Sciweavers

1463 search results - page 159 / 293
» Securing Wireless Mesh Networks
Sort
View
ESORICS
2011
Springer
12 years 10 months ago
Investigation of Signal and Message Manipulations on the Wireless Channel
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless ne...
Christina Pöpper, Nils Ole Tippenhauer, Boris...
ICOIN
2004
Springer
14 years 3 months ago
On Reducing Paging Cost in IP-Based Wireless/Mobile Networks
For more scalable mobile services, it is important to reduce the signaling cost for location management. In this paper, we propose a cost effective IP paging scheme utilizing expl...
Kyoungae Kim, Sangheon Pack, Yanghee Choi
JNW
2006
174views more  JNW 2006»
13 years 10 months ago
802.11i Encryption Key Distribution Using Quantum Cryptography
Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant ...
Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange G...
WS
2006
ACM
14 years 4 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
EURONGI
2008
Springer
14 years 5 days ago
Secure and Efficient Data Collection in Sensor Networks
Sensor networks are a very specific type of wireless networks where both security and performance issues need to be solved efficiently in order to avoid manipulations of the sensed...
Cristina Cano, Manel Guerrero, Boris Bellalta