—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
In this paper we consider how to collect data from sensors deployed in the Euclidean plane in a timeefficient way. We assume that all sensors could adjust their transmission range...
- Many real-time distributed collaborative applications are emerging that require exchange of critical sensor data among geographically distant end users under resource-constrained...
Tarun Banka, Panho Lee, Anura P. Jayasumana, Jim K...
— Large scale wireless sensor networks (WSNs) can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, envir...
—Research in wireless mesh networks have been growing in recent years. Many testbeds have been created to study networking protocols in wireless mesh networks. In this work, we d...