Sciweavers

249 search results - page 33 / 50
» Security Issues in Wireless Mesh Networks
Sort
View
ADHOC
2008
132views more  ADHOC 2008»
14 years 12 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
NAS
2010
IEEE
14 years 10 months ago
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, et...
Junfeng Wu, Honglong Chen, Wei Lou, Zhibo Wang, Zh...
INFOCOM
2011
IEEE
14 years 3 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
MASS
2010
181views Communications» more  MASS 2010»
14 years 9 months ago
Perfectly anonymous data aggregation in wireless sensor networks
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
Levente Buttyán, Tamás Holczer
PERCOM
2005
ACM
15 years 11 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin