Distributed detection of clone attacks in wireless sensor networks

M Conti, R Di Pietro, L Mancini… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an
adversary can physically capture some of the nodes, first can reprogram, and then, can …

Application performance modeling in a virtualized environment

S Kundu, R Rangaswami, K Dutta… - HPCA-16 2010 The …, 2010 - ieeexplore.ieee.org
Performance models provide the ability to predict application performance for a given set of
hardware resources and are used for capacity planning and resource management …

Interference-aware cooperative communication in multi-radio multi-channel wireless networks

K **e, X Wang, X Liu, J Wen… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
There are a lot of recent interests on cooperative communication (CC) in wireless networks.
Despite the large capacity gain of CC in small wireless networks with its capability of …

Geometric algorithms for sensor networks

J Gao, L Guibas - … Transactions of the Royal Society A …, 2012 - royalsocietypublishing.org
This paper surveys the use of geometric methods for wireless sensor networks. The close
relationship of sensor nodes with their embedded physical space imposes a unique …

Optimal gateway selection in multi-domain wireless networks: A potential game perspective

Y Song, SHY Wong, KW Lee - Proceedings of the 17th annual …, 2011 - dl.acm.org
We consider a coalition network where multiple groups are interconnected via wireless links.
Gateway nodes are designated by each domain to achieve a network-wide interoperability …

[LIVRO][B] Secure wireless sensor networks

M Conti - 2015 - Springer
Recent technology progress, particularly in the areas of computer networks and hardware
miniaturization, allowed the emergence of a set of novel computing and application …

Throughput analysis of IEEE 802.11 multi-hop wireless networks with routing consideration: A general framework

S Rezaei, M Gharib, A Movaghar - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The end-to-end throughput of multi-hop communication in wireless ad hoc networks is
affected by the conflict between forwarding nodes. It has been shown that sending more …

Consort: Node-constrained opportunistic routing in wireless mesh networks

X Fang, D Yang, G Xue - 2011 Proceedings IEEE INFOCOM, 2011 - ieeexplore.ieee.org
Opportunistic routing is proposed to improve the performance of wireless networks by
exploiting the broadcast nature and spatial diversity of the wireless medium. In this paper …

A distributed flow-based guiding protocol in wireless sensor networks

PY Chen, ZF Kao, WT Chen… - … Conference on Parallel …, 2011 - ieeexplore.ieee.org
Guiding navigation is an important application in wireless sensor networks to make moving
objects leave dangerous areas safely and quickly. However, guiding policy without …

Distributed algorithms for multipath routing in full-duplex wireless networks

X Fang, D Yang, G Xue - … Conference on Mobile Ad-Hoc and …, 2011 - ieeexplore.ieee.org
Recently Choi et al. designed the first practical wireless full-duplex system, which
challenges the basic assumption in wireless communications that a radio cannot transmit …