𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Security in data communications: Security in Fixed and Wireless Networks – An introduction to securing data communications

✍ Scribed by Gunter Schafer


Publisher
Elsevier Science
Year
2004
Tongue
English
Weight
65 KB
Volume
20
Category
Article
ISSN
0267-3649

No coin nor oath required. For personal study only.


📜 SIMILAR VOLUMES


Secure group communication in wireless m
✍ Jing Dong; Kurt Ackermann; Cristina Nita-Rotaru 📂 Article 📅 2009 🏛 Elsevier Science 🌐 English ⚖ 737 KB

Wireless mesh networks (WMNs) have emerged as a promising technology that offers lowcost community wireless services. The community-oriented nature of WMNs facilitates group applications, such as webcast, distance learning, online gaming, video conferencing, and multimedia broadcasting. Security is

Secure data aggregation without persiste
✍ Kui Wu; Dennis Dreef; Bo Sun; Yang Xiao 📂 Article 📅 2007 🏛 Elsevier Science 🌐 English ⚖ 287 KB

In-network data aggregation is an essential operation to reduce energy consumption in large-scale wireless sensor networks. With data aggregation, however, raw data items are invisible to the base station and thus the authenticity of the aggregated data is hard to guarantee. A compromised sensor nod

An overlay approach to data security in
✍ Jörg Liebeherr; Guangyu Dong 📂 Article 📅 2007 🏛 Elsevier Science 🌐 English ⚖ 1018 KB

While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and delay performance achievable in this fashion. This paper presents performance measurements of an application-layer overlay ap

Securing distributed data storage and re
✍ Nalin Subramanian; Chanjun Yang; Wensheng Zhang 📂 Article 📅 2007 🏛 Elsevier Science 🌐 English ⚖ 689 KB

Sensor networks have been an attractive platform for pervasive computing and communication. However, they are vulnerable to attacks if deployed in hostile environments. The past research of sensor network security has focused on securing information in communication, but how to secure information in