The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to resolve the problems of node multiple keys management and protected storage in mobile ad hoc networks, a new identity‐based node key management scheme combined with next generation protected storage of portable trusted platform module was presented for mobile ad hoc networks. In the scheme, the combined public key based on elliptic‐curve cryptography was adopted to generate multiple keys,...
Wireless Local Area Networks (WLANs) are gaining more and more attention in enterprise. The advantages WLANs provide over wired LANs are mobility, range of coverage, ease of use, scalability, low cost and so on. In recent years, more and more enterprises set up WLANs environment in the information system. However, the introduction of the WLANs brings an additional exposed vulnerability point. The...
Passive attacks have caused a great threat to Wireless Sensor Networks (WSN), therefore the research of communication nodes and the stealthiness of communication relationship is crucial. Due to the problem of node hidden mechanism, a secure anonymous routing named Node-Uncorrelated Pseudonym Pairwise Mechanism (NUCPP) is proposed in this paper. Instead of using the traditional pseudonym node correlation...
With the development of WSNs in the military and commercial fields, the security of WSNs is becoming more and more important. The security threats of wireless sensor networks (WSNs) come from not only the attacks of external attackers but also the byzantine behaviors and selfish behaviors of internal nodes. The classical security mechanisms, namely cryptography and authentication, can prevent some...
Mobile ad-hoc networks (MANETs) are most useful in unprepared emergencies where critical applications must be launched quickly. However, they often operate in an adverse environment where end-to-end connectivity is highly susceptible to disruption. Adjusting the motion of existing nodes or deploying additional nodes can improve the connectivity under some circumstances, but for scenarios where connectivity...
IEEE 802.15.4 is an emerging wireless standard addressing the needs of low-rate wireless personal area networks with a focus on enabling various pervasive and ubiquitous applications that require interactions with our surrounding environments. In view of the application potential of IEEE 802.15.4, knowing the fundamental network properties soon becomes essential in fasten the interactivity between...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.