: Relatively higher cost, worse extensibility of the monitoring points and weaker mobility are those disadvantages that widely exist in the wire data collection system of the tradi...
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Sensor networks can be used for event alarming applications. To date, in most of the proposed schemes, the raw or aggregated sensed data is periodically sent to a data consuming c...
In this paper, we present a low latency media access control scheme which we call LLMAC (Low Latency MAC) for event-driven wireless sensor networks (WSN). In this kind of WSN, sens...
There are many applications of large scale sensor networks in which both the stimulus and the data collection stations are mobile (i.e. animal tracking, battlefield chasing). TTDD ...
Hong Zhou, Lu Jin, Zhongwei Zhang, Hesham H. Ali, ...