This paper concerns sensor network key distribution schemes (KDS) based on symmetric-key techniques. We analyze the problem of active attacks against such schemes. By active attack...
Stefan Dziembowski, Alessandro Mei, Alessandro Pan...
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
We introduce a technique for using an untrusted device, such as a hand-held personal digital assistant or a laptop to perform real nancial transactions without a network. We utili...
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...