Now showing items 1-6 of 6
On the IEEE 802.15.4 MAC layer attacks: GTS attack
In the last several years IEEE 802.15.4  has been accepted as a major MAC layer protocol for wireless sensor networks (WSNs) and has attracted the interest of the research community involved in security issues as the ...
Adaptive bit partitioning strategy for cell-edge users in multi-antenna multicell networks
In this paper, we improve the performance of cell-edge users by applying adaptive bit partitioning for intercell interference cancelation in cooperative downlink multicell systems. The strategy for partitioning quantization ...
A distributed wakening based target tracking protocol for wireless sensor networks
We propose a two layer protocol for tracking fast targets in sensor networks. At the lower layer, the Distributed Spanning Tree Algorithm (DSTA)  partitions the network into clusters with controllable diameter and ...
Distributed algorithms to form cluster based spanning trees in wireless sensor networks
We propose two algorithms to form spanning trees in sensor networks. The first algorithm forms hierarchical clusters of spanning trees with a given root, the sink. All of the nodes in the sensor network are then classified ...
Time synchronization algorithms based on Timing-sync Protocol in Wireless Sensor Networks
Wireless Sensor Networks(WSN) are large scale networks of sensors running on wireless environment. For an application running on a WSN, gathered data by the sensors are time critical in most of the cases. However, almost ...
Performance evaluation of cluster-based target tracking protocols for wireless sensor networks
Target tracking is an important application type for wireless sensor networks (WSN). Recently, various approaches [1-11] are proposed to maintain the accurate tracking of the targets as well as low energy consumption. ...