Skip to content

Advertisement

Security and Resilience for Smart Devices and Applications

  1. Content type: Editorial

    Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices. In this context, it is wide...

    Authors: Damien Sauveron, Konstantinos Markantonakis and Christos Verikoukis

    Citation: EURASIP Journal on Wireless Communications and Networking 2014 2014:123

    Published on:

  2. Content type: Research Article

    Alterations and unpredictability of the network topology in mobile ad hoc networks (MANETs) are less capable of ensuring the security of multicast data transmissions than in conventional networks. Despite the rec...

    Authors: Hua-Yi Lin and Tzu-Chiang Chiang

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:382701

    Published on:

  3. Content type: Research Article

    We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of probabilistic protocols that detect the absence of a tag from a system composed of a set of tags and a reader. Our ...

    Authors: Mauro Conti, Roberto Di Pietro and Angelo Spognardi

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:575171

    Published on:

  4. Content type: Research Article

    Energy efficiency is an essential requirement for wireless sensor networks while security must also be ensured for mission-critical applications. In this paper, we present an energy-efficient distributed deter...

    Authors: Xing Zhang, Jingsha He and Qian Wei

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:765143

    Published on:

  5. Content type: Research Article

    With the rapid development and growth of the mobile industry, a considerable amount of mobile applications and services are available, which involve Internet scale data collections. Meanwhile, it has a tremend...

    Authors: Chaokun Wang, Peng Zou, Zhang Liu and Jianmin Wang

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:837209

    Published on:

  6. Content type: Research Article

    Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardwa...

    Authors: Jen-Yan Huang, I-En Liao and Hao-Wen Tang

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:296704

    Published on:

  7. Content type: Research Article

    With the rapid development of the mobile communication and wireless access technologies, the interworking of heterogeneous networks turns into a trend and various wireless networks are getting connected with t...

    Authors: Xinghua Li, Jianfeng Ma, YoungHo Park and Li Xu

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:867315

    Published on:

  8. Content type: Research Article

    Mobile ad hoc networks involve communications over a shared wireless channel without any centralized infrastructure. Consequently, in an optimal solution, management and security services depend exclusively on...

    Authors: P. Caballero-Gil and C. Hernández-Goya

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:935457

    Published on:

  9. Content type: Research Article

    Information security in infrastructureless wireless sensor networks (WSNs) is one of the most important research challenges. In these networks, sensor nodes are typically sprinkled liberally in the field in or...

    Authors: Reza Azarderskhsh and Arash Reyhani-Masoleh

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:893592

    Published on:

  10. Content type: Research Article

    We describe a new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certific...

    Authors: Ayan Roy-Chowdhury and John S. Baras

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:392529

    Published on:

  11. Content type: Research Article

    Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for eme...

    Authors: IoannisG Askoxylakis, Theo Tryfonas, John May, Vasilios Siris and Apostolos Traganitis

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:807684

    Published on:

  12. Content type: Research Article

    Security is a fundamental issue for promising applications in a VANET. Designing a secure protocol for a VANET that accommodates efficiency, privacy, and traceability is difficult because of the contradictions...

    Authors: Hyoung-Kee Choi, In-Hwan Kim and Jae-Chern Yoo

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:716794

    Published on:

  13. Content type: Research Article

    Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, s...

    Authors: Javier Campos, Carlos T. Calafate, Marga Nácher, Pietro Manzoni and Juan-Carlos Cano

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:437868

    Published on:

  14. Content type: Research Article

    Broadcast is used in wireless sensor networks for operations such as software updates, network queries, and command dissemination. Applications such as battlefield control and natural resource management requi...

    Authors: Vijay Sivaraman, Diethelm Ostry, Jaleel Shaheen, Antoni Junior Hianto and Sanjay Jha

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:695171

    Published on:

  15. Content type: Research Article

    This paper presents a Wireless Information-Theoretic Security (WITS) scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks. A...

    Authors: Theofilos Chrysikos, Tasos Dagiuklas and Stavros Kotsopoulos

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:628747

    Published on:

  16. Content type: Research Article

    Camera systems are used in many applications including video surveillance for crime prevention and investigation, traffic monitoring on highways or building monitoring and automation. With the shift from analo...

    Authors: Thomas Winkler and Bernhard Rinner

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:530354

    Published on:

  17. Content type: Research Article

    Increasing amount of Wireless Sensor Network (WSN) applications require low network delays. However, current research on WSNs has mainly concentrated on optimizing energy-efficiency omitting low network delays...

    Authors: Ville Kaseva, Timo D. Hämäläinen and Marko Hännikäinen

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:920141

    Published on:

  18. Content type: Research Article

    Convergence environments and technologies are urgently coming close to our life with various wireless communications and smart devices in order to provide many benefits such as connectivity, usability, mobilit...

    Authors: Taeshik Shon, Kyusuk Han, James J. (Jong hyuk) Park, Young-Sik Jeong and Yang Sun Lee

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:176393

    Published on:

  19. Content type: Research Article

    A network reprogramming protocol is made for updating the firmware of a wireless sensor network (WSN) in situ. For security reasons, every firmware update must be authenticated to prevent an attacker from install...

    Authors: Yee Wei Law, Yu Zhang, Jiong Jin, Marimuthu Palaniswami and Paul Havinga

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:685219

    Published on:

  20. Content type: Research Article

    Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio is a smart device which runs radio applications software to perform signal p...

    Authors: Juan Hernandez-Serrano, Olga León and Miguel Soriano

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:242304

    Published on: