The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A logical key hierarchy (LKH) based key management approach is the most common way to manage a group key with less rekeying overhead. However, the LKH approach causes inefficiency of rekeying the group key in mobile cellular networks since it does not consider the characteristics of the networks, such as the cell-based network topology and the user's mobility. This paper proposes an efficient and...
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium...
The main objective of this paper is to show new possibilities of wireless communication for mobile robotic and industrial units in the real time. The means of using wireless communication networks based on parallel processing and data transfer for various network topologies are discussed here. We have been focusing our research on ultra low power communication chips based on frequency 2.4 GHz. Furthermore...
Wormhole attacks enable an attacker with limited resources and no cryptographic material to disrupt wireless networks. In a wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location and retransmits them there into the network. In this paper, we present an algorithm for detecting and thus defending against wormhole...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.