Sciweavers

688 search results - page 64 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
SSS
2007
Springer
102views Control Systems» more  SSS 2007»
14 years 2 months ago
Secure and Self-stabilizing Clock Synchronization in Sensor Networks
Abstract. In sensor networks, correct clocks have arbitrary starting offsets and nondeterministic fluctuating skews. We consider an adversary that aims at tampering with the cloc...
Jaap-Henk Hoepman, Andreas Larsson, Elad Michael S...
CCS
2007
ACM
14 years 2 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
TMC
2012
11 years 10 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
TMC
2010
136views more  TMC 2010»
13 years 6 months ago
Relay Node Deployment Strategies in Heterogeneous Wireless Sensor Networks
– While a lot of existing research attempts to extend the lifetime of a wireless sensor network (WSN) by designing energy efficient networking protocols, the impact of random dev...
Kenan Xu, Hossam S. Hassanein, Glen Takahara, Quan...
IPCCC
2007
IEEE
14 years 2 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong