1 January 2010

Special issue: Security, privacy, and identification technologies in wireless sensor networks

International Journal of Security and Networks 5(1) 2010
  • A backpressure technique for filtering spoofed traffic at upstream routers
  • Authentication and secret search mechanisms for RFID-aware wireless sensor networks
  • An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
  • Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
  • Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
  • Lightweight authentication protocol for mobile RFID networks
  • A cross-layer authentication design for secure video transportation in wireless sensor network

No comments: