Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
In this contribution, we propose an improved system architecture focusing on system reference and protocol stack for broadband wireless access networks. The proposal aims to constr...
Abstract— By means of so-called Scatternets, Bluetooth provides the ability to construct robust wireless multi-hop networks. In this paper we propose a practical protocol for tim...
— The design of a routing protocol must be based on the characteristics of its target networks. The diversity of wireless networks motivates the design of different routing metri...