Sciweavers

561 search results - page 13 / 113
» A Secure Gateway Solution for Wireless Ad-Hoc Networks
Sort
View
87
Voted
PERCOM
2007
ACM
15 years 9 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
CORR
2010
Springer
83views Education» more  CORR 2010»
14 years 9 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller
WIOPT
2006
IEEE
15 years 3 months ago
A structural property of solutions to path optimization problems in random access networks
Abstract— The inherent nature of the physical setup and transmission mechanism in wireless ad hoc networks with random channel access, results in correlation between the link met...
Arzad Alam Kherani, Dinesh Kumar 0002, Eitan Altma...
IJSN
2007
120views more  IJSN 2007»
14 years 9 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
97
Voted
ICDCSW
2005
IEEE
15 years 3 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt