Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Many approaches exist today that address the issues that arise when a mobile node changes its point(s) of attachment to the Internet. Mobile IP takes care of host mobility at the ...
Arjan J. H. Peddemors, Hans Zandbelt, Mortaza S. B...
We describe a novel method for node localization in a sensor network where there are a fraction of reference nodes with known locations. For application-specific sensor networks, ...
In recent years, the standards of OGC’s Sensor Web Enablement (SWE) initiative have been applied in a multitude of projects to encapsulate heterogeneous geosensors for web-based...
Arne Broering, Theodor Foerster, Simon Jirka, Cars...
Abstract—Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different technologies and prov...
Vicky Sharma, Koushik Kar, K. K. Ramakrishnan, Shi...