Skip to main content

Security and Resilience for Smart Devices and Applications

  1. Editorial

    Security and resilience for smart devices and applications

    Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices. In this context, it is wide...

    Damien Sauveron, Konstantinos Markantonakis and Christos Verikoukis

    EURASIP Journal on Wireless Communications and Networking 2014 2014:123

    Published on: 29 July 2014

  2. Research Article

    Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks

    Alterations and unpredictability of the network topology in mobile ad hoc networks (MANETs) are less capable of ensuring the security of multicast data transmissions than in conventional networks. Despite the rec...

    Hua-Yi Lin and Tzu-Chiang Chiang

    EURASIP Journal on Wireless Communications and Networking 2010 2011:382701

    Published on: 2 December 2010

  3. Research Article

    CS-DRM: A Cloud-Based SIM DRM Scheme for Mobile Internet

    With the rapid development and growth of the mobile industry, a considerable amount of mobile applications and services are available, which involve Internet scale data collections. Meanwhile, it has a tremend...

    Chaokun Wang, Peng Zou, Zhang Liu and Jianmin Wang

    EURASIP Journal on Wireless Communications and Networking 2010 2011:837209

    Published on: 7 November 2010

  4. Research Article

    A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardwa...

    Jen-Yan Huang, I-En Liao and Hao-Wen Tang

    EURASIP Journal on Wireless Communications and Networking 2010 2011:296704

    Published on: 25 October 2010

  5. Research Article

    A USIM-Based Uniform Access Authentication Framework in Mobile Communication

    With the rapid development of the mobile communication and wireless access technologies, the interworking of heterogeneous networks turns into a trend and various wireless networks are getting connected with t...

    Xinghua Li, Jianfeng Ma, YoungHo Park and Li Xu

    EURASIP Journal on Wireless Communications and Networking 2010 2011:867315

    Published on: 10 October 2010

  6. Research Article

    Efficient Public Key Certificate Management for Mobile Ad Hoc Networks

    Mobile ad hoc networks involve communications over a shared wireless channel without any centralized infrastructure. Consequently, in an optimal solution, management and security services depend exclusively on...

    P. Caballero-Gil and C. Hernández-Goya

    EURASIP Journal on Wireless Communications and Networking 2010 2011:935457

    Published on: 5 October 2010

  7. Research Article

    Energy-Efficient Source Authentication for Secure Group Communication with Low-Powered Smart Devices in Hybrid Wireless/Satellite Networks

    We describe a new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certific...

    Ayan Roy-Chowdhury and John S. Baras

    EURASIP Journal on Wireless Communications and Networking 2010 2011:392529

    Published on: 28 September 2010

  8. Research Article

    Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation

    Security is a fundamental issue for promising applications in a VANET. Designing a secure protocol for a VANET that accommodates efficiency, privacy, and traceability is difficult because of the contradictions...

    Hyoung-Kee Choi, In-Hwan Kim and Jae-Chern Yoo

    EURASIP Journal on Wireless Communications and Networking 2010 2011:716794

    Published on: 23 September 2010

  9. Research Article

    A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

    Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for eme...

    IoannisG Askoxylakis, Theo Tryfonas, John May, Vasilios Siris and Apostolos Traganitis

    EURASIP Journal on Wireless Communications and Networking 2010 2011:807684

    Published on: 23 September 2010

  10. Research Article

    HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, s...

    Javier Campos, Carlos T. Calafate, Marga Nácher, Pietro Manzoni and Juan-Carlos Cano

    EURASIP Journal on Wireless Communications and Networking 2010 2011:437868

    Published on: 14 September 2010

  11. Research Article

    Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks

    Broadcast is used in wireless sensor networks for operations such as software updates, network queries, and command dissemination. Applications such as battlefield control and natural resource management requi...

    Vijay Sivaraman, Diethelm Ostry, Jaleel Shaheen, Antoni Junior Hianto and Sanjay Jha

    EURASIP Journal on Wireless Communications and Networking 2010 2011:695171

    Published on: 31 August 2010

  12. Research Article

    Wireless Information-Theoretic Security in an Outdoor Topology with Obstacles: Theoretical Analysis and Experimental Measurements

    This paper presents a Wireless Information-Theoretic Security (WITS) scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks. A...

    Theofilos Chrysikos, Tasos Dagiuklas and Stavros Kotsopoulos

    EURASIP Journal on Wireless Communications and Networking 2010 2011:628747

    Published on: 29 August 2010

  13. Research Article

    Securing Embedded Smart Cameras with Trusted Computing

    Camera systems are used in many applications including video surveillance for crime prevention and investigation, traffic monitoring on highways or building monitoring and automation. With the shift from analo...

    Thomas Winkler and Bernhard Rinner

    EURASIP Journal on Wireless Communications and Networking 2010 2011:530354

    Published on: 22 August 2010

  14. Research Article

    A Wireless Sensor Network for Hospital Security: From User Requirements to Pilot Deployment

    Increasing amount of Wireless Sensor Network (WSN) applications require low network delays. However, current research on WSNs has mainly concentrated on optimizing energy-efficiency omitting low network delays...

    Ville Kaseva, Timo D. Hämäläinen and Marko Hännikäinen

    EURASIP Journal on Wireless Communications and Networking 2010 2011:920141

    Published on: 18 August 2010

  15. Research Article

    A Secure and Robust Connectivity Architecture for Smart Devices and Applications

    Convergence environments and technologies are urgently coming close to our life with various wireless communications and smart devices in order to provide many benefits such as connectivity, usability, mobilit...

    Taeshik Shon, Kyusuk Han, James J. (Jong hyuk) Park, Young-Sik Jeong and Yang Sun Lee

    EURASIP Journal on Wireless Communications and Networking 2010 2011:176393

    Published on: 15 August 2010

  16. Research Article

    Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks

    A network reprogramming protocol is made for updating the firmware of a wireless sensor network (WSN) in situ. For security reasons, every firmware update must be authenticated to prevent an attacker from install...

    Yee Wei Law, Yu Zhang, Jiong Jin, Marimuthu Palaniswami and Paul Havinga

    EURASIP Journal on Wireless Communications and Networking 2010 2011:685219

    Published on: 4 August 2010

  17. Research Article

    Modeling the Lion Attack in Cognitive Radio Networks

    Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio is a smart device which runs radio applications software to perform signal p...

    Juan Hernandez-Serrano, Olga León and Miguel Soriano

    EURASIP Journal on Wireless Communications and Networking 2010 2011:242304

    Published on: 3 August 2010