Sciweavers

1129 search results - page 56 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
CCS
2006
ACM
14 years 20 days ago
An efficient broadcast authentication scheme in wireless sensor networks
A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packet's validity. To provide authentication, some researchers utilize ...
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, ...
ICPADS
2006
IEEE
14 years 3 months ago
Optimal Movement-Assisted Sensor Deployment and Its Extensions in Wireless Sensor Networks
In wireless sensor networks (WSNs), a good sensor deployment method is vital to the quality of service (QoS) provided by WSNs. This QoS depends on the coverage of the monitoring a...
Jie Wu, Shuhui Yang
WS
2004
ACM
14 years 2 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
JNW
2006
186views more  JNW 2006»
13 years 9 months ago
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)
In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standard...
Muhammad Sher, Thomas Magedanz
SASN
2006
ACM
14 years 2 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...