Sciweavers

1463 search results - page 165 / 293
» Securing Wireless Mesh Networks
Sort
View
EUC
2006
Springer
14 years 2 months ago
Energy Comparison of AES and SHA-1 for Ubiquitous Computing
Wireless sensor networks and Radio Frequency Identifiers are becoming mainstream applications of ubiquitous computing. They are slowly being integrated into our infrastructure and ...
Jens-Peter Kaps, Berk Sunar
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
14 years 5 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
MOBIQUITOUS
2007
IEEE
14 years 4 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel
EUROPKI
2007
Springer
14 years 4 months ago
Applicability of Public Key Infrastructures in Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSNâ€...
Rodrigo Roman, Cristina Alcaraz
ICCS
2007
Springer
14 years 4 months ago
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by commun...
Tran Thanh Dai, Choong Seon Hong