Abstract. As the number of Wireless Sensor Networks (WSNs) applications is anticipated to grow substantially in coming years, new and radical strategies for effectively managing s...
Antonio G. Ruzzelli, Michael J. O'Grady, Gregory M...
S-MAC is a MAC (Medium Access Control) protocol as specialized for the wireless sensor network in order to sacrifice transmission delay and extend the working life of the whole sen...
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....