Sciweavers

1463 search results - page 124 / 293
» Securing Wireless Mesh Networks
Sort
View
IFIP
2010
Springer
13 years 4 months ago
A Calculus for the Analysis of Wireless Network Security Protocols
We propose a timed broadcasting calculus for wireless systems. The operational semantics of our calculus is given both in terms of a Reduction Semantics and in terms of a Labelled ...
Francesco Ballardin, Massimo Merro
SECON
2007
IEEE
14 years 3 months ago
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks
Abstract—In this work we identify vulnerabilities of ondemand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mech...
Reza Curtmola, Cristina Nita-Rotaru
CCS
2006
ACM
14 years 1 months ago
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Accurate and synchronized time is crucial in many sensor network applications due to the need for consistent distributed sensing and coordination. In hostile environments where an...
Kun Sun, Peng Ning, Cliff Wang
PERCOM
2010
ACM
13 years 7 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 3 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis