Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch.
Loading Scinapse...
Published on Jan 1, 2011in Wireless Networks 1.98
Benoı̂t Latré6
Estimated H-index: 6
(Ghent University),
Bart Braem13
Estimated H-index: 13
(University of Antwerp)
+ 2 AuthorsPiet Demeester49
Estimated H-index: 49
(Ghent University)
The increasing use of wireless networks and the constant miniaturization of electrical devices has empowered the development of Wireless Body Area Networks (WBANs). In these networks various sensors are attached on clothing or on the body or even implanted under the skin. The wireless nature of the network and the wide variety of sensors offer numerous new, practical and innovative applications to improve health care and the Quality of Life. The sensors of a WBAN measure for...
650 Citations Source Cite
Published on Apr 1, 2003in Mobile Networks and Applications 2.50
Ramesh Karri37
Estimated H-index: 37
(New York University),
Piyush Mishra6
Estimated H-index: 6
(New York University)
In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session by considering the wireless transport layer security protocol. Our analysis showed that data transfers during a secure wireless transaction, number and size of messages exchanged during secure session establishment and cryptographic computations used for data authentication and privacy during secure data transaction...
31 Citations Source Cite
Published on Mar 3, 2016in Sensors 2.48
Aamir Shahzad8
Estimated H-index: 8
Malrey Lee12
Estimated H-index: 12
+ 5 AuthorsIftikhar Ahmad3
Estimated H-index: 3
In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of th...
2 Citations Source Cite
Published on Aug 1, 2003in IEEE Computer 1.94
William A. Arbaugh36
Estimated H-index: 36
(University of Maryland, College Park)
Wireless security requires slightly different thinking from wired security because it gives potential attackers easy transport medium access. This access significantly increases the threat that any security architecture must address. Wireless networking broadcast nature makes traditional link-layer attacks readily available to anyone. Wireless network security based on the IEEE 802.11 standard has received a lot of negative attention...
58 Citations Source Cite
Published on Mar 1, 2010 in IEEE International Conference on Pervasive Computing and Communications
Levente Buttyán43
Estimated H-index: 43
(Budapest University of Technology and Economics),
László Csik1
Estimated H-index: 1
(Budapest University of Technology and Economics)
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols specifically designed for wireless sensor networks have been proposed in the literature. Besides providing end-to-end reliability, some of those protocols also address the problems of fairness and congestion control, and they are all optimized for low energy consumption. However, in this paper, we sho...
22 Citations Source Cite
Published on Apr 1, 2006in The Journal of Supercomputing 1.53
Nicolas Sklavos20
Estimated H-index: 20
(University of Patras),
Paris Kitsos15
Estimated H-index: 15
(University of Patras)
+ 1 AuthorsOdysseas G. Koufopavlou21
Estimated H-index: 21
(University of Patras)
Communication protocols for wireless networks have specified security layers, with high-level encryption strength. The dedicated to security layer of Wireless Application Protocol (WAP), is the Wireless Transport Layer Security (WTLS). In this paper, an efficient architecture for the hardware implementation of WTLS is proposed. The introduced system supports bulk encryption, authentication and data integrity. The proposed arch...
11 Citations Source Cite
Published on Dec 5, 2014
Techniques and devices are disclosed for efficient offloading and/or aggregation of resources by providing different levels of connection management in a network. A wireless transmit/receive unit (WTRU) may support additional ECM and/or RRC states (e.g. inactive states) and/or transitions that may enable a WTRU to act without an RRC connection and/or with reduced latency. A WTRU may operate with network resources with and/or without radio resources. A WTRU may operate in parallel with a p...
8 Citations
Published on May 1, 2016
Jorge Granjal11
Estimated H-index: 11
(University of Coimbra),
Edmundo Monteiro17
Estimated H-index: 17
(University of Coimbra)
End-to-end communications with Internet-integrated sensing devices will contribute to the enabling of many of the envisioned IoT applications. Communication technologies with this purpose are currently being designed based on the 6LoWPAN adaptation layer, and of particular interest is CoAP (Constrained Application Protocol). The support of security in end-to-end CoAP communications with mobile Internet-integrated sensing devices is currently a challenge, in particular because of th...
2 Citations Source Cite
Published on Sep 1, 2007in IEEE Transactions on Mobile Computing 4.10
Yun Zhou11
Estimated H-index: 11
(University of Florida),
Yuguang Fang61
Estimated H-index: 61
(University of Florida)
In a large scale sensor network, it is infeasible to assign a unique Transport Layer Key (TLK) for each pair of nodes to provide the end-to-end security due to the huge memory cost per node. Thus, conventional key establishment schemes follow a key predistribution approach to establish a Link Layer Key (LLK) infrastructure between neighboring nodes and rely on multihop paths to provide the end-to-end security. Their drawbacks include vulnerability to the node c...
39 Citations Source Cite
Published on Jul 1, 2015 in International Conference on Transparent Optical Networks
Peter J. Winzer50
Estimated H-index: 50
(Bell Labs)
Space-division multiplexing (SDM) is considered the only long-term viable path for sustained capacity scalability in optical networks, from metropolitan Mega-Datacenter interconnects all the way to ultra-long-haul transport systems. To counteract crosstalk arising from dense photonic integration, multiple-input multiple-output (MIMO) techniques are likely to be used, following techniques that both wireless and copper access systems have implemented over the past two decades. In add...
1 Citations Source Cite