Browsing by Subject "Mission critical applications"
Now showing items 1-6 of 6
-
Conference Object
Applying swarm intelligence to a novel congestion control approach for wireless sensor networks
(2011)Recently, sensor networks have attracted significant research interest. However, most studies have mainly focused on protocols for applications in which network performance assurances are not considered essential. With the ...
-
Article
Congestion control in wireless sensor networks based on the bird flocking behavior
(2009)Recently, performance controlled wireless sensor networks have attracted significant interest with the emergence of mission-critical applications (e.g. health monitoring). Performance control can be carried out by robust ...
-
Conference Object
Recovering from the selective forwarding attack in WSNs - Enhancing the recovery benefits of blacklisting and rerouting using directional antennas
(Institute of Electrical and Electronics Engineers Inc., 2014)Wireless sensor networks (WSNs) face a number of security challenges that can compromise their operation. A typical security attack that can be launched by an adversary, in order to affect the network's communication, is ...
-
Conference Object
Security in future mobile sensor networks - Issues and challenges
(2010)Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
-
Conference Object
Security in future mobile sensor networks - Issues and challenges
(2010)Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
-
Conference Object
Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks
(2011)Wireless sensor networks (WSNs) have become a hot research topic in recent years and are considered to be one of the building blocks of pervasive computing. Many diverse, mission-critical applications are deployed, including ...