Learn More
Multistate systems can model many practical systems in a wide range of real applications. A distinct characteristic of these systems is that the systems and their components may assume more than two levels of performance (or states), varying from perfect operation to complete failure. The nonbinary property of multistate systems and their components makes(More)
We consider the problem of reliability modeling and analysis of hierarchical clustered wireless sensor networks (WSN) in this paper. We propose reliability measures that integrate the conventional connectivity-based network reliability with the sensing coverage measure indicating the quality of service (QoS) of the WSN. And we propose a progressive approach(More)
In this paper we consider the problem of modeling and evaluating the infrastructure communication reliability (ICR) of wireless sensor networks (WSN). Our approach is progressive and based on reduced ordered binary decision diagrams (ROBDD). Due to the nature of the ROBDD and the reduction scheme used in the progressive process, the approach is(More)
Wireless sensor networks must be designed to be both secure and reliable, especially when they are used in national security and safety-critical applications. In this paper, we propose a new mechanism, called MVMP (multi-version multi-path), which integrates data segmentation, Forward Error Correction coding, multiple paths, and multiple versions of(More)
In wireless sensor networks (WSN), data packets being sent over wireless environments could get corrupted or compromised due to channel noises or malicious attacks. Using traditional full encryption to secure the transmitted data is costly and even not practical for WSN due to the inherent resource-constrained nature of sensor nodes. Selective encryption(More)
— In this paper, an integrated biometric-based security framework is proposed for wireless body area networks, which takes advantage of biometric features shared by body sensors deployed at different positions of a person's body. The data communications among these sensors are secured via the proposed authentication and selective encryption schemes that(More)