Sciweavers

266 search results - page 20 / 54
» Evaluating the Impact of Limited Resource on the Performance...
Sort
View
WINET
2010
179views more  WINET 2010»
13 years 5 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
ENTCS
2007
95views more  ENTCS 2007»
13 years 7 months ago
Rijndael for Sensor Networks: Is Speed the Main Issue?
We present an implementation of Rijndael for wireless sensor networks running on Eyes sensor nodes. In previous works, Rijndael has not been considered a suitable encryption algor...
Andrea Vitaletti, Gianni Palombizio
SUTC
2010
IEEE
13 years 6 months ago
UbiMASS
—Ubiquitous systems build on the vision that great amounts of fixed and mobile microchips and sensors will be integrated in everyday objects. Developing services on basis of sen...
Faruk Bagci, Julian Wolf, Benjamin Satzger, Theo U...
MOBIHOC
2008
ACM
14 years 7 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
ESAS
2004
Springer
14 years 28 days ago
Secure Overlay for Service Centric Wireless Sensor Networks
Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. Those devices offer different services and use services provided b...
Hans-Joachim Hof, Erik-Oliver Blaß, Martina ...