In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
In many reliable Wireless Sensor Network (WSN) applications, messages have different priorities depending on urgency or importance. For example, a message reporting the failure of...
—We present the derivation of a novel metric for the performance prediction of Wireless Sensor Networks (WSNs). In particular, the metric can be applied in, for example, monitori...
Abstract—Intuitively, identification of nodes close to the network edge is key to the successful setup, and continued operation, of many sensor network protocols and application...
In this paper, we proposed a MAC protocol, which can dynamically adjust Listening/Sleeping time rate of wireless sensor nodes according to data traffic load. In sensor networks, se...