Sciweavers

858 search results - page 17 / 172
» User Authentication in Sensor Networks
Sort
View
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
14 years 3 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß
COMCOM
2007
149views more  COMCOM 2007»
13 years 8 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
IEEECIT
2006
IEEE
14 years 2 months ago
An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks
In this paper we propose an improved and efficient key pre-distribution scheme for wireless sensor networks. Our scheme significantly increases the storage efficiency and security...
Al-Sakib Khan Pathan, Tran Thanh Dai, Choong Seon ...
PERCOM
2004
ACM
14 years 8 months ago
Learning to Detect User Activity and Availability from a Variety of Sensor Data
Using a networked infrastructure of easily available sensors and context-processing components, we are developing applications for the support of workplace interactions. Notions o...
Dave Snowdon, Jean-Luc Meunier, Martin Mühlen...
DCOSS
2006
Springer
14 years 3 days ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...