6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer.
Konrad-Felix KrentzHosnieh RafieeChristoph MeinelPublished in: ASPI@UbiComp (2013)
Keyphrases
- information security
- intrusion detection
- security requirements
- statistical databases
- security issues
- access control
- computer security
- network security
- security analysis
- security systems
- security properties
- functional requirements
- security mechanisms
- wireless sensor networks
- security problems
- information assurance
- data security
- cyber attacks
- security level
- security management