Results 21 to 30 of about 6,579,728 (290)

Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

open access: yesSensors, 2016
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes.
Kashif Saleem   +6 more
doaj   +1 more source

The Role of Physical Layer Security in IoT: A Novel Perspective

open access: yesInformation, 2016
This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem ...
Tommaso Pecorella   +2 more
doaj   +1 more source

A robust self-organized public key management for mobile ad hoc networks [PDF]

open access: yes, 2010
A mobile ad hoc network (MANET) is a self-organized wireless network where mobile nodes can communicate with each other without the use of any existing network infrastructure or centralized administration. Trust establishment and management are essential
Capkun   +14 more
core   +1 more source

CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems

open access: yesFuture Internet, 2019
Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches.
Pramod T. C.   +3 more
doaj   +1 more source

A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks

open access: yesIEEE Access
Many Industrial Internet of Things (IIoT) applications require wireless networks with low power consumption, low latency, and secure communication. The IPv6 over the TSCH mode of IEEE 802.15.4e (IETF 6TiSCH) standard has been created to fulfill these ...
Hakan Aydin, Sedat Gormus, Burak Aydin
doaj   +1 more source

A Study on the Key Management Strategy for Wireless Sensor Networks

open access: yesAdvances in Distributed Computing and Artificial Intelligence Journal, 2015
Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group
Hoon KO   +5 more
doaj   +1 more source

Why do research on commercial property management? Somebody HAS to! [PDF]

open access: yes, 2011
This paper identifies some significant gaps in our knowledge of the configuration and performance of the property asset management sector. It is argued that, as many leading academic property researchers have focussed on financial vehicles and modelling,
McAllister, Patrick
core   +1 more source

Secure Communication in Drone Networks: A Comprehensive Survey of Lightweight Encryption and Key Management Techniques

open access: yesDrones
Deployment of Unmanned Aerial Vehicles (UAVs) continues to expand rapidly across a wide range of applications, including environmental monitoring, precision agriculture, and disaster response.
Sayani Sarkar   +3 more
doaj   +1 more source

European Standard Clinical Practice Guideline and EXPeRT Recommendations for the Diagnosis and Management of Gastroenteropancreatic Neuroendocrine Neoplasms in Children and Adolescents

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen   +23 more
wiley   +1 more source

Transitory Master Key Transport Layer Security for WSNs

open access: yesIEEE Access, 2020
Security approaches in Wireless Sensor Networks (WSNs) are normally based on symmetric cryptography. Instead of symmetric encryption, some alternative approaches have been developed by using public-key cryptography. However, the higher computational cost
Mattia Griotti   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy