Sciweavers

51 search results - page 4 / 11
» Practical Broadcast Authentication in Sensor Networks
Sort
View
SENSYS
2003
ACM
13 years 11 months ago
Practical lazy scheduling in sensor networks
Experience has shown that the power consumption of sensors and other wireless computational devices is often dominated by their communication patterns. We present a practical real...
Ramana Rao Kompella, Alex C. Snoeren
WINET
2010
179views more  WINET 2010»
13 years 4 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
PIMRC
2008
IEEE
14 years 4 days ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
14 years 11 days ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß
WISEC
2009
ACM
14 years 17 days ago
Jamming for good: a fresh approach to authentic communication in WSNs
While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast mediu...
Ivan Martinovic, Paul Pichota, Jens B. Schmitt