Performance Impact of and Protocol Interdependencies of IEEE 802.15.4 Security Mechanisms.
Feng ChengXiaolong YinReinhard GermanFalko DresslerPublished in: MASS (2009)
Keyphrases
- security mechanisms
- security protocols
- secure electronic
- cryptographic algorithms
- security issues
- resource constrained
- security requirements
- access control
- security systems
- security problems
- smart card
- payment systems
- security services
- operating system
- security threats
- security analysis
- digital signature
- information systems
- medium access control
- security model
- mac protocol
- authentication protocol
- public key infrastructure
- end to end
- lightweight
- multi agent systems
- wireless networks