—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
Two different operating system types are currently considered for sensor networks: event driven and multithreaded. This paper compares the two well-known operating systems TinyOS ...
Cormac Duffy, Utz Roedig, John Herbert, Cormac J. ...
— A deep understanding of the structural properties of wireless networks is critical for evaluating the performance of network protocols and improving their designs. Many protoco...
Jianer Chen, Anxiao Jiang, Iyad A. Kanj, Ge Xia, F...
Abstract—Intuitively, identification of nodes close to the network edge is key to the successful setup, and continued operation, of many sensor network protocols and application...
Movement in wireless and sensor environments changes the degree to which we can communicate. Whereas sensor networks are generally seen as static, in many situations there is at l...