Abstract — In this work, we study the topology enhancement problem of wireless sensor networks. Our research focuses on reducing the path-based vulnerability. The objective is to get as much information as possible for any target moving out of the surveillance area. We study intelligent targets that have the knowledge of existing sensor distribution. Under such assumption, we find the vulnerable paths that rational targets would like to take and block these paths to enhance the network detection performance. Simulation shows that by adding only a few numbers of new sensors on specific positions, we can greatly decrease the vulnerability of a randomly deployed sensor network. I
We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintena...
We consider surveillance applications through wireless sensor networks (WSNs) where the areas to be ...
This dissertation investigates two research problems to protect wireless network topology and routin...
Abstract — In this work, we study the topology enhancement problem of wireless sensor networks. Our ...
In this paper, we present a new control method that makes some node adjustments in local areas in an...
[[abstract]]The paper proposes a protocol to adjust the vulnerable path by using mobile sensor netwo...
Among the various possible threats in the WSN’s, like node failure, data security, etc., we are pres...
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless s...
We analyze the security vulnerabilities of some well-known topology maintenance protocols (TMPs) for...
Abstract- We consider muting security in wireless sensor networks. Many Sensor network muting protoc...
In this chapter, the sensing coverage area of surveillance wireless sensor networks is considered. T...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
We are sending data from source node to destination using wireless sensor networks WSNs , In wireles...
Abstract—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSN...
Abstract—In this paper, we explore methods to generate optimal network topologies for wireless senso...
We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintena...
We consider surveillance applications through wireless sensor networks (WSNs) where the areas to be ...
This dissertation investigates two research problems to protect wireless network topology and routin...
Abstract — In this work, we study the topology enhancement problem of wireless sensor networks. Our ...
In this paper, we present a new control method that makes some node adjustments in local areas in an...
[[abstract]]The paper proposes a protocol to adjust the vulnerable path by using mobile sensor netwo...
Among the various possible threats in the WSN’s, like node failure, data security, etc., we are pres...
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless s...
We analyze the security vulnerabilities of some well-known topology maintenance protocols (TMPs) for...
Abstract- We consider muting security in wireless sensor networks. Many Sensor network muting protoc...
In this chapter, the sensing coverage area of surveillance wireless sensor networks is considered. T...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
We are sending data from source node to destination using wireless sensor networks WSNs , In wireles...
Abstract—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSN...
Abstract—In this paper, we explore methods to generate optimal network topologies for wireless senso...
We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintena...
We consider surveillance applications through wireless sensor networks (WSNs) where the areas to be ...
This dissertation investigates two research problems to protect wireless network topology and routin...