network (WSN) by using a mobile sink when the underlying applications tolerate delayed information d...
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
— An ad-hoc network of wireless static nodes is considered as it arises in a rapidly deployed, sensor based, monitoring system. Information is generated in certain nodes and need...
— Rate control for congestion mitigation and avoidance has received significant attention in the sensor networks literature. Existing rate control schemes dynamically assign rat...
Wireless Sensor Networks (WSNs) have been widely used in environment monitoring to collect useful information. Packet broadcasting is an essential function for establishing a comm...