Seth Utecht

Learn More
In this paper, we show through a simple secure symmetric key based protocol design and its implementation the feasibility of secure data collection in a vehicular sensor networks. We demonstrate that the protocol works in a realistic setting by collecting the real trace data through real implementation. Some of the key considerations are efficiency,(More)
This thesis presents the difficulties and solutions to local processing, secure transmission, and central processing, which are the three stages of sensor network protocols. The thesis is organized into three chapters, each focusing on a particular real-life application that highlights the challenges of a particular stage. The first chapter uses body sensor(More)
  • 1