Sciweavers

1482 search results - page 213 / 297
» Wireless LAN Security
Sort
View
MASS
2010
181views Communications» more  MASS 2010»
14 years 11 months ago
Perfectly anonymous data aggregation in wireless sensor networks
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
Levente Buttyán, Tamás Holczer
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
15 years 8 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
15 years 1 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
ICUMT
2009
14 years 11 months ago
Extending middleware frameworks for Wireless Sensor Networks
We define sensor middleware as the binding code mainly running between the sensor OS and applications g programming abstractions to bridge the gap between application developers an...
Syed Rehan Afzal, Christophe Huygens, Wouter Joose...
145
Voted
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
14 years 8 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran