Abstract— In wireless sensor networks, one of the big challenges is to achieve a satisfactory network lifetime while meeting quality of service (QoS) requirements. In this paper,...
Zhiwen Wan, Jinsong Zhang, Hao Zhu, Kia Makki, Nik...
With the growth in the computation capacity of sensor nodes, they are increasingly equipped to handle more complex functions. Moreover, the need to realize the complete loop of se...
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
—Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as Local Storage (LS),...
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...