Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
In this paper, we present a reliable storage service, called SolarStore, that adaptively trades-off storage reliability versus energy consumption in solar-powered sensor networks....
Yong Yang, Lili Wang, Dong Kun Noh, Hieu Khac Le, ...
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Smart Dust sensor networks ? consisting of cubic millimeter scale sensor nodes capable of limited computation, sensing, and passive optical communication with a base station ? are...
The need for high-frequency signal acquisition and processing is becoming increasingly prevalent in sensor networks. Applications that require high-frequency data sampling are pre...