In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2...
- In the paper, the generic vulnerability of security software solution is depicted. For selected wireless services such as Device Management, Digital Rights Management and M-Payme...
– In this paper, we present a comprehensive study on the design of secure and survivable wireless sensor networks (WSNs). Our goal is to develop a framework that provides both se...
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
—In this paper we present QOMB, a testbed we designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless ne...
Razvan Beuran, Lan Tien Nguyen, Toshiyuki Miyachi,...