During phases of transient connectivity, sensor nodes receive a substantial number of corrupt packets. These corrupt packets are generally discarded, losing the sent information and wasting the energy put into transmitting and receiving. Our analysis of one year’s data from an outdoor sensor network deployment shows that packet corruption follows a distinct pattern that is observed on all links. We explain the pattern’s core features by considering implementation aspects of low-cost 802.15.4 transceivers and independent transmission errors. Based on the insight into the corruption pattern, we propose a probabilistic approach to re- cover information about the original content of a corrupt packet. Our approach vastly reduces the uncertainty ...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
Wireless sensor networks are an emerging field where a large number of cheap sensors are dispersed o...
Several applications have been proposed for wireless sensor networks, including habitat monitoring, ...
During phases of transient connectivity, sensor nodes receive a substantial number of corrupt packet...
Sensor networks consist of small sensing devices that collaboratively fulfill a sensing task, such a...
We present empirical measurements of the packet delivery performance of the Telos and MicaZ sensor p...
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous...
Packet losses are an important class of adverse events in Wireless Sensor Networks (WSNs), they can ...
Packet losses, an important class of adverse events in wireless sensor networks, can be caused by ei...
Wireless sensor networks have been deployed outdoors ever since their inception. They have been used...
Packet losses in a wireless sensor network represent an indicator of possible attacks to the network...
Sensor nodes are resource-constrained and prone to hardware or software faults. The faulty sensors m...
Abstract—Security threat and routing holes in wireless scenario are more frequent than other network...
Abstract—Understanding the packet delivery performance of a wireless sensor network (WSN) is critica...
Hop-by-hop data aggregation is a very important technique used to reduce the communication overhead ...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
Wireless sensor networks are an emerging field where a large number of cheap sensors are dispersed o...
Several applications have been proposed for wireless sensor networks, including habitat monitoring, ...
During phases of transient connectivity, sensor nodes receive a substantial number of corrupt packet...
Sensor networks consist of small sensing devices that collaboratively fulfill a sensing task, such a...
We present empirical measurements of the packet delivery performance of the Telos and MicaZ sensor p...
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous...
Packet losses are an important class of adverse events in Wireless Sensor Networks (WSNs), they can ...
Packet losses, an important class of adverse events in wireless sensor networks, can be caused by ei...
Wireless sensor networks have been deployed outdoors ever since their inception. They have been used...
Packet losses in a wireless sensor network represent an indicator of possible attacks to the network...
Sensor nodes are resource-constrained and prone to hardware or software faults. The faulty sensors m...
Abstract—Security threat and routing holes in wireless scenario are more frequent than other network...
Abstract—Understanding the packet delivery performance of a wireless sensor network (WSN) is critica...
Hop-by-hop data aggregation is a very important technique used to reduce the communication overhead ...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
Wireless sensor networks are an emerging field where a large number of cheap sensors are dispersed o...
Several applications have been proposed for wireless sensor networks, including habitat monitoring, ...