Sciweavers

236 search results - page 6 / 48
» Secure localization and authentication in ultra-wideband sen...
Sort
View
WINET
2010
137views more  WINET 2010»
13 years 2 months ago
The design and evaluation of interleaved authentication for filtering false reports in multipath routing WSNs
In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor net...
Youtao Zhang, Jun Yang 0002, Hai T. Vu, Yizhi Wu
COMCOM
2007
149views more  COMCOM 2007»
13 years 7 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
WINET
2010
179views more  WINET 2010»
13 years 6 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
IJSN
2010
148views more  IJSN 2010»
13 years 6 months ago
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...
Shih-I Huang, Shiuhpyng Shieh
INDOCRYPT
2009
Springer
14 years 2 months ago
Towards Secure and Practical MACs for Body Sensor Networks
Wireless sensor network (WSN) commonly requires lower level security for public information gathering, whilst body sensor network (BSN) must be secured with strong authenticity to...
Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zh...