— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...
: Two sensor network protocols for the monitoring of packed food products were tested in different sea containers. The packet rate and the signal strength of all sensor-to-sensor l...
Abstract-The emergence of small, inexpensive, networkcapable sensing devices led to a great deal of research on the design and implementation of sensor networks. A critical step in...
Riccardo Crepaldi, Simone Friso, Albert F. Harris ...
Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced...
In this paper we present a software tool for the simulation of distributed real-time embedded systems. Our tool is based on the popular NS-2 package for simulating the networking ...