Wei-Tong Wang

Learn More
As the prevalence of Wireless Sensor Networks (WSNs) grows in the military and civil domains, the need for network security has become a critical concern. In a Sybil attack, the WSN is subverted by a malicious node which forges a large number of fake identities in order to disrupt the network’s protocols. In attempting to protect WSNs against such an(More)
The use of wireless sensor networks to protect sensitive facilities or international borders has attracted more and more attention. In contrast to previous studies in which the barrier coverage problem was solved under the assumption of an omni-directional sensing model, the current study presents a scheme for constructing k-barrier coverage using randomly(More)
Previous research indicated that uniform deployment was not the most efficient way for saving energy in wireless sensor networks. The location nearer to a sink should have more sensors deployed. This paper describes a moving algorithm for achieving the non-uniform deployment (MAND). With MAND, mobile sensors can move to appropriate locations to prolong the(More)
Ad hoc networks have been extensively deployed in recent years. In such networks, obtaining a high efficiency is difficult to achieve due to mobility. Many routing approaches have been proposed to improve the performance of ad hoc networks, including table-driven and demand-driven routing protocols. Geographic routing provides a suitable solution for(More)
Previous fault-tolerant time synchronization protocols are vulnerable to the number of misbehaved nodes in a sensor network. With the increasing number of faulty sensor nodes, more erroneous data are exchanged, so it becomes more difficult to synchronize time accurately for all working nodes. This paper develops a fault diagnosis mechanism for time(More)
Mobile users are often involved in team activities and exhibit collaborative mobility in realistic ad hoc network application scenarios. Due to diverse group mobility patterns, the network may remain partitioned for extended durations. This paper describes an approach to reduce the communication disruptions by deploying forwarding nodes. The forwarding(More)
  • 1