Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
- Using a wireless sensor network, variety applications are being developed. In this paper, considering the field of military surveillance and reconnaissance sensors in the network...
Young Bag Moon, Nae Soo Kim, Cheol Sig Pyo, Keun W...
We studied the possibility of using wireless sensor networks for vehicle identification in a large open field. This is exciting research in that it not only presents a challenge bu...
: This project investigates the application of a fully wireless network of inertial sensors for full-body, 3-D motion capture, for the real-time analysis of Tango dancing. Towards ...
—Data collection is one of the major traffic pattern in wireless sensor networks, which requires regular source nodes to send data packets to a common sink node with limited end...