Sciweavers

1692 search results - page 105 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
CCS
2009
ACM
15 years 3 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
MOBILIGHT
2010
14 years 6 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
CORR
2007
Springer
57views Education» more  CORR 2007»
14 years 12 months ago
Smartening the Environment using Wireless Sensor Networks in a Developing Country
 The miniaturization process of various sensing devices has become a reality by enormous research and advancements accomplished in Micro Electro-Mechanical Systems (MEMS) and Ve...
Al-Sakib Khan Pathan, Choong Seon Hong, Hyung-Woo ...
CANS
2008
Springer
103views Cryptology» more  CANS 2008»
15 years 1 months ago
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Abstract. Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is the...
David Galindo, Rodrigo Roman, Javier Lopez
GLOBECOM
2007
IEEE
15 years 6 months ago
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
— In Wireless Sensor Networks (WSNs), symmetric key schemes may be used to provide security. Recently, a class of random key pre-distribution techniques have been proposed and in...
Jing Deng, Yunghsiang S. Han