Security analysis of reliable transport layer protocols for wireless sensor networks.
Levente ButtyánL. CsikPublished in: PerCom Workshops (2010)
Keyphrases
- security analysis
- transport layer
- wireless sensor networks
- network layer
- end to end
- routing protocol
- application layer
- physical layer
- multi hop
- cross layer
- authentication protocol
- security requirements
- smart card
- mac protocol
- energy efficient
- public key
- wireless communication
- energy consumption
- routing algorithm
- sensor networks
- ad hoc networks
- encryption scheme
- data transmission
- sensor nodes
- mobile ad hoc networks
- wireless ad hoc networks
- wireless networks
- resource constrained
- base station
- ddos attacks
- energy efficiency
- e government
- real time