Sciweavers

1129 search results - page 84 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
ADHOC
2007
133views more  ADHOC 2007»
14 years 10 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
EWSN
2008
Springer
15 years 9 months ago
A Component Framework for Content-Based Publish/Subscribe in Sensor Networks
Component-based architectures are the traditional approach cile application specific optimization with reusable abstractions in sensor networks. However, they frequently overwhelm ...
Adam Wolisz, Andreas Köpke, Andreas Willig, J...
SCN
2008
Springer
131views Communications» more  SCN 2008»
14 years 10 months ago
CLL: A Cryptographic Link Layer for Local Area Networks
Abstract. Ethernet and IP form the basis of the vast majority of LAN installations. But these protocols do not provide comprehensive security mechanisms, and thus give way for a pl...
Yves Igor Jerschow, Christian Lochert, Björn ...
ICNP
2007
IEEE
15 years 4 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
WINET
2010
137views more  WINET 2010»
14 years 4 months ago
The design and evaluation of interleaved authentication for filtering false reports in multipath routing WSNs
In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor net...
Youtao Zhang, Jun Yang 0002, Hai T. Vu, Yizhi Wu