Download now Free registration required
This paper proposes an analytical method for determining ad-hoc redundant coverage area in a wireless sensor network. This method can be alternatively used in order to determine a man-in-the-middle attack. Wireless networks have come to be one of the most common facilities of technological society and the people live in the present days. More than this, the concept of communicating by not wired methods, has provided a large spectrum of applications and new opportunities for corporations. Military applications, search and rescue operations, disaster management, environmental monitoring, collaborative computing are just a few examples in which this technology is largely applied.
- Format: PDF
- Size: 519.1 KB