Sciweavers

431 search results - page 1 / 87
» On application of Host Identity Protocol in wireless sensor ...
Sort
View
MASS
2010
156views Communications» more  MASS 2010»
13 years 2 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
13 years 11 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
13 years 6 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
COMCOM
2008
126views more  COMCOM 2008»
13 years 4 months ago
Hi3: An efficient and secure networking architecture for mobile hosts
The Host Identity Indirection Infrastructure (Hi3) is a networking architecture for mobile hosts, derived from the Internet Indirection Infrastructure (i3) and the Host Identity P...
Andrei Gurtov, Dmitry Korzun, Andrey Lukyanenko, P...
JNW
2008
126views more  JNW 2008»
13 years 4 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe