Learn More
Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety of tasks such as authentication, management of personal profiles, and other kinds of secure information processing. Integration of smartcards into networked environments though, has(More)
This paper explores the design space for message authenti-cation in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and physical and virtual multipath au-thentication. While end-to-end authentication provides the highest and most general security level, it may be too costly or impractical to implement. On the(More)
The paper presents a novel approach t o J a v a b yte code ver-iication: The veriication process is performed ooine" on a network server, instead of incorporating it in the client. Furthermore, the most critical part of the veriication process is based upon a formal model and uses a model checker for checking the veriication conditions. The result of the(More)
This paper proposes that the healthcare domain can serve as an archetyp-ical field of research in pervasive computing. We present this area from a technological perspective, arguing that it provides a wide range of possible applications of pervasive computing technology. We further recognize that pervasive computing technology is likely to create concerns(More)
The severe resource restrictions of computer-augmented everyday artifacts imply substantial problems for the design of applications in smart environments. Some of these problems can be overcome by exploiting the resources, I/O interfaces, and computing capabilities of nearby mobile devices in an ad hoc fashion. We identify the means by which smart objects(More)
1I ntroduction Intrusion detection systems (IDS) are important security tools in computer networks. There exist manyapproaches to this problem in traditional computer networks and wireless ad-hoc networks [ZL00], butliterature on this topic with regard to sensor networks is scarce. The goal of failure recovery is to extend the lifetime of asensor network by(More)