Learn More
In this paper, we explore security issues of wireless sensor networks, and in particular propose an efficient link layer security scheme. The scheme provides transparent security services such as encryption, decryption and authentication at the link layer of the network protocol stack. To minimize computation and communication overheads of the scheme, we(More)
This paper analyses the role trusted computing can play in a pervasive/ubiquitous environment. Traditionally, the ideology of Weiser (1991) and others when considering the pervasive computing vista, dictated that computers would invisibly integrate themselves into the background environment, providing useful services to users, as well as contextual(More)