Adaptable End-To-End Security For Mobile IoT Sensing Applications.
Jorge GranjalEdmundo MonteiroPublished in: SafeThings@SenSys (2017)
Keyphrases
- end to end
- key management
- ad hoc networks
- mobile computing
- management system
- mobile networks
- mobile devices
- information security
- mobile phone
- transport layer
- sensor networks
- multipath
- admission control
- context aware
- congestion control
- mobile applications
- wireless ad hoc networks
- real time
- intrusion detection
- high bandwidth
- multi hop
- service delivery
- security policies
- application layer
- location information
- service management
- wifi
- scalable video
- network security
- cloud computing
- physical layer
- wireless networks