In the EYES project, we are investigating self-organizing, collaborative, energy-efficient sensor networks. This study is devoted to the security aspects of the project. Our contribution is three-fold: firstly, we present a survey, where we discuss the dominant issues of energy-security trade-off in the network protocol and key management design space. From there we set out future research directions for our security framework. Secondly, we propose an assessment framework based on system profile, with which we have managed to carve out manageable design spaces from the seemingly infinite possibilities of ad hoc mobile wireless networks. Finally, we have benchmarked some well-known cryptographic algorithms in search for the best compromise i...
Security for sensor networks is challenging due to the resource-constrained nature of individual nod...
Several perspectives of network security and energy efficiency were investigated and a scheme is pro...
Abstract: Wireless ad-hoc networks are vulnerable to several security threats. How to collect, excha...
In the EYES project (http://eyes.eu.org), we are investigating self-organizing, collaborative, energ...
Wireless Sensor Networks (WSN) have emerged as a new information-gathering paradigm based on the col...
A wireless sensor network consists of lightweight nodes with a limited power source. They can be use...
Abstract. This paper describes Wireless Sensor Network (WSN) security to conserve wasteful energy. S...
In sensor networks, large numbers of tiny sensor nodes communicate remotely or locally among themsel...
Data security and energy aware communication are key aspects in design of modern ad hoc networks. In...
Abstract Since wireless sensor networks are emerging as innovative technologies for realizing a vari...
As wireless devices are more widely used, it is clear that security and energy consumption are major...
Abstract: Security issue of sensor networks is greatly different from that of conventional networks...
Abstract: In this paper we aim to analyze the issues and requirements pertaining the security of sen...
As wireless devices are more widely used, it is clear that security and energy consumption are major...
Abstract—Data security and energy aware communication are key aspects in design of modern ad hoc net...
Security for sensor networks is challenging due to the resource-constrained nature of individual nod...
Several perspectives of network security and energy efficiency were investigated and a scheme is pro...
Abstract: Wireless ad-hoc networks are vulnerable to several security threats. How to collect, excha...
In the EYES project (http://eyes.eu.org), we are investigating self-organizing, collaborative, energ...
Wireless Sensor Networks (WSN) have emerged as a new information-gathering paradigm based on the col...
A wireless sensor network consists of lightweight nodes with a limited power source. They can be use...
Abstract. This paper describes Wireless Sensor Network (WSN) security to conserve wasteful energy. S...
In sensor networks, large numbers of tiny sensor nodes communicate remotely or locally among themsel...
Data security and energy aware communication are key aspects in design of modern ad hoc networks. In...
Abstract Since wireless sensor networks are emerging as innovative technologies for realizing a vari...
As wireless devices are more widely used, it is clear that security and energy consumption are major...
Abstract: Security issue of sensor networks is greatly different from that of conventional networks...
Abstract: In this paper we aim to analyze the issues and requirements pertaining the security of sen...
As wireless devices are more widely used, it is clear that security and energy consumption are major...
Abstract—Data security and energy aware communication are key aspects in design of modern ad hoc net...
Security for sensor networks is challenging due to the resource-constrained nature of individual nod...
Several perspectives of network security and energy efficiency were investigated and a scheme is pro...
Abstract: Wireless ad-hoc networks are vulnerable to several security threats. How to collect, excha...