This paper deals with a description of wireless sensor networks at the beginning. Further follows the introduction to the agent platform suitable for wireless networks. Mobile code and sensor networks suffer from considerable security problems. Our proposal of countermeasure is based on combination of smartcards with sensor nodes. Smartcards as a tamper resistant devices offer solution for the most of commonly required security objectives. Analysis of proposed hardware cryptographic platform includes link level communication, transport protocol description, application interface description and demands for power consumption. Today smartcards are highly standardized devices that offer common communication interface and platform could be used...
In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy ...
Wireless multimedia sensor networks will play a central role in the Internet of Things world, provid...
Abstract- confidentiality and security to the data is actually provided by an authentication. Authen...
This work presents the design, implementation and evaluation of a security ar- chitecture, targeted ...
Wireless sensor networks are comprised of a vast number of ultra-small autonomous computing, communi...
This thesis deals with the agent platforms for wireless sensor networks. Wireless sensor networks to...
There are many protocols used in wireless sensor network (WSN), but few of them provide us with a co...
The nature of constrained resources of sensor nodes, beside of the inherent vulnerability, led ...
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized...
Abstract- Wireless sensor networking continues to evolve as one of the most exciting and challenging...
Development in micro electro mechanical systems (MEMS) and wireless networks has opened a new domain...
Abstract In a wireless sensor network environment, a sensor node is extremely constrained in terms o...
The aim of this work is to describe platform's concept and interpreter's implementation for mobile a...
Wireless Sensor Networks (WSN) have emerged as a new information-gathering paradigm based on the col...
Confidentiality and authentication are crucial to wireless sensor networks when sensors are deployed...
In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy ...
Wireless multimedia sensor networks will play a central role in the Internet of Things world, provid...
Abstract- confidentiality and security to the data is actually provided by an authentication. Authen...
This work presents the design, implementation and evaluation of a security ar- chitecture, targeted ...
Wireless sensor networks are comprised of a vast number of ultra-small autonomous computing, communi...
This thesis deals with the agent platforms for wireless sensor networks. Wireless sensor networks to...
There are many protocols used in wireless sensor network (WSN), but few of them provide us with a co...
The nature of constrained resources of sensor nodes, beside of the inherent vulnerability, led ...
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized...
Abstract- Wireless sensor networking continues to evolve as one of the most exciting and challenging...
Development in micro electro mechanical systems (MEMS) and wireless networks has opened a new domain...
Abstract In a wireless sensor network environment, a sensor node is extremely constrained in terms o...
The aim of this work is to describe platform's concept and interpreter's implementation for mobile a...
Wireless Sensor Networks (WSN) have emerged as a new information-gathering paradigm based on the col...
Confidentiality and authentication are crucial to wireless sensor networks when sensors are deployed...
In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy ...
Wireless multimedia sensor networks will play a central role in the Internet of Things world, provid...
Abstract- confidentiality and security to the data is actually provided by an authentication. Authen...