—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Abstract. Today, there exist many algorithms and protocols for constructing agregation or dissemination trees for wireless sensor networks that are optimal (for different notions o...
The IEEE 802.16 standard (commonly known as WiMAX) which has emerged as a broadband wireless access technology, is capable of delivering very high data rates. However, providing p...
Wireless Mesh Networks (WMNs) have emerged recently as a technology for providing high-speed last mile connectivity in next-generation wireless networks. Several MAC protocols tha...
The key application scenario of wireless sensor networks is data gathering: sensor nodes transmit data, possibly in a multi-hop fashion, to an information sink. The performance of...