We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Underwater wireless sensor networks consist of a certain number of sensors and vehicles that interact to collect data and perform collaborative tasks. Designing energy-efficient r...
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...