Sciweavers

261 search results - page 3 / 53
» Multi-user Broadcast Authentication in Wireless Sensor Netwo...
Sort
View
PIMRC
2008
IEEE
13 years 11 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
13 years 12 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 5 months ago
Comparison of different Broadcast Schemes for Multi-Hop Wireless Sensor Networks
In this paper, we present the performance of different broadcast schemes for multihop sensor networks based on mathematical modeling. In near future many applications will demand ...
S. Mehta, K. S. Kwak
WINET
2002
101views more  WINET 2002»
13 years 5 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...