Secure Service and Management for Security-Critical Wireless Sensor Network.
Qiang LiuLi LiuXiaohui KuangYan WenPublished in: IMIS (2012)
Keyphrases
- wireless sensor networks
- key management
- security services
- radio frequency identification rfid
- key establishment
- security management
- security requirements
- service management
- security issues
- key management scheme
- management system
- security level
- security mechanisms
- security protocols
- application level
- security measures
- network management
- rfid systems
- identity management
- sensor networks
- resource constrained
- enterprise systems
- service delivery
- security analysis
- security architecture
- key distribution
- data security
- cloud storage
- secure communication
- authentication mechanism
- security properties
- access control
- energy consumption
- directory service
- public key encryption
- group communication
- service platform
- cryptographic protocols
- security policies
- key exchange
- trusted third party
- digital signature
- rfid technology
- security patterns
- diffie hellman
- stream cipher
- data encryption
- integrity verification
- service providers
- cloud computing
- private key
- factor authentication
- trusted computing
- information security
- web services
- provably secure
- wireless sensor
- rfid tags
- software as a service
- encryption scheme
- key agreement
- key exchange protocol
- data management
- public key
- security model
- role based access control
- sensor nodes
- secret key
- intrusion detection
- virtual organization
- e government
- sensitive data
- cloud services
- secure routing