Sciweavers

12 search results - page 1 / 3
» Secure-TWS: Authenticating node to multi-user communication ...
Sort
View
IPSN
2009
Springer
13 years 11 months ago
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
Leonardo B. Oliveira, Aman Kansal, Bodhi Priyantha...
ISPA
2005
Springer
13 years 10 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
ADHOC
2007
109views more  ADHOC 2007»
13 years 5 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
14 years 5 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
JSAC
2006
127views more  JSAC 2006»
13 years 4 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang