enter search term and/or author name
There is a critical need for new thinking regarding overload traffic management in sensor networks. It has now become clear that experimental sensor networks (e.g., mote networks) and their applications commonly experience periods of persistent...
A canonical seed assignment model for key predistribution in wireless sensor networks
Patrick Tague, Radha Poovendran
Article No.: 19
A promising solution for trust establishment in wireless sensor networks is the assignment of cryptographic seeds (keys, secrets, etc.) to sensor nodes prior to network deployment, known as key predistribution. In this article, we propose a...
The self-protection problem in wireless sensor networks
Dan Wang, Qian Zhang, Jiangchuan Liu
Article No.: 20
Wireless sensor networks have recently been suggested for many surveillance applications, such as object monitoring, path protection, or area coverage. Since the sensors themselves are important and critical objects in the network, a natural...
Localization using boundary sensors: An analysis based on graph theory
Yunhui Zheng, David J. Brady, Pankaj K. Agarwal
Article No.: 21
We consider sensors, such as fibers, lasers, and pyroelectric motion detectors, that fire when objects cross a boundary. A moving object can be localized by analyzing sequences of boundary crossings. We consider the number of distinct sequences...
Motion may be used in sensor networks to change the network configuration for improving the sensing performance. We consider the problem of controlling motion in a distributed manner for a mobile sensor network for a specific form of motion...