Sciweavers

312 search results - page 26 / 63
» Location-aware key management scheme for wireless sensor net...
Sort
View
TIFS
2008
208views more  TIFS 2008»
13 years 7 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
CORR
2008
Springer
90views Education» more  CORR 2008»
13 years 8 months ago
A computationally-efficient construction for the matrix-based key distribution in sensor network
Key pre-distribution in wireless sensor network is aimed at delivering keys to sensor networks at the low expense of computation, communication, and memory while providing a high d...
Abedelaziz Mohaisen
TMM
2010
410views Management» more  TMM 2010»
13 years 2 months ago
On Energy Efficient Encryption for Video Streaming in Wireless Sensor Networks
Abstract--Selective encryption for video streaming was proposed for efficient multimedia content protection. However, the issues on joint optimization of video quality, content pro...
Wei Wang, Michael Hempel, Dongming Peng, Honggang ...
GLOBECOM
2007
IEEE
14 years 2 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
IEEEARES
2007
IEEE
14 years 2 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...