— In this paper, we study coverage with connectivity properties in large wireless sensor networks. We consider three classes: full coverage with connectivity, partial coverage wi...
In this article we present a survey of transport protocols for Wireless Sensor Networks (WSNs). We first highlight several unique aspects of WSNs, and describe the basic design cr...
Chonggang Wang, Kazem Sohraby, Bo Li, Mahmoud Dane...
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...