Sciweavers

2099 search results - page 188 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
CACM
2008
84views more  CACM 2008»
14 years 10 months ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...
IJNSEC
2010
143views more  IJNSEC 2010»
14 years 5 months ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar
EUROMICRO
2004
IEEE
15 years 2 months ago
Securing Ad hoc Routing Protocols
Ad hoc networks are subject of many recent research efforts. Especially in mobile scenarios, self-organizing networks are of high interest. While the routing aspects of mobile ad ...
Frank Kargl, Stefan Schlott, Andreas Klenk, Alfred...
IWCMC
2006
ACM
15 years 4 months ago
Multipath fading in wireless sensor networks: measurements and interpretation
Multipath fading heavily contributes to the unreliability of wireless links, causing fairly large deviations from link quality predictions based on path loss models; its impact on...
Daniele Puccinelli, Martin Haenggi
IJNSEC
2008
175views more  IJNSEC 2008»
14 years 10 months ago
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
A location-aware scheme uses a priori knowledge of the deployed sensor nodes of some target field in a sensor network. Such location-aware schemes improve substantially higher net...
Ashok Kumar Das