Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because th...
We present a deterministic Key Predistribution scheme in Wireless Sensor Networks (WSN) using combinatorial designs. The design finds application where a large number sensor node...
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they ca...
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...