On evaluating the performance impact of the IEEE 802.15.4 security sub-layer.
Roberta DaidoneGianluca DiniGiuseppe AnastasiPublished in: Comput. Commun. (2014)
Keyphrases
- physical layer
- application layer
- access control
- cost benefit
- intrusion detection
- security issues
- information assurance
- wireless local area network
- security systems
- security mechanisms
- multi layer
- security model
- security protocols
- security problems
- network layer
- security requirements
- security policies
- sensor networks