The research reported in this paper uses wireless sensor networks to provide salient information about spatially distributed dynamic fields, such as regional variations in tempera...
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
— In wireless sensor networks, many protocols assume that if node A is able to interfere with node B’s packet reception, then node B is within node A’s communication range. I...
Gang Zhou, Tian He, John A. Stankovic, Tarek F. Ab...
— We introduce an algorithm which detects and traces a specified level set of a scalar field (a contour) on a plane. A network of static sensor nodes with limited communication...