Friday, December 31, 2010

Happy New Year

Wishing you all a very Happy New Year!

Tuesday, December 28, 2010

CFP: ACM SenSys 2011

ACM SenSys 2011, Seattle, WA
November 1-4, 2011

Workshop Proposal Submission Deadline: February 25th, 2011
Paper Registration and Abstract: April 1st, 2011, 11:59 pm EST.
Paper Submission Deadline: April 8th, 2011, 11:59 pm EST.
Demo Submission Deadline: July 22nd, 2011, 11:59 pm EST.
Poster submission deadline: August 1st, 2011, 11:59pm EST.

Topics of interest include, but are not limited to, the following:
• Experience with real-world deployments and applications
• Resource management and OS support for sensing systems
• Energy management and harvesting for long-term operation
• Wireless communication systems and protocols for sensor networks
• Sensor network measurement and characterization
• Programming paradigms and models for distributed sensing
• Sensor network debugging, fault-tolerance and reliability
• Sensing, actuation and control in cyber-physical systems
• Sensor systems leveraging mobile phones, RFIDs, robots, etc.
• Distributed sensor data storage, retrieval, processing and management
• Approaches to sensor network architecture
• Sensor data quality, integrity, and trustworthiness
• In-network data reduction, inference, and signal processing
• Security and privacy in sensor networks
• Time and location estimation and management

More Info:

Monday, December 27, 2010

Introduction to security for smart object networks - Part 2: Guidelines and common misconceptions

"Part 2 of this white paper offers some guidelines for securing networks of smart objects and addresses some common misconceptions that often cause developers to avoid including security in smart object devices and networks."
Kurt Stammberger and Monique Semp, Mocana; M. B. Anand, Eka Systems, Inc.; David Culler, University of California, Berkeley

Page 1:Introduction to security for smart object networks - Part 2: Guidelines and common misconceptions 
Page 2: IPSec/IKE 
Page 3: Optimize Security for Smart Objects 
Page 4: Common Security Misconceptions 

Related Posts with Thumbnails