Sciweavers

2099 search results - page 175 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
MOBIHOC
2005
ACM
15 years 10 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
93
Voted
PERCOM
2007
ACM
15 years 10 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
PEWASUN
2005
ACM
15 years 3 months ago
Efficient deafness avoidance in wireless ad hoc and sensor networks with directional antennas
Using directional antennas in wireless ad hoc networks can significantly improve network performance. However, the deafness problem greatly limits the network performance. This pa...
Yihu Li, Ahmed M. Safwat
IJNSEC
2007
110views more  IJNSEC 2007»
14 years 10 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
MSWIM
2005
ACM
15 years 3 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...