Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Self-organisation has emerged as a very promising approach to the design, deployment, operation, control and evolution of complex wireless networks. The dominant strictly layered d...
Mohammad Abdur Razzaque, Simon A. Dobson, Paddy Ni...
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Node clustering and data aggregation are popular techniques to reduce energy consumption in large WSNs and a large body of literature has emerged describing various clustering prot...
Experiments with wireless sensor networks have shown that unidirectional communication links are quite common. What is even more, they have also shown that the range of a unidirect...
A distributed joint routing and spectrum sharing algorithm for video streaming applications over cognitive radio ad hoc networks is proposed in this article. The proposed cross-lay...
Lei Ding, Scott Pudlewski, Tommaso Melodia, Stella...