Login / Signup
Adaptable End-To-End Security For Mobile IoT Sensing Applications.
Jorge Granjal
Edmundo Monteiro
Published in:
SafeThings@SenSys (2017)
Keyphrases
</>
end to end
key management
ad hoc networks
mobile computing
management system
mobile networks
mobile devices
information security
mobile phone
transport layer
sensor networks
multipath
admission control
context aware
congestion control
mobile applications
wireless ad hoc networks
real time
intrusion detection
high bandwidth
multi hop
service delivery
security policies
application layer
location information
service management
wifi
scalable video
network security
cloud computing
physical layer
wireless networks