Sciweavers

346 search results - page 20 / 70
» An Efficient Scheme for User Authentication in Wireless Sens...
Sort
View
SUTC
2006
IEEE
14 years 3 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ICOIN
2007
Springer
14 years 3 months ago
An Efficient Authentication Procedure for Fast Handoff in Mobile IPv6 Networks
 Mobile IP (MIP) has been paid a lot of attention as a good candidate  to provide such global mobility among heterogeneous networks.  And, IPv6  incorporat...
Jun-Won Lee, Sang-Won Min, Byung K. Choi
COMCOM
2007
149views more  COMCOM 2007»
13 years 8 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
ICPADS
2007
IEEE
14 years 3 months ago
Optimization on distributed user management in Wireless Sensor Networks
In this paper, we address one of the Wireless Sensor Network (WSN) management problems – optimization on the execution of multiple commands. The objective of the paper is to pro...
MingJian Tang, Jinli Cao
GLOBECOM
2007
IEEE
14 years 3 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe