Skip to main content

Security and Resilience for Smart Devices and Applications

  1. Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices. In this context, it is wide...

    Authors: Damien Sauveron, Konstantinos Markantonakis and Christos Verikoukis
    Citation: EURASIP Journal on Wireless Communications and Networking 2014 2014:123
  2. We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of probabilistic protocols that detect the absence of a tag from a system composed of a set of tags and a reader. Our ...

    Authors: Mauro Conti, Roberto Di Pietro and Angelo Spognardi
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:575171
  3. Alterations and unpredictability of the network topology in mobile ad hoc networks (MANETs) are less capable of ensuring the security of multicast data transmissions than in conventional networks. Despite the rec...

    Authors: Hua-Yi Lin and Tzu-Chiang Chiang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:382701
  4. Energy efficiency is an essential requirement for wireless sensor networks while security must also be ensured for mission-critical applications. In this paper, we present an energy-efficient distributed deter...

    Authors: Xing Zhang, Jingsha He and Qian Wei
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:765143
  5. With the rapid development and growth of the mobile industry, a considerable amount of mobile applications and services are available, which involve Internet scale data collections. Meanwhile, it has a tremend...

    Authors: Chaokun Wang, Peng Zou, Zhang Liu and Jianmin Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:837209
  6. Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardwa...

    Authors: Jen-Yan Huang, I-En Liao and Hao-Wen Tang
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:296704
  7. With the rapid development of the mobile communication and wireless access technologies, the interworking of heterogeneous networks turns into a trend and various wireless networks are getting connected with t...

    Authors: Xinghua Li, Jianfeng Ma, YoungHo Park and Li Xu
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:867315
  8. Mobile ad hoc networks involve communications over a shared wireless channel without any centralized infrastructure. Consequently, in an optimal solution, management and security services depend exclusively on...

    Authors: P. Caballero-Gil and C. Hernández-Goya
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:935457
  9. Information security in infrastructureless wireless sensor networks (WSNs) is one of the most important research challenges. In these networks, sensor nodes are typically sprinkled liberally in the field in or...

    Authors: Reza Azarderskhsh and Arash Reyhani-Masoleh
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:893592
  10. We describe a new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certific...

    Authors: Ayan Roy-Chowdhury and John S. Baras
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:392529
  11. Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for eme...

    Authors: IoannisG Askoxylakis, Theo Tryfonas, John May, Vasilios Siris and Apostolos Traganitis
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:807684
  12. Security is a fundamental issue for promising applications in a VANET. Designing a secure protocol for a VANET that accommodates efficiency, privacy, and traceability is difficult because of the contradictions...

    Authors: Hyoung-Kee Choi, In-Hwan Kim and Jae-Chern Yoo
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:716794
  13. Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, s...

    Authors: Javier Campos, Carlos T. Calafate, Marga Nácher, Pietro Manzoni and Juan-Carlos Cano
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:437868
  14. Broadcast is used in wireless sensor networks for operations such as software updates, network queries, and command dissemination. Applications such as battlefield control and natural resource management requi...

    Authors: Vijay Sivaraman, Diethelm Ostry, Jaleel Shaheen, Antoni Junior Hianto and Sanjay Jha
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:695171
  15. This paper presents a Wireless Information-Theoretic Security (WITS) scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks. A...

    Authors: Theofilos Chrysikos, Tasos Dagiuklas and Stavros Kotsopoulos
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:628747
  16. Camera systems are used in many applications including video surveillance for crime prevention and investigation, traffic monitoring on highways or building monitoring and automation. With the shift from analo...

    Authors: Thomas Winkler and Bernhard Rinner
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:530354
  17. Increasing amount of Wireless Sensor Network (WSN) applications require low network delays. However, current research on WSNs has mainly concentrated on optimizing energy-efficiency omitting low network delays...

    Authors: Ville Kaseva, Timo D. Hämäläinen and Marko Hännikäinen
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:920141
  18. Convergence environments and technologies are urgently coming close to our life with various wireless communications and smart devices in order to provide many benefits such as connectivity, usability, mobilit...

    Authors: Taeshik Shon, Kyusuk Han, James J. (Jong hyuk) Park, Young-Sik Jeong and Yang Sun Lee
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:176393
  19. A network reprogramming protocol is made for updating the firmware of a wireless sensor network (WSN) in situ. For security reasons, every firmware update must be authenticated to prevent an attacker from install...

    Authors: Yee Wei Law, Yu Zhang, Jiong Jin, Marimuthu Palaniswami and Paul Havinga
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:685219
  20. Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio is a smart device which runs radio applications software to perform signal p...

    Authors: Juan Hernandez-Serrano, Olga León and Miguel Soriano
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2011:242304