Sciweavers

1129 search results - page 23 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
APNOMS
2006
Springer
14 years 18 days ago
A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks
Abstract. This paper proposes an efficient resource-optimal key predistribution scheme for providing improved security in wireless sensor networks. We exploit the advantages of two...
Tran Thanh Dai, Al-Sakib Khan Pathan, Choong Seon ...
ACMSE
2004
ACM
14 years 2 months ago
Implementing the TEA algorithm on sensors
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...
NGC
2000
Springer
14 years 12 days ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
MAIPAN - Middleware for Application Interconnection in Personal Area Networks
This paper proposes the Middleware for Application Interconnection in Personal Area Networks (MAIPAN), a middleware that provides a uniform computing environment for creating dyna...
Miklós Aurél Rónai, Kristof F...
ICPPW
2009
IEEE
14 years 3 months ago
SenSORCER: A Framework for Managing Sensor-Federated Networks
—Despite many technology advances, the limited computing power of sensors encumber them from taking part in service-oriented architectures. In recent years, the sensornetworking ...
Sujit Bhosale, Michael W. Sobolewski