Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
This paper presents two lifetime models that describe two of the most common modes of operation of sensor nodes today, triggerdriven and duty-cycle driven. The models use a set of ...
Deokwoo Jung, Thiago Teixeira, Andrew Barton-Sween...
Recent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of lowcost, miniature, lightweight, and intelligent ph...
Network Simulators are important tools in network research. As the selected topology often influences the outcome of the simulation, realistic topologies are required to produce re...
Wireless sensors use low power radio transceivers due to the stringent constraints on battery capacity. As a result, radio transmission with wireless sensors is unreliable. Furthe...