Results 21 to 30 of about 6,579,728 (290)
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes.
Kashif Saleem +6 more
doaj +1 more source
The Role of Physical Layer Security in IoT: A Novel Perspective
This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem ...
Tommaso Pecorella +2 more
doaj +1 more source
A robust self-organized public key management for mobile ad hoc networks [PDF]
A mobile ad hoc network (MANET) is a self-organized wireless network where mobile nodes can communicate with each other without the use of any existing network infrastructure or centralized administration. Trust establishment and management are essential
Capkun +14 more
core +1 more source
Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches.
Pramod T. C. +3 more
doaj +1 more source
A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks
Many Industrial Internet of Things (IIoT) applications require wireless networks with low power consumption, low latency, and secure communication. The IPv6 over the TSCH mode of IEEE 802.15.4e (IETF 6TiSCH) standard has been created to fulfill these ...
Hakan Aydin, Sedat Gormus, Burak Aydin
doaj +1 more source
A Study on the Key Management Strategy for Wireless Sensor Networks
Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group
Hoon KO +5 more
doaj +1 more source
Why do research on commercial property management? Somebody HAS to! [PDF]
This paper identifies some significant gaps in our knowledge of the configuration and performance of the property asset management sector. It is argued that, as many leading academic property researchers have focussed on financial vehicles and modelling,
McAllister, Patrick
core +1 more source
Deployment of Unmanned Aerial Vehicles (UAVs) continues to expand rapidly across a wide range of applications, including environmental monitoring, precision agriculture, and disaster response.
Sayani Sarkar +3 more
doaj +1 more source
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen +23 more
wiley +1 more source
Transitory Master Key Transport Layer Security for WSNs
Security approaches in Wireless Sensor Networks (WSNs) are normally based on symmetric cryptography. Instead of symmetric encryption, some alternative approaches have been developed by using public-key cryptography. However, the higher computational cost
Mattia Griotti +2 more
doaj +1 more source

