Abstract. Random key pre-distribution schemes are vulnerable to collusion attacks. In this paper, we propose a new key management scheme for ubiquitous heterogeneous sensor network...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
Underwater multimedia acoustic sensor networks will enable new underwater applications such as multimedia coastal and tactical surveillance, undersea explorations, picture and vide...
The many-to-one multihop traffic pattern of Wireless Sensor Networks (WSN) puts a great challenge on enhancing the event-to-sink data delivery throughput. Because, in CSMA/CA dri...
Abstract. Resource constrained systems often are programmed using an eventbased model. Many applications do not lend themselves well to an event-based approach, but preemptive mult...
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...