• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 28
Next 10 →

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.

Distributed Privacy-Preserving Access Control in Sensor Networks

by Rui Zhang, Student Member, Yanchao Zhang, Senior Member, Kui Ren, Senior Member - IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
"... Abstract—The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that the sensed data are only accessible to users willing to pay. On the other hand, users wish to protect ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
in how the witnesses are chosen. We thoroughly compare their performance with regard to TRD capability, communication overhead, storage overhead, and attack resilience. The efficacy and efficiency of DP2AC are confirmed by detailed performance evaluations. Index Terms—Wireless sensor networks, access

SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks

by Jinyuan Sun, Chi Zhang, Student Member, Yanchao Zhang, Yuguang Fang
"... Abstract—Anonymity has received increasing attention in the literature due to the users ’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
authentication, confidentiality, data integrity, and nonrepudiation. Thorough analysis on security and efficiency is incorporated, demonstrating the feasibility and effectiveness of the proposed architecture. Index Terms—Anonymity, traceability, pseudonym, misbehavior, revocation, wireless mesh network (WMN). Ç

Energy Efficient Cluster-Based Intrusion Detection System for Wireless Sensor Networks

by Manal Abdullah, Ebtesam Alsanee, Nada Alseheymi
"... Abstract—Wireless sensor networks (WSNs) are network type where sensors are used to collect physical measurements. It has many application areas such as healthcare, weather monitoring and even military applications. Security in this kind of networks is a big concern especially in the applications th ..."
Abstract - Add to MetaCart
detection. The experiments determine K = 5 for best classification and this reveals recognition rate of attacks as 75%. Results are compared with KNN classifier for anomaly detection without using a clustering algorithm. Keywords—wireless sensor networks WSN; intrusion detection ID; clustering protocols

Impact of New Highly Secure Scheme on Wireless Network 802.11 Performance

by Brijesh Singh Yadav, Parul Yadav
"... Wireless local area networks (WLAN) are beginning to play a much larger role in corporate network environments and are already very popular for home networking applications. This increase in accessibility has created large security holes for hackers and thieves to abuse, that is finally being addres ..."
Abstract - Add to MetaCart
addressed by stronger security protocols and these security protocols include Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and 802.11i (WPA2). In this paper, we investigate the performance of wireless local area networks (WLANs) and security protocols available for WLANs. These existing

Secure Transmission of Bio-sensor Images for Ubiquitous Healthcare

by Anupam Kumar Bairagi, Md. Golam, Robiul Alam, Choong Seon Hong
"... Ensuring security and privacy in wireless body area networks (WBAN) are one of the challenging research issues in personalized healthcare. The image, signal, video, and textual information produced by the bio-sensors are vulnerable for unauthorized access and patients ’ privacy. In this paper, we pr ..."
Abstract - Add to MetaCart
Ensuring security and privacy in wireless body area networks (WBAN) are one of the challenging research issues in personalized healthcare. The image, signal, video, and textual information produced by the bio-sensors are vulnerable for unauthorized access and patients ’ privacy. In this paper, we

hardware and mobile web technology Master of Science Thesis in Programme Computer Systems and Networks

by Tomas Ohlson, Tomas Ohlson , 2013
"... Digitising statistics handling through ..."
Abstract - Add to MetaCart
Digitising statistics handling through

KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer

by On Smartphones, Jason Lee , 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract - Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,

MPEG-4 for Interactive Low-delay Real-time Communication

by Olaf L, Gary Minden , 2003
"... ii Internet broadcasting techniques are wide spread and have been the focus off many research projects. Due to high transmission delays these systems often lack interactivity. This thesis introduces a new streaming system to deliver real-time video and audio data with low-delays across the Internet. ..."
Abstract - Add to MetaCart
. Packet loss, jitter and changing bandwidth availability describe the challenges that have to be handled by the system, since the Internet is a best effort network and does not guarantee quality of service. To lower bit-rates audio and video data are usually compressed in formats like MPEG-4. The high

SOPC BASED WIRELESS REMOTE PATIENT MONITORING USING ULTRA LIGHTWEIGHT CRYPTOGRAPHY

by A. Arun, P. Nirmal Kumar
"... Remote Patient Monitoring (RPM) provides flexible and powerful patient surveillance through wearable devices at anytime and anywhere. This can be achieved by using a Body Sensor Network (BSN), which is deployed on a human body for monitoring the healthcare. The mobile healthcare management with incr ..."
Abstract - Add to MetaCart
on Programmable Chip (SoPC) implementation of Remote Patient Monitoring System (RPM) with Ultra Lightweight algorithms for security issues. Humming Bird 2 (HB-2), PRESENT and HIGHT algorithms were implemented since the wearable medical devices require fewer areas to achieve portability. The comparison results
Next 10 →
Results 1 - 10 of 28
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University