The locations of base stations are critically important to the viability of wireless sensor networks. In this paper, we examine the location privacy problem from both the attack a...
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
—We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless se...
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...