So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different pro...
—The presence of heterogeneous nodes (i.e., nodes with an enhanced energy capacity or communication capability) in a sensor network is known to increase network reliability and l...
Mark D. Yarvis, Nandakishore Kushalnagar, Harkirat...
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
We undertake a systematic experimental study of the effects of concurrent packet transmissions in low-power wireless networks. Our measurements, conducted with Mica2 motes equippe...
Dongjin Son, Bhaskar Krishnamachari, John S. Heide...