Abstract— Mobile agents are often used in wireless sensor networks for distributed target detection with the goal of minimizing the transmission of non-critical data that negativ...
Andreas Konstantinidis 0002, Christoforos Charalam...
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
—In large networks, a data source may not reach the intended sink in a single hop, thereby requiring the traffic to be routed via multiple hops. An optimized choice of such rout...
Thomas Watteyne, Antonella Molinaro, Maria Grazia ...
—The overlay-based network architecture has been recognized as an effective way to deal with the funneling effect in sensor networks, where sensors closer to the sink are usually...
Wireless Sensor Networks (WSN) are a very promising solution for industrial monitoring applications in terms of safety, costs, efficiency and productivity. However, in order to mov...
Berta Carballido Villaverde, Susan Rea, Dirk Pesch