There are many applications of large scale sensor networks in which both the stimulus and the data collection stations are mobile (i.e. animal tracking, battlefield chasing). TTDD ...
Hong Zhou, Lu Jin, Zhongwei Zhang, Hesham H. Ali, ...
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
—Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications oft...
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
We present SQUIRREL, a stream-oriented programming framework for storage-centric sensor networks. The storagecentric paradigm—where storage operations prevail over communication...