Sciweavers

71 search results - page 11 / 15
» Exploring Message Authentication in Sensor Networks
Sort
View
COMCOM
2006
194views more  COMCOM 2006»
15 years 1 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
ESAS
2004
Springer
15 years 6 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
USS
2010
14 years 11 months ago
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...
GISCIENCE
2010
Springer
231views GIS» more  GISCIENCE 2010»
15 years 2 months ago
Efficient Data Collection and Event Boundary Detection in Wireless Sensor Networks Using Tiny Models
Using wireless geosensor networks (WGSN), sensor nodes often monitor a phenomenon that is both continuous in time and space. However, sensor nodes take discrete samples, and an ana...
Kraig King, Silvia Nittel
ATAL
2004
Springer
15 years 6 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...