Sciweavers

712 search results - page 44 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 4 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
ICN
2005
Springer
15 years 3 months ago
Scalable Group Key Management with Partially Trusted Controllers
Abstract. Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed ...
Himanshu Khurana, Rafael Bonilla, Adam J. Slagell,...
BROADNETS
2007
IEEE
15 years 4 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang
COMCOM
2004
177views more  COMCOM 2004»
14 years 9 months ago
Analysis of SIP-based mobility management in 4G wireless networks
Providing seamless mobility support is one of the most challenging problems towards the system integration of fourth generation (4G) wireless networks. Because of the transparency...
Nilanjan Banerjee, Wei Wu, Kalyan Basu, Sajal K. D...
LCN
2003
IEEE
15 years 3 months ago
A New Scheme for IP-based Internet-Mobility
In this contribution we present a new type of mobility management for IP-based networks that, contrary to conventional approaches, does not focus on the network layer, but on the ...
Thomas Dreibholz, Andreas Jungmaier, Michael T&uum...