In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attack...
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Information technology has been a central enabler in the process toward network society. Despite the critical role of computers in inter-organizational arrangements, coordination ...
A novel approach to quality of service control in an active service network (application layer active network) is described. The approach makes use of a distributed genetic algori...
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...