Sciweavers

6122 search results - page 123 / 1225
» Securing network access in wireless sensor networks
Sort
View
IPSN
2010
Springer
15 years 11 months ago
Robust uncorrelated bit extraction methodologies for wireless sensors
This paper presents novel methodologies which allow robust secret key extraction from radio channel measurements which suffer from real-world non-reciprocities and a priori unkno...
Jessica Croft, Neal Patwari, Sneha Kumar Kasera
PERCOM
2008
ACM
16 years 3 months ago
Catch Me (If You Can): Data Survival in Unattended Sensor Networks
Roberto Di Pietro, Luigi V. Mancini, Claudio Sorie...
MOBISYS
2003
ACM
16 years 3 months ago
Design and Implementation of a Framework for Efficient and Programmable Sensor Networks
Athanassios Boulis, Chih-Chieh Han, Mani B. Srivas...
TMC
2010
179views more  TMC 2010»
15 years 2 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
GLOBECOM
2010
IEEE
15 years 2 months ago
Statistical Framework for Source Anonymity in Sensor Networks
In this work, we investigate the security of anonymous wireless sensor networks. To lay down the foundations of a formal framework, we propose a new model for analyzing and evalua...
Basel Alomair, Andrew Clark, Jorge Cuéllar,...