Abstract—In this paper, we present a collision-free asynchronous multi-channel access protocol for Ad Hoc wireless networks using a single transceiver. Our protocol, dubbed AMMAC...
Duy Nguyen, J. J. Garcia-Luna-Aceves, Katia Obracz...
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Wireless sensor network applications, similarly to other distributed systems, often require a scalable time synchronization service enabling data consistency and coordination. Thi...
Flash memory is often the technology of choice for sensor networks because of its cost-effectiveness and attractive energy properties. In storage-constrained sensor network applica...
Vikram P. Munishwar, Sameer Tilak, Nael B. Abu-Gha...
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...