This paper presents the architecture and protocols of SMesh, a completely transparent wireless mesh system that offers seamless, fast handoff, supporting VoIP and other real-time ...
Yair Amir, Claudiu Danilov, Michael Hilsdale, Ralu...
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterpri...
Lenin Ravindranath, Venkata N. Padmanabhan, Piyush...
Many Wireless Sensor Network (WSN) applications are composed of a mixture of deployed devices with varying capabilities, from extremely constrained 8-bit "Motes" to less...
Lewis Girod, Jeremy Elson, Alberto Cerpa, Thanos S...
Abstract—Multichannel wireless networks provide the flexibility to utilize the available spectrum efficiently for achieving improved system performance in terms of throughput a...