Sciweavers

634 search results - page 68 / 127
» Secure time synchronization service for sensor networks
Sort
View
SASN
2006
ACM
15 years 3 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
PERCOM
2007
ACM
15 years 9 months ago
SOS: Secure Overlay Sensornets
Overlay Networks (ONs) are logical networks built on top of a physical network with the aim of moving part of the routing complexity to the application layer. At the same time, sen...
Leonardo B. Oliveira, Antonio Alfredo Ferreira Lou...
INFOCOM
2006
IEEE
15 years 3 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
TMC
2008
83views more  TMC 2008»
14 years 9 months ago
Secure Location Verification with Hidden and Mobile Base Stations
In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach ...
Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagal...
PERCOM
2010
ACM
14 years 8 months ago
Web services on embedded systems - a performance study
Abstract—A platform-independent communication mechanism is essential for the seamless integration of embedded devices into the Web of Things. Web services provide for such commun...
Christin Groba, Siobhán Clarke