In this paper, we present a new control method that makes some node adjustments in local areas in an effort to cover the “holes ” in wireless sensor networks. Many security applications often face the problem of holes when some sensor nodes are disabled from the collaboration due to their failures and misbehavior. Affected by malicious at-tacks, these holes may occur dynamically and such a prob-lem cannot be solved completely by simply deploying more redundant sensors. We propose a snake-like cascading re-placement process in a local area in order to fill in the va-cant area with trusted nodes. Only 1-hop neighborhood is used in our approach. Its implementations under both a passive model and an active model are discussed. The simulation re...
In this paper, a cooperative, lightweight and fully distributed approach is introduced to adaptively...
Les réseaux de capteurs sont des réseaux composés de petits objets communicants à faibles ressources...
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor net...
Abstract—In this paper, we propose a new control method to cover “holes ” in wireless sensor network...
Abstract — In this work, we study the topology enhancement problem of wireless sensor networks. Our ...
Wireless sensor networks are often deployed in hostile and unattended environments. The nodes will b...
A critical issue in wireless sensor networks is represented by the limited availability of energy wi...
In a densely deployed wireless sensor network, a single node has many neighbouring nodes with which ...
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing s...
Abstract — In wireless sensor networks, one of the fundamental issues is the coverage problem. This ...
Wireless sensor networks are often deployed in hostile and unattended environments. The nodes will b...
Graph-based topology control adapts wireless topologies to achieve certain target graph structures. ...
Wireless sensor networks can be used as cost-effective monitoring and automation platforms in smart ...
Abstract- Security of deployed wireless sensor networks (WSNs) has become a crucial task as the depl...
© 2015 IEEE. Unlike sporadic node failures, coverage holes emerging from multiple temporally-correla...
In this paper, a cooperative, lightweight and fully distributed approach is introduced to adaptively...
Les réseaux de capteurs sont des réseaux composés de petits objets communicants à faibles ressources...
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor net...
Abstract—In this paper, we propose a new control method to cover “holes ” in wireless sensor network...
Abstract — In this work, we study the topology enhancement problem of wireless sensor networks. Our ...
Wireless sensor networks are often deployed in hostile and unattended environments. The nodes will b...
A critical issue in wireless sensor networks is represented by the limited availability of energy wi...
In a densely deployed wireless sensor network, a single node has many neighbouring nodes with which ...
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing s...
Abstract — In wireless sensor networks, one of the fundamental issues is the coverage problem. This ...
Wireless sensor networks are often deployed in hostile and unattended environments. The nodes will b...
Graph-based topology control adapts wireless topologies to achieve certain target graph structures. ...
Wireless sensor networks can be used as cost-effective monitoring and automation platforms in smart ...
Abstract- Security of deployed wireless sensor networks (WSNs) has become a crucial task as the depl...
© 2015 IEEE. Unlike sporadic node failures, coverage holes emerging from multiple temporally-correla...
In this paper, a cooperative, lightweight and fully distributed approach is introduced to adaptively...
Les réseaux de capteurs sont des réseaux composés de petits objets communicants à faibles ressources...
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor net...