Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
—Previous packet length optimizations for sensor networks often employ a fixed optimal length scheme, while in this study we present DPLC, a Dynamic Packet Length Control scheme...
Wei Dong, Xue Liu, Chun Chen, Yuan He, Gong Chen, ...
Wireless sensor networks are application specific, data centric networks where different applications run on deployed network. Each application interprets the underlying sensor n...
—In this paper, we are interested in minimizing the delay and maximizing the lifetime of event-driven wireless sensor networks, for which events occur infrequently. In such syste...
Joohwan Kim, Xiaojun Lin, Ness B. Shroff, Prasun S...
Abstract. Environmental scientists frequently engage in "campaignstyle" deployments, where they visit a location for a relatively short period of time (several weeks to m...
Douglas Carlson, Jayant Gupchup, Rob Fatland, Andr...