Sciweavers

1129 search results - page 34 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
IJNSEC
2008
110views more  IJNSEC 2008»
13 years 9 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis
IEEEARES
2007
IEEE
14 years 3 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...
COMCOM
2006
111views more  COMCOM 2006»
13 years 9 months ago
SCON: Secure management of continuity in sensor networks
Due to limited energy capacity of batteries, the function lifetime of sensor networks in general is longer than the operational lifetime of single nodes. Therefore, to keep the ne...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri
ESAS
2006
Springer
14 years 16 days ago
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines...
Frederik Armknecht, Joao Girão, Marc Stoeck...
PERCOM
2005
ACM
14 years 8 months ago
Energy Efficient Differentiable Coverage Service Protocols for Wireless Sensor Networks
This paper considers the problem of maintaining the coverage degree of a wireless sensor network at an application specific level while keeping the sensing units of only a subset o...
Hasan Çam, Hidayet Ozgur Sanli