Learn More
—We envision a scenario for security of wireless networks that include and integrate nodes of all different capabilities, including tiny sensors or similarly battery-powered, resource-constrained tiny nodes. However, the existing Wireless Protected Access (WPA) protocol may not be suitable for such resource-constrained, low-end nodes as the protocol could(More)
It is challenging to secure a wireless sensor network (WSN) because its inexpensive, tiny sensor nodes do not have the necessary processing capability, memory capacity, and battery life to take advantage of the existing security solutions for traditional networks. Existing security solutions for wireless sensor networks are mostly based on symmetric key(More)
Network security, administration and management: advancing technology and practice / Dulal Chandra Kar and Mahbubur Rahman Syed, editors. p. cm. Includes bibliographical references and index. Summary: " This book identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and(More)
It is challenging to secure a wireless sensor network (WSN) because its inexpensive, tiny sensor nodes do not have the necessary processing capability, memory capacity, and battery life to take advantage of the existing security solutions for traditional networks. Existing security solutions for wireless sensor networks are mostly based on symmetric key(More)
There is increasing demand worldwide , from government agencies and the private sector for cutting-edge biometric security technology that is difficult to breach but user-friendly at the same time. Some of the older tools, such as fingerprint, retina and iris scanning, and facial recognition software have all been found to have flaws and often viewed(More)