Filters








20,675 Hits in 6.1 sec

A Framework for Secure and Survivable Wireless Sensor Networks

Mi Chaw Mon THEIN, Thandar THEIN
<span title="">2009</span> <i title="Dunarea de Jos University of Galati"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wf2hgvt42na6ho4vxbfpuo36lq" style="color: black;">Annals of Dunarea de Jos University. Fascicle I : Economics and Applied Informatics</a> </i> &nbsp;
Wireless sensor networks increasingly become viable solutions tomany challenging problems and will successively be deployed in many areas inthe future.  ...  A wireless sensor network (WSN) is vulnerable to security attacksdue to the insecure communication channels, limited computational andcommunication capabilities and unattended nature of sensor node devices  ...  In our key management scheme consists of three keys: − K g (group key) -Generated by base station, pre-deployed to all sensor nodes in the entire network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://doaj.org/article/5a62f62c0d0f4c9b89a07853367cceaa">doaj:5a62f62c0d0f4c9b89a07853367cceaa</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/se5jyci4rzfgjjhvheig65zjpe">fatcat:se5jyci4rzfgjjhvheig65zjpe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171202061020/http://www.ann.ugal.ro/eco/Doc2009/MiChawMonThei_ThandarThein.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f8/f8/f8f8b38ad18d129ef24fa224a66dedb32c842171.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Internet As A Application For Secured Data Transmission In Digital World

Sanjali S. Doshi
<span title="2016-02-20">2016</span> <i title="Zenodo"> Zenodo </i> &nbsp;
Computer security deals with the managerial procedures and technological safeguards applied to computer hardware,software,and data to ensure against accidental or deliberate unauthorized access to computer system  ...  regarding access to information,whereas issues of security involve the procedures and safeguards for enforcing the privacy decisions . the motivations for security and privacy are found in the desire  ...  In a public-key encryption system, the public key is used for encryption, while the private or secret key is used for decryption. VIII.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1466307">doi:10.5281/zenodo.1466307</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eqel7dflajhcfas2v3dzyd5yey">fatcat:eqel7dflajhcfas2v3dzyd5yey</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200227163633/https://zenodo.org/record/1466308/files/1456763755_IOTTSF-2016.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/94/7e/947e69967b2b358e2d68e868c2366f4d2e7fa807.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1466307"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN

Wei Liang, Zhiqiang Ruan, Yuntao Wang, Xiaoyan Chen
<span title="">2016</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zlknqk4ahbcsthbafxw55emm7a" style="color: black;">Journal of Sensors</a> </i> &nbsp;
Experimental results show that the proposed scheme reduces hardware communication overhead by five percent in comparison. Additionally, the performance of local recovery achieves ninety percent.  ...  In the real application environment of wireless sensor networks (WSNs), the uncertain factor of data storage makes the authentication information be easily forged and destroyed by illegal attackers.  ...  Figure 7 :Figure 8 : 78 Comparison Comparison in local recovery ratio. and secure communication of secret key in wireless network when the encoded content in network could be restored.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2016/2098680">doi:10.1155/2016/2098680</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7h2iexh5dnhzzhiqdkjxehiucq">fatcat:7h2iexh5dnhzzhiqdkjxehiucq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190501082741/http://downloads.hindawi.com/journals/js/2016/2098680.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bc/84/bc84891c2caf43fca12fa8c3ac2fc125b9eb13a7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2016/2098680"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks

Arif Sari, Mehmet Karay
<span title="">2015</span> <i title="Scientific Research Publishing, Inc,"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fakky7235zh5hdho2lhzhjrw5e" style="color: black;">International Journal of Communications, Network and System Sciences</a> </i> &nbsp;
Data security in the past dealth with integrity, confidentiality and ensuring authorized usage of the data and the system.  ...  Data communication between computers has brought about countless benefits to users, but the same information technologies have created a gap, a vulnerable space in the communication medium, where the data  ...  In a world of diverse communication between nodes, wired and wireless devices, and mobile-wireless devices.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4236/ijcns.2015.813051">doi:10.4236/ijcns.2015.813051</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/onvfqdz7bjdwrnl6b6tyxx2why">fatcat:onvfqdz7bjdwrnl6b6tyxx2why</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160617110957/http://www.scirp.org/journal/PaperDownload.aspx?downloadType=epub&amp;paperID=62435" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ab/ca/abca0e909c1fa8f2c1fd53483b84545aa63f9074.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4236/ijcns.2015.813051"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Security Key Recovery System with Channel Quality Awareness for Smart Grid Applications

Prachya Huadpaknam, Chaiyod Pirak, Rudolf Mathar
<span title="1970-01-01">1970</span> <i title="ECTI"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/25z3g4hfevb2rf4fiw3mnyn47q" style="color: black;">ECTI Transactions on Computer and Information Technology</a> </i> &nbsp;
In this paper, a security key recovery system with channel quality awareness (SKRS-CQA) for smart grid applications has been proposed.  ...  recovery if the data concentrator unit (DCU) has lost the key in unexpected events.  ...  the help of data recovery keys supplied by a trusted third party [8] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.37936/ecti-cit.2016101.54422">doi:10.37936/ecti-cit.2016101.54422</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ualktvf3gnhunkyfl5bomdy6a4">fatcat:ualktvf3gnhunkyfl5bomdy6a4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200421163705/https://ph01.tci-thaijo.org/index.php/ecticit/article/download/54422/45193" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a4/e3/a4e354b3b134ad0624a048b480fbc268e778bfa5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.37936/ecti-cit.2016101.54422"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

ZigBee-based Wireless Neuro-Stimulator for Improving Stroke Recovery

Gookhwa Kim, Hyojeong Yun, Munho Ryu, Yongil Shin, Hyoungihl Kim, Yoonseok Yang
<span title="">2010</span> <i title="The Korean Society for Brain and Neural Science (KAMJE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nr5j7nqsyzfqhfsjewylogo6ra" style="color: black;">Experimental Neurobiology</a> </i> &nbsp;
This study aims to develop a prototype of a telemedicine system to enhance stroke recovery by using a ZigBeebased wireless neuro-stimulator.  ...  It is also the third-leading cause of death in the United States, leading to a serious demand for new interventions to improve the quality of life in stroke survivors.  ...  In addition to enabling wireless control, the ZigBee can connect the neuro-modulation system to a widespread communication network such as the internet or a mobile network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5607/en.2010.19.3.165">doi:10.5607/en.2010.19.3.165</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/22110356">pmid:22110356</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC3214784/">pmcid:PMC3214784</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hcpkmsa6mrdbjhc7vv6upxkhpu">fatcat:hcpkmsa6mrdbjhc7vv6upxkhpu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218162854/http://pdfs.semanticscholar.org/0fd1/4685a01dd7f65803712ad549b1d4f12320af.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0f/d1/0fd14685a01dd7f65803712ad549b1d4f12320af.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5607/en.2010.19.3.165"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3214784" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Development of Wireless Systems for Disaster Recovery Operations

Takashi HIROSE, Fusao NUNO, Masashi NAKATSUGAWA
<span title="">2015</span> <i title="Institute of Electronics, Information and Communications Engineers (IEICE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/neoe45vc4nf47argcpbjcnw2ay" style="color: black;">IEICE transactions on electronics</a> </i> &nbsp;
This paper presents wireless systems for use in disaster recovery operations.  ...  They will be chosen and used depending on the situations in disaster areas as well as on the required services. key words: disaster recovery operation, business radio, subscriber wireless system, satellite  ...  Hirofumi Amano, former Head and current Head of NTT Access Network System Laboratories, for the enthusiastic encouragement they gave us as we pursued the development of the new systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1587/transele.e98.c.630">doi:10.1587/transele.e98.c.630</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vgqsfxyoe5awbd3bwbyte3razi">fatcat:vgqsfxyoe5awbd3bwbyte3razi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180727085700/https://www.jstage.jst.go.jp/article/transele/E98.C/7/E98.C_630/_pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e4/4e/e44ead4d08b054a3c6c9b59649ec7ceaecdca29e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1587/transele.e98.c.630"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

CEAACK based Detector for Malicious Nodes

Meenakshiammal. R, Deivanayaki.N Deivanayaki.N, N.Shalini N.Shalini
<span title="2014-12-18">2014</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
Wireless networks are used to connect with different networks in MANETs. Security is more critical in wireless communication when compared to the wired communication.  ...  The proposed system introduces a new intrusion-detection system named Competent Enhanced Adaptive Acknowledgment (CEAACK) for finding malicious nodes using RSA digital signature and EAACK specially designed  ...  SYSTEM ARCHITECTURE Network Formation In this module we can construct a topology to provide communication paths for wireless adhoc network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/19022-0534">doi:10.5120/19022-0534</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3gxpbizrcrb23mtqmuclkuk54q">fatcat:3gxpbizrcrb23mtqmuclkuk54q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603012221/https://research.ijcaonline.org/volume108/number19/pxc3900534.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5f/cf/5fcfcfeeef4a8a3f2cd102029e1ffbbe2b21542d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/19022-0534"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

SECURE AND AUTHENTICATED KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORK

U. Mekala
<span title="2017-08-30">2017</span> <i title="IJARCS International Journal of Advanced Research in Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dbwzqwxyw5hn3aantchmoxx65q" style="color: black;">International Journal of Advanced Research in Computer Science</a> </i> &nbsp;
Encryption and key distribution are significant primitives to build secure Wireless Sensor Networks (WSN).  ...  Information security in frame less wireless sensor networks (WSNs) is one of the most significant research challenges.  ...  The authentic group key transfer protocol proposed in [4] requires an on-line key generation center (KGC) to construct and allocate the group key, which increases the overhead to contrivance the system  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26483/ijarcs.v8i8.4607">doi:10.26483/ijarcs.v8i8.4607</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ccaki2wchvbn7itjbbhd4etmyu">fatcat:ccaki2wchvbn7itjbbhd4etmyu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200214040417/http://ijarcs.info/index.php/Ijarcs/article/download/4607/4200" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d7/b2/d7b2a1a01854bccaadb47246a438e24a4ff2f623.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26483/ijarcs.v8i8.4607"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation

Hongsong Chen, Zhongchuan Fu
<span title="">2015</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/khqygtfojnby3jyh5obuwd7ko4" style="color: black;">Mobile Information Systems</a> </i> &nbsp;
An ECC (Elliptic Curve Cryptography) based lightweight digital signature and key transmission method are proposed to provide wireless secure communication in healthcare information system.  ...  In wireless biosensor network, authentication and key transfer should be lightweight.  ...  The first step is to generate public/private key pair; the wireless node generates its public/private key pair.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2015/852173">doi:10.1155/2015/852173</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vsew5cu2vjabrbcox6y566bfvu">fatcat:vsew5cu2vjabrbcox6y566bfvu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190501010925/http://downloads.hindawi.com/journals/misy/2015/852173.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a2/4d/a24d2fcf5075491f445f1baa7725c9171e484899.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2015/852173"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Preface

Editorial Board
<span title="2007-05-02">2007</span> <i title="University of Technology, Sydney (UTS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/s536wv5fibfffl4excqqutjymq" style="color: black;">African Journal of Information &amp; Communication Technology</a> </i> &nbsp;
However, wireless communication systems have different characteristics when compared to wired networks that include higher bit error rates, higher latency, limited bandwidth, multipath fading of the signals  ...  Atanasov and Pencheva in the second paper present "a new mark-up approach to service creation in Next Generation Networks.  ...  His research interests are in wireless communications, sensor networks, digital identity management systems, networks on mobile platforms and in uncovered areas. USA.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5130/ajict.v3i1.502">doi:10.5130/ajict.v3i1.502</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yps7wcdnuvel3jl3b6m2d7pbcq">fatcat:yps7wcdnuvel3jl3b6m2d7pbcq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190430060353/https://epress.lib.uts.edu.au/journals/index.php/ajict/article/download/E1I21220070P71/392" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1d/a8/1da8dddaa1784c6319c215492bdc7140d0630d20.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5130/ajict.v3i1.502"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Guest editorial - signal synchronization in digital transmission systems

M. Luise, U. Mengali, M. Moeneclaey, J.G. Proakis, E. Strom, W.H. Tranter
<span title="">2001</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/onirm7ye2bfobnpwuwaopap5yu" style="color: black;">IEEE Journal on Selected Areas in Communications</a> </i> &nbsp;
Due to the high market demands for advanced wireless communications, third-generation CDMA-based systems like those envisaged by ITU's initiative IMT-2000, have become key technologies in research, development  ...  The estimator can be used with transmitter antenna diversity and can be successfully applied to third-generation wireless systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jsac.2001.974596">doi:10.1109/jsac.2001.974596</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gd425o5dmvailcg4crumc4ys5e">fatcat:gd425o5dmvailcg4crumc4ys5e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190302205511/http://pdfs.semanticscholar.org/a1fe/5c1556fe1989f46d65eb90cbc8ddea957d8c.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a1/fe/a1fe5c1556fe1989f46d65eb90cbc8ddea957d8c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jsac.2001.974596"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

DHB-KEY: An efficient key distribution scheme for wireless sensor networks

Tony Chung, Utz Roedig
<span title="">2008</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kwegstofqzcrrcyrpviq5g7dtq" style="color: black;">2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</a> </i> &nbsp;
Real-world deployments of wireless sensor networks require secure communication. In many application cases it is sufficient to provide message authentication at the sink.  ...  A physical intrusion detection system in an office building is used to evaluate the protocol implementation. The evaluation shows that DHB-KEY is practical in real-world deployments.  ...  Third, the key exchange communication patterns match common sensor network properties which allows us to use DHB-KEY easily in practical deployments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mahss.2008.4660127">doi:10.1109/mahss.2008.4660127</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/mass/ChungR08.html">dblp:conf/mass/ChungR08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/z3jtjjzrszf6tarw7jajgo6lum">fatcat:z3jtjjzrszf6tarw7jajgo6lum</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110331201852/http://eprints.comp.lancs.ac.uk/2037/1/PID686811.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8d/14/8d149c8ab879935198bb98ad79bf2cbf54b401a3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mahss.2008.4660127"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks [chapter]

Zheng Dong
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The proximity-based authentication system, Amigo [12] , relies on a mechanism that verifies co-located mobile devices by generating digital signatures from wireless radio strength, and then comparing the  ...  Based on a similar idea, another proximity-based authentication system, Ensemble [13], relies on variation in radio signal strengths to determine physical proximity; trusted third parties (e.g.  ...  We argue that self-recovery is possible and can be automated once initiated by a human. The recovery task may be accomplished by a third-party recovery service.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-34638-5_5">doi:10.1007/978-3-642-34638-5_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ecrziwcarvaidpugdxxv7kejwe">fatcat:ecrziwcarvaidpugdxxv7kejwe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922234652/http://infosecon.net/usec12/papers/dong-usec12.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/78/20/78205ae35d4dfdc4e2efecf8dc23b917c192e7b5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-34638-5_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks

Vijay Sivaraman, Diethelm Ostry, Jaleel Shaheen, Antoni Junior Hianto, Sanjay Jha
<span title="">2011</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/a5gjzjadkzbirdua4xdqipotp4" style="color: black;">EURASIP Journal on Wireless Communications and Networking</a> </i> &nbsp;
Broadcast is used in wireless sensor networks for operations such as software updates, network queries, and command dissemination.  ...  In this paper we design, implement, and evaluate a novel scheme that meets the requirements of secrecy, authenticity, integrity, and freshness of broadcast messages in the context of a single-hop wireless  ...  and communication costs, that can be adjusted system-wide.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2011/695171">doi:10.1155/2011/695171</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ad3wcwz6ojhe7kfy23rys2behi">fatcat:ad3wcwz6ojhe7kfy23rys2behi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170812030649/https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1155/2011/695171?site=jwcn.eurasipjournals.springeropen.com" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/90/a2/90a2b199c12bb5f3841eab2fb1933897450c7995.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2011/695171"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 20,675 results