Security techniques for the WSN link layer within military IoT.
Janusz FurtakZbigniew ZielinskiJan ChudzikiewiczPublished in: WF-IoT (2016)
Keyphrases
- link layer
- physical layer
- key management
- wireless sensor networks
- network layer
- wireless networks
- wireless communication
- ad hoc networks
- routing protocol
- resource constrained
- multi hop
- intrusion detection
- information security
- management system
- security mechanisms
- security issues
- mac layer
- energy efficient
- cloud computing
- security policies
- data transmission
- application layer
- communication protocol
- mac protocol
- security protocols
- cross layer
- network security
- routing algorithm