Sciweavers

2099 search results - page 80 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
BROADNETS
2005
IEEE
14 years 1 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
MSN
2005
Springer
14 years 1 months ago
Using MDS Codes for the Key Establishment of Wireless Sensor Networks
Key pre-distribution techniques for security provision of Wireless Sensor Networks (WSNs) have attracted significant interests recently. In these schemes, a relatively small numbe...
Jing Deng, Yunghsiang S. Han
COMSIS
2006
100views more  COMSIS 2006»
13 years 8 months ago
Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Radomir Prodanovic, Dejan Simic
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
14 years 2 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao
AGENTS
2001
Springer
14 years 15 days ago
Distributed sensor network for real time tracking
ÁÒ Ø × Ô Ô Ö Û × Ö ÓÙÖ ×ÓÐÙØ ÓÒ ØÓ Ö Ð¹Ø Ñ ×¹ ØÖ ÙØ Ö ×ÓÙÖ ÐÐÓ Ø ÓÒ ÔÔÐ Ø ÓÒ ÒÚÓÐÚ Ò ×ØÖ ÙØ × ØÙ Ø ÓÒ ×× ××...
Bryan Horling, Régis Vincent, Roger Mailler...