Location-based compromise-tolerant security mechanisms for wireless sensor networks.
Yanchao ZhangWei LiuWenjing LouYuguang FangPublished in: IEEE J. Sel. Areas Commun. (2006)
Keyphrases
- security mechanisms
- wireless sensor networks
- resource constrained
- sensor networks
- security systems
- sensor nodes
- security problems
- energy consumption
- security issues
- key management
- access control
- security services
- digital signature
- social networking
- security protocols
- payment systems
- smart card
- routing algorithm
- data collection
- operating system
- routing protocol
- security requirements
- real time
- security measures
- lightweight
- information systems
- database
- rfid tags
- multipath
- software systems
- computer systems
- data sets
- cryptographic algorithms