Learn More
— Existing routing and broadcasting protocols for ad hoc networks assume an ideal physical layer model. We apply the log normal shadow fading model to represent a realistic physical layer and use the probability p(x) for receiving a packet successfully as a function of distance x between two nodes. We define the transmission radius R as the distance at(More)
FID (radio frequency identification) is a means of storing and retrieving data through electromagnetic transmission using a radio frequency (RF)-compatible integrated circuit. Today, RFID is applied widely in supply-chain tracking, retail stock management, parking access control, library book tracking, marathon races, airline luggage tracking, electronic(More)
The designers of network layer protocols for ad hoc and sensor networks assume the unit disk graph (UDG) communication model, where two nodes communicate if and only if they are within distance R, where R is the transmission radius, equal for all nodes. Almost all articles even use R as the independent variable in their simulations. While the protocols at(More)
—Recently proposed beaconless georouting algorithms are fully reactive, with nodes forwarding packets without prior knowledge of their neighbors. However, existing approaches for recovery from local minima can either not guarantee delivery or they require the exchange of complete neighborhood information. We describe two general methods that enable(More)
Beaconless georouting algorithms are fully reactive and work without prior knowledge of their neighbors. However, existing approaches can either not guarantee delivery or they require the exchange of complete neighborhood information. We describe two general methods for completely reactive face routing with guaranteed delivery. The Beaconless Forwarder(More)
—We propose a new decentralized access control scheme for secure data storage in clouds, that supports anonymous authenti-cation. In the proposed scheme, the cloud verifies the authenticity of the ser without knowing the user's identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt(More)
A wireless sensor network (WSN) is a large-scale ad hoc multi-hop network deployed (usually, at random) in a region of interest for surveillance purpose. One of its fundamental tasks is to gather sensor readings from the sensory field at data sinks. Research has shown that sensors near a sink deplete their battery power faster than those far apart due to(More)
—Existing solutions to carrier-based sensor placement by a single robot, in a bounded unknown region of interest (ROI), do not guarantee full area coverage and/or do not terminate. We propose a novel localized algorithm, named Back-Tracking Deployment (BTD). To construct a full coverage solution over the ROI, mobile robots (carriers) carry static sensors as(More)