Sciweavers

566 search results - page 20 / 114
» Trust Establishment in Ad Hoc and Sensor Networks
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 11 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ICC
2009
IEEE
121views Communications» more  ICC 2009»
13 years 5 months ago
Trust-Based Data Disclosure in Sensor Networks
In sensor networks, privacy can be addressed in different levels of the network stack and at different points of the information flow. This paper presents an application level sche...
Efthimia Aivaloglou, Stefanos Gritzalis
DCOSS
2008
Springer
13 years 9 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
COMCOM
2008
76views more  COMCOM 2008»
13 years 7 months ago
A study of self-organization mechanisms in ad hoc and sensor networks
Self-organization is a great concept for building scalable systems consisting of a huge number of subsystems. The primary objectives are improved scalability and dynamic adaptatio...
Falko Dressler
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
14 years 14 days ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...