Sciweavers

75 search results - page 9 / 15
» Lightweight and Compromise-Resilient Message Authentication ...
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
14 years 9 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
INFOCOM
2010
IEEE
14 years 8 months ago
DPLC: Dynamic Packet Length Control in Wireless Sensor Networks
—Previous packet length optimizations for sensor networks often employ a fixed optimal length scheme, while in this study we present DPLC, a Dynamic Packet Length Control scheme...
Wei Dong, Xue Liu, Chun Chen, Yuan He, Gong Chen, ...
PERCOM
2007
ACM
15 years 9 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
COMCOM
2006
126views more  COMCOM 2006»
14 years 9 months ago
Distributed and energy-efficient target localization and tracking in wireless sensor networks
In this paper, we propose and evaluate a distributed, energy-efficient, light-weight framework for target localization and tracking in wireless sensor networks. Since radio commun...
Jeongkeun Lee, Kideok Cho, Seungjae Lee, Taekyoung...
WISEC
2009
ACM
15 years 4 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...