Sciweavers

6122 search results - page 13 / 1225
» Securing network access in wireless sensor networks
Sort
View
IJDSN
2007
111views more  IJDSN 2007»
13 years 7 months ago
Architecture of Wireless Sensor Networks with Mobile Sinks: Multiple Access Case
We propose to develop wireless Sensor Networks with Mobile Sinks (MSSN), under high sensor node density, where multiple sensor nodes need to share one single communication channel...
Liang Song, Dimitrios Hatzinakos
CCS
2009
ACM
13 years 11 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
ESAS
2006
Springer
13 years 11 months ago
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines...
Frederik Armknecht, Joao Girão, Marc Stoeck...
ISPEC
2009
Springer
14 years 2 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
WCNC
2008
IEEE
14 years 1 months ago
Testbed Implementation of a Secure Flooding Time Synchronization Protocol
Abstract— A fundamental building block in distributed wireless sensor networks is time synchronization. Given resource constrained nature of sensor networks, traditional time syn...
Tanya Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shan...