Sciweavers

318 search results - page 29 / 64
» A survey of key management schemes in wireless sensor networ...
Sort
View
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
14 years 3 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
CN
2006
127views more  CN 2006»
13 years 8 months ago
A survey on communication networks for electric system automation
In today' s competitive electric utility marketplace, real-time information becomes the key factor for reliable delivery of power to the end-users, profitability of the electr...
Vehbi C. Gungor, Frank C. Lambert
SMC
2010
IEEE
228views Control Systems» more  SMC 2010»
13 years 7 months ago
A safe communication scheme for an intelligent Wireless Networked Control System Coordination Agent
Abstract— Wireless networked control systems have begun to gain acceptance during the last decade, largely due to the increased flexibility and lower costs they promise to provi...
James H. Taylor, Hazem M. S. Ibrahim, Jeff Slipp, ...
ADHOCNOW
2006
Springer
14 years 2 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
WOWMOM
2006
ACM
150views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
Abstract— A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryp...
Murat Demirbas, Youngwhan Song