DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Documents Full Doc

Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes ABSTRACT: Compromised-node and denial-of-service are two key attacks in wireless sensor…

Documents A trigger identification service for defending reactive jammers in wsn.bak

1. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012793A Trigger Identification Service for Defending Reactive Jammers in WSNYing Xuan, Yilin Shen, Nam P. Nguyen,…