— This paper proposes few ways of improving a WSN’s energy efficiency that already uses an energy efficient data routing protocol for continuous monitoring application. The p...
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Abstract. Environmental scientists frequently engage in "campaignstyle" deployments, where they visit a location for a relatively short period of time (several weeks to m...
Douglas Carlson, Jayant Gupchup, Rob Fatland, Andr...
Habitat monitoring is an important driving application for wireless sensor networks (WSNs). Although researchers anticipate some challenges arising in the real-world deployments of...
Robert Szewczyk, Joseph Polastre, Alan M. Mainwari...
We propose B-MAC, a carrier sense media access protocol for wireless sensor networks that provides a flexible interface to obtain ultra low power operation, effective collision a...