The design of sustainable wireless sensor networks (WSNs) is a very challenging issue. On the one hand, energyconstrained sensors are expected to run autonomously for long periods. However, it may be… (More)
Group key management is an important functional building block for any secure multicast architecture. Thereby, it has been extensively studied in the literature. In this paper we present relevant… (More)
Multicasting is an efficient communication mechanism for group-oriented applications such as videoconferencing, broadcasting stock quotes, interactive group games, and video on demand. The lack of… (More)
32nd IEEE Conference on Local Computer Networks…
2007
Energy is a scarce resource in Wireless Sensor Networks. Some studies show that more than 70% of energy is consumed in data transmission. Since most of the time, the sensed information is redundant… (More)
In wireless sensor networks, reliability is a design goal of a primary concern. To build a comprehensive reliable system, it is essential to consider node failures and intruder attacks as unavoidable… (More)
Second IFIP International Conference on Wireless…
2005
Security is a strong requirement for effective deployment of business wireless communication applications. Therefore, many proposals dealt with security holes in wired equivalent privacy protocol… (More)
Even though hierarchical group communication is a prominent communication model for a variety of applications, featured by hierarchical communication rules, it has not been sufficiently investigated… (More)
The distance vector (DV) routing protocols (e.g., RIP) have been widely used in the Internet. These protocols are vulnerable to a variety of attacks since they were designed without security aware.… (More)
Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applications, the traffic encryption… (More)
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy is defined using the… (More)