Login / Signup
Dealing with the secure time synchronization and man-in-the-middle attacker in mobile sensor networks.
Mohammad Abdus Salam
Kevin Beckwith Bush
Published in:
ACM Southeast Regional Conference (2012)
Keyphrases
</>
mobile sensor networks
sensor networks
wireless sensor networks
sensor nodes
information systems
security analysis
security issues
security requirements
key management
database
key agreement protocol