Sciweavers

6122 search results - page 132 / 1225
» Securing network access in wireless sensor networks
Sort
View
ESAS
2007
Springer
15 years 8 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
INFOCOM
2005
IEEE
15 years 10 months ago
Random-access scheduling with service differentiation in wireless networks
— Recent years have seen tremendous growth in the deployment of Wireless Local Area Networks (WLANs). An important design issue in such networks is that of distributed scheduling...
Piyush Gupta, Yogesh Sankarasubramaniam, Alexander...
WWIC
2004
Springer
138views Communications» more  WWIC 2004»
15 years 9 months ago
Connecting Wireless Sensornets with TCP/IP Networks
Wireless sensor networks are based on the collaborative efforts of many small wireless sensor nodes, which collectively are able to form networks through which sensor information c...
Adam Dunkels, Juan Alonso, Thiemo Voigt, Hartmut R...
QSHINE
2009
IEEE
15 years 11 months ago
Cooperative Training in Wireless Sensor and Actor Networks
Exploiting features of high density wireless sensor networks represents a challenging issue. In this work, the training of a sensor network which consists of anonymous and asynchro...
Francesco Betti Sorbelli, Roberto Ciotti, Alfredo ...
AUSFORENSICS
2003
15 years 5 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver