Sciweavers

128 search results - page 14 / 26
» Path key establishment using multiple secured paths in wirel...
Sort
View
GLOBECOM
2006
IEEE
14 years 2 months ago
Key Distribution in Mobile Heterogeneous Sensor Networks
— Key predistribution is a popular technique for key distribution in sensor networks. The schemes available in current literature using this approach are for nodes with no or lim...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, Mimo...
USENIX
2008
13 years 11 months ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig
INFOCOM
2009
IEEE
14 years 3 months ago
Barrier Coverage of Line-Based Deployed Wireless Sensor Networks
— Barrier coverage of wireless sensor networks has been studied intensively in recent years under the assumption that sensors are deployed uniformly at random in a large area (Po...
Anwar Saipulla, Cédric Westphal, Benyuan Li...
SENSYS
2005
ACM
14 years 2 months ago
Sensor networks for medical care
Sensor networks have the potential to greatly impact many aspects of medical care. By outfitting patients with wireless, wearable vital sign sensors, collecting detailed real-tim...
Victor Shnayder, Bor-rong Chen, Konrad Lorincz, Th...
SASN
2005
ACM
14 years 2 months ago
Defending against path-based DoS attacks in wireless sensor networks
Denial of service (DoS) attacks can cause serious damage in resourceconstrained, wireless sensor networks (WSNs). This paper addresses an especially damaging form of DoS attack, c...
Jing Deng, Richard Han, Shivakant Mishra