enter search term and/or author name
A System for Response and Prevention of Security Incidents in Wireless Sensor Networks
Daniele Midi, Salmin Sultana, Elisa Bertino
Article No.: 1
Resource constraints, unattended operating environments, and communication phenomena make Wireless Sensor Networks (WSNs) susceptible to operational failures and security attacks. However, applications often impose stringent requirements on data...
Enabling Sensor Network to Smartphone Interaction Using Software Radios
Yongtae Park, Jihun Ha, Hyogon Kim, Jeonggil Ko
Article No.: 2
Recent advances in smartphone processing power have opened the possibilities for them to act as the processing component of software-defined radios (SDRs). For low-power sensor network systems using various communication protocols, this means that...
Accelerating the Kamada-Kawai Algorithm for Boundary Detection in a Mobile Ad Hoc Network
Se-Hang Cheong, Yain-Whar Si
Article No.: 3
Force-directed algorithms such as the Kamada-Kawai algorithm have shown promising results for solving the boundary detection problem in a mobile ad hoc network. However, the classical Kamada-Kawai algorithm does not scale well when it is used in...
Water Quality Monitoring Using Wireless Sensor Networks: Current Trends and Future Research Directions
Kofi Sarpong Adu-Manu, Cristiano Tapparello, Wendi Heinzelman, Ferdinand Apietu Katsriku, Jamal-Deen Abdulai
Article No.: 4
Water is essential for human survival. Although approximately 71% of the world is covered in water, only 2.5% of this is fresh water; hence, fresh water is a valuable resource that must be carefully monitored and maintained. In developing...
Sensor Network Provenance Compression Using Dynamic Bayesian Networks
Changda Wang, Elisa Bertino
Article No.: 5
Provenance records the history of data acquisition and transmission. In wireless sensor networks (WSNs), provenance is critical for many different purposes, including assessing the trustworthiness of data acquired and forwarded by sensors,...
Recent years have witnessed a remarkable growth in the number of smart wearable devices. For many of these devices, an important security issue is to establish an authenticated communication channel between legitimate devices to protect the...
Encode When Necessary: Correlated Network Coding Under Unreliable Wireless Links
Shuai Wang, Song Min Kim, Zhimeng Yin, Tian He
Article No.: 7
Recent research has shown that network coding has great potential to improve network performance in wireless communication. The performance of network coding in real-world scenarios, however, varies dramatically. It is reported that network coding...
Performance Assessment and Feasibility Analysis of IEEE 802.15.4m Wireless Sensor Networks in TV Grayspaces
Luca Bedogni, Andreas Achtzehn, Marina Petrova, Petri Mähönen, Luciano Bononi
Article No.: 8
In this article, we assess the viability of underlay sensor networks in frequencies used by an incumbent digital TV broadcasting system, that is, in the so-called TV grayspaces (TVGS). Grayspace operations are particularly interesting when other...