Learn More
—Smartphones are envisioned to provide promising applications and services. At the same time, smartphones are also increasingly becoming the target of malware. Many emerging malware can utilize the proximity of devices to propagate in a distributed manner, thus remaining unobserved and making detections substantially more challenging. Different from(More)
In this paper, we consider an adaptive energy efficient sensor scheduling mechanism. We consider a wireless sensor network where the sink sends queries form time to time, and sensors are equipped with one or more sensing components. Our goal is to design an adaptive sensor scheduling mechanism to choose sets of active sensors to work alternatively such that(More)
Sensors are used to monitor and control the physical environment. In mobile sensor networks, nodes can self-propel via springs, wheels, or they can be attached to transporters, such as vehicles. Sensors have limited energy supply and the sensor network is expected to be functional for a long time, so optimizing the energy consumption to prolong the network(More)
Sensor deployment in mobile sensor networks has received significant attention in recent years. Goals during sensor deployment include improving coverage, achieving load balance, and prolonging the network lifetime. To improve the initial deployment, one possible method is to use mobile sensors, thus allowing sensors to relocate. In this paper, we present a(More)
Good sensor deployment is vital for wireless sensor networks (WSNs). To improve the initial deployment and to prolong network lifetime, one approach is to relocate sensors in different densities which vary with the distance to the sink. Since sensors located closer to the sink are involved in more data forwarding, sensors in this region should have a higher(More)
In mobile ad hoc networks, nodes have the inherent ability to move. Aside from conducting attacks to maximize their utility and cooperating with regular nodes to deceive them, malicious nodes get better payoffs with the ability to move. In this paper, we propose a game theoretic framework to analyze the strategy profiles for regular and malicious nodes. We(More)
Wireless sensor networks are deployed to monitor and control the physical environment. Sensors can be equipped with one or more sensing components , such as temperature, light, humidity, etc. An atomic event can be detected using one sensing component. A composite event is the combination of several atomic events. We consider a wireless sensor network(More)
A wireless sensor network can detect single (or atomic) events or composite events. Since sensors are battery powered and in general, it is hard to recharge them, energy management is always an important issue. In this paper, we study the SCED problem; given a wireless sensor network deployed for watching a composite event x 1 , x 2 ,. .. , x M , design a(More)
—Delay tolerant networks (DTNs) are envisioned to provide promising applications and services. One critical issue in DTNs is efficiently forwarding the messages within the delay requirements while avoiding the cost associated with blind flooding. To guide the forwarding process, nodes can evaluate their relationships with each other, in terms of " closeness(More)
In this paper, we propose a routing strategy for heterogeneous wireless sensor networks, which supports both periodic and event-based reporting applications. The energy-efficient network model in this paper consists of static sensor nodes, mobile and static supernodes. We propose an energy-efficient routing protocol that can satisfy the delay requirements(More)