Sciweavers

2099 search results - page 179 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
15 years 3 months ago
Secure Connections in Bluetooth Scatternets
Bluetooth is a wireless networking technology specifically developed for Personal Area Networking and other short range applications. Bluetooth devices can be networked together ...
Karl E. Persson, D. Manivannan
CCS
2005
ACM
15 years 3 months ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...
MUE
2008
IEEE
218views Multimedia» more  MUE 2008»
15 years 4 months ago
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of centralized access point. Secure Efficient Ad hoc...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
DSD
2004
IEEE
136views Hardware» more  DSD 2004»
15 years 2 months ago
Architecture of Wireless Sensor Node using Novel Ultra-Wideband Modulation Scheme
Recently ultra-wideband (UWB) communications has emerged as an alternative to narrowband communications used in wireless sensor networks. One of UWB(s) most attractive feature for...
Matthew D'Souza, Adam Postula
SASN
2004
ACM
15 years 3 months ago
Source-location privacy in energy-constrained sensor network routing
As sensor-driven applications become increasingly integrated into our lives, issues related to sensor privacy will become increasingly important. Although many privacy-related iss...
Celal Ozturk, Yanyong Zhang, Wade Trappe