In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
As sensor networks become denser and more widely deployed, the potential develops for interconnecting these networks to combine datasets, share technological solutions, and to con...
Todd Hansen, Sameer Tilak, Steve Foley, Kent Lindq...
— Wireless reprogramming of the sensor network is useful for uploading new code or for changing the functionality of the existing code. In recent years, the research focus has sh...
Rajesh Krishna Panta, Saurabh Bagchi, Issa Khalil,...
Flooding protocols for wireless networks in general have been shown to be very inefficient and therefore are mainly used in network initialization or route discovery and maintenan...
Wireless sensor networks (WSNs) have been proposed for a multitude of location-dependent applications. To stamp the collected data and facilitate communication protocols, it is nec...
Hongyang Chen, Pei Huang, Hing-Cheung So, Kaoru Se...