• Article  

      Acoustic localization of antbirds in a Mexican rainforest using a wireless sensor network 

      Collier, T. C.; Kirschel, A. N. G.; Taylor, C. E. (2010)
      Acoustic localization is a promising method to passively observe vocal animal species, but remains difficult and time consuming to employ. To reduce the labor intensity and impact of deployment, an acoustic localization ...
    • Article  

      A biologically inspired networking model for wireless sensor networks 

      Charalambous, Charalambos D.; Cui, S. (2010)
      Wireless sensor networks have emerged in strategic applications such as target detection, localization, and tracking, where the large scale renders centralized control prohibitive. In addition, the finite batteries of the ...
    • Conference Object  

      Combating persistent adversaries in wireless sensor networks using directional antennas 

      Stavrou, Eliana; Pitsillides, Andreas (2011)
      Security is an important property in applications offering services in mission-critical areas, such as in healthcare, military, transportation, etc. Wireless sensor networks (WSN) support the mission of these applications ...
    • Article  

      Congestion control in wireless sensor networks based on bird flocking behavior 

      Antoniou, Pavlos Ch.; Pitsillides, Andreas; Blackwell, T.; Engelbrecht, A.; Michael, Loizos (2013)
      This paper proposes that the flocking behavior of birds can guide the design of a robust, scalable and self-adaptive congestion control protocol in the context of wireless sensor networks (WSNs). The proposed approach ...
    • Article  

      Congestion control in wireless sensor networks based on the bird flocking behavior 

      Antoniou, Pavlos Ch.; Pitsillides, Andreas; Engelbrecht, A.; Blackwell, T.; Michael, Loizos (2009)
      Recently, performance controlled wireless sensor networks have attracted significant interest with the emergence of mission-critical applications (e.g. health monitoring). Performance control can be carried out by robust ...
    • Conference Object  

      Data acquisition in sensor networks with large memories 

      Zeinalipour-Yazdi, Constantinos D.; Neema, S.; Kalogeraki, Vana; Gunopulos, Dimitrios; Najjar, W. (2005)
      Sensor Networks will soon become ubiquitous, making them essential tools for monitoring the activity and evolution of our surrounding environment. However such environments are expected to generate vast amounts of temporal ...
    • Article  

      Optimized query routing trees for wireless sensor networks 

      Andreou, Panayiotis G.; Zeinalipour-Yazdi, Constantinos D.; Pamboris, Andreas; Chrysanthis, Panos K.; Samaras, George S. (2011)
      In order to process continuous queries over Wireless Sensor Networks (WSNs), sensors are typically organized in a Query Routing Tree (denoted as T) that provides each sensor with a path over which query results can be ...
    • Conference Object  

      Recovering from the selective forwarding attack in WSNs - Enhancing the recovery benefits of blacklisting and rerouting using directional antennas 

      Stavrou, Eliana; Pitsillides, Andreas (Institute of Electrical and Electronics Engineers Inc., 2014)
      Wireless sensor networks (WSNs) face a number of security challenges that can compromise their operation. A typical security attack that can be launched by an adversary, in order to affect the network's communication, is ...
    • Conference Object  

      Security in future mobile sensor networks - Issues and challenges 

      Stavrou, E.; Pitsillides, A.; Hadjichristofi, G.; Hadjicostis, Christoforos N. (2010)
      Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
    • Conference Object  

      Security in future mobile sensor networks - Issues and challenges 

      Stavrou, Eliana; Pitsillides, Andreas; Hadjichristofi, George C.; Hadjicostis, Christoforos N. (2010)
      Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
    • Article  

      Stochastic differential equations for modeling, estimation and identification of mobile-to-mobile communication channels 

      Olama, M. M.; Djouadi, S. M.; Charalambous, Charalambos D. (2009)
      Mobile-to-mobile networks are characterized by node mobility that makes the propagation environment time varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuously, ...
    • Conference Object  

      WSN operability during persistent attack execution 

      Stavrou, Eliana; Pitsillides, Andreas (Institute of Electrical and Electronics Engineers Inc., 2016)
      Wireless Sensor Networks (WSNs) are utilized in a number of critical infrastructures, e.g. healthcare, disaster and relief. In sensitive environments, it is vital to maintain the operability of the network in an effort to ...