Sciweavers

500 search results - page 44 / 100
» Securing Topology Maintenance Protocols for Sensor Networks
Sort
View
TIFS
2008
208views more  TIFS 2008»
13 years 10 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
IAJIT
2010
97views more  IAJIT 2010»
13 years 9 months ago
Prolonging Network Lifetime and Data Accumulation in Heterogeneous Sensor Networks
: Research on Wireless Sensor Networks has often assumed homogeneous nodes. In reality, homogeneous nodes have different capabilities like different levels of initial energy and dr...
Dilip Kumar, Ram Patel, Trilok C. Aseri
ICNP
2006
IEEE
14 years 4 months ago
Key Grids: A Protocol Family for Assigning Symmetric Keys
We describe a family of ÐÓ Ò protocols for assigning symmetric keys to Ò processes in a network so that each process can use its assigned keys to communicate securely with eve...
Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gou...
INFOCOM
2010
IEEE
13 years 7 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
APNOMS
2007
Springer
14 years 4 months ago
A Routing Scheme for Supporting Network Mobility of Sensor Network Based on 6LoWPAN
Network Mobility (NEMO) and IPv6 over Low power Wireless PAN (6LoWPAN) protocols are the two significant important technologies in the current networking research areas and seem to...
Jin Ho Kim, Choong Seon Hong, Koji Okamura