Sciweavers

346 search results - page 26 / 70
» An Efficient Scheme for User Authentication in Wireless Sens...
Sort
View
CONEXT
2008
ACM
13 years 11 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
IJAHUC
2006
129views more  IJAHUC 2006»
13 years 9 months ago
Optimal distance geographic routing for energy efficient wireless sensor networks
: Wireless sensor networks require energy efficient routing protocols owing to limited resource on the sensor node. In this paper, we develop optimal distance geographic routing (O...
Xin-Ming Huang, Jing Ma
IJNSEC
2008
140views more  IJNSEC 2008»
13 years 9 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
ACNS
2008
Springer
96views Cryptology» more  ACNS 2008»
13 years 11 months ago
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
Abstract. "Pairing" is referred to as the operation of achieving authenticated key agreement between two human-operated devices over a short- or medium-range wireless com...
Ramnath Prasad, Nitesh Saxena
TPDS
2008
120views more  TPDS 2008»
13 years 9 months ago
A New Storage Scheme for Approximate Location Queries in Object-Tracking Sensor Networks
Energy efficiency is one of the most critical issues in the design of wireless sensor networks. Observing that many sensor applications for object tracking can tolerate a certain d...
Jianliang Xu, Xueyan Tang, Wang-Chien Lee