Sciweavers

2099 search results - page 290 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
ICNP
2007
IEEE
15 years 10 months ago
Source Address Validation: Architecture and Protocol Design
The current Internet addressing architecture does not verify the source address of a packet received and forwarded. This causes serious security and accounting problems. Based on t...
Jianping Wu, Gang Ren, Xing Li
136
Voted
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
141
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
A Node Identity Internetworking Architecture
— The Internet consists of independent networks that belong to different administrative domains and vary in scope from personal area networks, private home networks, corporate ne...
Bengt Ahlgren, Jari Arkko, Lars Eggert, Jarno Raja...
VTC
2010
IEEE
121views Communications» more  VTC 2010»
15 years 2 months ago
MYRPA: An Incentive System with Reduced Payment Receipts for Multi-hop Wireless Networks
Abstract— In this paper, we propose an incentive system to stimulate the nodes’ cooperation in multi-hop wireless networks. Reducing the number and the size of the payment rece...
Mohamed Elsalih Mahmoud, Xuemin Shen
121
Voted
IJSN
2008
90views more  IJSN 2008»
15 years 4 months ago
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
: In the paper, we propose an efficient two-factor localised authentication scheme for inter-domain handover and roaming in IEEE 802.11 based service-oriented wireless mesh network...
Xiaodong Lin, Xinhua Ling, Haojin Zhu, Pin-Han Ho,...