Sciweavers

1129 search results - page 124 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
IJNSEC
2006
134views more  IJNSEC 2006»
14 years 10 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
INFOCOM
2010
IEEE
14 years 8 months ago
DPLC: Dynamic Packet Length Control in Wireless Sensor Networks
—Previous packet length optimizations for sensor networks often employ a fixed optimal length scheme, while in this study we present DPLC, a Dynamic Packet Length Control scheme...
Wei Dong, Xue Liu, Chun Chen, Yuan He, Gong Chen, ...
WISEC
2010
ACM
15 years 2 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
EWSN
2006
Springer
15 years 9 months ago
On the Scalability of Routing Integrated Time Synchronization
Time synchronization is a crucial component of a large class of sensor network applications, traditionally implemented as a standalone middleware service that provides a virtual gl...
János Sallai, Branislav Kusy, Ákos L...
ICDE
2008
IEEE
134views Database» more  ICDE 2008»
15 years 4 months ago
Managing primary context through web services
— The emergence of wireless sensor networks (WSN) and RFID technology are starting to make the ubiquitous computing vision a reality, as they provide the means to obtain informat...
Edgardo Avilés-López, J. Antonio Gar...