Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
— We present in this work a new mechanism based on an innovative hybrid approach for traffic and collision control in wireless ad hoc networks. We combine the well known equatio...
The use of wireless sensor networks (WSNs) for structural health monitoring is gaining popularity since it allows for a low-cost, rapid and robust assessment of structural integri...
Hwee Pink Tan, Pius W. Q. Lee, Winston Khoon Guan ...
Wireless sensor networks are rapidly finding their way through a plethora of new applications like precision farming and forestry, with increasing network scale, system complexit...
—Fast proliferation of IEEE 802.11 wireless devices has led to the emergence of High-Density (HD) Wireless Local Area Networks (WLANs), where it is challenging to improve the thr...
Yanfeng Zhu, Zhisheng Niu, Qian Zhang, Bo Tan, Zhi...