Abstract. Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. However, deployi...
Stefan Schmidt, Holger Krahn, Stefan Fischer, Diet...
Abstract— A fundamental building block in distributed wireless sensor networks is time synchronization. Given resource constrained nature of sensor networks, traditional time syn...
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they ca...
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-res...
Recently, Botnet has been used to launch spam-mail, key-logging, and DDoS attacks. Botnet is a network of bots which are controlled by attacker. A lot of detection mechanisms have ...