In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
—With the co-existence of different wireless networks, which exhibit largely different bandwidth and coverage characteristics, much interest has been involved in integrating thes...
Abstract Wireless mesh networks (WMNs) can provide seamless broadband connectivity to network users with low setup and maintenance costs. To support nextgeneration applications wit...
Vinod Kone, Sudipto Das, Ben Y. Zhao, Haitao Zheng
Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time o...
Multimedia contents are becoming the major information going through the Internet. Pervasive network infrastructure expedites data delivery with improved network throughput and re...