Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
— A method to fabricate circuits on the cloth, planar fashionable circuit board (P-FCB), is proposed. And its applications such as fabric passive elements, user I/O interface, an...
Hyejung Kim, Yongsang Kim, Binhee Kim, Hoi-Jun Yoo
Secure routing in wireless sensor networks (WSN) is a crucial problem that has drawn the attention of researchers. The motivation for tackling this problem comes directly from the...
We propose and formally characterize a new problem named the dynamic context coverage problem in capabilityconstrained mobile sensor network environments. The goal is to move and ...