By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
— Wireless sensor network consisting of a large number of sensors is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited po...
Jae Duck Yu, Kyung Tae Kim, Bo Yle Jung, Hee Yong ...
— Wireless communications is now completely pervasive, and already is used in many guises by people in everyday life. However until now, the information exchanged has been mainly...
Sarah Brady, Brian Carson, Donal O'Gorman, Niall M...
Recent advances in low-power embedded processors, radios, and micro-mechanical systems (MEMs) have made possible the development of networks of wirelessly interconnected sensors. ...
Scalable energy-efficient training protocols are proposed for massively-deployed sensor networks, where sensors are initially anonymous and unaware of their location. The protocol...
Ferruccio Barsi, Alan A. Bertossi, Francesco Betti...