TinySec: a link layer security architecture for wireless sensor networks

C Karlof, N Sastry, D Wagner - … of the 2nd international conference on …, 2004 - dl.acm.org
We introduce TinySec, the first fully-implemented link layer security architecture for wireless
sensor networks. In our design, we leverage recent lessons learned from design …

Comparative analysis of different polynomial interpolations for implementing key management techniques in MANETs

C Monga, KR Ramkumar… - International journal of …, 2022 - inderscienceonline.com
The backbreaking issue in mobile ad hoc networks (MANETs) is ensuring security which
abounds due to dynamic nature and unavailability of centralised infrastructure. Due to the …

Research on mobile information access based on internet of things

JT Geng, XB Xiong - Applied Mechanics and Materials, 2014 - Trans Tech Publ
The paper design mobile information collection system based on Internet of Things,
implemented access gateway by smart mobile devices through a variety of ways, such as Wi …

Public Key Techniques for Prevention of Resource Exhaustion Attack in Wireless Sensor Networks

JS Heo, KS Ok, KC Kim - Advanced materials research, 2013 - Trans Tech Publ
This paper proposes a prevention mechanism for resource exhaustion attack in Wireless
Sensor Networks (WSN). WSNs are widely used in science, medical, and military …

[PDF][PDF] How will the Internet of Things (IoT) revolutionize contract management for Projects and Programs Management?

T Kibler - 2019 - pmworldlibrary.net
The Internet of Things (IoT) is the extension of the Internet to things and places in the
physical world. While the Internet does not usually extend beyond the electronic world, the …