Sciweavers

2099 search results - page 99 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
JCM
2007
191views more  JCM 2007»
15 years 5 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
TDSC
2010
102views more  TDSC 2010»
15 years 3 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia
SENSYS
2004
ACM
15 years 10 months ago
Power - time optimal algorithm for computing FFT over sensor networks
bstract: Power - Time Optimal Algorithm for Computing FFT over Sensor Networks Categories and Subject Descriptors C.2.1 [Network Architecture and Design] Wireless Communication, Di...
Turkmen Canli, Mark Terwilliger, Ajay K. Gupta, As...
161
Voted
COMPSAC
2003
IEEE
15 years 10 months ago
Facilitating Secure Ad hoc Service Discovery in Public Environments
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network cha...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
ICSE
2009
IEEE-ACM
15 years 3 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan