Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by commun...
This paper presents a Java service platform and hardware design for a handheld healthcare system that enables remote health monitoring using CDMA public wireless networks. Special...
Kil-Ho Ahn, Jae-Wan Park, Dong Ryeol Shin, Ji-Tae ...
In this paper, we investigate and utilize the characteristic of the group movement of objects to achieve energy conservation in the inherently resource-constrained wireless object ...
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...