Sanitary Motes and Beams
نویسندگان
چکیده
منابع مشابه
Of malicious motes and suspicious sensors
How efficiently can a malicious device disrupt a single-hop wireless network? Imagine two honest players attempting to exchange information in the presence of a malicious adversary that can disrupt communication by jamming or overwriting messages. Assume the adversary has a broadcast budget of β—unknown to the honest players. We show that communication can be delayed for 2β + Θ(lg |V |) rounds,...
متن کاملWatchdog Designs for TinyOS Motes
We investigate a way to increase the reliability of distributed wireless networks by introducing two watchdog designs on the Mica mote. These watchdogs detect errors through monitoring aspects of the system and then take steps so that the mote recovers from these errors. The first design is a coprocessor watchdog that monitors the functionality of the main processor through heartbeat signals. T...
متن کاملMICA: The Commercialization of Microsensor Motes
New technology is changing the nature of sensors and the way they interface with data acquisition and control systems. Researchers at U.C. Berkeley have developed an open-source hardware and software platform that combines sensing, communications, and computing into a complete architecture. The first commercial generation of this platform was dubbed the Rene Mote, and several thousand of these ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific American
سال: 1893
ISSN: 0036-8733
DOI: 10.1038/scientificamerican12021893-14948supp