Consider a set of sensors that wish to consent on the message broadcasted by a multi-antenna transmitter in the presence of white-noise jamming. The jammer’s interference introd...
Shahrokh Farahmand, Alfonso Cano, Georgios B. Gian...
—Previous packet length optimizations for sensor networks often employ a fixed optimal length scheme, while in this study we present DPLC, a Dynamic Packet Length Control scheme...
Wei Dong, Xue Liu, Chun Chen, Yuan He, Gong Chen, ...
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
In this paper, we introduce a rotating interrogation technique for sensor networks called Whirlpool. Whirlpool provides opportunities to optimize data delivery in time-critical mo...
Divyasheel Sharma, Vladimir Zadorozhny, Panos K. C...
Bomb disposal suits contain a large amount of padding and armour to protect the wearer's vital organs in the case of explosion. The combination of the heavy (roughly 40kg) su...