Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
The state of the art congestion control algorithms for wireless sensor networks respond to coarse-grained feedback regarding available capacity in the network with an additive inc...
Cross-Layer design has been the focus of several recent research efforts. Due to the highly variable nature of the links used in wireless communication systems and the resource-po...
Karim M. El Defrawy, Magda El Zarki, Mohamed M. Kh...
The low price of commodity wireless LAN cards and access points (APs) has resulted in the rich proliferation of high density WLANs in enterprise, academic environments, and public ...
In-network sensor query processing systems (ISQPs), or sensor databases, have been developed to acquire, process and aggregate data from wireless sensor networks (WSNs). Because W...