Dethroning Transport Layer Security in the Embedded World.
Sebastian UngerStefan PfeifferDirk TimmermannPublished in: NTMS (2012)
Keyphrases
- transport layer
- network layer
- physical layer
- end to end
- application layer
- network monitoring
- routing protocol
- access control
- information security
- neural network
- security policies
- network architecture
- cross layer
- intrusion detection
- multipath
- network security
- security issues
- multi hop
- resource utilization
- wireless communication
- response time
- internet protocol
- sensor networks