9 Questions 14 Answers 0 Followers
Questions related from Anass Rghioui
Why?
07 July 2014 3,531 3 View
Doing simulations on the performance of a cryptographic algorithm, its key management system, and an IDS on WSN. Apart from the impact on energy, what should be measured to evaluate these algorithms?
04 April 2014 7,015 5 View
There is a mathematical model to evaluate a cryptographic algorithm or an IDS (Intrusion Detection System)? If so, how should it be used and for what purpose? PS: I'm working on IP-based WSN.
03 March 2014 3,671 4 View
if you have examples of interesting thesis or articles I will be grateful
01 January 2014 8,179 4 View
In IP-based WSN networks (like 6LoWPAN), what are end-to-end security methods used to secure communication between nodes and IP machines?
10 October 2013 9,560 12 View
I m a PhD student, I am looking for a specialist in security in WSN networks, especially for the KMS for collaboration and evaluating my work.
10 October 2013 5,354 0 View
In IP-based WSN surveys, they recomand that IPsec must change IKE by another leightweight KMS, and also IEEE 802.15.4 MAC must have a KMS for its AES algorithm. Can we use the same KMS for both...
09 September 2013 9,992 2 View
In normal networks, Broadcasting is performed by using a specfic IP address called "Broadcasting address" (e.g. 193.169.1.255). How it works on WSN?
09 September 2013 1,788 1 View
I am trying to model new security algorithms for KMS and IDS systems in WSN. how I should proceed to implement them in Tiny OS or any other WSN OS?
09 September 2013 584 1 View