Sciweavers

60 search results - page 2 / 12
» Analyzing the energy consumption of security protocols
Sort
View
VTC
2007
IEEE
122views Communications» more  VTC 2007»
13 years 11 months ago
Energy Consumption of Always-On Applications in WCDMA Networks
— Always-on applications, such as push email and voice-over-IP, are characterized by the need to be constantly reachable for incoming communications. In the presence of stateful ...
Henry Haverinen, Jonne Siren, Pasi Eronen
CCS
2007
ACM
13 years 11 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
IPCCC
2005
IEEE
13 years 10 months ago
Source routing based pairwise key establishment protocol for sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. The establishment...
D. Huang, M. Mehta, D. Medhi
IPSN
2007
Springer
13 years 11 months ago
MiniSec: a secure sensor network communication architecture
Secure sensor network communication protocols need to provide three basic properties: data secrecy, authentication, and replay protection. Secure sensor network link layer protoco...
Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. ...
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
13 years 10 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...