Distributed detection of clone attacks in wireless sensor networks
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an
adversary can physically capture some of the nodes, first can reprogram, and then, can …
adversary can physically capture some of the nodes, first can reprogram, and then, can …
Application performance modeling in a virtualized environment
Performance models provide the ability to predict application performance for a given set of
hardware resources and are used for capacity planning and resource management …
hardware resources and are used for capacity planning and resource management …
Interference-aware cooperative communication in multi-radio multi-channel wireless networks
There are a lot of recent interests on cooperative communication (CC) in wireless networks.
Despite the large capacity gain of CC in small wireless networks with its capability of …
Despite the large capacity gain of CC in small wireless networks with its capability of …
Geometric algorithms for sensor networks
This paper surveys the use of geometric methods for wireless sensor networks. The close
relationship of sensor nodes with their embedded physical space imposes a unique …
relationship of sensor nodes with their embedded physical space imposes a unique …
Optimal gateway selection in multi-domain wireless networks: A potential game perspective
We consider a coalition network where multiple groups are interconnected via wireless links.
Gateway nodes are designated by each domain to achieve a network-wide interoperability …
Gateway nodes are designated by each domain to achieve a network-wide interoperability …
[LIVRO][B] Secure wireless sensor networks
M Conti - 2015 - Springer
Recent technology progress, particularly in the areas of computer networks and hardware
miniaturization, allowed the emergence of a set of novel computing and application …
miniaturization, allowed the emergence of a set of novel computing and application …
Throughput analysis of IEEE 802.11 multi-hop wireless networks with routing consideration: A general framework
The end-to-end throughput of multi-hop communication in wireless ad hoc networks is
affected by the conflict between forwarding nodes. It has been shown that sending more …
affected by the conflict between forwarding nodes. It has been shown that sending more …
Consort: Node-constrained opportunistic routing in wireless mesh networks
Opportunistic routing is proposed to improve the performance of wireless networks by
exploiting the broadcast nature and spatial diversity of the wireless medium. In this paper …
exploiting the broadcast nature and spatial diversity of the wireless medium. In this paper …
A distributed flow-based guiding protocol in wireless sensor networks
PY Chen, ZF Kao, WT Chen… - … Conference on Parallel …, 2011 - ieeexplore.ieee.org
Guiding navigation is an important application in wireless sensor networks to make moving
objects leave dangerous areas safely and quickly. However, guiding policy without …
objects leave dangerous areas safely and quickly. However, guiding policy without …
Distributed algorithms for multipath routing in full-duplex wireless networks
Recently Choi et al. designed the first practical wireless full-duplex system, which
challenges the basic assumption in wireless communications that a radio cannot transmit …
challenges the basic assumption in wireless communications that a radio cannot transmit …