A key challenge for the successful deployment of systems consisting of multiple autonomous networked sensors is the development of decentralised mechanisms to coordinate the activ...
W. T. Luke Teacy, Alessandro Farinelli, N. J. Grab...
In this paper, we consider a hybrid solution to the sensor network position inference problem, which combines a real-time filtering system with information from a more expensive,...
Dimitri Marinakis, David Meger, Ioannis M. Rekleit...
The field of wireless sensor network (WSN) is an important and challenging research area today. Advancements in sensor networks enable a wide range of environmental monitoring and ...
K. Saleem, Norsheila Fisal, M. S. Abdullah, A. B. ...
AbstractDeveloping wireless sensor networks can enable information gathering, information processing and reliable monitoring of a variety of environments for both civil and militar...
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
In this work we consider energy-efficient resource management in an environment monitoring and hazard detection sensor network. Our goal is to allocate different detection methods...
Qinru Qiu, Qing Wu, Daniel J. Burns, Douglas Holzh...
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...
Abstract. Reprogramming the sensor networks in place is an important and challenging problem. One way suggested for reprogramming is with the help of an UAV (Unmanned Ariel Vehicle...
In a sensor network information from multiple nodes must usually be aggregated in order to accomplish a certain task. A natural way to view this information gathering is in terms o...
Stefan Funke, Leonidas J. Guibas, An Nguyen, Yusu ...
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...