Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
— Multicast is a key technology that provides efficient data communication among a set of nodes for wireless multi-hop networks. In sensor networks and MANETs, multicast algorit...
Guo-Kai Zeng, Bo Wang 0001, Yong Ding, Li Xiao, Ma...
— The use of wireless sensor networks for gathering environmental and safety-critical data in real time is increasing at a rapid rate. Some of the main criteria in designing sens...
Winnie Louis Lee, Amitava Datta, Rachel Cardell-Ol...
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
The IEEE 802.15.4 standard defines a set of procedures to set-up a Low-Rate Wireless Personal Area Network where nodes self-organize into a logical communication structure through ...
Francesca Cuomo, Sara Della Luna, Petia Todorova, ...