— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
— Traditionally, slotted communication protocols have employed guard times to delineate and align slots. These guard times may expand the slot duration significantly, especially...
BSCW [8] and Groove [10] have become the two defacto standards for collaboration over the Internet. They offer a wealth of functionalities, support a variety of possible collabora...
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
We propose CaliBree, a self-calibration system for mobile wireless sensor networks. Sensors calibration is a fundamental problem in a sensor network. If sensor devices are not prop...
Emiliano Miluzzo, Nicholas D. Lane, Andrew T. Camp...