According to the application domain, Wireless Sensor Networks (WSNs) differ in a number of ways (e. g., deployment strategy, node mobility, available resources, node heterogeneity...
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Large-scale wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from traditional networked sys...
Chenyang Lu, Brian M. Blum, Tarek F. Abdelzaher, J...
We propose a distributed on-demand power-management protocol for collecting data in sensor networks. The protocol aims to reduce power consumption while supporting fluctuating dem...
As the power of mobile devices continues to grow, and the range of resources accessible via wireless networks expands, there is an increasing need to offer services to users in a ...
Markus Aleksy, Colin Atkinson, Philipp Bostan, Tho...