enter search term and/or author name
Emstar: A software environment for developing and deploying heterogeneous sensor-actuator networks
Lewis Girod, Nithya Ramanathan, Jeremy Elson, Thanos Stathopoulos, Martin Lukac, Deborah Estrin
Article No.: 13
Recent work in wireless embedded networked systems has followed heterogeneous designs, incorporating a mixture of elements from extremely constrained 8- or 16-bit “Motes” to less resource-constrained 32-bit embedded...
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning
Article No.: 14
Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or...
Sleeping scheduling is a common energy-conservation solution for sensor networks. For application whereby coordination of sleeping among sensors is not possible or inconvenient, random sleeping is the only option. In this article, we study the...
Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach
Dijiang Huang, Deep Medhi
Article No.: 16
Existing pairwise key establishment schemes for large-scale sensor networks are vulnerable to various passive or active attacks. We classify attacks as selective node capture attacks, node fabrication attacks, and insider attacks. In order to...
Collaborative broadcasting and compression in cluster-based wireless sensor networks
Anh Tuan Hoang, Mehul Motani
Article No.: 17
Achieving energy efficiency to prolong the network lifetime is an important design criterion for wireless sensor networks. In this article, we propose a novel approach that exploits the broadcast nature of the wireless medium for energy...